Professional Documents
Culture Documents
Lesson 2 Course Packs
Lesson 2 Course Packs
A COMPENDIUM OF
TOPICS FOR
LIVING IN THE
IT ERA (GEE-LIE)
PREPARED BY:
OCTOBER 2020
Page | 1
GEE- LIVING IN THE IT ERA
TABLE OF CONTENTS
Page
Course Learning outcomes ………………………………………………………3
Introduction ………………………………………………………………………3-6
References……………………………………………………………………….49-51
Page | 2
GEE- LIVING IN THE IT ERA
Lecture Notes
Introduction
History has witnessed that humanity went through several revolutions. The latest one is
rupture between everything that is old; what is considered new today is quickly turned
into an old and obsolete trend tomorrow. Because of these evolutions, the demand for
this technology has increased. Therefore, the latter has become the most important used
Page | 3
GEE- LIVING IN THE IT ERA
resource compared to classical resources, which has led to the amplification of interest
At present, the world is witnessing a rapid evolution process in the need for information
facilities in terms of quantity, quality and access to information, in order to make the best
decision based on the different changes and dynamics of the enterprises environment.
This demonstrates clearly the growing importance of information systems and their ability
develop these systems and to increase their effectiveness and efficiency. One of the key
elements of the success of these systems is that they have become dependent on
sophisticated technology that have greatly facilitated access to information and clearly
thanks to the technological developments that underpin it. It has become the
infrastructure of what is known today as the knowledge economy which depends on the
information and its delivery methods in the shortest time and at the lowest costs possible.
Due to the tremendous development witnessed by this sector and to the extent it has
contributed in all sectors, especially in light of the use of satellite, mobile phone and the
Internet, this has put the companies in front of a new challenge which is the acquisition
No one can doubt that information technology is a fundamental and innovative revolution
that has touched human life considerably in the last century. Indeed, far from being an
Page | 4
GEE- LIVING IN THE IT ERA
technology has just been exploited in all aspects of life. No domain has remained immune
to this policy, which facilitates tasks for both the company and the staff.
Usually when we talk about information technology, it comes to people’s mind that
“information technology (IT) is the use of any computers, storage, networking and other
physical devices, infrastructure and processes to create, process, store, secure and
exchange all forms of electronic data. Typically, IT is used in the context of enterprise
process of communication and transmission of information has become so fast that it has
spread other the world widely, and it has greatly affected human life and brought about a
radical change. The world now depends entirely on technology, knowing that this
technology carries a significant enough risk to destroy society. Which leads us to wonder
exactly what the new technologies of information and communication consist of?
What are their effects on the daily lives of individuals and what impacts
social?
In this lesson we will focus on the impacts of information technology in Society, what is
IT Automation, the influence of IT on culture and social behavior, IT Trend, Issues and
Page | 5
GEE- LIVING IN THE IT ERA
Let’s start!
Information technology, widely known under its abbreviation (IT), is defined as “the
science and activity of using computers and other electronic equipment to store and send
information.
Many areas of public health, including vital statistics, investigation and research,
and environmental health, use information technology (IT) to achieve their goals and
objectives. IT includes the use of computers and communications, and the transformation
Most modern businesses depend heavily on information systems, from employee e-mail
IT in Education
Information technology has made the education process more effective and productive.
It has increased the well-being of the students. Developed methods of education have
made this process easier, such as the replacement of books with tablets and laptops.
Moreover, the emergence of e-learning platforms that allows students to learn from their
homes. These platforms can be an effective alternative for people who are out of school,
Page | 6
GEE- LIVING IN THE IT ERA
or who have difficulties keeping up with their teachers in class. These platforms give
students the chance to review the courses with simpler and more concrete explanations
at every moment, and this reinforces the educational process and leads to better results
IT in Health System
In the field of medicine, medical devices have known a remarkable development. They
have become more efficient. IT has entered these devices and turned them into digital
devices that facilitate their programming and handling. Thanks to IT sectors like the
artificial intelligence (AI) the world has witnessed distance surgeries thanks to robots, the
implementation of artificial members as artificial legs, hands and even artificial cardio-
information will be of increasing importance to health care providers and to the public
underserved areas, including both rural and urban populations. These developments will
health may be very relevant to employment and insurability. Efficient, effective, reliable
routine data collection. In this regard, information technology might in fact, enhance the
Page | 7
GEE- LIVING IN THE IT ERA
The development of the field of medicine is important for humanity. It is the basis for living
IT in Politics
Technology holds the role of power. Information technologies play a decisive role in the
political landscape of countries. They have become widely used in electoral campaigns
to influence public opinion and specially to involve young people in the political life.
Politicians use technology in many ways to influence the growth of different individuals in
their respective spheres. The likes of Twitter, Facebook, and YouTube are powerful
communication media platforms that can easily raise the ratings of politicians. Technology
is a defining factor in most political races. Through technology, politicians are able to
access funds, gain political support, and spend less on campaigning and pushing their
candidacy.
IT in Economy
strategy of innovation through the harmony of scientific ideas and their practical
application by engineers and scientists making the R & D role into large sections with
technical, legal and administrative skills in maintaining the industrial location and a
industrial culture that derives its momentum from the advances of science and technology
that mature and deepen as a natural result of research and development. Information
Technology (IT) is an all-pervasive change, which is affecting the design of many existing
Page | 8
GEE- LIVING IN THE IT ERA
products and services, as well as the mode of producing and marketing almost all of them.
This point emerges every day stronger from sector studies in manufacturing or in
intensified and shifted from the national to the global arena, and product life cycles have
shrunk; yet, there is a growing requirement to satisfy customers’ specific and individual
need. The world economy is in the midst of a rapid transformation. Internet, Mobile
technology, Social Media, and Big Data trends, have unleashed a wave of innovations
that is creating thousands of new startups and job positions, and is reinventing the
traditional industries. Nowadays, we witness big technology trends that are transforming
society as well as business and economy. Every industry now is highly if not totally
affected by the emergence of information technology trends, like Cloud, Social Media, Big
Data that are redrawing the landscape of the global economy. The major consequence
of this emergence is the displacement of some jobs, which has changed the map of the
most requested jobs in the global market and also is enabling and creating new job’s
position profiles.
It can be said that the social impact of information technology has two sides. It cannot be
one hundred percent negative nor hundred percent positive. It is a two-sided weapon.
world from vast continents separating people and relatives, to a very small village
Page | 9
GEE- LIVING IN THE IT ERA
in different parts of the globe has become an easy and fast process, via different ways:
Information technology has changed the way people perceive reality, and it caused quite
a disorder in some concept and perceptions. Modern technology has changed our
perspective on many concepts. It also changed our dealings with many traditions and
customs that were once considered sacred and the pillars of society. Despite the fact that
the modern means of communication made the world a small village that facilitate
communication, though it created a kind of alienation and divergence within the family.
society. This is because the modern technology allows the students to communicate with
their families and associates instantly using application such as Line, WeChat and
WhatsApp. This application will make life easier to communicate between each other.
However, this will cause them to ignore the spelling of different words and the usage of
proper grammar. Furthermore, with the increasing amount of information on the web,
Internet users may come across inaccurate information and lead to misinformation or
Page | 10
GEE- LIVING IN THE IT ERA
It’s apparent that the computer era is here; this cannot be debated. In the most
really compact type. It may function an enormous number of operations and functions
that individual can’t do. Due to this usage of IT, we could have cost efficacy, globalization,
communicating and new jobs creation. Despite all the benefits, the IT world faces a few
notable disadvantages; the solitude of information is a problem but the most significant
drawback is unemployment since most job originally accomplished by a human, are now
done by computer. Nevertheless, it’s said that in certain scopes such as schooling,
technology can improve traditional procedures of learning but can’t replace the human
touch.
With the development of computer industry and internet networks during the last three
decades, things have changed and global communication has reached an unprecedented
height. With these developments immense scopes have come to the surface to impart
learning in a much more efficient and interactive way. Multimedia technology and internet
networks have revolutionized the whole philosophy of learning and distance learning and
provided us with the opportunity for close interaction between teachers and learners with
improved standard of learning materials compared to what was existing only with the
printed media. As we mentioned earlier it has gone to such an extent to create a virtual
class room where teachers and students are scattered all over the world.
We could be able to work on jobs being thousands of miles away through electromagnetic
wave. That way the problem of skills shortage in some countries could be reduced and
Page | 11
GEE- LIVING IN THE IT ERA
extremely high level with a small firm being able to sell its products to another part of the
world very easily as they can communicate to each other in no time and fix up the deal.
Development of electronic commerce has made it very convenient for individual buyer to
select the product online and make payment immediately. However, this has its problem
as the buyer has not seen whom he/she is buying from and can never hear from the seller
once the money has been paid. This kind of case has come to our attention.
Virtual reality, probably much more advanced and more seamlessly integrated devices
(e.g. one could think of a device projecting images (perhaps from glasses) directly onto
the lens of a human’s eye), allowing people to disregard their surroundings. This will allow
people to travel virtually, e.g. one could go on holidays just by playing a certain program,
These days one can attend business meetings without having to be there physically. The
business partners in such a virtual meeting are able to see and hear each other as if they
are real. Mobility may be very important these days, however, in the new century, the
York one can just attend the meeting virtually and save a lot of time and money (and
Contact with other people will only happen if desired by a person, everything else will be
done by technology. As an example, nobody will need to go shopping anymore, one will
order things needed via some special sophisticated devices which are easy to handle and
understand. One can display the goods, possibly even smell, feel or hear them.
Page | 12
GEE- LIVING IN THE IT ERA
Treating untreatable disease like cancer would be much easier as the DNA structure
could be defined accurately to guide the kind of cell-based treatment required for a
particular patient.
with IT systems. Automation software works within the confines of those instructions,
tools, and frameworks to carry out the tasks with little to no human intervention.
environments need to be able to scale faster than ever and IT automation is vital to
In theory, if it's an IT task, some level of automation can be applied to that task. So,
automation can integrate with and apply to anything from network automation to
Automation capabilities and applications can extend further into specific technologies, like
containers, to methodologies, like DevOps, and into broader areas, such as cloud, edge
Page | 13
GEE- LIVING IN THE IT ERA
Okay maybe not everything (yet), but a holistic approach to IT automation can help you
get repetitive, manual processes out of the hands of your staff. This allows teams to be
more productive, reduce errors, improve collaboration, and free up time that can be spent
Provisioning
Provisioning is all about heavy lifting, whether on bare metal or in a private, hybrid, or
public cloud. In order to run business systems, you need infrastructure and that
infrastructure must be set up. What used to be all about racks, boxes, and cables in a
datacenter is now (mostly) all about virtualized assets, from software-defined datacenters,
Most of what we do now is defined in software, and the move to software increased the
scale and capacity of what’s possible. This move also grants—and, by necessity,
requires—the codification of processes. This helps you meet the demands of your
Here’s where automation comes in. Why should you spend time setting up these
that you follow to do this work. Why not have an automated system follow those rules
instead? Roll out deployments in your datacenter with automation that works with your
existing infrastructure and management tools to take full advantage of what you already
Configuration management
Not all applications are created the same. They require different settings, filesystems,
ports, users...the list goes on. Once you’ve automated provisioning, you need to be able
Page | 14
GEE- LIVING IN THE IT ERA
to tell those resources what they need to do. Storing what your application environment
looks like in a document, spreadsheet, text file, or even email won’t help you achieve a
repeatable, robust environment to host your applications. And, as you gain more systems,
more instances, and more complexity, you need a better way of recording what systems
To this end, you need a robust configuration management solution that lets developers
simply define the infrastructure (bare metal, virtualized, cloud, containers, etc) in a way
that can be easily understood by everyone on your IT team. The simpler it is to automate
ad hoc scripts and practices for system management, the easier it is to get real work
done.
Orchestration
Chances are, you’re not deploying a single service on a single machine. Your IT is
probably a little more complex than that. It requires managing and servicing multiple apps
across multiple datacenters and infrastructures. Oh yeah, there’s also your public, private,
and hybrid cloud deployments. The more complex an IT system, the more complex
managing all the moving parts can become. The need to combine multiple automated
tasks and their configurations across groups of systems or machines increases. That’s
orchestration, in a nutshell. On top of that, you can control these orchestrations with
robust automation solutions. This lets you keep track of all of them, connect them all
Application deployment
Whether you use a more traditional approach to app deployment or if you use continuous
Page | 15
GEE- LIVING IN THE IT ERA
deployment hinges on a fully efficient set of automated, essential tasks and capabilities,
especially during the testing phase. Deployment automation can help you move from
commit and build to testing to deployment in a proven, trusted, and codified manner. This
reduces opportunities for human error while improving efficiency and throughput.
IT automation allows you to deploy your applications with certainty, configure needed
services from the start, and get your apps and their artifacts up and running—all via a
Define security, compliance, and risk management policies, enforce them, and remediate
issues by building them as automated steps throughout your infrastructure. Move security
to the forefront of your IT’s processes and be more proactive with the help of automation.
Having standardized security processes and workflows means easier compliance and
auditing. You know exactly how everything is enforced and you can verify if consistently.
New compliance requirements are easily implemented consistently across your IT.
Knowing the future is—of course—impossible, but there are things we’re starting to see
coming together for automation. Certainly there will be greater autonomy and,
subsequently, greater intelligence built into these systems. They’ll expand to cover more
parts of the IT software stack—think about automation built from bare metal to
Page | 16
GEE- LIVING IN THE IT ERA
Consider a security risk being automatically detected, reported, patched, tested, and
deployed while your IT staff are asleep. Your system could self-heal, gather relevant
information to discover if and where an attack came from, notify the correct people—all
increased productivity, more efficient use of materials, better product quality, improved
safety, shorter workweeks for labour, and reduced factory lead times. Higher output and
increased productivity have been two of the biggest reasons in justifying the use of
automation. Despite the claims of high quality from good workmanship by humans,
automated systems typically perform the manufacturing process with less variability than
human workers, resulting in greater control and consistency of product quality. Also,
increased process control makes more efficient use of materials, resulting in less scrap.
systems often remove workers from the workplace, thus safeguarding them against the
Another benefit of automation is the reduction in the number of hours worked on average
per week by factory workers. About 1900 the average workweek was approximately 70
hours. This has gradually been reduced to a standard workweek in the United States of
about 40 hours. Mechanization and automation have played a significant role in this
reduction. Finally, the time required to process a typical production order through the
Page | 17
GEE- LIVING IN THE IT ERA
A main disadvantage often associated with automation, worker displacement, has been
discussed above. Despite the social benefits that might result from retraining displaced
workers for other jobs, in almost all cases the worker whose job has been taken over by
the worker may be displaced geographically. In order to find other work, an individual may
required to invest in automation (an automated system can cost millions of dollars to
design, fabricate, and install), a higher level of maintenance needed than with a manually
operated machine, and a generally lower degree of flexibility in terms of the possible
products as compared with a manual system (even flexible automation is less flexible
Also there are potential risks that automation technology will ultimately subjugate rather
than serve humankind. The risks include the possibility that workers will become slaves
to automated machines, that the privacy of humans will be invaded by vast computer data
networks, that human error in the management of technology will somehow endanger
civilization, and that society will become dependent on automation for its economic well-
being.
These dangers aside, automation technology, if used wisely and effectively, can yield
substantial opportunities for the future. There is an opportunity to relieve humans from
repetitive, hazardous, and unpleasant labor in all forms. And there is an opportunity for
which humans can enjoy a higher standard of living and a better way of life.
Page | 18
GEE- LIVING IN THE IT ERA
Technology and culture influence each other. We usually tell the story that culture creates
a technology, because that explanation seems the most natural way to understand our
history and it puts our choices at the forefront, but we also have to consider the ways in
The technology that powered the industrial revolution created the industrial society.
the suburbs.
Radio created a culture of listeners and spawned jazz, big band, and fireside chats.
Television created the culture of Hollywood, MTV, always-on news, and reality TV shows.
As much as technology is created from the fabric of our culture, technology also creates
the fabric of our culture. Because technologists or historians are often leading the
influencing culture.
Every time you’re at a table with your friends and are balancing interacting with
them and interacting with your phone, that’s technology influencing culture.
Page | 19
GEE- LIVING IN THE IT ERA
Every time you can order something from an online vendor rather than going to a
Every time you or your kids log on to have some social time with friends rather
Every time a teammate or your entire team is so buried under email that they can’t
Every time you go to a new place based on its Yelp profile and reviews, that’s
Every time one of us sits down to consume our nightly on-demand entertainment,
The many hundreds of small ways that technology alters our individual and collective
behavior on a daily basis add up to the cultural changes the technologists and historians
point to. And, of course, for each of those examples, someone’s personal behavior can
Because of technology, we can find or create the communities and relationships that fit
our version of thriving, whatever that might be. We are just hoping that we can lean into
the good, minimize the bad, and consciously explore the grey areas, which exactly why
we talk so much about how technology is affecting our lives, relationships, communities,
and work.
Technology is an ever present part of our daily lives and the amount of time we spend
interacting with our personal technology devices is only increasing as we feel the need to
Page | 20
GEE- LIVING IN THE IT ERA
stay connected. As a result, it’s nearly impossible to prevent anyone (even our young
It’s our job as users to find the RIGHT ways to interact with technology. And to do this,
we need to understand the ways technology impacts to ourselves, and how to encourage
the right use of technology. The goal is for technology to have a positive effect on their
Technology, when used correctly, can actually have a very positive effect on a behavior
and social development. Studies have found that our ability to identify key information
buried within a cluster of characters and visual stimuli (advertisements) has increased as
technology has become more integrated in our lives. In addition, regular interfaces with
technology can lead to improved hand-eye coordination, multi-tasking, and reaction time.
However, when screen time is not properly controlled, there can be negative effects of
technology on anybody.
have an impact on growth. Although some technology exposure can be good, here are a
few different areas where a child could encounter difficulties as a result of too much
screen time.
CRITICAL THINKING
Not surprisingly, studies have shown that the increase of technology has led to a decrease
in daily reading. In addition, it’s been argued that because many blocks of text you
Page | 21
GEE- LIVING IN THE IT ERA
encounter on digital devices are written in 140 characters or less, people are not
To counteract this, and encourage critical thinking, be sure to set aside time every day
for reading where no electronics are present. Critical thinking can be developed through
conversation expansion, which is when you help others learn to build on conversations
Attention span development is affected by environmental factors. With the various forms
of technology available, people are often more distracted and less likely to focus on
Also, when there is a great deal of visual stimuli and a lack of story reading, this can
people have the opportunity to explore old-fashioned imaginative play and to let their
the effects that social media and the internet can have on people’s mental outlook, as
well as their privacy and safety. It is important to know what activities are they exploring
online as well as cultivate an open relationship where they feel comfortable discussing
Page | 22
GEE- LIVING IN THE IT ERA
People in these settings can often be exposed to various degrees of bullying, which can
have lasting impacts on a anybody’s social and emotional development as well as their
self-esteem.
important to give them the opportunity to practice conversational and social skills without
technology. People that are constantly using technology may be hesitant to interact with
other people in a social environment, which can have negative long-term effects.
Make sure that you have plenty of opportunities to practice in social settings by modeling
Here are a few important ideas to help limit the negative impacts of technology:
Be informed and involved in current digital trends you may come across.
Encourage using screen time for games or shows that are educational.
Encourage use of imagination and relationship building with others in real life.
We must make sure that social media does not dictate the expectations and rules
for ourselves
Technology is undoubtedly useful in our daily lives, but we all need to understand that
technology should be used as a learning tool, and should not substitute real world
interactions.
Page | 23
GEE- LIVING IN THE IT ERA
IT trends are developments in information technology, which quickly gain ground and
In the span of 59 years our computing power has improved by 1 trillion times. That’s
because new technology can become the foundation of other technologies. Those new
technologies could then become the basis for newer ones. And the cycle continues. As
months. That’s why the technological progress of the entire first century can’t be
compared to the progress over the last 10 years. Many trends had come, made an
However, there are some that simply persist a lot longer than others. A perfect example
of which is the internet. From ARPANET to the World Wide Web, it has come a very
long way. It became the foundation of so many other technological advancements and
Just like the internet, there are other technological developments that have persisted for
some time now; though not as old. But most of the time, they are quick to change.
1. Artificial Intelligence
Artificial Intelligence, hyped as it may be years ago, is still a growing trend. It has
already shown lots of functionalities that people 10 years ago would think are only
possible in sci-fi movies. It’s not, however, showing any sign of momentum halt at all.
Page | 24
GEE- LIVING IN THE IT ERA
New applications for personal, professional, and business purposes are being
discovered for AI every day. If it’s the future of AI we’re talking about, the perfect
It’s not a surprising turn of events, however. That’s because the very notion of machines
thinking and behaving like human beings are revolutionary. From the first AI program in
the 1950s, this field has come a long way. People of today are exposed to artificial
around the field. Robots uprising is perhaps the most popular concern regarding the
advancement of AI technologies. But there are more pressing issues than that such as
the dissolution of many jobs. Some experts claim that by 2030, over 73 million jobs
It’s not all bad news, however, since automation will create new jobs and welcome
various existing professions into its space. This includes developers, testers,
programmers, tech specialists, etc. A degree of retraining might be required for some
amazing speed and accuracy. Thus, a task that would require an expert to do in a few
hours can be done within seconds. And the result would be just as accurate, if not more.
Less prone to errors. Human error is one of the most commonplace types of errors
and AI solutions don’t suffer from that. They don’t experience lapses in focus, fatigue,
Page | 25
GEE- LIVING IN THE IT ERA
stress, and other issues that would lead to simple mistakes. They don’t have emotions
Able to work 24/7. Machines don’t get exhausted and thus, require no rest. Perhaps
one of the biggest advantages of AI over humans when doing a job. As long as they’re
machine at least. There is a lot of work that is both dangerous and complex. A simple
machine won’t know what to do and a person’s survival would be at risk when deployed.
operation.
industries will do fine. The smaller businesses, however, will have to wait for the prices
to go significantly down.
Machine dependency. AI is making our lives easier and thus, our dependency on
machine assistance is ever-growing. This will have repercussions over time. Whether
it’s our intelligence, our physical fitness, or mental capacity, AI is sure to whittle some of
them away.
Restricted. Sure AI applications are intelligent but they are still bound by the
parameters within their codes. They don’t have the imagination or creativity of a person
and they don’t grow with experience. They’re capable of storing loads of data and can
Page | 26
GEE- LIVING IN THE IT ERA
process at light speed. However, in the face of something new, they’re most likely to
Job loss. There is no shortage of repetitive and monotonous jobs out there which could
be automated. This means displacement for millions of people. If not for the high
2. Internet of Things
compilation. As of 2019, there are about 26 billion IoT devices installed around the
world. According to experts, that number will grow to a staggering 75.44 billion. This is
IoT is found practically anywhere in the modern world. By 2020 each person has an
average of 4 connected devices and 2030, we’d have 15 devices each. Thus, there’s no
surprise that IoT is the rage among huge businesses. In fact, according to some
So far, the IoT devices are mostly seen in smart homes in the form of connected lights,
smart fridge, etc. Wearable technologies such as smart glass and activity trackers are
also very popular applications of IoT technology. Furthermore, traffic and waste
management, urban safety monitoring, and water distribution are some of IoT
Security is the primary concern regarding this field. IoT users are will have to face the
threat of hacks, data breach, information leakage, and so on. The problem is that most
IoT devices aren’t equipped with security features right out of the box. So to make this
Page | 27
GEE- LIVING IN THE IT ERA
3. Cybersecurity
Cybersecurity is old news that never went out of trend, nor will it do. New types of cyber
threats are being discovered every day. The only things standing between our data and
malicious activities are IT security software, antivirus, and other cybersecurity defenses.
So long as the internet is used, threats are imminent and thus the cybersecurity industry
Big businesses might be the one bracing the most for cyber-attacks but in reality,
smaller businesses are at greater risk. That’s because according to Verizon, 61% of
data breaches are targeted towards companies with less than a thousand employees.
However, the threat doesn’t stop with businesses since practically anyone is exposed to
them. Cyber threats come in so many forms and the most common among them is
While cybersecurity has been a work in progress for decades now, it can still improve a
lot. For instance, the average time it takes for a data breach to be detected is half a
year. That’s a really long window and it could certainly benefit people and businesses if
Today new technological advancements for cybersecurity are emerging. For instance,
technologies to fight deepfakes and open source vulnerabilities are being developed.
zero-knowledge proofs.
Page | 28
GEE- LIVING IN THE IT ERA
1. Phishing
2. Ransomware
3. Cryptojacking
4. Cyber-Physical Attack
5. State-Sponsored Attacks
6. IoT Attacks
Cloud computing was first perceived as a major breakthrough and became the trend.
Until it was implemented and it became the norm. While the cloud still means someone
else’s computer, it does entail a plethora of benefits. This includes reliability, enhanced
disaster recovery, cost reduction, and collaboration to name a few. In fact, cloud
However, there are new technologies today in development that might just overthrow
the reign of cloud computing. Some address the drawbacks of cloud computing like
ongoing cost, security issues, and reliance on the internet. While some simply provide a
The first in our list of alternatives is edge computing. It’s the practice of bringing data
and computation closer to the location where it’s needed. This helps save data
bandwidth, increase the response time and is most useful for IoT devices. Instead of
Page | 29
GEE- LIVING IN THE IT ERA
sending data all the way to clouds or data centers, it is processed closer. This helps
The next one is fog computing. It’s built to bypass the issue with cloud computing not
able to process huge amount of data in time. With fog computing, every function –
storage, analysis, processing – are moved to the edge of the network. This is great for
Another one is named Project Solid which is an initiative brought by the inventor of the
web itself, Tim Berners-Lee. This method provides users with complete control over
their data by placing them into a container. The services would then allow you to access
the data when signing in. But, they lose it when the user signs out. In essence, it means
Mesh Networks. A service initiative that aims to provide everyone with the needed
Resilio. A cloud storage service which does not require servers. It follows the principle
of torrents where files are divided and shared in tiny pieces among each member.
LBRY. Combines the blockchain technology with the file-sharing property similar to
torrents. This is a great way of distributing videos without the complex RDM schemes.
5. 5G Network
5G networks are the next big thing in mobile internet connectivity. After almost a decade
unprecedented transmission speed that far surpasses its predecessor, 4G. And since
Page | 30
GEE- LIVING IN THE IT ERA
we’re talking gigabytes per second transfer rate, 5G is actually faster than virtually any
Although it’s not just a simple, though tremendous, upgrade in speed that 5G brings. It’s
also going to make leaps and bounds to the technology of the smart devices. What
were once only done through computers can now be done in smart devices as well.
Furthermore, IoT gadgets will be able to interconnect more smoothly. Also, things that
require complex operation are now achievable. This includes drones, autonomous cars,
The biggest drawback of 5G network is it’s still far from complete. It’s also available only
in certain countries and areas as of now. Moreover, the increase in bandwidth translates
into less coverage. That’s because a lot of cells must be built in order to support the
network’s ridiculous speed. More signal droppings are to be expected as of now too.
There are issues about its capability to penetrate walls and other materials as well.
But the most concerning of them all is that some claim that the network produces
radiofrequency radiation. It’s a big health hazard since it can damage cause cancer,
premature aging, DNA damages, disruption of cell metabolism, etc. This is due to the
power of the cellular towers that will empower 5G networks. The more powerful the cell
phone towers are; the more chance it will emit radiation to the environment.
By 2024, 5G networks will cover 40% of the globe. This is equal to 25% of
Page | 31
GEE- LIVING IN THE IT ERA
An average 5G network will support millions of devices per square miles. That’s a
big improvement from thousands of devices per square miles that 4G networks
support.
By 2035, 5G will make $12.3 trillion global economic output. It’ll also support 22
6. Virtual Reality
Virtual Reality (VR) immerses the user into an environment. By stimulating their hearing
and vision, it makes them feel as if they are experiencing the simulated environment
firsthand. The most popular application of Virtual Reality is on gaming, with PlayStation
Aside from games, VR is also used in other forms of entertainment. For instance, some
theme parks provide more immersed experience to their patrons through the VR. Some
applications aren’t for entertainment alone; it can also be used for education –
and theaters.
Another widespread application of Virtual Reality is training and simulation. This is done
in various fields such as in medicine for surgery and in aviation for flight simulation.
There are VR software, such as VirtualShip, that are used to train the US Army, Coast
While there are already good equipment and software for VR, the field hasn’t taken off
just yet. While it’s true that it has gained a lot of traction, there are still some issues
limiting the immersion experience. For one, most of the good hardware is expensive.
Also, at this point, you’re either tethered into a big clunky device or are using lite stand-
Page | 32
GEE- LIVING IN THE IT ERA
alone headsets. The former is expensive and limits movement while the latter has lower
graphical performance.
PTSD treatment
Pain management
Paraplegics therapy
Workplace collaboration
7. Augmented Reality
Many confuse Augmented Reality (AR) with Virtual Reality. They do have similarities but
they are, at their core, different. Augmented Reality enhances a real-life view with digital
images. This is commonly an app that works with camera lenses. Usually, the overlay
images blend into reality in a way that users can easily tell them apart. Some of the most
example, IKEA has an app that will let you see how furniture would look like in your room.
You can do this by first scanning or taking a picture of your place and then add the
furniture’s image. This way, without having to actually buy and assemble the furniture,
The AR technology has also been of great help to different sectors. In enhanced
navigation systems, AR is used to show route over a real-time view of the road. Some
Page | 33
GEE- LIVING IN THE IT ERA
surgery. In the military, pilots wear AR helmets to see vital statuses such as their speed
and altitude.
As with every technology, AR has some drawbacks associated with it. Perhaps the most
popular among them is the blurring of the line between the real and digital world. This
became controversial when accidents happened to many people playing Pokémon Go.
There are certain privacy concerns as well since AR is based on data collection and
redistribution. This means that there’s potential for information leakage and legal issues.
Education – $7 million
8. Chatbot
Due to the growth of machine learning, chatbots have become extremely popular for small
businesses and huge enterprises alike. Combine that with natural language processing
(NLP) and we got ourselves a more responsive, more intelligent, and more human
conversational agent. Typically, chatbots are used in customer service. It’s also one of
Page | 34
GEE- LIVING IN THE IT ERA
that definition alone, we could infer that this technology has a certain degree of
application. It’s no longer just a novelty and hyped technology but instead, it has reached
the stage of maturity. That, however, does not mean that it has no room for growth
Chatbots today are more AI-driven and are becoming human-like. They’re now more
suited to chat with customers as a representative of the company. Smart speakers, which
delivers voice experience, are also becoming a norm. Chatbots are being steadily
adopted by more businesses too. According to IBM, there are 265 billion customer
requests recorded that businesses spent $1.3 trillion to deal with. A chatbot is a big help
One of the biggest challenges in chatbot development is that it can only be as advanced
as NLP is. This conversational software will always be dependent on their part which
parses human language. Also, when used as customer service tool, clients might become
frustrated when the answers get repetitive or limiting. To top it off, chatbots with more
50% of big companies will be spending more on chatbots than mobile applications
Page | 35
GEE- LIVING IN THE IT ERA
9. Blockchain
Blockchain, in its most bare form, is a data which you can only add to. It’s like creating a
link of blocks to form a chain, hence the name. The fact that the previous blocks cannot
be altered is the central point of its security. Another main feature of blockchain is that no
single entity governs it. The technology is usually related to cryptocurrency such as
When it was first introduced, blockchain has attracted a lot of snake-oil salesmen. They’re
making use of get-rich-quick schemes to rake money out of less informed crowd. It got so
bad that regulators had to enter the scene. Scammers aside, however, many businesses
Blockchain is also becoming big in the field of Internet of Things. It turns out that the
technology is a good solution for providing security to IoT devices. It’s also making noises
in the financial sector, especially the big ones since it’s a potential disruptor to their
business. In this light, it’s more likely that the upstarts will be the ones to offer services
The emergence of this technology, however, does not signal the end of cryptocurrencies.
In fact, Bitcoin is still a big thing and there are other cryptocurrencies to watch out for.
This includes Tether, Ripple, and Ethereum who are all making their way to improve upon
Bitcoin.
Page | 36
GEE- LIVING IN THE IT ERA
Provides privacy
Latest technology trends in 2019 have picked up the momentum from the last few years
more applications and machines each day. IoT devices are becoming more and more
There are also game-changing technological trends for businesses. IT trends in business
will reshape the future of commerce and industries. Automation and digitization will make
a lot of changes in customer experience. Many jobs will become obsolete but a lot will
There are technologies that aren’t on their stable and mature stage yet. But still,
networks, blockchain, virtual reality, etc. A conclusion we could draw is that there is simply
Page | 37
GEE- LIVING IN THE IT ERA
IT is rife with opportunity and challenges. There are plenty of options to learn new and
exciting skills, and also to earn high salaries. But new technologies have disrupted the
industry, and IT staff and management aren’t always on the same page.
industries, banking sector and scientific research at a large level. With the leading
issues, privacy issues and main negative impacts of IT. To deal with these issues in IT
Some of the major ethical issues faced by Information Technology (IT) are:
1. Personal Privacy
2. Access Right
3. Harmful Actions
4. Patents
5. Copyright
6. Trade Secrets
7. Liability
8. Piracy
Page | 38
GEE- LIVING IN THE IT ERA
1. Personal Privacy:
having their own hardware, operating system and software tools to access the servers
that are connected to each other and to the users by a network. Due to the distribution of
the network on a large scale, data or information transfer in a big amount takes place
which leads to the hidden chances of disclosing information and violating the privacy of
individuals and provisions to protect the accuracy of data also comes in the privacy issue.
2. Access Right:
The second aspect of ethical issues in information technology is access right. Access
right becomes a high priority issue for the IT and cyberspace with the great advancement
heightened this issue for various corporate organizations and government agencies.
Network on the internet cannot be made secure from unauthorized access. Generally, the
appropriate user.
3. Harmful Actions:
Harmful actions in the computer ethics refers to the damage or negative consequences
conduct restricts any outsiders from the use of information technology in manner which
leads to any loss to any of the users, employees, employers and the general public.
Page | 39
GEE- LIVING IN THE IT ERA
Typically, these actions comprise of the intentional destruction or alteration of files and
program which drives a serious loss of resources. To recover from the harmful actions
extra time and efforts are required to remove the viruses from the computer systems.
4. Patents:
It is more difficult to deal with these types of ethical issues. A patent can preserve the
unique and secret aspect of an idea. Obtaining a patent is very difficult as compared with
obtaining a copyright. A thorough disclosure is required with the software. The patent
holder has to reveal the full details of a program to a proficient programmer for building a
program.
5. Copyright:
The information security specialists are to be familiar with necessary concept of the
copyright law. Copyright law works as a very powerful legal tool in protecting computer
software, both before a security breach and surely after a security breach. This type of
breach could be the mishandling and misuse of data, computer programs, documentation
6. Trade Secrets:
Trade secrets is also a significant ethical issue in information technology. A trade secret
secures something of value and usefulness. This law protects the private aspects of ideas
which is known only to the discover or his confidants. Once disclosed, trade secret is lost
as such and is only protected by the law for trade secrets. The application of trade secret
law is very broad in the computer range, where even a slight head start in the
Page | 40
GEE- LIVING IN THE IT ERA
7. Liability:
One should be aware of the liability issue in making ethical decisions. Software developer
makes promises and assertions to the user about the nature and quality of the product
legitimate to determine the express warranties. Thus they have to be practical when they
define any claims and predictions about the capacities, quality and nature of their software
or hardware. Every word they say about their product may be as legally valid as stated in
express warranties can free a supplier from being held responsible of informal,
8. Piracy:
Piracy is an activity in which the creation of illegal copy of the software is made. It is
entirely up to the owner of the software as to whether or not users can make backup
copies of their software. As laws made for copyright protection are evolving, also
software industry is prepared to do encounter against software piracy. The courts are
Page | 41
GEE- LIVING IN THE IT ERA
Privacy is a well-known subject for quite a few years and yet very few have a better
understanding fully. Privacy is an essential element for maintaining humanity and social
responsibilities and relationships. Humans value their privacy and protection of personal
data. Any individual does not want anyone to access their personal data at any time, but
recent developments in the technologies and competition among the corporate giants to
expand the market threaten the privacy of individuals than ever before. 21st century has
seen the world of Big Data and advanced information technology gave a new sphere to
access data and processing them at a very convenient phase. Many researchers stated
the worries that threaten privacy and security are now real that we have the capabilities
varies government agencies and for business firms having this data is a huge assets to
expand their market. Apart from all this the privacy remains the considerable point to be
discussed and redefine the policies agreements and ethics for a better place to live
(Santanen, 2019).
Privacy and latest technologies almost go hand in hand ranging from high tech
programs, Big Data and search engines. There are two receptions with wide spread of
technology and the impact on the privacy and personal information. The first one is all our
data is somehow held by IT industry which resembles that we have no privacy in the world
of technology where digital age has taken over and there is no alternative to protect our
Page | 42
GEE- LIVING IN THE IT ERA
privacy and get over it. The second one is that our personal information and privacy is
more important than ever(Hoven,2014). As technology has become a part of our life and
there is no secret that it got integrated to our lives. Privacy is an important element in the
society for the formation of the relationships by allowing us to know parts of our self to
family and friends withholding from the rest of the world. Varies study found that 91% of
adult’s own mobile phone or laptop and our personal information is stored in the devices
Privacy, trust and security are all very closed interlinked to form laws and ethics. The
measure privacy and security may vary from each individual and depend on various other
factors. Privacy in health department may have ethical values different to when compared
to financial sectors like banking. The trust relies on privacy safeguarding and security.
Ethics give us the measure of law allowing us to trade various data fairly. Breach in
privacy can lead us loose trust and diluting the security measures, which shows dishonor
to the law and violation of the ethical values.(lee & zankl, 2016)
Page | 43
GEE- LIVING IN THE IT ERA
The need of protecting data and personal information is of urgent importance and
complex. As way the technology has evolved in the last two decades the need for data
driven and information abundant corporate world. The positive side of this is we are
benefited with transparency in the market, where customers or consumers are well
informed about business models and trade opportunities and gives the opportunity for all
individuals to be aware of what is going around. The other side of this technology has a
deep scare which include socio-techno risk, evolved with technology and users (e.g.,
cyberterrorism, identity theft, warfare on information, online scams) and organized social
crime to exploit other personal information. So, the need for data protection is much
The essential need for protecting data of personal information is an important factor to
develop and execute various strategies to make sure that data privacy policies, guidelines
and set up standards which work efficiently with enhanced technologies to prevent threat
for data privacy. The policies or law regulations must be efficient, economically good,
ethical and should be accepted by all on all bases. This is very important as problems
evolve only after implementation of these polices or laws. Data privacy protection is so
complex and critical in today’s world with huge leap forward in the socio-techno changes
in the recent time to process and store large junks of data through internet usage. The
figure below shows the information privacy for various environments and are categorized
into three dimensions i.e. time dimension where computation of data for analyzing and
processing for market place. Matter dimension which has privacy and protection of data
such as web browsing to and from user to browser and social media data. And, the last
Page | 44
GEE- LIVING IN THE IT ERA
is the space dimension which deals with the data privacy of individual or group or an
organization.
Information technology is referred as automated systems for processing and storing huge
junks of data and circulating information. The quantity of processing and storing data has
increased rapidly along with the innovations in technology over the last decade. These
developments in technology has changed the digital world and now on the brisk of taking
over the privacy of an individual. As the connectivity and access of information increased,
also increases the risks of personal data breach, inequality in social life.
Page | 45
GEE- LIVING IN THE IT ERA
Social Media: As every day passes social media plays a major role in our lives and
been integral part in our daily activities. This made the privacy on social media has been
more important than ever and may have huge impact on our life on either way. Hacking
a social media account such as Facebook, twitter, Instagram may impersonate us and
may share valuable information. Online hackers or criminals targeting to breach personal
data to blackmail, spread virus, scams and much worse is identity theft. Stalking and
cyberbullying in the recent times has become a threat, and social media provides an easy
way for them to carry out. There is been a conflict serving the advertising customers and
the users of social media, and as a result we see privacy breach and collecting information
for marketing. Location-based services increase the threat on privacy and security. Well
governed regulations need to be put in place to secure user’s privacy. (Jan 2016)
Various activities on
social media
Big Data: when public uses internet they generate huge junks of data when surfing
online. This gives an insight of the user and apart from this provide voluminous statistical
data. Employing data mining gives us the patterns from the data, and this patterns are
Page | 46
GEE- LIVING IN THE IT ERA
used to determine about the user interests and behavior. Big data impact only online
users but, depending on the information shared to other third-party services it may impact
online users completely on different bases. It is a well-known fact that these companies
can know about the user than the people around them and this is a frightening thing in
privacy and security issues. The multinational companies dealing with big data has a huge
concern on data privacy on ethics and laws and regulations and companies may have
Design methods: providing a set of rules and regulations in the initial stage of the
design process keeping in mind certain ethics and values. ‘Privacy by Design’ approach
which focus on privacy which has seven principles guidelines for preserving the privacy
of the users (Cavoukian, 2010). In this approach privacy has been a proactive rather than
aftermath. This approach has made privacy as a centered stage in all phases from initial
Privacy enhancing Technologies: various tools are readily available for the users
and share content in the internet through unspecified means and number of cryptographic
techniques are used to provide the privacy and security for the user. Apart from this they
also have the other side where this Tor tool is suspicious to attack over the internet.
Various tools such as Freenet are also available but have the same downside as Tor
Page | 47
GEE- LIVING IN THE IT ERA
Cryptography: It has been used as a means of protecting data for a very long time.
performs the calculations on the data that is already encrypted without decrypting the
data in the first place. by doing so this provides a way more secure computing in cloud
Policies and ethics in identity management plays an important role in this world of
companies plays a key role in security plans and breach of data, as many organizations
provide access to the employees beyond their actual usage of the system. In that case
hackers or attackers can take advantage and threats like hacking, malware attacks could
occur. It plays critical role in any organization or individual by protecting assets and
Many researchers have agreed on two broad conclusions regarding one’s privacy. Firstly,
privacy is critical for preservation of human self-respect and secondly privacy plays a key
role in the society to maintain relationships which are the stepping stones of a happy and
relationships among people would take down side and difference among relationships
are hardly seen. There should be always given importance to privacy and security for
Page | 48
GEE- LIVING IN THE IT ERA
individuals and society should recognize it and various actions need to be taken to protect
it for the humanity to survive in the long run. Privacy is a nonrenewable entity, once
personal data is collected and exposed cannot be undone. They have been threats to
privacy throughout the existence of humanity but with the constant growth in the
technologies which has been part of life by now is the single largest threat that humanity
has ever faced. With increasing Capabilities and Processing power in technologies that
keeps a close watch on every single move and processing and recording most of the data
details of our lives to rapidly growing data related marketing. This data is processed,
analyzing the patterns and then sharing this data to anyone who are willing pay for the
data has been the greatest threat which has a potential harm to forever change the human
experience in the society. very little effort has been made to fill the vacuum in policies
related to privacy. we can argue that there is lot of potential and we should make serious
considerations how society address the loop holes in the policies by the technology to
provide a better place to live without the fear of insecurity (Santanen, 2019).
Page | 49
GEE- LIVING IN THE IT ERA
References
http://article.sapub.org/10.5923.j.ac.20140401.07.html
https://master-iesc-angers.com/impacts-of-information-technology-it/
https://www.zurich.ibm.com/pdf/news/Konsbruck.pdf
https://www.nap.edu/read/13427/chapter/2
https://erpinnews.com/impact-of-information-technology-on-society
https://tweakyourbiz.com/technology/8-major-impacts-of-information-technology-on-
businesses
https://www.britannica.com/technology/automation/Advantages-and-disadvantages-of-
automation
https://www.redhat.com/en/topics/automation/whats-it-automation
https://www.productiveflourishing.com/technology-and-culture-influence-each-other/
https://www.thetot.com/baby/the-impact-of-technology-on-behavior/
https://us.humankinetics.com/blogs/excerpt/technology-can-have-positive-and-negative-
impact-on-social-interactions
https://financesonline.com/it-trends/
https://www.geeksforgeeks.org/ethical-issues-in-information-technology-it/
https://medium.com/@venkatakrishna.jonnalagadda/the-value-of-protecting-privacy-
and-information-technology-e6818732afa3
Page | 50
GEE- LIVING IN THE IT ERA
(Volume 13), Berkeley, CA: USENIX Association, pp. 303–320 [Dingledine et al. 2004
Gentry, C., 2009, “Fully homomorphic encryption using ideal lattices”, in Proceedings of
the 41st annual ACM symposium on Theory of computing, ACM, pp. 169–178.
Jan 3, 2. U. (2018, January 24). Top Five Social Media Privacy Concerns. Retrieved
media-privacy-concerns
Lee, W. W., & Zankl, W. (2016). An Ethical Approach to Data Privacy Protection. ISACA
https://www.isaca.org/Journal/archives/2016/volume-6/Pages/an-ethical-approach-to-
data-privacy-protection.aspx.
https://www.sciencedirect.com/science/article/pii/S0007681318300661.
Van den Hoven, J., Blaauw, M., Pieters, W., & Warnier, M. (2014, November 20).
https://plato.stanford.edu/entries/it-privacy/
Page | 51