L.I.T.E. Chapter 5 I.T. Culture and The Society

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 105

Chapter 5: I.T.

, Culture, and the


Society
Living in the I.T. Era / MST 101d*
Engr. Michael R. Balagtas
Information
Technology
Information technology deals with all forms of
technology used to create, store, exchange, and use
information in its various forms like business data, voice
conversations, still images, motion pictures, photos,
multimedia presentations, and other forms, including
those not yet conceived. With technology growing at a
faster rate it will surely have a major impact on culture
and society.
Internet of
Things
(IoT)
Internet of things described
as network of physical objects
that are embedded with
sensors, software, and other
technologies for the purpose
of connecting and exchanging
data with other devices and
systems over the internet.
Timeline
of IoT
Kevin Ashton coins the term
John Romkey creates the first
“internet of things” to describe
IoT device: a toaster that he 1990 1999
the eyes and ears of a
controls with his computer
computer
LG introduces its first connected
The world’s first IoT conference
refrigerator with a $20,000 2000 2008
is held in Zurich, Switzerland
pricetag

Tony Fadell founds Nest, maker Oxford Dictionary adds the term
2010 2013
of the smart thermostat “internet of things”

Amazon introduces the Echo The Mirai botnet infects over


speaker, along with the Alexa 2014 2016 600,000 IoT devices with
voice assistant—a new way to malware
control the smart home

2020

The number of internet-connected devices, by some estimates,


exceeds 20 billion
Pros of IoT Cons of IoT
• ability to access information from • a hacker could steal confidential
anywhere at any time on any device; information also increases.

• improved communication between • Enterprises may eventually have to deal


connected electronic devices; with massive numbers -- maybe even millions
-- of IoT devices
• transferring data packets over a
connected network saving time and • If there's a bug in the system, it's likely that
money; and every connected device will become
corrupted.
• automating tasks helping to improve
the quality of a business's services and • Since there's no international standard of
reducing the need for human compatibility for IoT, it's difficult for devices
intervention. from different manufacturers to
communicate with each other.
CURRENT TRENDS IN
INFORMATION
TECHNOLOGY
01
CLOUD
COMPUTING
INTRODUCTION
• Cloud computing is the on
demand delivery of compute
power, database storage,
applications, and other IT
resources.
CLOUD COMPUTING
Through a cloud You can access as
services platform with many resources as you
pay-as-you-go pricing need, almost instantly

Simple way to access


You can provision servers, storage,
exactly the right type databases, and a set of
and size of computing application services
resources you need
EXAMPLES

CHATBOTS SOCIAL BACKUP AND


NETWORKING RECOVERY
• Alexa • Facebook • Dropbox
• Siri • LinkedIn • Google Drive
• Google Assistant • Twitter • Amazon S3
“Cloud computing is a great euphemism
for centralization of computer services
under one server.”

—EVGENY MOROZOV
02
MOBILE COMPUTING AND
APPLICATIONS
MOBILE COMPUTING
• is the technology used for
transmitting voice and data
through small, portable devices
using wireless enabled networks.
TYPES OF MOBILE COMPUTING
PORTABLE MOBILITY
COMPUTING COMPUTING
• Wireless
• Need wired
communication
connection
system
• Users have freedom
• Produces better
to move the devices
environment
but requires access
• Users can send any
to make connection
type of data from
with a network line.
one location to
another without
physical
connections.
EXAMPLES OF MOBILE COMPUTING

SMART PHONE iPAD

PERSONAL
NOTEBOOK
DIGITAL
COMPUTERS
ASSISTANT
SOCIAL MEDIA MOBILE UTILITY MOBILE APPS
APPS • Type of mobile apps that use often
• Common platform where people with without thinking about them as apps
common interests meet and converse • Many of them come pre-installed on
your device and serve as a single
function

facebook twitter
calculator flashlight

telegram instagram reminder weather


03

BIG DATA ANALYTICS


BIG DATA ANALYTICS
• Is the process of using software
to uncover trends, patterns and
any other useful insights in those
large stores of data.
4 types of Big Data Analytics
1. DESCRIPTIVE ANALYTICS 2. DIAGNOSTIC ANALYTICS

• Analyze the past and • Executes current data sets

determines what happens • Used to do analysis based on

and why incoming real-time data sets

• Helps to visualize this • Most of the systems like

analysis using any graphical business intelligence tools use

representation or some this analysis to create real-time

other format dashboards and reports


3. PREDICTIVE ANALYTICS 4. PRESCRIPTIVE ANALYTICS

• Prediction based analytics • Determines what actions needs to

• Works on a data set and be taken

determines what can be happened • Valuable analysis but not used


widely
• Analyses past data records to
• Most of the health care sectors used
provide future prediction
this analysis to manage their
business activities
04
AUTOMATION
AUTOMATION
• Another current trend in the IT industry
• Process of creating software and systems
to replace repeatable processes and
reduce manual intervention
• Accelerates the delivery of IT
infrastructures and applications by
automating manual processes that
previously required a human touch
EXAMPLES
• A vacuum cleaner might
ROBOTICS clean a room itself without
much need of direction or
instruction
• Machines that perform
MACHINE AUTOMATION repetitive labor such as
packaging peanuts
• A workflow engine that
WORKFLOW orchestrates a business
process by deciding how to
assign work to employees
based on data and business
rules
EXAMPLES
• A self-driving truck that
SELF-DRIVING VEHICLE makes long distance
deliveries without a driver
• A personal assistant that
BOT attempts to reschedule your
meetings when you are sick

• A self-service checkout
SELF-SERVICE counter at a supermarket
that performs functions
historically performed by a
cashier such as accepting
payment.
EMERGING TRENDS IN
INFORMATION
TECHNOLOGY
INTRODUCTION
• 21st century has been defined by
application of and advancement in
information technology.
Information technology has
become an integral part of our
daily life.

• Information technology has served


as a big change agent in different
aspect of business and society. It
has proven game changer in
resolving economic and social
issues.
01
What Is Artificial
Intelligence (AI)?
ARTIFICIAL INTELLIGENCE IS ALL ABOUT WHAT?

• It is the simulation of • The ideal characteristic of


human intelligence in artificial intelligence is its
machines that are ability to rationalize and
programmed to think like take actions that have the
humans and mimic their best chance of achieving a
actions. specific goal.

• AI is being used across


different industries • A subset of artificial
including finance and intelligence is machine
healthcare. learning, which refers to
• Weak AI tends to be simple the concept that computer
and single-task oriented, programs can automatically
while strong AI carries on learn from and adapt to
tasks that are more new data without being
complex and human-like. assisted by humans.
FOR EXAMPLE

SMART
SELF-DRIVING VIRTUAL TRAVEL
BOOKING AGENT ASSISTANT
CARS
• TESLA
• WAYMO • GOOGLE ASSISTANT
• AIRBNB
• VOYAGE • CORTANA
• EXPEDIA
• VOLVO • SIRI
• TRIPADVISOR
• GOOGLE NOW
• TRAVELOCITY
02
VIRTUAL REALITY
VR
WHAT IS VIRTUAL REALITY?
● Virtual Reality (VR) is the use of
computer technology to create a
simulated environment. Unlike
traditional user interfaces, VR
places the user inside an
experience.
● The definition of virtual reality
comes, naturally, from the
definitions for both ‘virtual’ and
‘reality’. The definition of ‘virtual’
is near and reality is what we
experience as human beings. So
the term ‘virtual reality’ basically
means ‘near-reality’. This could,
of course, mean anything but it
usually refers to a specific type of
reality emulation.
HOW IS VIRTUAL REALITY ACHIEVED?
• Virtual reality is usually
implemented using
computer technology. There
OUR SENSES AND are a range of systems that
PERCEPTION are used for this purpose,
such as headsets, omni-
• Our entire experience of reality is simply a directional treadmills and
combination of sensory information and our brains special gloves. These are
sense-making mechanisms for that information. used to actually stimulate
You would be presented with a version of reality our senses together in order
that isn’t really there, but from your perspective it to create the illusion of
would be perceived as real. Something we would reality.
refer to as a virtual reality.
FEATURES OF VIRTUAL REALITY SYSTEM
• It has the ability to allow • A virtual environment should
the person to view three- provide the appropriate
dimensional images. These responses – in real time- as
images appear life-sized to the person explores their
the person. surroundings.

• The environment of the


• The problems arise when
person using it change as
there is a delay between
the person moves around the person’s actions and
their environment which system response or
corresponds with the latency which then
change in their field of disrupts their experience.
vision
• This makes the person becomes aware that they are in an
artificial environment.
• Virtual reality is the creation of a virtual environment
presented to our senses in such a way that we experience
it as if we were really there.

• With this, we can expect to see many more innovative


uses for the technology in the future and perhaps a
fundamental way in which we communicate and work
thanks to the possibilities of virtual reality.
03
AUGMENTED REALITY
AUGMENTED REALITY
• Augmented Reality is a technology
that superimposes a computer-
generated image, video or 3D
model on a user’s view of the real
world. Augmented Reality employs
device cameras or sensors to map
and identify the external
environment.

• In Augmented Reality, the


computer uses sensors and
algorithms to determine the
position and orientation of a
camera.
HOW DOES IT WORK?
• It turns the environment around you into a
digital interface by placing virtual objects in the real
world, in real-time and can be seen through a wide
variety of experiences.

• The last way that Augmented Reality is generally


experienced is through gaming, creating immersive
gaming experiences that utilize your actual surroundings.
Imagine shooting games with zombies walking in your
own bedroom! The biggest use of Augmented Reality
gaming to-date is Pokémon Go, allowing users to catch
virtual Pokémon who are hidden throughout a map of
the real world
What is the difference Between Virtual
Reality and Augmented Reality?
• In Virtual Reality, the computer uses
• In Augmented Reality, the computer similar sensors and math. However,
uses sensors and algorithms to rather than locating a real camera
determine the position and within a physical environment, the
orientation of a camera. AR position of the user’s eyes are located
technology then renders the 3D within the simulated environment. If
graphics as they would appear from the user’s head turns, the graphics
the viewpoint of the camera, react accordingly. Rather than
superimposing the computer- compositing virtual objects and a real
generated images over a user’s view scene, VR technology creates a
of the real world. convincing, interactive world for the
user.
04
BLOCKCHAIN DATA
• A blockchain is a type of data store
that stores anything of digital
value. Each new transaction is
stored in a block that gets added to • The technology behind blockchain
a chain of existing records. A typical data stores and workflows has been
blockchain duplicates data across around since the 1990s. Bitcoin was
an open network so all parties in the first full blockchain
the blockchain see updates implementation. Created in 2008
simultaneously, and all updates are and released to open source in 2009,
validated through a public Bitcoin is a peer-to-peer digital asset
verification process that ensures and payment system with no single
accuracy without the need for a point of failure.
central authority, like a bank.
• Blockchain offered Bitcoin a fixed
• Earlier attempts to create a
set of mechanical rules so
digital currency system failed
transactions can take place
because digital transactions
between private users without
could be copied, allowing users
intermediaries. As Bitcoin rose to
to spend money more than
popularity, other digital
once. Bitcoin solved the double
currencies quickly followed with
spending problem with
blockchain implementations of
blockchain’s universal ledger
their own.
and confirmation processes.

Each new, successful implementation of the connected technology


has led others to take note, causing an explosion of interest in
block chain across industries and applications.
05
GROWTH OF INTERNET OF
THINGS
IoT
• The term is closely
identified with
• The Internet of
WHAT IS IoT? radio frequency
Things (IoT) is a identification
computing concept (RFID) as the
that describes the method of
idea of everyday communication,
physical objects although it also
being connected to may include other
the internet and sensor
being able to technologies,
identify themselves wireless
to other devices and technologies or QR
send and receive codes.
data.
IT’S SIGNIFICANCE

• The IoT is significant because an object that can represent


itself digitally becomes something greater than the object
by itself. No longer does the object relate just to its user,
but it is now connected to surrounding objects and
database data. When many objects act in unison, they are
known as having "ambient intelligence."
06
WHAT IS 5G?
WHAT IS 5G? • When today’s 4G long-term evolution
(LTE) mobile networks started rolling
What does 5G mean? out nearly a decade ago, consumers
welcomed a new era of rich media
mobile browsing. Representing both an
• Simply put, 5G is short for “5th evolution of the 4G standard and a
generation.” You may also see the revolution in radio technology, 5G
standard called 5G-NR (the NR technology promises to transform the
stands for “new radio”). If the 2020s into a time of unprecedented
earliest mobile network— analog
connectivity and technological
voice calls, no SMS, no mobile data
advancement. With higher capacity
or browsing—was the first
generation, 5G is its great-great-
and speed, plus ultralow latency, 5G
grandchild. will power innovation that would have
been impossible under the 4G LTE
standard.
Three Things To Know About 5G:
• 5G represents the first time • 5G is currently in the
a wireless network has earliest phase of
been created with more deployment, with
than phones in mind—with carriers rolling out
edge computing and the limited 5G availability
Internet of Things (IoT) through 2020 and
becoming vital to 5G from broader availability by
the start. the end of 2021.

Increased mobile network capacity and low latency from 5G will make new
applications possible, from 5G-enabled smart factories and cities to
constantly connected medical devices.
Analyzing how I.T.
influences culture and
social behaviour
I.T. and Culture
I guess the growth rate of technology
has put itself on a must have necessity
in our daily lives. A change on our
routine or how we live certainly does
change some part of the culture along
the way even our jobs, there’s no more
traditional way of finding jobs on a
news ad and even technology
dominates the industry.
I.T. and Social
Behaviour
Technology is a neutral thing; it can be
good or bad. A scientific review shows
that majority of the population spend
over 24 hours a week on their phones,
tablets and laptops.
Rules of Netiquette
Rule # 1
Remember the
human
When communicating electronically, whether through
email, instant message, discussion post, text, or some
other method, practice the Golden Rule: Do unto
others as you would have others do unto you.
Rule # 2
Adhere to the same
standards of behavior
online that you follow in
real life
While it can be argued that standards of
behavior may be different in the virtual world,
they certainly should not be lower.
Rule # 3
Know where you are in
cyberspace
Know where you are in cyberspace “Netiquette
varies from domain to domain.” (Shea, 1994)
Rule # 4
Respect other people’s
time and bandwidth
Electronic communication takes time: time to
read and time in which to respond. Most
people today lead busy lives, just like you do,
and don’t have time to read or respond to
frivolous emails or discussion posts.
Rule # 5
Make yourself look good
online
One of the best things about the virtual world
is the lack of judgment associated with your
physical appearance, sound of your voice, or
the clothes you wear (unless you post a video
of yourself singing Karaoke in a clown outfit.)
Rule # 6
Share expert knowledge
The internet offers its users many benefits; one
is the ease in which information can be shared
or accessed and in fact, this “information
sharing” capability is one of the reasons the
Internet was founded.
Rule # 7
Help keep flame wars
under control
What is meant by “flaming” and “flame wars?”
“Flaming is what people do when they express a
strongly held opinion without holding back any
emotion.” (Shea, 1994). As an example, think of the
kinds of passionate comments you might read on a
sports blog. While “flaming” is not necessarily
forbidden in virtual communication, “flame wars,”
when two or three people exchange angry posts
between one another, must be controlled or the
camaraderie of the group could be compromised.
Rule # 8
Respect other people’s
privacy
Depending on what you are reading in the
virtual world, be it an online class discussion
forum, Facebook page, or an email, you may be
exposed to some private or personal
information that needs to be handled with care.
Rule # 9
Don’t abuse your power
Just like in face-to-face situations, there are
people in cyberspace who have more “power”
than others. They have more expertise in
technology or they have years of experience in
a particular skill or subject matter.
Rule # 10
Be forgiving of other
people’s mistakes
Not everyone has the same amount of
experience working in the virtual world. And
not everyone knows the rules of netiquette. At
some point, you will see a stupid question, read
an unnecessarily long response, or encounter
misspelled words; when this happens, practice
kindness and forgiveness as you would hope
someone would do if you had committed the
same offense.
Prohibited learner conduct
includes,
but is not limited to the
following:
Illegal Activities:
• Learners may not post,
transmit, promote, or
distribute content that they
know is illegal or could
reasonably be expected to
know is illegal.
Theft:
• Learners may not post
transmit, promote, or
hedistribute content that
violates copyright or other
protected intellectual
property rights.
Disrespect:
• (This is the basis of
Netiquette!)Learners may not harass,
threaten, or embarrass others.
Learners may not post, transmit,
promote, or distribute content that is
racially, religiously, or ethnically
offensive or is harmful, abusive,
vulgar, sexually explicit, or otherwise
potentially offensive.
Dishonesty:
• Learners may not intentionally
provide false information, forge,
alter, or falsify documents. Learners
may not represent the academic
work of others as their own
Cyberbullying
- The use of electronic
communication to bully a person,
typically by sending messages of an
intimidating or threatening nature.
9 Ways to prevent
Cyberbullying
1.) Establish a climate of
communication with your child.
Every psychologist will tell you that one of the best
ways to help your child or student is by establishing a
‘climate’ of trust and communication.

It’s not enough to be ‘willing’ to talk with a child or


‘hope’ that they’ll come to you if they experience
bullying (of any kind). Ideally, there will be
communication patterns established where they
aren’t just likely to discuss this with you, but see you
as a resource and support system.
2.) Define it
Give them a formal definition of cyberbullying.
Give them examples – they might experience
using the online activities they’re most likely to
use.
3.) Give them strategies to
respond
Because the bullying is often done in front of
friends and peers, make sure the ‘strategy to
prevent cyberbullying’ has credibility with their
peers–that is, that allows them to ‘save face’ and
redirect the attention back to the bully. Ironically,
the wrong response could encourage more
bullying in the future.
4.) Use celebrity
card
Today, those role models are YouTubers and
video game streamers and athletes as often as
they are athletes, actors, musicians, and other
‘stars.’ And thankfully, many of these ‘role
models’ discuss bullying, advocate for victims,
and encourage each of us to create new social
norms where bullying isn’t just tolerated but is
shamed as a behavior..
5.) Monitor online
activity
Luckily, cyberbullying has one advantage or
‘traditional’ bullying: you can notice it and save
the evidence.

If moving offline completely isn’t an option, you


can install iPhone and Android phone monitoring
apps. These can allow monitoring social media
activity (including YouTube, TikTok, Facebook,
snapchat, and Instagram), the viewing of all text
messages (even deleted ones), call logs, and
general online behavior. You can even block and
control the child’s phone remotely.
6.) Know the apps and
platforms
Piggybacking on the above, it’s difficult to
prevent cyberbullying if you don’t understand
how the apps work and the most likely ways
trolls and others can affect your student or
child’s well-being. It would be difficult to help
students navigate bullying in a physical school if
you’d never seen or experienced yourself and
the same is true online.
7.) Engage parents and youth
Create a community for adults and pupils to send a
unified message against cyberbullying. Establish a
school safety committee that will control and
discuss the problems of online bullying. Just as
there are now laws in some states against
cyberbullying, teachers and administrators can
create policies and rules, including a cyberbullying
reporting system
8.) Emphasize positivity
School staff can do a big deal to prevent
cyberbullying. As a teacher, you can use staff
and parent meetings and even send
newsletters. Use your school website to create
a page and forum, where parents can discuss
the problem. You can also engage bullies and
victims by giving them mutual tasks, so they can
try to see each other from a different
perspective.
9.) Remember
the big idea
Remember that the ultimate goal is to protect
and restore the victim’s self-respect and
empower them with a mindset, tools, and
strategies to protect themselves online and
offline in the future.
THANKS!

Chapter 5:
CREDITS: This presentation template was
created by Slidesgo, including icons by Flaticon,
IT, Culture and the
infographics & images by Freepik Society
THANK YOU FOR ATTENDING
THE CLASS…

Engr. MICHAEL R. BALAGTAS

You might also like