Ict Chapter 5
Ict Chapter 5
Ict Chapter 5
SOCIETY
THE IMPACT OF IT ON THE SOCIETY
As previously discussed, the seven major trends for 2017 are as follows:
1. 10T and smart home technology
2. Augmented reality and virtual reality
3. Machine learning
4, Automation
5. Big data
6. Physical-digital integrations
7. Everything on demand
Majority of Organizations and companies nowadays have taken these trends into account, shifting
manual business processes to automated ones and using ICT to improve their products and
services. Among these seven trends, the internet of Things (IOT) and automation seem to have
greatly influenced present-day Culture and society; thus, it is imperative to discuss these thrusts in
detail.
Internet of Things (IOT)
Internet of Things (IOT) is a set-up of devices and objects which are
connected together in a given network. Their connection, often wirelessly, is
possible using both hardware and is often made up of sensors that collect
software.
The hardware part is often made up of sensor that collect data, which are
then sent to other devices for analysis and possible interruption. Popular
examples are health wearable devices such as step counters that are
connected to a mobile phone via Bluetooth. An app installed in the phone
records the results in a daily, weekly, or monthly basis for the mobile phone
user to keep track of his or her progress.
Capabilities of IOT
A major requirement for 10T is a strong internet connection, as all devices
must be able to communicate with one another for the upload and
download of needed data. But aside from connectivity, 10T should also be
capable of the following (Mattern & Floerkemeier):
1. Integration across technology and business
Sensors can be used to help improve business processes, such as machines
used for manufacturing and production, security systems, and even simple
ones like automatically turning on and Off a light switch' Obviously,
technology used for each application may vary' depending on the complexity
and use. Software used to interpret incoming data and sending commands to
that hardware must also be taken into account. Add to the different protocols
and standards used for connecting such as Wi-Fi, Bluetooth, etc. An IoT
platform must be capable of integrating all of these so that the data may be
used efficiently to improve productivity and even make predictions for
optimum system performance.
2. Data analysis and synchronization
IoT should be capable of providing analytics to help organizations in their
decision-making. However, for this to be effective, data must be
synchronized to allow integration with all of the business aspects, including
top management, operations, and even customer relations (Markkula,
2016).
3. Security and service
With all of these devices being used and all of these data being collected, a
major concern is obviously security. To improve security, IOT devices are
usually divided into networks and each network has a different network
access, some more restricted than others, without compromising connection
and system integration. A typical example is your mobile phone notifying you
if you will allow a new device to connect to it via Bluetooth. Normally, it will
ask for a pairing connection via a simple 'accept' or using a more secure line
such as a pin code.
Applications of IoT
With improved business processes and employee productivity, it is only
natural for organizations to adopt IOT. In a study conducted by IOT Analytics,
it was found that most of the 1,600 IOT projects are applied in cities (Scully,
2018).
Topping the list are as follows:
1. Smart cities
Smart cities have adopted 10T in traffic management, waste disposal, and even community monitoring for
the security of the city’s residents.
2. Connected industries
The oil and gas industry is identified as one of the front-runners for 10T connectivity which includes remote
access to heavy equipment and machinery, from manufacturing to production.
3. Connected buildings
Connected building projects involve facility-automation to reduce energy costs.
4. Connected cars
With smart cities adopting 10T for their traffic management, it is no longer surprising for the latest car
models to be equipped with sensors and network connectivity Majority of projects relating to smart vehicles
revolve around vehicle diagnostics and monitoring.
5. Smart energy
Majority of smart energy projects focus on developing smart grids for renewable energy and infrastructure.
Challenges of IOT
But while things may look good using IOT, there are issues raised in adopting it fully. Texas
Instruments, Inc. (2016) has identified six challenges in its implementation:
1. System requirements
Industries normally identify different requirements, especially depending on the type of industry they
belong to. Those in the food industry may require monitoring of perishable goods, from production
and packaging to shipping. An automobile manufacturer may have the same process, but since
products are different, requirements may also change. Food will require data regarding temperature
levels, whereas cars will require mechanical precision.
2. Connectivity
With the varying connections—wired and wireless as well as the different protocols governing each
connections, it will be a challenge to come up with an IoT project concerning such protocols.
3. Power requirements
IoT devices need to run on batteries as majority of these devices are mobile. The challenge, therefore,
is how to extend the battery life on such devices, especially those used in critical procedures, such as
health, disaster management, and safety.
4. Security
One of the most highlighted issues in the application of IoT is data Security. Confidential
information such as patients' records or employees' profiles are considered at risk. Security
also includes system integrity, with malicious acts such as hacking and viruses proliferating
online.
5. Development
The task of creating IoT projects may seem daunting, so one of the challenges identified is
how to expand the capabilities of developers, and not just experts, in order to create more
"smart things.'
6. Services
With data collected from IoT, it is important as well to determine where all this will go and
to identify the platform in which these IoT applications will be placed. Nowadays, cloud
services offer end-to-end solutions to a number of IoT projects.
AUTOMATION
Colloquially called "computerization," having an automated system means
automated business processes, operations, service provider, monitoring, and
even tools. With the use of computer systems—hardware, software, or both—
the typical cumbersome and error-prone procedures have become
automated.
Below are two of the common methods in implementing IT automation:
Robotic Process Automation (RPA)
The Institute for Robotic Process Automation and Artificial Intelligence
(IRPAAI) defined robotic process automation (RPA) as "the application of
technology that allows employees in a company to configure computer
software or a "robot" to capture and interpret existing applications for
processing a transaction, manipulating data, triggering responses and
communicating with other digital systems" (Institute for Robotic Process
Automation & Artificial Intelligence, 2018, para. 3). While some may think
of "robots" similar to those seen in movies, RPA actually focuses on
computers being able to make logical decisions on the business process so
that their human counterparts can focus on other tasks, thus increasing
work productivity. This may not necessarily translate into hardware.
Application systems and software may also be considered as RPA as they
are applicable to the following:
• Process Automation
The use not only of industrial robots but also of "presentation-layer automation
software" is capable carrying out the daily operations of an organization.
Process automation may include finance systems such as payroll, customer
management systems such as online system registration, and academic
institutions offering online enrollment systems, among others.
A school that has a learning management system will be helpful for both the
students and the teacher, especially in submitting requirements such as a
homework research. The typical manual procedure for students submitting their
homework will be, to come to class, wait for the teacher, and submit their
papers personally. Automating the system requires the students to simply login
to their school website, open their individual account for the current semester,
search the subject they need access to, and upload their assignments at the
comfort of their homes.
• IT Support Management
Management of IT infrastructure and complex systems becomes easier using
RPA. If part of the system fails, an automated system can immediately send
notifications to the IT manager and technical support staff, informing them of
the problem. Large buildings, for example, employ an automated emergency
system, so if an emergency exit door has been opened, or a fire alarm goes off,
the system will automatically detect the exact location of the opened door or
activated alarm, as the location of the emergency will typically be assumed to
be near that point.
• Automated Assistants
Apple's Siri is an example of a voice recognition software used in RPAs. Instead
of machine language (binary), computers will be able to understand human
language and interact with the same. Another example for automated
assistants will be banks having an automated customer service hotline.
Customers call the bank, and instead of a human operator, automated
assistant will respond asking for details such as service choices, account
numbers Customers will use their phone's touch keys to enter choices and
numbers while the computer interprets them as input data. After processing, a
computer. Generated report, such as account balances and other information
will be provided.
Sensors
Sensors are hardware devices that have the capability to measure an event,
object, or any physical quality that is happening. Examples include the heart rate
of a person while jogging, the temperature of a room, brightness of a light
source, and the like. Sensors have the capacity to connect to other devices that
can keep track of the data they are measuring. A mobile phone can be
connected to a heart rate sensor to record and monitor a person's health on a
weekly or monthly basis. A web application can be accessed to monitor and
control the CCTV operation of a house or building. These sensors can be
connected to a network, in various ways as explained earlier. However, there are
several types of sensors, and with technology made available today, almost all of
the hardware can now be automated.
Sensors can be classified as analog or digital, but below is a list of sensors used in
automation:
• Temperature sensor
This sensor is capable of measuring temperature as well as detecting its rise or fall. This is
helpful in systems that are temperature-sensitive such as power plants and server rooms.
• Infrared (IR) sensor
This sensor often used for security purposes detects infrared light. It is commonly used along
an infrared light source. You might have seen it in movies in which a villain trying to access a
restricted area would avoid crossing a series of IR sensors shown as beams of red lines. Breaking
or crossing the beam of red line would trigger an alarm.
• Ultrasonic sensor
An ultrasonic sensor detects sound waves, such as how radars and sonars pick up sounds. A
typical application is a light fixture turning on if the owner claps his or her hands, and turning off
once he or she claps again.
• Touch sensor
Through touch, the sensor activates itself and becomes capable of doing its function. The
latest versions of Samsung and Apple smartphones now have a one-touch login to access the
device, instead of a pin code or a pattern. Combining a touch sensor with biometrics, users can
now access the content of their phones with just a single touch on the home button.
• Proximity sensor
This sensor is able to detect objects within a certain range, even if the object is not physically
touching the Sensor yet. It is typically used in the light fixtures of houses and buildings. The
light turns on if it detects a person is close by. This helps save on electricity as well as secure
the premises.
• Pressure sensor
A pressure sensor helps determine the weight or impact of a certain object. It is normally used
by manufacturing companies, such as automobile companies, in designing their airbag system.
They need to create an airbag that is strong enough to cushion a driver upon a head-on
collision, but not too strong to injure him or her due to the recoil.
• Level sensor
This sensor can detect the level of liquids, fluids, grainy or granular materials,
such as powders, etc. Level sensors are used for disaster risk management
systems, such as a flood monitoring system. Level sensors are used to
determine if a flooded street will be passable by light vehicles or not.
• Smoke/Gas sensor
This sensor is used to detect the presence of dangerous fumes such as carbon
monoxide caused by fire. Smoke alarms show how this sensor works. With
these technologies made available, it is easy for big industries, small
companies, and even private individuals to use them. Besides, the design and
implementation of these technologies have become cheaper, much simpler,
and more manageable. Thus, the concern now is not how to use this
technology but the correct way of using it.
THE INFLUENCE OF IT ON
CULTURE AND SOCIAL BEHAVIOR
INFLUENCE ON CULTURE
Online Reviews
With the proliferation of online information, it is easy to find details on a
certain movie or a book. However, with sites such as Rotten Tomatoes, one
can actually make a decision on what movie to watch simply by reading the
"reviews" of other people. If the review is "good," then the person might
watch the movie. But if the review is "bad," then he or she might consider
other movies. This trend of having other people do the task first for others—
watching the full movie and informing people online if the film is worth
watching or not—is an example of how technology affects the basic human
behavior of decision-making.
Weblogging/Social Media
Nowadays, food bloggers post pictures of their meals in restaurants along
with a food review. This trend created a culture of people dining with friends
or family without actually interacting with them. People would first take
pictures of their meal and post it online. Others, during the course of the
meal, would even use their phones to update their online status instead of
talking to the other people in their group. This is one typical example of
technology, in the form of weblogging and social media, affecting social
interaction.
YouTube Learners
YouTube is one of the most popular social media sites people can watch
videos, comment on them, and upload their own videos, among others. Thus,
YouTube serves as a source of videos with people searching for almost about
anything online—from trivial topics to more serious subject matter. This fact
influences the acquisition of knowledge and learning of certain skill sets.
Instead of reading books or listening to their teacher’s class lecture, students
would rather watch YouTube to learn the lesson. Again, this is another
situation in which technology affects the culture, this time, of learning.
INFLUENCE ON SOCIAL BEHAVIOR
• Cyberbullying
Behavioral choices especially of teenagers or adolescents are influenced by
technologies. Cyberbullying, for example, is a serious phenomenon brought
about by social media.
Cyberbullying is an unwanted, hostile behavior done by individuals to other
people in the hope of gaining control over them. Cyberbullies can be
classmates, neighbors, or officemates. Victims of bullying often end up with
personal traumas. And since the act of bullying is done online, the attackers
may also be individuals you do not know as they hide behind their internet
profiles.
Internet profile
also called an internet identity, online identity, Or internet persona, is a
profile created by internet users to establish their social identity in online
communities, social media sites, and other websites.
Cyberbullying comes in the form of messages or images, such as memes.
Since messages or images can be posted anonymously, it is hard and
oftentimes, difficult to trace the source. It becomes more problematic if the
message or image gets re-posted and distributed quickly online, or goes
"viral." Finding the original post might prove to be even harder.
Victims Of cyberbullying may experience the same trauma as a real-life
bullying victim. The difference, however, is that cyberbullying is on a much
larger scale. Defending oneself from this kind of attack is difficult as most of
the cyberbullies use internet personas which, as previously discussed, may
be real or not. Even their actual location may be difficult to trace.
The good news is that the society—communities and the government—are
devising ways to stop bullying — be it digital or otherwise. As discussed in the
previous chapter, the Philippines has identified several laws, including the Cyber
Crime Prevention Act, also known as R.A. 10175, to help catch cyber-bullies.
But, ultimately, in order to prevent cyberbullying from happening, individuals
especially the youth are encouraged to talk to their families and friends in case
they are experiencing such a situation online. Involving parents and teachers in
young individuals' social media activities such as adding them Facebook may
help, if not, stop cyberbullying as they can also see any untoward incidents
happening to these youngsters While online (Prevent Cyberbullying, 2017).
NETIQUETTE
Netiquette is a combination of the words internet and etiquette.
It describes how one should act online. Netiquette brings in
policies for all the features and qualities of the internet.
Including the use of the World Wide Web (WWW), email
services, File Transfer Protocol (FTP), chat rooms, and instant
messaging are different types of netiquette implemented all
over the world
Netiquette for Social Media
The use of social media such as Facebook, Twitter, Instagram, LinkedIn, and
others is neither a bad habit nor a good habit in one's personal life. Using
social media is good for easy communication with friends and even long-lost
friends and relatives. But there are some netizens who use their social media
accounts to discredit other people by posting or shouting ruthless words
about a particular person or sharing a Status that maligns one's character or
reputation.
Some of the rules of netiquette for social media are as follows (Spira, 2010):
a. The Personalize IT Rule. Make Sure to put restrictions in accepting friends or
followers on your social media (e.g., Facebook, Twitter, Instagram, LinkedIn). It is
not about having the most number of followers or friends. What matters is who
you interact with and how you interact with them.
b The Off-limits Rule. Know your limitations when voicing out your opinions on
different subjects or topics concerning your school, religion, personal
information, workplace, and even some controversial subjects such as politics.
Knowing your limitations can save you from dire consequences later on.
c. The Tag — You're It Rule. Be careful in tagging someone either in your status
post or photos. You may also restrict someone from tagging you in their posts
and photos. Always think of your safety, as well as ' others' personal boundaries.
Netiquette for Email Services, Chat Rooms, and Instant Messaging
Email services such as sending and receiving an email from someone
(professional to personal) anywhere in the world are used in numerous
contexts. Shown in the figure are some guidelines in composing an email.