Ict Chapter 5

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 50

IT, CULTURE, AND THE

SOCIETY
THE IMPACT OF IT ON THE SOCIETY
As previously discussed, the seven major trends for 2017 are as follows:
1. 10T and smart home technology
2. Augmented reality and virtual reality
3. Machine learning
4, Automation
5. Big data
6. Physical-digital integrations
7. Everything on demand
Majority of Organizations and companies nowadays have taken these trends into account, shifting
manual business processes to automated ones and using ICT to improve their products and
services. Among these seven trends, the internet of Things (IOT) and automation seem to have
greatly influenced present-day Culture and society; thus, it is imperative to discuss these thrusts in
detail.
Internet of Things (IOT)
Internet of Things (IOT) is a set-up of devices and objects which are
connected together in a given network. Their connection, often wirelessly, is
possible using both hardware and is often made up of sensors that collect
software.
The hardware part is often made up of sensor that collect data, which are
then sent to other devices for analysis and possible interruption. Popular
examples are health wearable devices such as step counters that are
connected to a mobile phone via Bluetooth. An app installed in the phone
records the results in a daily, weekly, or monthly basis for the mobile phone
user to keep track of his or her progress.
Capabilities of IOT
A major requirement for 10T is a strong internet connection, as all devices
must be able to communicate with one another for the upload and
download of needed data. But aside from connectivity, 10T should also be
capable of the following (Mattern & Floerkemeier):
1. Integration across technology and business
Sensors can be used to help improve business processes, such as machines
used for manufacturing and production, security systems, and even simple
ones like automatically turning on and Off a light switch' Obviously,
technology used for each application may vary' depending on the complexity
and use. Software used to interpret incoming data and sending commands to
that hardware must also be taken into account. Add to the different protocols
and standards used for connecting such as Wi-Fi, Bluetooth, etc. An IoT
platform must be capable of integrating all of these so that the data may be
used efficiently to improve productivity and even make predictions for
optimum system performance.
2. Data analysis and synchronization
IoT should be capable of providing analytics to help organizations in their
decision-making. However, for this to be effective, data must be
synchronized to allow integration with all of the business aspects, including
top management, operations, and even customer relations (Markkula,
2016).
3. Security and service
With all of these devices being used and all of these data being collected, a
major concern is obviously security. To improve security, IOT devices are
usually divided into networks and each network has a different network
access, some more restricted than others, without compromising connection
and system integration. A typical example is your mobile phone notifying you
if you will allow a new device to connect to it via Bluetooth. Normally, it will
ask for a pairing connection via a simple 'accept' or using a more secure line
such as a pin code.
Applications of IoT
With improved business processes and employee productivity, it is only
natural for organizations to adopt IOT. In a study conducted by IOT Analytics,
it was found that most of the 1,600 IOT projects are applied in cities (Scully,
2018).
Topping the list are as follows:
1. Smart cities
Smart cities have adopted 10T in traffic management, waste disposal, and even community monitoring for
the security of the city’s residents.
2. Connected industries
The oil and gas industry is identified as one of the front-runners for 10T connectivity which includes remote
access to heavy equipment and machinery, from manufacturing to production.
3. Connected buildings
Connected building projects involve facility-automation to reduce energy costs.
4. Connected cars
With smart cities adopting 10T for their traffic management, it is no longer surprising for the latest car
models to be equipped with sensors and network connectivity Majority of projects relating to smart vehicles
revolve around vehicle diagnostics and monitoring.
5. Smart energy
Majority of smart energy projects focus on developing smart grids for renewable energy and infrastructure.
Challenges of IOT
But while things may look good using IOT, there are issues raised in adopting it fully. Texas
Instruments, Inc. (2016) has identified six challenges in its implementation:
1. System requirements
Industries normally identify different requirements, especially depending on the type of industry they
belong to. Those in the food industry may require monitoring of perishable goods, from production
and packaging to shipping. An automobile manufacturer may have the same process, but since
products are different, requirements may also change. Food will require data regarding temperature
levels, whereas cars will require mechanical precision.
2. Connectivity
With the varying connections—wired and wireless as well as the different protocols governing each
connections, it will be a challenge to come up with an IoT project concerning such protocols.
3. Power requirements
IoT devices need to run on batteries as majority of these devices are mobile. The challenge, therefore,
is how to extend the battery life on such devices, especially those used in critical procedures, such as
health, disaster management, and safety.
4. Security
One of the most highlighted issues in the application of IoT is data Security. Confidential
information such as patients' records or employees' profiles are considered at risk. Security
also includes system integrity, with malicious acts such as hacking and viruses proliferating
online.
 
5. Development
The task of creating IoT projects may seem daunting, so one of the challenges identified is
how to expand the capabilities of developers, and not just experts, in order to create more
"smart things.'
6. Services
With data collected from IoT, it is important as well to determine where all this will go and
to identify the platform in which these IoT applications will be placed. Nowadays, cloud
services offer end-to-end solutions to a number of IoT projects.
AUTOMATION
Colloquially called "computerization," having an automated system means
automated business processes, operations, service provider, monitoring, and
even tools. With the use of computer systems—hardware, software, or both—
the typical cumbersome and error-prone procedures have become
automated.
Below are two of the common methods in implementing IT automation:
 Robotic Process Automation (RPA)
The Institute for Robotic Process Automation and Artificial Intelligence
(IRPAAI) defined robotic process automation (RPA) as "the application of
technology that allows employees in a company to configure computer
software or a "robot" to capture and interpret existing applications for
processing a transaction, manipulating data, triggering responses and
communicating with other digital systems" (Institute for Robotic Process
Automation & Artificial Intelligence, 2018, para. 3). While some may think
of "robots" similar to those seen in movies, RPA actually focuses on
computers being able to make logical decisions on the business process so
that their human counterparts can focus on other tasks, thus increasing
work productivity. This may not necessarily translate into hardware.
Application systems and software may also be considered as RPA as they
are applicable to the following:
• Process Automation
The use not only of industrial robots but also of "presentation-layer automation
software" is capable carrying out the daily operations of an organization.
Process automation may include finance systems such as payroll, customer
management systems such as online system registration, and academic
institutions offering online enrollment systems, among others.
A school that has a learning management system will be helpful for both the
students and the teacher, especially in submitting requirements such as a
homework research. The typical manual procedure for students submitting their
homework will be, to come to class, wait for the teacher, and submit their
papers personally. Automating the system requires the students to simply login
to their school website, open their individual account for the current semester,
search the subject they need access to, and upload their assignments at the
comfort of their homes.
• IT Support Management
Management of IT infrastructure and complex systems becomes easier using
RPA. If part of the system fails, an automated system can immediately send
notifications to the IT manager and technical support staff, informing them of
the problem. Large buildings, for example, employ an automated emergency
system, so if an emergency exit door has been opened, or a fire alarm goes off,
the system will automatically detect the exact location of the opened door or
activated alarm, as the location of the emergency will typically be assumed to
be near that point.
• Automated Assistants
Apple's Siri is an example of a voice recognition software used in RPAs. Instead
of machine language (binary), computers will be able to understand human
language and interact with the same. Another example for automated
assistants will be banks having an automated customer service hotline.
Customers call the bank, and instead of a human operator, automated
assistant will respond asking for details such as service choices, account
numbers Customers will use their phone's touch keys to enter choices and
numbers while the computer interprets them as input data. After processing, a
computer. Generated report, such as account balances and other information
will be provided.
 Sensors
Sensors are hardware devices that have the capability to measure an event,
object, or any physical quality that is happening. Examples include the heart rate
of a person while jogging, the temperature of a room, brightness of a light
source, and the like. Sensors have the capacity to connect to other devices that
can keep track of the data they are measuring. A mobile phone can be
connected to a heart rate sensor to record and monitor a person's health on a
weekly or monthly basis. A web application can be accessed to monitor and
control the CCTV operation of a house or building. These sensors can be
connected to a network, in various ways as explained earlier. However, there are
several types of sensors, and with technology made available today, almost all of
the hardware can now be automated.
Sensors can be classified as analog or digital, but below is a list of sensors used in
automation:
• Temperature sensor
This sensor is capable of measuring temperature as well as detecting its rise or fall. This is
helpful in systems that are temperature-sensitive such as power plants and server rooms.
• Infrared (IR) sensor
This sensor often used for security purposes detects infrared light. It is commonly used along
an infrared light source. You might have seen it in movies in which a villain trying to access a
restricted area would avoid crossing a series of IR sensors shown as beams of red lines. Breaking
or crossing the beam of red line would trigger an alarm.
• Ultrasonic sensor
An ultrasonic sensor detects sound waves, such as how radars and sonars pick up sounds. A
typical application is a light fixture turning on if the owner claps his or her hands, and turning off
once he or she claps again.
• Touch sensor
Through touch, the sensor activates itself and becomes capable of doing its function. The
latest versions of Samsung and Apple smartphones now have a one-touch login to access the
device, instead of a pin code or a pattern. Combining a touch sensor with biometrics, users can
now access the content of their phones with just a single touch on the home button.
• Proximity sensor
This sensor is able to detect objects within a certain range, even if the object is not physically
touching the Sensor yet. It is typically used in the light fixtures of houses and buildings. The
light turns on if it detects a person is close by. This helps save on electricity as well as secure
the premises.
• Pressure sensor
A pressure sensor helps determine the weight or impact of a certain object. It is normally used
by manufacturing companies, such as automobile companies, in designing their airbag system.
They need to create an airbag that is strong enough to cushion a driver upon a head-on
collision, but not too strong to injure him or her due to the recoil.
• Level sensor
This sensor can detect the level of liquids, fluids, grainy or granular materials,
such as powders, etc. Level sensors are used for disaster risk management
systems, such as a flood monitoring system. Level sensors are used to
determine if a flooded street will be passable by light vehicles or not.
• Smoke/Gas sensor
This sensor is used to detect the presence of dangerous fumes such as carbon
monoxide caused by fire. Smoke alarms show how this sensor works. With
these technologies made available, it is easy for big industries, small
companies, and even private individuals to use them. Besides, the design and
implementation of these technologies have become cheaper, much simpler,
and more manageable. Thus, the concern now is not how to use this
technology but the correct way of using it.
THE INFLUENCE OF IT ON
CULTURE AND SOCIAL BEHAVIOR
INFLUENCE ON CULTURE
Online Reviews
With the proliferation of online information, it is easy to find details on a
certain movie or a book. However, with sites such as Rotten Tomatoes, one
can actually make a decision on what movie to watch simply by reading the
"reviews" of other people. If the review is "good," then the person might
watch the movie. But if the review is "bad," then he or she might consider
other movies. This trend of having other people do the task first for others—
watching the full movie and informing people online if the film is worth
watching or not—is an example of how technology affects the basic human
behavior of decision-making.
Weblogging/Social Media
Nowadays, food bloggers post pictures of their meals in restaurants along
with a food review. This trend created a culture of people dining with friends
or family without actually interacting with them. People would first take
pictures of their meal and post it online. Others, during the course of the
meal, would even use their phones to update their online status instead of
talking to the other people in their group. This is one typical example of
technology, in the form of weblogging and social media, affecting social
interaction.
 YouTube Learners
YouTube is one of the most popular social media sites people can watch
videos, comment on them, and upload their own videos, among others. Thus,
YouTube serves as a source of videos with people searching for almost about
anything online—from trivial topics to more serious subject matter. This fact
influences the acquisition of knowledge and learning of certain skill sets.
Instead of reading books or listening to their teacher’s class lecture, students
would rather watch YouTube to learn the lesson. Again, this is another
situation in which technology affects the culture, this time, of learning.
INFLUENCE ON SOCIAL BEHAVIOR
• Cyberbullying
Behavioral choices especially of teenagers or adolescents are influenced by
technologies. Cyberbullying, for example, is a serious phenomenon brought
about by social media.
Cyberbullying is an unwanted, hostile behavior done by individuals to other
people in the hope of gaining control over them. Cyberbullies can be
classmates, neighbors, or officemates. Victims of bullying often end up with
personal traumas. And since the act of bullying is done online, the attackers
may also be individuals you do not know as they hide behind their internet
profiles.
Internet profile
also called an internet identity, online identity, Or internet persona, is a
profile created by internet users to establish their social identity in online
communities, social media sites, and other websites.
Cyberbullying comes in the form of messages or images, such as memes.
Since messages or images can be posted anonymously, it is hard and
oftentimes, difficult to trace the source. It becomes more problematic if the
message or image gets re-posted and distributed quickly online, or goes
"viral." Finding the original post might prove to be even harder.
Victims Of cyberbullying may experience the same trauma as a real-life
bullying victim. The difference, however, is that cyberbullying is on a much
larger scale. Defending oneself from this kind of attack is difficult as most of
the cyberbullies use internet personas which, as previously discussed, may
be real or not. Even their actual location may be difficult to trace.
The good news is that the society—communities and the government—are
devising ways to stop bullying — be it digital or otherwise. As discussed in the
previous chapter, the Philippines has identified several laws, including the Cyber
Crime Prevention Act, also known as R.A. 10175, to help catch cyber-bullies.
But, ultimately, in order to prevent cyberbullying from happening, individuals
especially the youth are encouraged to talk to their families and friends in case
they are experiencing such a situation online. Involving parents and teachers in
young individuals' social media activities such as adding them Facebook may
help, if not, stop cyberbullying as they can also see any untoward incidents
happening to these youngsters While online (Prevent Cyberbullying, 2017).
NETIQUETTE
Netiquette is a combination of the words internet and etiquette.
It describes how one should act online. Netiquette brings in
policies for all the features and qualities of the internet.
Including the use of the World Wide Web (WWW), email
services, File Transfer Protocol (FTP), chat rooms, and instant
messaging are different types of netiquette implemented all
over the world
 Netiquette for Social Media
The use of social media such as Facebook, Twitter, Instagram, LinkedIn, and
others is neither a bad habit nor a good habit in one's personal life. Using
social media is good for easy communication with friends and even long-lost
friends and relatives. But there are some netizens who use their social media
accounts to discredit other people by posting or shouting ruthless words
about a particular person or sharing a Status that maligns one's character or
reputation.
Some of the rules of netiquette for social media are as follows (Spira, 2010):
a. The Personalize IT Rule. Make Sure to put restrictions in accepting friends or
followers on your social media (e.g., Facebook, Twitter, Instagram, LinkedIn). It is
not about having the most number of followers or friends. What matters is who
you interact with and how you interact with them.
b The Off-limits Rule. Know your limitations when voicing out your opinions on
different subjects or topics concerning your school, religion, personal
information, workplace, and even some controversial subjects such as politics.
Knowing your limitations can save you from dire consequences later on.
c. The Tag — You're It Rule. Be careful in tagging someone either in your status
post or photos. You may also restrict someone from tagging you in their posts
and photos. Always think of your safety, as well as ' others' personal boundaries.
 Netiquette for Email Services, Chat Rooms, and Instant Messaging
Email services such as sending and receiving an email from someone
(professional to personal) anywhere in the world are used in numerous
contexts. Shown in the figure are some guidelines in composing an email.

 Netiquette for Chat Rooms and Instant Messaging


Joining chat rooms and sending instant messages, although mandatory in
social media, have become a trend for users. This is especially beneficial for
people working in different places such as a person working overseas while
his or her friend or relative is in the Philippines. Instead of spending for
telecom services, the person just needs internet connection.
Still, there are guidelines for using instant messaging applications. For instance, someone might
interrupt and request you to accept him or her or to be connected to your account without your
knowing who that person really is.
a. Think long and hard before accepting a private conversation, especially with someone not on
your friends list. Not everyone online may be as they seem to be.
b. In a group chat, include only those that are in your friends list.
c. If possible, do not give your personal information while chatting, including your photos or
"selfies."
d. When in doubt, save a copy or make a back-up of your conversation (chat).
e. You must log out from your account at all times, especially if you are in a public place, such as
a computer shop.
f. You may opt to customize your account settings from public to private account.
PROFESSIONAL ETHICS

While netiquette applies to all netizens, IT professionals specifically follow an


ethical practice as they are the front liners, support, and backend of ICT.
The Association of Computing Machinery (ACM) has identified 24
imperatives of professional conduct for IT professionals. It contains many,
but not all, issues IT professionals are likely to face while using, creating, and
implementing ICT.
Section I outlines the fundamental ethical considerations while Section 2
provides additional, more specific considerations of professional conduct.
Section 3 is intended specifically for individuals who have a leadership role,
whether in the workplace or in a volunteer capacity such as in organizations
like ACM. Principles involving compliance with this Code are laid out in
Section 4.
1. GENERAL MORAL IMPERATIVES
As an ACM member, I will....
1.1 Contribute to society and human well-being.
This principle concerning the quality Of life of all people affirms an
obligation to protect fundamental human rights and to respect the diversity
of all cultures. An essential aim of computing professionals is to minimize
negative consequences of computing systems, including threats to health
and safety. When designing or implementing systems, computing
professionals must attempt to ensure that the products of their efforts will
be used in socially responsible ways, will meet social needs, and will avoid
harmful effects on health and welfare.
1.2 Avoid harm to others.
"Harm" means injury or negative consequences such as undesirable loss of
information, loss of property, property damage, or unwanted environmental
impacts. This principle prohibits use of computing technology in ways that result in
harm to any of the following: users, the general public, employees, and employers.
Harmful actions include intentional destruction or modification of files and
programs leading to serious loss of resources or unnecessary expenditure of human
resources such as the time and effort required to purge systems of "computer
viruses."
Well-intended actions, including those that accomplish assigned duties, may
lead to harm unexpectedly. In such an event, the responsible person or persons are
obligated to undo or mitigate the negative consequences as much as possible. One
way to avoid unintentional harm is to carefully consider potential impacts on all
those affected by decisions made during design and implementation.
1.3 Be honest and trustworthy.
Honesty is an essential component of trust. Without trust an organization
cannot function effectively. The honest computing professional will not make
deliberately false or deceptive claims about a system or system design, but will
instead provide full disclosure of all pertinent system limitations and problems.
A computer professional has a duty to be honest about his or her own
qualifications, and about any circumstances that might lead to conflicts Of
interest.
Membership in volunteer organizations such as ACM may at times place
individuals in situations where their statements or actions could be interpreted
as carrying the "weight" of a larger group of professionals. An ACM member will
exercise care to not misrepresent ACM or positions and policies of ACM Or any
ACM units.
1.4 Be fair and take action not to discriminate.
The values of equality, tolerance, respect for others, and the principles of
equal justice govern this imperative. Discrimination on the basis of race, sex
religion, age, disability, national origin, or other such factors is an explicit
violation of ACM policy and will not be tolerated. Inequities between different
groups of people may result from the use or misuse of information and
technology. In a fair society, all individuals would have equal opportunity to
participate in, or benefit from, the use of computer resources regardless of
race, sex, religion, age, disability, national origin, or other such similar factors.
However, these ideals do not justify unauthorized use of computer resources
nor do they provide an adequate basis for violation of any other ethical
imperatives of this code.
I .5 Honor property rights including copyrights and patent.
Violation of copyrights, patents, trade secrets, and the terms of license
agreements is prohibited by law in most circumstances. Even when software
is not so protected, such violations are contrary to professional behavior.
Copies of software should be made only with proper authorization.
Unauthorized duplication of materials must not be condoned.

I .6 Give proper credit for intellectual property.


Computing professionals are obligated to protect the integrity of
intellectual property. Specifically, one must not take credit for Other's ideas
or work, even in cases where the work has not been explicitly protected by
copyright, patent, etc.
1.7 Respect the privacy of others.
Computing and communication technology enables the collection and
exchange of personal information on a scale unprecedented in the history of
civilization. Thus, there is increased potential for violating the privacy of
individuals and groups. It is the responsibility of professionals to maintain the
privacy and integrity of data describing individuals. This includes taking
precautions to ensure the accuracy of data, as well as protecting it from
unauthorized access or accidental disclosure to inappropriate individuals.
Furthermore, procedures must be established to allow individuals to review
their records and correct inaccuracies.
1.8 Honor confidentiality
The principle of honesty extends to issues of confidentiality of
information whenever one has made an explicit promise to honor
confidentiality or, implicitly, when private information not directly related to
the performance of one's duties becomes available. The ethical concern is
to respect all obligations of confidentiality to employers, clients, and users
unless discharged from such obligations by requirements of the law or
other principles of this
2. MORE SPECIFIC PROFESSIONAL RESPONSIBILITIES
As an ACM computing professional, I will....
2.1 Strive to achieve the highest quality, effectiveness and dignity in both the process and
products of professional work.
Excellence is perhaps the most important obligation of a professional. The computing
professional must strive to achieve quality and to be cognizant of the serious negative
consequences that may result from poor quality in a system.
2.2 Acquire and maintain professional competence
Excellence depends on individuals who take responsibility for acquiring and maintaining
professional competence. A professional must participate in setting standards for appropriate levels
of competence, and strive to achieve those standards. Upgrading technical knowledge and
competence can be achieved in several ways: doing independent study; attending seminars,
conferences, or courses; and being involved in professional organizations.
2.3 Know and respect existing laws pertaining to professional work.
ACM members must obey existing local, state, provincial, national, and international
laws unless there is a compelling ethical basis not to do so. Policies and procedures of
the organizations in which one participates must also be obeyed. But compliance must
be balanced with the recognition that sometimes existing laws and rules may be
immoral or inappropriate and, therefore, must be challenged. Violation of a law or
regulation may be ethical when that law or rule has inadequate moral basis or when it
conflicts with another law judged to be more important. If one decides to violate a law
or rule because it is viewed as unethical, or for any other reason, one must fully accept
responsibility for one's actions and for the consequences.
2.4 Accept and provide appropriate professional review.
Quality professional work, especially in the computing profession, depends on
professional reviewing and critiquing. Whenever appropriate, individual members
should seek and utilize peer review as well as provide critical review of the Work of
others.
2.5 Give comprehensive and thorough evaluations of computer systems
and their impacts, including analysis of possible risks.

2.6 Honor contracts, agreements, and responsibilities.

2.7 Improve public understanding of computing and its consequences.


Computing professionals have a responsibility to share technical
knowledge with the public by encouraging understanding of computing,
including the impacts of computer systems and their limitations. This
imperative implies an obligation to counter any false views related to
computing.
2.8 Access computing and communication resources only when
authorized to do so.
Theft or destruction of tangible and electronic property is prohibited by
imperative harm to others." Trespassing and unauthorized use of a
computer or communication system is addressed by this imperative.
Trespassing includes accessing communication networks and computer
systems, or accounts and/or files associated with those systems, without
explicit authorization to do so.
3. ORGANIZATIONAL LEADERSHIP IMPERATIVES
As an ACM member and an organizational leader, I will....
3.1 Articulate social responsibilities of members of an organizational unit and encourage
full acceptance of those responsibilities.
3.2 Manage personnel and resources to design and build information systems that
enhance the quality of working life.
3.3 Acknowledge and support proper and authorized uses of an organization's
computing and communication resources.
3.4 Ensure that users and those who will be affected by a system have their needs
clearly articulated during the assessment and design of requirements; later, the system must
be validated to meet requirements. Current system users, potential users, and other persons
whose lives may be affected by a system must have their needs assessed and incorporated in
the Statement of requirements. System validation should ensure compliance with those
requirements.
3.5 Articulate and support policies that protect the dignity of users and
others affected by a computing system.
Designing or implementing systems that deliberately or inadvertently
demean individuals Or groups is ethically unacceptable. Computer
professionals who are in decision-making positions should verify that systems
are designed and implemented to protect personal privacy and enhance
personal dignity.
3.6 Create opportunities for members of the organization to learn the
principles and limitations of computer systems.
4. COMPLIANCE WITH THE CODE
As an ACM member, I will .
4.1 Uphold and promote the principles of this Code.
The future of the computing profession depends on both technical and
ethical excellence. Not only is it important for ACM computing professionals
to adhere to the principles expressed in this Code, each member should
encourage and support adherence by other members.
4.2 Treat violations of this code as inconsistent with membership in ACM.
This Code and the supplemental Guidelines were developed by the Task
Force for the Revision of the ACM Code of Ethics and Professional Conduct:
Ronald E. Anderson, Chair, Gerald Engel, Donald Gotterbarn, Grace C.
Hertlein, Alex Hoffman, Bruce Jawer, Deborah G. Johnson, Doris K. Lidtke,
Joyce Currie Little, Dianne Martin, Donn B. Parker, Judith A. Perrolle, and
Richard S. Rosenberg. The Task Force was organized by ACM/SIGCAS and
funding was provided by the ACM SIG Discretionary Fund. This Code and the
supplemental Guidelines were adopted by the ACM Council on October 16,
1992.
This Code may be published without permission as long as it is not
changed in any way and it carries the copyright notice. s
Copyright 1997, Association for Computing Machinery, Inc.

You might also like