Uploaded by Archer Knight

IT FINAL.docx

advertisement
CHAPTER 3: The Internet and World Wide Web
The Internet
•
The internet (capitalized as in Internet when it first came into widespread use) is defined as a worldwide
network connecting to a million of computers via dedicated routers and servers.
•
When computers are connected to the internet, end-users could start sending and receiving different types
of information.
•
These types of information can be sent and received via electronic mails (emails), text or video chats
and/or conferencing, and computer programs, among others.
•
Now, most telephone companies all over the world also function as internet service providers.
•
In the Philippines, the PLDT, Inc. (formerly known as Philippine Long Distance Telephone Company) is
the largest network company;
•
Smart Communications, Inc. and Digitel Mobile Philippines, Inc. (commercially known as Sun
Cellular) are collaborating with PLDT
•
Globe Telecom has acquired Bayan Telecommunications (commonly known as BayanTel or Bayan).
•
But no one actually owns “the Internet.”
•
Large internet service providers own infrastructure through which internet is delivered.
The Internet: Then and Now
•
Even though today’s internet bears little resemblance to its forebear of almost 50 years ago, it still
functions in basically the same way.
•
The internet has evolved into something different from the special-purpose, restricted-use network its
planners originally envisioned it to be.
•
The Internet started from the Advanced Research Projects Agency’s Wide Area Network which is
called the ARPANET.
•
This was established by the U.S. Department of Defense in the 1960s so that the military’s research unit
could collaborate or partner with business and government laboratories.
•
Afterwards, other universities and U.S. institutions were connected to ARPANET that resulted in the
growth of ARPANET different from everyone’s expectations.
•
ARPANET then attained the name of “Internet”.
The Internet2 Environment: Future Empowerment
•
Internet2 is a not-for-profit networking consortium founded in 1996 by 34 university research
institutions in the U.S.
•
It provides a collaborative environment where U.S. research and education organizations work together
and develop advanced technologies and innovative solutions such as to assist education, research, and
community development.
•
•
telemedicine
digital libraries
virtual laboratories
As of May 2016, this community comprises
•
317 U.S. higher education institutions
•
81 corporations
•
64 affiliates and affiliate members
•
43 regional and state education networks
•
More than 65 national research and education networking partners representing over 100
countries.
•
The Philippines, via the Philippine Research, Education and Government Information Network
(PREGINET), is among the international peers reachable via Trans-Eurasia Information Network
(TEIN), one of the Internet2’s peering relationships.
•
By supporting telemedicine or telehealth in the country, this information infrastructure, therefore, enables
Philippine hospitals to keep abreast of new medical diagnostics and world-class treatment options without
having to travel abroad.
Internet Today: Still Growing
•
Today, the internet connects thousands of networks and billions of users around the world.
•
The number of internet users as of January 2018 is 4.021 billion which means that more than half of the
world ’s population is now online
•
The internet is open to anyone who can access it.
•
If one can use a computer and if the computer is connected to the internet, he or she is free not only to use
the resources posted by others, but also to create resources of his or her own.
Jobs the Internet Can Do
•
There is only one simple job that the internet does, and it is to move, transfer, or assign a computerized
information from one place to another.
•
This information can be in the form of
•
•
text documents
images
•
audio
video
•
Software programs
and others.
The internet can handle different kinds of information and assist people to perform various jobs:
•
handling of email
searching on websites
•
sending chat messages
creating websites
Programming
What Computers Do on the Internet?
•
Computers do different jobs on the internet.
•
Some computers work like electronic filing cabinets that store information and send it when clients
request so.
•
These are called servers.
•
A server is a computer that is designed to process any requests for data and delivers data to other client
computers over a local network or the internet.
•
A client is a computer or device that gets information from a server.
Some Server Types
•
File Server - machine that holds and manages documents
•
Web Server – machine holds users’ mail and Web services
•
Print Server - a device that connects printers to client computers through the internet or network.
•
Besides clients and servers, the internet is made up of a hardware device designed to receive, analyze, and
send incoming packets to another network. This is called a router.
The World Wide Web
•
The World Wide Web (WWW) is referred to as the collection of public websites that are connected to the
internet worldwide, together with the client computers
Web Technologies
•
The WWW is considered to be one of the applications in the internet and computer networks.
•
This is based on three fundamental technologies that are said to be part of the WWW development:
•
Hypertext Markup Language (HTML)
•
Hypertext Transfer Protocol (HTTP)
•
Web Servers and Web Browsers
•
Hypertext markup language (HTML) - is a standard markup language used for creating web pages
intended for presentation on a World Wide Web browser page.
•
Hypertext transfer protocol (HTTP) - is classified as the set of standards allowing users of the World
Wide Web to interchange information seen on web pages.
•
Web servers and web browsers
•
Web browser is a software application for recovering, presenting, and navigating information resources
on the World Wide Web.
•
Microsoft Edge
•
Google Chrome
•
Internet Explorer
•
Mozilla Firefox
•
Safari
The World Wide Web Today
•
Last March 12, 2019, WWW turned 30 years, a milestone that recalls the invention of the WWW which
has changed humanity forever, and developed a new virtual world within a generation.
An Overview of Some of the Most Useful Google Search Tricks
•
Use quotes to search for an exact phrase - By typing in double-quotes (“ ”) at the start and end for a
certain word or phrase, Google will provide the exact word or phrasing you need.
•
Use an asterisk within quotes to specify unknown or variable words - the asterisk symbol (*) will
provide possibilities. It is helpful, for example, if you are trying to determine a song from its lyrics, but
you forgot some of the words or if you are trying to complete a sentence, but *could not remember what it
was.
•
Use the minus sign to eliminate results containing certain words - While the asterisk gives you
possibilities, the minus sign (-) eliminates results of certain words. Just type the minus sign prior to the
word you do not want to include in the search.
•
Search websites for keywords - You can specify certain content, format, or files you want Google search
to provide. For instance, if you want to specifically search for PDF files regarding a certain topic, simply
type the keyword PDF followed by a colon symbol (:) and the topic you are searching for.
•
Compare using “vs” - By using the “vs” or “versus” between two words you want to compare, Google
will provide an in-depth analysis of the two words, such as pointing out similarities and differences.
•
Use “DEFINE:” to search for the meaning of words slang included - The “DEFINE:” keyword
provides a dictionary definition of a word.
•
Search images using images - you can search for images online by going to Google Images and then
upload a picture of the image you are searching for. Google will provide you with similar images on the
web.
CHAPTER 4: Information, Control and Privacy
Objectives:
At the end of this chapter, the students should be able to:
1. distinguish a physical resource from a conceptual resource;
2. identify the characteristics of information as a resource;
3. analyze the phenomenon of information overload brought by high internet penetration;
4. explain the major points of the revised Intellectual Property Code of the Philippines (Republic Act No.
10372); and
5. Highlight the importance of information control and privacy by creating a video advertisement/awareness
campaign.
Read the following paragraph excerpted from the “Letter to Isaac McPherson, August 13, 1813” in The Writings
of Thomas Jefferson, Vol. XIII, edited by A. Lipscomb (1904):
“If nature has made any one thing less susceptible than all others of exclusive property, it is the action of the
thinking power called an idea, which an individual may exclusively possess as long as he keeps it to himself; but
the moment it is divulged, it forces itself into the possession of everyone, and the receiver cannot dispossess
himself of it. Its peculiar character, too, is that no one possesses the less, because every other possesses the whole
of it. He, who receives an idea from me, receives instruction himself without lessening mine; as he who lights his
taper at mine, receives light without darkening me. That ideas should freely spread from one to another over the
globe, for the moral and mutual instruction of man, and improvement of his condition, seems to have been
peculiarly and benevolently designed by nature, when she made them, like fire, expansible over all space, without
lessening their density at any point, and like the air in which we breathe, move, and have our physical being,
incapable of confinement or exclusive appropriation. Inventions then cannot, in nature, be a subject of property.”
Introduction to Resources
•
Resources are the total means available to a company for increasing production or profit, including land,
labor, capital, and raw materials.
•
Without resources, organizations would cease to exist.
•
Physical resources
•
•
tangible and can be easily Identified
•
usually start from acquisition and then assembled ( raw into a refined form)
•
Assets (building, manpower, etc.) – important resources
Conceptual resources
•
Non-tangible and considered valuable for what they represent rather than their physical makeup.
•
Managers use conceptual resources to manage physical resources or vice versa.
e.g. Computer and smartphones
•
•
•
•
•
Conceptual resources -> Information
Money -> bills represents monetary value
human resources – everyone is an employee but their skills, knowledge and job experience sets
them apart from one another
The content saved in the Computer make it more valuable
Losing smart phone
Information
•
fact about something or someone that are provided or learned
•
Expandable
•
Compressible
•
Transportable (especially digital info)
•
Send via email, Facebook, copy on flash drive, upload on YouTube, etc.
•
Diffusive (whether true or not)
•
Sharable
•
not different from other resources
•
valuable and has life cycle (raw to finished product)
•
e.g. forecasting
• Information, information-related activities, technologies, and personnel are also important
organizational resources.
•
Valuable Information
•
Information is said to be valuable if it has the following characteristics (Stair & Reynolds, 2016):
•
Accurate
•
error-free
•
Inaccurate data = Inaccurate information, analyst call this “Garbage in, Garbage out” (GIGO).
•
By typing “parts of a computer” in the search bar, Google gives you a list of several websites
which contain the information you are looking for. However, how do you determine which are
accurate and which are inaccurate?
•
Usually, it is better to trust sites that are formal in nature rather than informal ones such as blogs
or forums.
•
Informal can still be considered accurate if it provide enough references and can be verifiable
•
The use of wikis has become the norm (e.g. Wikipedia)
Formal Information
It Is official and authoritative.
•
It is meant to be taken seriously and is
presented in a formal manner.
It is presented in a less formal manner.
It is usually more carefully prepared and
verified than informal information, and its
accuracy and reliability should also be higher.
• Technical website
• Academic website
Complete
It is possibly less reliable.
•
•
•
•
•
Blogs
Social Sites
• Wikis
Public Forums
contains all the important facts.
Economical
•
Information should be relatively economical to produce.
•
Decision-makers must always balance the value of information with the cost of producing it.
Reliable
•
depends on the validity of the data collection method.
•
depends on the source of information
•
Eco - Low cost
Flexible
•
can be used for different purposes
•
Relevant
•
Simple
•
•
Informal Information
It is more casual, and less authoritative.
complex information my sometimes lead to confusion
Timely
•
delivered when it is needed
•
Depending on the situation, school ID -> enter school -> transact registrar -> bank account
•
Timely -> weather forecasting, traffic management, stock market forecasts
•
Verifiable - It can be checked for correctness and authenticity.
•
Accessible
•
Information should be easily accessible by authorized users to be obtained in the right format at
the right time to meet their needs.
•
Secure - should be secure from access by unauthorized users
•
References , bibliography, citation
•
ensures that only the owner can access
Value of Information
•
Information is considered valuable mainly for business purposes as businesses depend on it to
produce quality products and services.
•
Valuable information helps managers make good decisions which is why valuable or useful
information is called knowledge.
•
Some pieces of information have entertainment value, and some have business value, but
regardless of the source of value people are willing to pay for information, regardless of source value
(business, entertainment, etc.)
•
•
some information are given for free
-
This helps organizations become globally competitive and be up to date with the latest trends and
technology.
-
Willing to pay -> Consumers differ on how they value particular information goods.
-
Free -> Weather forecasting, stock index, sometimes personal information
-
Costly -> cable channels
Information, as a resource, has four characteristics (Leickly, 2004),
1. It has zero marginal cost;
•
•
cost of reproducing is negligible
the first copy of an information good may be substantial/major/notable/large ->
reproducing it is negligible (ex. movie,-> Millions but reproducing it is cheap)
2. It is non-rivalrous;
3.
•
Simultaneous consumption
•
Simultaneous consumption of information by consumers is possible.
It is non-exclusive; and
•
nature of information is that if it is known, it is difficult to exclude others from its
use
•
Exclusion is not a natural property of information goods but it can be done ->
(forwarding of sms, sharing of post)
4. It does not exhibit high degrees of transparency (no transparency)
•
To evaluate the information, the information must be known, one has to invest in
learning how to evaluate it.
•
New programming language needs to invest time, money, and effort. The more
complicated the training, the more expensive the cost and the longer the time needed
to learn it.
Information Economics
•
People have widely different values for a particular piece of information, value-based pricing leads
naturally to differential pricing.
•
In economics, a good is considered to be an experience good if consumers must experience it to value it.
With information, organizations cannot give the full experience to customers as this could mean lost
interest afterwards.
•
To avoid this situation, organizations use various strategies to get wary customers to overcome their
reluctance to purchase information before they know what they are getting.
•
The tension between giving away your information—to let people know what you have to offer—and
charging them for it to recover your costs, is a fundamental problem in the information economy.
•
These strategies include browsing previews, branding, and reputation.
-
Experience good -> catering( free taste), tshirt(try it)
-
Movie - decide which good between two
-
Browsing preview -> trailer or music preview(itunes)
-
Branding – big names have no issue since people already established their trust on the brand
-
Reputation – reputation of directors and the cast of actors and actresses normally remove this skepticism
•
In general, people value an organization’s ability to make their lives easier and better by using
information about their products and operations.
•
e.g. Google & Amazon
-
Pre-determined information to lessen the decision-making of individuals.
-
Providing additional information regarding the information.
-
Suggest related items when buying
Information Overload
•
Information is now available so quickly, ubiquitously, and inexpensively.
•
Last March 2016, Cisco conducted a study that by the end of 2016, global internet traffic will
have reached 1.1 zettabytes per year, and by 2019, global traffic is expected to hit 2 zettabytes per
year.
•
•
One zettabyte is equal to 1,000,000,000 terabytes or one billion external drives.
This is because information is produced at rapidly-increasing rates due to the following reasons:
•
Easy duplication and transmission of information
•
Increase in communication methods
•
Growth archives of historical information
-
Facebook, Instagram, twitter posting simultaneously
-
Smartphone can do both( sms and email)
(Messenger, Viber) -> PM
-
Hardcopies are replaced by digital ones and stored on cloud servers (e.g. e-lib)
•
So where does all this information come from? Who and where are these producers and consumers of
information? According to the 2018 Global Digital Suite of reports from We Are Social and Hootsuite:
, SMS not limited to telco but also mobile apps
•
More than half the world now uses the internet (up to 7 percent year-on-year).
•
Qatar and United Arab Emirates top the internet penetration ranking with 99% of their total
population using the internet.
•
For three years in a row, Filipinos have been spending the greatest amount of time on social media with
an average of four hours a day.
•
More than two-thirds of the world’s population now has a mobile phone, with most people now using
smartphones.
•
More than half of the world’s web traffic now comes from mobile phones.
•
More than 60% of all mobile connections around the world are now ‘broadband.’
•
More than one in five of the world’s population shopped online in the past 30 days.
•
Compared to the year 2017, 2018 has seen exponential growth in terms of digital information.
•
With the overwhelming ‘‘amounts” of data brought about by the exponential growth of internet users—
both producers and consumers of information—information overload, as in dealing with too much
information for one to absorb, happens.
-
The term broadband commonly refers to high-speed Internet access (ex. DSL – Digital Subscriber line,
fiber, wireless) that is always on and faster than the traditional dial-up access
Information Control
•
With so much information around, how do you make sure they are safe from illegal activities?
•
requirements from information control comes from commerce, industry and copyright owners
•
Information control comes in the form of keeping secrets inside a business or selling IPR (Intellectual
Property Rights) to those prepared to purchase it.
•
Software Piracy
•
According to The Software Alliance (www.bsa.org) (2018), software piracy is “the unauthorized copying
or distribution of copyrighted software... can be done through copying, downloading, sharing, selling or
installing multiple copies of software onto personal or work computers.”
•
e.g. Software (license for one computer
-
Movie -> you want to save by buying pirated DVD -> video camera in cinema with audience laughing
-> decided to download using torrent -> the same copy downloaded
Information Control->Software Piracy
•
Examples of software piracy as identified by The Software Alliance (2018) include:
•
Distributing software or mobile apps from the internet in a manner that violates the license terms
•
Buying a single copy of a software program and installing it on multiple devices without
authorization
•
Making and/or sharing copies of installation CDs
•
Sharing the login credentials (without authorization) used to access a web-based software
application (“Software as a Service’')
•
Some might say, “I paid for the software already, shouldn’t that be mine to use and distribute wherever
and whenever I want to?”
•
Paying for the movie does not mean you are buying the actual movie, but paying for the license to watch
it for personal use.
•
While measures are in place, such as DVD region codes and such, Adam Thierer in 2011, identified four
issues which further complicate the problem on information control: (1) convergence, (2) scale, (3)
volume, and (4) unprecedented individual empowerment/user-generation of content.
•
Boils down to the fact that information is difficult to control.
•
Convergence
•
Technological advancements and social media have paved the way for media content such as
music and movies to be distributed from their “traditional” distribution platforms.
•
Media content can now be searched, accessed, and consumed using multiple devices and even
through different distribution networks.
•
This convergence of devices and networks, according to Thierer (2011), has created issues instead
of maintaining an effective information control policy.
•
CD, DVD -> fb, YouTube
•
Spotify
•
VideoFX which is available in Google Play. According to the app description, you can “create amazing
lip sync music videos with special effects and your choice of music. The issue here is, what if the music
used is copyrighted?
•
Scale
•
-
Thierer (2011) mentions that “the scale of modern digital speech and content dissemination [still]
greatly complicates government efforts to control information flows.”
For those who like to watch Japanese anime and Korean dramas, English subtitles are a must. Before,
fans would wait days or weeks before the subtitles become available for viewing. This is because the
subtitles are actually translated, edited, and embedded by fans of the show, most of whom are not
professionals.
-
With technology and fast internet connectivity, viewers no longer need to wait days to watch the foreign
shows with English subtitles.Google Translate has also helped make translation of these shows much
faster.
•
Volume
•
•
News and media outlet abound in print and online.
•
Broadcasting companies have television broadcast, TV radios and news websites, most of which
have the same content.
•
This development can be attributed to the increasing volume of media content and
communications activities happening across the world, greatly complicating government
regulatory efforts to control information.
Unprecedented individual empowerment
•
The popularity of social media such as Facebook, Twitter, and Instagram has made it possible for
individuals to post anything they want.
•
This creates issues when it comes to content restriction as most people are doing this using their
private accounts. Unless reported, the said content will be difficult to control.
-
Unparalleled , never done, known b4
•
So how do we control information dissemination?
•
Organizations, such as The Software Alliance, software industries such as Microsoft and IBM, as
well as government entities in countries across the globe, are working hand in hand to solve the
issue of software piracy.
•
One solution they have come up with is identifying exclusive rights to information, as with any
given physical asset. This has led to the identification of intellectual property rights.
Intellectual Property (IP)
•
•
refers to a number of distinct types of intangible assets for which a set of exclusive rights are
recognized. IP includes musical, literary, and artistic works such as Taylor Swift’s new album, J.
K. Rowling’s new book, and the latest iPhone.
•
It can also include words, phrases, symbols, and even designs.
•
Intellectual property rights (IPR) are the rights given to persons over their creations.
According to the Intellectual Property Code of the Philippines (Republic Act No. 8293 s. 1998), IPR
consists of the following:
1. Copyright and related rights
5. Patents
2. Trademarks and service marks
Circuits(ICs)
6
3. Geographic indications
7. Protection of undisclosed information
Layout
design(topographies)
of
Integrated
4. Industrial design
•
The Intellectual Property Office of the Philippines (IP Philippines) is the government agency in
charge of the implementation of the law protecting intellectual property rights in the Philippines as
provided for under R.A. 8293, or the Intellectual Property Code of the Philippines, and the revised
Intellectual Property Code of the Philippines known as R.A. 10372.
•
Copyright and Related Rights
•
•
Copyright is a set of exclusive rights granted by a state to the creator of an original work or their
assignee for a limited period of time in exchange for public disclosure of the work, and includes
the right to copy, distribute, and adapt the work.
•
Copyright owners can license or permanently transfer or assign their exclusive rights to others.
•
Digital rights, on the other hand, is the permission granted to individuals to legitimately perform
actions involving the use of a computer, any electronic device, or a communications network. It is
particularly related to the protection and realization of existing rights in the context of new digital
technologies, especially the internet.
Patent
•
•
Trademark
•
•
A patent is a set of exclusive rights granted by a state to an inventor for a limited period of time
in exchange for the public disclosure of an invention. The exclusive right granted to a patentee in
most countries is the right to prevent others from making, using, selling, or distributing the
patented invention without permission.
A trademark is a distinctive sign used by an individual, business organization, or other legal
entity to identify the products or services to consumers. The mark comes from a unique source,
and it distinguishes its product (trademark) or services (service mark) from the others. Rights in a
mark shall be acquired through registration made validly in accordance with the provisions of the
IP code. For marks with geographical indications, a notice stating that a given product originates
in a given geographical area must be identified.
Protection of Undisclosed Information
•
Industries and companies need to have information control especially in dealing with sensitive
industry secrets. To protect these industry secrets, also called trade secrets, companies usually
require employees to sign contracts with non-disclosure agreements (NDAs).
Terms of protection
Penalty
Copyright
Generally, throughout the life of the author
plus
50 years after his or her death
Patent
20 years (time-bound)
Trademark
10 years from the date of filing of the
application
- 1st offense: P50,000 to P150,000 and/or 1-3
years imprisonment
- 2nd offense: P150,000 to P500,000 and/or 3-6
years imprisonment
- 3rd and subsequent offenses: P500,000
toP1.5M and/or 6-9 years imprisonment
Not less than P100,000 to not more than
P300,000 and/or not less than 6 months to not
more than 3 years imprisonment
P50,000 to P200,000 and 2 to 5 years
imprisonment
Information Privacy
•
The natural state of data is to be copied, logged, transmitted, stored, and stored again. This is why it takes
constant fighting and vigilance to prevent that breach. So what is information privacy and how private is
private?
•
•
Transact only with trusted sites.
To protect the privacy of Filipino citizens, Republic Act No. 10173, also known as the Data Privacy Act
of 2012, was signed and approved by then President Benigno Aquino III on August 15, 2012.
- With Facebook and Twitter often being used as a means of venting out in public, others may say, “It's my choice
in telling everyone on Twitter what I want to say!” It is their choice to tell everyone what is supposed to be private
information. If that is the case, then, what is data privacy?
CHAPTER 4 KEY POINTS:
•
Physical, conceptual, and information resources are three types of resources that an organization needs in
order to operate.
•
Information resources, unlike other resources, are expandable, compressible, transportable, diffusive, and
shareable.
•
Information, as a resource, has four characteristics, namely it has zero-marginal cost; is non-rivalrous; is
non-exclusive; and does not exhibit high degrees of transparency.
•
Information is produced at rapidly increasing rates due to easy duplication and transmission of
information, increase in communication methods, and growth archives of historical information.
•
Information control is about allowing those who have appropriate authority access to and use of
information on the basis of the authority that they hold.
•
Intellectual property refers to a number of distinct types of intangible assets for which a set of exclusive
rights are recognized. To protect intellectual properties, copyright and digital rights are granted to
individuals.
CHAPTER 5: IT, Culture, and the Society
As previously discussed, the seven major trends for 2017 are as follows:
1. IoT and smart home technology
2. Augmented reality and virtual reality
3. Machine learning
4. Automation
5. Big data
6. Physical-digital integrations
7. Everything on demand
The Impact of IT on the Society
•
Majority of organizations and companies nowadays have taken these trends into account, shifting
manual business processes to automated ones and using ICT to improve their products and services.
•
Among these seven trends, the internet of Things (IoT) and automation seem to have greatly influenced
present-day culture and society; thus, it is imperative to discuss these thrusts in detail.
Internet of Things (IoT)
•
Internet of Things (IoT) is a set-up of devices and objects which are connected together in a given
network.
•
Their connection, often wirelessly, is possible using both hardware and software.
•
The hardware part is often made up of sensors that collect data, which are then sent to other devices for
analysis and possible interpretation (e.g. Wearable devices, Fitness Trackers and Smartwatches).
•
An app (Software) installed in the phone records the results in a daily, weekly, or monthly basis for the
mobile phone user to keep track of his or her progress.
Capabilities of IoT
•
Integration across technology and business
•
Data analysis and synchronization
•
Security and service
Integration across technology and business
•
Sensors can be used to help improve business processes, such as machines used for manufacturing and
production, security systems, and even simple ones like automatically turning on and off a light switch.
•
Obviously, technology used for each application may vary, depending on the complexity and use.
Data analysis and synchronization
•
IoT should be capable of providing analytics to help organizations in their decision-making.
•
However, for this to be effective, data must be synchronized to allow integration with all of the business
aspects including top management, operations, and even customer relations
Security and service
•
A typical example is your mobile phone notifying you if you will allow a new device to connect to it via
Bluetooth.
•
Normally, it will ask for a pairing connection via a simple ‘accept’ or using a more secure line such as a
pin code.
Applications of IoT
•
Smart cities
-
Smart cities have adopted IoT in traffic management, waste disposal, and even community monitoring for
the security of the city’s residents.
•
Connected industries
-
The oil and gas industry is identified as one of the front-runners for IoT connectivity which includes
remote access to heavy equipment and machinery, from manufacturing to production.
•
Connected buildings
-
Connected building projects involve facility- automation to reduce energy costs.
•
Connected cars
-
With smart cities adopting IoT for their traffic management, it is no longer surprising for the latest car
models to be equipped with sensors and network connectivity.
Majority of projects relating to smart vehicles revolve around vehicle diagnostics and monitoring.
•
Smart energy
-
Majority of smart energy projects focus on developing smart grids for renewable energy and
infrastructure.
Challenges of IoT
 System requirements
•
Industries normally identify different requirements, especially depending on the type of industry they
belong to.
•
Those in the food industry may require monitoring of perishable goods, from production and packaging to
shipping.
•
An automobile manufacturer may have the same process, but since products are different, requirements
may also change.
•
Food will require data regarding temperature levels, whereas cars will require mechanical precision.
 Connectivity
•
With the varying connections — wired and wireless, as well as the different protocols governing each
connection, it will be a challenge to come up with an IoT project concerning such protocols.
 Power requirements
•
IoT devices need to run on batteries as majority of these devices are mobile.
•
The challenge, therefore, is how to extend the battery life on such devices, especially those used in critical
procedures, such as health, disaster management, and safety.
 Security
•
One of the most highlighted issues in the application of IoT is data security.
•
Confidential information such as patients’ records or employees’ profiles are considered at risk. Security
also includes system integrity, with malicious acts such as hacking and viruses proliferating online.
 Development
•
One of the challenges identified is how to expand the capabilities of developers, and not just experts, in
order to create more “smart things.”
 Services
•
With data collected from IoT, it is important as well to determine where all this will go and to identify the
platform in which these IoT applications will be placed.
 Automation
•
Colloquially called “computerization,” having an automated system means automated business processes,
operations, service provider, monitoring, and even tools. Common examples are:
–
Automated payroll system, in which the employee payroll and pay slips are automatically
generated every payday
–
A manufacturing plant that packs powdered juices in foil containers/sachets where machines
with sensors are used to fill up the packs up to the last milligram accurately
–
Automated weather forecast.
Common Methods in Implementing IT Automation
*Robotic Process Automation (RPA)
 Institute for Robotic Process Automation and Artificial Intelligence (IRPAAI) defined RPA as:
“the application of technology that allows employees in a company to configure computer software or a “
robot ” to capture and interpret existing applications for processing a transaction, manipulating data,
triggering responses and communicating with other digital systems ”
•
RPA actually focuses on computers being able to make logical decisions on the business process so that
their human counterparts can focus on other tasks, thus increasing work productivity.
•
Application systems and software may also be considered as RPA as they are applicable to the
following:
–
Process Automation
IT Support ManagementAutomated Assistants
*Process Automation
•
The use not only of industrial robots but also of “presentation-layer automation software” is capable of
carrying out the daily operations of an organization.
•
Process automation may include:
–
finance systems such as payroll,
–
customer management systems such as online system registration, and
–
academic institutions offering online enrollment systems, among others.
*IT Support Management
•
Management of IT infrastructure and complex systems becomes easier using RPA.
•
If part of the system fails, an automated system can immediately send notifications to the IT manager and
technical support staff, informing them of the problem.
*Automated Assistants
•
Apple’s Siri is an example of a voice recognition software used in RPAs.
•
Instead of machine language (binary), computers will be able to understand human language and interact
with the same.
•
Another example for automated assistants will be banks having an automated customer service hotline.
*Sensors
•
Sensors are hardware devices that have the capability to measure an event, object, or any physical quality
that is happening.
•
Examples include the heart rate of a person while jogging, the temperature of a room, brightness of a light
source, and the like.
Sensors Used in Automation
•
Temperature sensor -
Power plants and server rooms.
•
Infrared (IR) sensor -
This sensor often used for security purposes
•
Ultrasonic sensor
•
•
detects sound waves, such as how radars and sonars pick up sounds.
•
light fixture turning on/off if the owner claps his or her hands
•
Touch sensor
with biometrics, users can now access the content of their phones
Proximity sensor
•
This sensor is able to detect objects within a certain range, even if the object is not physically
touching the sensor yet.
•
It is typically used in the light fixtures of houses and buildings. The light turns on if it detects a
person is close by.
Pressure sensor
•
•
Pressure sensor
–
helps determine the weight or impact of a certain object.
–
It is normally used by manufacturing companies, such as automobile companies, in designing
their airbag system.
Level sensor
–
•
used for disaster risk management systems, such as a flood monitoring system.
Smoke/Gas sensor
–
This sensor is used to detect the presence of dangerous fumes such as carbon monoxide caused by
fire.
–
Smoke alarms show how this sensor works.
Influence on Culture
•
Online Reviews
–
•
•
This trend of having other people do the task first for others is an example of how technology
affects the basic human behavior of decision-making.
Weblogging/Social Media
–
Nowadays, food bloggers post pictures of their meals in restaurants along with a food review.
–
This trend created a culture of people dining with friends or family without actually interacting
with them. People would first take pictures of their meal and post it online.
YouTube Learners
–
influences the acquisition of knowledge and learning of certain skill sets.
–
Instead of reading books or listening to their teacher’s class lecture, students would rather watch
YouTube to learn the lesson.
Influence on Social Behavior
•
•
Cyberbullying
–
an unwanted, hostile behavior done by individuals to other people in the hope of gaining control
over them.
–
Cyberbullies can be classmates, neighbors, or officemates. Victims of bullying often end up with
personal traumas.
Netiquette
–
a combination of the words internet and etiquette.
–
It describes how one should act online. Netiquette brings in policies for all the features and
qualities of the internet
Netiquette for Social Media
•
The Personalize IT Rule
–
•
The Off-limits Rule
–
•
Make sure to put restrictions in accepting friends or followers on your social media
Know your limitations when voicing out your opinions on different subjects or topics concerning
your school, religion, personal information, workplace, and even some controversial subjects
such as politics.
The Tag - You’re It Rule.
–
Be careful in tagging someone either in your status post or photos.
–
You may also restrict someone from tagging you in their posts and photos
Netiquette for Chat Rooms, and Instant Messaging
1. Think long and hard before accepting a private conversation, especially with someone not on your friends
list.
2. In a group chat, include only those that are in your friends list.
3. If possible, do not give your personal information including your photos or “selfies.
4. When in doubt, save a copy or make a back-up of your conversation (chat).
5. You must log out from your account at all times
6. Customize your account settings from public to private account.
Professional Ethics
•
While netiquette applies to all netizens, IT professionals specifically follow an ethical practice as they are
the front liners, support, and backend of ICT.
Download