CHAPTER 3: The Internet and World Wide Web The Internet • The internet (capitalized as in Internet when it first came into widespread use) is defined as a worldwide network connecting to a million of computers via dedicated routers and servers. • When computers are connected to the internet, end-users could start sending and receiving different types of information. • These types of information can be sent and received via electronic mails (emails), text or video chats and/or conferencing, and computer programs, among others. • Now, most telephone companies all over the world also function as internet service providers. • In the Philippines, the PLDT, Inc. (formerly known as Philippine Long Distance Telephone Company) is the largest network company; • Smart Communications, Inc. and Digitel Mobile Philippines, Inc. (commercially known as Sun Cellular) are collaborating with PLDT • Globe Telecom has acquired Bayan Telecommunications (commonly known as BayanTel or Bayan). • But no one actually owns “the Internet.” • Large internet service providers own infrastructure through which internet is delivered. The Internet: Then and Now • Even though today’s internet bears little resemblance to its forebear of almost 50 years ago, it still functions in basically the same way. • The internet has evolved into something different from the special-purpose, restricted-use network its planners originally envisioned it to be. • The Internet started from the Advanced Research Projects Agency’s Wide Area Network which is called the ARPANET. • This was established by the U.S. Department of Defense in the 1960s so that the military’s research unit could collaborate or partner with business and government laboratories. • Afterwards, other universities and U.S. institutions were connected to ARPANET that resulted in the growth of ARPANET different from everyone’s expectations. • ARPANET then attained the name of “Internet”. The Internet2 Environment: Future Empowerment • Internet2 is a not-for-profit networking consortium founded in 1996 by 34 university research institutions in the U.S. • It provides a collaborative environment where U.S. research and education organizations work together and develop advanced technologies and innovative solutions such as to assist education, research, and community development. • • telemedicine digital libraries virtual laboratories As of May 2016, this community comprises • 317 U.S. higher education institutions • 81 corporations • 64 affiliates and affiliate members • 43 regional and state education networks • More than 65 national research and education networking partners representing over 100 countries. • The Philippines, via the Philippine Research, Education and Government Information Network (PREGINET), is among the international peers reachable via Trans-Eurasia Information Network (TEIN), one of the Internet2’s peering relationships. • By supporting telemedicine or telehealth in the country, this information infrastructure, therefore, enables Philippine hospitals to keep abreast of new medical diagnostics and world-class treatment options without having to travel abroad. Internet Today: Still Growing • Today, the internet connects thousands of networks and billions of users around the world. • The number of internet users as of January 2018 is 4.021 billion which means that more than half of the world ’s population is now online • The internet is open to anyone who can access it. • If one can use a computer and if the computer is connected to the internet, he or she is free not only to use the resources posted by others, but also to create resources of his or her own. Jobs the Internet Can Do • There is only one simple job that the internet does, and it is to move, transfer, or assign a computerized information from one place to another. • This information can be in the form of • • text documents images • audio video • Software programs and others. The internet can handle different kinds of information and assist people to perform various jobs: • handling of email searching on websites • sending chat messages creating websites Programming What Computers Do on the Internet? • Computers do different jobs on the internet. • Some computers work like electronic filing cabinets that store information and send it when clients request so. • These are called servers. • A server is a computer that is designed to process any requests for data and delivers data to other client computers over a local network or the internet. • A client is a computer or device that gets information from a server. Some Server Types • File Server - machine that holds and manages documents • Web Server – machine holds users’ mail and Web services • Print Server - a device that connects printers to client computers through the internet or network. • Besides clients and servers, the internet is made up of a hardware device designed to receive, analyze, and send incoming packets to another network. This is called a router. The World Wide Web • The World Wide Web (WWW) is referred to as the collection of public websites that are connected to the internet worldwide, together with the client computers Web Technologies • The WWW is considered to be one of the applications in the internet and computer networks. • This is based on three fundamental technologies that are said to be part of the WWW development: • Hypertext Markup Language (HTML) • Hypertext Transfer Protocol (HTTP) • Web Servers and Web Browsers • Hypertext markup language (HTML) - is a standard markup language used for creating web pages intended for presentation on a World Wide Web browser page. • Hypertext transfer protocol (HTTP) - is classified as the set of standards allowing users of the World Wide Web to interchange information seen on web pages. • Web servers and web browsers • Web browser is a software application for recovering, presenting, and navigating information resources on the World Wide Web. • Microsoft Edge • Google Chrome • Internet Explorer • Mozilla Firefox • Safari The World Wide Web Today • Last March 12, 2019, WWW turned 30 years, a milestone that recalls the invention of the WWW which has changed humanity forever, and developed a new virtual world within a generation. An Overview of Some of the Most Useful Google Search Tricks • Use quotes to search for an exact phrase - By typing in double-quotes (“ ”) at the start and end for a certain word or phrase, Google will provide the exact word or phrasing you need. • Use an asterisk within quotes to specify unknown or variable words - the asterisk symbol (*) will provide possibilities. It is helpful, for example, if you are trying to determine a song from its lyrics, but you forgot some of the words or if you are trying to complete a sentence, but *could not remember what it was. • Use the minus sign to eliminate results containing certain words - While the asterisk gives you possibilities, the minus sign (-) eliminates results of certain words. Just type the minus sign prior to the word you do not want to include in the search. • Search websites for keywords - You can specify certain content, format, or files you want Google search to provide. For instance, if you want to specifically search for PDF files regarding a certain topic, simply type the keyword PDF followed by a colon symbol (:) and the topic you are searching for. • Compare using “vs” - By using the “vs” or “versus” between two words you want to compare, Google will provide an in-depth analysis of the two words, such as pointing out similarities and differences. • Use “DEFINE:” to search for the meaning of words slang included - The “DEFINE:” keyword provides a dictionary definition of a word. • Search images using images - you can search for images online by going to Google Images and then upload a picture of the image you are searching for. Google will provide you with similar images on the web. CHAPTER 4: Information, Control and Privacy Objectives: At the end of this chapter, the students should be able to: 1. distinguish a physical resource from a conceptual resource; 2. identify the characteristics of information as a resource; 3. analyze the phenomenon of information overload brought by high internet penetration; 4. explain the major points of the revised Intellectual Property Code of the Philippines (Republic Act No. 10372); and 5. Highlight the importance of information control and privacy by creating a video advertisement/awareness campaign. Read the following paragraph excerpted from the “Letter to Isaac McPherson, August 13, 1813” in The Writings of Thomas Jefferson, Vol. XIII, edited by A. Lipscomb (1904): “If nature has made any one thing less susceptible than all others of exclusive property, it is the action of the thinking power called an idea, which an individual may exclusively possess as long as he keeps it to himself; but the moment it is divulged, it forces itself into the possession of everyone, and the receiver cannot dispossess himself of it. Its peculiar character, too, is that no one possesses the less, because every other possesses the whole of it. He, who receives an idea from me, receives instruction himself without lessening mine; as he who lights his taper at mine, receives light without darkening me. That ideas should freely spread from one to another over the globe, for the moral and mutual instruction of man, and improvement of his condition, seems to have been peculiarly and benevolently designed by nature, when she made them, like fire, expansible over all space, without lessening their density at any point, and like the air in which we breathe, move, and have our physical being, incapable of confinement or exclusive appropriation. Inventions then cannot, in nature, be a subject of property.” Introduction to Resources • Resources are the total means available to a company for increasing production or profit, including land, labor, capital, and raw materials. • Without resources, organizations would cease to exist. • Physical resources • • tangible and can be easily Identified • usually start from acquisition and then assembled ( raw into a refined form) • Assets (building, manpower, etc.) – important resources Conceptual resources • Non-tangible and considered valuable for what they represent rather than their physical makeup. • Managers use conceptual resources to manage physical resources or vice versa. e.g. Computer and smartphones • • • • • Conceptual resources -> Information Money -> bills represents monetary value human resources – everyone is an employee but their skills, knowledge and job experience sets them apart from one another The content saved in the Computer make it more valuable Losing smart phone Information • fact about something or someone that are provided or learned • Expandable • Compressible • Transportable (especially digital info) • Send via email, Facebook, copy on flash drive, upload on YouTube, etc. • Diffusive (whether true or not) • Sharable • not different from other resources • valuable and has life cycle (raw to finished product) • e.g. forecasting • Information, information-related activities, technologies, and personnel are also important organizational resources. • Valuable Information • Information is said to be valuable if it has the following characteristics (Stair & Reynolds, 2016): • Accurate • error-free • Inaccurate data = Inaccurate information, analyst call this “Garbage in, Garbage out” (GIGO). • By typing “parts of a computer” in the search bar, Google gives you a list of several websites which contain the information you are looking for. However, how do you determine which are accurate and which are inaccurate? • Usually, it is better to trust sites that are formal in nature rather than informal ones such as blogs or forums. • Informal can still be considered accurate if it provide enough references and can be verifiable • The use of wikis has become the norm (e.g. Wikipedia) Formal Information It Is official and authoritative. • It is meant to be taken seriously and is presented in a formal manner. It is presented in a less formal manner. It is usually more carefully prepared and verified than informal information, and its accuracy and reliability should also be higher. • Technical website • Academic website Complete It is possibly less reliable. • • • • • Blogs Social Sites • Wikis Public Forums contains all the important facts. Economical • Information should be relatively economical to produce. • Decision-makers must always balance the value of information with the cost of producing it. Reliable • depends on the validity of the data collection method. • depends on the source of information • Eco - Low cost Flexible • can be used for different purposes • Relevant • Simple • • Informal Information It is more casual, and less authoritative. complex information my sometimes lead to confusion Timely • delivered when it is needed • Depending on the situation, school ID -> enter school -> transact registrar -> bank account • Timely -> weather forecasting, traffic management, stock market forecasts • Verifiable - It can be checked for correctness and authenticity. • Accessible • Information should be easily accessible by authorized users to be obtained in the right format at the right time to meet their needs. • Secure - should be secure from access by unauthorized users • References , bibliography, citation • ensures that only the owner can access Value of Information • Information is considered valuable mainly for business purposes as businesses depend on it to produce quality products and services. • Valuable information helps managers make good decisions which is why valuable or useful information is called knowledge. • Some pieces of information have entertainment value, and some have business value, but regardless of the source of value people are willing to pay for information, regardless of source value (business, entertainment, etc.) • • some information are given for free - This helps organizations become globally competitive and be up to date with the latest trends and technology. - Willing to pay -> Consumers differ on how they value particular information goods. - Free -> Weather forecasting, stock index, sometimes personal information - Costly -> cable channels Information, as a resource, has four characteristics (Leickly, 2004), 1. It has zero marginal cost; • • cost of reproducing is negligible the first copy of an information good may be substantial/major/notable/large -> reproducing it is negligible (ex. movie,-> Millions but reproducing it is cheap) 2. It is non-rivalrous; 3. • Simultaneous consumption • Simultaneous consumption of information by consumers is possible. It is non-exclusive; and • nature of information is that if it is known, it is difficult to exclude others from its use • Exclusion is not a natural property of information goods but it can be done -> (forwarding of sms, sharing of post) 4. It does not exhibit high degrees of transparency (no transparency) • To evaluate the information, the information must be known, one has to invest in learning how to evaluate it. • New programming language needs to invest time, money, and effort. The more complicated the training, the more expensive the cost and the longer the time needed to learn it. Information Economics • People have widely different values for a particular piece of information, value-based pricing leads naturally to differential pricing. • In economics, a good is considered to be an experience good if consumers must experience it to value it. With information, organizations cannot give the full experience to customers as this could mean lost interest afterwards. • To avoid this situation, organizations use various strategies to get wary customers to overcome their reluctance to purchase information before they know what they are getting. • The tension between giving away your information—to let people know what you have to offer—and charging them for it to recover your costs, is a fundamental problem in the information economy. • These strategies include browsing previews, branding, and reputation. - Experience good -> catering( free taste), tshirt(try it) - Movie - decide which good between two - Browsing preview -> trailer or music preview(itunes) - Branding – big names have no issue since people already established their trust on the brand - Reputation – reputation of directors and the cast of actors and actresses normally remove this skepticism • In general, people value an organization’s ability to make their lives easier and better by using information about their products and operations. • e.g. Google & Amazon - Pre-determined information to lessen the decision-making of individuals. - Providing additional information regarding the information. - Suggest related items when buying Information Overload • Information is now available so quickly, ubiquitously, and inexpensively. • Last March 2016, Cisco conducted a study that by the end of 2016, global internet traffic will have reached 1.1 zettabytes per year, and by 2019, global traffic is expected to hit 2 zettabytes per year. • • One zettabyte is equal to 1,000,000,000 terabytes or one billion external drives. This is because information is produced at rapidly-increasing rates due to the following reasons: • Easy duplication and transmission of information • Increase in communication methods • Growth archives of historical information - Facebook, Instagram, twitter posting simultaneously - Smartphone can do both( sms and email) (Messenger, Viber) -> PM - Hardcopies are replaced by digital ones and stored on cloud servers (e.g. e-lib) • So where does all this information come from? Who and where are these producers and consumers of information? According to the 2018 Global Digital Suite of reports from We Are Social and Hootsuite: , SMS not limited to telco but also mobile apps • More than half the world now uses the internet (up to 7 percent year-on-year). • Qatar and United Arab Emirates top the internet penetration ranking with 99% of their total population using the internet. • For three years in a row, Filipinos have been spending the greatest amount of time on social media with an average of four hours a day. • More than two-thirds of the world’s population now has a mobile phone, with most people now using smartphones. • More than half of the world’s web traffic now comes from mobile phones. • More than 60% of all mobile connections around the world are now ‘broadband.’ • More than one in five of the world’s population shopped online in the past 30 days. • Compared to the year 2017, 2018 has seen exponential growth in terms of digital information. • With the overwhelming ‘‘amounts” of data brought about by the exponential growth of internet users— both producers and consumers of information—information overload, as in dealing with too much information for one to absorb, happens. - The term broadband commonly refers to high-speed Internet access (ex. DSL – Digital Subscriber line, fiber, wireless) that is always on and faster than the traditional dial-up access Information Control • With so much information around, how do you make sure they are safe from illegal activities? • requirements from information control comes from commerce, industry and copyright owners • Information control comes in the form of keeping secrets inside a business or selling IPR (Intellectual Property Rights) to those prepared to purchase it. • Software Piracy • According to The Software Alliance (www.bsa.org) (2018), software piracy is “the unauthorized copying or distribution of copyrighted software... can be done through copying, downloading, sharing, selling or installing multiple copies of software onto personal or work computers.” • e.g. Software (license for one computer - Movie -> you want to save by buying pirated DVD -> video camera in cinema with audience laughing -> decided to download using torrent -> the same copy downloaded Information Control->Software Piracy • Examples of software piracy as identified by The Software Alliance (2018) include: • Distributing software or mobile apps from the internet in a manner that violates the license terms • Buying a single copy of a software program and installing it on multiple devices without authorization • Making and/or sharing copies of installation CDs • Sharing the login credentials (without authorization) used to access a web-based software application (“Software as a Service’') • Some might say, “I paid for the software already, shouldn’t that be mine to use and distribute wherever and whenever I want to?” • Paying for the movie does not mean you are buying the actual movie, but paying for the license to watch it for personal use. • While measures are in place, such as DVD region codes and such, Adam Thierer in 2011, identified four issues which further complicate the problem on information control: (1) convergence, (2) scale, (3) volume, and (4) unprecedented individual empowerment/user-generation of content. • Boils down to the fact that information is difficult to control. • Convergence • Technological advancements and social media have paved the way for media content such as music and movies to be distributed from their “traditional” distribution platforms. • Media content can now be searched, accessed, and consumed using multiple devices and even through different distribution networks. • This convergence of devices and networks, according to Thierer (2011), has created issues instead of maintaining an effective information control policy. • CD, DVD -> fb, YouTube • Spotify • VideoFX which is available in Google Play. According to the app description, you can “create amazing lip sync music videos with special effects and your choice of music. The issue here is, what if the music used is copyrighted? • Scale • - Thierer (2011) mentions that “the scale of modern digital speech and content dissemination [still] greatly complicates government efforts to control information flows.” For those who like to watch Japanese anime and Korean dramas, English subtitles are a must. Before, fans would wait days or weeks before the subtitles become available for viewing. This is because the subtitles are actually translated, edited, and embedded by fans of the show, most of whom are not professionals. - With technology and fast internet connectivity, viewers no longer need to wait days to watch the foreign shows with English subtitles.Google Translate has also helped make translation of these shows much faster. • Volume • • News and media outlet abound in print and online. • Broadcasting companies have television broadcast, TV radios and news websites, most of which have the same content. • This development can be attributed to the increasing volume of media content and communications activities happening across the world, greatly complicating government regulatory efforts to control information. Unprecedented individual empowerment • The popularity of social media such as Facebook, Twitter, and Instagram has made it possible for individuals to post anything they want. • This creates issues when it comes to content restriction as most people are doing this using their private accounts. Unless reported, the said content will be difficult to control. - Unparalleled , never done, known b4 • So how do we control information dissemination? • Organizations, such as The Software Alliance, software industries such as Microsoft and IBM, as well as government entities in countries across the globe, are working hand in hand to solve the issue of software piracy. • One solution they have come up with is identifying exclusive rights to information, as with any given physical asset. This has led to the identification of intellectual property rights. Intellectual Property (IP) • • refers to a number of distinct types of intangible assets for which a set of exclusive rights are recognized. IP includes musical, literary, and artistic works such as Taylor Swift’s new album, J. K. Rowling’s new book, and the latest iPhone. • It can also include words, phrases, symbols, and even designs. • Intellectual property rights (IPR) are the rights given to persons over their creations. According to the Intellectual Property Code of the Philippines (Republic Act No. 8293 s. 1998), IPR consists of the following: 1. Copyright and related rights 5. Patents 2. Trademarks and service marks Circuits(ICs) 6 3. Geographic indications 7. Protection of undisclosed information Layout design(topographies) of Integrated 4. Industrial design • The Intellectual Property Office of the Philippines (IP Philippines) is the government agency in charge of the implementation of the law protecting intellectual property rights in the Philippines as provided for under R.A. 8293, or the Intellectual Property Code of the Philippines, and the revised Intellectual Property Code of the Philippines known as R.A. 10372. • Copyright and Related Rights • • Copyright is a set of exclusive rights granted by a state to the creator of an original work or their assignee for a limited period of time in exchange for public disclosure of the work, and includes the right to copy, distribute, and adapt the work. • Copyright owners can license or permanently transfer or assign their exclusive rights to others. • Digital rights, on the other hand, is the permission granted to individuals to legitimately perform actions involving the use of a computer, any electronic device, or a communications network. It is particularly related to the protection and realization of existing rights in the context of new digital technologies, especially the internet. Patent • • Trademark • • A patent is a set of exclusive rights granted by a state to an inventor for a limited period of time in exchange for the public disclosure of an invention. The exclusive right granted to a patentee in most countries is the right to prevent others from making, using, selling, or distributing the patented invention without permission. A trademark is a distinctive sign used by an individual, business organization, or other legal entity to identify the products or services to consumers. The mark comes from a unique source, and it distinguishes its product (trademark) or services (service mark) from the others. Rights in a mark shall be acquired through registration made validly in accordance with the provisions of the IP code. For marks with geographical indications, a notice stating that a given product originates in a given geographical area must be identified. Protection of Undisclosed Information • Industries and companies need to have information control especially in dealing with sensitive industry secrets. To protect these industry secrets, also called trade secrets, companies usually require employees to sign contracts with non-disclosure agreements (NDAs). Terms of protection Penalty Copyright Generally, throughout the life of the author plus 50 years after his or her death Patent 20 years (time-bound) Trademark 10 years from the date of filing of the application - 1st offense: P50,000 to P150,000 and/or 1-3 years imprisonment - 2nd offense: P150,000 to P500,000 and/or 3-6 years imprisonment - 3rd and subsequent offenses: P500,000 toP1.5M and/or 6-9 years imprisonment Not less than P100,000 to not more than P300,000 and/or not less than 6 months to not more than 3 years imprisonment P50,000 to P200,000 and 2 to 5 years imprisonment Information Privacy • The natural state of data is to be copied, logged, transmitted, stored, and stored again. This is why it takes constant fighting and vigilance to prevent that breach. So what is information privacy and how private is private? • • Transact only with trusted sites. To protect the privacy of Filipino citizens, Republic Act No. 10173, also known as the Data Privacy Act of 2012, was signed and approved by then President Benigno Aquino III on August 15, 2012. - With Facebook and Twitter often being used as a means of venting out in public, others may say, “It's my choice in telling everyone on Twitter what I want to say!” It is their choice to tell everyone what is supposed to be private information. If that is the case, then, what is data privacy? CHAPTER 4 KEY POINTS: • Physical, conceptual, and information resources are three types of resources that an organization needs in order to operate. • Information resources, unlike other resources, are expandable, compressible, transportable, diffusive, and shareable. • Information, as a resource, has four characteristics, namely it has zero-marginal cost; is non-rivalrous; is non-exclusive; and does not exhibit high degrees of transparency. • Information is produced at rapidly increasing rates due to easy duplication and transmission of information, increase in communication methods, and growth archives of historical information. • Information control is about allowing those who have appropriate authority access to and use of information on the basis of the authority that they hold. • Intellectual property refers to a number of distinct types of intangible assets for which a set of exclusive rights are recognized. To protect intellectual properties, copyright and digital rights are granted to individuals. CHAPTER 5: IT, Culture, and the Society As previously discussed, the seven major trends for 2017 are as follows: 1. IoT and smart home technology 2. Augmented reality and virtual reality 3. Machine learning 4. Automation 5. Big data 6. Physical-digital integrations 7. Everything on demand The Impact of IT on the Society • Majority of organizations and companies nowadays have taken these trends into account, shifting manual business processes to automated ones and using ICT to improve their products and services. • Among these seven trends, the internet of Things (IoT) and automation seem to have greatly influenced present-day culture and society; thus, it is imperative to discuss these thrusts in detail. Internet of Things (IoT) • Internet of Things (IoT) is a set-up of devices and objects which are connected together in a given network. • Their connection, often wirelessly, is possible using both hardware and software. • The hardware part is often made up of sensors that collect data, which are then sent to other devices for analysis and possible interpretation (e.g. Wearable devices, Fitness Trackers and Smartwatches). • An app (Software) installed in the phone records the results in a daily, weekly, or monthly basis for the mobile phone user to keep track of his or her progress. Capabilities of IoT • Integration across technology and business • Data analysis and synchronization • Security and service Integration across technology and business • Sensors can be used to help improve business processes, such as machines used for manufacturing and production, security systems, and even simple ones like automatically turning on and off a light switch. • Obviously, technology used for each application may vary, depending on the complexity and use. Data analysis and synchronization • IoT should be capable of providing analytics to help organizations in their decision-making. • However, for this to be effective, data must be synchronized to allow integration with all of the business aspects including top management, operations, and even customer relations Security and service • A typical example is your mobile phone notifying you if you will allow a new device to connect to it via Bluetooth. • Normally, it will ask for a pairing connection via a simple ‘accept’ or using a more secure line such as a pin code. Applications of IoT • Smart cities - Smart cities have adopted IoT in traffic management, waste disposal, and even community monitoring for the security of the city’s residents. • Connected industries - The oil and gas industry is identified as one of the front-runners for IoT connectivity which includes remote access to heavy equipment and machinery, from manufacturing to production. • Connected buildings - Connected building projects involve facility- automation to reduce energy costs. • Connected cars - With smart cities adopting IoT for their traffic management, it is no longer surprising for the latest car models to be equipped with sensors and network connectivity. Majority of projects relating to smart vehicles revolve around vehicle diagnostics and monitoring. • Smart energy - Majority of smart energy projects focus on developing smart grids for renewable energy and infrastructure. Challenges of IoT System requirements • Industries normally identify different requirements, especially depending on the type of industry they belong to. • Those in the food industry may require monitoring of perishable goods, from production and packaging to shipping. • An automobile manufacturer may have the same process, but since products are different, requirements may also change. • Food will require data regarding temperature levels, whereas cars will require mechanical precision. Connectivity • With the varying connections — wired and wireless, as well as the different protocols governing each connection, it will be a challenge to come up with an IoT project concerning such protocols. Power requirements • IoT devices need to run on batteries as majority of these devices are mobile. • The challenge, therefore, is how to extend the battery life on such devices, especially those used in critical procedures, such as health, disaster management, and safety. Security • One of the most highlighted issues in the application of IoT is data security. • Confidential information such as patients’ records or employees’ profiles are considered at risk. Security also includes system integrity, with malicious acts such as hacking and viruses proliferating online. Development • One of the challenges identified is how to expand the capabilities of developers, and not just experts, in order to create more “smart things.” Services • With data collected from IoT, it is important as well to determine where all this will go and to identify the platform in which these IoT applications will be placed. Automation • Colloquially called “computerization,” having an automated system means automated business processes, operations, service provider, monitoring, and even tools. Common examples are: – Automated payroll system, in which the employee payroll and pay slips are automatically generated every payday – A manufacturing plant that packs powdered juices in foil containers/sachets where machines with sensors are used to fill up the packs up to the last milligram accurately – Automated weather forecast. Common Methods in Implementing IT Automation *Robotic Process Automation (RPA) Institute for Robotic Process Automation and Artificial Intelligence (IRPAAI) defined RPA as: “the application of technology that allows employees in a company to configure computer software or a “ robot ” to capture and interpret existing applications for processing a transaction, manipulating data, triggering responses and communicating with other digital systems ” • RPA actually focuses on computers being able to make logical decisions on the business process so that their human counterparts can focus on other tasks, thus increasing work productivity. • Application systems and software may also be considered as RPA as they are applicable to the following: – Process Automation IT Support ManagementAutomated Assistants *Process Automation • The use not only of industrial robots but also of “presentation-layer automation software” is capable of carrying out the daily operations of an organization. • Process automation may include: – finance systems such as payroll, – customer management systems such as online system registration, and – academic institutions offering online enrollment systems, among others. *IT Support Management • Management of IT infrastructure and complex systems becomes easier using RPA. • If part of the system fails, an automated system can immediately send notifications to the IT manager and technical support staff, informing them of the problem. *Automated Assistants • Apple’s Siri is an example of a voice recognition software used in RPAs. • Instead of machine language (binary), computers will be able to understand human language and interact with the same. • Another example for automated assistants will be banks having an automated customer service hotline. *Sensors • Sensors are hardware devices that have the capability to measure an event, object, or any physical quality that is happening. • Examples include the heart rate of a person while jogging, the temperature of a room, brightness of a light source, and the like. Sensors Used in Automation • Temperature sensor - Power plants and server rooms. • Infrared (IR) sensor - This sensor often used for security purposes • Ultrasonic sensor • • detects sound waves, such as how radars and sonars pick up sounds. • light fixture turning on/off if the owner claps his or her hands • Touch sensor with biometrics, users can now access the content of their phones Proximity sensor • This sensor is able to detect objects within a certain range, even if the object is not physically touching the sensor yet. • It is typically used in the light fixtures of houses and buildings. The light turns on if it detects a person is close by. Pressure sensor • • Pressure sensor – helps determine the weight or impact of a certain object. – It is normally used by manufacturing companies, such as automobile companies, in designing their airbag system. Level sensor – • used for disaster risk management systems, such as a flood monitoring system. Smoke/Gas sensor – This sensor is used to detect the presence of dangerous fumes such as carbon monoxide caused by fire. – Smoke alarms show how this sensor works. Influence on Culture • Online Reviews – • • This trend of having other people do the task first for others is an example of how technology affects the basic human behavior of decision-making. Weblogging/Social Media – Nowadays, food bloggers post pictures of their meals in restaurants along with a food review. – This trend created a culture of people dining with friends or family without actually interacting with them. People would first take pictures of their meal and post it online. YouTube Learners – influences the acquisition of knowledge and learning of certain skill sets. – Instead of reading books or listening to their teacher’s class lecture, students would rather watch YouTube to learn the lesson. Influence on Social Behavior • • Cyberbullying – an unwanted, hostile behavior done by individuals to other people in the hope of gaining control over them. – Cyberbullies can be classmates, neighbors, or officemates. Victims of bullying often end up with personal traumas. Netiquette – a combination of the words internet and etiquette. – It describes how one should act online. Netiquette brings in policies for all the features and qualities of the internet Netiquette for Social Media • The Personalize IT Rule – • The Off-limits Rule – • Make sure to put restrictions in accepting friends or followers on your social media Know your limitations when voicing out your opinions on different subjects or topics concerning your school, religion, personal information, workplace, and even some controversial subjects such as politics. The Tag - You’re It Rule. – Be careful in tagging someone either in your status post or photos. – You may also restrict someone from tagging you in their posts and photos Netiquette for Chat Rooms, and Instant Messaging 1. Think long and hard before accepting a private conversation, especially with someone not on your friends list. 2. In a group chat, include only those that are in your friends list. 3. If possible, do not give your personal information including your photos or “selfies. 4. When in doubt, save a copy or make a back-up of your conversation (chat). 5. You must log out from your account at all times 6. Customize your account settings from public to private account. Professional Ethics • While netiquette applies to all netizens, IT professionals specifically follow an ethical practice as they are the front liners, support, and backend of ICT.