You are on page 1of 11

At the end of this chapter, the students should be able to:

1. recall the current trends in the field of information technology;


2. discuss the Internet of Things and its influence on the society;
3. explain automation and its impact on the society;
4. analyze how IT influences culture and social behavior,
5. enumerate the rules of netiquette;
6. describe cyberbullying and identify the steps to combat it; and
7. familiarize themselves with and demonstrate the imperatives of professional conduct for
IT professionals.
8. describe how the given IT trends affect the Filipino's way of living
9. discuss the issues and challenges in IT that the different sectors face; and
10. research further on the influence of IT on a specific sector.

Internet of Things (IOT)

Internet of Things is a set-up of devices and objects which are connected together in a given
network. Their connection, often wirelessly, is possible using both hardware and their software.
The hardware part is often made up of sensors that collect data, which are then sent to other
devices for analysis and possible interpretation. Popular examples are health wearable devices
such as step counters that are connected to a mobile phone via bluetooth. An app installed in the
phone records the results in a weekly, or monthly basis for the mobile phone user to keep track
of his or her progress.

Applications of IoT

With improved business processes and employee productivity, it is only natural for organizations
to adopt loT. In a study conducted by 10T Analytics, it was found that most of the 1,600 loT
projects are applied in cities (Scully, 2018).

Topping the list are as follows:

1. Smart cities

Smart cities have adopted loT in traffic management, waste disposal, and even
community monitoring for the security of the city's residents.

2. Connected industries

The oil and gas industry is identified as ne the front-runners for loT connectivity which
include. remote access to heavy equipment and machinery manufacturing to production.

3. Connected buildings

Connected building projects involve facility. facility- automation to reduce energy costs.
4. Connected cars

With smart cities adopting loT for their traffic management, it is no longer surprising tor
the latest car models to be equipped with sensors and network connectivity. Majority of
projects relating to smart vehicles revolve around vehicle diagnostics and monitoring

5. Smart energy

Majority of smart energy projects focus on developing smart grids for renewable energy
and infrastructure.

Influence on Culture

Online Reviews

With the proliferation of online information, it 15 easy to find details on a certain movie or a
book. However, with sites such as Rotten Tomatoes, one can actually make a decision on what
movie to watch simply by reading the "reviews" of other people. If the review is "good," then the
person might watch the movie, but if the review is "bad," then he or she might consider other
movies This trend of having other people do the task first tor others watching the full movie and
informing people online if the film is worth watching or not is an example of how technology
affects the basic human behavior of decision-making.

Weblogging/Social Media

Nowadays, food bloggers post pictures of their meals in restaurants along with a food review.
This trend created a culture of people dining with friends or family without actually interacting
with them. People would first take pictures of their meal and post it online. Others, during the
course of the meal, would even use their phones to update their online status instead of talking to
the other people in their group. This is one typical example of technology, in the form of
weblogging and social media, affecting social interaction.

YouTube Learners

YouTube is one of the most popular social media sites. People can watch videos, comment on
them, and upload their own videos, among others. Thus, YouTube serves as a source of videos
with people searching for almost about anything online from trivial topics to more serious
subject matter This fact influences the acquisition of knowledge and learning of certain skill sets.
Instead of reading books or listening to their teacher class lecture, students would rather watch
YouTube to learn t lesson. Again, this is another situation in which technology affer the culture,
this time, of learning

Influence on Social Behavior

Cyberbullying
Behavioral choices especially of teenagers or adolescents are influenced by technologies.
Cyberbullying, for example, is a serious phenomenon brought about by social media.
Cyberbullying is an unwanted, hostile behavior done by individuals to other people in the hope
of gaining control over them. Cyberbullies can be classmates, neighbors, or officemates. Victims
of bullying often end up with personal traumas. And since the act of bullying is done online, the
attackers may also be individuals you do not know as they hide behind their internet profiles. An
internet profile, also called an internet identity, online identity, or internet persona, is a profile
created by internet users to establish their social identity in online communities, social media
sites, and other websites. Because some consider an online identity to be a possible breach in
privacy, this has led to the creation of an online "mask," an online profile created through a series
of questions (username, gender, age, etc.). However, this "mask" may lead to a misdirection, or
in a worse case, to misinformation. For example, while a handle or username "student2006" may
mean that the user is a student, "2006" may mean either the user's year of birth or year of
entering school.

Netiquette

Netiquette is a combination of the words internet and etiquette. It describes how one should act
online. Netiquette brings in policies for all the features and qualities of the internet, including the
use of the World Wide Web (Www), email services, File Transfer Protocol (FTP), chat rooms,
and instant messaging. There are different types of netiquette implemented all over the world.
Netiquette for Social Media The use of social media such as Facebook, Twitter, Instagram,
LinkedIn, and others is neither a bad habit nor a good habit in one's personal life. Using social
media is good for easy communication with friends and even long-lost friends and relatives. But
there are some netizens who use their social media accounts to discredit other people by posting
or shouting ruthless words about a particular person or sharing a status that maligns one's
character or reputation. Some of the rules of netiquette for social media are as follows (Spira,
2010):

1. The Personalize IT Rule. Make sure to put restrictions in accepting friends or followers
on your social media (e.g., Facebook, Twitter, Instagram, LinkedIn). It is not about
having the most number of followers or friends. What matters is who you interact with
and how you interact with them.
2. The Off-limits Rule. Know your limitations when voicing out your opinions on different
subjects or topics concerning your school, religion, personal information, workplace, and
even some controversial subjects such as politics. Knowing your limitations can save you
from dire consequences later on.
3. The Tag- You're It Rule. Be careful in tagging someone either in your status post or
photos. You may also restrict someone from tagging you in their posts policies for all the
features and qualities of the internet, including the use of the World Wide Web (WWW),
email services, File Transfer Protocol (FTP), chat rooms, and instant messaging. There
are different types of netiquette implemented all over the world. Netiquette for Social
Media The use of social media such as Facebook, Twitter, Instagram, LinkedIn, and
others is neither a bad habit nor a good habit in one's personal life. Using social media is
good for easy communication with friends and even long-lost friends and relatives. But
there are some netizens who use their social media accounts to discredit other people by
posting or shouting ruthless words about a particular person or sharing a status that
maligns one's character or reputation. Some of the rules of netiquette for social media are
as follows
Netiquette for Email Services, Chat Rooms, and Instant Messaging

Email services such as sending and receiving an email from someone (professional to personal)
anywhere in the world are used in numerous contexts. Shown in the figure are Some guidelines
in composing an email.

Netiquette for Chat Rooms and Instant Messaging

Joining chat rooms and sending instant messages, although mandatory in social media, have
become a trend for users. This is especially beneficial for people working in different places such
as a person working overseas while his or her friend or relative is in the Philippines. Instead of
spending for telcom services, the person just needs internet connection. Still, there are guidelines
for using instant messaging applications. For instance, someone might interrupt and request you
to accept him or her or to be connected to your account without your knowing who that person
really is.
1. Think long and hard before accepting a private conversation, especially with someone not
on your friends list. Not everyone online may be as they seem to be.
2. In a group chat, include only those that are in your friends list.
3. If possible, do not give your personal information while chatting, including your photos
or "selfies."
4. When in doubt, save a copy or make a back-up of your conversation (chat).
5. You must log out from your account at all times, especially if you are in a public place,
such as a computer shop.
6. You may opt to customize your account settings from public to private account.

Trends

This chapter features articles and studies showing trend IT from recent years. The topics include
the industry sector s u of technology specifically loT and automation, Articles regard e online
banking as well as the business sector's online presence through e-commerce are likewise
included. IT trends on education and case studies on the use of technology in health are also
presented. Lastiy, this chapter covers several issues in 1 that tne different sectors face.

Industry

The industry sector in the Philippines is made up of local and foreign companies that provide
different products and services to Filipinos. Some companies in the food industry include
Universal Robina and Monde Nissin while those in the beverage industry include San Miguel
Brewery and Pepsi Philippines. Two major trends are seen in this sector-automation and the
application of Internet of Things (IoT), hence the introduction of smart industries. Internet of
Things (IOT). The IoT is becoming an increasingly growing topic of conversation both in the
workplace and in the society at large. It has the potential to impact how we live and how we
work. For instance, through the use or sensors, electronics, and robotics, major companies have
reported increase in productivity as well as accuracy of results in their production lines. The
following articles present the positive effects of loT and the role of the internet and network
connectivity in business.
IT Automation

Automating what used to be manual procedures is the trend in organizations and industries. As
with IoT, automation helps many companies achieve greater productivity among its employers
by using computers and software programs to do the tasks. Such automation includes accounting
systems, production systems, and even security systems, the news articles below mention how a
simple attendance monitoring system has become much easies as well as how companies and
employees can benefit from using technology in their daily work.

Banking

Online banking also known as "internet banking" or "web banking allows a user to execute
financial transactions via tn internet. An online bank offers customers just about every service
traditionally available through a local branch, including deposits money transfers, and bill
payments. The news articles that follow explore the rise of digital banking customers as more
and more Filipinos rely on their internet connection to avail of different bank services.

Education

Most colleges and universities in the Philippines use a learning management system (LMS) to
deliver, manage, and keep track of students' progress. This LMS, which is delivered online,
relates to the e-learning system. E-learning is learning that utilizes electronic technologies to
acces5 educational curriculum outside of a traditional classroom, in most Cases, it refers to a
course program, or degree delivered completely online, Some call this as distance learning. The
news articles that follow discuss how telecom companies such as Globe and PLDT are giving
back to the society by introducing technology to public schools and making sure students, as well
as teachers, become global learners.

Business

Electronic commerce or e-commerce is a term for any type of business, or commercial


transaction that involves the transfer of information across the internet. It covers a range of
different ypes of businesses, from consumer-based retail sites and auction music sites, to
business exchanges trading goods and servICes between corporations. It is currently one of the
most importa ant aspects of the internet to emerge

Health

E-health (or e- Health) refers to the use of information and communications technology in health
care, It covers a lot of territory, which is why digital health industry experts often contest exactly
what the term means and to add to the confusion, it is also frequently used as a synonym for
Health IT.
Issues and Challenges

Spyware

Spyware collects information about users’ activities without their knowledge or consent.
This can include passwords, pins, payment information and unstructured messages. The use
of spyware is not limited to the desktop browser: it can also operate in a critical app or on a
mobile phone. Even if the data stolen is not critical, the effects of spyware often ripple
throughout the organization as performance is degraded and productivity eroded.

Spyware Example:

DarkHotel , which targeted business and government leaders using hotel WIFI, used several
types of malware in order to gain access to the systems belonging to specific powerful
people. Once that access was gained, the attackers installed keyloggers to capture their
targets passwords and other sensitive information.

Adware

Adware tracks a user’s surfing activity to determine which ads to serve them. Although
adware is similar to spyware, it does not install any software on a user’s computer, nor does
it capture keystrokes. The danger in adware is the erosion of a user’s privacy — the data
captured by adware is collated with data captured, overtly or covertly, about the user’s
activity elsewhere on the internet and used to create a profile of that person which includes
who their friends are, what they’ve purchased, where they’ve traveled, and more. That
information can be shared or sold to advertisers without the user’s consent.

Adware Example:

Adware called Fireball infected 250 million computers and devices in 2017, hijacking


browsers to change default search engines and track web activity. However, the malware
had the potential to become more than a mere nuisance. Three-quarters of it was able to run
code remotely and download malicious files.

Trojan

A Trojan disguise itself as desirable code or software. Once downloaded by unsuspecting


users, the Trojan can take control of victims’ systems for malicious purposes. Trojans may
hide in games, apps, or even software patches, or they may be embedded in attachments
included in phishing emails.

Trojan Example:
Emotet is a sophisticated banking trojan that has been around since 2014. It is hard to fight
Emotet because it evades signature-based detection, is persistent, and includes spreader
modules that help it propagate. The trojan is so widespread that it is the subject of a  US
Department of Homeland Security alert, which notes that Emotet has cost state, local, tribal
and territorial governments up to $1 million per incident to remediate.

Worms

Worms target vulnerabilities in operating systems to install themselves into networks. They
may gain access in several ways: through backdoors built into software, through
unintentional software vulnerabilities, or through flash drives. Once in place, worms can be
used by malicious actors to launch DDoS attacks, steal sensitive data, or conduct
ransomware attacks.

Worm Example:

Stuxnet was probably developed by the US and Israeli intelligence forces with the intent of
setting back Iran’s nuclear program. It was introduced into Iran’s environment through a
flash drive. Because the environment was air-gapped, its creators never thought Stuxnet
would escape its target’s network — but it did. Once in the wild, Stuxnet spread
aggressively but did little damage, since its only function was to interfere with industrial
controllers that managed the uranium enrichment process.

Virus

A virus is a piece of code that inserts itself into an application and executes when the app is
run. Once inside a network, a virus may be used to steal sensitive data, launch DDoS attacks
or conduct ransomware attacks.

Keyloggers

A keylogger is a type of spyware that monitors user activity. Keyloggers have legitimate
uses; businesses can use them to monitor employee activity and families may use them to
keep track of children’s online behaviors. However, when installed for malicious purposes,
keyloggers can be used to steal password data, banking information and other sensitive
information. Keyloggers can be inserted into a system through phishing, social engineering
or malicious downloads.

Keylogger Example:

A keylogger called Olympic Vision has been used to target US, Middle Eastern and Asian
businessmen for business email compromise (BEC) attacks. Olympic Vision uses spear-
phishing and social engineering techniques to infect its targets’ systems in order to steal
sensitive data and spy on business transactions. The keylogger is not sophisticated, but it’s
available on the black market for $25 so it’s highly accessible to malicious actors.

How to prevent your computers from Malwares?

1. Keep your computer and software updated.


2. Use a non-administrator account whenever possible.
3. Think twice before clicking links or downloading anything.
4. Be careful about opening email attachments or images.
5. Don't trust pop-up windows that ask you to download software.
6. Limit your file-sharing.
7. Use antivirus software.

Activity

Multiple Choice:
Circle the letter that corresponds to your answer.

1. It allows a user to execute financial transactions via internet.


a. Internet of Things
b. E-learning
c. IT automation
d. Online banking

2. It refers to the voluminous amount of data from traditional and digital sources that could
be mined tor valuable insights on human behavior such as trends, patterns, and
associations, in turn boosting business intelligence.
a. Big data
b. IT automation
c. Digibanker
d. Learning management system

3. It refers to the use of information and communications technology in health care.


a. IT automation
b. E-commerce
c. Telecare
d. E-health

4. It is a stand-alone malware that replicates itself in order to Spread to other computers.


a. Worm
b. Ransomware
c. Virus
d. Spyware

5. lt is a type of malware that can block access to a victim us.


a. Virus
b. Spyware
c. Ransomware
d. Worm
Exercise

Research further on the influence of IT at least two (2) of the following sectors:

 Banking
Technology and digitization have transformed the BFSI sector by enabling them with real-
time actionable insights to make informed decisions, creating competitive advantages and
elevating consumer experience. This also allows banks to share potential products, upsells,
cross-sells, and strategic planning with customers.
 Education
 Health
The goal of information technology in the healthcare industry is to improve the overall health
of the population by improving the quality of care that patients receive. Information
technology is important in the healthcare industry, as it supports shared decision making
between healthcare professionals and patients.
 Business

References

https://support.google.com/google-ads/answer/2375413?hl=en

AgenceFrance-Presse. (2017, May 13). Global ransomware attack hits 74 countries. ABS CBN
News. Retrieved from http://news. abs-cbn.com/overseas/05/12/17/global-ransomware-attack
hits-74-countries

Bacungan, V. (2017, June 8). BPI: Problems with accounts will be resolved 'within the day.
CNN Philippines Retrieved from http://ennphilippines.com/news/2017/06/07/bpi-report
unauthorized-transaction.html

Cahiles-Magkilat, B. C. (2017, May 22). E-commerce growth to drive logistics business in PH.
Manila Bulletin. Retrieved trom https://business.mb.com.ph/2017/05/22/e-commerce growth-to-
drive-logistics-business-in-ph.

Crowdstrike (2019). The 11 Most Common Types of Malware.


https://www.crowdstrike.com/epp-101/types-of-malware/

DelMers, I (2016, November 16). 7 Technology trends that will dominate 2017. Forbes
Retrieved from https://www.forbes. com/sites/jaysondemers/ 2016/11/16/7-technology-trends-
mat-wil-dominate-2017

Dumlao, D C. (2013, April 3). More Filipinos warming up to online banking, Citi survey shows.
nquirer. Net. Retrieved from http://business.inquirer.net/115213/more-filipinos-warming up-to-
online-bankng-citi-survey-shows

Dumlao-Abadilla, D. (2015, December 18). Ionics, IBM team up on high-tech products.


Enriquez, J. (2014, October 28). How digital health is bridging the healthcare gap n the
Philippines. Ketrieved trom https:// innovatemedtec.com/ content/how-digital-health-1s-
bridging- the-healthcare-gap-in-the-philippines.

Eysenbach, G. (2001). What is e-health? Journal of Medical Internet Research, 3 (2), e20.
doi:10.2196/jmir.3.2.e20

Facebook. (2018) How do I report a child under the age of 137 Retrieved from
https://www.facebook.com/help/15779354 0954833

First Circle. (2018). Philippine e-commerce to reach P200bn by 2020 Retneved from
https://www.firstcircle.ph/blog/philippine-e- Commerce-to-reach-200bn-by-
20207r=/blog&rt=The%20Blog

Frialde, M. (2014, July 29). Makati fully implements biometric timekeeping system. PhilStar.
Retrieved fromhttp://www. philstar.com/nation/2014/07/29/1351664/makati-fully- implements-
biometric-timekeeping-systemn

Glkey, C. (2015, April 21). Technology and culture influence each other, Retrieved from
http://www.productiveflourishing.com/ technology-and-culture-intiuence-each-other

Henry Schein Medical Systems, Inc. (n.d.). Overview of HIPAA and HITECH data security
requirements. Retrieved from https:// www.micromd.com/hipaa-hitech-security-compliance-emr-
pm-data-back-up/

Inquirer. Net. Retrieved from http:// business.inquirer.net/204332/ionics-ibm-team-up-on-high-


tech solutions.

Interaksyon. (2017, June 12). Security Bank's govt payment service cited at HKs The Asset
Triple A awards. Retrieved from http:// www.interaksyon.com/security-banks-govt-payment-
service- Cited-at-hks-the-asset-tnple-a-awards

Kumar, S. (2015). 5 common problems faced by students in elearning and how to overcome
them. Retrieved from https:// elearningindustry.com/5-common-problems-faced-by- students-in-
elearning-overcome.

Manila Bulletin. (2017, February 13). Global Filipino schools enhance eLearning with
Cloudfone tablets. Retrieved from https:// technology.mb.com.ph/2017/02/13/global-filipino-
schools- enhance-elearning-with-cloudfone-tablets

National Privacy Commisison. (2017, September 20) Ahead of PHIE, private hospitals
complying with Data Privacy Act. Retrieved from https://privacy.gov.ph/ahead-phie private-
hospitals complying-data privacy-act

Reyes, R. R. (2017, June 10). Property consultant bares future of work. Business Mirror.
Retrieved from http://www. businessmirror.com.ph/property-consultant-bares-future-of work
Reyes, R. R., & Estopace, D. (2016, March 14). Groups to mull over lo T development in
Philippines. BusinessMirror. Retrieved from http://www.businessmirror.com.ph/groups-to-mull-
over-iot development-in-philippines

Sunstar. (2016, September 26). PLDT enterprise rolls out e-Learning program to aid millennials'
studies. Retrieved from http://www. sunstar.com.ph/manila/business/2016/09/26/pldt-enterprise-
rolls-out-elearning-program-aid-millennials-studies

Prepared by:

DR. GEOFFREY SALES SEPILLO


Assistant Professor IV

Approved:

DR. MENCHIE A. DELA CRUZ


CCIT, Dean

You might also like