You are on page 1of 6

LEARNING MODULE SURIGAO STATE COLLEGE OF TECHNOLOGY

MODULE NO. 5

I. Title: IT, CULTURE AND THE SOCIETY

II. Topics:

1. Internet of Things (IoT)

2. Automation

3. The Influence of IT on Culture and Social Behavior

III. Time Frame: 8 hours

IV. Introduction:

Recently, these are the seven major trends which include IoT and smart home
technology, augmentation reality and virtual reality, machine learning, big data, physical-
digital influence and everything on demand

Majority of organizations and companies nowadays have taken these trends into
account, shifting manual business processes to automated ones and using ICT to improve
their products and services. Among these seven trends, the Internet of Things (IoT) and
automation seem to have greatly influenced present-day culture and society; thus, it is
imperative to discuss these thrusts in detail. With this, students might be able to realize the
great impact of ICT in our society.

V. Objectives:

At the end of this module, the students should be able to:

1. Discuss the Internet of Things and its influence on the society;


2. Explain automation and its impact on society; and
3. Analyze how IT influences culture and social behavior.

VI. Pre-Test:

VII. Learning Activities:

1. INTERNET OF THINGS (IoT)

It is a set-up of devices and objects which are connected together in a given network.
Their connection, often wirelessly, is possible using both hardware and software. The
hardware part is often made up of sensors that collect data which are then sent to other
devices for analysis and possible interpretation.

Capabilities of IoT

1. Integration across technology and business – sensors can be used to help


improve business processes, such as machines used for manufacturing and
production, security systems and even simple ones like automatically turning on and
off a light switch.
2. Data analysis and synchronization – IoT should be capable of providing analytics
to help organizations in their decision-making. However, for this to be effective, data
must be synchronized to allow integration with all of the business aspects, including
top management, operations and even customer relations (Markkula, 2016).
3. Security and services – with all of these devices being used and all of these data
being collected, a major concern is obviously security. To improve security, IoT

MODULE 5 - TLE 8 – TEACHING ICT AS AN EXPLORATORY COURSE 1 JGC


LEARNING MODULE SURIGAO STATE COLLEGE OF TECHNOLOGY

devices are usually divided into networks and each network has a different network
access, some more restricted than others without compromising connection and
system integration.

Application of IoT

1. Smart cities – have adopted IoT in traffic management, waste disposal and even
community monitoring for the security of the city’s residents.
2. Connected industries – the oil and gas industry is identified as one of the front-
runners for IoT connectivity which includes remote access to heavy equipment and
machinery from manufacturing to production.
3. Connected buildings – connected building projects involve facility-automation to
reduce energy cost
4. Connected cars – it is no longer surprising for the latest car models to be equipped
with sensors and network connectivity
5. Smart energy – majority of smart energy projects focus on developing smart grids
for renewable energy and monitoring

Challenges of IoT

1. System requirements – industry normally identify different requirements, especially


depending on the type of industry they belong to,
2. Connectivity – with the varying connections, wired and wireless, as well as the
different protocols governing each connection, it will be a challenge to come up with
an IoT project connecting such protocol.
3. Power requirements – the challenge is how to extend battery life on such devices
especially those used in critical procedures such as health, disaster management
and safety.
4. Security – one of the most highlighted issues in the application of IoT is data
security. Confidential information such as patient’s records or employees’ profiles are
considered at risk.
5. Development – the task of creating IoT projects may seem daunting, so one of the
challenges identified is how to expand the capabilities of developers and not just
experts, in order to create more “smart things.”
6. Services – with data collected from IoT, it is important as well to determine where all
this will go and to identify the platform in which these IoT applicants will be placed.
Nowadays, cloud services offer end-to-end solutions to a number of IoT projects.

2. AUTOMATION

The demand for system automation with the available technology and standards for
computer system interconnection is on the rise. Two common methods in implementing IT
automation:

Robotic Process Automation (RPA) – The Institute for Robotic Process Automation and
Artificial Intelligence (IRPAAI) defined robotic process automation (RPA) as “the application
of technology that allows employees in a company to configure computer software or a
“robot” to capture and interpret existing applications for processing a transaction,
manipulating data, triggering responses and communicating with other digital systems”
(Institute for Robotic Automation & Artificial Intelligence, 2018, par. 3). Application systems
and software may also be considered as RPA as they are applicable to the following:

 Process Automation – may include financial system such as payroll, customer


management systems such as online system registration, and academic institutions
offering online enrollment systems, among others. A school that has a learning

MODULE 5 - TLE 8 – TEACHING ICT AS AN EXPLORATORY COURSE 2 JGC


LEARNING MODULE SURIGAO STATE COLLEGE OF TECHNOLOGY

management system will be helpful for both the students and the teachers especially
in submitting requirements such as a homework research.
 IT Support Management – management of IT infrastructure and complex systems
becomes easier using RPA. If part of the system fails, an automated system can
immediately send notifications to the IT manager and technical support staff,
informing them of the problem.
 Automation Assistants – Apple’s Siri is an example of voice recognition software
used in RPAs. Instead of machine language (binary), computers will be able to
understand human language and interact with the same. Another example of for
automated assistants will be banks having an automated customer service hotline.

Sensors – are hardware devices that have the capability to measure an event, object or any
physical quality that is happening. Examples include the heart rate of a person while jogging,
the temperature of the room, brightness of a light source, and the like. Sensors have the
capacity to connect to other devices that can keep track of the data they are measuring.
Lists of sensors used in automation:

 Temperature sensor – capable of measuring temperature as well as detecting its rise


or fall
 Infrared (IR) sensor – used for security purposes detects infrared light.
 Ultrasonic sensor – detects sound ware, such as how radars and sonars pick up
sounds
 Touch sensor – through touch, the sensor activates itself and becomes capable of
doing its function. The latest versions of Samsung and Apple smartphones now have
a one-touch login to access the device, instead of a pin code or a pattern.
 Proximity sensor – able to detect objects within a certain range, even if the objects
within a certain range, even if the object is not physically touching the sensor yet.
 Pressure sensor – helps determine the weight or impact of a certain object.
 Level sensor – can detect the level of liquids, fluids, grainy or granular materials,
such as powders, etc.
 Smoke/Gas sensor – used to detect the presence of dangerous fumes such as
carbon monoxide caused by fire.

3. THE INFLUENCE OF IT ON CULTURE AND SOCIAL BEHAVIOR

With the prevalence of technology getting widespread, there are issues, both positive
and negative, that surface. However, it is important to note that any positive effect a person
wants to see should not rely solely on the technology; it should also focus on self-realization
and social interaction.

Gilkey (2015) identified in his article the many hundreds of small ways that
technology alters individual and collective behavior on a daily basis. It may not be noticed,
but these “small ways” are slowly become prominent which is probably why the so-called
“generation wars” are now becoming popular (i.e., Baby Boomers vs. Millennials) with the
obvious disparity between these generations publicized in social media.

Influence on Culture

Online reviews – with the proliferation of online information, it is easy to find details
on a certain movie or book. The decision to watch movie or buy books nowadays is simply
done through people’s reviews. This trend of having other people do the task firs for other is
an example of how technology affects the basic human behavior of decision-making.

Weblogging/Social Media – nowadays, food bloggers post pictures of their meal in


restaurants along with a food review. This trend created a culture of people dining friends or

MODULE 5 - TLE 8 – TEACHING ICT AS AN EXPLORATORY COURSE 3 JGC


LEARNING MODULE SURIGAO STATE COLLEGE OF TECHNOLOGY

family without actually interacting with them. Another example is taking pictures before meal.
It affects human social interaction.

YouTube learners – is one of the most popular social media sites. It is served as a
source of videos with people searching for almost about anything online. This fact influences
the acquisition of knowledge and learning of certain skill sets. Instead of reading books or
listening to their teacher’s class lecture, students would rather watch YouTube to learn the
lesson. Again, this is another situation in which technology affects the culture this time of
learning.

INFLUENCE ON SOCIAL BEHAVIOR

Cyber-bullying – is an unwanted, hostile behavior done by individuals to other


people in the hope of gaining control over them. Attackers may also be individuals who hide
themselves behind internet profiles. Internet profiles are also called as an internet
identity, online identity or internet persona. It is a profile created by internet users to
establish their social identity in online communities, social media and other websites. Cyber-
bullying can come also in the form of pictures or images such as memes.

Please refer here for the additional information about cyber-bullying:


https://technology.inquirer.net/42356/cyber-bullying-via-social-media-seen-as-crime

NETIQUETTE

It is a combination of the words internet and etiquette. It describes how one should
act online. Netiquette brings in policies for all the features and qualities of the internet,
including the use of WWW, email services, FTP, chat rooms and instant messaging.

Social Media Netiquette

1. The Personalize IT rule – put restrictions in accepting friends online


2. The Off-limits Rule – make limitations when voicing out your opinion.
3. The Tag – You’re it Rule – be careful in tagging someone

Email services

1. There must be recipient, subject line, salutation, the body that must be short
and specific, closing line and sender information

Chat rooms and instant messaging

1.Think long and hard before accepting private conversation

2. In a group chat, include only those that are in your friends list

3. Do not give your personal information while chatting

4. When in doubt, save a copy or make a backup of your conversation

5. Log out from your account at all times

6. Customize your account settings from public to private account

Professional ethics

While netiquette applies to all netizens, IT professionals specifically follow an ethical


practice as they are the front liners, support and backend of ICT. The Association of

MODULE 5 - TLE 8 – TEACHING ICT AS AN EXPLORATORY COURSE 4 JGC


LEARNING MODULE SURIGAO STATE COLLEGE OF TECHNOLOGY

Computing Machinery (ACM) has identified 24 imperatives of professional conduct for IT


professionals.

I. General Moral Imperatives

1.1 Contribute to society and human well-being

1.2 Avoid harm to others

1.3 Be honest and trustworthy

1.4 Be fair and take action not to discriminate

1.5 Honor property rights including copyrights and patent

1.6 Give proper credit for intellectual property

1.7 Respect the privacy of others

1.8 Honor confidentiality

II. More Specific Professional Responsibility

2.1 Strive to achieve the highest quality, effectiveness and dignity in both the
process and products of professional work

2.2 Acquire and maintain professional competence

2.3 Know and respect existing laws pertaining to professional work

2.4 Accept and provide appropriate professional review

2.5 Give comprehensive and thorough evaluations of computer systems and their
impacts, including analysis of possible risk

2.6 Honor contracts, agreements and assigned responsibilities

2.7 Improve public understanding of computing and its consequences

2.8 Access computing and communication resources only when authorized to do so

III. Organizational Leadership Imperatives

3.1 Articulate social responsibilities of members of an organizational unit and


encourage full acceptance of those responsibilities

3.2 Manage personnel and resources to design and build information systems that
enhance the quality of working life

3.3 Acknowledge and support proper and authorized uses of an organization’s


computing and communication resources

3.4 Ensure that users and those who will be affected by a system have their needs
clearly articulated during the assessment and design of requirements; later the system must
be validated to meet requirements

3.5 Articulate and support policies that protect the dignity of users and others
affected by a computing system

MODULE 5 - TLE 8 – TEACHING ICT AS AN EXPLORATORY COURSE 5 JGC


LEARNING MODULE SURIGAO STATE COLLEGE OF TECHNOLOGY

3.6 Create opportunities for members of the organization to learn the principles and
limitations of computer systems

IV. Compliance with the Code

4.1 Uphold and promote the principles of this code

4.2 Treat violations of this code as inconsistent with membership in the ACM

VIII. Self-Evaluation: True or False Write T if the statement is true and f if the
statement is false.

____1. Netiquette is basically the guidelines on how a person acts online.

____2.Cyber-bullying is a wanted act done by individual to other people in order to have


manipulation.

____3.The challenge of IoT is the data security.

____4. Pressure sensor helps to detect infrared light.

____5. The application of IoT focused on power requirements.

IX. Review of Concepts

The Internet of Things poses both advantages


and disadvantages. Other than connectivity,
IoT is capable of integrating technology and
business, providing analytics and securing
network connections. On the other hand, IoT
faces many challenges in system
requirements, connectivity, power
requirements, security, development and
services.

The demand for system automation is on the rise. With the use of computer systems, the
typical cumbersome and error-prone procedures have become automated.

The sudden surge of ICT has created an influence on how people’s lives have been
changed, for better and for worse. ICT’s influence established a culture of relying on online
reviews, lesser personal interaction due to weblogging and social media, and YouTube or
video streaming for knowledge acquisition.

Since ICT has also greatly influenced social behavior, netiquette brings in policies for all the
features and qualities of the internet.

IT professionals follow an ethical practice as they are the front liners, support and backend
of ICT. The Association of Computing Machinery (ACM) has identified 24 imperatives of
professional conduct for IT professionals.

X. Post-Test:

XI. Reference:

Caoili-tayuan.R R., &Eleazar, M V. (2019).Living in the Information Technology Era. Quezon


City: C&E Publishing, Inc.
Yap, DJ (2015, May 25). Cyber-bullying via Social Media seen as a Crime.Retrieved from
https://technology.inquirer.net/42356/cyber-bullying-via-social-media-seen-as-crime

MODULE 5 - TLE 8 – TEACHING ICT AS AN EXPLORATORY COURSE 6 JGC

You might also like