You are on page 1of 13

CHAPTER 6 A series of interconnected devices that can

ADVANCEMENT IN INFORMATION TECHNOLOGY exchange data.


❖ COMPUTER
electronic device that manipulates information or TYPES OF COMPUTER NETWORKS
data. ❖ LANs (Local Area Networks)
ability to store, process and retrieve data. which interconnect endpoints in a single domain

❖ HARDWARE ❖ WANs (Wide Area Networks)


any part of the computer that has a physical which interconnect multiple LANs
structure.
❖ MANs (Metropolitan Area Networks)
❖ SOFTWARE which interconnect computer resources in a
any set of instruction that tells the hardware what geographic area
to do and how to do it
❖ SANs (Storage Area Networks)
❖ PERSONAL COMPUTER
which interconnect storage devices and resources
microcomputer designed for use by one person at a
time.
USES AND ADVANTAGES
TYPES OF PERSONAL COMPUTER ❖ FILE SHARING
DESKTOP COMPUTER which enables users to share data files through a
designed to be placed on the desk and they’re network
typically made up of few different parts such as
computer case, monitor, keyboard, and mouse. ❖ APPLICATION SHARING
which enables users to share applications through a
LAPTOP network
Battery-powered computers that are portable
than desktops, allowing you to use them almost ❖ HARDWARE SHARING
anywhere. which enables users in a network to share hardware
devices, such as printers and hard drives
TABLETS
Handheld computer that are even more portable ❖ CLIENT-SERVER MODEL
than laptops. Instead of a keyboard and mouse, it uses which enables data to be stored on servers, where
a touch-sensitive screen for typing and navigation. end-user devices -- or clients -- can access that data

SMARTPHONES ❖ VOICE OVER IP (VoIP)


Many cell phones can do a lot of things which enables users to send voice data through
computers can do, including browsing the Internet and internet protocols
playing games.
❖ COMMUNICATION
WEARABLES which can include video, text, and voice
Designed to be worn throughout the day.
❖ E-COMMERCE
MAIN STYLES OF PERSONAL COMPUTER which enables users to sell and buy products over
❖ PCs the internet
IBM PC (1981)
IBM PC Compatible (PC) ❖ GAMING
Microsoft which enables multiple users to play together from
Microsoft Windows various locations

❖ MACS ❖ Computer on a network can be part of a


Macintosh Computer (1984) WORKGROUP or a DOMAIN.
First widely sold personal computer with graphical user ❖ The main difference between WORKGROUPS and
interface (GUI) DOMAINS is HOW resources on the network are
Apple MANAGED.
Mac OS X
IN A DOMAIN…
❖ PCs One or more computers are servers. Network
Intel microprocessor architecture administrators use servers to control the security and
Associated with business and use permissions for all computers on the domain. This
makes it easy to make changes because the changes
are automatically made to all computers.
❖ MACS
If you have a user account on the domain, you
Motorola microprocessor architecture
can log on to any computer on the domain without
Associated with graphic design and desktop
needing an account on that computer.
publishing
There can be hundreds or thousands of
computers.
COMPUTER NETWORK
The computers can be on different local
A set of computers sharing resources such as
networks.
printers, internet connection, programs, and databases.
IN A WORKGROUP….
All computers are peers; no computer has ADVANTAGES
control over another computer. ➢ Cheap to implement and run
Each computer has a set of user accounts. To ➢ Improved information sharing and collaboration
use any computer in the workgroup, you must have an ➢ Help develop and reinforce the corporate culture
account on that computer. of a business
There are typically no more than ten to twenty
computers. DISADVANTAGES
All computers must be on the same local network ➢ Extensive ongoing management
or subnet. ➢ Breach in security

SYSTEM ISLANDS TO INTEGRATED SYSTEMS ❖ EXTRANET


1. Real-time data An extranet is an intranet that grants access to
With integrated systems, data can be updated in those outside of an organization to certain information
real-time instead of only after someone manually and applications. Third parties such as customers,
uploads or updates it. A database that connects to all vendors and partners are given access to certain parts
applications can ingest information constantly. of the organization's intranet.
Extranet is an extension of intranet that is made
2. Increased Sales available to users outside of the organization.
eCommerce and retail sector companies (and Extranets are private networks designed to allow
others who rely upon sales) usually see a marked certain individuals outside of the company to
increase in sales volume following an investment in communicate with members within your organization in
system integration. a secure and private virtual space.
Example: Customer Portal, Student Portal,
3. Improved System Security
Integrated systems help IT teams and business HOW IT WORKS
leaders keep an eye on what data is visible by which Extranets uses a variety of technologies to
individuals or groups. An application that is not properly secure communications between an organization and its
integrated must be managed and maintained business partners. These technologies can include
independently, opening the door to a data breach or firewalls, encryption, VPNs, and digital certificates.
theft. Extranets typically use the internet protocols Transport
Control Protocol (TCP) and the Internet Protocol (IP) to
4. Enhances Employee Collaboration secure communications and information sharing.
Systems that pass required data back and forth Extranets can be accessed by anyone who has
in real time will increase productivity and accuracy. been granted access by the organization. Access to an
extranet is usually granted to specific individuals within
5. Improved Customer Service an organization's business partners using a login
An important aspect of good customer service, system and credentials.
in my opinion, is to quickly respond and address the
problem your customer has ADVANTAGES
➢ Improved flexibility
6. Cost and Storage Savings ➢ Increased efficiency
Without question, financial savings are among
the most attractive benefits of system integration. DISADVANTAGES
Integrated systems remove redundancy in applications ➢ Expensive to implement and maintain
and data. ➢ Security threat

Internal to Extended Enterprise Computing: INTERNET


Intranet, Extranet, and Internet The Internet is a system design that allows
❖ INTRANET different computer networks all over the world to
An intranet is a private network that is part of an communicate and has transformed communications and
organization and is used to securely distribute data and ways of business. It is often known as a "network of
computer resources among staff members. networks”.
According to the Merriam-Webster online The internet is a public network accessible to
dictionary, the prefix "intra-" is Latin for "within. “ anyone. Currently, there are 4.66 billion active internet
Intranets encourage communication within an users worldwide, nearly 60 percent of the world’s
organization. They let employees easily access population.
important information, links, applications, forms, and
databases of company records. HOW IT WORKS
Every computer has its own IP (internet protocol)
HOW IT WORKS address. And the IP identifies the computer’s location
A secure and reliable intranet requires a web within the global network. A series of rules and
server that manages requests for data hosted on the standards known as protocols connect the various
server. networks. Browsers such as Google Chrome or
The intranet's web server uses TCP/IP, HTTP, Microsoft Edge provide access to the world wide web.
and other internet protocols. It uses both wired and wireless communication
To access their company intranet, employees (Wi-Fi, ethernet, and cable, plus 3G, 4G and 5G) to send
must have a special network password and be and receive data.
connected to the company LAN. Remote employees The internet is a public network accessible to
access the intranet through a virtual private network anyone.
(VPN) or another secure connection.
ADVANTAGES A program that can sense, reason, act and
➢ Potential Access to a Global Market adapt.
➢ Automated Systems and Resource Sharing
Machine Learning
DISADVANTAGES Machine learning is a means of realizing AI by
➢ Malware threat providing algorithms with classified data so that they can
➢ No ownership or control improve over time without being explicitly programmed.
Algorithms whose performance improve as they
Robotic Process Automation (RPA) Vs Manual are exposed to more data over time.
Labor?
TECHNOLOGY Deep Learning
Techne – Art, Craft Deep learning, to realize ML, uses artificial
Logos – Word, Speech neural networks, which are algorithms that attempt to
imitate how human brains make decisions, including
Robotics Process Automation (RPA) making their own classifications of data.
also known as software robotics, uses intelligent Subset of Machine Learning in which
automation technologies to perform repetitive office multilayered neural networks learn from vast amounts of
tasks of human workers. data.

Internet Of Behavior
Different Applications of IoB
A. Digital Marketing / social media
B. Health Care
C. Government
D. Insurance

Benefits Of IoB
A. Analyze Costumers Buying Habits
B. Study Previously Unobtainable Data About How
Costumers Interact with Devices and Products
C. Gain Deeper Insights into Where a Costumer Is
in The Buying Journey
D. Provide Realtime Point of Sale Notifications and
Target Ads
E. Quickly Resolve Issues to Close Sales and Keep
Costumers Happy

ADVANTAGE OF RPA
➢ Reduction in errors
➢ Greater efficiency
➢ Better usage of human skills
➢ Improved customer satisfaction
➢ Better standardization of processes

DISADVANTAGE OF RPA
➢ Attrition
➢ Added complexity
➢ Possible increase in problematic processes

Manual Labor / Human Labor


Manual labor or manual work is physical work
done by people, most especially in contrast to that done
by machines.

Advantages and Disadvantages


➢ Better quality and consistency CHAPTER 7
➢ Maximum productivity and throughput CONDUCTING BUSINESS IN 2020 AND IN THE
➢ Greater safety FUTURE
➢ Reduced direct labor costs
➢ High initial investment PHILIPPINE UNEMPLOYMENT
➢ Expertise can be scarce Unemployment
➢ Ongoing costs refers to individuals who are employable and
actively seeking a job but are unable to find a job.
Artificial Intelligence
Artificial intelligence as a concept to describe a Types of Unemployment
program that can sense, make decisions, act on them, ● Demand Deficient
and adapt based on the outcome of those decisions has ● Frictional
been around at least since the first computers. ● Structural
● Voluntary
MOST COMMON CAUSES OF THE
UNEMPLOYMENT RATE IN THE PHILIPPINES
➢ Lack Of Decent Employment Opportunities
➢ Geographic Mismatch and Mobility
➢ Poor Education System
➢ Technology
➢ Overpopulation
➢ Inflation
➢ Contractualization
➢ Insufficient Infrastructure
➢ Corruption
➢ Slow Economic Growth
Unemployment is a serious social and economic SMALL BUSINESS IDEAS
issue that results in a tremendous impact on everything WHAT IS BUSINESS?
but is often overlooked. A stronger system of assessing An entity or an enterprise that is committed to
unemployment should be put in place to determine its providing goods or services in exchange for some form
causes and how to address it better. of payment.

ALTERNATIVE WORK SCHEMES CLASSIFICATION OF BUSINESS


Alternative Work Schemes ➢ Service
are work arrangements that include flexible work ➢ Manufacturing
schedules, job sharing of one position between several ➢ Merchandising
employees and having a regular work location at a place
other than a campus work site. SMALL BUSINESS IDEAS
benefit both the employee and the employer. ➢ Sell Preloved/Secondhand Items
Employees can achieve a better work-life balance, lower ➢ Offers Home Cooked Food/ Snacks
levels of absence and lower levels of stress. ➢ Local Delivery Services
➢ Content Creation
March 4, 2020 ➢ Urban Farming
LABOR ADVISORY NO. 009-20 ➢ Cleaning Services
GUIDELINES ON THE IMPLEMENTATION OF ➢ Sell Your Hobby Projects
FLEXIBLE WORK ARRANGEMENTS AS REMEDIAL ➢ Provide Tutorial/ Writing Services
MEASURE DUE TO THE ONGOING OUTBREAK OF
CORONAVIRUS DISEASE 2019 (COVID-19) CHAPTER 8
INTELLIGENT SYSTEMS IN BUSINESS
PURPOSE
Advisory is being issued to assist and guide What is Artificial Intelligence (AI)?
employers and employees in the implementation of Artificial Intelligence allows machines to model,
various flexible work arrangements as alternative coping and even improve upon the capabilities of the human
mechanism and remedial measures. mind. AI is a growing part of everyday life. As a result,
The adoption of flexible work arrangements is many tech companies across various industries are
considered as better alternatives than outright investing in artificially intelligent technologies.
termination of the services of the employees or the total
closure of the establishments. Brief History
In 1950, English Mathematician Alan Turing
CONCEPT wrote a landmark paper title “Computing Machinery and
Flexible work arrangements refer to alternative Intelligence” that asked the question: “Can Machines
arrangements or schedules other than the traditional or think?”
standard workhours, workdays, and workweek. Further work came out of a 1956 workshop at
The effectivity and implementation of any of the Dartmouth sponsored by John McCarthy. In the
flexible work arrangements shall be temporary in nature, proposal for that workshop, he coined the phrase a
subject to the prevailing conditions of the company. “study of Artificial Intelligence”

The Following Are the Given in The Advisory Artificial Intelligence


1. Reduction of Workhours and/or Workdays Artificial Intelligence (AI) is a popular branch of
2. Rotation of Workers computer science that concerns building “intelligent”
3. Forced Leave smart machines capable of performing intelligent tasks.
Artificial Intelligence (AI) refers to the simulation
Importance of Having an Alternative Work Schemes of human intelligence in machines that are programmed
❖ Safety to think like humans and mimic their actions.
Reducing workers’ exposure to the COVID‑19
virus in the workplace. Limits physical interaction Machine Learning
Machine Learning is a subset of artificial
❖ Relief to Struggling companies intelligence that uses techniques (such as deep
continuous operation. Workers who lose their jobs learning) that enable machines to use experience to
and incomes, including those in non-standard forms of improve at tasks.
employment, need income support. It is a branch of artificial intelligence based on the
idea that systems can learn from data, identify patterns,
❖ Increased Productivity and make decisions with minimal human intervention.
If an employee can work remotely from home,
they save time on commute, meaning they may be Deep Learning
inclined to start work earlier and finish later. Deep Learning is a subset of machine learning
that’s based on artificial neural networks. The learning
process is deep because the structure of artificial neural
❖ Improved Well-being
networks consists of multiple input, output, and hidden
Offering flexible working to employees can boost
layers.
staff morale and improve their physical and mental well-
being.
TYPES OF ARTIFICIAL INTELLIGENCE
1. Artificial Narrow Intelligence (ANI) - which has
a narrow range of abilities
2. Artificial General Intelligence (AGI) - which is
on par with human capabilities
3. Artificial Superintelligence (ASI) - which is
more capable than a human. Everyday Examples of Artificial Intelligence and
Machine Learning
BUSINESS APPLICATIONS OF ARTIFICIAL ➢ Ridesharing and Food Delivery
INTELLIGENCE ➢ Autopilot
➢ Spam Filters and Smart Email Categorization
How are Businesses using Artificial Intelligence? ➢ Plagiarism Checkers and Robo-readers
You can use AI technologies to: ➢ Fraud Prevention and Credit Decisions
➢ Improve customer services ➢ Facebook’s Algorithm on Photos and News Feed
➢ Automate workloads Contents
➢ Optimize logistic ➢ Smart Assistant and Chat Bots
➢ Increase manufacturing output and efficiency
➢ Prevent outages ➢ SAP – Turning Databases into Useful Intel
➢ Predict performance ➢ DOMO – Business Dashboards
➢ Predict behavior ➢ Apptus – Sales Enablement
➢ Manage and analyze your data ➢ General Electric – Predicting Repairs and Upkeep
➢ Improve your marketing and advertising ➢ for Machinery
➢ Siemens – Monitoring Machine Fleets and Factories
BUSINESS BENEFITS OF ARTIFICIAL
INTELLIGENCE FACEBOOK' S ARTIFICIAL INTELIGENCE
For the greatest benefits, businesses should Every day, nearly 2.5 billion people log in to one
look at putting the full range of smart technologies of the Facebook family of services, which include
including machine learning, natural language Messenger, Instagram, and WhatsApp. And as users
processing and more into their processes and products. scroll, message, like, and click, Facebook continues to
scoop up data, which they package up for advertisers.
Artificial Intelligence Impact on Business Behind the scenes, artificial intelligence allows
➢ save time and money by automating and optimizing Facebook to make sense of all the messy data it collects
routine processes and tasks about our likes, dislikes, aspirations, and relationships.
➢ increase productivity and operational efficiencies
➢ make faster business decisions based on outputs Deep Text
from cognitive technologies A Deep learning-based text understanding
➢ avoid mistakes and 'human error’ if AI systems are engine that can understand with near-human accuracy
set up properly the textual content of several thousand posts per
➢ use insight to predict customer preferences and offer second, spanning more than 200 languages. Text
them a better, personalized experience understanding includes multiple tasks, such as general
➢ mine vast amount of data to generate quality leads classification to determine what a post is about etc.
and grow your customer base
➢ increase revenue by identifying and maximizing Preventing Suicide
sales opportunities Facebook technology can look for signs of
➢ grow expertise by enabling analysis and offering trouble in users’ posts and comments from friends, then
intelligent advice and support generate alerts and help people in crisis.

RISK AND LIMITATIONS OF ARTIFICIAL BUSINESS Instant Translation


Businesses are increasingly looking for ways to Facebook is using applied machine learning to
put Artificial Intelligence technologies to work to improve enable (and continually improve) automatic translation
their productivity, profitability, and business results. of specific posts within users’ news feeds.

LIMITATIONS OF ARTIFICIAL INTELLIGENCE Image Recognition


➢ Availability of data Although users have enjoyed Facebook’s image
➢ Skills shortage recognition features for a long time, the company
➢ Cost continues to improve on the software so users can easily
search through photos without having to rely on tags or
EXAMPLES OF ARTIFICIAL INTELLIGENCE USE IN surrounding text.
BUSINESS
Artificial intelligence is all around us. You have Detecting Deep Fakes
likely used it on your daily commute, searching the web Deep Fakes are altered photos, videos, and that
or checking your latest social media feed. use artificial intelligence to appear like the real thing.
Facebook researchers say they've developed artificial
Applications of AI in business includes: intelligence called "deepfakes" and track their origin by
➢ spam filters using reverse engineering, and the top performing AI
➢ smart email categorization model could detect artificial videos with 82.56%
➢ voice to text features accuracy.
➢ smart personal assistants, such as Siri, Cortana and
Google Now Helping Visually Impaired People
➢ automated responders and online customer support With the help of AI and deep learning, Facebook
➢ process automation engineers are creating “talking pictures” that speak the
➢ sales and business forecasting content of a photo out loud, so visually impaired users
➢ security surveillance can have a better experience on the platform.
➢ smart devices that adjust according to behavior
➢ automated insights, especially for data-driven
industries.
YOUTUBE’S ARTIFICIAL INTELLIGENCE CSR = Responsibility of a business towards the
YouTube is a free video sharing website that society
makes it easy to watch online videos. You can even
create and upload your own videos to share with others The Ambition of a Responsible Company is to
Contribute to:
APPLICATION OF ARTIFICIAL INTELLIGENCE ➢ an economically efficient.
1. Removing Objectionable Content ➢ socially equitable; and
2. New Effects on Videos ➢ environmentally sustainable development whilst
3. “Up Next” Feature ensuring its profitability and economic growth.
4. Training on Depth Prediction
5. Dealing with Fake News ADVANTAGES OF CORPORATE SOCIAL
6. AGE RESTRICTIONS RESPONSIBILITY
COMPANY BENEFITS
In conclusion… ➢ Community and General Public Benefits
Artificial intelligence has played a pivotal role in ➢ Environmental Benefits
developing the platform and in influencing its present ➢ Improved financial performance
features. ➢ Enhanced brand image and reputation
➢ Increased sales and customer loyalty
POSITIVE EFFECTS OF ARTIFICIAL INTELLIGENCE ➢ Greater productivity and quality
TO WORKER ➢ Product safety and decreased liability
➢ Reduction In Human Error ➢ Charitable contributions
Artificial Intelligence can significantly reduce errors ➢ Employee volunteer programs
and increase accuracy and precision. ➢ Corporate involvement in community education,
➢ Perform Repetitive Jobs employment, and housing programs
AI will automate menial and repetitive tasks and free ➢ Greater material recyclability
workers to do more complex operations. ➢ Better product durability and functionality
➢ Ai In Risky Situations ➢ Greater use of renewable resources
AI Robots can be used in such situations where
intervention can be hazardous. DISADVANTAGES OF CORPORATE SOCIAL
➢ Digital Assistance RESPONSIBILITY
Some of the most technologically advanced ➢ Expensive
companies engage with users using digital assistants, ➢ Costs fall disproportionately on small business
which eliminates the need for human personnel.
Many websites utilize digital assistants to deliver IMPACT OF CORPORATE SOCIAL
user-requested content. RESPONSIBILITY
Ex. Chatbots It encourages innovation, reduce costs, and
brings employees together around a meaningful project
NEGATIVE EFFECTS OF AI TO WORKERS Because of CSR, many companies have taken steps to
➢ High Cost improve the environment sustainability of their
The ability to create a machine that can simulate operations
human intelligence is no small feat. It requires plenty of
time and resources and can cost a huge deal of money. Common Corporate Social Responsibility Initiative
AI also needs to operate on the latest hardware and ➢ actions to protect the environment
software to stay updated and meet the latest ➢ actions to create a work environment that enhances
requirements, thus making it quite costly. employees’ quality of life
➢ Loss Of Jobs ➢ actions to build a diverse workforce
One application of artificial intelligence is a robot,
which is displacing occupations and increasing CSR Activities
unemployment (in a few cases). Therefore, some claim ➢ helps boost morale
that there is always a chance of unemployment because ➢ usually, companies in sr have grown their business
of chatbots and robots replacing humans. to the point where they can give back to society
➢ Makes Worker Lazy ➢ small-and-midsized businesses also create
Totally relying on artificial intelligence is possible for responsibility programs
workers using it. AI applications automate most tedious
and repetitive tasks. Since we do not have to memorize Key Elements of Successful CSR
things or solve puzzles to get the job done, we tend to ➢ Transparency
use our brains less and less. This addiction to AI can ➢ Measurements
cause problems to future generations ➢ Accountability
➢ Consistency and Dedication to Success

CHAPTER 9 UNDERSTANDING CORPORATE SOCIAL


CORPORATE SOCIAL RESPONSIBILITY AND RESPONSIBILITY
DATA PRIVACY Corporate Social Responsibility is a broad
concept that can take many forms depending on the
CORPORATE SOCIAL RESPONSIBILITY (CSR) company and industry
Also called Corporate Citizenship As important as CSR is for the community, it is
A self-regulating business model in which equally valuable for a company
companies make a concerted effort to operate in ways
that enhance rather than degrade society and
environment
Example DATA PRIVACY
STARBUCKS What Is Data Privacy?
➢ 100% ethically sourced coffee The right of an individual not to have private
➢ Global network of farmers and providing them 100 information about himself disclosed, and to live freely
million trees by 2025 from surveillance and intrusion.
➢ Creating a groundbreaking college program for its
employees The Data Privacy Act of 2012 or RA 10173
is a 21st century law to address 21st century
JOLLIBEE crimes and concerns. It:
➢ Leadership development for local organizations ➢ protects the privacy of individuals while ensuring
➢ Livelihood programs for small farmers free flow of information to promote innovation
➢ Environment-friendly initiatives and growth.
➢ Decent Housing and Disaster Relief for calamity- ➢ regulates the collection, recording, organization,
stricken regions storage, updating or modification, retrieval,
consultation, use, consolidation, blocking,
SM (SM Foundation) erasure, or destruction of personal data; and
➢ Education through scholarship programs and ➢ ensures that the Philippines complies with
donations of school buildings to public elementary international standards set for data protection
and high schools through National Privacy Commission (NPC).
➢ Health and Medical projects like medical missions
with a mobile clinic. The National Privacy Commission protects
➢ Renovations of hospital activity centers and religious individual personal information and upholds the right to
community projects privacy by regulating the processing of personal
information.
FOUR CATEGORIES OF CORPORATE SOCIAL
RESPONSIBILITY Data Protection Officer (DPO)
❖ PHILANTHROPIC is a legal requirement for personal information
Means to serve humanity controllers (PICs) and personal information processors
Includes: (PIPs), under the Data Privacy Act of 2012.
➢ Funding educational programs
➢ Supporting health initiatives, donating to causes DATA PRIVACY RIGHTS
➢ Supporting community beautification projects ❖ The Right to Be Informed
➢ Description of the personal data to be entered
❖ ETHICAL into the system
What is right, not just what is legal ➢ Exact Purposes for which they will be processed
Includes: (such as for direct marketing, statistical, scientific
➢ Treating all employees, stakeholders, and etc.)
customers ethically and with respect ➢ Basis for processing, especially when it is not
based on your consent
❖ ENVIRONMENTAL ➢ Scope and method of the personal data
Companies are bound to fulfill their economic processing
responsibility because awareness of environmental ➢ Recipients, to whom your data may be disclosed
issues is growing largely among the consumers ➢ Methods used for automated access by the
recipient, and its expected consequences for you
❖ ECONOMIC as a data subject
Prioritize doing good, not just making more money ➢ Identity and contact details of the personal
Producing goods and services that consumers need information controller
and want while making an acceptable profit ➢ The duration for which your data will be kept
➢ You also must be informed of the existence of
BENEFITS OF CORPORATE SOCIAL your rights as a data subject.
RESPONSIBILITY
❖ Improve Public Image
Shows that you’re a brand committed to helping ❖ The Right to Access
others. As a result, you’ll appear much more favorable ➢ The contents of your personal data that were
to consumers processed.
➢ The sources from which they were obtained.
❖ Increase Brand Awareness and Recognition ➢ Names and addresses of the recipients of your
More people will therefore hear about your data.
brand, which creates and increased brand awareness ➢ Manner by which they were processed.
➢ Reasons for disclosure to recipients if there were
❖ An Advantage Over Competitors any.
By embracing Corporate Social ➢ Information on automated systems where your
Responsibilities, you stand out from competitors in your data is or may be available, and how it may affect
industry you.
➢ Date when your data was last accessed and
❖ More Benefits for Employees modified
Your workplace will be a more positive and ➢ The identity and address of the personal
productive place to work, and by promoting things like information controller.
volunteering, you encourage personal and professional
growth. ❖ The Right to Object
❖ The Right to Erasure or Blocking
➢ Your personal data is incomplete, outdated, ❖ From Diversity, to Inclusion, to Belonging
false, or unlawfully obtained. Research shows clearly that getting diverse bodies
➢ It is being used for purposes you did not in the door won’t matter if the receiving culture doesn’t
authorize. resonate with safety, belonging and inclusion.
➢ The data is no longer necessary for the purposes ❖ Time to Step Out of your Lane
for which they were collected. “The cost of inaction is starting to become bigger
➢ You decided to withdraw consent, or you object than the cost of action” - Paulo Polman.
to its processing and there is no overriding legal
ground for its processing. Tech Companies Are Trying to Redefine Privacy
➢ The data concerns information prejudicial to the What'smissing is real competition on privacy
data subject — unless justified by freedom of CEOs of the big tech companies have all
speech, of expression, or of the press; or recently discovered the value of privacy. On Tuesday,
otherwise, authorized (by court of law) 30 April 2019, Mark Zuckerberg, announced his future
➢ The processing is unlawful. to make Facebook a "privacy-focused social platform".
➢ The personal information controller, or the This was followed by Google's Sundar Pichai demand
personal information processor, violated your that “privacy must be equally available to everyone in
rights as data subject. the world.” Meanwhile, Twitter's Jack Dorsey, has
described the General Data Protection Regulation
❖ The Right to Damages (GDPR) as "net-positive", while Apple had already
❖ The Right to File a Complaint positioned itself as the champion of privacy.
❖ The Right to Rectify
❖ The Right to Data Portability Q1 2019 Financial Reports
Google
SOCIAL RESPONSIBILITY OF TECH COMPANIES Google recently updated its Terms of Service
Social Responsibility and Privacy Policy, the company made sure that users
Is an ethical framework in which individuals or have no control over the collected data. If you think
corporations are accountable for fulfilling their civic duty Google is big, wait for what’s coming next.
and taking actions that benefit society
Facebook
FOUR MAIN AREAS OF SOCIAL RESPONSIBILITY Zuckerberg’s plans for a “privacy-focused vision
❖ Economic Aspects for the future of social networking” have raised concerns
Companies need to maintain strong economic about further dominance. We have already expressed
interests so they can stay in the business our doubts regarding Mark Zuckerberg’s newly founded
compassion for our privacy.
❖ Legal Aspects
A company must follow the law and have legal Amazon
obligation to do so. Amazon has not joined the privacy bandwagon
yet - but there’s no shortage or privacy scandals. Most
❖ Ethical Aspects recently, Bloomberg reported that Amazon workers
Acting ethically means going above and beyond have been listening to what you tell Alexa, Amazon’s
the legal requirements and meeting the expectations of voice-activated assistant.
society.
Apple
❖ Philanthropic Aspects In many ways, Apple has legitimated reasons to
This is the expectation that companies should promote itself as a more privacy friendly company. Its
give back to society in the form of charitable donations primary source of revenue still comes from the products
of time, money, and goods. it sells to us – mainly hardware, laptops, phones etc. –
which is a very different business model than that of
THE SIX SOCIAL RESPONSIBILITY TREND FOR Facebook or Google. However, this is not the entire
TECH COMPANIES by Jen Couldrey story.
❖ Alignment with the United Nations Sustainable
Development The need for Competition
The Sustainable Development Goals are the These financial results paint a very clear picture:
“World’s To-do List” the digital economy is composed by a small number of
“We have reached a defining moment in human big technology companies that have claimed dominant
history”, Secretary-General Ban Ki-moon said, calling positions. As a result, they are now able to impose terms
the SDGs a “promise by leaders to all people” and conditions onto their users, and they often do so in
❖ Social Purpose Ventures ways that exploit their data and infringe their privacy.
A social venture or social enterprise is a business
venture that prioritizes a social good along with business What is the Solution?
success ➢ When assessing a company’s powers, we need to
❖ Expanded Scope of Responsibility take personal data into account, focusing not only on
Tech companies seem to be getting in trouble a lot price, but on quality of service, innovation, and
these days. This is because the scope of what they are privacy.
being held accountable for is expanding. ➢ There should be heightened control over mergers
❖ Governance is King and acquisitions initiated by big companies,
Shows that governance is the number two factor including by assessing its impacts on data.
influencing a company’s reputation, after products and ➢ Regulators need to work towards creating conditions
services for genuine competition on key features such as
privacy, which would allow companies to compete to Compiles this data and create statistics about
provide the most privacy friendly services. how people use their site
➢ Regulators should address the harm that derives Cookies use this data to help build targeted ads
from lack of competition, including by adopting that you might enjoy
analyses of market powers that consider societal
concerns, privacy harms, as well as economic 5 USES OF COMPUTER COOKIES
aspects, including the opportunity costs. ➢ Customize Advertisements
➢ There should be coordinated national and ➢ Remember login usernames and passwords
international enforcement across antitrust ➢ Recognize devices
authorities and other regulatory bodies, such as data ➢ Track website and/or internet activity
protection or consumer protection authorities, to ➢ Streamline online shopping
avoid loopholes, and a ‘race to the bottom’.
➢ Ultimately, human rights and consumer TYPES OF COOKIES
organizations should be empowered, including ❖ Session Cookies
through collective proceedings, to question market ➢ Cookies deleted instantly after closing a browser
dominance which negatively affects individuals’ ➢ Also called temporary cookies
rights and obtain effective redress. ➢ Used to store temporary information
➢ Automatically deleted when browser was closed
WEBSITE COOKIES
What Are Cookies? Example:
➢ On the web, cookies are small files containing user ➢ Sites on the back and forward button, Shopping cart
data that help identify you and your computer contents
➢ This user data might include your username,
password, or email address ❖ Persistent Cookies
➢ When the cookie is exchanged between your ➢ Cookies stored for an extended period
computer and the network server, the server reads ➢ Also called persistent cookies
the ID and knows what information to specifically ➢ Not deleted once you close your browser
serve to you ➢ Stored on your computer until the expiration date
➢ Also known as internet cookies, web cookies, or until you delete them manually
browser cookies or HTTP cookies ➢ Used to remember, information such as
➢ Are small pieces of information in the form of a text username and password
file, containing a string of letters and numbers
➢ Sent from a website to the person’s internet browser ❖ First-Party Cookies
➢ Each cookie is unique ➢ Directly stored by the website you're on
➢ Can’t pass viruses or capture personal information ➢ Enable website owners to save basic user data
on your computer such as usernames, passwords, and language
➢ Enables the websites to work more efficiently, selections
recognizing and remembering certain information, ➢ Cookies directly from the website’s domain you
such as login details are on.
➢ Are very common, and you probably have
thousands of them stored right now on your ❖ Third-Party Cookies
computer ➢ Transmitted to websites other than the one
you're on
Cookies are used for… ➢ Contain the same code as first-party cookies but
❖ Session Management are produced by third-party websites
Includes things like keeping you logged in to ➢ Goal is to track user activities to create user
accounts and remembering your preferences. profiles to be used for remarketing & lookalike
A process of securely carrying your information audience targeting
through various sessions. ➢ Cookies related to external domains
Example: ➢ Not issued by the website’s domain you are on.
➢ Websites that will offer to remember your
information, so you don’t need to enter your ❖ Zombie Cookies
username and password on each visit ➢ Zombie cookies are exactly what they sound like
➢ Shopping cart content will not disappear when you ➢ Cookies that come back to life after you thought
leave the website they were gone
➢ Zombie cookies don’t get cleared because
❖ Personalization they’re hiding outside of your regular cookie
If you view certain items or areas of a website, storage
cookies use that data to build targeted ads for products ➢ You need to delete the flash cookie that
you’re more likely to buy. recreates these zombie cookies
Storing user data such as age, gender, location, ➢ A zombie cookie is an HTTP cookie that returns
interests, preferred theme, layout, font size or similar to life automatically after being deleted by the
data. user.
➢ You need to delete the flash cookie that
❖ Tracking recreates these zombie cookies
Shopping sites use cookies to tracks the items ➢ Can track activities between browsers
you previously viewed, which allows it to suggest other
items you might like, and store items in your shopping ❖ Supercookies
cart while you keep browsing. ➢ As its name suggests, supercookies serve a
Tracks all user activities and behavior on different and more sinister functionality than
websites, search engines, or social media regular cookies
➢ You cannot delete supercookies because they Why Companies Update Their Privacy Policy?
are not stored on your device, and ad or script Companies update their privacy policies to be
blocking software cannot stop them compliant with the data protection laws and to inform
➢ Supercookies are very dangerous because they users of their rights and how their data is collected,
have great potential for causing privacy stored, and used.
violations.
➢ Supercookies usually contain a user’s metadata. International Privacy Laws
Metadata is information ❖ General Data Protection Regulation (GDPR)
➢ about a user’s request, like the site they are It is a European Union privacy law which protects
attempting to visit and the time of their attempt. the personal data of residents of the EU.
➢ A type of tracking cookie inserted into an HTTP
header by an internet service provider (such as ❖ Children's Online Privacy Protection Rule
Verizon in 2014) (COPPA)
➢ Can’t be removed by deleting cookies a privacy act which the primary goal protecting
➢ Can’t be avoided by switching internet browsers the personal information of children under the age of 13.
➢ Can be avoided by using virtual private network If your website does not apply to people in this
(VPN) age-range then your privacy policy should state this.

What Do Web Cookies Look Like? ❖ California Customer Privacy Act (CCPA)
➢ Each cookie has its own attributes: name, value, and It is a privacy law which protects the rights and
expiration date personal data of the residents of California.
➢ Internet browsers limit cookies to 4096 bytes (4KB)
in size ❖ California Online Privacy Protection Act
➢ A cookie containing your login details could look like (CalOPPA)
this: Recorded 2021-01-12 a privacy law which made posting privacy
username=John hash=4c70884bd91727c931b916 policies online mandatory.
16c2d2 b4d8 rememberme=yes
❖ Personal Information Protection and Electronic
How Long Do Cookies Last? Documents Act (PIPEDA)
➢ Session or temporary cookies are deleted It is a privacy law which applies to private sector
automatically once you close your browser businesses in Canada.
➢ Other cookies have a specific time of expiry in the
form of date and time ❖ Australian Privacy Act 1988
➢ along with their names and values is a privacy law which help to protect the privacy
➢ If the website doesn’t set the expiry date, the of Australian residents and their personal data.
browser will delete the cookie once it’s closed
➢ Average lifetime is about 30 days ❖ RA 10173 or the Data Privacy Act of 2012
➢ Can be set to last for over a year law that seeks to protect all forms of information,
be it private, personal, or sensitive. It is meant to cover
Who Can Access and View My Cookies? both natural and juridical persons involved in the
➢ Only the domain name that saved the cookies on processing of personal information.
your hard drive can access and read them
➢ They can’t be accessed or examined by other CHAPTER 10
websites IT AS A WEAPON AGAINST A PANDEMIC
➢ Even if you don’t see a warning about the use of
cookies, chances are the website still uses some Information Technology
types of cookies Information technology (IT) is a broad field that
covers all functions and processes relating to computers
Can Cookies Be Blocked or Deleted? or technology in an organization or business.
➢ Most websites rely on the use of cookies to allow IT includes all aspects of sharing information
users to access some of the websites’ essential over a variety of networks and the internet as a whole.
features These include physical hardware, operating systems,
➢ Blocking or disabling cookies can limit your applications, storage, databases, servers, etc.
experience on those websites and cause a lot of
annoyances How Technology is a Weapon Against Pandemic?
➢ Such as having to re-enter your login details each Big Data
time you visit a website Big data is defined as having a huge set of data
➢ Modern browsers allow you to manage cookies and that is possible through technology.
set your preferred tolerance
➢ Most browsers are initially configured to accept Using Big Data to Understand the Virus’ Genetic
cookies Tree
➢ You can also choose to be notified each time a new Understanding how this new virus, called SARS-
cookie is to be received CoV-2, behaves is critical for defining measures that can
➢ Different websites have their own cookie policies stop its spread.
➢ Some of the options include: By sharing the genetic sequencing of 700 cases
➢ To accept (enable) or always block (disable) of the virus with the scientific community, the project has
cookies contributed to corroborating that the virulence of the
➢ To view them and selectively accept or delete them virus has not changed as the virus has spread to other
via cookie manager countries.
➢ To delete all cookies
Machine Learning ❖ Contact Tracing
Machine Learning is an Application of Artificial Function: Identifies and tracks individuals who might
Intelligence (AI) that gives devices the ability to learn have come into contact with an infected person
from their experiences and improve their self without Digital technology: Global positioning systems; mobile
doing any coding. phone applications; real-time monitoring of mobile
devices; wearable technology
Machines Learn to Find a Therapy Advantages: Identifies exposed individuals for testing
Using a machine learning model to develop and quarantine; tracks viral spread
therapies based on antibodies from patients who have
recovered from the disease. Specifically, they have used ❖ Quarantine and Self-Isolation
AI technology to analyze more than five million immune Function: Identifies and tracks infected individuals, and
cells as they search for those that are able to produce implements quarantine
antibodies that help patients recover. Digital Technology: Artificial intelligence; cameras and
digital recorders; global positioning systems; mobile
Telemedicine phone applications; quick response codes
Telemedicine refers to the practice of caring for Advantages: Isolates infections; restricts travel
patients remotely when the provider and patient are not
physically present with each other ➢ China' s QR Code System
➢ Hong Kong Quarantine Wristband
Keeping Hospitals Afloat with Telemedicine
Telemedicine is one of the alternatives that ❖ Clinical Management
communities are turning to avoid overwhelming Function: Diagnoses infected individuals; monitors
hospitals with an unmanageable influx of patients. clinical status; predicts clinical outcomes; provides
Telemedicine is streamlining the diagnosis and capacity for telemedicine services and virtual care
treatment processes, making them faster and easier: Digital Technology: Artificial intelligence for
patients merely need to open an application, describe diagnostics; machine learning; virtual care or
their symptoms, and wait for a doctor to get back to them telemedicine platforms
via virtual consultation. Advantages: Assists with clinical decision-making,
diagnostics, and risk prediction; enables efficient service
ADVANTAGES PROVIDED BY IT AGAINST THE delivery; facilitates patient-centered, remote care;
PANDEMIC facilitates infection control
❖ Tracking and Forecasting Outbreaks
Function: Tracks disease activity in real time ➢ AI-assisted CT
Digital technology: Data dashboards; migration maps; This technology processes CT images in seconds,
machine learning; real-time data from smartphones and differentiating COVID-19 from other lung diseases and
wearable technology speeding up the diagnostic process substantially.
Advantages: Allows visual depiction of spread; directs
border restrictions; guides resource allocation; informs ➢ Telemedicine
forecasts Telemedicine is the use of remote and information
technology to provide remote clinical care to patients.
Predictive Analytics
➢ Bluedot ❖ Medical Equipments and Supplies
It was a Canadian AI company called BlueDot that Function: Medical delivery drones are being used in
developed an AI program that alerted the world to certain parts of the US to distribute PPE and medical
coronavirus after the first case was detected in China on equipment to frontline health care workers treating
December 31st, 2019. This program was designed to coronavirus patients.
predict infectious diseases and locate and track their Digital Technology: Artificial intelligence; machine
spread learning
Advantages: Amid the pandemic, Eagle Hawk
❖ Screening For Inspection developed a new drone that cleans. The drone can
Function: Screens individuals and populations for spray disinfectants in large public areas such as
disease stadiums and sports arenas, reducing the spread of
Digital technology: Artificial intelligence; digital infection to workers. Additionally, drones are employed
thermometers; mobile phone applications; thermal to ensure that civilians follow social distancing
cameras; web-based toolkits measures.
Advantages: Provides information on disease ➢ Medical Delivery Drones
prevalence and pathology; identifies individuals for ➢ Eagle Hawk Drone
testing, contact tracing, and isolation
❖ Share Information
➢ Thermal Camera Function: Providing information about the coronavirus
Used to capture thermal images of people in real and to provide answers to questions frequently asked
time, rapidly detecting individuals with a fever. about the sickness, such as current infection rates and
what can be done to protect oneself.
➢ Thermometers Digital Technology: Global positioning systems;
Non-contact thermometers that help you mobile phone applications; Chatbot
measure the temperature from the forehead without Advantages: Get information on different topics
coming in contact with the skin
➢ WHO Chatbot
➢ AI Alibaba CT scan ✓ Messenger
AI diagnostic tool that can identify COVID-19 Click ‘Get Started’ to World Health Organization
characteristics in CT scans official Facebook page or https://m.me/who
✓ Viber ❖ Supply Chain
Join the WHO Viber service: The COVID-19 has altered the global supply chain
https://vb.me/82e535 dramatically. Distancing and quarantine regulations
✓ WhatsApp have forced the closure of several factories. Although
Send “hi” to +41 79 893 18 92 or food demand and medical and personal protective
https://wa.me/41798931892?text=hi equipment demand are increasing, certain countries
have put varying levels of export bans on these
❖ Communication products.
Function: These applications are being used both to
organize meetings for teams of remote workers and to
help loved ones stay in touch with one another.
Digital Technology: Global positioning systems;
mobile phone applications
Advantages: Witness to an unleashing of creativity as
users have organized concerts, workshops, virtual get
togethers, birthday parties and even weddings for which
guests have received invitations with a link to a site
where they can see the ceremony streamed.

➢ Communication Platforms: Skype, MS Teams,


WhatsApp, Google Hangouts, Duo, Webex, Zoom,
etc.

DISADVANTAGES OF INFORMATION
TECHNOLOGY (PANDEMIC)
❖ Online Classes and Works
Performing this level of data without sufficient
technology infrastructure and applications is difficult, so
the use of various kinds of applications pressure
organizations to realize new technology

❖ Cyber Bullying
it is easy now to bully and threaten people in social
networking sites that this has become much easier for
internet users all over the world

❖ Fake News
Social media created an environment where anyone
with an agenda can publish falsehood as if they were
truths. People can be paid to post fake news on behalf
of someone else or automated programs, often called
bots, can publish auto-generated fake news.

❖ Scamming Activities
Involve scammers pretending to be legitimate online
sellers, either with a fake website or a fake ad on
genuine retailer sites.

❖ Distraction
❖ Dependency On Technology
❖ Discipline
❖ Digital & Contactless Payment
COVID-19 also turned online shopping around the
globe. Several delivery restaurants and companies
within China and the USA are launching numerous
delivery units and services where products are hand-
picked and dropped off at a selected position as an
alternative human-to-human interaction. Such online
purchasing necessitates the use of a robust logistical
system.

❖ Remote Work
In addition to preventing the propagation of COVID-
19 infections, remote work saves time and allows for
greater flexibility. Employers can choose to cut lease
expenses and attract employees from counties with low
labor expenses if remote work becomes more popular
following the COVID-19 epidemic.

You might also like