0% found this document useful (0 votes)
103 views9 pages

Lite Finals

This document discusses several topics related to information technology and its influence on culture and society. It defines cyberbullying as unwanted hostile behavior online to gain control over others. It also discusses internet profiles, netiquette rules for proper online conduct, and the Association of Computing Machinery's 24 imperatives for professional ethics that IT professionals should follow.

Uploaded by

jmibus3374val
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
103 views9 pages

Lite Finals

This document discusses several topics related to information technology and its influence on culture and society. It defines cyberbullying as unwanted hostile behavior online to gain control over others. It also discusses internet profiles, netiquette rules for proper online conduct, and the Association of Computing Machinery's 24 imperatives for professional ethics that IT professionals should follow.

Uploaded by

jmibus3374val
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

LITE 111

1ST YEAR - 1ST SEM (FINALS)


CHAPTER 5

IT, CULTURE, AND SOCIETY ➔ Unwanted, hostile behavior done by


individuals to other people in the hope of
● Analyze how IT influences culture and social gaining control over them.
behavior; ➔ Done online
● Enumerate the rules of netiquette;
● Describe cyberbullying and identify the steps to ● INTERNET PROFILE
combat it; and ➔ (Internet identity, online identity, or
● Familiarize themselves with and demonstrate the internet persona) – profile created by
imperatives of professional conduct for IT internet users to establish their social identity
professionals. in online communities, social media sites,
and other websites.
THE INFLUENCE OF IT ON CULTURE AND SOCIAL
BEHAVIOR
NETIQUETTE
● The sudden surge of ICT has created an influence on
● Combination of the words internet and etiquette
how people’s lives have been changed, for better or
● It describes how one should act online
for worse.
● It brings in policies for all the features and qualities of
● Due to the high number of SMS being sent and
the internet.
received on a daily basis, Philippines is formerly
➔ World Wide Web (WWW)
called the ”texting-capital of the world” but now it is
➔ Email services
dubbed as the “most social nation” (Opera Mini, 2015)
➔ File Transfer Protocol (FTP)
● The attitude and behavior of people are evolving to
➔ Chat rooms
meet technology’s evolution
➔ Instant messaging

INFLUENCE ON CULTURE
DIFFERENT TYPES OF NETIQUETTE
● ONLINE REVIEWS
➔ With the proliferation of online information, it NETIQUETTE FOR SOCIAL MEDIA
is easy to find details on a certain things
➔ technology affects the basic human behavior ➔ The Personalize IT Rule
of decision-making ➔ The Off-limits Rule
➔ The Tag - You’re IT Rule
● WEBLOGGING/SOCIAL MEDIA
➔ Affecting social interaction NETIQUETTE FOR EMAIL SERVICES, CHAT ROOMS, AND
INSTANT MESSAGING
● YOUTUBE LEARNERS
● Guidelines in composing an email
➔ YOUTUBE - Most popular social media sites
➔ Recipient (to whom the email will be sent)
➔ Influences the acquisition of knowledge and
➔ Subject Line (gives hint of the purpose of the
learning of certain skills sets
email)
➔ Salutation (serves as greetings to the
INFLUENCE ON SOCIAL BEHAVIOR
recipient)
➔ Body of the email (must be short and
● CYBERBULLYING
specific)
➔ Serious phenomenon brought about by
social media

RAI 1
LITE 111
1ST YEAR - 1ST SEM (FINALS)

➔ Closing Line (contains courteous language ➔ Section 4: principles involving compliance


as form of farewell) with this Code are laid out
➔ Sender Information
➔ Formatting ** 1) GENERAL MORAL IMPERATIVES
➔ Attachment (if the user wishes to include ➔ Contribute to society and human well being.
files such as documents, images, etc.) ** ➔ Avoid harm to others
➔ Delete/Trash Bin ** ➔ Be honest and trustworthy.
➔ Be fair and take action not to discriminate.
➔ Honor property rights including copyrights
NETIQUETTE FOR CHAT ROOMS AND INSTANT and patents.
MESSAGING ➔ Give proper credit for intellectual property.
➔ Respect the privacy of others.
● Guidelines for using instant messaging ➔ Honor confidentiality.
applications
➔ Think long and hard before accepting a 2) MORE SPECIFIC PROFESSIONAL
private conversation. RESPONSIBILITIES
➔ In a group chat, include only those that are in ➔ Strive to achieve the highest quality,
your friends list. effectiveness and dignity in both the process
➔ If possible, do not give your personal and products of professional work.
information while chatting, including your ➔ Acquire and maintain professional
photos or “selfies.” competence
➔ When in doubt, save a copy or make a ➔ Know and respect existing laws pertaining to
back-up of your conversation (chat). professional work.
➔ You must log out from your account at all ➔ Accept and provide appropriate professional
times, especially if you are in public place, review.
such as computer shop. ➔ Give comprehensive and thorough
➔ You may opt to customize your account evaluations of computer systems and their
settings from public to private account. impacts, including analysis of possible risks.
➔ Honor contracts, agreements, and assigned
PROFESSIONAL ETHICS responsibilities.
➔ Improve public understanding of computing
● IT professionals who follow an ethical practice as they and Its consequences.
are the front liners, support, and backend of ICT ➔ Access computing and communication
● Association of Computing Machinery (ACM) has resources only when authorized to do so.
identified 24 imperatives of professional conduct for IT
professionals. 3) ORGANIZATIONAL LEADERSHIP IMPERATIVES
➔ Section 1: outlines the fundamental ethical ➔ Articulate social responsibilities of members
considerations of an organizational unit and encourage full
➔ Section 2: provides additional, more specific acceptance of those responsibilities.
considerations of professional conduct ➔ Manage personnel and resources to design
➔ Section 3: intended specifically for and build information systems that enhance
individuals who have leadership role, the quality of working life.
whether in the workplace or in a volunteer ➔ Acknowledge and support proper and
capacity such in organizations like ACM. authorized uses of an organization’s
computing and communication resources.

RAI 2
LITE 111
1ST YEAR - 1ST SEM (FINALS)

➔ Ensures that users and those who will be


affected by a system have their needs
clearly articulated during the assessment
and design of requirements; later, the system
must be validated to meet requirements.
➔ Articulate and support policies that protect
the dignity of users and others affected by a
computing system.
➔ Create opportunities for members of the
organization to learn the principles and
limitations of computer systems.

4) COMPLIANCE WITH THE CODE


➔ Uphold and promote the principles of this
Code.
➔ Treat violations of this code as inconsistent
with membership in the ACM.

RAI 3
LITE 111
1ST YEAR - 1ST SEM (FINALS)
IT TRENDS, ISSUES & CHALLENGES

WHAT IS MEANT BY IT TRENDS? TWO MAJOR TRENDS IN INDUSTRY SECTOR

TRENDS - A general direction in which something is 1. INTERNET OF THINGS (IoT)


developing or changing. ➔ Becoming an increasing topic of
conversation both in workplace and in a
Variety of Trends: society at large.
➔ Industry ➔ Can give an impact of how we live and
➔ Banking work.
➔ Education ➔ Examples: Sensors, electronics, and
➔ Business robotics
➔ Health
SUMMARY FOR THE SUPPORTING ARTICLES:
TRENDS: INDUSTRY
Groups To Mull Over IoT Development In The Philippines

● It is anticipated that expenditure on the Internet of


Things (IoT) in the Philippines will increase 13 times
from its market value in 2014.
● Industry Platform Pte. Ltd (IPPL) – a Singapore
incorporated firm focused on the global
telecommunications sector.
● Ellaine Cedillo – the Head Organizer of IPPL
● IPPL said it forecast IoT in the Philippines to grow
from $55.1 million in 2014 to $766.8 million in 2020

Ionics, IBM team up on high-tech products

● With the help of cloud, mobile, and big data analytics,


a division of electronics manufacturer Ionic Inc. has
partnered with global technology giant IBM to create
cutting-edge products that run on the Internet of
Things (IoT).
● The Internet of Things (IoT) is a network of physical
objects, such as devices, home appliances, or
industrial equipment, that include embedded
technology that enables communication and
interaction.
● Blue Mix – an implementation of IBM’s open cloud
architecture based on open source of platform.
● Cloud Foundry - delivers enterprise-level service
that can easily integrate with cloud applications.
● Lawrence Qua – Chair & Chief Executive Officer of
Ionics-EMS
● Big Data – refers to the voluminous amount of data
from traditional and digital sources that could be
mined for valuable insights on human behavior such
as trends, patterns, and associations, in turn boosting
business intelligence.

RAI 1
LITE 111
1ST YEAR - 1ST SEM (FINALS)

● Luis Pineda – President and Country General ● Examples: Internet of Things (IoT) , Artificial
Manager at IBM Philippines Intelligence, Robotics
● Ionic-EMS and IBM – had a long partnership that
began in 1990 and continued over the decades with TRENDS: BANKING
evolving programs and technologies.
ONLINE BANKING
2. IT AUTOMATION
● Also known as “internet banking” or “web banking”
➔ Help many companies achieve greater ● Allows a user to execute financial transactions via
productivity among its employees by using the internet
computers and software programs to do the ● Offers a customer just about every service
task. traditionally available through a local branch, including
➔ Examples: Accounting Systems, Production deposits, money transfers, and bill payments
Systems, and Security Systems
SUMMARY FOR THE SUPPORTING ARTICLES:
SUMMARY FOR THE SUPPORTING ARTICLES:
More Filipinos warming up to online banking
Makati fully implements biometric timekeeping system

● The Makati City government has finally implemented ● 3 out 4 Filipinos are now comfortable conducting
the use of the Automated Biometrics Timekeeping online banking transactions, based on a Citigroup
System in monitoring daily attendance of employees online poll.
working in its offices at the City Hall complex in ● As od September 2012, there’s already a 1,000,000
Barangay Población. mobile banking users for Citi in Asia.
● According to Makati Mayor Jejomar Binay, the move
● One -Time Personal Identification Number (PIN) –
was in keeping with the commitment of the city
government to harnessing technology to promote a unique six digit PIN, sent via SMS, which allows
transparency and efficiency in its operations and users to access their account details and complete
services. online transactions via Citibank online.
● He also said that, aside from ensuring the accuracy of ● “Call Me” – it’s a service for clients who wish to apply
daily time records and thwarting attempts of time for another credit card, to those who have yet to own
theft, the new time keeping system also promotes fast a Citibank credit card.
and efficient payroll calculations.
● According to City Personnel Officer Vissia Marie
Aldon, using the system eliminated the possibility of TRENDS: EDUCATION
employees making ‘proxy’ time-in ot time-out for other
employees. ● Learning Management System (LMS) - To deliver,
manage and keep track students’ progress. It
Property consultant bares future of work releases to e-learning.
● E-Learning – electronic technology to access
● According to a document, telecommunication
educational curriculum outside of traditional
companies and property developers will be having
closer collaboration in developing the future classroom.
workplace. ● Distance Learning – refers to a program, course or
● In a research paper titled “The Future of Work”, Jones degree that is delivered online.
Lang La Salle Inc. head of corporate solutions
research in Asia Pacific Susan Sutherland said the
traditional office workplace is gradually going to be
replaced by a new concept anchored on technology
developments.

RAI 2
LITE 111
1ST YEAR - 1ST SEM (FINALS)

SUMMARY FOR THE SUPPORTING ARTICLES: TRENDS: HEALTH

Global Filipino School enhance e-learning with cloudfone ● E-Health (eHealth)


tablets ➔ Refers to the use of information and
communication technology in health care.
● Under global Filipino schools are provided with ➔ Synonym for Health IT
unparalleled online connectivity to give homeroom
teachers access to limitless teaching and learning A. Used to improve and extend health
engagement available on the internet. care and health information.
B. Used to alert, monitor, and control
PLDT Enterprise rolls out e-learning program to aid the spread of communicable
millineal students. disease.
C. Used for the exchange of health
● Offers PLDT IGate, Smart Wifi, Smart M2M sims, data
Smart Prepaid sims customized website with D. Used to promote continuous
e-commerce capability to help establish online medical training, education, and
preference. research for health care providers.

TRENDS: BUSINESS ISSUES AND CHALLENGES: INDUSTRY

● Offers PLDT IGate, Smart Wifi, Smart M2M sims, ● One major challenge brought up by the introduction of
Smart Prepaid sims customized website with computers at work is preserving the security and
e-commerce capability to help establish online integrity of the computer system.
preference. ● Email exchanges or conversation in local chat rooms
➔ It covers a range of different types of are typically used as means of communication in
businesses, from consumer based retail office settings.
sites and auction or music sites, to business ● This situation makes it possible for malicious software
exchanges trading goods and services to be distributed throughout the entire corporation,
between corporations. whether consciously or unintentionally.
➔ E-commerce businesses to meet customers ● Any software that has the potential to harm a
where they are. While it may seem like computer system is referred to as malicious software,
everything in commerce is evolving, we or malware.
narrowed it down to the biggest trends that
will affect businesses in the coming months TYPES OF MALWARES:
and years.
➔ Powering online retail forward. ● VIRUS
➔ A computer software that has the ability to
WHAT ARE THE TRENDS IN E-COMMERCE MARKET? replicate itself and spread infection without
● The e-commerce landscape is getting more the user’s knowledge or consent.
competitive. Running a business without having a ➔ It has the ability to corrupt or delete data on
social media presence is almost unheard. a computer, propagate to other computers
● The importance of social media in business’ via email, or even completely wipe out a
marketing will likely continue to increase the market. hard drive.
An increasing number of businesses are turning to
social media influencers to market their product.

RAI 3
LITE 111
1ST YEAR - 1ST SEM (FINALS)

● WORM FIVE (5) COMMON PROBLEMS FACED BY STUDENTS IN


➔ A computer worm is a type of malware that E-LEARNING
replicates itself and spreads to other
computers while still functioning on infected 1. ADAPTABILITY STRUGGLE
ones. ● Students with a “traditional” mindset find it
➔ It reproduces itself to infect other systems. difficult to adapt to e-learning.
● Understanding the benefits of eLearning and
● TROJAN (Trojan Horse) discussing them with peers may change their
➔ Malware that poses as trustworthy programs mindset.
or software. ● Online discussions demand springing into
➔ Attackers have access to all actions that a action, rather than passive listening and
legitimate user could perform once they are notes taking are expected in a traditional
within the network, including exporting files, classroom.
editing data, deleting files, and otherwise
changing the contents of the device. 2. TECHNICAL ISSUES
● Many students are not provided with the high
● SPYWARE bandwidth or strong internet connection that
➔ It is any software that installs itself on your online courses require.
computer and starts covertly monitoring your ● Weak monitors make it hard to follow the
online behavior without your knowledge or Course Management System and their
permission. learning experience becomes problematic.
➔ It is a kind of malware that secretly gathers ● Some of them don’t even own computers
information about a person or organization and seek help in Learning Resource Centers
and relays this data to other parties. for technical assistance.

● RANSOMWARE 3. COMPUTER LITERACY


➔ It is a type of malicious software (malware) ● Lack of computer literacy is a major issue
that threaten to publish or block access to among students today.
data or a computer system, usually by ● Many students cannot operate basic
encrypting it, until the victim pays a ransom programs such as Microsoft Word and
fee to the attacker. PowerPoint.
➔ In many cases, the ransom demand comes ● Technical proficiency is a must for following
with the deadline. online courses.
● Having a fundamental knowledge of
ISSUES AND CHALLENGES: BANKING computer hardware would help them
participate in online classes without
● With online learning being accepted into schools as problems
part of the teaching and learning methodology, one of
the things that schools need to consider is monitoring 4. TIME MANAGEMENT
and management. ● Most adults prefer web-based learning
● However, the use of IT in today’s education system programs for their place and time flexibility,
still possess issues and challenges to both students but they rarely have the time to take the
and teachers. courses due to their various everyday
commitments.

RAI 4
LITE 111
1ST YEAR - 1ST SEM (FINALS)

● A regular schedule planner would be a ● With this concerns regarding data security
significant help to these learners, as they and data confidentiality of patients have
could even set reminders for their courses increased.
and assignments.
WHY THERE IS SUCH AN INTERNET IN PATIENT
5. SELF MOTIVATION RECORDS?
● Students need to find motivation to follow the
new educational trends and also properly ● According to the International Association of Privacy
equip themselves for future challenges in Professionals, “a medical record is more valuable
their education and careers. than credit card on the black market.”
● Only a positive attitude will help them ● According to the World Privacy Forum, “a medical
overcome the challenges in eLearning, record, including a name, address, Social Security
though this is hard to practice, students need number, and health ID typically goes for & 50 on the
to understand that it is necessary. online black market [whereas] an active credit card
sells for just $3.”
ISSUES AND CHALLENGES: BUSINESS
LAW THAT PROTECTS OUR DATA PRIVACY
● How did Facebook know what you were looking at (PHILIPPINES)
in those sites?
➔ Adware – a program designed to display ● Data Privacy Act (DPA) of 2012
advertisements on your computer, redirect ➔ Implements data protection measures in
your search requests to advertising their data processing systems to protect
websites, and collect marketing-type data confidentiality of their patient’s personal
about yourself. information and medical records.
➔ Violation of data privacy involves penalties.
● Is it a bad things? ➔ Under this law, the penalty for unauthorized
➔ It depends. disclosure of personal information is P1, 000,
➔ An adware can be considered as a legitimate 000.
alternative offered to consumers who do not ➔ The penalty exceeds to P2, 000, 000 if the
wish to pay for software. acts involves sensitive personal information.
➔ There are many ad-supported programs,
games or utilities that are distributed as LAW THAT PROTECTS OUR DATA PRIVACY (UNITED
adware, which is often called as freeware. STATES):
➔ Some applications have pop-up
advertisements that if a user wishes to ● Health Insurance Portability and Accountability
remove them, a certain fee should be paid to Act (HIPAA) in 1996
make the apps ad-free. ➔ Designed to promote the confidentiality and
portability of patient records, as well as to
ISSUES AND CHALLENGES: HEALTH develop data security standards for
consistency in the Healthcare industry.
● Patients are kept confidential.
● However, with the introduction of technology, and with
hospitals and clinics leaning towards automation,
patient records have shifted from paper to digital.

RAI 5
LITE 111
1ST YEAR - 1ST SEM (FINALS)

IMPORTANCE OF KNOWING IT TRENDS, ISSUES AND


CHALLENGES

● You’ll continually gain new skills by following trends,


including how to use new technologies, engage in
new activities, and increase your efficiency.
● This will give you more options to choose from, which
will allow you to try more things out and use them to
come up with fresh ideas.
● Problems and challenges are vital components of life
that help you gain experiences, teach you lessons,
and become stronger and wiser.
● Problem force us to change and evolve.
● People’s desire for a life free of difficulties is their
main challenge.

RAI 6

You might also like