MODULE 7: IT, CULTURE AND THE SOCIETY Online Banking – allows a user to execute financial transactions via the
Key Terms internet.
ACM – Association of Computing Machinery Pressure Sensor – is a sensor that helps determine the weight or impact
API – Application Programming Interface of a certain object.
ATAS – Automated Time and Attendance System Proximity Sensor – is a sensor that is able to detect objects within a
DBG – Disruptive Business Group certain range even if that object is not physically touching the sensor yet.
DTTB – Doctor-to-the-Barrio Ransomware – is a type of malware that can block access to the victim’s
e-Payment – Electronic Payment data.
FHSIS – Field Health Service Information System Robotic Process Automation (RPA) – is the application of technology
IBM – International Business Machines Corporation that allows employees in a company to configure computer software or a
IoT – Internet of Things “robot” to capture and interpret existing applications for processing a
LMS – Learning Management System transaction, manipulating data, triggering responses and communicating
MHealth – Mobile Health with other digital systems.
PIN – Personal Identification Number Sensors – are hardware devices that have the capability to measure an
RPA – Robotic Process Automation event, object or any physical quality that is happening.
TMS – Transport Management Solutions Smart Cities – are cities that adapt to IoT in traffic management, waste
WAH – Wireless Access for Health disposal, even community monitoring for the security of the city’s
Automation – refers to the use of equipment such as machines or residents.
computers to accomplish previously human-exclusive tasks. Smoke sensor – is a sensor that is used to detect the presence of
Cloud Computing – is a tool in which users access big volumes of files dangerous fumes such as carbon monoxide caused by fire.
and applications over the internet using multiple devices. Spyware – is a software that aims to gather information about an
Electronic Commerce (e-commerce) – is a term for any type of organization or a person without his or her knowledge.
business or commercial transaction that involves the transfer of Temperature Sensor – is capable of measuring temperature as well as
information across the internet. detecting any rise or fall of it.
Electronic Learning (e-learning) – is utilizing electronic technologies to Touch Sensor – is a sensor that activates itself and becomes capable of
access educational curriculum and facilitate learning outside of a doing its function.
traditional classroom. Ultrasonic Sensor – is a sensor that detects sound waves such as how
Freeware – refers to ad-supported programs, games or utilities that are radars and sonars pick-up sounds.
distributed as adware. THE IMPACT OF IT ON THE SOCIETY
Infrared Sensor – is a sensor that detects infrared light. It is usually used The seven major trends for 2017 are as follows:
along with an infrared light source. 1. IoT and smart home technology
Internet of Things (IoT) – refers to a network of physical objects like 2. Augmented reality and virtual reality
gadgets, consumer appliances or industrial equipment with embedded 3. Machine learning
technology that allows communication and interaction with each other. 4. Automation
Level Sensor – is a sensor that can detect the level of liquids, fluids, 5. Big data
grainy or granular materials such as powders. 6. Physical-digital integrations
One-time PIN – acts as a second-level authentication method to ensure 7. Everything on demand
that online transactions are secure. Majority of organizations and companies nowadays have taken these
trends into account, shifting manual business processes to automated
ones and using ICT to improve their products and services. Among the With improved business processes and employee productivity, it is
seven trends, the internet of things (IoT) and automation seem to have only natural for organizations to adopt IoT. In a study conducted by IoT
greatly influenced present-day culture and society; thus, it is imperative Analytics, it was found that most of the 1,600 IoT projects are applied in
to discuss these thrusts in detail. cities (Scully, 2018).
Internet of Things (IoT) Topping the list are as follows:
Internet of Things (IoT) is a set-up of devices and objects which are 1. Smart cities
connected together in a given network. Their connection, often wirelessly, Smart cities have adopted IoT in traffic management, waste
is possible using both hardware and software. disposal and even community monitoring for the security of the
The hardware part is often made up of sensors that collect data, city’s residents.
which are then sent to other devices for analysis and possible 2. Connected industries
interpretation. Popular examples are health wearable devices such as step The oil and gas industry is identified as one of the front-runners for
counters that are connected to a mobile phone via Bluetooth. An app IoT connectivity which includes remote access to heavy equipment
installed in the phone records the results in a daily, weekly or monthly and machinery, from manufacturing to production.
basis for the mobile phone user to keep track of his or her progress. 3. Connected buildings
Capabilities of IoT Connected building projects involve facility-automation to reduce
A major requirement of IoT is a strong internet connection, as all energy costs.
devices must be able to communicate with one another for the upload and 4. Connected cars
download of needed data. But aside from connectivity, IoT should also be Latest car models equipped with sensors and network connectivity.
capable of the following (Mattern & Folerkemeier): Majority of projects relating to smart vehicles revolve around
1. Integration across technology and business vehicle diagnostics and monitoring.
Sensors can be used to help improve business processes, such as 5. Smart energy
machines used for manufacturing and production, security systems Majority of smart energy project focus on developing smart grids for
and even simple ones like automatically turning on and off a light renewable energy and infrastructure.
switch. Challenges of IoT
2. Data analysis and synchronization But while things may look good using IoT, there are issues raised in
IoT should be capable of providing analytics to help organizations in adopting it fully. Texas Instruments, Inc. (2016) has identified six
their decision-making. However, for this to be effective, data must challenges in its implementation:
be synchronized to allow integration with all of the business 1. System requirements
aspects, including top management, operations and even customer Industries normally identify different requirements, especially
relations (Markkula, 2016). depending on the type of industry they belong to. Those in the food
3. Security and service industry may require monitoring or perishable goods, from
To improve security, IoT devices are usually divided into networks production and packaging to shipping. An automobile manufacturer
and each network has a different network access, some more may have the same process, but since products are different,
restricted than others, without compromising connection and requirements may also change. Food will require data regarding
system integration. A typical example is your mobile phone temperature levels, whereas cars will require mechanical precision.
notifying you if you will allow a new device to connect to it via
Bluetooth. Normally, it will ask for a pairing connection via a simple 2. Connectivity
‘accept’ or using a more secure line such as a pin code.
Applications of IoT
With the varying connections – wired and wireless, as well as the “robot” to capture and interpret existing applications for processing
different protocols governing each connection, it will be a challenge a transaction, manipulating data, triggering responses and
to come up with an IoT project concerning such protocols. communicating with other digital systems.” Application systems
3. Power requirements and software may also be considered as RPA as they are applicable
IoT devices need to run on batteries as majority of these devices to the following:
are mobile. The challenge, therefore, is how to extend the battery Process Automation
life on such devices, especially those used in critical procedures, The use not only of industrial robots but also of
such as health, disaster management and safety. “presentation-layer automation software” is capable of
4. Security carrying out the daily operations of an organization. Process
One of the most highlighted issues in the application of IoT is data automation may include finance systems such as payroll,
security. Confidential information such as patients’ records or customer management systems such as online system
employees’ profiles are considered at risk. Security also includes registration and academic institutions offering online
system integrity, with malicious acts such as hacking and viruses enrollment systems, among others.
proliferating online. IT Support Management
5. Development Management of IT infrastructure and complex systems
One of the challenges identified if how to expand the capabilities of becomes easier using RPA. If part of the system fails, an
developers, and not just experts, in order to create more “smart automated system can immediately send notifications to the
things.” IT manager and technical support staff, informing them of
6. Services the problem. Large buildings, for example, employ an
With data collected from IoT, it is important as well to determine automated emergency system, so if an emergency exit door
where all this will go and to identify the platform in which these IoT has been opened, or a fire alarm goes off, the system will
applications will be placed. Nowadays, cloud services offer end-to- automatically detect the exact location of the opened door or
end solutions to a number of IoT projects. activated alarm, as the location of the emergency will
Automation typically be assumed to be near that point.
With the available technology and standards for computer system Automated Assistants
interconnection, the demand for system automation is on the rise. Apple’s Siri is an example of a voice recognition software
Colloquially called “computerization”, having an automated system means used in RPAs. Another example will be banks having an
automated business processes, operations, service provider, monitoring automated customer service hotline. Customers call the bank
and even tools. Examples include an automated payroll system, in which and instead of a human operator, an automated assistant will
the employee payroll and payslips are automatically generated every respond asking for details such as service choices, account
payday; a manufacturing plant that packs powdered juices in foil numbers, etc. Customers will use their phone’s touch keys to
containers/sachets where machines with sensors are used to fill up the enter choices and numbers while the computer interprets
packs up to the last milligram accurately and even an automated weather them as input data. After processing, a computer-generated
forecast. report, such as account balances and other information will
Below are two of the common methods in implementing IT automation: be provided.
Robotic Process Automation (RPA) Sensors
The Institute for Robotic Process Automatic and Artificial Sensors are hardware devices that have the capability to
Intelligence (IRPAAI) as “the application of technology that allows measure an event, object or any physical quality that is happening.
employees in a company to configure computer software or a Examples include the heart rate of a person while jogging, the
temperature of a room, brightness of a light source and the like. Used to detect the presence of dangerous fumes such as
Sensors can be classified as analog or digital, but below is a list of carbon monoxide caused by fire. Smoke alarms show how
sensors used in automation: this sensor works.
Temperature Sensor THE INFLUENCE OF IT ON CULTURE AND SOCIAL
Capable of measuring temperature as well as detecting its BEHAVIOR
rise or fall. This is helpful in systems that are temperature- Due to the technological progress, it is observed that the
sensitive such as power plants and server rooms. attitude and behavior of people, not just Filipinos, are
Infrared (IR) Sensor evolving to meet technology’s evolution.
Often used for security purposes. You might have seen it in The evolution of telephone paved the way for long-distance
movies in which a villain trying to access a restricted area communication. It also created a behavior for people to stay
trying to avoid a series of IR sensors shown as beams of red at home and call someone instead of a face-to-face
lines. Breaking or crossing the beam of red line would trigger conversation.
an alarm. Invention of cars and other modes of transportation created a
Ultrasonic Sensor culture of how people do commuting, the concept of
Detects sound waves, such as how radars and sonars pick up carpooling and the options of spending vacations.
sounds. A typical application is a light fixture turning on if the Evolution of mobile technology and internet has greatly
owner claps his or her hands and turning off once he or she changed how people perceived communication.
claps again. Online commerce revolutionized how customers buy
Touch Sensor products and services.
The latest versions of Samsung and Apple smartphones now Influenced on Culture
have a one-touch login to access the device instead of a pin Online Reviews
code or a pattern. The trend of having other people do the task first for others –
Proximity Sensor watching the full movie and informing people online if the film is
Detect objects within a certain range even if the object is not worth watching or not – is an example of how technology affects
physically touching the sensor yet. Typically used in the light the basic human behavior on decision-making.
fixtures of houses and buildings. The light turns on if it Weblogging/Social Media
detects a person is close by. Nowadays, food bloggers post pictures of their meals in restaurants
Pressure Sensor along with a food review. People would first take pictures of their
Helps determine the weight or impact of a certain object. meal and post it online. Others, during the course of meal, would
Normally used by manufacturing companies, such as even use their phones to update their online status instead of
automobile companies, in designing their airbag system. talking to the other people in their group. This is one typical
They need to create an airbag that is strong enough to example of technology, in the form of weblogging and social media,
cushion a driver upon a head-on collision but not too strong affecting social interaction.
to injure him/her due to the recoil. YouTube Learners
Level Sensor YouTube serves as a source of videos with people searching for
Detect the level of liquids, fluids, grainy or granular materials almost about anything online – from trivial topics to more serious
such as powders. It is often used for disaster risk subject matter. This fact influences the acquisition of knowledge
management such as a flood monitoring system. and learning of certain skills set. Instead of reading books or
Smoke/Gas Sensor listening to their teacher’s class lecture, students would rather
watch YouTube to learn the lesson. Again, this is another situation personal information, workplace and even some controversial
in which technology affects the culture, this time, of learning. subjects such as politics.
Influence on Social Behavior c. The Tag – You’re It Rule
Behavioral choices especially of teenagers or adolescents are Be careful in tagging someone either in your status post or
influenced by technologies. Cyberbullying, for example, is a serious photos. You may also restrict someone from tagging you in their
phenomenon brought about by social media. It is an unwanted, hostile posts and photos. Always think of your safety, as well as others’
behavior done by individuals to other people in the hope of gaining control personal boundaries.
over them. It is also an act of bullying that is done online, wherein the 2. Netiquette for Email Services, Chat Rooms and Instant
attackers may also be individuals you do not know as they hide behind Messaging
their internet profiles. An internet profile, also called an internet Email services such as sending and receiving an email from
identity, online identity, or internet persona, is a profile created by someone (professional to personal) anywhere in the world are sued
internet users to establish their social identity in online communities, in numerous contexts. Shown in the figure are some guidelines in
social media sites and other websites. composing an email.
Cyberbullying comes in the form of messages or images, such as
memes. Since messages or images can be posted anonymously, it is hard
and oftentimes, difficult to trace the source. It becomes more problematic
if the message or image gets reposted and distributed quickly online or
goes “viral.” The good news is that the society – communities and the
government – are devising ways to stop bullying – be it digital or
otherwise. The Philippines has identified several laws, including the Cyber
Crime Prevention Act, also known as RA 10175, to help catch cyberbullies.
Netiquette
It is the combination of the words internet and etiquette. It
describes how one should act online. There are different types of
netiquette implemented all over the world.
1. Netiquette for Social Media
The use of social media such as Facebook, Twitter, Instagram,
LinkedIn and others is neither a bad habit nor a good habit in one’s
personal life. Some of the rules of netiquette for social media are as
follows (Spira, 2010):
a. The Personalize IT Rule
Make sure to put restrictions in accepting friends or followers on
your social media. It is not about having the most number of
followers or friends. What matters is who you interact with and
how you interact with them. 3. Netiquette for Chat Rooms and Instant Messaging
b. The Off-limits Rule Joining chat rooms and sending instant messages, although
Know your limitations when voicing out your opinions on mandatory in social media, have become a trend for users. Still,
different subjects or topics concerning your school, religion, there are guidelines for using instant messaging applications. For
instance, someone might interrupt and request you to accept him
or her or to be connected to your account without your knowing of human resources such as the time and effort required to
who that person really is. purge systems of “computer viruses.”
a. Think long and hard before accepting a private conversation, 1.3 Be honest and trustworthy.
especially with someone not on your friends list. Not everyone The honest computing professional will not make deliberately
online may be as they seem to be. false or deceptive claims about a system or system design, but
b. In a group chat, include only those that are in your friends list. will instead provide full disclosure of all pertinent system
c. If possible, do not give your personal information while chatting, limitations and problems. A computer professional has a duty to
including your photos or “selfies.” be honest about his or her own qualifications and about any
d. When in doubt, save a copy or make a back-up of your circumstances that might lead to conflicts of interest.
conversation (chat). 1.4 Be fair and take action not to discriminate.
e. You must log out from your account at all times, especially if you Discrimination on the basis of race, sex, religion and age,
are in a public place, such as a computer shop. disability, national origin or other such factors is an explicit
f. You may opt to customize your account settings from public to violation of ACM policy and will not be tolerated.
private account. 1.5 Honor property rights including copyrights and patent.
Professional Ethics Copies of software should be made only with proper
While netiquette applies to all netizens, IT professionals specifically authorization. Unauthorized duplication of materials must not be
follow an ethical practice as they are the front liners, support and backend condoned.
of ICT. 1.6 Give proper credit for intellectual property.
The Association of Computing Machinery (ACM) has identified 24 Computing professionals are obligated to protect the integrity of
imperatives of professional conduct for IT professionals. Section 1 outlines intellectual property.
the fundamental ethical considerations while Section 2 provides 1.7 Respect the privacy of others.
additional, more specific considerations or professional conduct. Section 3 This imperative implies that only the necessary amount of
is intended specifically for individuals who have a leadership role, whether personal information be collected in a system, that retention
in the workplace or in a volunteer capacity such as in organizations like and disposal periods for that information be clearly defined and
ACM. Principles involving compliance with this code are laid out in Section enforced, and that personal information gathered for a specific
4. purpose not be used for other purposes without the consent of
1. GENERAL MORAL IMPERATIVES the individual(s).
As an ACM member, I will… 1.8 Honor confidentiality.
1.1 Contribute to society and human well-being. The ethical concern is to respect all obligations of confidentiality
When designing or implementing systems, computing to employers, clients, and users unless discharged from such
professionals must attempt to ensure that the products of their obligations by requirements of the law or other principles of this
efforts will be used in socially responsible ways, will meet social Code.
needs and will avoid harmful effects on health and welfare. 2. MORE SPECIFIC PROFESSIONAL RESPONSIBILITIES
1.2 Avoid harm to others. As an ACM computing professional, I will…
This principle prohibits use of computing technology in ways 2.1 Strive to achieve the highest quality, effectiveness and dignity
that result in harm to any of the following: users, the general in both the process and products of professional work.
public, employees and employers. Harmful actions include The computing professional must strive to achieve quality and
intentional destructions or modification of files and programs to be cognizant of the serious negative consequences that may
leading to serious loss of resources or unnecessary expenditure result from poor quality in a system.
2.2 Acquire and maintain professional competence. 3.1 Articulate social responsibilities of members of an
A professional must participate in setting standards for organizational unit and encourage full acceptance of those
appropriate levels of competence, and strive to achieve those responsibilities.
standards. Organizational leaders must encourage full participation in
2.3 Know and respect existing laws pertaining to professional work. meeting social responsibilities as well as quality performance.
ACM members must obey existing local, state, provincial, 3.2 Manage personnel and resources to design and build
national and international laws unless there is a compelling information systems that enhance the quality of working life.
ethical basis not to do so. When implementing a computer system, organizations must
2.4 Accept and provide appropriate professional review. consider the personal and professional development, physical
Quality professional work, especially in the computing safety and human dignity of all workers.
profession, depends on professional reviewing and critiquing. 3.3 Acknowledge and support proper and authorized uses of an
Whenever appropriate, individual members should seek and organization’s computing and communication resources.
utilize peer review as well as provide critical review of the work Because computer systems can become tools to harm as well as
of others. to benefit an organization, the leadership has the responsibility
2.5 Give comprehensive and thorough evaluations of computer to clearly define appropriate and inappropriate uses of
systems and their impacts, including analysis of possible risks. organizational computing resources.
Computer professional must strive to be perceptive, thorough 3.4 Ensure that users and those who will be affected by a system
and objective when evaluating, recommending and presenting have their needs clearly articulated during the assessment and
system descriptions and alternatives. design of requirements; later, the system must be validated to
2.6 Honor contracts, agreements and assigned responsibilities. meet requirements.
The major underlying principle here is the obligation to accept Current system users, potential users and other persons whose
personal accountability for professional work. lives may be affected by a system must have their needs
2.7 Improve public understanding of computing and its assessed and incorporated in the statement of requirements.
consequences. System validation should ensure compliance with those
Computing professionals have a responsibility to share technical requirements.
knowledge with the public by encouraging understanding of 3.5 Articulate and support policies that protect the dignity of users
computing, including the impacts of computer systems and their and others affected by a computing system.
limitations. Computer professionals who are in decision-making positions
2.8 Access computing and communication resources only when should verify that systems are designed and implemented to
authorized to do so. protect personal privacy and enhance personal dignity.
Trespassing and unauthorized use of a computer or 3.6 Create opportunities for members of the organization to learn
communication system is addressed by this imperative. the principles and limitations of computer systems.
Trespassing includes accessing communication networks and Opportunities must be available to all members to help them
computer systems, or accounts and/or files associated with improve their knowledge and skills in computing, including
those systems, without explicit authorization to do so. courses that familiarize them with the consequences and
3. ORGANIZATIONAL LEADERSHIP IMPERATIVES limitations of particular types of systems.
As an ACM member and an organizational leader, I will… 4. COMPLIANCE WITH THE CODE
As an ACM member, I will…
4.1 Uphold and promote the principles of this Code.
Not only is it important for ACM computing professionals to Part 2. TRUE or FALSE. Write TRUE if the statement is true and FALSE if
adhere to the principles expressed in this code, each member not.
should encourage and support adherence by other members. 16.The use of social media is a good habit in one’s personal life.
4.2 Treat violations of this code as inconsistent with membership in 17.As an ACM member, I can copy someone’s software without
the ACM. their authorization.
Adherence of professionals to a code of ethics is largely a 18.As an ACM computing professional, I will know and respect
voluntary matter. However, if a member does not follow this existing laws pertaining to professional work.
code by engaging in gross misconduct, membership in ACM may 19.As an ACM member and organizational leader, I will only
be terminated. consider my own physical safety.
EVALUATION. Direction: Write your answer on a ½ sheet of paper. 20.As an ACM member, I can still continue my membership even
Part 1. Identification. Identify what the following statements refer to. though I engaged in some misconductions.
1. It is a set-up of devices and objects which are connected
together in a given network.
2. It is the major requirement of IoT where it will give the capability
of all devices to communicate with each other for uploading and
downloading needed data.
3. It is the capability of IoT where you will be notified if a device is
trying to connect via Bluetooth.
4. It is the application of IoT that focuses on smart grids for
renewable energy.
5. An application of IoT which includes remote access to heavy
equipment.
6. An application of IoT adopting efficient traffic management.
7. This is the most highlighted issue in IoT such as keeping
confidential information.
8. Also referred to as computerization.
9. It is often used for security purposes which is commonly shown
in movies as beams of red lines.
10.Its typical application is turning on lights by clapping your
hands.
11.Another example of this sensor is the use of fingerprint to unlock
your phone.
12.It is often use for disaster risk management.
13.It is the influence on culture where other people do the task first
for others.
14.It is a serious phenomenon brought by social media which is an
act of bullying that is done online.
15.It is also known as RA 10175.