0% found this document useful (0 votes)
25 views11 pages

Lesson 4 6

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views11 pages

Lesson 4 6

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

LESSON 4: • The pictures, videos, and contact list saved in the

KEY TERMS: phone are considered conceptual resources while the


BUSINESS SOFTWARE ALLANCE (BSA) smartphone is the physical resource (managing the
Is an international organization composed of major software conceptual resources). In both instances, the
and digital content companies. Its primary goal is to combat conceptual resources identified are called information.
software piracy, protect the intellectual property rights of its
members, and promote fair competition in the software INFORMATION AS RESOURCES
industry.
Information as Resources
CONTENT SCRAMBLE SYSTEM (CSS) • Information can be simply defined as “facts about
Is a form of digital rights management (DRM) and encryption something or someone that are provided or learned”
used to protect DVD content from unauthorized copying and
• Facts are considered relevant truths which have been
playback. CSS encrypts the data on DVDs to prevent them
validated and identified.
from being easily copied or accessed on unlicensed DVD
players or software.
Expandable
DIGITAL RIGHTS MANAGEMENT (DRM)
• Information that can be expanded without
compromising its integrity.
Is a technology used to protect digital content from
unauthorized access, copying, or distribution.
Compressible
DIGITAL VERSATILE DISC (DVD) • Although expanded information can give a more
Is a type of optical disc used for storing data such as movies, detailed explanation, it may not always be needed.
music, software, and other forms of digital media. DVDs offer
greater storage capacity compared to Compact Discs (CDs), Transportable
making them ideal for high-quality video and larger data files. • With the use of the internet and various technologies,
information can be sent through any of the following:
INTELLECTUAL PROPERTY RIGHTS (IPR) 1. Sent via email
Are legal protections granted to individuals or organizations for 2. Share via facebook
their creations of the mind, such as inventions, literary and 3. Copy onto a flash drive
artistic works, designs, symbols, names, and images used in 4. Upload on youtube
commerce.
Diffusive
N0N-DISCLOSURE AGREEMENTS (NDA)
• Gossip or rumors tend to spread easily. Unfortunately,
Is a legal contract that protects confidential information
the same applies to any kind of information be it true or
shared between two or more parties. The purpose of an NDA
not.
is to prevent one party from disclosing, using, or sharing
sensitive information without permission.
Sharable

NEAR FIELD COMMUNICATIONS (NFC)


• Since information can be easily spread, it is considered
sharable as well. Information can be kept calling it a
Is a short-range wireless communication technology that
secret.
allows devices to exchange data when they are placed close
together, typically within a range of 4 centimeters (1.5 inches).
Valuable information
PRIVATE MESSAGE (PM) • Information is said to be valuable if it has the following
Is a message sent from one person to another, or to a group, characteristics.
that is not visible to others. It is used for personal
communication or for exchanging sensitive information in a 1. Accurate
private manner. • accurate information is error-free.
2. Complete
INFORMATION TO RESOURCES • Complete information contains all the important facts.
Introduction to Resources 3. Economical
Resources are the total means available to a company for • Information should economical to produce. Decision
increasing production or profit, including land, labor, capital, makers must always balance the value of information.
and raw.

TYPES OF RESOURCES
4. Reliable
Physical Resources • Reliable information can be depended on. In many
• Are tangible and can be easily identified. They usually cases, the reliability of information depends on the
start from acquisition and are then assembled to be validity of the data collection method. In other cases,
reliability depends on the source of information, which
available for use when needed.
bring us back to valuable information being
• The assembly process entails converting an essentially economical.
raw material into a refined form, such as wood, cement,
5. Flexible
and steel for building
• Flexible information can be used different purposes.
construction
Depending on the situation personal information can
• A building construction site be used for variety of ways.
6. Relevant
Conceptual Resources • Relevant information is important to the decisionmaker.
• Are non-tangible and are considered valuable for what 7. Simple
they represent rather than their physical make- up. • Information should also be simple, not overly complex.
• Money is considered a conceptual resource 8. Timely
• Timely information is delivered when it is needed.
• Managers use conceptual resources to manage 9. Verifiable
physical resources or vice versa
• This means that information can be checked for This is produced at rapidly-increasing rates due to the following
correctness and authenticity. reasons:
10. Accessible 1. Easy duplication and transmission of information
• Information should be easily accessible by authorized 2. Increase in communication methods
authors. 3. Growth archives of historical information
FOUR CHARACTERISTICS: According to the 2018 Global Digital Suite of reports from We Are
Social and Hootsuite:
1. Zero Marginal Cost
1. More than half the world now uses the internet (up to 7
• The cost of producing the first copy of an information
percent year-on-year).
good may be substantial, but the cost of producing
(or reproducing) additional copies is negligible.
2. Qatar and United Arab Emirates top the internet
penetration ranking with 99% of their total population
2. Non- rivalrous
using the internet.
• Simultaneous consumption of information by consumers
is possible. Movies nowadays are sold not only as DVD 3. For three years in a row, Filipinos have been spending
copies. There are also digital formats which anyone the greatest amount of time on social media with an
can watch online or download on their mobile average of four hours a day.
devices, either as a rental or paid subscription. 4. More than two-thirds of the world's population now has
3. Non- exclusive a mobile phone, with most people now using
• Exclusion is not a natural property of information goods, smartphones.
though it is possible to construct exclusion artificially. 5. More than half of the world's web traffic now comes
4. No transparency from mobile phones.
• To evaluate the information, the information must be 6. More than 60% of all mobile connections around the
known, so one has to invest in learning how to world are now 'broadband.'
evaluate it. 7. More than one in five of the world's population shopped
online in the past 30 days.
INFORMATION ECONOMICS
DIGITAL AROUND THE WORLD IN 2018
Information economics In 2018, digital information saw exponential growth due to the
• It focuses on the application of IT in areas where its expanding internet and advances in mobile technology. Social
intangible benefits contribute to performance on key media, especially Facebook with over 2 billion users,
aspects of organizational strategies and activities. significantly influenced internet use. Although the Philippines
• In economics, a good is considered to be an has one of the world’s slowest fixed internet speeds (4.2 Mbps),
"EXPERIENCE GOOD" if consumers must experience it its mobile internet speed (13.9 Mbps) is among the fastest,
to value it. leading Filipinos to spend an average of four hours daily on
social media—more than users in other countries. This surge in
data and internet users contributes to information overload,
Organizations uses different strategies to convince hesitant
overwhelming people with more information than they can
customers to buy something even before they fully understand
process.
what they are getting.

MOBILE SOCIAL MEDIA & M-COMMERCE


1. Browsing previews Example:
Movie trailers that normally run from 1 to 3 minutes will give
Mobile Social Media & Mobile Commerce
viewers a glimpse of what the film is all about.
The abundance of mobile devices has greatly changed the
way people manage their day-to-day activities. In business, for
Music downloaded from iTunes (5 to 15-second preview
example, having a shop where customers can easily go to used
of the song can be listened prior to buying it)
to be enough. However, with the introduction of the internet,
market shifted from a brickand-mortar set-up to an online
2. Branding operation more commonly known as e-commerce. And now
Big names such as Microsoft and Apple have no issues when it with mobile internet, people can access internet services
comes to launching new products as people have already without the need for computers. They have their smartphones,
established their trust on these brands. tablets, and other mobile devices connected to the network to
send and receive information wherever they are and whenever
3. Reputation they want to. This connectivity has paved the way to two new
When a movie is announced, people would often be skeptical scenarios in communication:
if it would be good enough. However, the REPUTATION of
directors and the cast of actors and actresses normally remove Mobile Social Media
this skepticism. Mobile social media is the accessing of social media sites, such
as Facebook and Snapchat, using a mobile device. The device
In general, people value an organization's ability to make their may have an app installed to open Instagram, for example, or
lives easier and better by using information about their products it can use a browser installed in the mobile device to open
and operations. Twitter. A study conducted by ComScore in 2016 reveals the
impact of social media on internet users. The same study also
INFORMATION OVERLOAD shows that nearly 80% of individuals browse through their social
media accounts using their mobile phones.
Information Overload
• Information is now available so quickly, ubiquitously, and Mobile Commerce (m-commerce)
inexpensively. Last March 2016, Cisco conducted a M-commerce or mobile commerce was a term used during the
study that by the end of 2016, global internet traffic will 1997 Global Mobile Commerce Forum by
have reached 1.1 zettabytes per year, and by 2019, Kevin Duffey. He described it as the delivery of electronic
global traffic is expected to hit 2 zettabytes per year. commerce capabilities directly into the consumer's hand,
Just how big is 1 zettabyte? A typical external drive is 1 anywhere, via wireless technology. The use of mobile devices
terabyte in size. One zettabyte is equal to 1,000,000,000 has paved the way for data to be transmitted and received
terabytes or one billion external drives. much faster, without compromising security and scalability. The
global trend in using mobile devices for socializing and doing
commercial transactions is increasing. Companies are now 4. Industrial design
using digital platforms to market their products and services. 5. Patents
6. Layouts design of integrated circuits
Industries that are now embracing m-commerce include:
7. Protection of undisclosed information
1. Financial services
2. Mobile ticketing Intellectual Property Office of the Philippines
3. Service/Retail Is the government agency in charge of the implementation of
4. Information Services the law protecting intellectual property rights in the Philippines.

INFORMATION CONTROL COPYRIGHT AND RELATED RIGHTS

Information Control COPYRIGHT


Information control is about allowing those who have • Copyright is a set of exclusive rights granted by a state
appropriate authority access to and use of information on the to the creator of an original work or their assignee for a
basis of the authority that they hold. limited period of time in exchange for public disclosure
of the work, and includes right to copy, distribute, and
Software Piracy adapt the work.
According to The Software Alliance (www.bsa.org) (2018), • Copyright owners can license or permanently transfer
software piracy is "the unauthorized copying or distribution of or assign their exclusive rights to others.
copyrighted software... can be done through copying, • Digital rights is the permission granted to individuals to
downloading, sharing, selling or installing multiple copies of legitimately perform actions involving the use of a
software onto personal or work computers.” computer, any electronic device, or a communications
network.
Examples of software piracy as identified by The Software • Copyright provides protection for original expression
Alliance (2018) include: which includes literary, artistic, scholarly, and scientific
1. Distributing software or mobile apps from the internet in creations such as books, articles, newspapers, lectures,
a manner that violates the license terms letters, musical compositions, and paintings. It also
2. Buying a single copy of a software program and extends to derivative works such as illustrations, maps,
installing it on multiple devices without authorization photographic works, advertisements, computer
3. Making and/or sharing copies of installation CDs programs, etc.
4. Sharing the login credentials (without authorization) • In the Philippines, all copyrighted materials are
used to access a web-based software application recorded and stored at the National Library or the
Supreme Court Library (R.A. 10372, 2013) otherwise
Identified issues in Information Control by Adam Thierer: known as the "Intellectual Property
1. Convergence Code of the Philippines"
2. Scale
3. Volume Digital Rights Management
4. Unprecedented individual empowerment • Digital rights management (DRM) is used to describe
the processes by which the author or publisher of a work
Issues in information control: exerts his or her rights to control what the purchaser of
the work is entitled to do. This represents the control by
1. Convergence
which one can prevent a person or an organization
• Generally refers to the integration of multiple forms of
from copying, printing, editing, or otherwise making the
communication and media technologies into a unified
privileged information available to other people.
system or platform. This often means the blending of
digital, audio, video, and print information systems,
making it easier to manage, distribute, and control Techniques Designed to Control Access and Reproduction of
information from a single point. Online Information
2. Scale 1. Encryption is the process of converting data or
• It can describe the range of people, data, or processes information in such a way that only authorized parties
involved, as well as the level of complexity required for can understand.
effective control. 2. Serial keys also known as a product key or a software
3. Volume key, it is a series of alphanumeric characters acting as
• It refers to the amount or quantity of information that a key to denote that the product or software is original.
needs to be managed, processed, or monitored. 3. Data scrambling & content scramble system (CSS) is
4. Unprecedented individual empowerment done to hide sensitive information from unauthorized
• Refers to the way that individuals now have more users. Scrambling is accomplished by the addition of
power than ever before to access, create, and share components to the original signal or the changing of
information, often bypassing traditional information some important component of the original signal in
gatekeepers like governments, media companies, or order to make the extraction of the original signal
institutions. difficult.
4. Similar to how pictures can include watermarks to
Intellectual Property denote information on the owner of the picture, tag
• It refers to a number of distinct types of intangible assets embedding does the same to information content.
for which a set of inclusive rights are recognized. Watermarks are not complete DRM mechanisms in their
own right, but are used as part of a system for copyright
Intellectual Property Rights enforcement, such as helping provide prosecution
evidence for legal purposes, rather than direct
• This is the rights given to person over to their creations
technological restriction. techniques designed to
control
According to the Intelectual Property Code of the Philippines
access and reproduction of online information
(Republic Act No. 8293 s. 1998), IPR consists of the following:
1. Copy rights and related rights PATENT
2. Trademarks and service mark • A patent is a set of exclusive rights granted by a
3. Geographic indication state to an inventor for a limited period of time in
exchange for the public disclosure of an invention. availability, integrity or confidentiality. This definition includes
The exclusive right granted to incidents that would result in a personal breach, if not for
a patentee in most countries is the right to prevent safeguards that have been put in place.
others from making, using, selling, or distributing the
patented invention without permission. One A "personal data breach," on the other hand, is a subset of a
example of a patented design is that of Apple's security breach that actually leads to "accidental or unlawful
iPod. destruction, loss, alteration, unauthorized disclosure of, or
access to personal data transmitted, stored, or otherwise
TRADEMARK processed.
• A trademark is a distinctive sign used by an
individual, business organization, or other legal In March 2016, the Comelec website was hacked, exposing
entity to identify the products or services to sensitive data on millions of voters and overseas Filipino workers,
consumers. The mark comes from a unique source, including names, addresses, government ID numbers,
and it distinguishes its product (trademark) or fingerprints, and passport details. This breach was described as
services (service mark) from the others. Rights in a potentially the largest government-related data leak, even
mark shall be acquired through registration made surpassing the 2015 OPM hack in the U.S. In January 2017,
validly in accordance with the provisions of the IP Comelec Chairman Andres Bautista faced criminal charges for
code. For marks with geographical indications, a violating the Data Privacy Act of 2012 due to alleged
notice stating that a given product originates in a negligence, with potential penalties including imprisonment,
given geographical area must be identified. This is fines, and disqualification from office. The National Privacy
relatively new in the Philippine IP regime as marks Commission highlighted Comelec's failure in its duty as a
are identified based on the territory, region, or personal information controller and stressed that data
locality attributed. protection requires more than just technical security measures.

INFORMATION PRIVACY CHAPTER KEY POINTS


• Physical, conceptual, and information
Information Privacy • Information resources
The natural state of data is to be copied, logged, transmitted, • Information as a resource
stored, and stored again. This is why it takes constant fighting • Historical Information
and vigilance to prevent that breach.
• The abundance of mobile devices
Oath's Privacy Policy
• Information control
Many trusted websites, like Yahoo, are generally believed not to • Intellectual property
compromise user privacy, similar to other platforms such as
Gmail and Facebook. However, Facebook has faced scrutiny
over privacy issues, particularly with third-party quizzes that
request extensive access to user data. A 2015 BBC article LESSON 5: IT CULTURE AND THE SOCIETY
highlighted a specific quiz, the "Word Cloud" quiz, which KEY TERMS
collected personal information from users' Facebook profiles,
including their name, photos, friends list, posts, and likes. Users ACM Association of Computing Machinery
must log in to participate, effectively granting the developers Global professional organization that advances computing as
significant access to their data, sparking concerns over privacy a science and profession by fostering collaboration, education,
and data security. and innovation among computing professionals, educators,
and researchers.
Data Privacy Act 10173
To protect citizens' data amid growing online information API Application Programming Interface
sharing, many countries have implemented data protection Set of rules and protocols that allows different software
measures, including the Philippines, where the IT sector saw $4.4 applications to communicate and interact with each other,
billion in spending in 2016 and continues to grow. With 6.7 million enabling the integration and exchange of data or
Facebook users and increasing public Wi-Fi access, data functionalities.
privacy is a key concern. To address this, the Philippines
enacted the Data Privacy Act of 2012 (Republic Act No. 10173), ATAS Automated Tie and Attendance System
signed by President Benigno Aquino III, to safeguard citizens' Digital solution designed to efficiently track and manage
personal information from misuse. employee work hours, attendance, and absences using
technologies such as biometric scanners, RFID, or software
The law defines sensitive personal information as being; applications, reducing manual errors and improving
1. Personal Characteristics organizational productivity.
2. Health and Personal History
3. Government-Issued Identifiers DBG Disruptive Business Group
4. Classified Information Company or team that introduces innovative products,
services, or business models that challenge and transform
traditional industries, often creating new markets or significantly
All processing of sensitive and personal information is prohibited
altering existing ones.
except in certain circumstances. The exceptions are:
• consent of the data subject;
DTTB Doctor – to – the – Barrio
• pursuant to law that does not require consent; Program in the Philippines aimed at addressing the shortage of
• necessity to protect the life and health of a person; healthcare professionals in rural and underserved areas. Under
• necessity for medical treatment; and this initiative, qualified doctors are assigned to work in remote
• necessity to protect the lawful rights of data villages and communities, providing essential medical services
subjects in where access to healthcare is limited.
• court proceedings, legal proceedings, or
regulation. e-Payment Electronic Payment
Refers to the transfer of money or digital currency from one
A "security incident is an event or occurrence that affects or party to another using electronic systems, such as online
tends to affect data protection, or may compromise banking, mobile wallets, credit/debit cards, or payment
gateways, for convenience and efficiency in financial
transactions. Smart Cities
Smart cities have adopted IoT in traffic management, waste
e-Commerce Electronic Commerce disposal, and even community monitoring for the security of the
Refers to any business or commercial transaction that occurs via city’s residents.
the internet, involving the transfer of information for buying and
selling goods or services. Connected Industries
The oil gas industry is identifies as one of the frontrunners for IoT
e-Health Electronic Health connectivity which includes remote access to heavy
Involves the use of information and communication equipment and machinery, from manufacturing to production.
technologies (ICT) in the health care sector, enabling better
management and delivery of health services. Connected Building
Connected building projects involve facility-automation to
e-Learning Electronic learning reduce energy costs.
Refers to the use of electronic technologies, such as the
internet, to access educational content and facilitate learning Connected Cars
outside of traditional classroom settings. With smart cities adopting IoT for their traffic management it is
no longer surprising for the latest car models to be equipped
Freeware Freeware with the sensor and network connectivity.
Refers to software that is available for free, but may be ad-
supported or include other forms of advertising. Smart Energy
Majority of smart energy projects focus on developing smart
Infrared Sensor Infrared sensor grids for renewable energy and infrastructure.
A type of sensor that detects infrared light, typically used with
an infrared light source for various applications such as motion CHALLENGES OF loT
detection.
System Requirements
Level sensor Level sensor Industries normally identify different requirements, especially
A device that detects and measures the level of substances, depending on the type of industry they belong to.
such as liquids, grains, or powders, by sensing their presence or
volume. Connectivity
With the varying connections – wired and wireless, as well as the
Impact of IT on the Society different protocol governing each connection, it will be a
7 Major Trends (2017) challenge to come up with an IoT project concerning such
1. IoT (Internet of Things) and Smart Home Technology protocols.
2. Augmented Reality and Virtual reality
3. Machine Learning Power Requirements
IoT devices need to run on batteries as majority of these devices
4. Automation
are mobile.
5. Big Data
6. Physical-Digital Integrations Security
7. Everything on Demand One of the most highlighted issues in the application of IoT is the
data security.
Majority of organizations and companies nowadays have taken Security also includes system integrity, with malicious acts such
these trends into account, shifting manual business processes to as hacking and viruses proliferating online.
automated ones and using ICT to improve their products and
services. Among these seven trends, the internet of Things (IoT) Development
and automation seem to have greatly influenced present-day How to expand the capabilities of developers, and not
culture and society; thus, it is imperative to discuss these thrusts
just experts, in order to create more “smart things.”
in detail
Services
INTERNET OF THINGS (loT)
It is important as well to determine where all this will go and to
Set-up of devices and objects which are connected together
identify the platform in which these IoT applications will be
in a given network. Their connection, often wirelessly, is possible
placed.
using both hardware and software.
AUTOMATION
CAPABILITIES OF loT
• With the available technology and standards for
computer system interconnection the demand for the
Integration Across Technology and Business Sensor can be
system of automation is on the rise
used to help improve business processes, such as machines
used for manufacturing and production, security systems, and • Colloquially known as “Computerization”
even simple ones like automatically turning on and off a light • It means having automated business processes,
switch. operations, service provider, monitoring, and tools
• With the use of computer systems – hardware, software,
Data Analysis and Synchronization or both have become automated
IoT should be capable of providing analytics to help • Example: Automated Payroll System, Manufacturing
organization in their decision-making. Plant, Automated Weather Forecast
• With the introduction of cloud-computing, a growing
Security and Service number of organizations have gone into automation
To improve security, IoT devices are usually divided into because of “Less Cost & Minimal Server Maintenance”
networks and each network has a different network access,
some more restricted than others, without compromising Two common methods of implementing IT
connection and system integration. Automation:
1.0. Robotic Process Automation (RPA)
APPLICATIONS OF loT
IRPAAI (Institute for Robotic Process Automation and
Artificial Intelligence) – defines RPA as the “application of 6.0. RPA – (Robotic Process Automation) is the application of the
technology that allows employees in a company to configure technology that allows employees in company to configure
computer software or a “robot” to capture and interpret computer software or a “robot” to capture and interpret
existing applications for processing a transaction, manipulating existing application for processing transaction, manipulating
data, triggering responses, and communicating with other data, triggering responses, and communicating with other
digital systems. digital systems.

Application and Software Systems may also be considered as THE INFLUENCE OF IT


RPA as they are applicable to the following:
1.1. Process Automation - The use of The Influence of IT on Culture and Social Behavior Widespread
“PresentationLayer Automation Software” is Impact of ICT:
capable of carrying out the daily operation of an • ICT brings both positive and negative effects on
organization. May include: individuals, organizations, and society.
• Finance Systems (Payroll) • The influence of ICT has changed people's lives,
• Customer Management System (Online System highlighting the need for self-realization and social
Registration) interaction alongside technology.
• Academic Institution w/ Online Enrollment System
• Learning Management System

1.2. IT Support Management System – it becomes Philippines as a "Most Social Nation":


easier by using RPA, if a part of the system fails, an • Previously known as the "texting capital of the world."
automated alert system can send notifications to • Ranked first in social media usage in a 2015 study by
the IT Manager/ Technician informing them of the Opera Mini.
problem. • 86% of page views by Filipino mobile users are on social
media.
1.3. Automated Assistance • Smartphone adoption rate increased from 41% to 55%
• Apple Siri (Voice Recognition Software)- Instead of in one year.
machine language (binary), computers will be able to • Filipinos average 699 web pages viewed per month
understand human language and interact with them. (~23 pages per day)
• Banks Automated Customer Hotline – Customer call the
bank, and instead of human operator an automated Behavioral and Cultural Evolution with Technology:
assistant will respond asking for details such as service Historical
choices, account numbers, etc. • Telephone (1800s)
• Cars and transportation
2.0. Sensors – Are hardware devices that have the capability to Modern
measure an event, object, or any physical quality that is • Mobile technology
happening.
• Internet
Examples:
• Heart Rate of a person while jogging Subtle but Significant Changes
• Temperature of a room Small technological impacts are reshaping individual and
• Brightness of a light source collective behavior daily (Gilkey, 2015).
Examples:
Sensors can be classified as analog or digital, below is a list of Generational differences (Baby Boomers, Gen X,
sensors used in automation: Millennials) amplified through social media, often leading to
Temperature Sensor – This sensor is capable of measuring "generation wars."
temperature as well as detecting its rise or fall.
Infrared (IR) Sensor – Often used for security purposes, detects INFLUENCE OF TECHNOLOGY ON CULTURE
infrared lights.
Ultrasonic Sensor – It detects soundwaves, such as how radars Influence of Technology on Culture
and sonars pick up sound Online Review
Touch Sensor – Through touching the sensor activates itself and 1. Convenience of Information Access.
becomes capable of doing its function. 2. Influence of Crowd Opinions.
Proximity Sensor - It is able to detect object within as certain
3. Technology's Role in Decision-Making.
range, even if the object is not physically touching the sensor
yet.
Weblogging and Social Media
Pressure Sensor – Helps determine the weight or impact of a
Food bloggers and influencers post meal reviews and pictures
certain object.
online. Created a culture where:
Levels Sensor – Can detect the levels of liquids, fluids, grainy, or
granular materials such as powder, etc. Smoke/ Gas Sensor – • Social interactions are replaced by phone use during
Used to detect the presence of dangerous fumes such as meals.
carbon monoxide caused by fire. • People prioritize capturing moments for social media
over engaging with others.
KEY TERMS
1.0. One-time Pin – Acts as a second level of authentication YouTube Learners
method to ensure that online transactions are secure • YouTube influences knowledge acquisition and skill-
2.0. Online Banking – Allows a user to execute online transaction building.
via internet. • People search for tutorials and educational content
3.0. Pressure Sensor – Is a sensor that helps determine the impact online.
or weight of a certain object. • Students often prefer YouTube videos over traditional
4.0. Proximity Sensor – Is a sensor that able to detect objects learning methods
within a certain range. • Highlights a cultural shift in how people approach
5.0. Ransomware – Is a type of malware that can block access education and self-learning
to the victim’s data.
INFLUENCE ON SOCIAL BEHAVIOR:
CYBERBULLYING Some of the rules of netiquette for social media are as follows
(Spira, 2010):
What is Cyberbullying? A. The Personalize IT Rule. - Make sure to put restrictions in
Cyberbullying accepting friends or followers on your social media.
• Hostile behavior conducted online to control or harm B. The Off-limits Rule. - Know your limitations when voicing
others. out your opinions.
• Victims often face personal traumas due to the C. The Tag - You're It Rule. - Always think of your safety, as
anonymity and reach of attackers. well as others’ personal boundaries.
• Cyberbullies can be acquaintances or strangers hiding
behind Internet profiles. 2. Netiquette for Email Services
• Email services such as sending and receiving an email
from someone (professional to personal) anywhere in
Internet Profile the world are used in numerous contexts.
• Online persona created on social platforms or websites.
• led to creation of online “Masks” 3. Netiquette for Chat Rooms and Instant Messaging
• Joining chat rooms and sending instant messages,
Role of IP: although mandatory in social media, have become a
trend for users. This is especially beneficial for people
• Real person or Fake identity.
working in different places such as a person working
• Encourages anonymous confidence. overseas while his or her friend or relative is in the
Philippines. Instead of spending for telcom services, the
Fake profiles can lead to misinformation and person just needs internet connection.
misdirection with potential risks
GUIDELINES FOR USING INSTANT MESSAGING:
Forms of Cyberbullying
• Malicious Messages or images posted online. A. Think long and hard before accepting a private
• Anonymous posts. conversation, especially with someone not on your friends list.
• Harmful or Misleading Content that can spread. Not everyone online may be as they seem to be.
B. In a group chat, include only those that are in your
Effect of Cyberbullying friends list.
• Trauma C. If possible, do not give your personal information while
• Challenging to counter due to anonymity and chatting, including your photos or “selfies”.
widespread reach. D. When in doubt, save a copy or make a back-up of your
conversation (chat).
Methods to Fight Cyberbullying E. You must log out from your account at all times,
Philippines' R.A. 10175 (Cyber Crime Prevention Act) helps especially if you are in public place, such as a computer shop.
identify and punish cyberbullies. F. You may opt to customize your account settings from
public to private account.
Encouragement for victims to seek help:
Talk to family, friends, or teachers. PROFESSIONAL ETHICS

Involve parents and educators in monitoring social media The Association of Computing Machinery (ACM) has identified
activities. 24 imperatives of professional conduct for IT professionals. It
contains many, but not all, issues IT professionals are likely to
Cyberbullying Prevention Measures face while using, creating, and implementing ICT.
• Promote netiquette to encourage responsible online
behavior. Section 1: Fundamental ethical considerations.
• Increase awareness about the risks of misleading online Section 2: Professional conduct specifics.
identities. Section 3: Leadership roles in ethics.
• Strengthen communication between youth, parents, Section 4: Compliance with the code.
and schools to address issues early.
GENERAL MORAL IMPERATIVES
NETIQUETTE
As an ACM member, I will....
What is Netiquette? 1.1 Contribute to society and human well-being.
• Netiquette is a combination of the words internet and • Design systems that address societal needs, prioritize
etiquette. safety, and consider environmental impacts.
• It describes how one should act online. • Ensure systems are used responsibly to enhance human
• It brings in policies for all the features and qualities of the well-being.
internet, including the use of the World Wide Web
(WWW), email services, File Transfer Protocol (FTP), chat 1.2 Avoid harm to others.
rooms, and instant messaging. • Prevent harm such as data breaches, system failures, or
environmental damage.
DIFFERENT TYPES OF NETIQUETTE • Mitigate harm caused by unintentional actions and
IMPLEMENTED ALL OVER THE WORLD: ensure proper system testing.

1. Netiquette for Social Media 1.3 Be honest and trustworthy.


• The use of social media such as Facebook, Twitter, • Maintain transparency about system limitations and
Instagram, LinkedIn, and others is neither a bad habit one’s qualifications.
nor a good habit in one’s personal life. Using social
• Avoid conflicts of interest and misrepresentation of
media is good for easy communication with friends and
professional affiliations.
even long-lost friends and relatives.
1.4 Be fair and take action not to discriminate.
• Avoid discrimination based on race, gender, religion, • Evaluations of computer systems involve examining
etc., and strive for equitable access to computing performance, usability, functionality, and security.
resources.
2.6 Honor contracts, agreements, and assigned responsibilities.
1.5 Honor property rights including copyrights and patent. • Computing professionals should be fair and take action
• Respect copyrights, patents, and licensing agreements. not to discriminate.
• Avoid unauthorized duplication of software or
intellectual property. 2.7 Improve public understanding of computing and its
consequences.
1.6 Give proper credit for intellectual property. • To improve sharing technical knowledge, addressing
• Acknowledge the contributions of others and refrain misconceptions, and encouraging awareness of
from plagiarism. computing's potential impacts.

1.7 Respect the privacy of others. 2.8 Access computing and communication
• Avoid discrimination based on race, gender, religion, resources only when authorized to do so.
etc., and strive for equitable access to computing • A principle of the Association for Computing
resources. Machinery's (ACM) Code of Ethics and
Professional Conduct.
1.8 Honor confidentiality.
• Respect confidentiality agreements with clients and ORGANIZATIONAL LEADERSHIP IMPERATIVE
employers unless legally obligated to disclose
information. As an ACM member and an organizational leader, I will...

2.1 Strive to achieve the highest quality, effectiveness and 3.1 Articulate social responsibilities of members of an
dignity in both the process products. organizational unit and encourage full acceptance of those
1.5 Honor property rights including copyrights and patent. responsibilities.
- Unauthorized duplication of materials must not be condoned. • Because organizations of all kinds have impacts on the
1.6 Give proper credit for intellectual property. - public, they must accept responsibilities to society.
Computing professionals are obligated to protect the integrity
of intellectual property. 3.2 Manage personnel and resources to design and build
1.7 Respect the privacy of others. - Responsibility of information systems that enhance the quality of working life.
professionals to maintain the privacy and integrity of data. • Performance management
1.3 Be honest and trustworthy. - Component of • Set clear goals, provide open feedback, and have
trust, without trust an organization cannot function strong leadership to keep employees engaged and
effectively. productive.
1.4 Be fair and take action not to discriminate. - • Work-life balance
Values of equality, tolerance, respect for others,and • Provide employees with time to pursue their interests
the principles of equal justice govern this imperative. and hobbies so they can be less stressed and more
1.7 Respect the privacy of others. - Responsibility of professionals relaxed.
to maintain the privacy and integrity of data.
1.3 Be honest and trustworthy. - Component of trust, 3.3 Acknowledge and support proper and authorized uses of an
without trust an organization cannot function effectively. organization's computing and communication resources.
1.4 Be fair and take action not to discriminate. - Values of • Define appropriate uses: Organization leadership
equality, tolerance, respect for others, and the principles of should clearly define what is appropriate and
equal justice govern this imperative. inappropriate use of computing resources.

MORE SPECIFIC PROFESSIONAL 3.4 Ensure that users and those who will be affected by a system
RESPONSIBILITIES have their needs clearly articulated during the assessment and
design of requirements; later, the system must be validated to
As an ACM computing professional, I will..... meet the requirements.
2.1 Strive to achieve the highest quality, effectiveness and • The system should then be validated to ensure it meets
dignity in both the process and products of professional work. these requirements.
• A principle of the Association for Computing Machinery
(ACM) Code of Ethics and 3.5 Articulate and support policies that protect the dignity of
Professional Conduct. users and others affected by a computing system.
• Ensuring that systems are designed and implemented
2.2 Acquire and maintain professional competence. to respect the rights and autonomy of individuals.
• Acquiring and updating knowledge and skills, and
participating in professional communities. 3.6 Create opportunities for members of the organization to
learn the principles and limitations of computer systems.
2.3 Know and respect existing laws pertaining to professional • Helps members understand the complexity of
work. computer systems.
• They must also follow the policies and procedures of the • Helps members understand the importance of ethical
organizations they work for. use of computers.
• They must accept responsibility for any actions they
take that violate a law or regulation. KEY TERMS
1. FHSIS- Field Health Service Information System - Helps
2.4 Accept and provide appropriate professional review. local governments determine public health priorities.
• Computing professionals should also provide 2. IBM- International Business Machines Corporation - A
constructive, critical reviews of others' work. multinational technology company that specializes in
computer technology and information technology
2.5 Give comprehensive and thorough evaluations of computer consulting.
systems and their impacts, including analysis of possible risks.
3. IoT- Internet of Things - Describes devices with sensors, o Trends: Deep learning, natural language
processing ability, software and other technologies processing, computer vision, robotics, AI-
that connect and exchange data with other devices. powered automation.
4. LMS- Learning Management System - Is the tool o Impact: Transforming industries, improving
organizations use to plan, develop, deliver, and track efficiency, enhancing decisionmaking,
training for both internal and external learning personalizing experiences.
audiences. • Cloud Computing:
5. m-Health- Mobile health - Is a general term for the use o Trends: Edge computing, serverless computing,
of mobile phones and other wireless technology in multi-cloud strategies, cloud security.
medical care. o Impact: Increased flexibility, scalability, and
6. PIN- Personal identification number - A secret number cost-effectiveness, improved data
used with a bank card or credit card. management and storage.
• Internet of Things (IoT):
COMPLIANCE WITH THE CODE o Trends: Smart homes, smart cities, industrial IoT,
4.1 Uphold and promote the principles of this Code. wearable technology.
• The future of the computing profession depends on o Impact: Enhanced connectivity, improved
both technical and ethical excellence. Not only is it efficiency, increased automation, new
important for ACM computing professionals to adhere business models.
to the principles expressed in this Code, each member • Cybersecurity:
should encourage and support adherence by other o Trends: Advanced persistent threats (APTs),
members. ransomware, data breaches, cloud security,
zero-trust security.
4.2 Treat violations of this code as inconsistent with membership o Impact: Protecting critical infrastructure,
in the ACM. safeguarding sensitive data, mitigating
• Adherence of professionals to a code of ethics is cyberattacks.
largely a voluntary matter. However, if a member does • Data Analytics and Big Data:
not follow this code by engaging in gross misconduct, o Trends: Data visualization, predictive analytics,
membership in ACM may be terminated. data mining, data lakes, data governance. o
Impact: Gaining valuable insights from data,
This Code and the supplemental Guidelines were developed by improving decision-making, identifying new
the Task Force for the Revision of the ACM Code of Ethics and opportunities.
Professional Conduct: Ronald E. Anderson, Chair, Gerald Engel,
Donald Gotterbarn, Grace C. Hertlein, Alex Hoffman, Bruce III. Key IT Issues
Jawer, Deborah G. Johnson, Doris K. Lidtke, Joyce Currie Little,
Dianne
• Ethical Considerations:
Martin, Donn B. Parker, Judith A. Perrolle, and Richard S.
o AI bias, data privacy, surveillance, job
Rosenberg. The Task Force was organized by ACM/SIGCAS and
displacement, algorithmic accountability.
funding was provided by the ACM SIG Discretionary Fund.
• Social Impact:
o Digital divide, misinformation, cyberbullying,
This Code and the supplemental Guidelines were adopted by
addiction to technology, social isolation.
the ACM Council on October 16, 1992. This Code may be
published without permission as long as it is not changed in any
• Environmental Impact: o E-waste, energy
consumption, carbon footprint of data centers.
way and it carries the copyright notice.
• Economic Impact:
Copyright 1997, Association for Computing Machinery, Inc. o Job displacement, income inequality,
economic disruption.
• Legal and Regulatory Issues:
o Data protection laws, intellectual property
rights, cybersecurity regulations.
I. Introduction

• Definition of Terms: IV. Key IT Challenges


o IT Trends: Current and emerging technologies,
practices, and innovations in the field of • Skills Gap: o Lack of qualified IT professionals,
Information Technology. difficulty finding and retaining talent.
o IT Issues: Problems, concerns, and • Integration and Interoperability:
controversies related to the development, o Connecting and integrating different systems
implementation, and use of IT. and technologies.
o IT Challenges: Obstacles and difficulties that • Security Threats: o Constant evolving threats,
hinder the effective and efficient use of IT. difficulty keeping up with the latest security measures.
• Importance of Understanding IT Trends, Issues, and • Cost of Technology:
Challenges: o High costs of hardware, software, and IT
o Staying informed about the latest services.
developments in the IT field. • Changing Business Needs: o Adapting to rapidly
o Making informed decisions about technology changing business requirements and market
adoption and implementation. o Addressing demands.
potential problems and mitigating risks. o
Developing and adapting to new technologies [SPECIFICALLY IN THE PHILIPPINES]
and best practices. o Preparing for the future
of work and the evolving role of IT. In the Philippines, key IT trends issues and challenges include:
poor internet infrastructure, limited digital literacy, cybersecurity
II. Key IT Trends concerns due to high online activity, inadequate data
protection measures, uneven access to technology across
regions, lack of skilled IT workforce, and the need for robust
• Artificial Intelligence (AI) and Machine Learning (ML):
regulations to manage digitalization; with the rising threat of
cyberattacks being a major concern for both individuals and spent $169.2 billion on information security and risk
businesses. management software, equipment, and services, up from
nearly $157.8 billion in 2021.
Breakdown of key issues:
The investment may increase further to $188.336 billion by the
• Infrastructure limitations: end of 2023 as more businesses adopt remote and hybrid work
o Outdated telecommunications networks, arrangements, move from virtual private networks (VPNs) to
inconsistent internet speeds, and limited zero trust network access (ZTNA), and shift to cloud-based
access to reliable broadband, particularly in delivery models.
rural areas, hinder widespread digital
adoption. 2. Expanding stringent data privacy and compliance
• Digital divide: regulations
o Unequal access to technology based on
socioeconomic status and geographic Modern technologies have made it easy for businesses to
location creates a gap in digital literacy and gather consumer data and personalize their offerings based on
participation. customers’ needs. However, despite this advantage, data
• Cybersecurity threats: collection has also raised privacy issues, pushing regulators
o The Philippines faces a high risk of cyberattacks worldwide to set or update regulations.
due to a large online population and limited
data protection practices, making individuals As more governments worldwide expand and reinforce data
and businesses vulnerable to data breaches privacy and compliance regulations this year, 65% of the global
and malware. population will potentially receive personal data protection
• Low digital literacy: through privacy laws.
o Many Filipinos lack essential digital skills,
including online safety practices, which can 3. Lacking proper e-waste disposal and data destruction
lead to misuse of information and vulnerability
to cyber threats. Businesses typically replace their legacy hardware with new
• Data privacy concerns: and improved devices to keep up with trends and enhance
o Absence of robust data protection laws can their processes. While disposing of e-waste is necessary, how it’s
leave personal information vulnerable to done can significantly affect them.
unauthorized access and misuse.
• Skills gap in IT workforce:
o The demand for skilled IT professionals exceeds According to the World Economic Forum, only 17.4% of e-waste
the available talent pool, hindering the is properly recycled worldwide. Without proper e-waste disposal
development of advanced digital solutions. measures, malicious actors may find and use residual data such
• Regulatory challenges: as passwords, sensitive corporate information, and account
o Developing and implementing effective numbers for harmful purposes.
regulations to manage the rapidly evolving
digital landscape can be complex, impacting Such a situation has already happened to American power
consumer protection and data security. company Idaho Power. In 2006, it found its discarded company
hard drives—containing company memos, customer
Positive trends: correspondences, and confidential employee information—
listed on eBay. Cases like this highlight the importance of proper
• Growing tech adoption: e-waste disposal and data destruction.
o The Philippines is witnessing a rapid increase in
smartphone usage and internet penetration, 4. Addressing the digital skills gap
driving digital engagement.
• Government initiatives: A study by Korn Ferry predicts that the U.S. could lose out on
o The government is actively promoting $162 billion in revenues annually in tech alone unless it finds
digitalization through various policies and more high-tech workers by 2030.
initiatives to improve ICT infrastructure and
digital literacy. For this reason, businesses must offer upskilling for their IT teams.
• BPO industry growth: Not only does it help IT professionals keep up with changing
o The Philippines has a strong Business Process tech trends, but it also prepares them for better work
Outsourcing (BPO) industry, contributing to the opportunities. You can upskill your IT staff in multiple ways, such
development of IT skills and generating as through virtual learning, mentorships, certificate program
employment opportunities. enrollments, and shadowing.

[8 IT Issues and Challenges Businesses Should Be Ready For] 5. Rising competition for top IT talents

1. Increasing cybersecurity threats Many businesses today favor IT workers skilled in cloud
computing, cybersecurity, data analytics, and AI because they
Cybersecurity is crucial in the digital age, especially since many bring in more ideas and profits. Yet, the biggest challenge is
businesses have shifted to a remote or hybrid work arrangement recruiting them amidst a competitive job market and the Great
and now rely on technologies like the cloud to stay connected Resignation. Either stick to your old recruitment processes or
and productive. However, cybercriminals are getting smarter change them to attract highly-skilled and competent workers.
by the day with their malware attacks and data breaches,
giving IT teams more to worry about. One way to recruit hard-to-fill IT positions is to create a job
description highlighting the rewards and benefits of working at
During the third quarter of 2022, 15 million data records were your company instead of simply listing your desired skills and
exposed worldwide through data breaches, a 37% increase experience requirements. Moreover, learn about your ideal
from the previous quarter. Ransomware attacks also affected candidates, use the right sourcing channels, and have an
70% of businesses worldwide. For these reasons, companies employee referral campaign.
6. Growing demand for cloud migration

A 2022 study found that 75% of tech leaders are building new
products and features in the cloud. Still, only 8% of technologists
have extensive experience with it. For this reason, there has
been a growing demand for cloud migration services in the
past few years.

In 2021, the global cloud migration services market reached a


value of $92.4 billion, which may increase to $340.7 billion by
2028.

7. Catching up with software and hardware innovations

Many businesses feel pressured to keep up with the latest tech


innovations as they become available. Not only is it challenging
to access new software and hardware, but it’s also risky to invest
time and money learning how to activate and use them.

According to McKinsey & Company, organizations must build


external networks to spot, invest, and even acquire promising
opportunities as they encounter more disruptions tied to digital
transformations.

8. Increasing complexity of managing IT infrastructure

Acquiring IT infrastructure is only the tip of the iceberg. The


challenge lies in managing and maintaining it long enough to
maximize its purpose. You need to take care of computers,
routers, web servers, operating systems, and productivity
applications, among other things.

Doing so successfully can lead to various benefits, such as


enhanced performance, increased productivity, and reduced
costs. The key is finding the right IT support team to maintain and
troubleshoot systems and networks and discover tech
opportunities.

V. Conclusion

• The importance of continuous learning and adaptation


in the face of rapid technological change.
• The need for a multidisciplinary approach to address
the challenges and opportunities presented by IT.
• The role of education, research, and collaboration in
shaping the future of IT.

You might also like