The seven major trends for 2017 are: | 1. IoT and smart home technology
2. Augmented reality and virtual reality
3. Machine learning
4. Automation
5. Big data
6. Physical-digital integrations
7. Everything on demand |
among the seven trends, what seem to have greatly influenced present-day culture and society; thus, it is imperative to discuss these thrusts in detail. | the Internet of Things (IoT) and automation |
Internet of Things: is often made up of sensors that collect data, which are then sent to other devices for analysis and possible interpretation. | The hardware part. |
A major requirement for IoT is a strong internet connection, as all devices must be able to communicate with one another for the upload and download of needed data. | a strong internet connection |
Aside from connectivity, IoT should also be capable of the following (Mattern & Floerkemeier) | 1. Integration
2. Data analysis and synchronization
3. Security and service |
IoT: Security and services: To improve security, IoT devices are usually divided into: | networks and each network has a different network access,
some more restricted than others, without compromising connection and system interrogation.
A typical example is your mobile phone notifying you if you will allow a new device to connect to it via Bluetooth. |
In study by (Scully, 2018) conducted by IOT Analytics, it was found that most of the 1,600 IoT projects are applied in? | cities |
Applications of IoT: topping the list are as follows: | 1. Smart cities
2. Connected industries
3. Connected buildings
4. Connected cars
5. Smart energy |
Texas Instruments, Inc. has identified six challenges in its implementation: | 1. System requirements
2. Connectivity
3. Power requirements
4. Security
5. Development
6. Services |
Automation is colloquially called: | "computerization" |
having an automated system means: | automated business process, operations, service provider, monitoring, and even tools. |
Two common methods in implementing IT automation: | Robotic Process Automation (RPA)
Sensors |
Is defined as the application of technology that allows employees in a company to configure computer software or a "robot" to capture and interpret existing applications for processing a transaction, manipulating data, triggering responses and communicating with other digital systems. | robotic process automation (RPA) |
RPA: Application systems and software may also be considered as RPA as they are applicable to the following: | 1. Process automation
2. IT Support Management
3. Automated Assistants |
The institute of Robotic Process Automation and Artificial Intelligence (IRPAAI) defined robotic process automation (RPA) as: | the application of technology that allows employees in a company to configure computer software or a "robot" to capture and interpret existing applications for processing a transaction, manipulating data, triggering responses and communicating with other digital systems. |
RPA: The use not only of industrial robots but also "presentation-layer automation software" is capable of carrying out the daily operations of an organization. | Process automation |
RPA: Process automation may include finance systems such as: | payroll, customer management systems such as online system registration, and academic institutions offering online enrollment systems, among others. |
RPA: Application systems and software may also be considered as RPA as they are applicable to the following:
this becomes easier using RPA.
If part of the system fails, an automated system can immediately send notifications to the IT manager and technical support staff, informing them of the problem.
For example, large buildings employ an automated emergency system, so if an emergency exit door has been opened, or a fire alarm goes off, the system will automatically detect the exact location of the opened door or activated alarm, as the location of the emergency will typically be assumed to be near that point. | IT support management |
is an example of voice recognition software used in RPAs. | Apple's Siri
Amazon's Alexa
Microsoft's Cortana
Google Assistant |
RPA: Automated assistants: Instead of machine language (binary), computers will be able to: | understand human language and interact all the same. |
are hardware devices that have the capability to measure an event, object, or any physical quality that is happening. | Sensors |
Sensors can be classified as: | analog or digital |
List of sensors used in automation: | Temperature sensor
Infrared sensor
Ultrasonic sensor
Touch sensor
Proximity sensor
Pressure sensor
Level sensor
Smoke/Gas sensor |
Sensors used in automation:
This sensor is capable of measuring temperature as well as detecting its rise or fall. This is helpful in systems that are temperature-sensitive such as power plants and server rooms. | Temperature sensor |
Sensors used in automation:
This sensor often used for security purposes detects infrared light. It is commonly used along with an infrared light source. You might have seen it in movies in which a villain trying to access a restricted area would avoid crossing a series of IR sensors shown as beams of red lines. Breaking or crossing the beam of red line would trigger an alarm. | Infrared sensor |
Sensors used in automation:
An ultrasonic sensor detects sound waves, such as how radars and sonars pick up sounds. A typical application is a light fixture turning on if the owner claps his or her hands, and turning off once he or she claps again. | ultrasonic sensor |
Sensors used in automation:
Through touch, the sensor activates itself and becomes capable of doing its function. The latest versions of Samsung and Apple smartphones now have a one-touch login to access the device, instead of a pin code or a pattern. Combining a touch sensor with biometrics, users can now access the content of their phones with just a single touch on the home button. | Touch sensor |
Sensors used in automation:
This sensor is able to detect objects within a certain range, even if the object is not physically touching the sensor yet. It is typically used in the light fixtures of houses and buildings. The light turns on if it detects a person is close by. This helps save on electricity as well as secure the premises. | Proximity sensor |
Sensors used in automation:
A pressure sensor helps determine the weight or impact of a certain object. It is normally used by manufacturing companies, such as automobile companies, in designing their airbag system. They need to create an airbag that is strong enough to cushion a driver upon a head-on collision, but not too strong to injure him or her due to the recoil. | Pressure sensor |
Sensors used in automation:
This sensor can detect the level of liquids, fluids, grainy or granular materials, such as powders, etc.
are used for disaster risk management systems, such as a flood monitoring system.
are used to determine if a flooded street will be passable by light vehicles or not. | Level sensor |
Sensors used in automation:
This sensor is used to detect the presence of dangerous fumes such as carbon monoxide caused by fire. Smoke alarms show how this sensor works. | Smoke/Gas sensor |
The influence of IT on Culture and Social Behavior: The Philippines due to the high number of SMS being sent and received on a daily basis, is formerly called: | "texting-capital of the world" |
The influence of IT on Culture and Social Behavior: In a 2015 study conducted by Opera Mini, the Philippines is now dubbed as the: | "most social nation" |
In Opera Mini's top 50-user countries worldwide, the Philippines ranked first with an: | 86% page-view. |
The smartphone adoption rate has grown from what percent in a span of one year with Android as the most popular OS. | 41% to 51% |
The study (by Opera Mini) found that Filipinos view on average, how many web pages per month:
That is close to how many pages viewed per day: | 699
23 pages viewed per day |
The influence of IT on Culture and Social Behavior:
Gilkey (2015) identified in his article the many hundreds of small ways that technology alters individual and collective behavior on a daily basis.
It may not be noticed, but these "small ways" are slowly becoming prominent which is probably why the so-called what are now becoming popular with the obvious disparity between these generations publicized in social media. | "generation wars"
i.e. Baby Boomers vs. Gen X vs. Millennials |
Influence of IT on culture: what are tackled in the book that influence culture: | Online reviews
Weblogging/Social Media
YouTube Learners |
Influence of IT on culture: This trend of having other people do the task first for others-- watching the full movie and informing people online if the film is worth watching or not-- is an example of how technology affects the basic human behavior of decision-making | Online Reviews |
Influence of IT on culture: Food bloggers posting pictures of their meals in restaurants along with a food review, this trend created a culture of people dining with friends or family without actually interacting with them.
Others during the course of the meal, would even use their phones to update their online status instead of talking to the other people in their group.
are one typical example of technology in this form affecting "social interaction" | Weblogging/Social Media |
Influence of IT on culture: is one of the most popular social media sites.
serves as a source of vides with people searching for almost about anything online--- from trivial topics to more serious subject matter.
This fact influences the acquisition of knowledge and learning of certain skill sets instead of holding books or listening to their teacher's class lecture, students would rather watch YouTube to learn the lesson.
This is another situation in which technology affects the culture, this time, of learning | YouTube Learners |
Influence on Social Behavior: Is an unwanted, hostile behavior done by individuals to other people in the hope of gaining control over them. | Cyberbullying |
Influence on Social Behavior: Cyberbullies can be: | classmates, neighbors, or officemates (everyone) |
Influence on Social Behavior: Victims of bullying often end up with: | personal traumas |
Influence on Social Behavior: Since the act of bullying is done online, the attackers may also be individuals you do not know as they hide behind their: | internet profiles |
is a profile created by internet users to establish their social identity in online communities, social media sites, and other websites. | Internet profile |
Internet profile are also called an: | internet identity, online identity, or internet persona |
Influence on Social Behavior: Because some consider an online identity to be a possible breach in privacy, this has led to the creation of an online ???,
an online profile created through a series of questions (username, gender, age, etc.)
may lead to a misdirection, or in a worse case, to misinformation. | mask |
Influence on Social Behavior: What is an example of mask and why are they misdirecting or misleading? | For example, while a handle or username "student2006" may mean that the user is a student, "2006" may mean either the user's year of birth or year of entering school.
It is possible also that the username is randomly created and it is not the user's real identity.
Choosing a gender also gives the user the option to either be a boy or a girl.
Setting the birthdate online gives the person the option to either be younger or |
Facebook requires its users to be at least what years of age before they can create an account. | at least 13 years of age |
Cyberbullying comes in the form of messages or images, such as: | memes |
messages or images are hard and oftentimes difficult to trace the source since it can be: | posted anonymously |
tracing the source of messages and images becomes more problematic if: | the messages or image gets re-posted and distributed quickly online, or goes "viral."
Finding the original post might prove to be even harder. |
To help catch cyberbullies, the Philippines has identified several laws including: | the Cyber Crime Prevention Act, also known as R.A. 10175 |
Is a combination of the words internet and etiquette. It describes how one should act online | Netiquette |
Some of the rules of netiquette for social media are: | The Personalize IT Rule
The Off-limits Rule
The Tag - You're It Rule |
Some of the rules of netiquette for social media are: Make sure to put restrictions in accepting friends or followers on your social media (e.g., Facebook, Twitter, Instagram, LinkedIn). It is not about having the most number of followers or friends. What matters is who you interact with and how you interact with them. | The Personalize IT Rule |
Some of the rules of netiquette for social media are: Know your limitations when voicing out your opinions on different subjects or topics concerning your school, religion, personal information, workplace, and even some controversial subjects such as politics. Knowing your limitations can save your from dire consequences later on. | The Off-limits Rule |
Some of the rules of netiquette for social media are:
Be careful in tagging someone either in your status post or photos. You may also restrict someone from tagging you in their posts and photos. Always think of your safety, as well as others' personal boundaries. | The Tag - You're It Rule |
Netiquette for Email Services, Chat Rooms, and Instant Messaging: To whom the email will be sent | Recipient |
Netiquette for Email Services, Chat Rooms, and Instant Messaging: Gives hint of the purpose of the email | Subject Line |
Netiquette for Email Services, Chat Rooms, and Instant Messaging: Serves as greetings to the recipient | Salutation |
Netiquette for Email Services, Chat Rooms, and Instant Messaging: Body of the email must be: | short and specific |
Netiquette for Email Services, Chat Rooms, and Instant Messaging: Contains courteous language as form of farewell | Closing Line |
Netiquette for Chat Rooms and Instant messaging: a: | Think long and hard before accepting a private conversation, especially with someone not on your friends list. Not everyone online may be as they seem to be. |
Netiquette for Chat Rooms and Instant messaging: b: | In a group chat, include only those that are in your friends list |
Netiquette for Chat Rooms and Instant messaging: c: | If possible, do not give your personal information while chatting, including your photos or "selfies" |
Netiquette for Chat Rooms and Instant messaging: d: | When in doubt, save a copy or make a back-up of your conversation (chat) |
Netiquette for Chat Rooms and Instant messaging: e: | You must log out from your account at all times, especially if you are in a public place, such as a computer shop. |
Netiquette for Chat Rooms and Instant messaging: f: | You may opt to customize your account settings from public to private account. |
The Association of Computing Machinery (ACM) has identified how many imperatives of professional conduct for IT professionals. | 24 |
Imperatives of professional conduct for IT professionals: Section 1 outlines: | the fundamental ethical considerations |
Imperatives of professional conduct for IT professionals: What section outlines the fundamental ethical considerations | Section 1 |
Imperatives of professional conduct for IT professionals: Section 2 provides: | additional, more specific considerations of professional conduct. |
Imperatives of professional conduct for IT professionals: What section provides additional, more specific considerations of professional conduct: | 2 |
Imperatives of professional conduct for IT professionals: is intended specifically for individuals who have a leadership role, whether in the workplace or in a volunteer capacity such as in organizations like ACM. | 3 |
Imperatives of professional conduct for IT professionals: Section 3 is: | intended specifically for individuals who have a leadership role, whether in the workplace or in a volunteer capacity such as in organizations like ACM |
Imperatives of professional conduct for IT professionals: Principles involving compliance with this code are laid out in section: | 4 |
Imperatives of professional conduct for IT professionals: Section 4 lays out: | principles involving compliance with this code |
Imperatives of professional conduct for IT professionals: Section 1: is: | General Moral Imperatives |
Imperatives of professional conduct for IT professionals: Section 1: General Moral Imperatives, as an ACM member, I will: 1.1: | Contribute to society and human well-being |
Imperatives of professional conduct for IT professionals: Section 1: General Moral Imperatives, as an ACM member, I will:
Contribute to society and human well-being: | Section 1.1 |
Imperatives of professional conduct for IT professionals: Section 1: General Moral Imperatives, as an ACM member, I will: 1.2: | Avoid harm to other |
Imperatives of professional conduct for IT professionals: Section 1: General Moral Imperatives, as an ACM member, I will:
Avoid harm to others | Section 1.2 |
Imperatives of professional conduct for IT professionals: Section 1: General Moral Imperatives, as an ACM member, I will: 1.3: | Be honest and trustworthy |
Imperatives of professional conduct for IT professionals: Section 1: General Moral Imperatives, as an ACM member, I will:
Be honest and trustworthy | section 1.3 |
Imperatives of professional conduct for IT professionals: Section 1: General Moral Imperatives, as an ACM member, I will: 1.4: | Be fair and take action not to discriminate |
Imperatives of professional conduct for IT professionals: Section 1: General Moral Imperatives, as an ACM member, I will:
be fair and take action not to discriminate | Section 1.4 |
Imperatives of professional conduct for IT professionals: Section 1: General Moral Imperatives, as an ACM member, I will: 1.5: | Honor property rights including copyrights and patent |
Imperatives of professional conduct for IT professionals: Section 1: General Moral Imperatives, as an ACM member, I will:
Honor property rights including copyrights and patent | Section 1.5 |
Imperatives of professional conduct for IT professionals: Section 1: General Moral Imperatives, as an ACM member, I will: 1.6: | Give proper credit for intellectual property |
Imperatives of professional conduct for IT professionals: Section 1: General Moral Imperatives, as an ACM member, I will:
Give proper credit for intellectual property | Section 1.6 |
Imperatives of professional conduct for IT professionals: Section 1: General Moral Imperatives, as an ACM member, I will: 1.7: | Respect the privacy of others |
Imperatives of professional conduct for IT professionals: Section 1: General Moral Imperatives, as an ACM member, I will:
Respect the privacy of others | Section 1.7 |
Imperatives of professional conduct for IT professionals: Section 1: General Moral Imperatives, as an ACM member, I will: 1.8: | Honor confidentiality |
Imperatives of professional conduct for IT professionals: Section 1: General Moral Imperatives, as an ACM member, I will:
Honor confidentiality | Section 1.8 |
Imperatives of professional conduct for IT professionals: Section 2: More specific professional responsibilities, as an ACM computing professional, I will: | More specific professional responsibilities |
Imperatives of professional conduct for IT professionals: Section 2: More specific professional responsibilities, as an ACM computing professional, I will: 2.1: | Strive to achieve the highest quality, effectiveness and dignity in both the process and products of professional work. |
Imperatives of professional conduct for IT professionals: Section 2: More specific professional responsibilities, as an ACM computing professional, I will:
Strive to achieve the highest quality, effectiveness and dignity in both the process and products of professional work | 2.1 |
Imperatives of professional conduct for IT professionals: Section 2: More specific professional responsibilities, as an ACM computing professional, I will: 2.2 | Acquire and maintain professional competence |
Imperatives of professional conduct for IT professionals: Section 2: More specific professional responsibilities, as an ACM computing professional, I will:
Acquire and maintain professional competence | 2.2 |
Imperatives of professional conduct for IT professionals: Section 2: More specific professional responsibilities, as an ACM computing professional, I will: 2.3: | Know and respect existing laws pertaining to professional work |
Imperatives of professional conduct for IT professionals: Section 2: More specific professional responsibilities, as an ACM computing professional, I will:
Know and respect existing laws pertaining to professional work | 2.3 |
Imperatives of professional conduct for IT professionals: Section 2: More specific professional responsibilities, as an ACM computing professional, I will: 2.4: | Accept and provide appropriate professional review |
Imperatives of professional conduct for IT professionals: Section 2: More specific professional responsibilities, as an ACM computing professional, I will:
Accept and provide appropriate professional review | 2.4 |
Imperatives of professional conduct for IT professionals: Section 2: More specific professional responsibilities, as an ACM computing professional, I will: 2.5: | Give comprehensive and thorough evaluations of computer systems and their impacts, including analysis of possible risks |
Imperatives of professional conduct for IT professionals: Section 2: More specific professional responsibilities, as an ACM computing professional, I will:
Give comprehensive and thorough evaluations of computer systems and their impacts, including analysis of possible risks | 2.5 |
Imperatives of professional conduct for IT professionals: Section 2: More specific professional responsibilities, as an ACM computing professional, I will: 2.6: | Honor contracts, agreements, and assigned responsibilities |
Imperatives of professional conduct for IT professionals: Section 2: More specific professional responsibilities, as an ACM computing professional, I will:
Honor contracts, agreements, and assigned responsibilities | 2.6 |
Imperatives of professional conduct for IT professionals: Section 2: More specific professional responsibilities, as an ACM computing professional, I will: 2.7 | Improve public understanding of computing and its consequences. |
Imperatives of professional conduct for IT professionals: Section 2: More specific professional responsibilities, as an ACM computing professional, I will:
Improve public understanding of computing and its conequences | 2.7 |
Imperatives of professional conduct for IT professionals: Section 2: More specific professional responsibilities, as an ACM computing professional, I will: 2.8: | Access computing and communication resources only when authorized to do so |
Imperatives of professional conduct for IT professionals: Section 2: More specific professional responsibilities, as an ACM computing professional, I will:
Access computing and communication resources only when authorized to do so | 2.8 |
Imperatives of professional conduct for IT professionals: Section 3: | Organizational Leadership Imperatives |
Imperatives of professional conduct for IT professionals: Section 3: This section draws extensively from the?,
especially its sections on organizational ethics and international concerns | the draft IFIP Code of Ethics |
Imperatives of professional conduct for IT professionals: Section 3: The ethical obligations of organizations tend to be neglected in most codes professional conduct, perhaps because: | these codes are written from the perspective of the individual member |
Imperatives of professional conduct for IT professionals: Section 3: The dilemma of the ethical obligations of organizations tending to be neglected in most codes professional conduct is addressed by:
In this context it is viewed as: | stating these imperatives from the perspective of the organizational leader.
any organizational member who has leadership or educational responsibilities |
Imperatives of professional conduct for IT professionals: Section 3: In this context "organizations" are: | corporations, government agencies, and other "employers," as well as volunteer professional organizations. |
Imperatives of professional conduct for IT professionals: Section 3: Organizational Leadership Imperatives, as an ACM member and an organizational leader, I will: 3.1: | Articulate social responsibilities of members of an organizational unit and encourage full acceptance of those responsibilities |
Imperatives of professional conduct for IT professionals: Section 3: Organizational Leadership Imperatives, as an ACM member and an organizational leader, I will:
Articulate social responsibilities of members of an organizational unit and encourage full acceptance of those responsibilities | 3.1 |
Imperatives of professional conduct for IT professionals: Section 3: Organizational Leadership Imperatives, as an ACM member and an organizational leader, I will: 3.2: | Manage personnel and resources to design and build information systems that enhance the quality of working life. |
Imperatives of professional conduct for IT professionals: Section 3: Organizational Leadership Imperatives, as an ACM member and an organizational leader, I will:
Manage personnel and resources to design and build information systems that enhance the quality of working life | 3.2 |
Imperatives of professional conduct for IT professionals: Section 3: Organizational Leadership Imperatives, as an ACM member and an organizational leader, I will: 3.3: | Acknowledge and support proper and authorized uses of an organization's computing and communication resources: |
Imperatives of professional conduct for IT professionals: Section 3: Organizational Leadership Imperatives, as an ACM member and an organizational leader, I will:
Acknowledge and support proper and authorized uses of an organization's computing and communication resources: | 3.3 |
Imperatives of professional conduct for IT professionals: Section 3: Organizational Leadership Imperatives, as an ACM member and an organizational leader, I will: 3.4: | Ensure that users and those who will be affected by a system have their needs clearly articulated during the assessment and design of requirements; later, the system must be validated to meet requirements |
Imperatives of professional conduct for IT professionals: Section 3: Organizational Leadership Imperatives, as an ACM member and an organizational leader, I will:
Ensure that users and those who will be affected by a system have their needs clearly articulated during the assessment and design of requirements; later, the system must be validated to meet requirements: | 3.4 |
Imperatives of professional conduct for IT professionals: Section 3: Organizational Leadership Imperatives, as an ACM member and an organizational leader, I will: 3.5: | Articulate and support policies that protect the dignity of users and other affected by a computing system |
Imperatives of professional conduct for IT professionals: Section 3: Organizational Leadership Imperatives, as an ACM member and an organizational leader, I will:
Articulate and support policies that protect the dignity of users and others affected by a computing system: | 3.5 |
Imperatives of professional conduct for IT professionals: Section 3: Organizational Leadership Imperatives, as an ACM member and an organizational leader, I will: 3.6: | Create opportunities for members of the organization to learn the principles and limitations of computer systems: |
Imperatives of professional conduct for IT professionals: Section 3: Organizational Leadership Imperatives, as an ACM member and an organizational leader, I will:
Create opportunities for members of the organization to learn the principles and limitations of computer systems | 3.6 |
Imperatives of professional conduct for IT professionals: Section 4: | Compliance with the code |
Imperatives of professional conduct for IT professionals: Section 4: Compliance with the code, as an ACM member, I will: 4.1: | Uphold and promote the principles of this Code |
Imperatives of professional conduct for IT professionals: Section 4: Compliance with the code, as an ACM member, I will:
Uphold and promote the principles of this code | 4.1 |
Imperatives of professional conduct for IT professionals: Section 4: Compliance with the code, as an ACM member, I will: 4.2: | Treat violations of this code as inconsistent with membership in the ACM |
Imperatives of professional conduct for IT professionals: Section 4: Compliance with the code, as an ACM member, I will:
Treat violations of this code as inconsistent with membership in the ACM | 4.2 |