Gee4 Module 3 Part 2
Gee4 Module 3 Part 2
Internet of Things is a set-up of devices and objects which are connected together in a given
network. Their connection, often wirelessly, is possible using both hardware and their software.
The hardware part is often made up of sensors that collect data, which are then sent to other
devices for analysis and possible interpretation. Popular examples are health wearable devices
such as step counters that are connected to a mobile phone via bluetooth. An app installed in the
phone records the results in a weekly, or monthly basis for the mobile phone user to keep track
of his or her progress.
Applications of IoT
With improved business processes and employee productivity, it is only natural for organizations
to adopt loT. In a study conducted by 10T Analytics, it was found that most of the 1,600 loT
projects are applied in cities (Scully, 2018).
1. Smart cities
Smart cities have adopted loT in traffic management, waste disposal, and even
community monitoring for the security of the city's residents.
2. Connected industries
The oil and gas industry is identified as ne the front-runners for loT connectivity which
include. remote access to heavy equipment and machinery manufacturing to production.
3. Connected buildings
Connected building projects involve facility. facility- automation to reduce energy costs.
4. Connected cars
With smart cities adopting loT for their traffic management, it is no longer surprising tor
the latest car models to be equipped with sensors and network connectivity. Majority of
projects relating to smart vehicles revolve around vehicle diagnostics and monitoring
5. Smart energy
Majority of smart energy projects focus on developing smart grids for renewable energy
and infrastructure.
Influence on Culture
Online Reviews
With the proliferation of online information, it 15 easy to find details on a certain movie or a
book. However, with sites such as Rotten Tomatoes, one can actually make a decision on what
movie to watch simply by reading the "reviews" of other people. If the review is "good," then the
person might watch the movie, but if the review is "bad," then he or she might consider other
movies This trend of having other people do the task first tor others watching the full movie and
informing people online if the film is worth watching or not is an example of how technology
affects the basic human behavior of decision-making.
Weblogging/Social Media
Nowadays, food bloggers post pictures of their meals in restaurants along with a food review.
This trend created a culture of people dining with friends or family without actually interacting
with them. People would first take pictures of their meal and post it online. Others, during the
course of the meal, would even use their phones to update their online status instead of talking to
the other people in their group. This is one typical example of technology, in the form of
weblogging and social media, affecting social interaction.
YouTube Learners
YouTube is one of the most popular social media sites. People can watch videos, comment on
them, and upload their own videos, among others. Thus, YouTube serves as a source of videos
with people searching for almost about anything online from trivial topics to more serious
subject matter This fact influences the acquisition of knowledge and learning of certain skill sets.
Instead of reading books or listening to their teacher class lecture, students would rather watch
YouTube to learn t lesson. Again, this is another situation in which technology affer the culture,
this time, of learning
Cyberbullying
Behavioral choices especially of teenagers or adolescents are influenced by technologies.
Cyberbullying, for example, is a serious phenomenon brought about by social media.
Cyberbullying is an unwanted, hostile behavior done by individuals to other people in the hope
of gaining control over them. Cyberbullies can be classmates, neighbors, or officemates. Victims
of bullying often end up with personal traumas. And since the act of bullying is done online, the
attackers may also be individuals you do not know as they hide behind their internet profiles. An
internet profile, also called an internet identity, online identity, or internet persona, is a profile
created by internet users to establish their social identity in online communities, social media
sites, and other websites. Because some consider an online identity to be a possible breach in
privacy, this has led to the creation of an online "mask," an online profile created through a series
of questions (username, gender, age, etc.). However, this "mask" may lead to a misdirection, or
in a worse case, to misinformation. For example, while a handle or username "student2006" may
mean that the user is a student, "2006" may mean either the user's year of birth or year of
entering school.
Netiquette
Netiquette is a combination of the words internet and etiquette. It describes how one should act
online. Netiquette brings in policies for all the features and qualities of the internet, including the
use of the World Wide Web (Www), email services, File Transfer Protocol (FTP), chat rooms,
and instant messaging. There are different types of netiquette implemented all over the world.
Netiquette for Social Media The use of social media such as Facebook, Twitter, Instagram,
LinkedIn, and others is neither a bad habit nor a good habit in one's personal life. Using social
media is good for easy communication with friends and even long-lost friends and relatives. But
there are some netizens who use their social media accounts to discredit other people by posting
or shouting ruthless words about a particular person or sharing a status that maligns one's
character or reputation. Some of the rules of netiquette for social media are as follows (Spira,
2010):
1. The Personalize IT Rule. Make sure to put restrictions in accepting friends or followers
on your social media (e.g., Facebook, Twitter, Instagram, LinkedIn). It is not about
having the most number of followers or friends. What matters is who you interact with
and how you interact with them.
2. The Off-limits Rule. Know your limitations when voicing out your opinions on different
subjects or topics concerning your school, religion, personal information, workplace, and
even some controversial subjects such as politics. Knowing your limitations can save you
from dire consequences later on.
3. The Tag- You're It Rule. Be careful in tagging someone either in your status post or
photos. You may also restrict someone from tagging you in their posts policies for all the
features and qualities of the internet, including the use of the World Wide Web (WWW),
email services, File Transfer Protocol (FTP), chat rooms, and instant messaging. There
are different types of netiquette implemented all over the world. Netiquette for Social
Media The use of social media such as Facebook, Twitter, Instagram, LinkedIn, and
others is neither a bad habit nor a good habit in one's personal life. Using social media is
good for easy communication with friends and even long-lost friends and relatives. But
there are some netizens who use their social media accounts to discredit other people by
posting or shouting ruthless words about a particular person or sharing a status that
maligns one's character or reputation. Some of the rules of netiquette for social media are
as follows
Netiquette for Email Services, Chat Rooms, and Instant Messaging
Email services such as sending and receiving an email from someone (professional to personal)
anywhere in the world are used in numerous contexts. Shown in the figure are Some guidelines
in composing an email.
Joining chat rooms and sending instant messages, although mandatory in social media, have
become a trend for users. This is especially beneficial for people working in different places such
as a person working overseas while his or her friend or relative is in the Philippines. Instead of
spending for telcom services, the person just needs internet connection. Still, there are guidelines
for using instant messaging applications. For instance, someone might interrupt and request you
to accept him or her or to be connected to your account without your knowing who that person
really is.
1. Think long and hard before accepting a private conversation, especially with someone not
on your friends list. Not everyone online may be as they seem to be.
2. In a group chat, include only those that are in your friends list.
3. If possible, do not give your personal information while chatting, including your photos
or "selfies."
4. When in doubt, save a copy or make a back-up of your conversation (chat).
5. You must log out from your account at all times, especially if you are in a public place,
such as a computer shop.
6. You may opt to customize your account settings from public to private account.
Trends
This chapter features articles and studies showing trend IT from recent years. The topics include
the industry sector s u of technology specifically loT and automation, Articles regard e online
banking as well as the business sector's online presence through e-commerce are likewise
included. IT trends on education and case studies on the use of technology in health are also
presented. Lastiy, this chapter covers several issues in 1 that tne different sectors face.
Industry
The industry sector in the Philippines is made up of local and foreign companies that provide
different products and services to Filipinos. Some companies in the food industry include
Universal Robina and Monde Nissin while those in the beverage industry include San Miguel
Brewery and Pepsi Philippines. Two major trends are seen in this sector-automation and the
application of Internet of Things (IoT), hence the introduction of smart industries. Internet of
Things (IOT). The IoT is becoming an increasingly growing topic of conversation both in the
workplace and in the society at large. It has the potential to impact how we live and how we
work. For instance, through the use or sensors, electronics, and robotics, major companies have
reported increase in productivity as well as accuracy of results in their production lines. The
following articles present the positive effects of loT and the role of the internet and network
connectivity in business.
IT Automation
Automating what used to be manual procedures is the trend in organizations and industries. As
with IoT, automation helps many companies achieve greater productivity among its employers
by using computers and software programs to do the tasks. Such automation includes accounting
systems, production systems, and even security systems, the news articles below mention how a
simple attendance monitoring system has become much easies as well as how companies and
employees can benefit from using technology in their daily work.
Banking
Online banking also known as "internet banking" or "web banking allows a user to execute
financial transactions via tn internet. An online bank offers customers just about every service
traditionally available through a local branch, including deposits money transfers, and bill
payments. The news articles that follow explore the rise of digital banking customers as more
and more Filipinos rely on their internet connection to avail of different bank services.
Education
Most colleges and universities in the Philippines use a learning management system (LMS) to
deliver, manage, and keep track of students' progress. This LMS, which is delivered online,
relates to the e-learning system. E-learning is learning that utilizes electronic technologies to
acces5 educational curriculum outside of a traditional classroom, in most Cases, it refers to a
course program, or degree delivered completely online, Some call this as distance learning. The
news articles that follow discuss how telecom companies such as Globe and PLDT are giving
back to the society by introducing technology to public schools and making sure students, as well
as teachers, become global learners.
Business
Health
E-health (or e- Health) refers to the use of information and communications technology in health
care, It covers a lot of territory, which is why digital health industry experts often contest exactly
what the term means and to add to the confusion, it is also frequently used as a synonym for
Health IT.
Issues and Challenges
Spyware
Spyware collects information about users’ activities without their knowledge or consent.
This can include passwords, pins, payment information and unstructured messages. The use
of spyware is not limited to the desktop browser: it can also operate in a critical app or on a
mobile phone. Even if the data stolen is not critical, the effects of spyware often ripple
throughout the organization as performance is degraded and productivity eroded.
Spyware Example:
DarkHotel , which targeted business and government leaders using hotel WIFI, used several
types of malware in order to gain access to the systems belonging to specific powerful
people. Once that access was gained, the attackers installed keyloggers to capture their
targets passwords and other sensitive information.
Adware
Adware tracks a user’s surfing activity to determine which ads to serve them. Although
adware is similar to spyware, it does not install any software on a user’s computer, nor does
it capture keystrokes. The danger in adware is the erosion of a user’s privacy — the data
captured by adware is collated with data captured, overtly or covertly, about the user’s
activity elsewhere on the internet and used to create a profile of that person which includes
who their friends are, what they’ve purchased, where they’ve traveled, and more. That
information can be shared or sold to advertisers without the user’s consent.
Adware Example:
Trojan
Trojan Example:
Emotet is a sophisticated banking trojan that has been around since 2014. It is hard to fight
Emotet because it evades signature-based detection, is persistent, and includes spreader
modules that help it propagate. The trojan is so widespread that it is the subject of a US
Department of Homeland Security alert, which notes that Emotet has cost state, local, tribal
and territorial governments up to $1 million per incident to remediate.
Worms
Worms target vulnerabilities in operating systems to install themselves into networks. They
may gain access in several ways: through backdoors built into software, through
unintentional software vulnerabilities, or through flash drives. Once in place, worms can be
used by malicious actors to launch DDoS attacks, steal sensitive data, or conduct
ransomware attacks.
Worm Example:
Stuxnet was probably developed by the US and Israeli intelligence forces with the intent of
setting back Iran’s nuclear program. It was introduced into Iran’s environment through a
flash drive. Because the environment was air-gapped, its creators never thought Stuxnet
would escape its target’s network — but it did. Once in the wild, Stuxnet spread
aggressively but did little damage, since its only function was to interfere with industrial
controllers that managed the uranium enrichment process.
Virus
A virus is a piece of code that inserts itself into an application and executes when the app is
run. Once inside a network, a virus may be used to steal sensitive data, launch DDoS attacks
or conduct ransomware attacks.
Keyloggers
A keylogger is a type of spyware that monitors user activity. Keyloggers have legitimate
uses; businesses can use them to monitor employee activity and families may use them to
keep track of children’s online behaviors. However, when installed for malicious purposes,
keyloggers can be used to steal password data, banking information and other sensitive
information. Keyloggers can be inserted into a system through phishing, social engineering
or malicious downloads.
Keylogger Example:
A keylogger called Olympic Vision has been used to target US, Middle Eastern and Asian
businessmen for business email compromise (BEC) attacks. Olympic Vision uses spear-
phishing and social engineering techniques to infect its targets’ systems in order to steal
sensitive data and spy on business transactions. The keylogger is not sophisticated, but it’s
available on the black market for $25 so it’s highly accessible to malicious actors.
Activity
Multiple Choice:
Circle the letter that corresponds to your answer.
2. It refers to the voluminous amount of data from traditional and digital sources that could
be mined tor valuable insights on human behavior such as trends, patterns, and
associations, in turn boosting business intelligence.
a. Big data
b. IT automation
c. Digibanker
d. Learning management system
Research further on the influence of IT at least two (2) of the following sectors:
Banking
Technology and digitization have transformed the BFSI sector by enabling them with real-
time actionable insights to make informed decisions, creating competitive advantages and
elevating consumer experience. This also allows banks to share potential products, upsells,
cross-sells, and strategic planning with customers.
Education
Health
The goal of information technology in the healthcare industry is to improve the overall health
of the population by improving the quality of care that patients receive. Information
technology is important in the healthcare industry, as it supports shared decision making
between healthcare professionals and patients.
Business
References
https://support.google.com/google-ads/answer/2375413?hl=en
AgenceFrance-Presse. (2017, May 13). Global ransomware attack hits 74 countries. ABS CBN
News. Retrieved from http://news. abs-cbn.com/overseas/05/12/17/global-ransomware-attack
hits-74-countries
Bacungan, V. (2017, June 8). BPI: Problems with accounts will be resolved 'within the day.
CNN Philippines Retrieved from http://ennphilippines.com/news/2017/06/07/bpi-report
unauthorized-transaction.html
Cahiles-Magkilat, B. C. (2017, May 22). E-commerce growth to drive logistics business in PH.
Manila Bulletin. Retrieved trom https://business.mb.com.ph/2017/05/22/e-commerce growth-to-
drive-logistics-business-in-ph.
DelMers, I (2016, November 16). 7 Technology trends that will dominate 2017. Forbes
Retrieved from https://www.forbes. com/sites/jaysondemers/ 2016/11/16/7-technology-trends-
mat-wil-dominate-2017
Dumlao, D C. (2013, April 3). More Filipinos warming up to online banking, Citi survey shows.
nquirer. Net. Retrieved from http://business.inquirer.net/115213/more-filipinos-warming up-to-
online-bankng-citi-survey-shows
Eysenbach, G. (2001). What is e-health? Journal of Medical Internet Research, 3 (2), e20.
doi:10.2196/jmir.3.2.e20
Facebook. (2018) How do I report a child under the age of 137 Retrieved from
https://www.facebook.com/help/15779354 0954833
First Circle. (2018). Philippine e-commerce to reach P200bn by 2020 Retneved from
https://www.firstcircle.ph/blog/philippine-e- Commerce-to-reach-200bn-by-
20207r=/blog&rt=The%20Blog
Frialde, M. (2014, July 29). Makati fully implements biometric timekeeping system. PhilStar.
Retrieved fromhttp://www. philstar.com/nation/2014/07/29/1351664/makati-fully- implements-
biometric-timekeeping-systemn
Glkey, C. (2015, April 21). Technology and culture influence each other, Retrieved from
http://www.productiveflourishing.com/ technology-and-culture-intiuence-each-other
Henry Schein Medical Systems, Inc. (n.d.). Overview of HIPAA and HITECH data security
requirements. Retrieved from https:// www.micromd.com/hipaa-hitech-security-compliance-emr-
pm-data-back-up/
Interaksyon. (2017, June 12). Security Bank's govt payment service cited at HKs The Asset
Triple A awards. Retrieved from http:// www.interaksyon.com/security-banks-govt-payment-
service- Cited-at-hks-the-asset-tnple-a-awards
Kumar, S. (2015). 5 common problems faced by students in elearning and how to overcome
them. Retrieved from https:// elearningindustry.com/5-common-problems-faced-by- students-in-
elearning-overcome.
Manila Bulletin. (2017, February 13). Global Filipino schools enhance eLearning with
Cloudfone tablets. Retrieved from https:// technology.mb.com.ph/2017/02/13/global-filipino-
schools- enhance-elearning-with-cloudfone-tablets
National Privacy Commisison. (2017, September 20) Ahead of PHIE, private hospitals
complying with Data Privacy Act. Retrieved from https://privacy.gov.ph/ahead-phie private-
hospitals complying-data privacy-act
Reyes, R. R. (2017, June 10). Property consultant bares future of work. Business Mirror.
Retrieved from http://www. businessmirror.com.ph/property-consultant-bares-future-of work
Reyes, R. R., & Estopace, D. (2016, March 14). Groups to mull over lo T development in
Philippines. BusinessMirror. Retrieved from http://www.businessmirror.com.ph/groups-to-mull-
over-iot development-in-philippines
Sunstar. (2016, September 26). PLDT enterprise rolls out e-Learning program to aid millennials'
studies. Retrieved from http://www. sunstar.com.ph/manila/business/2016/09/26/pldt-enterprise-
rolls-out-elearning-program-aid-millennials-studies
Prepared by:
Approved: