SOUTHERN LEYTE STATE UNIVERSITY – MAIN CAMPUS
SOGOD, SOUTHERN LEYTE
INSTITUTE OF ARTS AND SCIENCES
MA. RHADEL ANN LUZON – TALAGUIT
INSTRUCTOR
TABLE OF CONTENTS
Learning Plan --------------------------------------------------------------------- 3
Introduction --------------------------------------------------------------------- 3
Opening Activity ------------------------------------------------------------ 3
Key to Remember ------------------------------------------------------------ 3
Definition --------------------------------------------------------------------- 4
Lesson Proper
Unit 3 – IT Trends, Issues, and Challenges ----------------------- 4
Lesson 1 – IT Trends ----------------------------------------- 4
Lesson 2 – IT Issues and Challenges ---------------------- 10
Chapter Key Point ----------------------------------------------------------- 13
Activity -------------------------------------------------------------------- 14
Post Test -------------------------------------------------------------------- 14
References -------------------------------------------------------------------- 16
2|P age
• LEARNING PLAN
It describe how the given IT trends affect the Filipino’s way of living. Discuss the issues
and challenges in IT that different sectors face. Research further on the influence of IT on a
specific sector.
• INTRODUCTION
This chapter features article and studies showing trends in IT from recent
years. The topics include the industry sector’s use of technology specifically in IoT
and automation. Articles regarding online banking as well as the business sector’s
online presence through e-commerce are likewise included.
OPENING ACTIVITY
• OPENNING ACTIVITY
1. Go online and open your web browser.
2. On the address bar, type in ph.news.yahoo.com/tech.
3. Identify news articles about the top technologies in the Philippines
and read them. Take note if necessary.
4. Discuss about the advantages and disadvantages of these
technologies to Filipinos.
• KEY TO REMEMBER
API – Application Program Interface
DBG – Disruptive Business Group
E-Mar – Electronic Medication Administration Record
GFS – Global Filipino School Program
HRDO – Human Resource Development Office
PLDT – Philippine Long Distance Telephone Company
PSE – Philippine Stock Exchange
RFID – Radio Frequency Identification
SECB – Security Bank Corporation
3|P age
WHO – World Health Organization
• D E F I N I T I O N O F T ERMS
Cloud foundry – delivers enterprise-level services that can easily integrate with
cloud application.
Data Security – refers to protective digital privacy measures that are applied to
prevent unauthorized access to computers, databases, and websites. Data security
also protects data from corruption.
E-commerce – is a term of any type of business and commercial transaction that
involves the transfer of information across the internet.
E-health – refers to the use of information and communications technologies in
health care.
Industry Sector – (in the Philippines) is made up of local and foreign companies
that provide different products and services to Filipinos.
Trojan – is a malicious program which initially appears to be useful, routine, or
interesting in order to persuade a victim to install it.
Virus - is a computer program usually hidden within another program that inserts
itself into other programs or file.
• LESSON PROPER
UNIT 3
IT Trends, Issues, and Challenges
LESSON 1 – IT Trends
Trends That Will Transform the Information
Technology Industry Outlook in 2020
The information technology industry is experiencing a boom like never before,
and more and more brands are looking to expand in this area because of the immense
4|P age
amount of potential. Information technology has a variety of applications which is also
why it has proven to be such a beneficial key component in the entire structure that
industries now have. With the growing importance of this, it becomes important to
understand the important aspects of this industry and the key components that make it
the revolutionary tool that it is.
Information Technology Trends
Every year, new trends arise within this industry and it becomes important for
professionals to be familiar with these different trends and all that they entail. No matter
what profession one is working in, being familiar with these can improve your
professional standing and can help you understand what the potential upgrades are for
the industry that you are already working in.
1. Cloud Computing
One of the biggest trends that have emerged during the past
year is that of cloud computing. More and more industries
are realizing that it is important for a company to have a
designated place for all of their digital information and
resources, and having a well-protected place that can take care
of everything and keep the information safe has almost
become a necessity. Cloud computing is the go-to solution
for brands who want to improve the work that they do and
make it more efficient in a digital space.
2. Mobile Apps
Mobile applications have only grown
in popularity over the past few years, and
this year, they are surfacing in bigger and
better ways. Brands and industries all over
the world are trying to find ways in which
one can improve their work through the use
of mobile apps and through the
implementation of new resources that can
make working on the go more efficient.
5|P age
3. Big Data Analytics
Big data analytics is a trend that has grown
over the past few years, and this is something
that is now being implemented in almost
every kind of industry that makes use of large
scale production processes and
manufacturing and supply. Big data analytics
allows brands to process their information in
a better manner and enables them to reach a
much better understanding of the areas they
need to develop.
4. Automation
Automation is one trend
that has largely hit the
manufacturing and production
units and is something that is
estimated to only grow more in
the coming years. Automation has
also enabled processes to work at
a faster pace and enables
companies to reach their goals in
a much more efficient manner.
5. Artificial Intelligence
While automation is growing,
artificial intelligence is now starting
to see the light of day. The past year
saw the introduction of several new
mediums of artificial intelligence and
this year, industries are looking at
ways in which they can grow these
resources and implement it the work
that they do. Artificial intelligence is
now starting to see implementation
on a larger scale which is only set to grow more over the coming years.
6|P age
6. Smart Technology
Smart machines that use
artificial intelligence or automation are
on the rise, even in small scale units
and smaller implementations. Homes
are now becoming smarter as a result
of smart technology being used and
opted for in homes. Simple tools such
as Alexa have become an essential part
of homes, and these are only estimated
to increase over the next year.
7. Virtual Reality
The gaming industry has always
been one that has experienced growth
alongside the field of information
technology and virtual reality has
taken this one step further giving
customers the very epitome of digital
experience. Virtual reality gaming has
already started to become popular as a
result of new technology and this improves the manner in which the industry can grow.
8. Augmented Reality
Augmented reality is another
approach to ‘artificial experiences’ that
individuals are now being given access to
and this is something that has improved
the manner in which the field has been
able to develop. Augmented reality is
seeing a lot more applicability outside
the gaming industry as well, and is
something that is seeing more
implementation as compared to virtual reality.
9. Block Chain Data
Crypto currency might have been at an all-time high in 2017 and 2018, but the fact
remains that this is something that is yet to see a significant amount of development.
Block chain technology is only now starting to grow in popularity and is being
implemented by industries across the world for all that it offers.
7|P age
10. Cyber Security
With the growth of digital
mediums and technology, the potential
threats that people can face are only
rising. Because of this, cyber security has
had to grow extensively over the past few
years, simply to stay in touch with the
growth that is being experienced.
Industries all over the world are also
realizing the importance of investing in
cyber security, which is why the field is
experiencing growth at such a rapid pace.
11. Growth of IoT Networks
The Internet of Things (IoT) is a concept that
all digital devices are connected by a single medium
through which one would be able to control
everything within their homes. More and more
brands are realizing that this is indeed the way of the
future and is something that is within technological
reach. More brands are beginning to incorporate this
concept and the statistics that showcase this are
prevalent enough to attest to positive growth in this
regard.
12. Predictive Analytics Implementations
Predictive Analytics is the process of
analysing large volumes of data to be able to come to
a conclusion regarding the possible outcomes that a
situation might have. Market analysts see this as an
incredibly valuable tool for brands to note whether
they should be moving in a particular direction or
not. This has proven to be an incredibly efficient
method of analysis and saves the industry an
incredible amount of money in the process.
13. Cloud Migration
Cloud computing has proven to be incredibly
beneficial for businesses who want to move in a digital
direction and who want to maintain better records of
their digital data. Cloud Computing is something that
has grown over the past few years and the statistics of
8|P age
this showcase positive results in this regard. More than 74% of CFOs state that cloud
computing was one of the most beneficial things for the growth of their businesses.
14. Rise of Data Officers
With the growing importance of information technology and data analytics, data
officers have become even more important in institutions and industries all over the
world. The number of positions open within this are plenty and are growing as more and
more businesses are in need of someone proficient in this.
15. Quantum Computing Applications
Quantum Computing is a process of
conducting complex equation and processes to
be able to perform several complex tasks or
processing of large volumes of information with
absolute ease. This is something that has proven
to be incredibly beneficial for a variety of
different industries, which is why it is
something that is seeing a massive amount of
growth.
16. Smart Technology
Homes are now becoming smarter
thanks to the numerous integrated devices
that work to make our lives easier. Things
like Alexa and other supplementary
resources have proven to be incredibly
beneficial in this regard and make homes
significantly more efficient and safer in the
process.
17. Open Source Solutions
Open Source programs are those which give users accesses to some of the main
files and framework in a particular program, enabling them to modify it with absolute
ease. As more and more users become technologically proficient, giving them the option
to work with applications themselves is proving to be incredibly beneficial.
9|P age
18. Edge Computing
Edge computing is one phenomenon that has grown
over the past few years and is seeing a wide scale of
implementation currently. Edge computing is when
large volumes of data are processed near the edge of the
network rather than where the data is mainly being
generated. This is meant to make this processing more
efficient and optimized. More development mediums
are choosing to go in for this form of computing over
traditional types because of the efficiency that it brings. This also attests to the fact that
more methods of computing and program generation are on the rise.
19. Rise of Chatbots
While most tech advancements are
helping us move towards the greater good,
some of them aren’t as beneficial as we might
think. In 2019, the number of chatbots that
were being used is far more than what we
expected. Chatbots aren’t however always
bad because in some situations, have
improved the customer service that we have
access to. Chatbots are a program to respond
to certain queries in certain ways and are
designed to help customers with some of the
more basic functions that they would need. These are of course still not in a position
wherein they are a complete substitute for real live customer service, which is what
has helped them still stay in development.
LESSON 2 – IT ISSUES AND CHANGES
INDUSTRY
With the introduction of computer systems at work, one main issue raised is
maintaining the computer system’s security and integrity. Modes of communication
within an office environment normally entail exchanging of emails or discussions in local
chat rooms. This scenario opens the door of malicious software that can be shared, wither
intentionally or not, to the entire organization. Malicious software, or malware, is a
general term used to describe any type of software that can cause harm to a computer
system. Example of malware include the following:
10 | P a g e
1. VIRUS
Is a type of computer program that, when executed,
replicates itself by modifying other computer programs
and inserting its own code. When this replication
succeeds, the affected areas are then said to be "infected"
with a computer virus.
2. WORM
is a standalone malware computer program
that replicates itself in order to spread to other
computers.[1] It often uses a computer network to
spread itself, relying on security failures on the
target computer to access it. It will use this machine
as a host to scan and infect other computers. When
these new worm-invaded computers are controlled, the worm will
continue to scan and infect other computers using these computers as
hosts, and this behavior will continue.
3. TROJAN
Is any malware which misleads users of its true
intent. The term is derived from the Ancient Greek
story of the deceptive Trojan Horse that led to the fall
of the city of Troy. Trojans may allow an attacker to
access users' personal information such as banking
information, passwords, or personal identity. It can
also delete a user's files or infect other devices
connected to the network. Ransom ware attacks are often carried out
using a Trojan.
4. SPYWARE
Is a type of malware that aims to gather information
about a person or organization, without their
knowledge, and send such information to hack another
entity without the consumer's consent. Furthermore,
spyware asserts control over a device without the
consumer's knowledge, sending confidential
information to another entity with the consumer's
consent, through cookies.
11 | P a g e
5. RANSOMWARE
Is a type of malware from crypto virology that
threatens to publish the victim's data or
perpetually block access to it unless a ransom is
paid. While some simple ransom ware may lock
the system in a way which is not difficult for a
knowledgeable person to reverse, more
advanced malware uses a technique called
crypto viral extortion, in which it encrypts the
victim's files, making them inaccessible, and
demands a ransom payment to decrypt them. In
a properly implemented crypto viral extortion attack, recovering the
files without the decryption key is an intractable problem – and difficult
to trace digital currencies such as Ukash or Bitcoin and other crypto
currency are used for the ransoms, making tracing and prosecuting the
perpetrators difficult.
BANKING
While online banking maybe convenient, there are still skeptics to this given the
sensitive data being transacted online: money. Recently, a supposed faulty system
upgrade caused customers of Bank of the Philippine Island (BPI) to either lose money
from their accounts or receive huge amounts of money that were not theirs.
EDUCATION
With online learning being accepted into schools as part of the teaching and
learning methodology, one of the things that schools need to consider is monitoring and
management. Having learning management system does not necessarily mean students
are constrained into using it to learn. There are more websites that offer learning
opportunities for student such as TIME for kids, National Geographic and NASA, among
others. However, the use of LMS still poses issues and challenges to both students and
teachers.
BUSINESS
As previously discussed, some companies use adware to track information about
their customers for marketing purposes. You might ask, how is that possible?
Whenever you buy items online in sites like Lazada, Amazon, or Zalora, your
personal details, such as your name, gender, items purchased, etc. are saved by these
retailers. Later on, while browsing other websites such as Facebook, you notice
advertisements streaming at the bottom of the page. The advertisements include items
from Lazada or Amazon which you were browsing earlier. How did Facebok know what
you were looking at in those sites?
12 | P a g e
An adware is a program designed to display advertisements on your computer,
redirect your search requests to advertising websites, and collect marketing-type data
about yourself – for example, the types of websites that you visit – so that customized
advertisements can be displayed.
Is it a big thing? It depends. An Adware can be considered a legitimate alternative
offered to consumers who do not wish to pay for software. There are many as-supported
programs, games, or utilities that are distributed as adware, which is often called as
freeware. Some applications have pop-up advertisements that if a user wishes to remove
them, a certain fee should be paid to make the apps ad-free.
HEALTH
Patients records are always kept confidential. However, with the introduction of
technology, and with hospitals and clinics leaning towards automation, patient records
have shifted from paper to digital. With this, concerns regarding data security and data
confidentiality of patients have increased. But why is there such an interest in patient
record?
According to the International Association of Privacy Professionals, “a medical
records is more valuable than a credit card on the black market. According to the World
Privacy Forum, a medical record, including the name, address, Social Security number and
health ID number, typically goes for $50 on the online black market [whereas] an active
credit card sells just $3.” This makes it more lucrative for cyber criminals as patient data
becomes digital.
In the Philippines, hospitals are required to comply with the Data Privacy Act
(DPA) of 2012 and implement data protection measures in their data processing systems
to protect the confidentiality of the patients’ personal information and medical records.
The HIPAA Security Rule establishes national standards to protect individuals’
electronic personal health information that is created, received, used, or maintained by a
covered entity. The Security Rule requires appropriate administrative, physical and
technical safeguards to ensure the confidentiality, integrity, and security of electronic
protected health information.
• CHAPTER KEY POINT
Two major trends are seen in the industry sector – automation and the application
of Internet of Things (IoT) – hence, the introduction of smart industries
Online banking, e-learning (distance learning), e-commerce, and e-health are
products of these trends.
13 | P a g e
Despite these trends, the security and integrity of computer systems are at risk.
Various malwares and adware pose threat on the confidentiality of information.
Fraud online transactions have also become prevalent.
• ACTIVITY
Research further on the influence of IT on any of the following sector:
Banking
Education
Health
Business
Others
ANSWER: ACTIVITY MODULE 3
NAME: ___________________________________________ COURSE YR&SEC: _____________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
14 | P a g e
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
• POST TEST
1. It refers to a technology that supports activities involving information, such as
gathering, processing, storing, and presenting data.
2. It refers to processed information that helps fulfil people’s daily tasks.
3. It is a type of an input device that lets you select options from on-screen menus.
4. It is like a personal computer but it has a more powerful microprocessor and a
higher-quality monitor.
5. It is the period in human history characterized by the shift from traditional
industry that the Industrial Revolution brought through industrialization, to an
economy based on information computerization.
6. It is a method of representing numbers that has 2 as its base and uses only the
digits 0 and 1; each successive digit represents a power of 2.
7. It refers to the interconnection of information technology devices within the
range of an individual person, normally, within the range of 10 meters.
8. This is a broad term that incorporates all procedures and forms of connecting and
communicating between two or more devices using a wireless signal.
9. It hosts the application software installed in the system.
10. It is type of connector for transmitting audio/video data compatible with
computers, projectors, and digital televisions.
15 | P a g e
11. It allows a user to execute financial transactions via the internet.
12. It refers to the voluminous amount of data from traditional and digital sources
that could be mined for valuable insights on human behavior such as trends,
patterns, and associations, in turn boosting business intelligence.
13. It refers to the use of information and communications technology in health care.
14. It is a stand-alone malware that replicates itseld in order to spread to other
computers.
15. It is a type of malware that can block access to a victim’s data.
ANSWER: POST TEST-MODULE 3
NAME: ___________________________________________ COURSE YR&SEC: _____________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
16 | P a g e
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
Use another sheet of paper if space provided is not enough.
• REFERENCES
Books:
Haynes, M. & Brown, R. (n.d.). Everything computers of S.C., Inc. Retrieved from
http://everythongcomputersofsc.com/index.html
RALEIGH, NC / WAKE FOREST, NC (HQ) / CHICAGO, IL / TOMS RIVER, NJ / ANN
ARBOR, MI. retrieved from https://linchpinseo.com/trends-in-the-
information-technology-industry
Websites:
https://homepage.cs.uri.edu/faculty/wolfe/book/Readings/Reading04.htm#:~
:text=The%20computer%20does%20its%20primary,that%20executes%2
0stored%20program%20instructions.
http://tutorialspoint.com/basics_of_computers/basics_of_computers_number_sy
stem.htm#:~:text=The%20technique%20to%20represent%20and,%2C%20hex
adecimal%20number%20system%2C%20etc
17 | P a g e