0% found this document useful (0 votes)
76 views6 pages

Finals Lite-Reviewer

Uploaded by

junadotph
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
76 views6 pages

Finals Lite-Reviewer

Uploaded by

junadotph
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

1 FINALS: LITE111 CHAPTER 5, 6.1 & 6.

IT, Culture, and Society


Week 13 - CHAPTER 5
A. DIFFERENT TYPES OF NETIQUETTE
The Influence of IT on Culture and Social Behavior for SOCIAL MEDIA
 The sudden surge of ICT has created an influence 1. The Personalize IT Rule All rules
on how people’s lives have been changed, for 2. The Off-limits Rule
better or for worse. 3. The Tag – You’re It Rule
 Due to the high number of SMS being sent and
received on a daily basis, Philippines is formerly B. DIFFERENT TYPES OF NETIQUETTE
called the ”texting-capital of the world” but now
for Email Services, Chat Rooms, and Instant
it is dubbed as the “most social nation” (Opera
Mini, 2015)
Messaging
 The attitude and behavior of people are evolving Guidelines in composing an email:
 Recipient (to whom the email will be sent)
to meet technology’s evolution.
 Subject Line (gives hint of the purpose of the
 Communication
 A “generation wars” becoming popular email)
 Salutation (serves as greetings to the recipient)
 Body of the email (must be short and specific)
Influence on Culture
 Closing Line (contains courteous language as form
1. ONLINE REVIEWS - with the proliferation of online
information, it is easy to find details on a certain of farewell)
 Sender Information
things.
 Formatting **
- technology affects the basic human behavior of
 Attachment (if the user wishes to include files
decision-making
2. WEBLOGGING/SOCIAL MEDIA - affecting social such as documents, images, etc.) **
 Delete/Trash Bin **
interaction.
3. YOUTUBE LEARNERS
YouTube – most popular social media sites. C. DIFFERENT TYPES OF NETIQUETTE
- influences the acquisition of knowledge and for Chat Rooms, and Instant Messaging
learning of certain skill sets Guidelines for using instant messaging applications
 Think long and hard before accepting a private
Influence on Social Behavior conversation.
1. CYBERBULLYING  In a group chat, include only those that are in your
serious phenomenon brought about by social media friends list.
unwanted, hostile behavior done by individuals to other  If possible, do not give your personal information
people in the hope of gaining control over them. while chatting, including your photos or “selfies.”
done online  When in doubt, save a copy or make a back-up of
2. INTERNET PROFILE (internet identity, online identity, your conversation (chat).
or internet persona) – profile created by internet users to  You must log out from your account at all times,
establish their social identity in online communities, especially if you are in public place, such as
social media sites, and other websites. computer shop.
- comes in the form of messages or images (memes)  You may opt to customize your account settings
from public to private account.
NETIQUETTE - combination of the words internet and
etiquette. Professional Ethics
- it describes how one should act online - IT professionals who follow an ethical practice as they
- it brings in policies for all the features and qualities of are the front liners, support, and back end of ICT.
the internet.
Examples: - Association of Computing Machinery (ACM) has
 World Wide Web (WWW) identified 24 imperatives of professional conduct for IT
 Email services professionals. Organization
 File Transfer Protocol (FTP) WIFEC
 Chat rooms  Section 1: outlines the fundamental ethical
 Instant messaging considerations.
2 FINALS: LITE111 CHAPTER 5, 6.1 & 6.2

 Section 2: provides additional, more specific validated to meet requirements.


considerations of professional conduct.  3.5 Articulate and support policies that protect the
 Section 3: intended specifically for individuals ho dignity of users and others affected by a
have leadership role, whether in the workplace computing system.
or in a volunteer capacity such in organizations  3.6 Create opportunities for members of the
like ACM. organization to learn the principles and
 Section 4: principles involving compliance with limitations of computer systems.
this Code are laid out.
4. COMPLIANCE WITH THE CODE
1. GENERAL MORAL IMPERATIVES  4.1 Uphold and promote the principles of this
 1.1 Contribute to society and human well being. Code.
 1.2 Avoid harm to others.  4.2 Treat violations of this code as inconsistent
 1.3 Be honest and trustworthy. with membership in the ACM.
 1.4 Be fair and take action not to discriminate.
 1.5 Honor property rights including copyrights
and patent. IT TRENDS, ISSUES and CHALLENGES
 1.6 Give proper credit for intellectual property. Week 14 - CHAPTER 6.1
 1.7 Respect the privacy of others.
 1.8 Honor confidentiality. What is meant by IT Trends?
Trends – A general direction in which something is
2. MORE SPECIFIC PROFESSIONAL RESPONSIBILITIES developing or changing.
 2.1 Strive to achieve the highest quality, Variety of Trends:
effectiveness and dignity in both the process a. Industry IBEBH
and products of professional work. b. Banking
 2.2 Acquire and maintain professional c. Education
competence. d. Business
 2.3 Know and respect existing laws pertaining to e. Health
professional work. Trends: INDUSTRY
 2.4 Accept and provide appropriate professional
review. 1. INDUSTRY SECTORS
 2.5 Give comprehensive and thorough  Local Companies
evaluations of computer systems and their  Foreign Companies
impacts, including analysis of possible risks.
 2.6 Honor contracts, agreements, and assigned
responsibilities. 2. FOOD INDUSTRY
 2.7 Improve public understanding of computing  Universal Robina
and its consequences.  Monde Nissin
 2.8 Access computing and communication
resources only when authorized to do so.

3. ORGANIZATIONAL LEADERSHIP IMPERATIVES 3. BEVERAGE INDUSTRY


 3.1 Articulate social responsibilities of members  San Miguel Brewery
of an organizational unit and encourage full  Pepsi Philippines
acceptance of those responsibilities.
 3.2 Manage personnel and resources to design
and build information systems that enhance the Two Major Trends in Industry Sector
quality of working life. 1. INTERNET OF THINGS (IoT) - Becoming an increasing
 3.3 Acknowledge and support proper and topic of conversation both in workplace and in a
authorized uses of an organization’s computing society at large.
and communication resources. - Can give an impact of how we live and work.
 3.4 Ensures that users and those who will be Examples: Sensors, electronics, and robotics
affected by a system have their needs clearly SER
articulated during the assessment and design of
requirements; later, the system must be
3 FINALS: LITE111 CHAPTER 5, 6.1 & 6.2

SUMMARY FOR THE SUPPORTING ARTICLES: Automated Biometrics Timekeeping System in


A. Groups to Mull Over IoT Development In The monitoring daily attendance of employees working
Philippines in its offices at the City Hall complex in Barangay
- It is anticipated that expenditure on the Internet Población.
of Things (IoT) in the Philippines will increase 13 times  - According to Makati Mayor Jejomar Binay, the
from its market value in 2014. move was in keeping with the commitment of the
 - Industry Platform Pte. Ltd (IPPL) – a Singapore city government to harnessing technology to
incorporated firm focused on the global promote transparency and efficiency in its
telecommunications sector. operations and services.
 - Ellaine Cedillo – the Head Organizer of IPPL  - He also said that, aside from ensuring the
 - IPPL said it forecast IoT in the Philippines to accuracy of daily time records and thwarting
grow from $55.1 million in 2014 to $766.8 million attempts of time theft, the new time keeping
in 2020 system also promotes fast and efficient payroll
calculations.
B. Ionics, IBM team up on high-tech products  - According to City Personnel Officer Vissia Marie
- With the help of cloud, mobile, and big data Aldon, using the system eliminated the possibility
analytics, a division of electronics manufacturer Ionic of employees making ‘proxy’ time-in ot time-out
Inc. has partnered with global technology giant IBM to for other employees.
create cutting-edge products that run on the Internet
of Things (IoT). B. Property consultant bares future of work
 - The Internet of Things (IoT) is a network of  - According to a document, telecommunication
physical objects, such as devices, home appliances, companies and property developers will be having
or industrial equipment, that include embedded closer collaboration in developing the future
technology that enables communication and workplace.
interaction.  - In a research paper titled “The Future of
 Blue Mix – an implementation of IBM’s open Work”, Jones Lang La Salle Inc. head of corporate
cloud architecture based on open source of solutions research in Asia Pacific Susan Sutherland
platform. said the traditional office workplace is gradually
 Cloud Foundry - delivers enterprise-level service going to be replaced by a new concept anchored
that can easily integrate with cloud applications. on technology developments.
 Lawrence Qua – Chair & Chief Executive Officer of  Examples: Internet of Things (IoT) , Artificial
Ionics-EMS Intelligence, Robotics
 Big Data – refers to the voluminous amount of
data from traditional and digital sources that Trends: BANKING
could be mined for valuable insights on human
behavior such as trends, patterns, and 1. Online Banking - also known as “internet banking” or
associations, in turn boosting business intelligence. “web banking” that allows a user to execute financial
 Luis Pineda – President and Country General transactions via the internet.
Manager at IBM Philippines - It offers a customer just about every service
 Ionic-EMS and IBM – had a long partnership that traditionally available through a local branch,
began in 1990 and continued over the decades including deposits, money transfers, and bill payments
with evolving programs and technologies.
SUMMARY FOR THE SUPPORTING ARTICLES:
2. IT AUTOMATION - help many companies achieve More Filipinos warming up to online banking
greater productivity among its employees by using  3 out 4 Filipinos are now comfortable conducting
computers and software programs to do the task. online banking transactions, based on a Citigroup
Examples: Accounting Systems, Production Systems, online poll.
and Security Systems APS SYSTEM  As od September 2012, there’s already a 1,000,000
(1M) mobile banking users for Citi in Asia.
SUMMARY FOR THE SUPPORTING ARTICLES:  One-Time Personal Identification Number (PIN) –
A. Makati fully implements biometric timekeeping a unique six digit PIN, sent via SMS, which allows
system users to access their account details and complete
 - The Makati City government has finally online transactions via Citibank online.
implemented the use of the
4 FINALS: LITE111 CHAPTER 5, 6.1 & 6.2

- The importance of social media in business’


 “Call Me” – it’s a service for clients who wish to marketing will likely continue to increase the market. An
apply for another credit card, to those who have increasing number of businesses are turning to social
yet to own a Citibank credit card. media influencers to market their product.

Trends: HEALTH
Learning Management System
1. Learning Management
Trends: EDUCATION System (LMS) - to deliver, 1. E-Health (eHealth) - refers to the use of information
manage and keep track students’ progress. It and communication technology in health care.
releases to e-learning. note: “Synonym for Health IT”
2. E-Learning – electronic technology to access
educational curriculum outside of traditional a) Used to improve and extend health care and health
classroom. information.
3. Distance Learning – refers to a program, course or
degree that is delivered online. b)Used to alert, monitor, and control the spread of
communicable disease.
SUMMARY FOR THE SUPPORTING ARTICLES:
A. Global Filipino School enhance e-learning with c) Used for the exchange of health data
cloudfone tablets
- Under global Filipino schools are provided with d)Used to promote continuous medical training,
unparalleled online connectivity to give homeroom education, and research for health care providers.
teachers access to limitless teaching and learning
engagement available on the internet.
IT TRENDS, ISSUES and CHALLENGES
B. Global Filipino School enhance e-learning with Week 14 - CHAPTER 6.2
cloudfone tablets
- Offers PLDT IGate, Smart Wifi, Smart M2M sims, IT ISSUES and CHALLENGES
Smart Prepaid sims customized website with e- - Comparable to other industries, there are a lot of
commerce capability to help establish online Issues and challenges that affect every aspect of society.
preference. It can be found in:
a. Industry
Trends: BUSINESS b. Banking
c. Education IBEBH
1. Electronic Commerce or e-commerce - a term for any d. Business
type of business or commercial transaction that involves e. Health
the transfer of information across the internet.
IT ISSUES and CHALLENGES: INDUSTRY
 - It covers a range of different types of businesses,  - One major challenge brought up by the
from consumer based retail sites and auction or introduction of computers at work is preserving
music sites, to business exchanges trading goods the security and integrity of the computer
and services between corporations. system.

 - E-commerce businesses to meet customers  - Email exchanges or conversation in local chat


where they are. While it may seem like everything rooms are typically used as means of
in commerce is evolving, we narrowed it down to communication in office settings.
the biggest trends that will affect businesses in the
coming months and years. Powering online retail  - This situation makes it possible for malicious
forward. software to be distributed throughout the entire
corporation, whether consciously or
WHAT ARE THE TRENDS IN E-COMMERCE MARKET? unintentionally.
- The e-commerce landscape is getting more
competitive. Running a business without having a social  - Any software that has the potential to harm a
media presence is almost unheard. computer system is referred to as malicious
software, or malware.
5 FINALS: LITE111 CHAPTER 5, 6.1 & 6.2

Type of Malwares: FIVE (5) COMMON PROBLEMS FACED BY STUDENTS IN e-


a. VIRUS - A computer software that has the ability to LEARNING
replicate itself and spread infection without the
user’s knowledge or consent. 1. ADAPTABILITY STRUGGLE - Students with a
- It has the ability to corrupt or delete data on a “traditional” mindset find it difficult to adapt to e-
computer, propagate to other computers via email, learning.
or even completely wipe out a hard drive. - Understanding the benefits of e-Learning and
discussing them with peers may change their mindset.
b. WORM - A computer worm is a type of malware that - Online discussions demand springing into action,
replicates itself and spreads to other computers rather than passive listening and notes taking are
while still functioning on infected ones. expected in a traditional classroom.
- It reproduces itself to infect other systems.
2. TECHNICAL ISSUES - Many students are not provided
c. TROJAN (Trojan Horse) - Malware that poses as with the high bandwidth or strong internet
trustworthy programs or software. connection that online courses require.
- Attackers have access to all actions that a - Weak monitors make it hard to follow the Course
legitimate user could perform once they are within Management System and their learning experience
the network, including exporting files, editing data, becomes problematic.
deleting files, and otherwise changing the contents - Some of them don’t even own computers and seek
of the device. help in Learning Resource Centers for technical
assistance.
d. SPYWARE - It is any software that installs itself on
your computer and starts covertly monitoring your 3. COMPUTER LITERACY - Lack of computer literacy is a
online behavior without your knowledge or major issue among students today.
permission. - Many students cannot operate basic programs such
- It is a kind of malware that secretly gathers as Microsoft Word and PowerPoint.
information about a person or organization and - Technical proficiency is a must for following online
relays this data to other parties. courses.
- Having a fundamental knowledge of computer
e. RANSOMWARE - It is a type of malicious software hardware would help them participate in online
(malware) that threaten to publish or block access to classes without problems.
data or a computer system, usually by encrypting it,
until the victim pays a ransom fee to the attacker. 4. TIME MANAGEMENT - Most adults prefer web-based
- In many cases, the ransom demand comes with the learning programs for their place and time flexibility,
deadline. but they rarely have the time to take the courses due
to their various everyday commitments.
IT ISSUES and CHALLENGES: BANKING - A regular schedule planner would be a significant
help to these learners, as they could even set
a. SECURITY STL reminders for their courses and assignments.
b. TECHNICAL ISSUES
c. LACK OF PERSONAL RELATIONSHIP 5. SELF MOTIVATION - Students need to find motivation
to follow the new educational trends and also
properly equip themselves for future challenges in
IT ISSUES and CHALLENGES: EDUCATION their education and careers.
 - With online learning being accepted into schools - Only a positive attitude will help them overcome
as part of the teaching and learning methodology, the challenges in e- Learning, though this is hard to
one of the things that schools need to consider is practice, students need to understand that it is
monitoring and management. necessary.

 - However, the use of IT in today’s education


system still possess issues and challenges to both
students and teachers.
6 FINALS: LITE111 CHAPTER 5, 6.1 & 6.2

IT ISSUES and CHALLENGES: BUSINESS


B. LAW THAT PROTECTS OUR DATA PRIVACY (Philippines)
1. How did Facebook know what you were looking at 1. Data Privacy Act (DPA)of 2012
in those sites? - Implements data protection measures in their data
 Adware – a program designed to display processing systems to protect confidentiality of their
advertisements on your computer, redirect your patient’s personal information and medical records.
search requests to advertising websites, and collect
marketing-type data about yourself. - Violation of data privacy involves penalties.

2. Is it a bad things? - Under this law, the penalty for unauthorized


 - It depends. disclosure of personal information is P1, 000, 000.
 - An adware can be considered as a legitimate
alternative offered to consumers who do not wish to - The penalty exceeds to P2, 000, 000 if the acts
pay for software. involves sensitive personal information.

 Freeware – are many ad-supported programs, 2. Health Insurance Portability and Accountability Act
games or utilities that are distributed as adware. (HIPAA) in 1996
- Designed to promote the confidentiality and
 - Some applications have pop-up advertisements portability of patient records, as well as to develop data
that if a user wishes to remove them, a certain fee security standards for consistency in the Healthcare
should be paid to make the apps ad-free. industry.

C. IMPORTANCE OF KNOWING IT TRENDS, ISSUES AND


IT ISSUES and CHALLENGES: HEALTH CHALLENGES
 You’ll continually gain new skills by following trends,
 - Patients are kept confidential. including how to use new technologies, engage in
new activities, and increase your efficiency.
 - However, with the introduction of technology, and
with hospitals and clinics leaning towards  This will give you more options to choose from,
automation, patient records have shifted from paper which will allow you to try more things out and use
to digital. them to come up with fresh ideas.

 - With this concerns regarding data security and  Problems and challenges are vital components of
data confidentiality of patients have increased. life that help you gain experiences, teach you
lessons, and become stronger and wiser.

 Problem force us to change and evolve.


A. WHY THERE IS SUCH AN INTERNET IN PATIENT
RECORDS? IAPP  People’s desire for a life free of difficulties is their
 According to the International Association of main challenge.
Privacy Professionals, “a medical record is more
valuable than credit card on the black market.”
WPF
 According to the World Privacy Forum, “a medical
record, including a name, address, Social Security
number, and health ID typically goes for & 50 on
the online black market [whereas] an active credit
card sells for just $3.”

You might also like