Chapter 5 IT, Culture and The Society
Chapter 5 IT, Culture and The Society
Chapter 5 IT, Culture and The Society
01 02 03
Recall the current Discuss the Internet of Explain automation
trends in the field of Things and its influence on and its impact on the
information the society society
technology
04 05 06
Analyze how IT influences Enumerate the rules of
Describe cyberbullying and
culture and social behavior netiquette
identify the steps to combat it
07
Familiarize themselves with and
demonstrate the imperatives of
professional conduct for I.T.
professionals
01
THE IMPACT OF
I.T. ON THE
SOCIETY
THE IMPACT OF IT ON THE SOCIETY
As previously discussed, the seven major trends for 2017 are as follows:
1. IoT and smart home technology
2. Augmented reality and virtual reality
3. Machine learning
4. Automation
5. Big data
6. Physical-digital integrations
7. Everything on demand
Majority of organizations and companies nowadays have taken these trends into
account, shifting manual business processes to automated ones and using ICT to
improve their products and services. Among these seven trends, the internet of Things
(IoT) and automation seem to have greatly influenced present-day culture and society;
thus, it is imperative to discuss these thrusts in detail.
02
INTERNET OF
THINGS (IoT)
INTERNET OF THINGS (IoT)
Internet of Things (IoT) is a set-up of devices and objects which are
connected together in a given network. Their connection, often
wirelessly, is possible using both hardware and software.
The hardware part is often made up of sensors that collect data, which
are then sent to other devices for analysis and possible interpretation.
Popular examples are health wearable devices such as step counters
that are connected to a mobile phone via Bluetooth. An app installed in
the phone records the results in a daily, weekly, or monthly basis for
the mobile phone user to keep track of his or her progress.
2.1. Capabilities of IoT
A major requirement for IoT is a strong internet connection, as all devices must be able
to communicate with one another for the upload and download of needed data. But aside
from connectivity, IoT should also be capable of the following (Mattern & Floerkemeier):
1. Smart cities
Smart cities have adopted IoT in traffic management, waste disposal, and even
community monitoring for the security of the city's residents.
2. Connected industries
The oil and gas industry is identified as one of the front-runners for loT connectivity
which includes remote access to heavy equipment and machinery, from manufacturing to
production.
2.2. Applications of IoT
3. Connected buildings
Connected building projects involve facility automation to reduce energy costs.
4. Connected cars
With smart cities adopting IoT for their traffic management, it is no longer surprising
for the latest car models to be equipped with sensors and network connectivity. Majority of
projects relating to smart vehicles revolve around vehicle diagnostics and monitoring.
5. Smart energy
Majority of smart energy projects focus on developing smart grids for renewable energy
and infrastructure.
2.3. Challenges of IoT
But while things may look good using loT, there are issues raised in adopting it fully.
Texas Instruments, Inc. (2016) has identified six challenges in its implementation:
1. System requirements
Industries normally identify different requirements, especially depending on the type of
industry they belong to. Those in the food industry may require monitoring of perishable
goods, from production and packaging to shipping. An automobile manufacturer may have
the same process, but since products are different, requirements may also change. Food will
require data regarding temperature levels, whereas cars will require mechanical precision.
2. Connectivity
With the varying connections-wired and wireless, as well as the different protocols
governing each connection, it will be a challenge to come up with an IoT project concerning
such protocols.
2.3. Challenges of IoT
3. Power requirements
IoT devices need to run on batteries as majority of these devices are mobile. The
challenge, therefore, is how to extend the battery life on such devices, especially those used
in critical procedures, such as health, disaster management, and safety.
4. Security
One of the most highlighted issues in the application of loT is data security.
Confidential information such as patients' records or employees' profiles are considered at
risk. Security also includes system integrity, with malicious acts such as hacking and viruses
proliferating online.
5. Development
The task of creating loT projects may seem daunting, so one of the challenges
identified is how to expand the capabilities of developers, and not just experts, in order to
create more "smart things."
2.3. Challenges of IoT
6. Services
With data collected from IoT, it is important as well to determine where all this will go
and to identify the platform in which these IoT applications will be placed. Nowadays, cloud
services offer end-to-end solutions to a number of IoT projects.
03
AUTOMATION
AUTOMATION
With the available technology and standards for computer system
interconnection, the demand for system automation is on the rise.
Colloquially called "computerization," having an automated system
means automated business processes, operations, service provider,
monitoring, and even tools.
With the use of computer systems hardware, software, or both the
typical cumbersome and error-prone procedures have become
automated.
AUTOMATION
The Institute for Robotic Process Automation and Artificial Intelligence (IRPAAI)
defined robotic process automation (RPA) as "the application of technology that allows
employees in a company to configure computer software or a "robot" to capture and interpret
existing applications for processing a transaction, manipulating data, triggering responses
and communicating with other digital systems" (Institute for Robotic Process Automation &
Artificial Intelligence, 2018, para. 3). While some may think of "robots" similar to those seen
in movies, RPA actually focuses on computers being able to make logical decisions on the
business process so that their human counterparts can focus on other tasks, thus increasing
work productivity. This may not necessarily translate into hardware. Application systems and
software may also be considered as RPA as they are applicable to the following:
3.1. Robotic Process Automation (RPA)
• Process Automation
The use not only of industrial robots but also of "presentation-layer automation
software" is capable of carrying out the daily operations of an organization. Process
automation may include finance systems such as payroll, customer management systems
such as online system registration, and academic institutions offering online enrollment
systems, among others.
A school that has a learning management system will be helpful for both the students
and the teacher, especially in submitting requirements such as a homework research. The
typical manual procedure for students submitting their homework will be, to come to class,
wait for the teacher, and submit their papers personally. Automating the system requires the
students to simply login to their school website, open their individual account for the current
semester, search the subject they need access to, and upload their assignments at the comfort
of their homes.
3.1. Robotic Process Automation (RPA)
• IT Support Management
Management of IT infrastructure and complex systems becomes easier using RPA. If
part of the system fails, an automated system can immediately send notifications to the IT
manager and technical support staff, informing them of the problem. Large buildings, for
example, employ an automated emergency system, so if an emergency exit door has been
opened, or a fire alarm goes off, the system will automatically detect the exact location of the
opened door or activated alarm, as the location of the emergency will typically be assumed to
be near that point.
3.1. Robotic Process Automation (RPA)
• Automated Assistants
Apple's Siri is an example of a voice recognition software used in RPAS. Instead of
machine language (binary), computers will be able to understand human language and
interact with the same. Another example for automated assistants will be banks having an
automated customer service hotline. Customers call the bank, and instead of a human
operator, an automated assistant will respond asking for details such as service choices,
account numbers, etc. Customers will use their phone's touch keys to enter choices and
numbers while the computer interprets them as input data. After processing, a computer
generated report, such as account balances and other information will be provided.
3.2. Sensors
Sensors are hardware devices that have the capability to measure an event, object, or
any physical quality that is happening. Examples include the heart rate of a person while
jogging, the temperature of a room, brightness of a light source, and the like. Sensors have
the capacity to connect to other devices that can keep track of the data they are measuring. A
mobile phone can be connected to a heart rate sensor to record and monitor a person's health
on a weekly or monthly basis. A web application can be accessed to monitor and control the
CCTV operation of a house or building. These sensors can be connected to a network, in
various ways as explained earlier. However, there are several types of sensors, and with
technology made available today, almost all of these hardware can now be automated.
Sensors can be classified as analog or digital, but below is a list of sensors used in
automation:
3.1. Robotic Process Automation (RPA)
• Temperature sensor
This sensor is capable of measuring temperature as well as detecting its rise or fall. This is
helpful in systems that are temperature-sensitive such as power plants and server rooms.
• Infrared (IR) sensor
This sensor often used for security purposes detects infrared light. It is commonly used along
with an infrared light source. You might have seen it in movies in which a villain trying to access a
restricted area would avoid crossing a series of IR sensors shown as beams of red lines. Breaking
or crossing the beam of red line would trigger an alarm.
• Ultrasonic sensor
An ultrasonic sensor detects sound waves, such as how radars and sonars pick up sounds. A
typical application is a light fixture turning on if the owner claps his or her hands, and turning off
once he or she claps again.
3.2. Sensors
• Touch sensor
Through touch, the sensor activates itself and becomes capable of doing its function. The
latest versions of Samsung and Apple smartphones now have a one-touch login to access the
device, instead of a pin code or a pattern. Combining a touch sensor with biometrics, users can now
access the content of their phones with just a single touch on the home button.
• Proximity sensor
This sensor is able to detect objects within a certain range, even if the object is not physically
touching the sensor yet. It is typically used in the light fixtures of houses and buildings. The light
turns on if it detects a person is close by. This helps save on electricity as well as secure the
premises.
• Pressure sensor
A pressure sensor helps determine the weight or impact of a certain object. It is normally
used by manufacturing companies, such as automobile companies, in designing their airbag
system. They need to create an airbag that is strong enough to cushion a driver upon a head-on
collision, but not too strong to injure him or her due to the recoil.
3.2. Sensors
• Level sensor
This sensor can detect the level of liquids, fluids, grainy or granular materials, such as
powders, etc. Level sensors are used for disaster risk management systems, such as a flood
monitoring system. Level sensors are used to determine if a flooded street will be passable by light
vehicles or not.
• Smoke/Gas sensor
This sensor is used to detect the presence of dangerous fumes such as carbon monoxide
caused by fire. Smoke alarms show how this sensor works.
With these technologies made available, it is easy for big industries, small companies,
and even private individuals to use them. Besides, the design and implementation of these
technologies have become cheaper, much simpler, and more manageable. Thus, the concern
now is not how to use this technology but the correct way of using it.
04
THE INFLUENCE OF
I.T. ON CULTURE AND
SOCIAL BEHAVIOR
THE INFLUENCE OF I.T. ON
CULTURE AND SOCIAL
BEHAVIOR
With the prevalence of technology getting widespread, there are issues, both positive
and negative, that surface. In Chapter 1, the positive and negative effects that ICT
brings to individuals, organizations, and society are discussed. But regardless of
whether the effect is positive or negative, the sudden surge of ICT has created an
influence on how people's lives have been changed, for better and for worse.
However, it is important to note that any positive effect a person wants to see should
not rely solely on the technology; it should also focus on self-realization and social
interaction.
THE INFLUENCE OF I.T. ON CULTURE AND SOCIAL BEHAVIOR
Formerly called the "texting-capital of the world" due to the high number of SMS being
sent and received on a daily basis, the Philippines is now dubbed as the "most social nation"
in a 2015 study conducted by Opera Mini. The study identified that mobile phone users in the
Philippines access social media more than any other sites. In Opera Mini's top 50-user
countries worldwide, the Philippines ranked first with an 86% page-view. With smartphones
becoming cheaper and more accessible, people get to spend more time online, wherever and
whenever they want to due to its mobility. The smartphone adoption rate has grown from
41% to 55% in a span of one year with Android as the most popular OS. The study also
found that Filipinos view on average, 699 web pages per month. That is close to 23 pages
viewed per day.
However, with this type of technological progress, it is observed that the attitude and
behavior of people, not just Filipinos, are evolving to meet technology's evolution. For
example, the invention of the telephone in 1800s paved the way for long-distance
communication.
THE INFLUENCE OF I.T. ON CULTURE AND SOCIAL BEHAVIOR
It created a behavior for people to stay at home and call someone instead of going to the
other person's house and have a face-to-face conversation. Fast forward to 2017, people call
each other on their mobile phones just to ask what they want to eat for lunch. With the
invention of cars and other modes of transportation, humans have created a culture of how
they do commuting, the concept of carpooling, and even the options of where to spend
vacations. It is the same with the introduction of technology and the internet. The fast paced
evolution of mobile technology and the internet has greatly changed how people perceived
communication. In previous chapters, it is mentioned how online commerce started on the
web, but later on evolved into a mobile platform, revolutionizing the way customers buy
products and services.
THE INFLUENCE OF I.T. ON CULTURE AND SOCIAL BEHAVIOR
Gilkey (2015) identified in his article the many hundreds of small ways that technology
alters individual and collective behavior on a daily basis. It may not be noticed, but these
"small ways" are slowly becoming prominent which is probably why the so-called
"generation wars" are now becoming popular (i.e., Baby Boomers vs. Gen X vs. Millennials)
with the obvious disparity between these generations publicized in social media.
05
INFLUENCE ON
CULTURE
3.5.1. Online Reviews
With the proliferation of online information, it is easy to find details on a certain movie
or a book. However, with sites such as Rotten Tomatoes, one can actually make a decision on
what movie to watch simply by reading the "reviews" of other people. If the review is
"good," then the person might watch the movie. But if the review is "bad," then he or she
might consider other movies. This trend of having other people do the task first for others
watching the full movie and informing people online if the film is worth watching or not-is
an example of how technology affects the basic human behavior of decision-making.
Cyberbullying comes in the form of messages or images, such as memes. Since messages
or images can be posted anonymously, it is hard and oftentimes, difficult to trace the source. It
becomes more problematic if the message or image gets re-posted and distributed quickly
online, or goes "viral." Finding the original post might prove to be even harder.
Victims of cyberbullying may experience the same trauma as a real-life bullying victim.
The difference, however, is that cyberbullying is on a much larger scale. Defending oneself
from this kind of attack is difficult as most of the cyberbullies use internet personas which, as
previously discussed, may be real or not. Even their actual location may be difficult to trace.
The good news is that the society-communities and the government are devising ways to
stop bullying - be it digital or otherwise. As discussed in the previous chapter, the Philippines
has identified several laws, including the Cyber Crime Prevention Act, also known as R.A.
10175, to help catch cyberbullies.
3.6.1. Cyberbullying
Netiquette is a combination of the words internet and etiquette. It describes how one
should act online. Netiquette brings in policies for all the features and qualities of the internet,
including the use of the World Wide Web (WWW), email services, File Transfer Protocol
(FTP), chat rooms, and instant messaging. There are different types of netiquette implemented
all over the world.
3.6.2.1. Netiquette for Social Media
The use of social media such as Facebook, Twitter, Instagram, LinkedIn, and others is neither
a bad habit nor a good habit in one's personal life. Using social media is good for easy
communication with friends and even long-lost friends and relatives. But there are some netizens
who use their social media accounts to discredit other people by posting or shouting ruthless words
about a particular person or sharing a status that maligns one's character or reputation. Some of the
rules of netiquette for social media are as follows (Spira, 2010):
• The Personalize IT Rule.
Make sure to put restrictions in accepting friends or followers on your social media (e.g.,
Facebook, Twitter, Instagram, LinkedIn). It is not about having the most number of followers or
friends. What matters is who you interact with and how you interact with them.
3.6.2.1. Netiquette for Social Media
Joining chat rooms and sending instant messages, although mandatory in social
media, have become a trend for users. This is especially beneficial for people working in
different places such as a person working overseas while his or her friend or relative is in
the Philippines. Instead of spending for telcom services, the person just needs internet
connection.
Still, there are guidelines for using instant messaging applications. For instance,
someone might interrupt and request you to accept him or her or to be connected to your
account without your knowing who that person really is.
3.6.2.3. Netiquette for Chat Rooms and Instant Messaging
1. Think long and hard before accepting a private conversation, especially with someone
not on your friends list. Not everyone online may be as they seem to be.
2. In a group chat, include only those that are in your friends list.
3. If possible, do not give your personal information while chatting, including your
photos or "selfies."
4. When in doubt, save a copy or make a back-up of your conversation (chat).
5. You must log out from your account at all times, especially if you are in a public
place, such as a computer shop.
6. You may opt to customize your account settings from public to private account.
3.6.3. Professional Ethics
2.1 Strive to achieve the highest quality, effectiveness and dignity in both the process and
products of professional work.
Excellence is perhaps the most important obligation of a professional. The computing
professional must strive to achieve quality and to be cognizant of the serious negative
consequences that may result from poor quality in a system.
2.5 Give comprehensive and thorough evaluations of computer systems and their impacts,
including analysis of possible risks.
Computer professionals must strive to be perceptive, thorough, and objective when
evaluating, recommending, and presenting system descriptions and alternatives. Computer
professionals are in a position of special trust, and therefore have a special responsibility to
provide objective, credible evaluations to employers, clients, users, and the public. When
providing evaluations, the professional must also identify any relevant conflicts of interest, as
stated in imperative 1.3.
As noted in the discussion of principle 1.2 on avoiding harm, any signs of danger from
systems must be reported to those who have opportunity and/ or responsibility to resolve them.
See the guidelines for imperative 1.2 for more details concerning harm, including the reporting of
professional violations.
3.6.3. Professional Ethics
2.6 Honor contracts, responsibilities. and assigned agreements.
Honoring one's commitments is a matter of integrity and honesty. For the computer
professional, this includes ensuring that system elements perform as intended. Also, when one
contracts for work with another party, one has an obligation to keep that party properly informed
about progress toward completing that work.
A computing professional has a responsibility to request a change in any assignment that he
or she feels cannot be completed as defined. Only after serious consideration and with full
disclosure of risks and concerns to the employer or client, should one accept the assignment. The
major underlying principle here is the obligation to accept personal accountability for professional
work. On some occasions, other ethical principles may take greater priority.
A judgment that a specific assignment should not be performed may not be accepted. Having
clearly identified one's concerns and reasons for that judgment, but failing to procure a change in
that assignment, one may yet be obligated, by contract or by law, to proceed as directed.
3.6.3. Professional Ethics
2.8 Access computing and communication resources only when authorized to do so.
Theft or destruction of tangible and electronic property is prohibited by imperative
1.2-"Avoid harm to others." Trespassing and unauthorized use of a computer or communication
system is addressed by this imperative. Trespassing includes accessing communication networks
and computer systems, or accounts and/or files associated with those systems, without explicit
authorization to do so. Individuals and organizations have the right to restrict access to their
systems so long as they do not violate the discrimination principle (see 1.4). No one should enter
or use another's computer system, software, or data files without permission. One must always
have appropriate approval before using system resources, including communication ports, file
space, other system peripherals, and computer time.
3.6.3. Professional Ethics
3. ORGANIZATIONAL LEADERSHIP IMPERATIVES
As an ACM member and an organizational leader.
I will....
BACKGROUND NOTE: This section draws extensively from the draft IFIP Code of Ethics,
especially its sections on organizational ethics and international concerns. The ethical obligations
of organizations tend to be neglected in most codes of professional conduct, perhaps because these
codes are written from the perspective of the individual member. This dilemma is addressed by
stating these imperatives from the perspective of the organizational leader. In this context "leader"
is viewed as any organizational member who has leadership or educational responsibilities. These
imperatives generally may apply to organizations as well as their leaders. In this context
"organizations" are corporations, government agencies. and other "employers," as well as
volunteer professional organizations.
3.6.3. Professional Ethics
3.1 Articulate social responsibilities of members of an organizational unit and encourage full
acceptance of those responsibilities.
Because organizations of all kinds have impacts on the public, they must accept
responsibilities to society. Organizational procedures and attitudes oriented toward quality and the
welfare of society will reduce harm to members of the public, thereby serving public interest and
fulfilling social responsibility. Therefore, organizational leaders must encourage full participation
in meeting social responsibilities as well as quality performance.
3.6.3. Professional Ethics
3.2 Manage personnel and resources to design and build information systems that enhance
the quality of working life.
Organizational leaders are responsible for ensuring that computer systems enhance, not
degrade, the quality of working life. When implementing a computer system, organizations must
consider the personal and professional development, physical safety, and human dignity of all
workers. Appropriate human-computer ergonomic standards should be considered in system
design and in the workplace.
3.3 Acknowledge and support proper and authorized uses of an organization's computing
and communication resources.
Because computer systems can become tools to harm as well as to benefit an organization,
the leadership has the responsibility to clearly define appropriate and inappropriate uses of
organizational computing resources. While the number and scope of such rules should be minimal,
they should be fully enforced when established.
3.6.3. Professional Ethics
3.4 Ensure that users and those who will be affected by a system have their needs clearly
articulated during the assessment and design of requirements; later, the system must be
validated to meet requirements.
Current system users, potential users, and other persons whose lives may be affected by a
system must have their needs assessed and incorporated in the statement of requirements System
validation should ensure compliance with those requirements.
3.5 Articulate and support policies that protect the dignity of users and others affected by a
computing system.
Designing or implementing systems that deliberately or inadvertently demean individuals or
groups is ethically unacceptable. Computer professionals who are in decision-making positions
should verify that systems are designed and implemented to protect personal privacy and enhance
personal dignity.
3.6.3. Professional Ethics
3.6 Create opportunities for members of the organization to learn the principles and
limitations of computer systems.
This complements the imperative on public understanding (2.7). Educational opportunities
are essential to facilitate optimal participation of all organizational members. Opportunities must
be available to all members to help them improve their knowledge and skills in computing,
including courses that familiarize them with the consequences. and limitations of particular types
of systems. In particular, professionals must be made aware of the dangers of building systems
around oversimplified models, the improbability of anticipating and designing for every possible
operating condition, and other issues related to the complexity of this profession.
3.6.3. Professional Ethics
4. COMPLIANCE WITH THE CODE
The future of the computing profession depends on both technical and ethical excellence.
Not only is it important for ACM computing professionals to adhere to the principles expressed in
this Code, each member should encourage and support adherence by other members.
3.6.3. Professional Ethics
4.2. Treat violations of this code as inconsistent with membership in the ACM.
Adherence of professionals to a code of ethics is largely a voluntary matter. However, if a
member does not follow this code by engaging in gross misconduct, membership in ACM may be
terminated.
This Code and the supplemental Guidelines were developed by the Task Force for the
Revision of the ACM Code of Ethics and Professional Conduct: Ronald E. Anderson, Chair,
Gerald Engel, Donald Gotterbarn, Grace C. Hertlein, Alex Hoffman, Bruce Jawer, Deborah G.
Johnson, Doris K. Lidtke, Joyce Currie Little, Dianne Martin, Donn B. Parker, Judith A. Perrolle,
and Richard S. Rosenberg. The Task Force was organized by ACM/SIGCAS and funding was
provided by the ACM SIG Discretionary Fund. This Code and the supplemental Guidelines were
adopted by the ACM Council on October 16, 1992.
This Code may be published without permission as long as it is not changed in any way and
it carries the copyright notice. Copyright 1997, Association for Computing Machinery, Inc.