IT, Culture, and Society Flashcards

Objectives

  • Recall the current trends in the field of information technology.

  • Discuss the Internet of Things and its influence on the society.

  • Explain automation and its impact on the society.

  • Analyze how IT influences culture and social behavior.

  • Enumerate the rules of netiquette.

  • Describe cyberbullying and identify the steps to combat it.

  • Familiarize themselves with and demonstrate the imperatives of professional conduct for IT professionals.

The Impact of IT on the Society

  • Key trends:

    • IoT and Smart Home Technology

    • Augmented Reality and Virtual Reality

    • Machine Learning

    • Automation

    • Big Data

    • Physical-Digital Integrations

    • Everything on Demand

  • Organizations are shifting manual business processes to automated ones, using ICT to improve products and services.

  • The Internet of Things (IoT) and automation have greatly influenced present-day culture and society.

Internet of Things (IoT)

  • Definition: A setup of devices and objects connected together in a given network, often wirelessly.

  • Key aspects:

    • Sensors: Integration across technology and business.

    • Big Data: Data analysis and synchronization.

    • IoT Security: Mobile phone notifying you if you will allow a new device to connect to it via Bluetooth.

  • Applications of IoT:

    • Smart Cars

    • Smart Cities

    • Connected Industries

    • Connected Buildings

    • Connected Cars

    • Smart Energy

Challenges of IoT

  • System Requirements: Industries have different requirements depending on the industry type (e.g., food industry vs. automobile manufacturer).

  • Connectivity: Varying connections (wired and wireless) and different protocols create challenges.

  • Power Requirements: Extending battery life for mobile IoT devices is crucial, especially in critical procedures.

  • Security: Protecting confidential information and system integrity against hacking and viruses is essential.

  • Development: Expanding the capabilities of developers to create more “smart things” is a challenge.

  • Services: Determining where collected data will go and identifying the platform for IoT applications requires consideration; cloud services offer end-to-end solutions.

Automation

  • Definition: With available technology and standards for computer system interconnection, the demand for system automation is on the rise.

  • Automated systems encompass automated business processes, operations, service provider functions, monitoring, and tools.

  • Examples:

    • Automated payroll system

    • Manufacturing plant that packs powdered juices in foil containers and sachets

    • Automated weather forecast

Robotic Process Automation (RPA)

  • Definition (IRPAAI): The application of technology that allows employees to configure computer software or a robot to capture and interpret existing applications for processing a transaction, manipulating data, triggering responses, and communicating with other digital systems.

  • Applications:

    • Payroll

    • Online System Registration

    • Online Enrollment System

    • IT Support Management: Automated systems can send notifications to IT Managers if part of the system fails

    • Automated Assistants: Apple’s Siri is an example of voice recognition software used in RPA.

Sensors

  • Definition: Hardware devices that can measure an event, object, or any physical quality.

  • Sensors can connect to other devices to track the data they measure.

  • Types of Sensors:

    • Temperature Sensor

    • Infrared Sensor

    • Ultrasonic Sensor

    • Touch Sensor

    • Proximity Sensor

    • Pressure Sensor

    • Level Sensor

    • Smoke / Gas Sensor

The Influence of IT on Culture and Social Behavior

  • The widespread prevalence of technology introduces both positive and negative issues.

  • The surge of ICT has influenced people’s lives for better and worse.

  • Positive effects should focus on self-realization and social interaction, not solely on technology.

  • Gilkey (2015) noted the many small ways technology alters individual and collective behavior daily.

  • These “small ways” are becoming prominent, contributing to “generation wars” publicized in social media.

Influence on Culture

  • Online Reviews: Help viewers/readers decide what to watch or read.

  • Weblogging/Social Media: Bloggers post pictures of meals, places to go, etc.

  • YouTube Learners

Influence on Social Behavior

  • Cyberbullying: Unwanted, hostile behavior done by individuals to gain control over others; cyberbullies can be classmates, neighbors, or officemates; victims often end up with personal traumas.

  • Netiquette: Describes how one should act online; brings in policies for all features and qualities of the internet.

Netiquette for Social Media
  • Using social media is good for communication but can be used to discredit others.

  • Rules of netiquette (Spira, 2010):

    1. The Personalize IT Rule: Put restrictions on accepting friends/followers.

    2. The Off-limits Rule: Know limitations when voicing opinions.

    3. The Tag – You’re It Rule: Be careful in tagging someone.

Netiquette for Email Services
  • Email services are used in numerous contexts to send and receive emails.

Netiquette for Chat Rooms and Instant Messaging
  • Think carefully before accepting private conversations, especially with unknown individuals.

  • Include only friends in group chats.

  • Avoid giving personal information or photos.

  • Save a copy/backup of conversations.

  • Log out of accounts, especially in public places.

  • Customize account settings from public to private.

Chat Etiquette
  • Courtesy for Private-chatting:

    1. Greet

    2. Introduce yourself

    3. Communicate your purpose clearly and respectfully

    4. Wait for response

    5. Close the conversation graciously

  • Note: Avoid messaging or calling during inappropriate hours unless it's urgent or pre-agreed.

10 Commandments of Computer Ethics

  • Thou shalt not use a computer to harm other people.

  • Thou shalt not interfere with other people's computer work.

  • Thou shalt not snoop around in other people's computer files.

  • Thou shalt not use a computer to steal.

  • Thou shalt not use a computer to bear false witness.

  • Thou shalt not copy or use proprietary software for which you have not paid (without permission).

  • Thou shalt not use other people's computer resources without authorization or proper compensation.

  • Thou shalt not appropriate other people's intellectual output.

  • Thou shalt think about the social consequences of the program you are writing or the system you are designing.

  • Thou shalt always use a computer in ways that ensure consideration and respect for other humans.