IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
COMPILATION OF REPORTS IN SOCIAL AND
PROFESSIONAL ISSUES I
(DIT – 124)
SUBMITTED BY:
DIT – S2C2
SUBMITTED TO:
Mrs. Araceli L. Jabal, M.A. Ed.
FOR THE SCHOOL YEAR:
2021 – 2022
i
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Preface
To briefly introduce, this paper involves all the compilation of
reports of section DIT – S2C2 on the subject of Social and Professional
Issues I, subject code of DIT – 124.
The reports conducted by the students of DIT are topics under
the subject of Social and Professional Issues I, which were assigned
by Mrs. Araceli L. Jabal; these topics were reported online using
Google Meet and with the use of Microsoft PowerPoint, and then
transferred on Microsoft Word for the sake of the compilation.
This compilation is done to bind all the reports split amongst the
students via chronological order, by topic, and by lesson. Some reports
may have medias inserted within their reports, such as diagrams,
photos and charts that help support the main idea of their topic.
Each end of the report has the reporters’ printed name and their
signature to certify that they are the ones that have reported the
material, with this, the bundle of reports is proven as credible and
trustworthy.
ii
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Acknowledgement
The completion of this compilation of the reports conducted by
the students of DIT – S2C2 were done and would not have been
possible without the contribution and the cooperation of the students
who have given their report for the sake of the compilation.
The contributions of the said students are deeply appreciated
and are deeply valued and greatly acknowledged as if it is a group
compilation of reports. But the students would like to express their
gratitude to the following:
Mrs. Araceli L. Jabal, for making this compilation of reports
possible, we thank you for your endless support in giving our reports
and listening to our reports that we have done and delivered with the
use of Google Meet.
And to all the students who have done their effort in submitting
their final copy of their reports for the compilation, the valiant efforts
are deeply appreciated.
Above all, to the Great Almighty, the author of knowledge and
wisdom, for his countless love.
We thank you.
iii
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Table of Contents
Preface ....................................................................................................... i
Acknowledgement ..................................................................................... ii
Table of Contents ................................................................................ iii - iv
The Global and Digital Environment ……………………………............. 1 - 6
Digital Divide ……………………........................................................... 7 - 12
Information System Trends ……………............................................. 13 - 45
Emerging and Converging Information Communication …………..... 46 - 85
The Rise of Robotics …………......................................................... 86 - 116
Miniaturized and Multifunctional Machines .................................... 117 - 122
ICT Enabled Industry ..................................................................... 123 - 129
Intelligence Gathering & Information Warfare ................................ 130 - 141
E-Health & Virtual Therapy ............................................................ 142 - 151
Mobile-based Service Industries ................................................... 152 - 163
E-Service & E-Government ........................................................... 164 - 174
Internet and Censorships .............................................................. 175 - 188
Sex and Technology ...................................................................... 189 - 216
Virtual Prostitution ......................................................................... 217 - 222
Technology and Privacy ................................................................ 223 - 231
Online Crimes ................................................................................ 232 - 244
iv
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Table of Contents
Electronics Lifestyle ....................................................................... 245 - 257
E-Learning ..................................................................................... 258 - 263
1
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
The Global and Digital
Environment
(Bermejo, Roen A. &
Buenamente, Michael C.)
2
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
The Global and Digital Environment
- A digital environment is an integrated communications environment where
digital devices communicate and manage the content and activities within
it. The concept is based on digital electronics systems which are integrated
and implemented for a global community.
Digital Influence
- Digital technologies have advanced more rapidly than any innovation in
our history – reaching around 50 per cent of the developing world's
population in only two decades and transforming societies. By enhancing
connectivity, financial inclusion, access to trade and public services,
technology can be a great equalizer.
Philippines on Digital Community
- Backed by strong government support, the Philippines' digital sector
contributes significantly to its economy today. In 2020, the Internet economy
in the Philippines was estimated to be worth USD7. 5 billion and is expected
to grow by 30 percent annually to reach USD28 billion by 2025.
3
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Newspaper vs Digital News in the Philippines
- USE OF NEWSPAPERS ON THE PHILIPPINES: 28% of all Filipinos
reads newspaper on a daily basis
- DIGITAL NEWS: social media as a source of news have risen to 72%
Facebook Users Around the World
- With around 2.9 billion monthly active users, Facebook is the most popular
social media worldwide. With an audience of this scale, it is no surprise that
the vast majority of Facebook's revenue is generated through advertising.
Twitter Users Around the World
- Twitter has some 330 million monthly active users (MAU) based on its last
reported data that leveraged this metric in the 1st quarter of 2019. As of
2020, Twitter's monetizable daily active users (mDAU) stands at 166 million,
which represents a 24% growth from 2019.
4
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
ISSUES WITHIN DIGITAL ENVIRONMENT
Authentication Information
- Authentication is the act of proving an assertion, such as the identity of a
computer system user. In contrast with identification, the act of indicating a
person or thing's identity, authentication is the process of verifying that
identity.
Cyberbullying
- Cyberbullying is the use of cell phones, instant messaging, e-mail, chat
rooms or social networking sites such as Facebook and Twitter to harass,
threaten or intimidate someone. Cyberbullying is often done by children,
who have increasingly early access to these technologies.
QUIZ
1.Act of proving assertion such as identity of computer user.
A. Cyber Bullying
B. Identity Theft
C. Authentication Information
D. Network
5
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
2. Is the use of cell phones, instant messaging, e-mail, chat rooms or social
networking sites such as Facebook and Twitter to harass, threaten or
intimidate someone.
A. Digital Issue
B. Social Media Issue
C. Cyber Bullying
D. Authentication
3. Integrated communication environment where digital devices
communicate and manage the content and activities within it.
A. User
B. Networks
C. Digital Environment
D. Authentication Information
4-5. Choose 2 out of 4 things to enhance to make technology great
equalizer (2 points)
6-7. Percentage of newspapers user in the Philippines and Social Media
News users
8-9. Backed by strong government support, the ___________________
contributes significantly to its economy today.
6
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
10. Advanced more rapidly than any innovation in our history – reaching
around 50 per cent of the developing world's population in only two decades
and transforming societies.
A. Digital Environment
B. Digital Influence
C. Digital Issues
D. Digital News
ESSAY: What can you do to help about Cyberbullying and how can you
protect your devices from malicious threats.
References:
https://www.sciencedirect.com
https://www.igi-global.com
Bermejo, Roen C. Buenamente, Michael A.
Reporter Reporter
7
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Digital Divide
(Delos Santos, Nicah P.)
8
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Digital Divide
- It refers to the gap between those who benefit from the digital age and
those who don't, and those that don't have restricted access. This
technology can include the telephone, television, personal computers, and
internet connectivity.
4 Perspectives to Analyze Digital Divide
9
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
ASPECTS OF DIGITAL DIVIDE
Infrastructure
- The infrastructure by which individuals, households, businesses, and
communities are connected to the internet.
Skills and Digital Literacy
- Research shows that the digital divide is more than just an access issue
and cannot be alleviated merely by providing the necessary equipment.
There are at least three factors at play: information accessibility, information
utilization, and information receptiveness.
Location
- Internet connectivity can be at a variety of locations such as homes,
offices, schools, libraries, public spaces, internet cafes and others. There
are also varying connections in rural, suburban, and urban areas.
10
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Application
- Common Sense Media, a non-profit organization that reviews and
provides ratings from media and technology with the goal of providing
information on their suitability for children. It also funds research on the role
of media in the lives of children and advocates publicly for children’s friendly
policies and laws regarding media.
QUIZ
1. Why does the digital divide exist?
A. God made it that way.
B. Poverty and the economic barriers that limit resources and prevent
people from obtaining an otherwise using technology.
C. People don't strive for success.
D. Because of lack of physical access to technology.
2. The gap between those who benefit from the digital age and those who
don’t
A. Digital issue
B. Digital environment
C. Digital Divide
D. System trends
11
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
3. Aspect that connects the individuals, households, businesses and
communities to the internet.
A. Skills
B. Infrastructure
C. Wi-Fi
D. Internet
4. Homes, offices, schools, libraries and a variety of…
A. Places
B. Location
C. Areas
D. Maps
5. Literacy that shows that the digital divide is more than just an access
issue and cannot be alleviated merely by providing the necessary
equipment.
A. Media literacy
B. World literacy
C. Philippine literacy
D. Skills and Digital Literacy
12
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
6. A non-profit organization that reviews and provides ratings from media
and technology
A. Application B. Social Media
C. Networks D. Accounts
7. This technology can include the telephone, television, personal computer
and internet connectivity
A. Internet B. Digital Divide
C. Account D. User
8-12. Common Types of technology
13-20. 4 types of perspectives to analyze the digital divide. Give one
example of each perspective.
Essay 5pts.
1. Does the digital divide matter? Why?
2. How does the digital divide affect you?
References:
Module in Social and Professional Issues I
Delos Santos, Nicah P.
Reporter
13
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Information System
Trends
(Dequiros, Miguel T.)
14
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Information System Trends
- Information systems have evolved at a rapid pace ever since their
introduction in the 1950s. Today devices you can hold in one hand are more
powerful than the computers used to land a man on the moon in 1969. The
Internet has made the entire world accessible to you, allowing you to
communicate and collaborate like never before. This will examine current
trends and look ahead to what is coming next.
Global
15
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- The first trend to note is the continuing expansion of globalization. The use
of the Internet is growing all over the world, and with it the use of digital
devices. Penetration rates, the percent of the population using the Internet,
remains high in the developed world, but other continents are gaining.
- With a current worldwide estimated population of 7.9 billion, approximately
5.25 billion people have access to and use the internet. That means that
66.2% of the world's population uses the internet. In 2022, Asia will continue
to account for the majority of internet users. 2,790,150,527 people in Asia
are online, which makes up 53.1% of the global internet population.
16
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Personal
- Ever since the advent of Web 2.0 and e-commerce, users of information
systems have expected to be able to modify their experiences to meet their
personal tastes. From custom backgrounds on computer desktops to
unique ringtones on mobile phones, makers of digital devices provide the
ability to personalize how we use them. More recently, companies such as
Netflix have begun assisting their users with personalization by viewing
suggestions. In the future, we will begin seeing devices perfectly matched
to our personal preferences, based upon information collected about us.
17
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Mobile
- Perhaps the most impactful trend in digital technologies in the last decade
has been the advent of mobile technologies. Beginning with the simple
cellphone in the 1990s and evolving into the smartphones of today, the
growth of mobile has been overwhelming. Here are some key indicators:
1.) Mobile vs. Desktop - Minutes spent each day on a mobile device are
2.5 times the number of minutes spent on a desktop computer.
- The biggest factor driving mobile’s dominance globally is the affordability
of mobile devices and smartphones. Lower-income individuals can often
afford a basic smartphone and mobile internet access, but can’t necessarily
afford a desktop or laptop computer. Home internet, or Wi-Fi, is another
18
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
factor. In the developed world, we may think of “the internet” as having an
internet-connected device hooked up to a Wi-Fi network.
2.) Daytime vs. Evening - Desktop use dominates in the daytime hours,
but mobile devices are dominant in the evening, with peak usage around
8:00 pm.
3.) Device usage - Smartphones are used more than any other technology.
Laptops are in second place, followed by tablets holding a slight edge over
desktops.
Types of Internet Usage on Desktop and Mobile Devices
Search Engine Activity - Approximately 58% of all search engine activity
on Google originates from mobile searches, compared to around 40% on
desktop. Desktop search activity also differs from mobile searches in a
number of ways. For instance, the volume of local search queries (such as
“restaurants near me”) has declined among desktop users but continues to
rise exponentially for those searching on mobile phones.
19
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Social Media Usage - Approximately 83% of all social media visits are from
mobile devices, compared to around 15% on desktops or laptop computers.
In fact, roughly half of social media users only use mobile devices to access
their social network of choice. This can largely be attributed to the popularity
of social media apps on smartphones, and increased smartphone use in
general.
Web Browsing - When it comes to browsing the web (outside of specific
mobile apps), desktop remains dominant. While mobile visits made up 58%
of US searches, they only accounted for approximately 42% of total time
spent online. In other words, more individual searches are made on mobile,
but more time is spent browsing the web on desktops.
Gaming - Online gaming remains exceedingly popular on both desktop PC
and mobile devices. Statistics are difficult to measure across so many
different platforms and categories, but we can gain some insight from the
data available. In terms of spending, approximately 25% of gaming
revenues come from PC gamers, compared to 28% from gaming consoles
and 47% from mobile gaming. Part of this disconnect can be explained by
the prohibitive costs of desktop devices capable of gaming, compared to
the relatively low cost of mobile gaming devices and smartphones.
20
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
4.) Smartphone sales decline - According to Gartner Group, worldwide
smartphone sales declined in the fourth quarter of 2017 by 4.7% compared
with the fourth quarter of 2016. This is the first decline in global smartphone
sales since Gartner began tracking mobile phone sales in 2004.
- US smartphone sales were down 6% YoY in Q1 2022, according to
Counterpoint Research’s latest data from its US Monthly Smartphone
Channel Share Tracker. Premium device sales slowed after the holiday
quarter, continued supply constraints affected both 5G and LTE devices,
and tax season sales were weaker as Q1 2021 saw an added stimulus
money boost.
21
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- According to Research Analyst Matthew Orf said, “Apple and Samsung
continued to dominate the market with a combined 75% share and had
some of their best performances to date. However, some attention should
also be brought to smaller OEMs that are beginning to capture more
mindshare of consumers due to LG’s exit. Motorola has been very
aggressive, becoming the third largest OEM in 2021. In Q1 2022, its market
share reached 12%, the highest quarterly share to date. Motorola is
refreshing its G series with new 5G devices in Q2, the Moto G Stylus 5G
2022 and Moto G 5G, which will help the OEM increase its 5G sales in 2022.
TCL also made big gains in market share to reach almost 3%. While known
for its TVs, TCL has been putting in extra marketing efforts to win mindshare
in prepaid channels. It won several SKUs at Metro by T-Mobile, with the
TCL 20 XE and TCL 30 XE 5G helping it gain market share. OnePlus did
grow in share YoY, but the OEM had a slow quarter overall as the increased
low-end competition resulted in contracted sales. The launch of the
OnePlus 10 Pro has been relatively weak, but the OEM hopes to recapture
some share with the new N20 5G that will launch in early Q2.”
22
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
5.) The rise and fall of tablets - In 2012 the iPad sold more than three
times as many units in its first twelve months as the iPhone did in its first
twelve months.
- According to market research firm IDC, 2021 will see the highest annual
year-over-year growth for the next five years for computing devices
worldwide. Traditional PCs (notebooks, desktops and workstations) will
grow 14.2% in 2021 to 347 million units. (That's down from a previous
forecast of 18%.) Tablets will grow just 3.4%. After 2021, tablets will enter
a period of decline, with the steepest decline expected in 2022 and more
modest decline through 2025. Desktops will also enter a period of decline
starting in 2021 and continuing through 2025. Compound annual growth
(CAGR) for tablets from 2021 to 2025 is expected to be –1.5%. For
23
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
traditional PCs, including desktops, notebooks and workstations, CAGR will
be 3.4%.
Wearable
- Wearables have been around for a long time, with technologies such as
hearing aids and, later, Bluetooth earpieces. The average smartphone user
looks at his or her smartphone 150 times a day for functions such as
messaging (23 times), phone calls (22), listening to music (13), and social
media (9). Many of these functions would be much better served if the
technology was worn on, or even physically integrated into, our bodies. This
technology is known as a “wearable.” According to the Gartner Group in
2007, the strong growth predicted by 2021. Total wearable devices are
projected to increase by about 45% from 2018 to 2021.
24
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Collaborative
- As more people use smartphones and wearables, it will be simpler than
ever to share data with each other for mutual benefit. Some of this sharing
can be done passively, such as reporting your location in order to update
traffic statistics. Other data can be reported actively, such as adding your
rating of a restaurant to a review site.
Examples of Applications
Apple Maps is a web mapping service developed by Apple Inc. The default
map system of iOS, iPadOS, macOS, and watchOS, it provides directions
and estimated times of arrival for driving, walking, cycling, and public
transportation navigation.
25
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Google Maps is a location search tool that allows you to geolocate a
specific point, calculate routes, find the nearest places of interest or see the
appearance of a place at street level through Google Street View.
Waze is a community-based tool that keeps track of the route you are
traveling and how fast you are making your way to your destination. In return
for providing your data, you can benefit from the data being sent from all of
the other users of the app. Waze directs you around traffic and accidents
based upon real-time reports from other users.
26
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Printable
- One of the most amazing innovations to be developed recently is the 3-D
printer. A 3-D printer allows you to print virtually any 3-D object based on a
model of that object designed on a computer. 3-D printers work by creating
layer upon layer of the model using malleable materials, such as different
types of glass, metals, or even wax. 3-D printing is quite useful for
prototyping the designs of products to determine their feasibility and
marketability. 3-D printing has also been used to create working prosthetic
legs and an ear that can hear beyond the range of normal hearing. Here is
the example of 3-D printer:
Original Prusa Mini
Best Budget 3D Printer
$399.00
27
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Here are more amazing productions from 3D printers.
Buildings - Researchers at MIT in 2017 unveiled a 3D printing robot that
can construct a building. It has a large arm and a small arm. The large arm
moves around the perimeter of the building while the small arm sprays a
variety of materials including concrete and insulation. Total time to construct
a dome-shaped building is just 14 hours.
28
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Musical Instruments - Flutes, fiddles, and acoustic guitars are being
produced with 3D printing using both metal and plastic. You can click here
for an example of making a violin.
Medical Models - Medical models are being used to help doctors train in
the areas of orthopedics, transplant surgery, and oncology. Using a 3D
printed brain model similar to the one shown here, surgeons were able to
save a patient from a cerebral aneurysm.
29
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Clothing - Special software is used to measure a person, then 3D printing
produces the clothing to the exact measurements. The result is well-fitting
clothes that consume less raw materials. Initially the challenge was to find
materials that would not break. You can read more about 3D printing of
clothes and shoes.
Findable
Examples are Lights can be turned on or off remotely and Thermostats can
be reset with anyone being present. Think of IoT as devices that you
wouldn’t normally consider being connected to the Internet. And, the
connection is independent of human intervention. So, a PC is not an IoT,
but a fitness band could be. One keyword for IoT would be “independent”,
not relying directly or constantly on human action.
Benefits from IoTs are virtually everywhere. Here is a quick list.
1. Optimization of Processes - IoTs in manufacturing monitor a variety of
conditions that impact production including temperature, humidity,
barometric pressure – all factors which require adjustment in application of
manufacturing formulas.
30
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
2. Component Monitoring - IoTs are added to components in the
manufacturing process, then monitored to see how each component is
performing.
3. Home Security Systems - IoTs make the challenge of monitoring activity
inside and outside your home easier.
4. Smart Thermostats - Remote control of home thermostats through the
use of IoTs allows the homeowner to be more efficient in consumption of
utilities.
5. Residential Lighting - IoTs provide remote control of lighting, both
interior and exterior, and at any time of day.
Autonomous
- Another trend that is emerging is an extension of the Internet of Things:
autonomous robots and vehicles. By combining software, sensors, and
location technologies, devices that can operate themselves to perform
specific functions are being developed.
Form of creations such as:
31
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
1. Nanobots
- A nanobot is a robot whose components are on the scale of about a
nanometer, which is one-billionth of a meter. While still an emerging field, it
is showing promise for applications in the medical field. For example, a set
of nanobots could be introduced into the human body to combat cancer or
a specific disease. are tiny biological machines that can deliver drugs to the
target destination to make them more efficacious and reduce side effects,
which are the biggest challenges of drug delivery.
2. Self-Driving Cars
32
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- An autonomous car is a vehicle capable of sensing its environment and
operating without human involvement. A human passenger is not required
to take control of the vehicle at any time, nor is a human passenger required
to be present in the vehicle at all.
3. Unmanned Aerial Vehicle (UAV)
- A UAV, often referred to as a “drone,” is a small airplane or helicopter that
can fly without a pilot. Instead of a pilot, they are either run autonomously
by computers in the vehicle or operated by a person using a remote control.
While most drones today are used for military or civil applications, there is
a growing market for personal drones.
33
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Secure
- As digital technologies drive relentlessly forward, so does the demand for
increased security. The CIA triad is a common model that forms the basis
for the development of security systems. They are used for finding
vulnerabilities and methods for creating solutions.
CIA TRIAD - The confidentiality, integrity, and availability of information is
crucial to the operation of a business, and the CIA triad segments these
three ideas into separate focal points. This differentiation is helpful because
it helps guide security teams as they pinpoint the different ways in which
they can address each concern. Ideally, when all three standards have been
met, the security profile of the organization is stronger and better equipped
to handle threat incidents.
34
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Confidentiality - Another term for confidentiality would be privacy.
Company policies should restrict access to the information to authorized
personnel and ensure that only those authorized individuals view this data.
The data may be divided into sections according to the security or sensitivity
level of the information. For example, a Java program developer should not
have access to the personal information of all employees. Methods to
ensure confidentiality include data encryption, username ID and password,
two factor authentication, and minimizing exposure of sensitive information.
Integrity - Integrity is accuracy, consistency, and trustworthiness of the data
during its entire life cycle. Data must be unaltered during transit and not
changed by unauthorized entities. File permissions and user access control
can prevent unauthorized access. Version control (responsible for
managing changes to computer programs, documents, large web sites, or
other collections of information.) can be used to prevent accidental changes
by authorized users. Backups must be available to restore any corrupted
data.
Availability - Maintaining equipment, performing hardware repairs, keeping
operating systems and software up to date, and creating backups ensure
35
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
the availability of the network and data to the authorized users. Plans should
be in place to recover quickly from natural or man-made disasters. Security
equipment or software, such as firewalls, guard against downtime due to
attacks such as denial of service (DoS). Denial of service occurs when an
attacker attempts to overwhelm resources so the services are not available
to the users.
- In a nutshell, Confidentiality ensures the privacy of data by restricting
access through authentication encryption. Integrity assures that the
information is accurate and trustworthy. Availability ensures that the
information is accessible to authorized people.
36
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Tools for Information Security
1. Authentication - is the process of recognizing a user's identity. In doing
this, authentication assures secure systems, secure processes and
enterprise information security. Authentication is the first line of defense. It
is the process of determining whether a user is who they say they are.
Types of Authentications
A. Single Factor Authentication - Historically the most common form of
authentication, Single-Factor Authentication, is also the least secure, as it
only requires one factor to gain full system access. It could be a username
and password, pin-number or another simple code. While user-friendly,
Single-Factor authentication systems are relatively easy to infiltrate by
phishing, key logging, or mere guessing. As there is no other authentication
gate to get through, this approach is highly vulnerable to attack.
B. Two Factor Authentication - By adding a second factor for verification,
two-factor authentication reinforces security efforts. It is an added layer that
essentially double-checks that a user is. With this method, users enter their
primary authentication credentials (like the username/password mentioned
above) and then must input a secondary piece of identifying information.
Possible secondary factors are a one-time password from an authenticator
37
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
app, a phone number, or device that can receive a push notification or SMS
code, or a biometric like fingerprint (Touch ID) or facial (Face ID) or voice
recognition.
C. Single Sign On - With SSO, users only have to log in to one application
and, in doing so, gain access to many other applications. This method is
more convenient for users, as it removes the obligation to retain multiple
sets of credentials and creates a more seamless experience during
operative sessions.
2. Access Control - Access control is a security technique that regulates
who or what can view or use resources in a computing environment. It is
the selective restriction of access to a place or other resource. It is used to
regulate who is able (or not able) to view, access, or use specific resources
and/or information.
Types of Access Control
A. Physical Access Control - are a type of physical security designed to
restrict or allow access to a certain area or building. These are installed in
order to protect businesses and property from vandalism, theft, and
trespassing, and are especially useful in facilities that require higher levels
38
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
of security and protection.
B. Logical Access Control - is defined as restricting virtual access to data;
it consists of identification, authentication, and authorization protocols
utilized worldwide. In the digital world of today, organizations must be
vigilant in protecting their data, assets, and infrastructure.
3. Password Security - Passwords provide the first line of defense against
unauthorized access to your computer and personal information. The
stronger your password, the more protected your computer will be from
hackers and malicious software. You should maintain strong passwords for
all accounts on your computer.
Common Policies Should Use
A. Require complex password – a password should not be simple, or a
word that can be found in a dictionary.
B. Change password regularly – passwords may not be reused.
C. Train employees not to give away passwords – Employees may be
tricked easily if they do not properly know about cybersecurity.
39
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
4. Encryption - is the process of encoding information. This process
converts the original representation of the information, known as plaintext,
into an alternative form known as cipher text.
Two Types of Encryptions
A. Symmetric Encryption - in symmetric
encryption the same key is used for encryption
and decryption. It is therefore critical that a
secure method is considered to transfer the
key between sender and recipient.
B. Asymmetric Encryption - symmetric
encryption uses the notion of a key pair:
a different key is used for the encryption
and decryption process. One of the keys
is typically known as the private key and
the other is known as the public key.
40
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
QUIZ
1. In global, do the devices today are more powerful than the computers
from the past? Why?
a. Yes, because of the rapid pace of the information system.
b. No, because there are advantages and disadvantages between the two
devices.
c. Maybe, because today’s devices that you’re holding can do the same
thing as the computer from the past.
d. None of the above
2. Asia continues to account for the majority of internet users.
2,790,150,527 people in Asia are online. On what percent of the global
internet population?
a. 50.8%
b. 87.5 %
c. 53.1 %
d. 67.9%
3. Why are mobile devices dominant globally?
a. Because of the unavailability of devices such as smartphone.
b. Because lower income individuals can afford basic smartphone and
mobile internet.
41
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
c. Because of its popularity year by year.
d. Because it is for the rich people only.
4. What approximately percent of all search engine activity on Google
originates from mobile searches?
a. 90%
b. 86%
c. 75%
d. 58%
5. What do you think roughly half of social media users only use mobile
devices to access their social network of choice?
a. The popularity of social media apps in mobile devices
b. It’s very pleasant to see in a small amount of screen
c. People tend to use smartphones because they’re very cheap.
d. Just because they want it to show what they want to share online.
6. US smartphone sales were down 6% YoY in Q1 2022 according to who?
a. US Monthly Smartphone
b. Counterpoint Research
c. The internet
d. Me
42
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
7. What does the average smartphone user look at his or her smartphone
per day?
a. 120 times
b. 50 times
c. 89 times
d. 150 times
8. What is the best description for Apple Maps?
a. Web mapping service developed by Apple Inc.
b. A location search tool that allows you to geolocate a specific point,
calculate routes, find the nearest places of interest
c. A community-based tool that keeps track of the route you are traveling
and how fast you are making your way to your destination.
d. A map service that is needed by most of us.
9. What is the best description for Google Maps?
a. Web mapping service developed by Apple Inc.
b. A location search tool that allows you to geolocate a specific point,
calculate routes, find the nearest places of interest
c. A community-based tool that keeps track of the route you are traveling
and how fast you are making your way to your destination.
d. A map service that is needed by most of us.
43
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
10. What is the best description for Waze?
a. Web mapping service developed by Apple Inc.
b. A location search tool that allows you to geolocate a specific point,
calculate routes, find the nearest places of interest
c. A community-based tool that keeps track of the route you are traveling
and how fast you are making your way to your destination.
d. A map service that is needed by most of us.
11. The differentiation of the CIA triad is very helpful because?
a. It is a guide for security teams as they pinpoint the different ways in which
they can address each concern.
b. It is crucial to the operation of a business, and the CIA triad segments
these three ideas into separate focal points.
c. The data may be divided into sections according to the security or
sensitivity level of the information.
d. All of the above.
12 - 13 Choose the best explanation to Confidentiality, Integrity, Availability
a. In a nutshell, Confidentiality ensures the privacy of data by restricting
access through authentication encryption. Integrity assures that the
44
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
information is accurate and trustworthy. Availability ensures that the
information is accessible to authorized people.
b. In a nutshell, Availability ensures the privacy of data by restricting access
through authentication encryption. Confidentiality assures that the
information is accurate and trustworthy. Integrity ensures that the
information is accessible to authorized people.
c. In a nutshell, Integrity ensures the privacy of data by restricting access
through authentication encryption. Availability assures that the information
is accurate and trustworthy. Confidentiality ensures that the information is
accessible to authorized people.
ESSAY 5 points (Minimum sentences: 3)
Give at least 2 benefits why the CIA triad is very helpful.
References:
https://www.broadbandsearch.net/blog/internet-statistics
https://www.highspeedinternet.net/desktop-and-mobile-internet-usage-
statistics/
https://www.counterpointresearch.com/us-smartphone-sales-decline-6-
yoy-q1-2022-pandemic-demand-cools/
45
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
https://opentextbook.site/informationsystems2019/chapter/chapter-13-
future-trends-in-information-systems-information-systems-
introduction/#footnote-41-1
https://thejournal.com/articles/2021/08/25/as-tablets-decline-notebooks-
will-drive-growth-in-computing-devices.aspx?m=1
https://www.fortinet.com/resources/cyberglossary/cia-triad
https://www.openpath.com/blog-post/physical-access-control
https://www.identiv.com/community/2020/08/06/whats-the-difference-
between-logical-access-control-and-physical-access-control/
https://www.techtarget.com/searchsecurity/definition/access-control
https://www.sailpoint.com/identity-library/authentication-methods-used-for-
network-security/
https://www.sixt.com/magazine/tips/top-free-navigation-apps/
Dequiros, Miguel T.
Reporter
46
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Emerging and
Converging
Information
Communication
(Ignacio, Jiro C.)
47
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
What is Information Communication?
- Information Communication or most likely known as Information and
Communications Technology (ICT) is the convergence of digital and
physical resources used to gather, store, process, retrieve, generate and
transmit information.
- Information is defined as a message or knowledge communicated or
received concerning a particular fact or circumstance.
- Communications, on the other hand, is the exchange of information
between two or more things, such as people, devices, governments,
organizations, or businesses.
- Combining them both, information communication, is the thorough
exchange of data and information with others using the online world or in
layman’s terms, the internet. With the use of the internet, people can access
tons of various information within a few clicks of the mouse, as we can see,
people can stream their music online, search something, interact with
friends, watch movies and such, are effects of the evolution or emergence
of technology.
48
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
What is Information Communication (Cont.)
- With regards to how people use the internet, it can promote and provide
people beneficiaries, because of how evolved, united, and the
appearance/arrival of modern technology nowadays that can help how
people live in this modern world.
- ICT permeates all aspects of life, providing newer, better, and quicker
ways for people to interact, network, seek help, gain access to information,
and learn.
- In addition, the term information and communications technology (ICT) is
generally accepted to mean all technologies that, combined, allow people
and organizations to interact in the digital world.
Examples of Information Communication
- The emergence and the availability of Information Communication today
really changes the lives of every person nowadays. For example, the
availability of the information that people can access easily is a beneficiary
for us people in this 21st century, is the news that is brought to us by the
internet that we can read anytime, anywhere. It is a diverse set of
technological tools and resources used to transmit, store, create, share or
49
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
exchange information. Below are some examples of information
communication.
CLOUD COMPUTING – Cloud computing or we can call it as the cloud
storage, is a software application used to store, manage and process data
on one’s own device.
INTERNET ACCESS – The internet is a massive home of the people and
we can consider it as our second home, for the internet paves the way of us
being able to cope with the technology nowadays and access various
information we have online.
TRANSACTIONS – Transactions can be defined as our online activity, most
specifically, when we are about to buy something in online shops.
COMMUNICATION EFFICIENCY - From the word itself, it is by us, people
exchanging valuable information that we may find useful or things that we
find as interesting, with the use of IT, the lives of people can be smooth and
free-flowing.
50
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
What is Artificial Intelligence (AI)
- AI is the ability of computer programs and robots to imitate humans’
intelligence and behavior, whether or not it learns for itself. For example,
understanding natural language, voice recognition, recommendation
engines and so on. And Artificial Intelligence wouldn’t exist without ML,
because take note, machine learning (ML) is considered as a subpart of
Artificial Intelligence (AI). The examples of Artificial Intelligence in today’s
world are clearly and can really be seen wherever we go, tons of technology
that has emerged and converged! Imagine, from traditional living back then,
to now, technology helps us for living, traditionally to digitally, what a
massive jump from the topic alone.
10 Examples of Artificial Intelligence (AI)
1. DIGITAL MAPS & NAVIGATION
- For the first example we have that incorporates the idea of Artificial
Intelligence (AI), is with the idea of having to have access to digital maps
and its prior navigation to any place you want to go to. Travelling to a new
destination does not require much thought any longer. Rather than relying
on confusing address directions, we can now easily open our phone's map
51
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
app and type in our destination. Again, we can see the transition traditionally
to digitally. And with this, the applications that we have in mind can be
Google Maps or Waze. How does it incorporate AI?
- With this topic in mind, it is truly accompanied with what we call the Global
Positioning System (GPS), wherein the AI uses machine learning to know
whether there is traffic nearby or successfully identify roads and
infrastructures around. It has been trained to calculate this based on the
traffic situations. Several ride-hailing applications have emerged as a result
of the use of similar AI technology, as a result, with the concept and idea of
machine learning, the app can also navigate from your starting point to your
destination!
52
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
2. SHAREit
- For the next part, the second example of Artificial Intelligence is the
application called SHAREit. SHAREit’s purpose is for the users to be able
to share and receive files digitally using just the Bluetooth, WiFi and the
GPS. With these, users can remotely share files, games, songs, photos,
videos & etc. to their friends with just a few clicks of buttons on their phone!
- The reason that SHAREit is under the art of
Artificial Intelligence is that it mainly has an
idea of sharing files remotely to other people
via wireless networks. The efficiency it offers
is better than having to download things from
the app store, or downloading
music/videos/movies in the first place, its
main purpose is to SHARE, as the
application name implies, sharing it to other
people. With this, our life is efficient, we can
get files from others that we might not have
direct access to, like paid games!
53
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
3. GOOGLE LENS
- Under Google’s own program/application, what we have as a
representation of today’s artificial intelligence is how the program is
incorporated. Google Lens! This application provides end users with their
appropriate need whenever they are bummed out on something, as their
tagline suggests, “Search what you see”, “Shop what you see”, “Translate
what you see” and “Identify what you see”.
- Those are just the possibilities and opportunities that Google Lens can
offer and cover on, it helps us find what we find in the real world. Whenever
it is a math problem we don’t know how to solve, or a plant species we want
to know the name of, shopping for a specific brand of cloth and such. With
the help of this application, people’s lives will be changed after this kind of
efficiency in information technology.
- Google Lens is an AI-powered technology that uses your smartphone
camera and machine learning to not only detect an object in front of the
camera lens, but understand it and offer actions such as scanning,
translation, shopping, and more.
54
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
4. FACIAL RECOGNITION
- Facial Recognition is the term we are all familiar with, even little kids
nowadays are. From the word itself, it can be understood pretty quickly, to
which devices that use artificial intelligence that enable us to recognize our
faces. Other names can include face ID, biometric identification, identity
verification.
- Facial recognition is one of the front-runner applications of AI. It is one of
the advanced forms of biometric authentication capable of identifying and
verifying a person using facial features in an image or video from a
database.
- Face recognition uses AI algorithms and ML to detect human faces from
the background. The algorithm typically starts by searching for human eyes,
followed by eyebrows, nose, mouth, nostrils, and iris. Once all the facial
features are captured, additional validations using large datasets containing
both positive and negative images confirm that it is a human face. Thus,
once succeeding, the system stores the face onto a database and whenever
a user tries to access, a correct facial recognition is a must to succeed and
use the device.
55
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- Facial Recognition technology is prevalent nowadays in the 21st century,
as it can be seen on various devices and most specifically, our mobile
phones. This acts as a password option for owners to unlock using their
face, with other people’s faces, they can’t unlock it, an easy concept.
- In companies, in the logging in or logging out system, some require facial
recognition to confirm if it is the employee logging in/out work. This is to
certify that the user is truthfully the one that is interacting with the system
and not a hoax person that uses their IDs, but with an additional work of
facial recognition, it makes it more secure. Confidentiality is one key point
here in terms of the CIA triad model.
5. ONLINE CASH PAYMENTS
- This next topic under Artificial Intelligence (AI) is with the use of online
cash payments, wherein any transaction involving a consumer and a
supplier, demand and supply can now be done digitally! Most common cash
payment applications are the ones that are commonly known, such as
GCash, PayMaya, Amazon Pay, Google Pay, etc.
- As the world is fused with traditional and digital means, we still can’t
escape the inevitable digital world that is constantly evolving up to today
and digital payments is one big factor of it. The world is moving too fast,
ain’t it?
56
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- Comparing it to the 20th century, where people normally pay for things
traditionally by cash, today in the 21st century, it is not only by traditional
cash payment but with the emergence of these technologies, online and
digital cash payments are made possible. As you can see, we can pay our
bills online, pay on restaurants with QR Codes, all of these are possible
because of how evolved our technology is today, the intelligence that is
programmed that made possible to make transactions online that is
beneficiary especially this recent pandemic! Anything that elevates human
interventions can serve as artificial intelligence.
57
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
6. SPEECH-TO-TEXT
- Incorporating Speech-to-text typing is one efficient way for people who
don’t have the time to type, or if they are just primarily lazy. But with humor
aside, the intelligence and the voice recognition that is involved with the
topic of speech-to-text can be considered as an artificial intelligence as if
the machine is understanding and deciphering what the user is saying,
learning and typing it in the document! The benefit of this intelligence makes
students’ learning simplified and less tedious if they took notes via speech
instead of risking their hand to have a spasm while writing, if a technology
is available for people, then why not? The goal of technology is to make
things efficient and easier anyways!
- AI speech-to-text is a field in computer science that specializes in enabling
computers to recognize and transcribe spoken language into text. It is also
called speech recognition, computer speech recognition, or automatic
speech recognition (ASR).
7. JOLLIBOTS AND FAST-FOOD KIOSKS
- For the seventh artificial intelligence, it is commonly known as fast food
kiosks or self-ordering kiosks and the Jollibots that was introduced lately.
58
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
A. KIOSKS
- First, we are tackling fast food kiosks that are not only in Jollibee but in
almost every fast-food chain, and not just in the Philippines but around the
world. It can be seen that this type of ordering method on restaurants can
help reduce lengthy lines and as well as having efficient and an easy task
to do to state your order, when ordering via kiosk, browse through the menu
digitally, add items and get a receipt to pay for DIGITALLY or IN CASH.
- For example, the picture depicts a person that is ordering McDonald's via
kiosk and after ordering, you’ll get a number by the side. And after this, you
will get a receipt, and you can do this relatively easy as if we people are
normalized and used to digital devices so it’s not new to us.
59
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
B. JOLLIBOTS
- And then next, are known as Jollibots, not the kid’s toys on value meals
but the cat robots that are recently invented. This Jollibot uses Artificial
Intelligence that involves robotics that is taught to serve people on assigned
table numbers.
- The greatness that the robot can bring is that it is taught by machine
learning, to serve foods that are assigned to them by the crew. And what’s
amazing is that it understands where to go, it can navigate to the restaurant,
that might be a sensor or a camera incorporated in the robot. Awesome! A
robot programmed to act like a human that can help efficiency within the
workplace and serve people at the restaurant. It can also be seen as
multifunctional, what a robot is programmed to do, not just serve food but
to also clean tables, and play music almost like a human crew!
60
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
8. E-COMMERCE WEBSITES
- SHOPEE! LAH-ZA-DA! I’m pretty sure almost every person is familiar with
those jingles by the two e-commerce websites that are common in our
country. But, how does e-commerce relate to artificial intelligence?
- Well, in short terms, what makes e-commerce as an artificial intelligence
because it serves as our go-to and convenient way to shop various things
online that might pique our interest, so, Shopee and Lazada provides to us
consumers efficiency and convenience.
- An AI solution that incorporates machine learning will improve the
customer experience, help you lift conversion, revenue, and profit
significantly. AI learns from visitors’ behavior in real-time, and so
incorporates machine learning - anticipating the visitors’ intents, and adapts
the results to rank the most relevant products higher, maximizing your sales,
and you can pay online to the sellers too!
61
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
9. TESLA’S SELF-DRIVING CARS
- The future is here! The world today is indubitably fast-paced, invention
after invention on technologies are coming from everywhere, research after
research, providing efficiency in people’s lives. Thanks to the inventors
today who have established and researched self-driving cars that made it
possible in today’s world. Tesla incorporates machine learning and like we
have mentioned before, on the examples of artificial intelligence, is with the
topic of digital maps and navigation. You first pick your destination and it
drives you to it, auto-pilot, hands-free!
- The future is now, self-driving cars is a luxury and a privilege, an
intelligence that learned to pilot a car on the streets and avoid traffic and
take the fastest routes possible! Without machine learning, this wouldn’t be
possible!
MACHINE LEARNING ON SELF-DRIVING CARS
- Tesla uses machine learning under the artificial intelligence with its type,
and there are three types of machine learning, out of those three, Tesla
uses reinforcement learning. Where the AI learns via trial and error or it
learns by itself.
62
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- Most of the time, this method is often observed with strategic games
(chess or checkers), but for driving, it becomes a trial-and-error kind of
program when it successfully navigates the right places and distinguishes
every pinpoint of the map to the real world. Again, the technology is learning
by itself! Exploring by itself!
- On the contrary, Tesla is not just about the self-driving feature that it gives
to people, it also has sensors to prevent theft, the user has a key on their
phone that the Tesla scans for the person to be able to use the Tesla to
themselves. Additionally, when you have a pet with the car and you are
about to do an errand, leaving the pet in the car, Tesla ventilates the car
enough for the pet to breathe. It’s called pet mode!
10. GOOGLE ASSISTANT (G.A.)
- Another application by Google that has the idea of artificial intelligence is
Google Assistant. It can be the Siri of Android. What it does is it can tell you
the time, weather and even the name you have registered!
63
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- It incorporates the idea of artificial intelligence because given that you are
talking to a machine and it is taught how to respond respectively and
accurately; hence, machine learning over again! But this time, it’s
supervised learning!
- Google Assistant’s role is from the word itself, your personal assistant.
You can ask what the weather is tomorrow, schedule your alarms and
appointments, it has so many features that encompasses and alleviates our
problems that are either too much workload or we’re just too lazy. But either
way, it aims to provide efficiency in handling stuff that you cannot.
- Additionally, a feature that is awesome is it can help you search the song
you’re looking for whenever you don’t know the title! Just hum, sing the
lyrics or play an instrument for it to hear and decipher what music you are
finding, or pull out your G.A. whenever you hear the song in public!
- This is an efficient tool whenever you’re outside and hear a catchy song,
pull out google assistant and you can know the song pretty easily, its
efficient! Or if you heard a song and didn’t manage to pull out G.A., well at
least you can still hum or sing some lyrics of the song, as long as G.A.
understands you, it can provide accurate and some inaccurate results of the
song you are finding.
64
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
What is Machine Learning (ML)
- Machine learning (ML) is a sub-field of AI and data science, which is based
on learning algorithms. They can make predictions regarding future
outcomes without having been programmed specifically with that scenario
in advance. Machine learning is the part of AI that helps machines learn and
understand on their own and can be likened similarly to our human brain.
- Machine learning (ML) is a branch of analytics in which machines
continuously improve their ability to recognize patterns as they are trained
with more examples, without having to be programmed to handle each
example or pattern. Based on the sample data that the machine has been
given, it can build models to systematically map and compare new data or
situations with past events and patterns and project outcomes. Sometimes
the outcomes from machine learning falsely appear to have been produced
by intelligent means.
What is Machine Learning (Cont.)
- To introduce machine learning, as we have mentioned before it is a
subpart of artificial intelligence. First, a developer starts it with a website for
example, incorporating it with AI and under it is machine learning that
composes of three parts that can make it an ML, learning retention,
65
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
prediction and improving itself. Machine learning can be defined as the
backbone of AI, although it cannot exist without each other. Without the idea
of ML, it cannot be defined as truly an intelligence that is artificial or we can
say it is not fully developed yet. Other terms for ML could be the algorithm
of a system.
What is Machine Learning (Recommendations)
- Another example of a diagram how machine learning works in the subject
of AI Technology. We’re going to use YouTube as an example.
1) If the user inputs data/searches a video on YouTube of a particular topic,
2) The ML/AI analyzes thoroughly its title, main idea of the video, etc.
3) ML now finds patterns and finds similar videos from the data that has
been inputted.
4) Once it found patterns and similar videos, it will now show up in your
recommendation/home page on YouTube.
66
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
5) And then finally, the ML stores the feedback if the user did watch some
of the videos recommended or not. If not, then it repeats on step 1.
Three types of Machine Learning
- Machine Learning has three main types, supervised, unsupervised and
reinforcement learning.
- In supervised learning, both the input and desired output are provided and
the machine must learn how to map the former to the latter. To accomplish
this, the machine is trained on a statistically representative set of example
inputs and corresponding outputs.
- In unsupervised learning, the machine is not provided with labeled
examples or previous patterns on which to base the analysis of the data
inputs. The machine must uncover patterns and draw inferences by itself,
without having the correct answers. It will classify or cluster data by
discovering the similarity of features on its own.
67
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- In reinforcement learning, it learns through trial and error – from the
consequences of its action and by new choices. As an action is taken, the
success of the outcome is graded and receives either a positive or negative
score. The algorithm seeks to receive positive scores and the model is
trained on continuous feedback.
Diagram of Machine Learning
68
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Supervised Learning
- On the topic of supervised learning, as it has been mentioned before, is
classifying information based on the input of the user. And from the photo
of the robot previously, it can be seen that the user teaches the robot that a
cube is a six-sided square.
- For an example that we all can relate on and are familiar of, is YouTube’s
video classifying recommendations, based on our activity on the said
website. Although it can be seen as a clustering type of machine learning,
but if a robot did categorize video via an idea, how did it know to call it that?
How does it know it’s called “Computer Programming”, “Algebra”, “Sports
Entertainment”?
Unsupervised Learning
- Meanwhile, on the topic of unsupervised learning, the machine is not
provided any information, it learns on its own and classifies things based on
how they look like. The machine must uncover patterns and draw inferences
by itself.
69
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- One example of which is the Completely Automated Public Turing test to
tell Computers and Humans Apart (CAPTCHA). This is a program or system
intended to distinguish human from machine input, typically as a way of
eliminating spam and automated extraction of data from websites.
- For the simple concept, a robot can cluster
these pictures apart, they can group stairs,
roads, buses, cars apart. But the thing is, the
machine does not know what they are, it could
just group it, therefore, the machine is
unsupervised, learning on its own.
Reinforcement Learning
- And then, lastly for the reinforcement learning, where a machine can learn
via the interaction with the user or without the user at all, trial and error type
of learning. Learning without the user has an example of the 9th example
of the AI Technology, self-driving cars.
- A self-driving car for which getting from one location to another without
crashing and navigating successfully the route, distinguishing roads and
70
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
buildings apart would receive a positive score. Hence, a machine’s trial and
error learning. And we know that reinforcement learning is sometimes
referred to as by playing games, the machine can learn, predict and
improve. And one example of which is by online chess. If a player tries to
play against a computer (CPU) in a chess game, there are a lot of difficulty
levels that vary depending on the user’s capabilities, leading to the learning
of both entities on the subject of chess, since AI with ML is again,
programmed to be like humans of this world.
Benefits of Artificial Intelligence
1) CONVENIENCE - As mentioned before, the primary goal and purpose of
technology/AI is to make people’s lives convenient and efficient. Everyday
things that composes of technology makes our life easier, we just don’t
notice it, one example is our phones.
71
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
2) 24/7 AVAILABILITY - There are many studies that show humans are
productive only about 3 to 4 hours in a day. Humans also need breaks and
time offs to balance their work life and personal life. But AI can work
endlessly without breaks. They can even handle tedious repetitive jobs
easily with the help of AI algorithms. We can access these types of materials
at any time in our life whenever we need it.
3) HUMAN ERROR REDUCTION - One of the biggest advantages of
Artificial Intelligence is that it can significantly reduce errors and increase
accuracy and precision. The decisions taken by AI in every step is decided
by information previously gathered and a certain set of algorithms. When
programmed properly, these errors can be reduced to null.
4) DIGITAL ASSISTANCE - Some of the most technologically advanced
companies engage with users using digital assistants, which eliminates the
need for human personnel. Many websites utilize digital assistants to deliver
user-requested content. Some chatbots are built in a way that makes it
difficult to tell whether we are conversing with a human or a chatbot.
5) NEW INVENTIONS - In practically every field, AI is the driving force
behind numerous innovations that will aid humans in resolving the majority
of challenging issues. For instance, recent advances in AI-based
72
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
technologies have allowed doctors to detect breast cancer in a woman at
an earlier stage. Hence, technology nowadays is continuously improving.
Detriments of Artificial Intelligence
1) REDUCED LABOR/UNEMPLOYMENT – Since it was mentioned that
artificial intelligence boosts the community and its accuracy is beyond
perfection, it can replace manpower in establishments and have the risk of
being unemployed, like for example, the Jollibots launched by the Jollibee
Corporation can replace a number of employees in the establishments since
AI is the thing that we rely on most of the times in our lives.
2) INCREASED DEPENDENCY - As mentioned previously, people most of
the times depend on the technology created and emerged nowadays,
leading people to increase their dependency as well as them being lazy and
depreciating their creativity. Ironically, it decreases manpower and
increases laziness at the same time.
3) HIGH COST – Despite the overall emergence and presence of Artificial
Intelligence everywhere we go, these are costly to make and develop with
its full functions and capabilities. Since AI is updating and improving every
day, the hardware and software need to get updated with time to meet the
latest requirements. Machines need repairing and maintenance which need
73
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
plenty of costs. It’ s creation requires huge costs as they are very complex
machines.
4) INACCURACY – Despite the evolution of artificial intelligence today,
there are still some technologies that are still in development, as a result,
some of the queries inquired by the user can sometimes be inaccurate from
what the user intends to find out.
QUIZ
Multiple Choice (25pts): This multiple-choice test is created using the
Bloom’s Taxonomy Multiple Choice Questions.
1. What is the best statement that describes artificial intelligence?
A. It is an evolution of the human species that is created for the sake of the
betterment of our lives.
B. It resembles a human itself and a human-like behavior and intelligence.
C. Artificial Intelligence is mostly robots nowadays.
D. It is a program created that is more proficient at everything it does than
a human being.
2. What is the best example of the medium of information communication
that helps us in communicating with others nowadays?
A. The Internet B. Facebook C. Artificial Intelligence D. News
74
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
3. A person who is non-tech savvy and is currently 55 years old got hired
into a company, but he didn’t know that technology is a big deal and AI is
mostly used here. If the person worked here, what is the possible
consequence that may occur?
A. The person may feel hesitant but still adjusted and found means.
B. The person may feel unfamiliar with the technology and may feel
overwhelmed therefore affecting their work status.
C. The person may discover new AI technology in the company and be a
whiz at technology, being the top-notcher of the company.
D. The person may feel that technology is non-essential to his life therefore,
continuing with his assigned work.
4. If a person worked for a job for almost eight years, yet after those years,
the person got fired, what is the reason for this action?
A. The technology on the company was doing better and more intelligent
than the person fired.
B. The person got tired of the job and decided to find a new one instead.
C. The emergence of Artificial Intelligence replaced the jobs of some
employees.
D. The person's workplace was so toxic that he decided to leave.
75
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
5. What is an example of the emergence of Information Communication
that changed people’s lives nowadays?
A. Traditional driving evolved into a self-driving technology implemented by
Tesla.
B. Improved security on the cyberworld we have today and how people are
secured online.
C. Speech-to-text can now be done without a hectic method in typing a
bunch of materials.
D. Newspaper reading back then evolved to reading news on any device
that we may have.
6. This Artificial Intelligence functions as if it is your personal helper, its
purpose is for you to know what you see with your peripherals, what you
see that you want to know. What AI is mentioned?
A. Google Assistant B. Google Lens C. Google D. Machine Learning
7. It is 11:00pm, the midnight is nigh, Cerise is still struggling with her
homework that is due 12:00 midnight, she encounters a problem that she
cannot solve, she doesn’t know the formula for it either. Therefore, she
reaches for her phone and pulls out an application that brought out the ease
and her problem is now solved and at the same time, she learned
76
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
something! What is not an advantage of the Artificial Intelligence that she
just used and benefited from?
A. Digital Assistance B. Convenience C. New Inventions D. 24/7 Availability
8. Refer to item #7, if Cerise did continue her behavior on using the
application all the time, what disadvantage can you infer from this situation
that Cerise portrays?
A. Technology Inaccuracy B. Reduced Labor
C. Increased Dependency D. Expensive Costs
9. The statement, “Artificial Intelligence imitates human’s intelligence and
behavior”, suggests that?
A. AI is programmed and coded to perform like a human being.
B. AI continues to be like one of the humans on this planet.
C. Humans are Artificial Intelligences in disguise.
D. AI mimes a human being to a convenient extent.
10. Due to the rapid expansion and growth of the country and industry, the
technology continues to expand as well. A lot of artificial intelligence is
prevalent in our lives, with regards to this, which real life example does not
evaluate the data inputted by the user and then return a desired output?
A. An employee who uses facial recognition on her phone to automatically
access the device.
77
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
B. A botanist scanning a plant with Google Lens to know what kind of plant
it is.
C. A student using voice typing on Google Docs for fast-paced typing.
D. A musician using the “search this song” feature on Google Assistant to
know the song that he intends to find.
11. Categorize and differentiate the difference of supervised learning
(SVL) from unsupervised learning (USVL).
A. SVL analyzes and classifies the data provided; USVL uses trial-and-
error on the data provided.
B. SVL’s approach is by trial-and-error; USVL’s approach is by the data
provided by the user.
C. SVL draws inferences itself from the data; USVL classifies out the data
provided.
D. SVL classifies the data provided by the user; USVL learns on its own
based on the data provided.
12. If a toddler is given building blocks to play with, and in some way. the
toddler grouped the blocks by color, what kind of learning does the toddler
depict?
A. Machine Learning B. Reinforcement Learning
C. Unsupervised Learning D. Supervised Learning
78
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
13. Which of the following examples best describes an idea of the jump
from traditional to digital living involving AI?
A. Tez, who uses a wristwatch to tell the time, now looks at the phone for
time.
B. Rhen who sets an alarm clock traditionally has an alarm set on her
phone.
C. IO who takes photos on his camera now pulls out a phone for the idea of
phonetography.
D. Liv who pays via cash on fast food restaurants before, pays via QR Code
scans nowadays.
14. Which statement best describes machine learning (ML)?
A. ML is programmed specifically for the purpose of the efficiency of the
people.
B. ML provides a wide array of learnings that a user can also have and
mimic, therefore making ML a smarter machine than humans.
C. ML is incorporated in various social media websites.
D. ML is a subpart of Artificial Intelligence that intends to project patterns
and predict the future to help people make decisions
79
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
15. If you got the chance to live in the 20th century, you live in the same era
with your parents, where digital technology has not been invented yet, what
handheld artificial intelligence today would be of great help if you
accidentally wander in an obscure place?
A. Digital Maps B. Google Lens
C. Tesla’s Self-Driving Cars D. Google Assistant
16. Let’s say you want to explain machine learning types to a younger
person than you. In Layman’s terms, how can you describe and differentiate
the three types of machine learning? Take note of these abbreviations:
Supervised (SV), Unsupervised (USV), Reinforcement (RE).
A. SV uses clustering/grouping; USV uses classification on the items given;
RE uses gaming trial and error.
B. SV learns by sorting items given; RE clusters every item given to it; USV
is a thumb drive.
C. USV groups all items given to it; RE learns by working things out; SV
categorizes and names items given to it.
D. RE gives names to every item given to it; USV learns by itself; SV
classifies things given to it.
80
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
17. How do E-Commerce websites help the daily living of every civilian on
this planet? How does it relate to AI?
A. E-Commerce websites help people to be frugal and be aware of their
financial status.
B. E-Commerce websites help the efficiency of people’s lives with regards
to the jump from traditional to digital shopping.
C. E-Commerce websites incorporate an eye-opening user interface (UI)
that helps boost the sales of the sellers of the said website.
D. E-Commerce websites bring the best with regards to choices compared
to traditional shopping.
18. All of the following are Artificial Intelligence observed by various
countries, EXCEPT one.
A. A hotel in Singapore that uses robotics in assisting hotel customers in
any designated room.
B. A supermarket in Singapore that uses machines to facilitate and cook
meals for shoppers.
C. Kalbee-un in South Korea that implements a robotic bank account that
assists when you are willing to withdraw.
D. Kura Sushi in Japan, a conveyor belt sushi place that uses digital
systems in tallying plates and accumulating the total fee.
81
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
19. If you are playing Games of the Generals against a friend, what kind of
learning can the both of you portray?
A. Reinforcement Learning B. Machine Learning
C. Supervised Learning D. Unsupervised Learning
20. It was one Sunday evening, it was raining heavily, a mother and her
child were discussing how school was in the previous week; the
conversation was free-flowing until a power interruption interrupted the
conversation of the mother and the child; the child then got scared and the
parent urged the child to sleep. Later on, the power comes back, and the
mother uses her social media account to be up to date of the ongoing
situation, knowing that classes are suspended the next day. What can you
infer from this situation?
A. The mother judged and knew based from the heavy rains that there
would be no classes tomorrow; hence, heading online to confirm that she
was right based on her intuitions.
B. The mother has viewed from the news online that classes are
suspended, necessary for her child and for her personal break also.
C. The mother used the medium of information communication to signify its
importance in certain situations wherein information would be significant.
82
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
D. The mother read the news online and informed other mothers as well
that there would be no classes the next day.
21. In what way does Spotify implement the two types of Machine Learning
(ML)?
A. Spotify tracks your recent listening on the application and then lists it on
its database.
B. Spotify tracks the recent songs you’ve played and clusters it and then
classifies it by name or genre into a specific group, having a Spotify mix
recommended to you.
C. Spotify recommends music that you might like and automatically stores
it on a Spotify Mix for you to enjoy and possibly play.
D. Spotify tracks and records the recent songs that were played and
analyzes it deeply the songs you like and dislike.
22. A 16-year-old student used Google Assistant as his personal assistant
all the time, and he used this for almost four years already. But after
discovering the feature of searching for a song, he had mixed emotions, he
was happy on some of the results and disappointed in some. What is the
possible disadvantage that can be drawn from Artificial Intelligence?
A. Artificial Intelligence can sometimes be inaccurate with the results.
B. Artificial Intelligence didn’t satisfy the desired needs of the student.
C. Artificial Intelligence is not as smart as a human being.
83
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
D. Artificial Intelligence is still in development.
23. You are bored on a Saturday evening and you are finding productive
things to do, so you have decided to play some online chess with an AI
opponent, you won against the AI. How does Machine Learning’s learning,
predicting, and improving retention correlate to the topic of online chess?
A. AI uses reinforcement learning that learns and predicts the movement of
the player and improves itself whenever the AI loses the game, leading for
both entities to learn from experience.
B. AI has the ability to manipulate information and win every single time
regardless of the level of skill the user has.
C. The AI learns like a human and is not perfect but continuously improves
itself based on the overall experience from the game.
D. The AI opponent on chess predicts the user’s movements and counters
it, this is based on what the AI has learned.
24. On December 25, 2048, the fast-food restaurant is filled with a lot of
people, friends, families, colleagues and acquaintances, a Christmas Day
celebration turned the restaurant into a jam-packed establishment,
because of this, a hectic and extensive line prolonged the famished
stomachs of the people, making people hangry. With this in hand, what
solution should the establishment do?
84
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
A. Hire more manpower to split up the jobs that they struggle with, if this
happens, the flow of the establishment can grow as fast and less tedious.
B. Produce a technology that makes the establishment advanced than the
others, attracting more customers and earning more sales.
C. Add additional tills to even up the customers whenever the establishment
is jam-packed.
D. Identify the root cause of the problem and put additional tills and add
kiosks to assist the customers evenly.
25. How does Netflix predict and recommend movies that are within your
preferences or movies that you are likely to watch?
A. Netflix recommends random movies that you might like and prefer as a
part of an exploration on the application, Netflix’s idea is for the user to enjoy
spontaneously by trying new things.
B. Netflix recommends based on the algorithm on what is trending,
regardless if the user likes or dislikes the genre.
C. Netflix incorporates machine learning and regresses the input movie from
the user.
D. Netflix recommends based on the patterns it recognizes from the user
input, analyzes it, and generates movies that are grouped and classified
that the user might prefer
85
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Essay (5pts):” Do you think artificial intelligence will overcome and become
more powerful than humans in the near future?”
References:
https://www.apptus.com/blog/machine-learning-future-of-online-
shopping/#:~:text=AI%3D%20Artificial%20Intelligence&text=We%20may
%20not%20think%20about,smart%20gadgets%20in%20our%20homes
https://itchronicles.com/information-and-communication-technology/the-
importance-of-information-and-communication-technology-ict/
https://www.techopedia.com/definition/190/artificial-intelligence-ai
https://www.suneratech.com/blog/ai-ml-and-how-they-are-applied-to-
facial-recognition-
technology/#:~:text=Facial%20recognition%20is%20one%20of,or%20vide
o%20from%20a%20database
https://youtu.be/tlThdr3O5Qohttps://nexusintegra.io/advantages-
disadvantages-artificial-intelligence/
https://towardsdatascience.com/advantages-and-disadvantages-of-
artificial-intelligence-182a5ef6588c
https://www.guavus.com/clarifying-ai-vs-machine-learning-part-3-series/
Ignacio, Jiro C.
Reporter
86
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
The Rise of Robotics
(Jarquio, Miracle S.)
87
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
The Rise of Robotics
- What comes into your mind when someone asks you "what is robotics or
robots?"
- Robotics is an interdisciplinary sector of computer science, engineering,
and technology associated with designing, developing, and using
mechanical robots that substitute for (or mimic) human actions. Pop culture
has always been interested in robots. For example, consider Optimus
Prime, R2D2, or wall-E. Unfortunately, these are overstated; humanoid
ideas of robots usually seem like a sketch of a real thing. Robots are
becoming advanced and gaining mechanical capabilities that don’t put the
likelihood of a machine like R2-D2 out of reach in the future. As technology
advances, so does the reach of what is considered robotics.
- Back in 2005, almost 90% of robots could be found dismantling cars in
automobile warehouses. These robots included mostly mechanical arms
responsible for welding or screwing on specific car parts. But now we’re
witnessing an evolved and more advanced definition of robotics that
consists of the design, development and use of bots that explore earth’s
roughest conditions, robots that help in almost every aspect of healthcare,
and even robots that assist law enforcement.
88
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- Growing Popularity of Robotics
- Potential to Positively Transform Lives and Work Practices
- Increases Efficiency and Safety
- Usage Games
- Some Real-World use Cases of Robotics
- Automotive Industry
Healthcare
The First Modern Robots
The earliest robots as we know them were created in the early 1950s by
George C. Devol, an inventor from Louisville, Kentucky. He invented and
patented a reprogrammable manipulator called "Unimate," from "Universal
Automation." For the next decade, he attempted to sell his product in the
industry, but did not succeed. In the late 1960s, businessman/engineer
Joseph Engleberger acquired Devol's robot patent and was able to modify
it into an industrial robot and form a company called Unimation to produce
and market the robots. For his efforts and successes, Engleberger is known
in the industry as "the Father of Robotics."
89
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Al-Jazari is not only known as the "father of robotics" he also documented
50 mechanical inventions (along with construction drawings) and is
considered to be the "father of modern day engineering." The inventions he
mentions in his book include the crank mechanism, connecting rod,
programmable automaton, humanoid robot, reciprocating piston engine,
suction pipe, suction pump, double-acting pump, valve, combination lock,
cam, camshaft, segmental gear, the first mechanical clocks driven by water
and weights, and especially the crankshaft, which is considered the most
important mechanical invention in history after the wheel. Not bad for a guy
who lived 800 years ago!
Three types of Robotic Systems
Robotic systems are a way of automating manufacturing applications while
reducing the amount of labor and production costs and time associated with
the process. These systems are used in almost every manufacturing
industry today. While manual labor has dominated in manufacturing for
centuries, it is the robotic system that revolutionized the process.
Manufacturers are now able to produce a superior-quality product in a
reduced amount of time because of robot systems.
90
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Manipulation Robot System - is the most commonly used in the
manufacturing industry. These systems are made up of many of the robot
arms with 4-6 axes and varying degrees of freedom. They can perform
several different functions, including welding, material handling and material
removal applications.
The Mobile Robotic System - is a bit different. This system consists of an
automated platform that moves items from one place to another. While
these robot systems are used heavily in manufacturing for carrying tools
and spare parts, they are also used in the agricultural industry for
transporting products. These can also be used by several different
industries because of their ability to swim and fly, as well as move along the
ground.
Data Acquisition and Control Robotic Systems - are used to gather, process
and transmit data for a variety of signals. They are also used in software for
engineering and business. Many of the mobile robotic systems can use
signals from these systems.
91
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Advantages of Robotics
- In many situations robots can increase productivity, efficiency, quality and
consistency of products.
- Unlike humans, robots don’t get bored.
- Until they wear out, they can do the same thing again and again.
- They can be very accurate – to fractions of an inch (as is needed for
example in manufacturing of microelectronics).
- Robots can work in environments which are unsafe for humans – in the
nuclear or chemical industries for example.
- Robots don’t have the same environmental requirements that humans do,
such as lighting, air conditioning or noise protection.
- Robots have some sensors/actuators which are more capable than
humans.
Disadvantages of Robotics
- The use of robots can create economic problems if they replace human
jobs.
- Robots can only do what they are told to do – they can’t improvise.
92
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- This means that safety procedures are needed to protect humans and
other robots
- Although robots can be superior to humans in some ways, they are less
dexterous than humans, they don’t have such powerful brains, and cannot
compete with a human’s ability to understand what they can see.
- Often robots are very costly – in terms of the initial cost, maintenance, the
need for extra components and the need to be programmed to do the task.
What is RPA?
- Robotic process automation (RPA) is a technology that mimics the way
humans interact with software to perform high-volume, repeatable tasks.
RPA technology creates software programs or bots that can log into
applications, enter data, calculate and complete tasks, and copy data
between applications or workflow as required. When combined with AI and
machine learning, RPA can capture more context from the content it is
working with by reading text or handwriting with optical character
recognition (OCR), extracting entities like names, invoice terms or
addresses using natural language processing (NLP), and capturing more
context from images, such as automatically estimating accident damage in
an insurance claim picture.
93
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- RPA is growing in popularity because it can reduce costs, streamline
processing and drive better customer experiences. Another attraction of
RPA software is that business units can implement it without having to learn
new tools or ask IT teams for support -- and without changing an
organization's underlying IT infrastructure. As RPA has grown in popularity,
however, enterprises are seeing the need to integrate RPA process
automations in their IT systems. While RPA automations can dramatically
speed up a business process previously handled by humans, bots can
break when application interfaces or process workflows change.
How does RPA work?
- RPA mirrors the way people are accustomed to interacting with and
thinking about software applications. RPA's ability to copy the way humans
perform a computer-based process has contributed to its popularity
compared with automation tools such as application programming
interfaces (APIs) or low-code development that are more scalable but less
intuitive or require expert knowledge to use.
- The simplest RPA bots can be created by recording the clicks and
keystrokes as a user interacts with an app. When problems emerge, a user
94
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
can simply watch how the bot is connecting with the app and identify the
steps that need to be fine-tuned.
- In practice, these basic recordings often serve as a template for building
more robust bots that can adapt to changes in screen size, layout or
workflows. More sophisticated RPA tools use machine vision to interpret the
icons and layout on the screen and make adjustments accordingly.
- Some RPA tools are also able to use these initial recordings to create
hybrid RPA bots that start by simply recording an existing workflow and then
dynamically generating workflow automation on the back end. These kinds
of hybrid bots take advantage of the simplicity of RPA development and the
scalability of native workflow automation.
- In other RPA implementations, process mining and task mining tools are
used to automatically capture business process workflows that serve as
starting templates for RPA automations. The process mining can analyze
the logs of ERP and CRM applications, for example, to automatically
generate a map of common enterprise processes. Task mining tools use a
locally running app with machine vision to capture a user's interactions
across multiple apps. All the major RPA vendors are starting to develop
these kinds of process mining integrations.
95
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- RPA tools can also be connected to AI modules that have capabilities like
OCR, machine vision, natural language understanding or decision engines,
resulting in what is called intelligent process automation. These capabilities
are sometimes packaged into cognitive automation modules designed to
support best practices for a particular industry or business process.
- There are a number of challenges related to RPA, which have limited its
use.
- Scalability - Enterprises have struggled to scale RPA automation initiatives
because, although RPA's software bots are relatively easy to implement,
they can be hard to govern and manage and therefore hard to scale.
- Limited abilities - While its name includes the words "process automation,"
many critics have pointed out that RPA software tools automate tasks. More
work is often required to stitch multiple tasks together into a process. Craig
Le Clair, an analyst at Forrester Research, has cautioned enterprises to
observe the "rule of five" in building RPA applications because they tend to
break when a bot must make more than five decisions, manipulate more
than five apps or make more than 500 clicks.
96
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Security - RPA bots sometimes need to access sensitive information to
complete their tasks. If they are compromised, they pose an additional
security risk for firms.
Limited resiliency - RPA failures can occur when applications change in
ways that are not anticipated by developers.
New QA issues - Bots require a variety of new QA practices to ensure they
continue to work as intended.
Privacy - Bots may be involved in working with personally identifiable
information governed by privacy requirements. Teams need to ensure this
data is processed in conformance with local data protection laws such as
GDPR. For example, if an RPA bot moved data outside of a given country
without encryption that would be a violation of Article 44 of GDPR. RPA
vendors are starting to seek ISO 27701 certification as a foundation for
managing sensitive information.
Efficiency - RPA bots manually plod through an application in the same way
a human does. This may not be as efficient as automating applications
through APIs or workflow automations baked into the application itself.
97
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Applications of RPA
Some of the top applications of RPA include the following:
Customer service - RPA helps companies provide better customer service
by automating contact center tasks, including verifying e-signatures,
uploading scanned documents and verifying information for automatic
approvals or rejections.
Accounting Organizations use RPA - for general accounting, operational
accounting, transactional reporting and budgeting.
Financial services - Companies in the financial services industry use RPA
for foreign exchange payments, automating account openings and closings,
managing audit requests and processing insurance claims.
Healthcare - Medical organizations use RPA for handling patient records,
claims, customer support, account management, billing, reporting and
analytics.
Human resources - RPA can automate HR tasks, including onboarding and
offboarding, updating employee information and time sheet submission
processes.
Supply chain - management RPA can be used in supply chain management
for procurement, automating order processing and payments, monitoring
inventory levels and tracking shipments.
98
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Virtual Reality vs Augmented Reality
Augmented Reality and Virtual Reality are important terms in an
increasingly digital world. Although they are two different technologies, both
terms are often used as synonyms. But what are the differences and
similarities between AR and VR?
- Virtual Reality (VR) is the use of computer technology to create a
simulated environment.
- Instead of viewing a screen in front of them, users are immersed and able
to interact with 3D worlds.
99
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- Augmented Reality (AR) is the integration of digital information with the
user’s environment in real time.
Augmented Reality (AR) is an experience where designers enhance parts
of the user’s physical world with computer-generated input.
Difference between AR and VR
- Virtual Reality and Augmented Reality are two sides of the same coin. You
could think of Augmented Reality as a VR with one foot in the real world.
Augmented Reality simulates artificial objects in the real environment,
Virtual Reality creates an artificial environment to inhabit.
- Compared to AR, virtual reality (VR) provides a more immersive
experience by creating a completely artificial environment that replaces
reality. Augmented reality, on the other hand, augments the real-world
experience with virtual elements.
100
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- Since VR provides a more immersive experience than AR, it often requires
special equipment and high-end computers. AR can be accessed with
smartphones or tablets which makes it accessible to a wider audience.
Benefits of AR and VR
1. Providing Training in a Safe and Affordable Manner
2. A better Way of Practicing Skills
3. Developing Soft Skill and Expertise
4. Helping Employees Develop Technical Skills
5. Getting Employees Ready for Emergencies
6. Enhance the Effectiveness of Learning Materials
7. The Best Way for Gamification
Three types of Virtual Reality
- NON-IMMERSIVE SIMULATION- Give users the most realistic experience
possible, complete with sight and sound. The VR headsets provide high-
resolution content with a wide field of view. Whether you’re flying or fighting
the bad guys, you’ll feel like you’re really there.
101
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- SEMI-IMMERSIVE SIMULATION - Provide users with a partially virtual
environment to interact with. This type of VR is mainly used for educational
and training purposes and the experience is made possible with graphical
computing and large projector systems.
- FULLY-IMMERSIVE SIMULATION- Are often forgotten as an actual type
of VR, honestly because it’s very common in our everyday lives. The
average video game is technically considered a non-immersive virtual
reality experience. Think about it, you’re sitting in a physical space,
interacting with a virtual one.
102
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Virtual Reality (VS): Advantages and Disadvantages
- Virtual Reality (VS): Advantages and Disadvantages
Advantages:
- Immersive learning is possible in an interactive environment.
- Users can explore the virtual world in all its facets.
- The education sector benefits from these new possibilities.
Disadvantages:
- A genuine interaction in the virtual environment is not possible.
- It is tempting to transfer one’s life completely to the virtual world.
- Even though training or learning in the VR environment is very beneficial,
it cannot completely replace the real training experience.
103
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Three Basic Characteristics of AR
1. Combination of real and virtual world.
2. Real-time interaction.
3. Accurate 3D registration of real and virtual objects.
Different types of Ars and their differences
- Marker-based AR - applications use target images (markers) to position
objects in a given space. These markers determine where the application
will place the 3D digital content within the user’s field of view. Early-stage
AR technologies were based on markers.
- Markerless AR - allows virtual 3D objects to be positioned in the real image
environment by examining the features present in the data in real time. This
type of guidance relies on the hardware of any smartphone, be it the
camera, GPS or accelerometer, among others, while the augmented reality
software completes the job.
Four Categories of Markerless AR
- Location-based AR- aims at the fusion of 3D virtual objects in the physical
space where the user is located. Clearly, this technology uses the location
104
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
and sensors of a smart device to position the virtual object at the desired
location or point of interest.
- Projection-based AR - This methodology is used for the delivery of digital
data within a stationary context, i.e. project-based AR focuses on rendering
virtual 3D objects within the user’s physical space.
- Overlay AR - Typically, this AR is used to replace the original view of an
object with an updated virtual image of that object for the human eye.
Overlay AR provides multiple views of a target object with the option to
display additional relevant information about that object.
- Contour-based AR - Essentially, this technology, through the use of
special cameras, is used for human eyes to outline specific objects with
lines to facilitate certain situations. For example, it can be used for car
navigation systems to enable safe driving in low visibility situations.
Augmented Reality (AR): Advantages and Disadvantages
Advantages:
- Enables individualized learning and enhances the learning process.
- AR offers a wide range of applications that are continuously being
improved.
105
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- Technology makes it possible to increase accuracy and efficiency.
- Experience or knowledge can be shared over long distances.
Disadvantages:
- The costs of implementing AR are comparatively high.
- Many devices have only a low level of performance.
- A key disadvantage is the lack of user privacy.
- If the focus on security is neglected, the introduction of augmented reality
can lead to a security breach.
5G
- 5G is the 5th generation mobile network. It is a new global wireless
standard after 1G, 2G, 3G, and 4G networks. 5G enables a new kind of
network that is designed to connect virtually everyone and everything
together including machines, objects, and devices.
- 5G wireless technology is meant to deliver higher multi-Gbps peak data
speeds, ultra-low latency, more reliability, massive network capacity,
increased availability, and a more uniform user experience to more users.
Higher performance and improved efficiency empower new user
experiences and connect new industries.
106
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Who invented 5G
- No company or person owns 5G, but there are several companies within
the mobile ecosystem that are contributing to bringing 5G to life. Qualcomm
has played a major role in inventing the many foundational technologies that
drive the industry forward and make up 5G, the next wireless standard.
- 3GPP is driving many essential inventions across all aspects of 5G design,
from the air interface to the service layer. Other 3GPP 5G members range
from infrastructure vendors and component/device manufacturers to mobile
network operators and vertical service providers.
What are the differences between previous generations?
- The previous generations of mobile networks are 1G, 2G, 3G, and 4G.
107
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
First Generation: 1G
1980s: 1G delivered analog voice.
Second Generation: 2G
Early 1990s: 2G introduced digital voice (e.g., CDMA – Code Division
Multiple Access)
Third Generation: 3G
Early 2000s: 3G brought mobile data (e.g., CDMA2000)
Fourth Generation: 4
2010s: 4G LTE ushered in the era of mobile broadband.
- 1G, 2G, 3G, and 4G all led to 5G, which is designed to provide more
connectivity than was ever available before.
- 5G is a unified, more capable air interface. It has been designed with an
extended capacity to enable next-generation user experiences, empower
new deployment models and deliver new services.
- With high speeds, superior reliability and negligible latency, 5G will expand
the mobile ecosystem into new realms. 5G will impact every industry,
108
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
making safer transportation, remote healthcare, precision agriculture,
digitized logistics — and more — a reality.
Where is 5G being used?
5G Consists of two main components:
- RADIO ACCESS NETWORK - Includes Small Cells, Macro Cells, towers
and home systems connecting users and devices to the core network.
Macro Cells use multiple input and output antennas that enable one to send
and receive large volumes of data simultaneously, and Small Cells
complement these macro cells. Meanwhile, the core network of 5G
manages all the internet and data connections.
- CORE NETWORK- Is designed to integrate with the internet much more
efficiently. The core manages the advanced features of 5G, like network
function virtualization and network slicing.
How is 5G better than 4G?
5G is a unified platform that is more capable than 4G.
- While 4G LTE focuses on delivering much faster mobile broadband
services than 3G, 5G is designed to be a unified, more capable platform
that not only elevates mobile broadband experiences, but also supports new
109
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
services such as mission-critical communications and the massive IoT. 5G
can also natively support all spectrum types (licensed, shared, unlicensed)
and bands (low, mid, high), a wide range of deployment models (from
traditional macro-cells to hotspots), and new ways to interconnect (such as
device-to-device and multi-hop mesh).
5G uses spectrum better than 4G
- 5G is also designed to get the most out of every bit of spectrum across a
wide array of available spectrum regulatory paradigms and bands—from
low bands below 1 GHz, to mid bands from 1 GHz to 6 GHz, to high bands
known as millimeter wave (mmWave).
5G is faster than 4G
- 5G can be significantly faster than 4G, delivering up to 20 Gigabits-per-
second (Gbps) peak data rates and 100+ Megabits-per-second (Mbps)
average data rates.
110
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
5G has more capacity than 4G
- 5G is designed to support a 100x increase in traffic capacity and network
efficiency.
5G has lower latency than 4G
- 5G has significantly lower latency to deliver more instantaneous, real-time
access: a 10x decrease in end-to-end latency down to 1ms.
Three Main Types of Connected Services
Enhanced mobile broadband
- In addition to making our smartphones better, 5G mobile technology can
usher in new immersive experiences such as VR and AR with faster, more
uniform data rates, lower latency, and lower cost-per-bit.
Mission-critical communications
- 5G can enable new services that can transform industries with ultra-
reliable, available, low-latency links like remote control of critical
infrastructure, vehicles, and medical procedures.
Massive IoT
5G is meant to seamlessly connect a massive number of embedded
sensors in virtually everything through the ability to scale down in data rates,
111
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
power, and mobility—providing extremely lean and low-cost connectivity
solutions.
Advantage of 5G Technology
- Higher Download Speed - The 5G network will have the capacity to
increase download speeds by up to 20 times (from 200 Mbps (4G) to 10
Gbps (5G)) and decrease latency (response time between devices). These
speeds will maximize the browsing experience by facilitating processes
that, although possible today, still present difficulties.
- Hyperconnectivity - The 5G network promises the possibility of having a
hyper-interconnected environment to reach the point of having the much
desired “smart cities”. The correct performance of these new dynamics will
depend on the bandwidth of 5G and the Internet of Things (IoT).
- Process optimization - It is also expected to revolutionize areas such as
medicine (remote operations, for example), and traffic management and
autonomous vehicles, as well as its implementation in the construction
sector to optimize resources and reduce risks
112
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Disadvantages of 5G Technology
- Immediate Obsolescence - The transition to the 5G network will require
devices that can support it; current 4G devices do not have this capability
and will become immediately obsolete.
- Technological exclusion - The implementation of the 5G network also
implies a lack of immediate accessibility for average pockets, combined with
a delay in its implementation due to a lack of means for its use.
- Insufficient Infrastructure - For the 5G network to function properly will
require a whole ambitious investment in infrastructure to increase
bandwidth and expand coverage, and this is not cheap. This situation will
necessarily lead to delays in its implementation due to the high costs that
governments will have to cover for 5G to function properly
- Risks in security and proper data handling - All of this requires optimal
data management, and this is where the most conflictive part of the
advantages versus disadvantages lies. And the fact is that, in the
management of all this information, both from companies and individuals
and even governments, not only issues such as Big Data techniques are
involved in its study.
113
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
QUIZ
QUESTIONS:
1. He invented and patented a reprogrammable manipulator called
"uminate" from universal automation.
2. He is known as the father of robotics in the industry because of his efforts
and achievements.
3. He led a research team in developing a robot called "Shakey".
4. He is not only known as the father of robotics he has also documented
50 mechanical inventions.
5. It is responsible for welding or screwing on specific car parts.
(6-10 Choose if Advantages Of robotics or Disadvantages of robotics.)
6. This means that safety procedures are needed to protect humans and
other robots.
7. The use of robots can create problems in our economy.
8. Robots have some sensors/ actuators which are more capable than
humans.
9. Robots can only do what they are told to do they can't improvise
10. Unlike humans, robots don't get bored.
11-13. What are the 3 types of Virtual Reality?
114
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
14-17. What are the 4 categories of markerless augmented reality?
18. This type of guidance relies on the hardware of any smartphone, be it
the camera, GPS or accelerometer, among others.
A. Markerless AR B. Contour based AR
C. Marker based AR D. Location based AR
19. In early 1990 this Generation introduced digital voice.
A. Second Generation B. Fourth Generation
C. First Generation D. Fifth Generation
20. 5G manages all the internet and data connection.
A. Macro cell B. Radio Access network
C. Core network D. Small cell
(Essay)10pts.
How does 5G affect the environment?
How can RPA help make your daily work life easier?
References:
https://www.linkedin.com/company/fintelics/?viewAsMember=true.
https://www.fintelics.com/
https://www.robots.com/articles/three-types-of-robotic-systems
115
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
https://www.lib.iastate.edu/news/father-
robotics#:~:text=Al%2DJazari%20is%20not%20only,connecting%20rod%
2C%20programmable%20automaton%2C%20humanoid
https://cs.stanford.edu/people/eroberts/courses/soco/projects/1998-
99/robotics/history.html#:~:text=In%20the%20late%201960s%2C%20busi
nessman,%22the%20Father%20of%20Robotics.%22
https://www.futurelearn.com/info/courses/begin-
robotics/0/steps/2845#:~:text=In%20many%20situations%20robots%20ca
n,example%20in%20manufacturing%20of%20microelectronics
https://www.iberdrola.com/innovation/virtual-
reality#:~:text=Virtual%20Reality%20(VR)%20is%20a,Virtual%20Reality%
20headset%20or%20helmet.
https://www.sciencedirect.com/topics/computer-science/virtual-reality-
technology
https://learn.g2.com/virtual-reality
https://www.techtarget.com/whatis/definition/augmented-reality-
AR?amp=1
https://softtek.eu/en/tech-magazine-en/user-experience-en/what-are-the-
different-types-of-augmented-reality/
116
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
https://www.teamviewer.com/en-us/augmented-reality-ar-vs-virtual-reality-
vr/
https://www.qualcomm.com/5g/what-is-5g
Jarquio, Miracle S.
Reporter
117
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Miniaturized and
Multifunctional
Machines
(Lotoc, Michella A.)
118
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
What are Miniaturized and Multifunctional Machines?
- It is the trend to manufacture ever smaller mechanical, optical and
electronic product and devices.
- Examples include miniaturization of mobile phones, computers and
vehicle engine downsizing.
Examples of Miniaturized and Multifunctional Machine
Mobile Phones
- A mobile phone, cellular phone, cell phone, cellphone, handphone, hand
phone or pocket phone, sometimes shortened to simply mobile, cell, or
just phone, is a portable telephone that can make and receive calls over
a radio frequency link while the user is moving within a telephone service
area. The radio frequency link establishes a connection to the switching
systems of a mobile phone operator, which provides access to the public
switched telephone network (PSTN).
119
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- Mobile phones (or cell phones as they are often called in the USA) have
radically altered the way that people work, socialize, organize, and entertain
themselves.
- Communication
- Photos and videos
- Fashion and self – expression
- Entertainment
- Video real time
- Navigation
- Remote work
- Calculator
- Learning
- News and events updates
- Crime prevention and evidence gathering
Computers
- A computer is a digital electronic machine that can be programmed
to carry out sequences of arithmetic or logical operations computation
automatically. Modern computers can perform generic sets of operations
known as programs. These programs enable computers to perform a wide
120
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
range of tasks. A computer system is a "complete" computer that includes
the hardware, operating system (main software), and peripheral equipment
needed and used for "full" operation. This term may also refer to a group of
computers that are linked and function together, such as a computer
network or computer cluster.
- Miniaturization has inherent advantages such as greater density and thus
shorter signal paths. Smaller electronics therefore enable higher
frequencies and clock rates.
- It’s easier to transport making your work mobile as it can be done
anywhere.
Engine Downsizing
- In the automotive industry, engine downsizing is the practice of utilizing
smaller combustion engines over larger ones of the same power capacity
when manufacturing vehicles. It is the result of car manufacturers
121
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
attempting to provide more efficient vehicles that emit fewer emissions,
often mandated by legislative standards. The term generally relates to
traditional internal combustion engines powered by petrol or diesel.
Benefits of Miniaturized and Multifunctional Machines
- Mobility
- Compact
- Faster data processing because of smaller components
- Cost efficiency materials
QUIZ
1-4. What are miniaturized and multifunctional machines?
5-6. Give 2 examples of miniaturized and multifunctional machines
7-10. Give the benefits of miniaturizing and multifunctional machines?
11-15. For you, what is the importance of miniaturized and multifunctional
machines nowadays?
16-20. Give 1 example of miniaturized and multifunctional machines and
explain why they better than other examples
122
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
References:
https://datapdf.com/the-single-probe-a-miniaturized-multifunctional-device-
for-s.html
Lotoc, Michella A.
Reporter
123
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
ICT Enabled Industry
(Moncada, Justin M.)
124
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
What is ICT?
- ICT Stands for Information and Communication Technology.
- ICT Refers Technologies that provide access to information through
telecommunications.
ICT Industry
- As the computer industry expanded beyond number crunching to data
storage and decision support, the IT industry evolved.
- The ICT industry is a result of that evolution; a convergence between the
IT industry and the telecommunication industry.
Business Process Outsourcing (BPO)
What is Business Process Outsourcing?
- Business process outsourcing (BPO) is a business practice in which an
organization contracts with an external service provider to perform an
essential business function or task.
125
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
What is Outsourcing?
- Outsourcing is an agreement in which one company hires another
company to be responsible for a planned or existing activity that is or could
be done internally, and sometimes involves transferring employees and
assets from one firm to another.
Types of BPO
Front-Office Outsourcing
- This term refers to customer-facing services, including tech support,
customer service, sales, and marketing. These services are frequently
outsourced due to technical knowledge requirements and can be
accomplished off-premises. By outsourcing web development, customer
support lines, or any front office services, businesses can benefit from
specialized talent with unique knowledge and cut costs.
Front-Office Outsourcing Examples
- Customer Service
- Technical Support
- Helpdesk Support
- Marketing
126
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Back-Office Outsourcing
- Back-office business process outsourcing involves contracting services
that are not customer-facing. These services include IT, accounting,
business process automation, human resources, quality assurance, and
more. Subtypes of BPO have emerged, including IT-Enabled Services
(ITES) BPO, such as IT analysts, Legal Process Outsourcing (LPO), such
as paralegals or advisors, and Knowledge Process Outsourcing (KPO),
such as outsourcing an individual who understands and can
implement/manage a specific program. By outsourcing these tasks,
businesses can focus on their core mission rather than engaging in time-
consuming and expensive internal training and onboarding.
Back-Office Outsourcing Examples
- Accounting
- IT Services
- Logistics
- Human Resources
127
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Off-Shore Outsourcing
- Offshoring occurs when services are outsourced overseas. This is
incentivized by available resources, political stability, lower labor costs,
various tax savings, and more. A common example is companies
outsourcing their customer service departments by contracting with call
center vendors across the world. As a result, businesses can access
qualified labor and services at a lower rate, which helps reduce overhead
costs, and potentially lower product or service prices for the end-user.
Off-Shore Outsourcing Examples
- Call Centers
- Help desk
- Accounting Services
Nearshore Outsourcing
- Nearshore business process outsourcing is the act of contracting the
services of vendors in countries that are geographically closer. For
businesses in the US, this could include Canada and Mexico, as well as
Central America. This form of outsourcing usually occurs when specialized
skills are available at a lower cost in a nearby nation, but certain factors,
128
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
such as time zones or language proficiencies, need to be taken into
account. An example of this is when a Silicon Valley company outsources
IT and coding services to specialists in Canada, or when a Canadian
company outsources marketing services from a marketing firm in the U.S.
Onshore/Domestic BPO
- Domestic outsourcing is exactly as it sounds: the act of outsourcing and
receiving services within the boundaries of a country. In other words, a
vendor in one city, state, or province can be contracted for services provided
to business in another city, state, or province. This can be prompted by a
number of factors, such as the availability of specialized skills in certain
regions, or local differences in rates and costs.
129
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
References:
https://oworkers.com/what-are-the-benefits-of-business-process-
outsourcing/
Moncada, Justin M.
Reporter
130
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Intelligence Gathering
& Information Warfare
(Mondoñedo, Redentor C.)
131
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Intelligence Gathering
- Is the process of collecting information, meaning, pronunciation,
translation and examples.
Intelligence Gathering separated into different modes
Open-Source Intelligence (OSINT)
- is the process of gathering intelligence from publicly available resources
(including Internet and others).
Cyber Intelligence (OSINT)
- is the process of explicitly gaining intelligence from available resources on
the Internet.
Human Intelligence (HUMINT)
- is the process of gaining intelligence from humans or individuals by
analyzing behavioral responses through direct interaction.
132
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Imagery Intelligence (IMINT)
- Imagery intelligence includes things like maps and GPS images. It is
extremely useful for helping to understand the surrounding environment of
the property you provide security for like major roads, public transit routes,
parking lots, and public spaces.
What is the purpose of Intelligence Gathering?
- Intelligence gathering simply requires an Internet connection, with little
additional cost incurred by the attacker. intelligence gathering refers to
querying online public resources that provide information specific to the
targeted individuals.
Types of Intelligence Gathering
Competitive Intelligence
- Relies solely on legal and ethical means to gather data, piece it together
to form information, and analyze it to create intelligence for the use of
decision-makers.
133
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Corporate Espionage
- Espionage – the collection, collation, and analysis of illicitly gained
information.
Corporate Espionage – the theft of trade secrets for economic gain.
Information Warfare
- According to NATO - is an operation conducted in order to gain an
information advantage over the opponent.
Information Warfare
- is the manipulation of information trusted by a target without the target's
awareness so that the target will make decisions against their interest but
in the interest of the one conducting information warfare. As a result, it is
not clear when information warfare begins, ends, and how strong or
destructive it is. Information warfare is also known as cyberwarfare,
electronic warfare and cyberattack.
134
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Difference of Information Warfare to Traditional Warfare
- In traditional warfare, the goal is to kill or injure people and destroy
facilities. Contrastingly, in information warfare, the goal is to manipulate
information in some way. Either to try and gain more information, destroy
existing information or change the information that is circulating.
Information Operations
- Is an action taken to affect adversary information and information systems
while defending one’s own information and information systems.
135
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Information Warfare Categories
Offensive - deny, corrupt, destroy, or exploit an adversary’s information,
and influence the adversary’s perception.
Exploitative – exploit available information to enhance the nation’s
decision/action cycle, and disrupt the adversary’s cycle
Defensive – Safeguard the nation and allies from similar actions, also
known as IW hardening.
Information Operation Target
136
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Attacks in Information Warfare
Sources of attack
• Internal
• External
Forms of attack
• Data attack
• Software/Threats Attack
• Physical Attack
Classes of attack
• Passive Attack
• Active Attack
Types of Attacks
Most common type of attacks
- Denial of Service
- Web Defacement
- Theft
- Viruses and Worms
- Bugs
137
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Defense in Information Warfare
- Awareness
- Policies
- Information Assurance
- Military forces
- Intelligence
- Cooperation between government and private sector
Information Warfare Tactics Process
- Covertly probe and document the results.
- Once inside, check for other systems.
- Once inside, find and transmit sensitive information.
- Once inside, set Logic Bombs, Trojan Horses and Trap Doors.
- Erase evidence of intrusion.
- Search for additional systems of the nation-state.
138
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Advantages and Disadvantages of Information Warfare
Advantage:
• Less human casualities
• Less cost
• Information Technology
Disadvantage:
• Trust
• Unexpected result
• Terrorism
• Undeclared War
QUIZ
True or False. (10pts)
1.) Information Warfare is the manipulation of information trusted by a target
without the target's awareness.
2.) Conventional warfare is a war in which nuclear weapons are the main
factor used to force the enemy to surrender.
139
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
3.) In traditional warfare, the goal is to kill or injure people and destroy
facilities.
4.) Bugs are malicious programs that self-replicate on computers via
computer networks.
5.) Theft is a term used to describe a crime that involves taking a person’s
property without his consent.
6.) Viruses and worms Is an attack in which malicious parties penetrate a
website and replace content on the site with their own messages.
7.) Offensive is to safeguard the nation and allies from similar actions
8.) Defensive is to deny or exploit an adversary’s information
9.) Freedom is war can gain independence from a mother country
10.) Destruction of cities is the more damage there is the more it will cost to
fix.
Multiple Choice (5pts)
1. a form of warfare conducted by using battlefield tactics between two or
more states in open confrontation
a. Asymmetric warfare
b. Nuclear Warfare
c. Conventional Warfare
140
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
d. Chemical Warfare
2. The most dangerous weapons on earth. One can destroy a whole city,
potentially killing millions, and jeopardizing the natural environment
a. Nuclear Warfare
b. Chemical warfare
c. Asymmetric warfare
d. Civil warfare
3. A war between citizens of the same country
a. Chemical Warfare
b. Nuclear Warfare
c. Civil Warfare
d. Conventional Warfare
4. Is the process of collecting information, meaning, pronunciation,
translation and examples.
a. HUMINT
b. OSINT
c. Intelligence Gathering
d. Cyber Intelligence
141
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
5. It is extremely useful for helping to understand the surrounding
environment of the property, you provide security for like major roads, public
transit routes, parking lots, and public spaces.
a. Imaginary intelligence
b. Human intelligence
c. Cyber intelligence
d. Open-source Intelligence
Enumeration:
1.) Give the 5 types common Attack? (5pts)
2.) Give 3 Disadvantages of Information Warfare? (3pts)
3.) Give 2 Advantages of Information Warfare? (2pts)
Essay: In your opinion, how does information warfare affect us? (5pts)
References:
https://www.sciencedirect.com/topics/social-sciences/information-warfare
https://www.sciencedirect.com/topics/computer-science/intelligence-
gathering
Mondoñedo, Redentor C.
Reporter
142
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
E-Health and Virtual
Therapy
(Tatlong Hari, Jarred David)
143
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
E-Health
- begins at least in 1999 and is supported by electronic procedures and
communications, which is a relatively new health care practice It does not
only refer to "Internet Medicine", as defined, but also to "almost anything
linked to computers and medicine. locally, regionally and worldwide by
using information and communication technology. E-Health is an emerging
field in the intersection of medical informatics, public health and services,
referring to health services and information delivered or enhanced through
the internet and related technologies.
E-Health Tools
- are technologies that may include electronic medical records (EMRs),
personal health records (PHRs), mobile apps, patient portals, information
repositories, and many other internet-based programs or software used to
help patients monitor and manage their health.
The Coala Heart Monitor and system consists of the following parts:
The Coala Heart Monitor: A small hand-held device that is pressed against
the chest for simultaneous recordings of ECG and heart sounds through
electrodes and a stethoscope membrane.
144
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
The Coala App: Installed on a compatible Smartphone, together with the
Coala Heart Monitor is used to record, store, transmit, and view
measurements directly in your Smartphone. Measurements are transmitted
from the app to the Coala Care Portal server for analysis and the analyzed
result can be viewed within minutes in the Coala App. The app also features
a messaging system where you can receive messages and notifications
from your Healthcare provider.
The Coala Care Portal: The sever that provides detection of cardiac rhythm
deviations, stores all your recorded measurements and manages your
Coala App account.
What are the 10 Es in E-Health
1. Efficiency - increasing in health care efficiency and decreasing its costs.
One of the ways of decreasing cost would be by avoiding duplicative or
unnecessary diagnostic or therapeutic intervention, though enhanced
communication possibilities between health care establishments and
through patient involvement
145
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
2. Enhancing Quality - E-health may enhance the quality of health care for
example by allowing comparisons between different providers, involving
consumers as additional power for quality assurance, and directing patient
streams to the best quality providers.
3. Evidence based - e-health interventions should be evidence-based in a
sense that their effectiveness and efficiency should not be assumed but
proven by rigorous scientific evaluation. Much work still has to be done in
this area.
4. Empowerment - by making the knowledge bases of medicine and
personal electronic records accessible to consumers over the Internet, e-
health opens new avenues for patient-centered medicine, and enables
evidence-based patient choice.
5. Encouragement - of a new relationship between the patient and health
professional, towards a true partnership, where decisions are made in a
shared manner.
6. Education - for both patient and providers to expand knowledge through
research or healthcare information
7. Enabling - promotes information discussion and communication
between health care institutions in a consistent way.
146
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
8. Extension - the scope of health care beyond its conventional boundaries.
This is meant in both a geographical sense as well as in a conceptual sense.
e-health enables consumers to easily obtain health services online from
global providers. These services can range from simple advice to more
complex interventions or products such as pharmaceuticals.
9. Ethics - e-health consist of new forms of patient and physician
communication, poses new challenges
and pressures to ethical issues.
10. Equity - e-health should be accessible regardless of age, gender, race,
and ethnicity etc. E-health could provide services for the rich or poor.
What is Telemedicine
- It is a way of providing health care through electronic devices like cell
phone, laptop, and computers. The internet and the rise of smart devices
gives healthcare capability to provide health care to patients in their home,
workplace or assisted living facilities as an alternative to in-person visits.
Telehealth
- Is a wide phrase that includes health information services, examples of
telehealth are health education services, monitoring vital signs, monitoring
147
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
blood pressure and remote consultations? telehealth allows the healthcare
provider to diagnose and evaluate the patients remotely.
Telecare
- It refers to the technology that keeps the freedom and safety for the
patients while still living at their homes. For example, computers and
cellphones are used as monitoring devices, medical warning systems, and
telecommunication technology.
Telemedicine vs Telehealth
- Telehealth is different from telemedicine because it refers to a wider scope
of remote healthcare services. Telemedicine refers to clinical services while
telehealth refers to non-clinical services. For example, provider training,
administrative meetings and continuing medical education.
Benefits of Telemedicine Services
- Physicians or providers can assist patients without actually meeting them
in person. Telemedicine can offer certain types of therapy like speech and
physical therapy, also, mental health related cases.
148
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
What is Virtual Therapy
- It is a type of telemedicine; it includes any treatment that a person seeks
through technology.
Types of Virtual Therapy
1. Virtual psychotherapy
Sometimes called telepsychology, treats people with mental health issues,
relationship or sexual health problems, or significant stress via video chat,
email, phone, text massaging.
2. Virtual physical therapy
Offers traditional care but in an online or phone-based setting.
Some physical therapy apps offer additional exercises or allow a client to
track their progress between sessions.
3. Virtual speech therapy
It can treat speech disorders, such as stutter, aphasia from a stroke, or
pronunciation difficulties.
4. Virtual occupational therapy
It helps people master specific life skills. For example, a person with speech
issues resulting from a stroke might choose speech therapy, then use
149
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
occupational therapy to help them master the motor skills necessary to use
a speech assistive device.
Benefits of Virtual Therapy
Accessibility - because you can attend counseling or consultation with
your doctor with the use of technology.
Affordability - typically virtual therapy is 80% less expensive than face-to-
face therapy
Convenience – because you can schedule sessions anytime that are the
most convenient for you.
Disadvantages of Virtual Therapy
Privacy issue - Since information is being transmitted online, the situation
makes privacy leaks and hacks more of a concern. Technology problems
can also make it difficult to access treatment when you really need it.
Lack of response to crisis situations - If a client is experiencing suicidal
thoughts or has suffered a personal tragedy, it can be difficult or even
impossible for the therapist to provide direct assistance.
150
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Not appropriate for serious psychiatric illnesses - E-therapy can be
useful for a variety of situations, but not when it comes to people that require
close and direct treatment or in-person intervention.
For example, if you have a serious addiction or have more severe or
complex symptoms of a mental health condition, online therapy may not be
recommended unless other in-person therapies or treatments are also
involved in your plan. The scope of online therapy can be limited, so it may
not be effective for more complex situations.
QUIZ
Test I: True or False
1.) E-health begins at least in the 1950's.
2.) E-health is only defined as "internet medicine".
3.) E-health is a new way of delivering health care.
4.) E-health tools are technologies used to help patients monitor and
manage their health.
5.) Coala App is an example of an E-health tool.
Test II: Give the following
6 - 10. Give 5 out of 10 e's in e-health.
151
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
11 & 12. Difference between telemedicine and telehealth.
13. What is virtual therapy?
14 - 15. Give the types of virtual therapy.
Test III: Essay
16-20 As an I.T student do you think using ICT to deliver health care is
effective? why?
References:
https://www.publichealthnotes.com/what-is-e-health-its-characteristics-
benefits-and-challenges/
https://www.publichealthnotes.com/what-is-e-health-its-characteristics-
benefits-and-challenges/
https://chironhealth.com/telemedicine/what-is-telemedicine/
https://www.medicalnewstoday.com/articles/virtual-therapy
https://www.verywellmind.com/what-is-online-therapy-2795752
Tatlong Hari, Jarred David
Reporter
152
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Mobile Based Service
Industries
(Pabello, Brian Angelo S.)
153
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Mobile Based Service Industries
- The mobile services industry is defined as those companies, which
together enable the provision of telecommunication, information, and
entertainment services including voice, internet, SMS, text, and other data
Service.
Mobile Services Market Current Trends
- Mobile development has become a priority and the new normal for many
businesses. Without mobile-optimized solutions, companies undoubtedly
risk losing a significant number of clients and lagging behind the
competition. In this article, we’ve compiled the main mobile trends now and
for the coming years.
- The increased adoption of mobile devices has led to the remarkable
growth of the mobile app industry.
- Currently, there are about 5.31 billion unique mobile users worldwide,
according to GSMA Intelligence.
In 2021, users downloaded 230 billion applications to their mobile devices,
which is a 63% increase since 2016, according to Statista.
154
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
The revenue of Android and iOS mobile applications reached $133 billion
in 2021, according to BusinessofApps.
Major Industry Players
- Many of the largest mobile services providers have made steps towards
addressing sustainability. but even the leader still has room to grow in this
area. Vodafone, the largest provider in Europe. Africa and the Middle East,
is leading the industry with its integrated sustainability strategy; while China
Mobile has committed to a range of both environmental and social
initiatives. AT&T, the largest provider in the United States.
- Some of the global mobile services industry players are Vodafone, China
Mobile, and AT&T, Reliance communications, MTN group, bsnl, Verizon,
Orange, etc.
- Vodafone is recognized as a sustainability leader in the industry. It ranked
#11 out of all global companies in the 2010 Newsweek Global Green
Rankings. What makes Vodafone stand out from the competition is its
comprehensive sustainability strategy, which is aimed at leveraging mobile
technology to shape a more sustainable society particularly in the
155
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
developing world. Aside from making progress on reducing its carbon
emissions, Vodafone sees opportunity in leveraging sustainability
challenges as a key stimulus for innovation within its business. With its
broad reach in emerging economies in Africa, Asia and the Middle East, the
company is developing services that "enable more efficient and effective
healthcare; access to basic financial services to mobile payment solutions,
and machine-to-machine applications that can bring substantial carbon and
energy cost savings".
- China Mobile is the first mainland Chinese Company to be listed on the
Dow Jones Sustainability Index. The company is committed to triple-
bottom-line principles as well as active stakeholder engagement, as the
company believes that Responsibility Makes Perfection (China Mobile,
2010. 60 percent market penetration rate. It is best known for its excellent
services to underprivileged people living in rural areas. The company has
tirelessly sought to provide excellent information and communication
services to those that would otherwise be at a disadvantage. Farmers are
able to get up-to-date price information on crops and livestock and are able
to buy and sell agricultural products using China Mobile Services
156
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- Historically, AT&T has not been recognized in the industry as a leader in
the sustainability movement. However, over the last few years, they have
made significant company-wide shifts in the prioritization of sustainability
initiatives. Today. AT&T is deeply engaged in environmental sustainability
efforts, and through their commitment, they have developed aggressive
initiatives to help them become more energy efficient and to engage their
key stakeholders in helping the company minimize their environmental
impact.
Local Industry Players
- Globe
- Gomo
- Sun cellular
- TM
- Smart
- TNT
- PLDT
- Converge ICT
157
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- Globe Telecom, Inc., commonly shortened as Globe, is a major provider
of telecommunications services in the Philippines. The company operates
the largest mobile network in the Philippines and one of the largest fixed-
line and broadband networks.
- GOMO is the country’s first fully digital telco owned and operated by
Singapore’s Singtel and is locally powered by Globe. It functions like every
mobile network provider in the country minus its own frequency (because it
is riding on Globe’s network
- Sun Cellular is a wholly-owned subsidiary of DIGITEL, and is one of the
Philippines’ leading mobile telecommunications companies. It was
established by DIGITEL in September 2001 to provide wireless public and
private telecommunications services.
- TM was launched on September 12, 2001 as Touch Mobile, initially
catering to the middle-income market, and has since covered lower-income
groups as well, making it Globe’s value brand offering. The service has
gained popularity for its discounted call and messaging services, with the
“All Network” offers allowing TM subscribers to communicate with users
from other local networks
158
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- Smart Communications Inc., commonly referred to as Smart (and officially
stylized/ self-styled as SMART), is a wholly owned wireless communications
and digital services subsidiary of PLDT Inc., A telecommunications and
digital services provider based in the Philippines.[3] The company has 73
million mobile subscribers as of 2020, under the brands Smart, Sun, and
TNT. Smart’s wireless broadband subscribers number 3.8 million under the
brands Smart Bro and Sun Wireless Broadband.
- TNT (formerly known as Piltel, Mobiline, Phone Pal, and still unofficially
known as Talk ‘N Text) is a cellular service of Smart Communications in the
Philippines.[1] By April 2000, Piltel launched its GSM brand, Talk ‘N Text.
Piltel also reported 16,590,737 subscribers to its GSM brand, Talk ‘N Text,
before its transfer to Smart. Piltel used the 912 area code for its
AMPS/CDMA service. However, it is now used for TNT.
- PLDT, Inc., formerly known as the Philippine Long Distance Telephone
Company, is a Philippine telecommunications, internet and digital service
holdings company. It is one of the country's major telecommunications
providers, along with Globe Telecom and startup Dito Telecommunity
159
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- Converge ICT is the fastest growing fiber internet and other digital
consumer-centric services provider in the country today. The premium
products and services we offer run through the first pure end-to-end fiber
internet network in the country.
Impacts of Mobile Technology on Service Based
Businesses
- We live in an era where we can get the information we need at the tap of
a button, but this is not reflected in many service-based businesses in the
UK. Whether it’s due to resistance or being too busy to change, there may
never seem like an appropriate time for these companies to change to a
digital process. But for the businesses that have adapted to a digital
environment, they have been heavily impacted by a range of factors.
5 Key Impacts of Mobile Technology on Service Based
Businesses
1. Faster Business Growth - Looking back 10 years and the cost of
starting a new business was significantly higher than it is today. Cloud-
based technology and the use of mobile devices have resulted in a cost-
effective way to start and scale a business. Mobile technology has provided
160
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
workers with the option of working remotely. Without the need to work from
a base you can place a worker somewhere else in the world while they still
have access to the IT network, staying connected to the business and
appealing to a wider audience.
2. Worker Satisfaction & Safety - Technology has introduced flexible
working; working at any time from any location. As a result, it increases
worker satisfaction. Furthermore, with mobile technology keeping all parties
better connected there is an increased vision of where workers are and what
jobs they have completed, leading to more accurate appraisals. As workers
can now operate on a mobile device, managers can ensure they have all
the correct health and safety protocol send and stored on the device, by
instant messenger, email or job management software. Any paper
documentation can be replaces ensuring the worker can't lose it, as it is
easily retrievable on the device.
3. Better Communication - Since businesses have adopted digital ways
of working, communication has vastly improved amongst the workforce –
even if they are working remotely. Mobile services such as Slack and
WhatsApp allow for instantaneous messages to be sent, enabling tighter
communication channels.
161
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
With instant communication channels amongst the workforce, any job
details can be gathered and customers can be informed in minutes, rather
than waiting for workers to return to the office. This provides a better service
for customers, heightening the chance of customer retention. Workers can
now access all of their job information on a device, and with the use of digital
forms job data can be captured and transferred immediately back to the
office.
4. Time and Money Savings - One of the most valuable things in life is our
time. Mobile technology reduces hours of wasted time as the connectivity
streamlines various processes e.g., apps can now replace physical forms,
whilst filing, scanning and administration processes are able to be reduced
or removed. With technology removing many onerous processes, it creates
more free time which can be reinvested back into the business to focus on
growth and development. With the option to take payment on devices and
complete all aspects of a job through the use of mobile technology, workers
don't need much interference from the office or have to waste time driving
around to collect and drop off job data.
5. Removing Paper - Even now, most UK businesses still rely on paper or
spreadsheets to record and store job information. With an increasing
number of apps aimed at removing the paper trail and providing mobile
workers with the right tools to operate when they are out and about, service
162
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
businesses can operate more efficiently. Mobile workers no longer have to
deal with paper or have to deliver job sheets back to the office. Cloud-based
technology enables businesses of all sizes to transfer documents and files
from any location.
QUIZ
1-5. Give 5 Local Industry Players
6-10. Give 5 Key Impacts that Mobile Technology has on Service Based
Businesses
11-15. What is the Definition of Major Industry Players?
16-20. Choose 1 of 5 Key Impacts that Mobile Technology has on Service
Based Businesses and explain how it impacts on businesses and on
yourself.
21-30. Explain the impact of Mobile Based Service Industries in your life
and cite scenarios if Mobile Based Service Industries does not exist. (At
least 5 sentences.
References:
https://www.slideshare.net/kellyhautjames/james-kelly-mobile-industry-
researchf
https://www.slideshare.net/kellyhautjames/mobile-services-industry
163
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
https://en.m.wikipedia.org/wiki/TM_(cellular_service)#:~:text=TM%20(form
erly%20known%20as%20Islacom,Filipino%20telecommunications%20co
mpany%20Globe%20Telecom.
https://www.mymobileworkers.com/blog/impacts-of-mobile-technology-on-
service-based-businesses
https://www.trade.gov/market-intelligence/philippine-telecommunications-
market
https://www.definitions.net/definition/PLDT
https://corporate.convergeict.com/
Pabello, Brian Angelo S.
Reporter
164
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
E-Service &
E-Government
(Pabello, Gian Carlo S.)
165
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
What is E-Government?
- Digital government services (also called e-government) are defined as
service delivery within government — as well as between government and
the public — using information and communication technologies.
- Traditionally, government services have been delivered in person, by
individual departments in different locations, and often using paper forms.
With digital services, the government can deliver information and services
to citizens anytime, anywhere, and on any platform or device.
Disadvantages of E-Government?
- The main disadvantages concerning e-government are that there exists a
digital divide and digital inequalities that bar certain people from accessing
the full benefits of digitization.
- Often does not offer the “potential to reach many users including those
who live in remote areas.
- Have low literacy levels
- Existence on poverty line incomes.
- Homeless people.
- People in poverty.
166
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Benefits of Digital Government Services
- Reduces inequality.
- Increased public participation.
- Improved internal efficiency and productivity.
- Reduced labor costs.
- Better collaboration among departments.
- More innovation.
- E-governance raises the transparency, accountability, efficiency, and
effectiveness and inclusiveness in the governing process in terms of reliable
access to the information.
4 Types of E-Government
- Government-to-Citizen (G2C).
- Government-to-Business (G2B).
- Government-to-Employee (G2E).
- Government-to-Government (G2G).
167
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Government to Citizens (G2C)
- As people are the key concept of politics and government as well as
governance, the government is compelled to connect with citizens through
the transparent and accountable order.
- Approaches such as setting up websites where citizens can download
forms, government information, etc.
Examples of G2C
- Registration of motor vehicles.
- Issue of driving licenses.
- Availability of the e-learning modules to the citizens.
- Linking of various hospitals in different parts of the country to ensure better
medical services to citizens.
168
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- Online job portal and various customer services.
- Payment of utility bills.
Government to Business (G2B)
- Is a relationship between businesses and government, where government
agencies of various levels provide services or information to a business
entity via government portals or with the help of other IT solutions.
- The essentials for achievement of G2B services for secure and authentic
transactions include: Standards for electronic transactions, a secure
payment mechanism and public key infrastructure.
Examples of G2B
- E-taxation
- Getting a license from the government etc.
- Secure Electronic Transactions.
- Electronic auctions.
- Electronic procurement marketplaces.
- Sending electronic payments.
169
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Government to Employees (G2E)
- Is a relationship between businesses and government, where government
agencies of various levels provide services or information to a business
entity via government portals or with the help of other IT solutions.
Examples of G2E
- E-learning methods.
- Sending electronic payments.
- Payment of utility bills.
- Online job portal and various customer services.
Government to Government (G2G)
- G2G has been referring to raising the quality of the government process
by cost cutting, managing performance, and making strategic connections
within government.
- It enables government institutions to be more efficient and more effective
by the use of IT tools.
170
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Examples of G2G
- Live fingerprints scanning.
- Verification.
- Electronic entry of reports and paperwork etc.
High Level of Trust in Government
- Citizens have better understanding through E-government that gives
transparency on reliable access to the information.
- It reduces inequality.
- Increased public participation.
QUIZ
Multiple-Choice (2 points each):
1. Digital government services (also called e-government) are defined as?
A. delivery within government as well as between government and the
public
B. Information communication technology
C. E-Services
D. E-Government
171
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
2. Traditionally, government services have been delivered in person by?
A. Individual departments
B. Robots
C. E-Government
D. Police
3. E-governance raises the?
A. Transparency, accountability, efficiency.
B. E-Government
C. Technology
D. E-services
4. Give one of the 4 types of e government
A. Government to citizens
B. Government to individual
C. Government to information
D. Government to accountability
5. Approaches such as?
A. Setting up websites
B. E-Government
C. Technology
D. Government to citizens
172
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
6. Choose one example of G2C
A. Registration of motor vehicles
B. Government
C. E services
D. Technology
7. Meaning of Government to Business
A. Is a relationship between businesses and government.
B. Agencies
C. Government portals
D. Payment mechanism
8. Choose one example of G2B
A. Sending electronic payments.
B. E-Government
C. Payment mechanism
D. Technology
9. Is the online interactions through instantaneous communication tools
A. Government to employees
B. Government to Business
C. Government to government
D. Government to citizens
173
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
10. Choose one example of G2E
A. E-learning methods.
B. E-Government
C. Technology
D. Government to citizens
11-14. (if the answer is correct 11-14 would be 5 points).
Give one of the three impacts of high-level trust in government.
Essay: (5 points)
For you what are the benefits of E-Government?
References:
https://granicus.com/dictionary/digital-government-
services/#:~:text=Digital%20government%20services%20(also%20called,
applying%20for%20a%20pet%20license.
https://e-governnsc.weebly.com/types.html
https://www.researchgate.net/figure/Types-of-e-
government_fig1_307892702
https://en.m.wikipedia.org/wiki/E-government
174
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
https://schoolofpoliticalscience.com/what-is-e-governance/
https://www.google.com/amp/s/snov.io/glossary/g2b/amp/
Pabello, Gian Carlo S.
Reporter
175
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Internet Censorship
(Ragodon, Roan Angel R. &
Raro, Justin C.)
176
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Internet Censorship
- The Internet is the foremost important tool and the prominent resource that
is being used by almost every person across the globe. It connects millions
of computers, webpages, websites, and servers. Using the internet we can
send emails, photos, videos, and messages to our loved ones. Or in other
words, the internet is a widespread interconnected network of computers
and electronics devices (that support the internet). It creates a
communication medium to share and get information online. If your device
is connected to the Internet then only you will be able to access all the
applications, websites, social media apps, and many more services. It is
managed by organizations that develop global protocols, such as Internet
Assigned Numbers Authority (or IANA).
Advantages of Internet
- Online Banking and Transaction
- Education, online jobs, freelancing
- Entertainment
- New job roles
- Best Communication medium
- Comfort to human
177
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- GPS tracking and google maps
Disadvantages of Internet
- Time wastage
- Bad impact on health
- Cyber Crimes
- Effects on children
- Bullying and Spreading negativity
The Internet Assigned Numbers Authority (IANA)
- The Internet Assigned Numbers Authority (IANA) is a standards
organization that oversees global IP address allocation, autonomous
system number allocation, root zone management in the Domain Name
System (DNS), media types, and other Internet Protocol-related symbols
and Internet numbers. Although the phrases internet and world wide web
are sometimes used interchangeably, they are not synonymous; the
internet refers to the worldwide communication system, comprising
hardware and infrastructure, whereas the web is one of the services
provided through the internet.
178
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
The Origin of Internet
- The internet came in the year 1960 with the creation of the first working
model called ARPANET (Advanced Research Projects Agency). It allowed
multiple computers to work on a single network, which was their biggest
achievement at that time. ARPANET uses packet switching to communicate
with multiple computer systems under a single network. In October 1969,
using ARPANET, the first message was transferred from one computer to
another. After that technology continues to grow.
Since then, the internet has developed and evolved to provide for service
such as:
1.) Email - Electronic mail, commonly shortened to “email,” is a
communication method that uses electronic devices to deliver messages
across computer networks. "Email" refers to both the delivery system and
individual messages that are sent and received.
2.) Web-enabled audio / Video conferencing services - Video
conferencing is a live, visual connection between two or more remote
parties over the internet that simulates a face-to-face meeting. Video
179
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Conferencing is important because it joins people who would not normally
be able to form a face-to-face connection.
3.) Online movies and gaming - An online game is a video game that is
played partially or entirely over the internet or any other available computer
network. Online games are widely available on modern gaming platforms,
such as PCs, consoles and mobile devices and include first-person
shooters, strategy games, and massively multiplayer online role-playing
games (MMORPG).
4.) Data transfer / File sharing, often through File Transfer Protocol
(FTP) - FTP (File transfer Protocol) is a network protocol that allows you to
send files between computers using TCP / IP (Transmission Control
Protocol / Internet Protocol). FTP is classified as an application layer
protocol in the TCP / IP series.
5.) Instant Messaging - Technology is a type of online chat allowing real-
time text transmission over the Internet or another computer network.
Messages are typically transmitted between two or more parties, when each
user inputs text and triggers a transmission to the recipient(s), who are all
connected on a common network.
6.) Internet Forms - An internet forum, often known as a message board,
is a website where users may have online discussions in the form of posted
180
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
messages. Unlike chat rooms, messages are frequently longer than one
line of text and are at least briefly stored.
7.) Social Networking - is the use of internet-based social media platforms
to get and stay connected with friends, family, or peers.
8.) Online Shopping - is searching for and purchasing goods and services
over the Internet through the use of a web browser. The main allure of online
shopping is that consumers can find and purchase items they need (which
are then shipped to their front door) without ever leaving the house.
9.) Financial Services - Financial services is a broad range of more specific
activities such as banking, investing, and insurance. Financial services are
limited to the activity of financial services firms and their professionals, while
financial products are the actual goods, accounts, or investments they
provide.
What is Censorship?
- Censorship, the suppression of words, images, or ideas that are
"offensive," happens whenever some people succeed in imposing their
personal political or moral values on others. Censorship can be carried out
by the government as well as private pressure groups. Censorship by the
government is unconstitutional.
181
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- Censorship, they control of the information and ideas circulated within a
society has been a hallmark of dictatorships throughout history. In the 20th
Century, censorship was achieved through the examination of books, plays,
films, television and radio programs, news reports, and other forms of
communication for the purpose of altering or suppressing ideas found to be
objectionable or offensive. The rationales for censorship have varied, with
some censors targeting material deemed to be indecent or obscene;
heretical or blasphemous; or seditious or treasonous. Thus, ideas have
been suppressed under the guise of protecting three basic social
institutions: the family, the church, and the state.
The 6 Content Types Every Manufacturing Website Must
Have
1.) Videos - According to a 2016 study by the Content Marketing Institute
on B2B Manufacturing Content Marketing, video is the most effective
content tactic employed by manufacturers—89% of B2B manufacturing
marketers use video and 70% say videos have yielded good results. There
are several ways to use video on your site. A video of your machines in
operation on your shop floor can substitute for an in-person tour, which
182
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
might not be practical for potential customers. You can also use video to
show how your machines work, the quality of your work environment, your
safety and quality practices, and to introduce your team and company.
2.) Case Studies - Case studies are one of the best ways to show potential
customers how your solutions can work for them. Use your case studies to
focus on telling your success stories rather than on selling your services,
and divide each case study into the problem your customer needed to solve,
the solution you provided, and the benefit that resulted. Create an online
library of case studies organized by industry or application to enable
potential customers to easily find the case studies most relevant to them.
3.) Product Photo Galleries - Convince prospects that you can
manufacture a part for them by showing similar products you’ve made for
other customers. Invest in good photography and create a well-organized
photo gallery showing the types of parts you can manufacture.
4.) Testimonials - Let your satisfied customers help you get new ones.
Make asking for a quick quote or comment part of your final transaction with
customers. Ask for specifics about anything that stands out—your
capabilities, speed, price, innovation, product quality, creative solutions,
etc.
183
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
5.) Resources and Supporting Documents - Your website is the perfect
place to house all those print documents you used to mail to customers:
Spec sheets, brochures, mechanical drawings, parts lists, instructional
guides, etc. Create a library of downloadable PDFs so site visitors can
quickly get the information they need.
6.) Thought Leadership- Your website has huge potential for establishing
your credibility and educating site visitors. Showcase your expertise with
blog posts about industry trends or customer concerns, whitepapers about
innovative processes or solutions, or articles on other websites.
Censorship vs Regulation
- Censorship, or the suppression of "offensive" words, images, or ideas,
occurs whenever some people succeed in imposing their personal political
or moral values on others. Censorship can be implemented by both the
government and private pressure groups. Government censorship is
unconstitutional.
Methods of Censorship
- General censorship occurs in a variety of different media, including
speech, books, music, films, and other arts, the press, radio, television, and
184
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
the Internet for a variety of claimed reasons including national security, to
control obscenity, pornography, and hate speech, to protect children or
other vulnerable. Government and private organizations may engage in
censorship. Other groups or institutions may propose and petition for
censorship. The government censors books, social media restrictions,
corporate network blocking, and sites that promote criminal activity to a
large audience in order to restrict something they deem unfit or offensive.
Words, images, or ideas are typically censored, usually by a person or
group attempting to impose their moral, political, or personal beliefs on
others.
Regulation
- In a second form of use, censorship refers to any form of government
regulations that restrict or disable speech. Fines imposed by the Federal
Communications Commission (FCC) for "indecent" speech on radio fit this
use, as the intent is to deter further indecency. In a third, less conventional
usage, the term is modified to refer to nongovernmental restrictions on
speech. Regulations governing the latter are governed by a "no censorship"
clause, whereby the FCC deprives stations of editorial rights over political
advertisements. Although most of these regulations are aimed to increase
185
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
viewpoint diversity, broadcasters often argue that FCC rules infringe upon
their rights to free speech.
The Regulation of Expression and Censorship
- The legitimacy of the regulatory structures and actions that govern
expression and communication, as well as the extent to which these
structures meet the requirements of democratic societies, are central to
modern discussions of censorship. In this entry, we will first look at some
prominent historical examples of centralized censorship systems in the
Western world. This history sets the stage for a discussion of modern
conceptions of censorship and issues surrounding the term itself. The
discussion then shifts to the legal structures that govern speech and the
press in the United States, government control of political speech, and some
contemporary debates about expression regulation.
Early Government Censorship System
- It should be instructive to consider how the problem of censorship has
been addressed in the ancient, premodern, and modern worlds. It is
important not to assume that the modern democratic regime of self-
government is the only legitimate regime. Rather, it is prudent to assume
186
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
that most of those who have thought about and acted on such issues in
other times and places have been at least as humane and as sensible in
their circumstances as modern democrats are likely to be in theirs.
Censorship has traditionally been associated with rigid systems of
ecclesiastical and governmental control over discourse and printing. The
term derives from the census office in early Rome, where the censor served
as both census taker and supervisor of public behavior and morals. Prior to
the invention of the printing press in the fifteenth century, the majority of
manuscripts in Europe were produced in monasteries, which had complete
control over their production. Centralized book control systems arose
largely in response to the invention of the printing press, which both the
church and the state saw as a threat to their authority.
QUIZ
1. It is the foremost important tool and the prominent resource that is being
used by almost every person across the globe.
A. Censorship B. Internet
C. Internet Assigned Numbers Authority D. Internet Form
2. It is a standards organization that oversees global IP address allocation,
autonomous system number allocation, root zone management in the
187
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Domain Name System (DNS), media types, and other Internet Protocol-
related symbols and Internet numbers.
A. Censorship B. Internet
C. Internet Assigned Numbers Authority D. Internet Form
3. It is a communication method that uses electronic devices to deliver
messages across computer networks.
A. Email B. Internet Form
C. Instant Messaging D. Online Movies and Gaming
4. Control of the information and ideas circulated within a society has been
a hallmark of dictatorships throughout history.
A. Internet B. Email
C. Internet Assigned Numbers Authority D. Censorship
5. Known as a message board, is a website where users may have online
discussions in the form of posted messages.
A. Instant messaging B. Internet Form
C. Social Network D. Video Conference
6. What year did the internet come?
7-8. Give 2 advantages of the internet?
9-10. Give 2 disadvantages of the internet?
Essay
11-15. For you, what is censorship? (3-5 sentences)
188
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
References:
https://en.wikipedia.org/wiki/Internet_censorship
https://humanrights.gov.au/our-work/5-current-issues-internet-censorship-
bullying-discrimination-harassment-and-freedom
https://www.security.org/vpn/internet-censorship/
https://www.aclu.org/other/what-censorship
https://www.ipxo.com/blog/what-is-iana/
https://www.websolutions.com/blog/the-6-types-of-content-every-
manufacturing-website-must-have/
https://en.wikipedia.org/wiki/Censorship#:~:text=Censorship%20is%20the
%20suppression%20of,institutions%20and%20other%20controlling%20bo
dies.
https://www.encyclopedia.com/social-sciences/encyclopedias-almanacs-
transcripts-and-maps/censorship-and-regulation-expression
https://study.com/learn/lesson/censorship-history-types-examples-what-is-
censorship.html
Ragodon, Roan Angel R. Raro, Justin C.
Reporter Reporter
189
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Sex and Technology
(Valera, Mark Joselito S.)
190
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Pornography
- Is a representation of sexual behavior in books, pictures, statues, films,
and other media that is intended to cause sexual excitement. The distinction
between pornography (illicit and condemned material) and erotica (which is
broadly tolerated) is largely subjective and reflects changing community
standards. The word pornography, derived from the Greek porni
(“prostitute”) and graphein (“to write”), was originally defined as any work of
art or literature depicting the life of prostitutes.
Kinds of Pornography
- The first type of pornography is adult magazines. These magazines are
primarily directed toward an adult male audience. The magazines that have
the widest distribution (like Playboy and Penthouse) do not violate the
Supreme Court's standard of obscenity and thus can be legally distributed.
But other magazines that do violate these standards are still readily
available in many adult bookstores.
- The second type of pornography is video cassettes. These are rented or
sold in most adult bookstores and have become a growth industry for
pornography. People who would not go into an adult bookstore or theater
to watch a pornographic movie will obtain these video cassettes through
191
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
bookstores or the mail and watch them in the privacy of their homes.
Usually, these videos display a high degree of hard-core pornography and
illegal acts.
- The third type of pornography is motion pictures. Ratings standards are
being relaxed and many pornographic movies are being distributed and
shown carrying R-18 ratings.
- The fourth type of pornography is television. As in motion pictures,
standards for commercial television have been continuously lowered. But
an even greater threat is on cable television. Thus, many pornographic
movies are shown on cable television. Like video cassettes, cable TV
provides the average person access to pornographic material.
- The fifth type of pornography is audio porn. This includes "Dial-a- Porn"
telephone calls, which are the second fastest growth market of pornography
Pornography in History
- Because the very definition of pornography is subjective, a history of
pornography is nearly impossible to conceive; imagery that might be
considered erotic or even religious in one society may be condemned as
pornographic in another. Thus, European travelers to India in the 19th
century were appalled by what they considered pornographic
192
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
representations of sexual contact and intercourse on Hindu temples such
as those of Khajuraho.
- In Ancient Greece and Rome, for instance, phallic imagery and
depictions of orgiastic scenes were widely present, though it is unlikely that
they fulfilled anything like the social or psychological functions of modern
pornography (see phallicism). A modern use seems more likely in some of
the celebrated erotic manuals, such as the Roman poet Ovid’s Ars amatoria
(Art of Love), a treatise on the art of seduction, intrigue, and sensual
arousal.
- The Insistent Lover - Japan possessed a very highly developed culture
of visual erotica, materials. Elaborate depictions of sexual intercourse—
pictures notionally designed to provide sex education for medical
professionals, courtesans, and married couples—are present from at least
the 17th century. Makura-e (pillow pictures) were intended for entertainment
as well as for the instruction of married couples. This interest in very frank
erotica reached its height during the Tokugawa period (1603–1867).
- In Europe too, new technologies (above all, the printing press) promoted
the creation of pornographic works, which frequently contained elements of
humour and romance and were written to entertain as well as to arouse.
193
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- The modern history of Western pornography begins with the
Enlightenment (18th century), when printing technology had advanced
enough to permit the production of written and visual materials to appeal to
audiences of all socioeconomic levels and sexual tastes. At about this time,
erotic graphic art began to be widely produced in Paris, eventually coming
to be known in the Anglophone world as “French postcards.”
- Apart from its sexual element, pornography became a powerful vehicle
for social and political protest. It provided a vehicle for the exploration of
daring ideas that were condemned by both church and state, including
sexual freedom for women as well as for men and the practices of
contraception and abortion. Much pornography also focused on the
misdeeds of royals and aristocrats, thereby contributing to the discrediting
of the elites of Europe.
- By the time that Queen Victoria came to the throne in Great Britain in
1837, there were more than 50 pornographic shops on Holywell Street
(known as “Booksellers’ Row”) in London. Pornography continued to
flourish during the Victorian Age in Britain and in the United States in the
19th century the inventions of photography and later of motion pictures were
quickly put to use in the production of pornography. Pornographic films were
widely available no later than the 1920s, and in the 1960s their popularity
194
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
enjoyed a massive upsurge. The development of videocassettes in the
1980s and digital videodiscs (DVDs) in the 1990s enabled the wide
distribution of pornographic films and further encouraged their use because
they could be viewed in private. Pornographic images and films became
even more widely available with the emergence of the Internet in the 1990s.
The pornographic industry became one of the most profitable on the
Internet. The use of webcams opened the industry even further to amateurs,
allowing individuals to post live depictions of themselves, often for fees. The
Internet also increased the availability of child pornography.
- Erotica, literary or artistic works having an erotic theme; especially, books
treating of sexual love in a sensuous or voluptuous manner. The word
erotica typically applies to works in which the sexual element is regarded as
part of the larger aesthetic aspect. It is usually distinguished from
pornography, which can also have literary merit but which is usually
understood to have sexual arousal as its main purpose.
- There are erotic elements in literary works of all times and from all
countries. Among the best-known examples of erotic literature are the
Kama-sutra by Vatsyayana in India during 400 BCE-200 and other Sanskrit
literature from about the 5th century AD, Persian lyric poems called ghazals,
Ovid’s Ars Amatoria, the 16th-century Chinese novel Chin p’ing, William
Shakespeare’s Venus and Adonis, the writings of the Marquis de Sade, and
195
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
D.H. Lawrence’There are erotic elements in literary works of all times and
from all countries.
Loss about Child Pornography
- While the sexual exploitation was occurring, children complained of urinary
infection, genital soreness, headaches, appetite loss, and sleeping
difficulties. Changes in school behavior, declining grades, and acting-out
behaviors were observed. All children showed major stress symptoms
immediately after disclosure of the abuse. Children were classified as either
internal or external reactors. Two years after disclosure, four patterns of
response to stress were observed: integration of the event, avoidance of
the event, recurrent symptoms, and identification with the exploiter. Parents
reacted with various defense mechanisms. They rationalized, avoided
hearing the facts, minimized the severity of the exploitation, and withheld
information from their spouses.
- When abuse in the home is prevalent, it causes suffering to young people
to get out of the house to escape abusive parents and family. Leaving home
and family also means leaving school and becoming vulnerable to abuse —
physical, emotional and sexual. The lack of supervision and instability
brings on involvement in substance abuse in whatever form — alcohol,
196
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
drugs. Worse, vulnerability comes when children have mental problems or
learning disabilities or if they have physical disabilities. Community is very
important to a child growing up. If it is a violent one, or one with criminal
elements, they can take advantage or cause disadvantage to a child.
- Even worse is the modern means of abuse through online use, particularly
for sexual abuse and trafficking through illegal recruitment. This has
resulted in the Philippines coming out on top in online child pornography,
sexual abuse, and trafficking of women and children in the world. In 2020,
it was estimated that there were 2 million online child abuse and exploitation
cases from the Philippines. During the pandemic, it is said to have increased
by 265 percent. This is unacceptable.
- Poverty is one factor though not the only factor to which we have to add
values and attitudes. Children in Philippine society as a whole are treated
as property, chattels really. They are expected to help the family in whatever
way the family decides. Thus, you have children out of school working on
the streets, in their families' livelihood activities or need for services, making
them forgo their right to education, health care and a good home
environment. There is a materialistic element present here where the family
demands that the children help it instead of the family helping the children
they bring into the world because the family wants a higher standard of
living, whatever the cost to the children. Some families which use their
197
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
children for online pornography or sex think that because it is online and not
physical, it is not wrong. This could also be a rationalization. When abused
children rebel or escape, they continue with the activity, particularly sexual
activity, because that is where they can manage to get their own income to
use as they please. They know nothing else from the neglect of education
and care. Schooling, higher ambitions, family life itself are thus abandoned
and society ends up with a major problem of feral children engaging in
lawless and criminal activity.
Federal Child Pornography Charges
- A conviction for a federal child pornography offense can carry a substantial
amount of prison time. A person who is convicted of knowingly possessing
child pornography can be sentenced up to 10 years in prison or up to 20
years in prison if the minor is under the age of twelve.
- A person who is convicted of distributing or receiving child pornography
faces a 5-to-20-year prison sentence. There are also fines and payments
that are often required to any identifiable victim of the offense. Not to
mention, being convicted of a child pornography offense in federal court will
require registration as a sex offender. The penalties for sexual exploitation
198
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
under federal law are incredibly severe. The mandatory minimum sentence
is 15 years and the maximum is 30 years.
Defenses in Child Pornography Charges
Fourteenth Congress
Third Regular Session
REPUBLIC ACT No. 9775
AN ACT DEFINING THE CRIME OF CHILD PORNOGRAPHY,
PRESCRIBING PENALTIES THEREFOR AND FOR OTHER PURPOSES
Be it enacted by the Senate and House of Representatives of the
Philippines in Congress assembled:
Section 1. Short Title. - This Act shall be known as the "Anti-Child
Pornography Act of 2009."
Section 2. Declaration of Policy. - The State recognizes the vital role of the
youth in nation building and shall promote and protect their physical, moral,
199
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
spiritual, intellectual, emotional, psychological and social well-being.
Towards this end, the State shall:
(a) Guarantee the fundamental rights of every child from all forms of neglect,
cruelty and other conditions prejudicial to his/her development;
(b) Protect every child from all forms of exploitation and abuse including,
but not limited to:
(1) the use of a child in pornographic performances and materials; and
(2) the inducement or coercion of a child to engage or be involved in
pornography through whatever means; and
(c) Comply with international treaties to which the Philippines is a signatory
or a State party concerning the rights of children which include, but not
limited to, the Convention on the Rights of the Child, the Optional Protocol
to the Convention on the Rights of the Child of the Child on the Sale of
Children, Child Prostitution and Child Pornography, the International Labor
Organization (ILO) Convention No.182 on the Elimination of the Worst
Forms of Child Labor and the Convention Against Transnational Organized
Crime.
Section 4. Unlawful or Prohibited Acts. - It shall be unlawful for any person:
(a) To hire, employ, use, persuade, induce or coerce a child to perform in
the creation or production of any form of child pornography;
(b) To produce, direct, manufacture or create any form of child pornography;
200
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
(c) To publish offer, transmit, sell, distribute, broadcast, advertise, promote,
export or import any form of child pornography;
(d) To possess any form of child pornography with the intent to sell,
distribute, publish, or broadcast: Provided. That possession of three (3) or
more articles of child pornography of the same form shall be prima facie
evidence of the intent to sell, distribute, publish or broadcast;
(e) To knowingly, willfully and intentionally provide a venue for the
commission of prohibited acts as, but not limited to, dens, private rooms,
cubicles, cinemas, houses or in establishments purporting to be a legitimate
business;
(f) For film distributors, theaters and telecommunication companies, by
themselves or in cooperation with other entities, to distribute any form of
child pornography;
(g) For a parent, legal guardian or person having custody or control of a
child to knowingly permit the child to engage, participate or assist in any
form of child pornography;
(h) To engage in the luring or grooming of a child;
(i) To engage in pandering of any form of child pornography;
(j) To willfully access any form of child pornography;
(k) To conspire to commit any of the prohibited acts stated in this section.
Conspiracy to commit any form of child pornography shall be committed
201
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
when two (2) or more persons come to an agreement concerning the
commission of any of the said prohibited acts and decide to commit it; and
(l) To possess any form of child pornography.
Section 5. Syndicated Child Pornography - The crime of child pornography
is deemed committed by a syndicate if carried out by a group of three (3) or
more persons conspiring or confederating with one another and shall be
punished under Section 15(a) of this Act.
Section 13. Confidentiality. - The right to privacy of the child shall be
ensured at any stage of the investigation, prosecution and trial of an offense
under this Act. Towards this end, the following rules shall be observed:
(a) The judge, prosecutor or any officer of the law to whom the complaint
has been referred to may, whenever necessary to ensure a fair and
impartial proceeding and after considering all circumstances for the best
interest of the child conduct a closed-door investigation, prosecution or trial;
(b) The name and personal circumstances of the child, including the child's
immediate family, or any other information tending to establish his/her
identity shall not be disclosed to the public;
(c) Any record regarding a child shall be confidential and kept under seal.
Except upon written request and order of the court, a record shall be
released only to the following:
202
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
(1) Members of the court staff for administrative use;
(2) The prosecuting attorney;
(3) Defense counsel;
(4) The guardian ad litem;
(5) Agents of investigating law enforcement agencies and
(6) Other persons as determined by the court.
(d) Any form of child pornography that is part of the court records shall be
subject to a protective order that provides as follows:
(1) Any form of child pornography may be viewed only by the parties, their
counsel, their expert witness and guardian ad litem;
(2) Neither form of child pornography nor any portion thereof shall be
divulged to any other person, except as necessary for investigation,
prosecution or trial; and
(3) No person shall be granted access to any form of child pornography or
any part thereof unless he/she signs a written affirmation that he/she has
received and read a copy of the protection order; that he/she submits to the
jurisdiction of the court with respect to the protective order; and that, in case
of violation thereof, he/she will be subject to the contempt power of the
court; and
203
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
(e) In cases when prosecution or trial is conducted behind closed doors, it
shall be unlawful for any editor, publisher and reporter or columnist in case
of printed materials, announcer or producer in case of television and radio,
producer and director of a film in case of the movie industry, or any person
utilizing the tri-media facilities or information technology to publish or
broadcast the names of the victims of any case of child pornography.
Any violation of this provision shall be subject to the penalty provided for
under Section 15(m) of this Act.
Section 14. Care, Custody and Treatment of a Child Victim. - The DSWD
shall ensure that the child who is a victim of any form of child pornography
is provided appropriate care, custody and support for their recovery and
reintegration in accordance with existing laws.
- The child and his family shall be entitled to protection as well as to the
rights and benefits of witnesses under Republic Act No. 6981, otherwise
known as "The Witness Protection, Security and Benefit Act".
- The child shall also be considered as a victim of a violent crime defined
under Section 3(d) of Republic Act No. 7309, otherwise known as "An Act
Creating a Board of Claims under the Department of Justice for Victims of
204
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Unjust Imprisonment or Detention and Victims of Violent Crimes and for
Other Purposes", so that the child may claim compensation therein. (k) To
conspire to commit any of the prohibited acts stated in this section.
Conspiracy to commit any form of child pornography shall be committed.
Punishment for Child Pornography Possession or
Distribution
Section 15. Penalties and Sanctions. - The following penalties and
sanctions are hereby established for offenses enumerated in this Act:
(a) Any person found guilty of syndicated child pornography as defined in
Section 5 of this Act shall suffer the penalty of reclusion perpetua (pardon)
and a fine of not less than Two million pesos (Php2,000,000.00) but not
more than Five million pesos (Php5,000,000.00);
(b) Any person found guilty of violating Section 4(a), (b) and (c) of this Act
shall suffer the penalty of reclusion temporal in its maximum period and a
fine of not less than One million pesos (Php1,000,000.00) but not more than
Two million (Php2,000,000.00);
(c) Any person found guilty of violating Section 4(d), (e) and (f) of this Act
shall suffer the penalty of reclusion temporal in its medium period and a fine
205
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
of not less than Seven hundred fifty thousand pesos (Php750,000.00) but
not more than One million pesos (Php1,000,000.00);
(d) Any person found guilty of violating Section 4(g) of this Act shall suffer
the penalty of reclusion temporal in its minimum period and a fine of not less
than Five hundred thousand pesos (Php500,000.00) but not more than
Seven hundred thousand pesos (Php700,000.00);
(e) Any person found guilty of violating Section 4(h) of this Act shall suffer
the penalty of prision mayor in its maximum period and a fine of not less
than Three hundred thousand pesos (Php300,000.00) but not more than
Five hundred thousand pesos (Php500,000.00);
(f) Any person found guilty of violating Section 4(I) of this Act shall suffer
the penalty of prision mayor in its minimum period and a fine of not less than
Three hundred thousand pesos (php300,000.00) but not more than Five
hundred thousand pesos (Php500,000.00);
(g) Any person found guilty of violating Section 4(j) of this Act shall suffer
the penalty of prision correccional in its maximum period and a fine of not
less than Two hundred thousand pesos (Php200,000.00) but not more than
Three hundred thousand pesos (Php300,000.00);
(h) Any person found guilty of violating Section 4(k) of this Act shall suffer
the penalty of prision correccional in its medium period and a fine of not less
206
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
than One hundred thousand pesos (php100,000.00) but not more than Two
hundred fifty thousand pesos (php250,000.00);
(i) Any person found guilty of violating Section 4(l) of this Act shall suffer the
penalty of arresto mayor in its minimum period and a fine of not less than
Fifty thousand pesos (Php50,000.00) but not more than One hundred
thousand pesos (Php100,000.00);
(j) Any person found guilty of violating Section 11 of this Act shall suffer the
penalty of prision correccional in its medium period and a fine of not less
than One million pesos (Php1,000,000.00) but not more than Two million
pesos (Php2,000,000.00) for the first offense. In the case of a subsequent
offense, the penalty shall be a fine not less than Two million pesos
(Php2,000,000.00) pesos but not more than Three million pesos
(Php3,000,000.00) and revocation of its license to operate and immediate
closure of the establishment;
(k) Any ISP found guilty of willfully and knowingly failing to comply with the
notice and installation requirements under Section 9 of this Act shall suffer
the penalty of a fine of not less than Five hundred thousand pesos
(Php500,000.00) but not more than One million pesos (Php1,000,000.00)
for the first offense. In case of subsequent offense, the penalty shall be a
fine of not less than One million pesos (Php1,000,000.00) but not more than
207
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Two million pesos (Php2,000,000.00) and revocation of its license to
operate;
(l) Any mall owner-operator and owner or lessor of other business
establishments including photo developers, information technology
professionals, credit card companies and banks, found guilty of willfully and
knowingly failing to comply with the notice requirements under Section 10
of this Act shall suffer the penalty of a fine of not less than One million pesos
(Php1,000,000.00) but not more than Two million pesos (Php2,000,000.00)
for the first offense. In the case of a subsequent offense, the penalty shall
be a fine of not less than Two million pesos (Php2,000,000.00) but not more
than Three million pesos (Php3,000,000.00) and revocation of its license to
operate and immediate closure of the establishment; and
(m) Any person found guilty of violating Section 13 of this Act shall suffer
the penalty of arresto mayor in its minimum period and a fine of not less
than One hundred thousand pesos (Php100,000.00) but not more than
Three hundred thousand pesos (Php300,000.00).
Section 16. Common Penal Provisions. -
(a) If the offender is a parent, ascendant, guardian, step-parent or collateral
relative within the third degree of consanguinity or affinity or any person
having control or moral ascendancy over the child, the penalty provided
208
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
herein shall be in its maximum duration; Provided, That this provision shall
not apply to Section 4(g) of this Act;
(b) If the offender is a juridical person, the penalty shall be imposed upon
the owner, manager, partner, member of the board of directors and/or any
responsible officer who participated in the commission of the crime or shall
have knowingly permitted or failed to prevent its commissions;
(c) If the offender is a foreigner, he/she shall be immediately deported after
the complete service of his/her sentence and shall forever be barred from
entering the country; and
(d) The penalty provided for in this Act shall be imposed in its maximum
duration if the offender is a public officer or employee.
Section 17. Confiscation and Forfeiture of the Proceeds, Tools and
Instruments Used in Child Pornography. - In addition to the penalty imposed
for the violation of this Act, the court shall order the confiscation and
forfeiture in favor of the government of all the proceeds, tools and
instruments used in the commission of the crime, unless they are the
property of a third person not liable for the unlawful act; Provided, however,
That all awards for damages shall be taken from the personal and separate
properties of the offender; Provided, further, That if such properties are
209
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
insufficient, the deficiency shall be taken from the confiscated and forfeited
proceeds, tools and instruments.
- All proceeds derived from the sale of properties used for the commission
of any form of child pornography shall accrue to the special account of the
DSWD which shall be used exclusively for the implementation of this Act.
- When the proceeds, tools and instruments used in the commission of the
offense have been destroyed diminished in value or otherwise rendered
worthless by any act or omission, directly or indirectly, of the offender, or it
has been concealed, removed, converted or transferred to prevent the
same from being found or to avoid forfeiture or confiscation, the offender
shall be ordered to pay the amount equal to the value of the proceeds, tools
and instruments used in the commission of the offense.
Section 18. Mandatory Services to Victims of Child Pornography. - To
ensure recovery, rehabilitation and reintegration into the mainstream of
society concerned government agencies and the LGUs shall make
available the following services to victims of any form of child pornography:
(a) Emergency shelter or appropriate housing;
(b) Counseling;
(c) Free legal services, which shall include information about the victim's
rights and the procedure for filing of complaints, claims for compensation
210
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
and such other legal remedies available to them in a language understood
by the child;
(d) Medical or psychological services;
(e) Livelihood and skills training; and
(f) Educational assistance.
Sustained supervision and follow through mechanism that will track the
progress of recovery, rehabilitation and reintegration of the child victims
shall adopted and carried out.
Section 19. Programs for Victims of Child Pornography. The Inter-Agency
Council against Child Pornography created under Section 20 of this Act
shall develop and implement the necessary programs that will prevent any
form of child pornography, as well as protect, heal and reintegrate the child
into the mainstream of society. Such programs shall include beat but not
limited to the following:
(a) Provision of mandatory services including counseling free legal services,
medical or psychological services, livelihood and skills training and
educational assistance to the child pursuant to Section 18 of this Act;
(b) Sponsorship of a national research program on any form of child
pornography and other acts covered by the law and the establishment of a
data collection system for monitoring and evaluation purposes;
211
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
(c) Provision of necessary technical and material support services to
appropriate government agencies and nongovernmental organizations:
(d) Sponsorship of conferences and seminars to provide venue for
consensus building amongst the public, the academe, government,
nongovernmental and international organizations and
(e) Promotion of information and education campaign.
Section 22. Child Pornography as a Transnational Crime. - Pursuant to the
Convention on transnational Organized Crime, the DOJ may execute the
request of a foreign state for assistance in the investigation or prosecution
of any form of child pornography by: (1) conducting a preliminary
investigation against the offender and, if appropriate, to file the necessary
charges in court; (2) giving information needed by the foreign state; and (3)
to apply for an order of forfeiture of any proceeds or monetary instrument or
properly located in the Philippines used in connection with child
pornography in the court; Provided, That if the DOJ refuses to act on the
request of for delaying the execution thereof: Provided, further, That the
principles of mutuality and reciprocity shall, for this purpose, be at all times
recognized.
212
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Section 23. Extradition. - The DOJ, in consultation with the Department of
Foreign Affairs (DFA), shall endeavor to include child pornography among
extraditable offenses in future treaties.
Approved,
PROSPERO C. NOGRALES
Speaker of the House of Representatives
JUAN PONCE ENRILE
President of the Senate
This Act which is a consolidation of Senate Bill No. 2317 and House Bill No.
6440 was finally passed by the Senate and the House of Representatives
on October 13, 2009.
MARILYN B. BARUA-YAP
Secretary General
House of the Representatives
213
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
EMMA LIRIO-REYES
Secretary of the Senate
Approved: November 17, 2009
Sgd. GLORIA MACAPAGAL-ARROYO
President of the Philippines
QUIZ
Identification:
1. Who was the president of the Philippines when the act known as the
“Anti-Child Pornography Act of 2009 was finally passed by the Senate and
the House of Representatives?
2. What erotic literary work text that originated from India dated 400 BCE?
3. It is a type of Pornography that uses a “dial-a-porn” telephone call.
4. What factor is being described where the children in Philippine society
are expected to help the family in whatever way or means to earn money.
5. It is the representation of sexual behaviour in books, pictures, statues,
films, and other media that is intended to cause sexual excitement.
214
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Multiple Choice:
6. What is the title of the Act known as the “Anti-Child Pornography Act of
2009?
a.) Republic Act No. 9775-A
b.) Republic Act No. 9775
c.) Republic Act No. 95
d.) Republic Act No. 10173
7. The word Pornography is derived from the two Greek words
a.) porni (“prostitute”) and graph (“to write”)
b.) porni (“prosti”) and graphein (“to write”)
c.) pornstar (“prostitute” and graphein (“to write”)
d.) porni (“prostitute”) and graphein (“to write”)
8. Section 2. Declaration of Policy – The state recognizes the vital role of
the ________ in nation building and shall promote and protect their
physical, moral, spiritual, intellectual, emotional, psychological and social
well-being.
a. Children
b. Society of youth
c. Nation
d. Youth
215
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
9. Section 15. Penalties and Sanctions – Any person found guilty of
syndicated child pornography shall suffer the fine of;
a.) Not less than Two (2) million pesos but not more than Five (5) million
pesos
b.) Not less than Two (3) million pesos but not more than Five (4) million
pesos
c.) Not less than Two (4) million pesos but not more than Five (5) million
pesos
d.) Not less than Two (1) million pesos but not more than Five (5) million
pesos
10. This type of pornography is rented or sold in most adult bookstores and
usually displays videos of hard-core pornography.
a.) Men’s Health Magazine
b.) Video cassettes
c.) Video VHS
d.) Betamax Videos
Essay: What is your stand or opinion when it comes to PUBS that shows
nude ladies dancing on stage? And why is the government not
PERMANENTLY closing down those establishments?
216
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
References:
https://www.similarweb.com/top-websites/philippines/
https://philstarlife.com/self/818315-pornhub-year-in-review-
philippines?page=2
https://globalnation.inquirer.net/97567/filipinos-rank-15th-in-global-porn-
watching
http://www.amlc.gov.ph/images/PDFs/2020%20DEC%20CHILD%20POR
NOGRAPHY%20IN%20THE%20PHILIPPINES%20POST-
2019%20STUDY%20USING%20STR%20DATA.pdf
Valera, Mark Joselito S.
Reporter
217
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Virtual Prostitution
(Mira, Jastine John T.)
218
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
What is Virtual Prostitution?
- An activity in which one engages in sexual activity with another person,
whom neither have ever seen/met in real life before. Usually, the two meet
online. Obscene and indecent acts evolving around virtual. sexual
stimulation and/or intercourse in exchange of money and/or. profit.
VR Porn and Interactive Toys
- VR porn essentially enables a pornographic experience in a virtual reality
simulation, meaning the video or the movie plays all around the person
wearing the VR headset, providing a more life-like experience. Industry
leaders like Pornhub actively pursued such content in the early 2010s.
- According to the statistics published on VRSelector, in 2020, in conjunction
with virtual reality porn only 3.2% of users use sex toys (Teledildonics like
Fleshlight or Kiiroo products). SexLikeReal officials are noticing an
uptrend for interactive sex toys use on their platform and are expecting this
to keep growing. The current situation of the world, with the pandemic, is
one of the reasons why virtual reality sex is increasing.
219
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Virtual Sex or Cybersex
- Cybersex, also called computer sex, Internet sex, netsex and, colloquially,
cyber or cybering, is a virtual sex encounter in which two or more people
connected remotely via computer network send each other sexually explicit
messages describing a sexual experience.
- Cybersex is a sub-type of technology-mediated sexual interactions.
- Cybersex often includes real life masturbation.
Crime Relationships
- There are several ways to incur violations of the law when on the internet
and some of these include cybersex criminal activities that may involve the
solicitation of a minor, child pornography and felony offenses that harm
others.
220
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Cybersex
- is when a victim is forced into sexual exploitation using coercion, force, or
fraud, and their abuse is streamed live on the internet via webcam, video,
photography, or other digital media.
Child Pornography
- Child pornography is considered to be any depiction of a minor or an
individual who appears to be a minor who is engaged in sexual or sexually
related conduct. This includes pictures, videos, and computer-generated
content. Even altering an image or video so that it appears to be a minor
can be considered child pornography.
Sexting
- It’s legal for consenting adults to send sexual images and suggestive
messages to each other. However, sexting with a minor is completely out
of line. Understandably, the state of Texas considers this to be a major
crime. Offenders could potentially be charged with a felony. Aside from
being slapped with hefty fines, the person is also at risk of facing prison
time.
221
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Cyberstalking
- In recent years, there’s been an increase in cyberstalking. The crime
occurs when an attacker harasses others using electronic communication.
There will be a pattern of malicious behavior. These individuals often send
their targets lewd messages and pictures. While some offenders may make
their identity known, others choose to remain anonymous by creating fake
accounts.
Sex Trafficking
- In many ways, sex trafficking is a modern form of human slavery. It’s an
extreme violation that can haunt victims for years to come. After abducting
their targets, the offenders often go online to connect with potential clients.
Contrary to common belief, victims are not always physically held against
their will. Some captures use other means to control people, such as
threatening deportation and public humiliation.
QUIZ
1.) What is the difference between prostitution and VR prostitution? (5pts)
2.) What is VR porn? (5pts)
3.) What are the other terms for Cyber Sex? (5pts)
222
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
4.) Give and explain 5 crime relationship of VR prostitution (3pts each)
References:
https://www.urbandictionary.com/define.php?term=Virtual%20Prostitution
https://www.jettonmeredithlaw.com/blog/2020/june/4-common-types-of-
internet-sex-crimes/
Module in Social and Professional Issues I
Mira, Jastine John T.
Reporter
223
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Technology and
Privacy
(Mendoza, John Ezekiel R.)
224
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Technology and Privacy
- Technology and Privacy are two intertwined notions that must be jointly
analyzed and faced. Technology is a social practice that embodies the
capacity of societies to transform themselves by creating the possibility to
generate and manipulate not only physical objects, but also symbols,
cultural forms and social relations. In turn, privacy describes a vital and
complex aspect of these social relations. Thus, technology influences
people’s understanding of privacy.
Identity Theft
- Identity theft is the crime of obtaining the personal or financial information
of another person to use their identity to commit fraud, such as making
unauthorized transactions or purchases. Identity theft is committed in many
different ways and its victims are typically left with damage to their credit,
finances, and reputation.
Types of Identity Theft
1.) TRUE NAME IDENTITY THEFT - Is a serious crime. It takes place when
a scammer uses your personal information without your knowledge or
consent to commit fraud or theft. The theft might open a new credit card
225
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
account, establish cellular phone service or open a hacking account to
obtain blank checks.
2.) ACCOUNT TAKEOVER IDENTITY THEFT - Is an attack whereby
cybercriminals take ownership of online accounts using stolen passwords
and usernames. Typically, the theft will change the mailing address on an
account and run up bills before the victim realizes there is a problem.
3.) CYBERCRIME – Also called computer crime, the use of a computer as
an instrument to further illegal ends, such as committing fraud, trafficking in
child pornography and intellectual property, stealing identities, or violating
privacy.
Examples of Identity Theft
1.) FINANCIAL IDENTITY THEFT - This is the most common type of
identity theft. Financial identity theft seeks economic benefits by using a
stolen identity.
2.) TAX RELATED IDENTITY THEFT - In this type of exploit, the criminal
files a false tax return with the internal revenue service (IRS), for example
using a stolen social security number.
3.) MEDICAL IDENTITY THEFT - is when someone steals or uses your
personal information (like your name, Social Security number, or Medicare
226
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
number), to submit fraudulent claims to Medicare and other health insurers
without your authorization. Medical identity theft can disrupt your medical
care, and wastes taxpayer dollars.
4.) CRIMINAL IDENTITY THEFT - occurs when someone cited or arrested
for a crime uses another person's name and identifying information,
resulting in a criminal record being created in that person's name.
5.) CHILD IDENTITY THEFT – In this exploit, a child’s social number is
misused to apply for government benefits and open bank accounts or other
services. Criminals often seek information about children because the
damage may go unnoticed for a long time.
6.) SENIOR IDENTITY THEFT - occurs when their identities are stolen for
personal gain. Seniors are targeted more often for scams that involve credit
and financial accounts.
7.) IDENTITY CLONING - this happens when someone uses another
person's identity to conceal their own. The most common example of
identity cloning is individuals using another person's Social Security number
for work purposes.
8.) SYNTHETIC IDENTITY THEFT - occurs when someone uses a
combination of real and fake personal information to create an identity and
commit fraud. A fraudster may combine a stolen Social Security number
(SSN) with a fake name, date of birth and address to create a new identity,
227
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
for example. They can then use the "Frankenstein ID," as it's sometimes
called, to commit various times of fraud.
Identity Theft Techniques
1.) PHISHING AND SMISHING - Phishing involves sending you a
fraudulent email that looks to be authentic, say an email from your bank
asking you to verify your account information.
2.) DUMPSTER DRIVING - Retrieving personal paper works and discarded
mail from a dumpster is an easy way for an identity thief to get information.
3.) WIRELESS HACKING - Is an attack on wireless networks or access
points that offer confidential information such as authentication attacks, wifi
passwords, admin portal access, and other similar data. Wireless hacking
is performed for gaining unauthorized access to a private wifi network.
4.) MAIL THEFT - It is when someone other than the intended recipient
tampers with, steals, or reads mail that does not belong to them. It may
include raiding a mailbox to search for cash, credit cards, or other valuables.
Sometimes thieves are looking for bank statements, social security checks,
or personally identifiable information they can use to steal your identity.
228
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Signs of being an Identity Theft Victim
- Unfamiliar login alerts.
- Unable to access your Apple ID.
- Mysterious changes in your credit score.
- Suspicious activity on your financial records.
- Being billed for strange medical procedures.
- Denial of health coverage.
- Denial for a loan or credit.
Tips to protect yourself from Identity Theft
- Destroy private records and statements
- Safeguard your Social Security number.
- Never let your credit card out of your sight.
- Be more defensive with personal information.
- Review your credit card statements carefully.
- Secure your mail.
- Don’t leave a paper trail.
- Know who you’re dealing with.
- Monitor your credit report.
- Take your name off marketers’ hit lists.
229
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
QUIZ
1. Is the crime of obtaining the personal or financial information of another
person.
A. Technology B. Identity theft
C. Privacy
2. It takes place when a scammer uses your personal information without
your knowledge or consent.
A. Account takeover identity theft B. True name identity theft
C. Cybercrime
3. Take ownership of online accounts using stolen passwords and
usernames.
A. Account takeover identity theft B. Cybercrime
C. True name identity theft
4. The use of a computer as an instrument to further illegal ends.
A. True name identity theft B. Cybercrime
C. Tru name identity theft
5. the criminal files a false tax return with the internal revenue service
A. Financial identity theft B. Medical identity theft
C. Tax related identity theft
230
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
6. Is when someone steals or uses your personal information (like your
name, Social Security number, or Medicare number).
A. Medical identity theft B. Financial identity theft
C. Medical identity theft
7. Occurs when someone cited or arrested for a crime uses another
person's name and identifying information.
A. medical identity theft B. Criminal identity theft
C. Child identity theft
8. Seniors are targeted more often for scams that involve credit and financial
accounts.
A. Child identity theft B. Identity cloning
C. Senior identity theft
9. This happens when someone uses another person's identity to conceal
their own.
A. Identity cloning B. Senior identity theft
C. Synthetic identity theft
10. Occurs when someone uses a combination of real and fake personal
information to create an identity and commit fraud.
A. Synthetic identity theft B. Identity cloning
C. Cybercrime
231
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
(11 - 15.)
Give 5 signs of being identity theft victim
(16 – 20.)
Give 5 tips to protect yourself on Identity theft
Essay (5 points each)
1. How does identity theft affect the life of a person?
2. What is the best way to prevent identity theft?
References:
Module in Social and Professional Issues I
Mendoza, John Ezekiel R.
Reporter
232
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Online Crimes
(Ordinario, Clarence E.)
233
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
What are Online Crimes?
- Internet crime is any crime or illegal online activity committed on the
Internet, through the Internet, or using the Internet. The widespread Internet
crime phenomenon encompasses multiple global levels of legislation and
oversight. In the demanding and continuously changing IT field, security
experts are committed to combating Internet crime through preventative
technologies, such as intrusion detection networks and packet sniffers.
Internet crime is a strong branch of cybercrime. Identity theft, Internet scams
and cyberstalking are the primary types of Internet crime. Because Internet
crimes usually engage people from various geographic areas, finding and
penalizing guilty participants is complicated.
History of Cybercrime
- The first major wave of cybercrime came with the proliferation of email
during the late 80’s. It allowed for a host of scams and/or malware to be
delivered to your inbox.
- The next wave in the cybercrime history timeline came in the 90’s with the
advancement of web browsers. At the time there were a multitude to choose
from, many more than today, and most were vulnerable to viruses. Viruses
were delivered through Internet connections whenever questionable
234
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
websites were visited. Some caused your computer to run slow; others may
have caused annoying pop-up advertising to crowd your screen or redirect
you to the nastiest porn sites.
- Cybercrime really began to take off in the early 2,000’s when social media
came to life. The surge of people putting all the information they could into
a profile database created a flood of personal information and the rise of ID
theft. Thieves used the information in a number of ways including accessing
bank accounts, setting up credit cards or other financial fraud.
- The latest wave is the establishment of a global criminal industry totaling
nearly a half-trillion dollars annually. These criminals operate in gangs, use
well-established methods and target anything and everyone with a
presence on the web.
Categories of Cybercrime
1.) Crimes Against People - These crimes include cyber harassment and
stalking, distribution of child pornography, credit card fraud, human
trafficking, spoofing, identity theft, and online libel or slander.
2.) Crimes Against Property - Some online crimes occur against property,
such as a computer or server. These crimes include DDOS attacks,
235
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
hacking, virus transmission, cyber and typosquatting, computer vandalism,
copyright infringement, and IPR violations.
3.) Crimes Against Government - When a cybercrime is committed
against the government, it is considered an attack on that nation's
sovereignty. Cybercrimes against the government include hacking,
accessing confidential information, cyber warfare, cyber terrorism, and
pirated software.
Types of Cybercrimes
- Ransomware is a modern-day, technical twist on a crime that has been
around for ages. At its core, ransomware works when criminals steal
something of great value and demand payment in exchange for its return.
For most businesses, this involves the encryption of company data. When
ransomware hits, businesses come to a standstill, and employees cannot
do their jobs.
- Phishing is one of the main forms of social engineering attacks, and as
any social engineering attack, it tries to trick unsuspecting users into giving
away personal information. Usually, these cybercrimes are committed by
236
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
impersonating trusted and popular brands creating fake social media
profiles and rogue websites to lure users into them. These sites copy the
appearance of the real website to create a sense of security and usually ask
to fill forms with personal information to receive some kind of benefit, such
as discounts. The most refined of these sites might include malicious scripts
that scrap this information out of your browser, without the need of forms.
- Online Harassment is sadly very widespread in today’s world, even more
so when people feel protected by the anonymity that the internet grants us.
One of the fastest growing and most known online harassment in the last
years has been revenge porn. Online harassment and cyberbullying are
usually contained within social media in the form of posts, comments, or
direct messages, but they could also be sent through email. These
messages’ main form is mostly defamatory or threatening either against one
individual or group.
- Cyberstalking is another type of harassment that focuses on a single
person, which the criminal monitors closely. It is likely that employers,
colleagues and familiars of the victim also get contacted both to slander the
victim and to try and extract more personal information to deepen the
stalking activity.
237
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- Password Attacks, these are simply meant to decrypt or even attempt to
obtain a user’s password with the help of criminal intentions. Attackers can
use Dictionary Attacks, Password Sniffers, or even Cracking programs in
such cases. These attacks are conducted by accessing passwords that are
exported or stored in a file.
How does it threaten National Security?
- For national security concerns, the likely cybercrime threats deal with
espionage activity, disruption, sabotage, politically motivated attacks, and
those which involve terrorism activities. Nowadays, Terrorists are using the
Internet for their recruitment, propaganda, planning, teach-ins, financing,
and even operational implementation. Swindling, estafa, scam or other
forms of computer fraud, counterfeiting and forgery are some of the
financially motivated cybercrime threats.
What is Cybersecurity?
- Cybersecurity is the ongoing effort to protect these networked systems
and all of the data from unauthorized use or harm. On a personal level, you
need to safeguard your identity, your data, and your computing devices. At
the corporate level, it is everyone’s responsibility to protect the
238
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
organization’s reputation, data, and customers. At the state level, national
security, and the safety and well-being of the citizens are at stake.
Advantages of Cybersecurity
- Cyber security will defend us from critical cyber-attacks.
- It helps us to browse the safe website.
- Cyber security will defend us from hacks & viruses
- The application of cyber security used in our PC needs to update every
week.
- Internet security processes all the incoming & outgoing data on our
computer.
- It helps to reduce computer chilling & crashes.
- Gives us privacy.
Safety Tips to Cybercrimes
- Use a full-service internet security suite
- Use strong passwords
- Keep your software updated
- Manage your social media settings
- Use anti-virus software and keep it updated
239
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- Do not click on links in spam emails or untrusted websites
- Do not give out personal information unless secure
QUIZ
1. The act of copying and giving away files in an illegal manner is called?
A. Cyber Theft B. Cyber Vandalism
C. Cyber Robbery D. Cyber Burglary
2. Use electronic devices to harass, spy, or frighten someone is called?
A. Cyber Hunting B. Cyber Spying
C. Cyber Stalking D. Cyber Chasing
3. To protect your computer from viruses, you should install ______ in your
computer.
A. Disk Cleanup B. Backup Wizard
C. Antivirus D. Valorant
4. VIRUS stands for?
A. Very Information Resource Under Siege
B. Very Important Record User Searched
C. Very Intelligent Result Until Source
D. Very Interchanged Resource Under Search
240
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
5. It is considered an attack on that nation’s sovereignty
A. Crimes against Government
B. Crimes against People
C. Crimes against Property
D. Crimes against Animal
6. These crimes include DDoS attacks, hacking, computer vandalism, etc.,
What do you call this crime?
A. Crimes against People
B. Crimes against Property
C. Crimes against Government
D. Crimes against Animal
7. These crimes include cyber harassment, child pornography, and theft,
what did you called this?
A. Crimes against Animal
B. Crimes against People
C. Crimes against Government
D. Crimes against Property
8. Which of the following are the threats for the electronic payment system?
A. Computer worms
B. Computer virus
241
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
C. Trojan horse
D. All of the above
9. To protect yourself from computer hackers, you should turn on a?
A. Firewall B. Script
C. Antivirus D. VLC
10. Which of the following describes programs that can run independently
travel from system to system and disrupt communication
A. Worm B. Droppers
C. Trojan horse D. Viruses
11. Usually, these cybercrimes are committed by impersonating trusted and
popular brands creating fake social media profiles and rogue websites to
lure users into them. What types of cybercrime is this?
A. Ransomware
B. Phishing scam
C. Online harassment
D. Password attacks
12. This type of cybercrime is another type of harassment that focuses on
a single person, what type of cybercrime is this?
A. Online harassment
B. Cyberstalking
242
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
C. Password attacks
D. Ransomware
13. Which of the following would most likely not be a symptom of virus?
A. The CD-ROM stops functioning
B. Existing programs files and icons disappear
C. Odd messages
D. The web browser open to an unusual page
14. A ______ is a computer program that can replicate itself and spread
from one computer to another.
A. Computer Virus B. Pendrive
C. Mouse D. Antivirus
15. are often delivered to a PC through an email attachment and are often
designed to do harm
A. Portals B. Virus
C. Spam D. Email
16. Which ofs the following is known as Malicious Software?
A. Illegalware B. Badware
C. Malware D. Maliciousware
243
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
17. Firewalls are used to protect against?
A. Fire attacks
B. Virus attacks
C. Data driven attacks
D. Unauthorized access
18. A crime committed to the internet
A. Cybercrime B. Online crime
C. Animal Crime D. Crime
19. When criminals steal for something of great value and demand payment
in exchange, what type of crime is this?
A. Phishing B. Cyberstalking
C. Online harassment D. Ransomware
20. These attacks are conducted by accessing passwords that are extorted
or stored in a file.
A. Password attacks B. Cyberstalking
C. Ransomware D. Online harassment
244
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
ESSAY QUESTION (10 POINTS):
What Is the Most Harmful in The Types of Cybercrime?
References:
The History of Cyber Crime. | Le VPN (le-vpn.com)
What is Internet Crime? - Definition from Techopedia
What Are the Three Types of Cyber Crimes? | Swier Law Firm, Prof. LLC
What is Cybercrime? Types and Prevention | BlueVoyant
Advantages & Disadvantages of Cyber Security (exametc.com)
What is cybercrime? Types and how to protect yourself (kaspersky.com)
Ordinario, Clarence E.
Reporter
245
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Electronics Lifestyle
(Castro, Xena O.)
246
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
What is Electronic Lifestyle?
- A range of embedded consumer and lifestyle electronics product
development services integrating audio, video navigation and wireless
interfaces to help product development companies built next - gen futuristic
lifestyle and consumer electronic devices.
SMS Addiction
- Short for Short Message Service, leading to health problems. Assocham
Widespread availability of cheap unlimited text messages plans has been
made the service preferred mode of communication for youngster not only
in India but more so in the Philippines and its excessive use leading to
health problems among them says a study by industry body Assocham.
247
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Effects of SMS Addiction
1.) Insomnia - Also known as sleeplessness is a sleep disorder in which
people have trouble sleeping.
2.) Depression - Depression is a mood disorder that causes a persistent
feeling of sadness and loss of interest and can interfere with your daily life.
248
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
3.) Lack of Appetite - Loss of appetite can be related to lowered immune
system function feeling, unwell and having an upset stomach.
4.) Anxiety - is an emotion which is characterized by an unpleasant state
of inner turmoil and includes feelings or dread over anticipated events.
249
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- SMS ADDICTION can also affect your life when you get addicted to your
phone, you don't realize the time. You can’t do house chores and family
bonding because you are busy chatting or texting with others.
What is Online and Network Based Gaming?
- Online gaming describes "any video game that offers online interaction
with other players".
Effects of Online and Network Based Gaming?
- Various studies show that playing too much computer games " causes
physical damages and increase anxiety and depression in players.
250
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Online Shopping
- Online Shopping is the activity of buying products or services over the
internet. It means going online, landing on a seller's website, selecting
something and arranging for its delivery. The buyer either pays for the good
or service online with credit or debit card or upon delivery. In this case the
term "online" means on the internet.
Advantages of Online Shopping
- No Crowds
- No pressure
- Saves Times
- Saves Money
- Reviews of Product
251
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Disadvantages of Online Shopping
- Delayed order.
- Lack of significant discounts in online shops.
- Lack of touch and feel of merchandise in online shopping.
- Lack of experience.
- Lack of close examination in online shopping.
- Frauds in online shopping.
- Lack of interactivity in online shopping.
Blogging
- A video vlog or video log sometimes shortened to vlog is a form of blog for
which the medium is video. Vlog entries often combine embedded video
with supporting text images and other metadata.
252
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Benefits of Blogging
- Helps reach a wider audience
- Helps in gaining fame
- Allows direct engagement with the audience
- Provide information to masses
- Entertain people
- Creates revenue for the creator
- Boots your creativity
- The best medium for tutorials
What are Social Networks?
- A network and personal interaction and personal relationship, a dedicated
website or other application which enables users to communicate with each
other by posting information, comments, images.
253
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Benefits of Social Networks
- The benefits of social networks include their ability to help people connect
and stay in touch with family, friends and new contacts.
What are Personal Websites?
- A personal website can be about anything you want including hobbies,
pets. Or other interests. It can be a family website that shares your
adventures with loved ones along with an area for comments and
discussion.
Benefits of Personal Websites
- You get control your personal brand
- It's a useful way to show your creativity
- Not to mention the money you could earn
254
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- Contact
- Stand out
What is Home Base?
- A home- based worker is an. Employer who performs his or her job from
home rather than a designated workspace at an employer’s site.
Benefits of Home Base
- Better work and financial opportunities
- Flexible working hours
- No more commutes
- More time for your personal life
- Better productivity
- No dress codes
255
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- Cost savings
- Working anywhere
- A positive impact in the environment
What are Mobile Offices?
- A mobile office is a temporary or movable configuration of equipment and
services that allows a person to function as if he is working from a
permanent office.
Benefits of Mobile Offices
- Not having an office can save you money
- Without a commute you'll save time
- Less distraction increases productivity
256
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
QUIZ
1. It is a range of embedded consumer and lifestyle electronics product
development services integrating audio video navigation and wireless
interfaces to help product development companies build next-gen futuristic
lifestyle and consumer electronic devices.
2. It is a leading health problem.
3-6. (Give the effects of SMS ADDICTION)
7. It describes " any video game that offers online interaction with other
players.
8. It is the Activity of buying products or services over the internet.
9. In this term "____" means on the internet.
10-14. Advantages of online shopping.
15-17. Disadvantages of online shopping.
18-20. Benefits of blogging
21-25. What are social networks?
26-30. Benefits of home base
257
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
References:
SMS addiction leading health problem Assocham. The Economic Times
(indiatimes.com)
Online Gaming | History, Examples, Companies, & Facts| Britannica
Online shopping- definition and meaning - Market Business News
Home Based Business Definition - Entrepreneur Small Business
Encyclopedia
What is Vlogging? Definition History, & Impact on media (medikix.com)
Castro, Xena O.
Reporter
258
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
E-Learning
(Lavilla, Lourenz C.)
259
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
What is E-Learning?
- E-learning is a structured course or learning experience delivered
electronically; it can also include performance support content.
- There are also many different elements that can make up an e-learning
program, such as live or pre-recorded lecture content, video, quizzes,
simulations, games, activities, and other interactive elements.
- E-learning courses are typically managed and administered via a learning
management system (LMS).
- It helps organizations manage training events, self-paced courses, and
blended learning programs.
Importance of E-Learning
- E-learning has been introduced to empower learners to get basic
schooling and enhance skills. Also, they can obtain a degree certificate,
without actually attending school or university or any other institution.
- According to psychology, the audio-visual method of teaching leads to a
disciplined learning environment. There are effective tutor and student
engagements.
- Applying e-learning to all levels of schooling helped to ensure students
grasp the lessons adequately at a faster pace.
260
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
What is Online Education or Distance Learning?
- Online education is a flexible instructional delivery system that
encompasses any kind of learning that takes place via the Internet.
- Online learning gives educators an opportunity to reach students who may
not be able to enroll in a traditional classroom course and supports students
who need to work on their own schedule and at their own pace.
- Distance learning describes any learning that happens without the
students being physically present in the lesson.
Common Types
Online education:
•Asynchronous Online Courses
•Hybrid Courses
•Distributing Materials
Distance Learning:
•Video conferencing
•Computer-based
•Open-schedule
261
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Advantages and Disadvantages of Online Learning
- Certainly, live instruction is great. The face-to-face contact lets teachers
and students connect in a very authentic way, which often results in strong
rapport and understanding.
Advantages Disadvantages
- Greater Flexibility - Lack of Social Interaction
- No commuting - High Chances of Distraction
- Significant Cost Savings
Benefits of Computer Based Training
- In-person training can come with many hidden costs, including travel,
instructor fees, and employee productivity.
- Studies indicate that e-Learning has the potential to reduce overall training
time by 40% – 60%. Reducing training time means more time for your
employees to work on tasks that affect your organization’s bottom line.
- The cost of hiring someone to train employees and improve retention can
be a large financial burden.
262
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
QUIZ
Give 10 own opinions to all topics (10 pts)
Give 3 Common Types of Online Education Based on the Presentation (3
pts)
Give 2 Common Types of Distance Learning Based on the Presentation (2
pts)
Give 3 Advantages of Distance Learning Based on the Presentation (3 pts)
Give 2 Disadvantages of Distance Learning Based on the Presentation (2
pts)
Give at least 2 given topics (10 pts)
References:
https://www.td.org/talent-development-glossary-terms/what-is-e-
learning#what%20is
https://www.digitalclassworld.com/blog/importance-of-elearning-in-
education
https://www.viewsonic.com/library/education/what-is-distance-learning-
and-why-is-it-so-important/?fbclid=IwAR0q--
euvfgIKU_lM_n_3TH2f2oxOlLPqNF5V9gQNcuJQXUhVY4J8vn_Yrw
263
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
https://www.encyclopedia.com/finance/finance-and-accounting-
magazines/online-
education?fbclid=IwAR3d9Ep8wpsmgzEYnOkx8tdJUAiwsiiZfdlJMk9TtWV
zr-22TQeLBmpDgUY
https://eztalks.com/elearning/advantages-and-disadvantages-of-distance-
learning.html?fbclid=IwAR02_kSSsfBIltHOnb2jNXCnqpiFvplf--
Fx2F2JGmj0B6Slp0ZIR9_M9MI
https://inspiredelearning.com/blog/benefits-of-computer-based-training-for-
corporate-education/
Lavilla, Lourenz C.
Reporter