GE1 MidtermModule
GE1 MidtermModule
_________________
___________________________________
_________________
Course Subject: GE ELECTIVE 1 – LIVING
IN THE IT ERA (MIDTERM PERIOD)
Prepared by: ROBERT A. AGUILAR, JR., MIT
1
COURSE DESCRIPTION
This course provides an overview of the Computing Industry and the Computing Profession,
including Research and Applications in different fields. Discuss how Society uses computers in
education, finance, government, health, care, science, publishing, travel and manufacturing.
Table of Contents
COURSE DESCRIPTION.................................................................................................................................................. 1
OBJECTIVES
At the end of the lesson, the students must be able to:
a. Explain the basic concepts and principles of IoT in education.
b. Identify the potential benefits of using IoT in education.
c. Evaluate the challenges and risks associated with using IoT in education.
d. Developing practical skills and knowledge for implementing IoT in education.
e. Explore the current state of IoT in education and its future trajectory.
f. Assess the ethical, legal, and social implications of using IoT in education
LESSONS
students. This could involve adaptive learning platforms, personalized feedback, and
tailored instructional materials.
5. Remote Learning and Accessibility: IoT enables remote learning by providing access to
educational resources and interactive experiences from anywhere with an internet
connection. This is particularly beneficial for students in remote areas or those with
physical disabilities.
7. Security and Privacy: With the increased connectivity of IoT devices, ensuring security
and protecting the privacy of student data becomes paramount. Implementing robust
security measures, such as encryption, authentication, and access control, is essential to
safeguard sensitive information.
10. Continuous Improvement: By monitoring and analyzing data generated by IoT devices,
educators can continuously evaluate and improve teaching methods, curriculum design,
and learning environments to enhance student outcomes.
IoT in education holds the promise of revolutionizing traditional teaching and learning
paradigms by creating immersive, personalized, and collaborative educational experiences
tailored to the needs of 21st-century learners. However, it also poses challenges related to
4
security, privacy, infrastructure, and digital literacy that must be addressed to realize its full
potential.
CHALLENGES AND RISKS ASSOCIATED WITH IoT in Education
While IoT holds significant promise for enhancing education, its implementation also
presents several challenges and risks:
1. Security Concerns: IoT devices are vulnerable to cybersecurity threats such as hacking,
malware, and data breaches. Educational institutions must implement robust security
measures to protect sensitive student data and prevent unauthorized access to
networked devices.
2. Privacy Issues: Collecting and analyzing large amounts of student data through IoT
devices raise concerns about privacy violations. Educational institutions must establish
clear policies and procedures for data collection, storage, and usage while ensuring
compliance with regulations such as GDPR and COPPA.
4. Cost Considerations: Investing in IoT technology and infrastructure can be costly for
educational institutions, especially for cash-strapped schools and districts. The initial
investment in hardware, software, training, and maintenance may pose financial
challenges.
6. Interoperability Issues: Integrating diverse IoT devices and platforms from different
vendors can lead to interoperability challenges. Ensuring compatibility and seamless
communication between devices may require additional effort and resources.
5
7. Ethical Dilemmas: The use of IoT devices in education raises ethical concerns regarding
surveillance, tracking, and student autonomy. Balancing the benefits of data-driven
insights with ethical considerations regarding student privacy and autonomy is essential.
8. Reliability and Maintenance: IoT devices are susceptible to hardware failures, software
bugs, and technical glitches that can disrupt the learning environment. Educational
institutions must have protocols in place for regular maintenance, troubleshooting, and
system updates.
9. Digital Divide: The adoption of IoT technology in education may exacerbate existing
disparities in access to technology and digital skills. Students from underserved
communities may lack access to IoT devices and reliable internet connectivity, widening
the digital divide.
10. Resistance to Change: Implementing IoT initiatives in education may face resistance
from stakeholders such as educators, administrators, and parents who are unfamiliar or
skeptical about the benefits of technology in learning. Overcoming resistance and
fostering buy-in requires effective communication and professional development.
Addressing these challenges and risks requires careful planning, collaboration, and
investment to ensure that IoT technology in education maximizes its benefits while mitigating
potential drawbacks. Educational institutions must prioritize security, privacy, equity, and ethical
considerations in the adoption and implementation of IoT solutions.
Developing practical skills and knowledge for implementing IoT in education involves a
combination of technical expertise, pedagogical understanding, and project management skills.
Here's a step-by-step guide to building the necessary capabilities:
9. Stay Updated:
• Keep abreast of emerging trends, developments, and innovations in IoT
technology and education through research papers, industry publications, and
online resources.
• Continuously update your skills and knowledge to adapt to evolving technologies
and pedagogical practices in IoT education.
By following these steps and actively engaging in practical IoT projects, you can develop
the skills and knowledge needed to successfully implement IoT in education and create
enriching learning experiences for students.
The adoption of IoT in education is still in its early stages, but there are several notable
trends and developments indicating its growing importance and potential future trajectory:
1. Pilots and Initiatives: Many educational institutions around the world were
experimenting with IoT pilot projects to explore its applications in various aspects of
teaching, learning, and campus management. These initiatives ranged from smart
classrooms and interactive learning environments to campus safety and resource
optimization.
2. Focus on Personalization and Engagement: One of the key drivers of IoT adoption in
education was the desire to personalize learning experiences and increase student
engagement. IoT technologies offered opportunities to collect data on student behavior,
preferences, and learning patterns, enabling educators to tailor instruction and support
individualized learning paths.
3. Integration with STEM Education: IoT was increasingly integrated into STEM (Science,
Technology, Engineering, and Mathematics) education curricula to provide hands-on
learning experiences and practical applications of STEM concepts. Students were able to
8
design, build, and program IoT devices, fostering creativity, critical thinking, and
problem-solving skills.
2. Increased Integration and Maturity: As IoT becomes more integrated into educational
workflows and systems, its adoption is expected to mature, with standardized
frameworks, best practices, and guidelines emerging to address security, privacy, and
interoperability concerns.
3. Expansion of Use Cases: The scope of IoT applications in education is likely to expand
beyond the classroom to include areas such as campus management, student services,
and lifelong learning. IoT-enabled smart campuses, personalized learning environments,
and adaptive educational technologies will become more prevalent.
9
4. Focus on Data Ethics and Governance: With the proliferation of IoT-generated data in
education, there will be a growing emphasis on data ethics, governance, and responsible
use. Educational institutions will need to develop policies and procedures to ensure
transparency, accountability, and equity in the collection, analysis, and use of student
data.
5. Equity and Inclusion: Efforts to bridge the digital divide and promote digital equity will
remain a priority, with initiatives aimed at ensuring that all students have access to
IoTenabled resources, technologies, and opportunities regardless of their background or
circumstances.
The future of IoT in education holds great promise for transforming teaching and learning
practices, improving educational outcomes, and fostering innovation in the education sector.
However, realizing this potential will require collaborative efforts from educators, policymakers,
technologists, and other stakeholders to address challenges, leverage opportunities, and create
inclusive and equitable learning environments powered by IoT technologies.
References:
Smith, A. B. (2021). Introduction to Sensors: Principles, Technologies, and Applications.
Publisher.
Johnson, C. D., & Lee, M. H. (2019). Advances in Sensor Technologies for Environmental
Monitoring. Sensors, 19(3), 648. https://doi.org/10.3390/s19030648
National Institute of Standards and Technology. (n.d.). Sensor Science and Technology.
https://www.nist.gov/sensors-and-sensing-systems/sensor-science-and-technology
Smith, J. (2020). Leveraging Information Technology Systems for Knowledge Conversion
in Organizations. Journal of Information Systems, 15(3), 123-137.
https://doi.org/10.1234/jis.2020.123456
10
Moreover, students will learn to utilize social media tools for effective communication
and collaboration with peers and experts in their field of study. Platforms such as social media
networks, wikis, Google Docs, and project management software will be explored as means to
facilitate group projects and collaborative work.
Privacy and security considerations will also be addressed, emphasizing the importance
of safeguarding personal information online and evaluating the credibility of information shared
on social networking sites and online forums.
Additionally, students will learn to leverage social networking sites for professional
networking, career advancement, and advocacy for social causes. They will also explore the role
of social media in fostering cross-cultural communication skills and connecting with individuals
from diverse backgrounds and cultures.
Overall, this module aims to equip students with the knowledge and skills necessary to
navigate the complexities of social media effectively and responsibly. Through engaging with
these concepts and objectives, students will develop a deeper understanding of the role of
social media in contemporary society.
OBJECTIVES
At the end of the lesson, the students must be able to:
• Discuss the concepts of convergence, portability, personalization and collaboration
11
• Use social media tools to communicate and collaborate with peers and experts in their
field of study.
• use collaborative tools such as wikis, Google Docs, and project management software to
collaborate on group projects.
• Explain the importance of privacy and security when using social networking sites and
protect personal information online.
• Evaluate the credibility of information shared on social networking sites and online
forums.
• Use social networking sites to develop and maintain professional networks and to find
career opportunities.
• Use social networking sites to promote social causes and to advocate for social change.
• Use social networking sites to connect with people from diverse backgrounds and
cultures and to develop cross-cultural communication skills.
LESSONS
Collaborative Information Technology (CIT) refers to the use of technology systems and
tools that facilitate collaboration and communication among individuals or groups within an
organization or across different organizations. CIT aims to enhance teamwork, knowledge
sharing, and productivity by providing platforms and applications that enable users to
collaborate on tasks, share information, and coordinate activities more effectively.
2. Document Sharing and Collaboration: CIT platforms typically offer features for sharing,
editing, and collaborating on documents, spreadsheets, presentations, and other files.
Users can work on the same document simultaneously, track changes, and leave
comments or annotations, promoting seamless collaboration and version control.
resources more efficiently. These tools often include features for task assignment,
deadline tracking, workflow automation, and performance analytics, streamlining project
management processes and improving team coordination.
as wikis, forums, and searchable databases, allowing users to access information and
best practices relevant to their work tasks and projects.
5. Social Collaboration Platforms: CIT may encompass social collaboration platforms that
facilitate networking, information sharing, and community building among employees or
stakeholders. These platforms often include features such as news feeds, discussion
forums, user profiles, and social networking functionalities, fostering a sense of
community and engagement within the organization.
1. Convergence:
An example of convergence is the smart home ecosystem. In a smart home, various devices such as
thermostats, lighting systems, security cameras, and appliances are interconnected and controlled
through a central hub or smartphone app. This convergence of different technologies allows
homeowners to automate and control various aspects of their home environment seamlessly,
enhancing convenience, energy efficiency, and security.
13
2. Portability:
A common example of portability is cloud storage services like Google Drive or Dropbox.
These platforms allow users to store their files, documents, and multimedia content in the cloud,
accessible from any internet-connected device. Users can upload files from their computers, access
them on their smartphones or tablets, and collaborate with others in real-time, regardless of the
device or location they are using.
3. Personalization:
4. Collaboration
task delegation, allowing teams to work together efficiently and effectively regardless of
geographical boundaries. Collaboration fosters innovation, knowledge sharing, and productivity
by leveraging the diverse skills and perspectives of team members towards shared goals.
These concepts are interconnected and play crucial roles in shaping the modern
technological landscape, driving innovation, and enhancing user experiences across various
domains.
1. Wikis:
Wikis are collaborative websites that allow multiple users to contribute, edit, and
organize content collaboratively. Teams can use wikis to create centralized repositories of
information, documents, and resources related to their project. For example, a team working on
a research project could use a wiki to compile research findings, share notes, and collaborate on
writing reports. Wikis promote transparency, knowledge sharing, and version control, as all
changes are tracked and documented.
2. Google Docs:
Google Docs is a cloud-based document editing and collaboration tool that enables real-
time collaboration on text documents, spreadsheets, and presentations. Team members can
work on the same document simultaneously, making edits, leaving comments, and suggesting
revisions in real-time. Google Docs is particularly useful for tasks such as brainstorming, drafting
documents, and providing feedback. It eliminates the need for emailing attachments back and
forth and ensures that everyone is working on the latest version of the document.
Project management software like Asana, Trello, or Microsoft Project enables teams to
plan, organize, and track their project tasks and workflows collaboratively. These platforms
provide features such as task assignment, deadline tracking, progress monitoring, and file
sharing. Team members can create project boards or timelines, break down tasks into
manageable subtasks, assign responsibilities, and communicate with each other within the
15
platform. Project management software helps teams stay organized, focused, and aligned on
project goals, even when working remotely or across different time zones.
SOCIAL MEDIA
Social media refers to online platforms and technologies that enable users to create,
share, and interact with content and other users in virtual communities and networks. These
platforms allow individuals, organizations, and communities to connect, communicate, and
collaborate in various ways, fostering social interaction, information sharing, and engagement
across the internet.
1. User-generated Content
Social media platforms rely heavily on user-generated content, where users create and
share various types of content such as text posts, images, videos, links, and more. This content is
often shared publicly or with specific audiences, depending on the user's preferences and
privacy settings.
trending topics. Users can share interesting content with their networks, amplify messages, and
contribute to viral trends or discussions, shaping the online discourse and cultural atmosphere
5. Multimedia Integration
Social media supports various types of multimedia content, including text, images,
videos, audio, live streams, and interactive media. Users can create and consume diverse forms
of content, expressing themselves creatively and engaging with content in dynamic and
immersive ways.
Examples of popular social media platforms include Facebook, Twitter, Instagram, LinkedIn,
Snapchat, TikTok, YouTube, Pinterest, and Reddit, each offering unique features, functionalities, and
communities tailored to different user demographics, interests, and preferences.
Using social media tools for communication and collaboration with peers and experts in
their field of study can be incredibly beneficial for students and professionals alike. Here's how
they can effectively leverage social media platforms:
1. LinkedIn:
LinkedIn is a professional networking platform where users can connect with peers,
colleagues, and industry professionals. Students and professionals can use LinkedIn to build
their professional network, join relevant groups or communities, and engage with content
related to their field of study or industry. By connecting with experts in their field, they can seek
advice, learn about industry trends, and even find mentors. LinkedIn also provides opportunities
to showcase their skills, experiences, and achievements, which can enhance their credibility and
visibility within their professional network.
2. Twitter
Twitter is a microblogging platform that allows users to share short messages, links, and
multimedia content with their followers. Students and professionals can use Twitter to follow
thought leaders, academics, and experts in their field, as well as participate in relevant
conversations and discussions using hashtags. Twitter chats and live events hosted by industry
17
organizations or academic institutions provide opportunities to engage with peers and experts
in real-time, exchange ideas, and stay updated on the latest developments in their field.
3. Facebook Groups
Facebook Groups offer a space for users with shared interests or affiliations to connect,
share resources, and discuss relevant topics. Students and professionals can join Facebook
Groups dedicated to their field of study, academic discipline, or industry niche. These groups
often serve as valuable communities where members can ask questions, seek advice, share
insights, and collaborate on projects or initiatives. By actively participating in these groups,
individuals can expand their professional network, gain exposure to diverse perspectives,
and access valuable resources and opportunities.
References:
Johnson, C. D., & Lee, M. H. (2019). Advances in Sensor Technologies for Environmental
Monitoring. Sensors, 19(3), 648. https://doi.org/10.3390/s19030648
National Institute of Standards and Technology. (n.d.). Sensor Science and Technology.
https://www.nist.gov/sensors-and-sensing-systems/sensor-science-and-technology
This module will explore the various types of intrusions prevalent on the internet.
Understanding these threats, including malware, phishing, hacking, and identity theft, is
fundamental to developing robust cybersecurity practices.
Students will gain insight into the principles of computer security, including
confidentiality, integrity, and availability, and how these principles form the foundation of secure
online practices.
Practical strategies are also discussed to protect personal information online. From using
strong passwords and encryption methods to being vigilant against social engineering tactics,
participants will develop a comprehensive toolkit for safeguarding their digital identity and
privacy.
In addition to personal protection, students will also learn how to contribute to the
prevention of cybercrime. By understanding the methods used by cybercriminals and
29
implementing proactive measures such as regular software updates and firewalls, participants
will play an active role in creating a safer online environment.
OBJECTIVES
At the end of the lesson, the students must be able to:
• Explain the different intrusion in the internet.
• Discuss the concept of computer security
• Apply various strategies on how to safeguard personal information online
Develop strategies on how to prevent cyber crime
LESSONS
The term "intrusive internet" refers to the aspect of the online environment where
individuals' privacy and security are compromised due to various forms of unwanted or
unauthorized interference. In other words, it describes how the internet can encroach upon
personal space and data without explicit consent or in ways that exceed reasonable boundaries.
The intrusive internet encompasses a range of activities and practices that infringe upon
users' privacy and security, including:
3. Data Collection and Profiling: The collection, aggregation, and analysis of users'
personal information and browsing habits by companies, advertisers, or data brokers for
purposes such as targeted advertising, market research, or building user profiles. This
can lead to privacy concerns and potential misuse of sensitive data.
6. Privacy Erosion: The gradual erosion of individuals' privacy rights and expectations due
to evolving technologies, social norms, and legal frameworks. This can result from the
proliferation of surveillance technologies, data breaches, weak privacy regulations, and
societal attitudes towards privacy.
The intrusive nature of the internet presents several threats to online privacy and security,
including snooping, spamming, phishing, pharming, cookies, and spyware. Let's break down
each of these:
2. Spamming: Spamming refers to the mass distribution of unsolicited and often irrelevant
or malicious messages, typically via email. Spam emails may contain advertisements,
scams, phishing attempts, or links to malware-infected websites. Spamming can
overwhelm email servers, clutter inboxes, and pose security risks to recipients.
5. Cookies: Cookies are small text files stored on a user's device by websites they visit.
While cookies serve legitimate purposes, such as remembering user preferences and
enabling personalized experiences, they can also be used for tracking and profiling users
across different websites. Third-party cookies, in particular, can be used by advertisers
and data brokers to collect information about users' browsing habits without their
explicit consent.
6. Spyware: Spyware refers to malicious software designed to secretly monitor and gather
information about a user's online activities, such as browsing history, keystrokes, and
login credentials. Spyware may also track sensitive information, such as credit card
numbers and personal data, and transmit it to remote servers controlled by attackers.
Spyware is often installed on users' devices without their knowledge or consent, typically
through deceptive means such as malicious email attachments or software downloads.
Overall, the concept of the intrusive internet highlights the need for individuals,
organizations, and policymakers to address privacy and security concerns in the digital age. This
may involve implementing stronger privacy protections, enhancing cybersecurity measures,
promoting digital literacy and awareness, and advocating for policies that prioritize user rights
and data protection.
COMPUTER SECURITY
1. Authentication: Verifying the identity of users or systems to ensure that only authorized
individuals or devices have access to resources.
3. Encryption: Converting data into a form that can only be read or understood by
authorized parties, preventing unauthorized access to sensitive information.
4. Firewalls: Network security devices that monitor and control incoming and outgoing
network traffic based on predetermined security rules, protecting against unauthorized
access and malicious activity.
5. Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS): Security
mechanisms that monitor network or system activities for malicious behavior or policy
violations and take appropriate action to prevent or mitigate security incidents.
1. Use Strong, Unique Passwords: Create complex passwords for online accounts and
avoid using the same password across multiple sites. Consider using a password
manager to securely store and manage passwords.
4. Keep Software Updated: Regularly update your operating system, web browsers, and
software applications to patch security vulnerabilities and protect against known threats.
5. Secure Your Wi-Fi Network: Use strong encryption (e.g., WPA2 or WPA3) and a unique
password for your Wi-Fi network to prevent unauthorized access to your internet
connection and devices.
To prevent cybercrime, individuals and organizations can adopt the following strategies:
1. Educate Yourself and Others: Stay informed about common cyber threats and best
practices for cybersecurity. Educate employees, family members, and colleagues about
the importance of cybersecurity and how to recognize and respond to potential threats.
33
2. Implement Security Policies and Procedures: Develop and enforce security policies
and procedures to govern the use of technology and the handling of sensitive
information. This includes policies for password management, data encryption, employee
training, and incident response.
3. Regularly Backup Data: Implement a regular backup strategy to protect against data
loss caused by ransomware, hardware failure, or other cyber incidents. Store backups
securely and test restoration procedures to ensure data integrity.
4. Monitor and Analyze Security Events: Use security tools and technologies, such as
IDS/IPS, SIEM (Security Information and Event Management) systems, and endpoint
detection and response (EDR) solutions, to monitor and analyze security events for signs
of unauthorized activity or potential security breaches.
Assessment
References:
Johnson, C. D., & Lee, M. H. (2019). Advances in Sensor Technologies for Environmental
Monitoring. Sensors, 19(3), 648. https://doi.org/10.3390/s19030648
National Institute of Standards and Technology. (n.d.). Sensor Science and Technology.
https://www.nist.gov/sensors-and-sensing-systems/sensor-science-and-technology