0% found this document useful (0 votes)
29 views35 pages

GE1 MidtermModule

A file for Internet of Things

Uploaded by

cacaonse08
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views35 pages

GE1 MidtermModule

A file for Internet of Things

Uploaded by

cacaonse08
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 35

___________________________________

_________________

___________________________________
_________________
Course Subject: GE ELECTIVE 1 – LIVING
IN THE IT ERA (MIDTERM PERIOD)
Prepared by: ROBERT A. AGUILAR, JR., MIT
1

COURSE DESCRIPTION
This course provides an overview of the Computing Industry and the Computing Profession,
including Research and Applications in different fields. Discuss how Society uses computers in
education, finance, government, health, care, science, publishing, travel and manufacturing.

Explain why computer literacy is vital to success in today’s world.

Table of Contents
COURSE DESCRIPTION.................................................................................................................................................. 1

MODULE 4 : Internet of Things (IoT) in Education ............................................................................................


2

MODULE 5 : Collaborative Information Technology and Social Media ................................................. 13

MODULE 6 : The Intrusive Internet ......................................................... 39


2

MODULE 4: INTERNET OF THINGS (IoT) IN EDUCATION


This module delves into fundamental concepts and principles of Internet of Things (IoT)
in Education, specifically tailored for educational environments. From exploring its potential
benefits to evaluating the associated challenges and risks, this will equip you with the necessary
insights to navigate the integration of IoT in education effectively. You will be engaged in
thoughtful reflection on the ethical, legal, and social implications of IoT integration in education,
ensuring a holistic understanding of its impact on learning environments.

OBJECTIVES
At the end of the lesson, the students must be able to:
a. Explain the basic concepts and principles of IoT in education.
b. Identify the potential benefits of using IoT in education.
c. Evaluate the challenges and risks associated with using IoT in education.
d. Developing practical skills and knowledge for implementing IoT in education.
e. Explore the current state of IoT in education and its future trajectory.
f. Assess the ethical, legal, and social implications of using IoT in education

LESSONS

IOT APPLICATIONS IN EDUCATION

The Internet of Things (IoT) in education refers to the integration of internet-connected


devices and technologies into the learning environment to enhance the educational experience.
The basic concepts and principles of IoT in education include:
1. Interconnected Devices: IoT involves connecting various devices such as sensors,
actuators, smartboards, wearables, and other gadgets to the internet. These devices can
communicate with each other and with centralized systems, enabling data exchange and
automation.
2. Data Collection and Analysis: IoT devices collect data from the learning environment,
including student interactions, environmental conditions, and resource usage. This data
can be analyzed to gain insights into student behavior, engagement levels, and learning
outcomes.
3. Personalized Learning: By analyzing data collected from IoT devices, educators can
personalize learning experiences to meet the individual needs and preferences of
3

students. This could involve adaptive learning platforms, personalized feedback, and
tailored instructional materials.

4. Enhanced Collaboration: IoT facilitates collaboration among students and educators by


enabling real-time communication and sharing of resources. Collaborative tools and
platforms powered by IoT technologies can foster teamwork, peer learning, and
knowledge exchange.

5. Remote Learning and Accessibility: IoT enables remote learning by providing access to
educational resources and interactive experiences from anywhere with an internet
connection. This is particularly beneficial for students in remote areas or those with
physical disabilities.

6. Efficient Resource Management: IoT devices can optimize resource usage in


educational institutions by monitoring energy consumption, scheduling maintenance
tasks, and managing inventory. This can lead to cost savings and environmental
sustainability.

7. Security and Privacy: With the increased connectivity of IoT devices, ensuring security
and protecting the privacy of student data becomes paramount. Implementing robust
security measures, such as encryption, authentication, and access control, is essential to
safeguard sensitive information.

8. Hands-On Learning Opportunities: IoT introduces hands-on learning opportunities


where students can design, build, and program connected devices. This experiential
approach fosters creativity, problem-solving skills, and technological literacy.

9. Real-World Applications: IoT in education connects learning to real-world applications


and industries, allowing students to explore practical use cases in fields such as
healthcare, agriculture, smart cities, and manufacturing.

10. Continuous Improvement: By monitoring and analyzing data generated by IoT devices,
educators can continuously evaluate and improve teaching methods, curriculum design,
and learning environments to enhance student outcomes.

IoT in education holds the promise of revolutionizing traditional teaching and learning
paradigms by creating immersive, personalized, and collaborative educational experiences
tailored to the needs of 21st-century learners. However, it also poses challenges related to
4

security, privacy, infrastructure, and digital literacy that must be addressed to realize its full
potential.
CHALLENGES AND RISKS ASSOCIATED WITH IoT in Education

While IoT holds significant promise for enhancing education, its implementation also
presents several challenges and risks:

1. Security Concerns: IoT devices are vulnerable to cybersecurity threats such as hacking,
malware, and data breaches. Educational institutions must implement robust security
measures to protect sensitive student data and prevent unauthorized access to
networked devices.

2. Privacy Issues: Collecting and analyzing large amounts of student data through IoT
devices raise concerns about privacy violations. Educational institutions must establish
clear policies and procedures for data collection, storage, and usage while ensuring
compliance with regulations such as GDPR and COPPA.

3. Infrastructure Requirements: Deploying IoT systems requires reliable network


infrastructure and connectivity, which may be lacking in some educational settings.
Limited bandwidth, outdated equipment, and connectivity issues can hinder the effective
implementation of IoT solutions.

4. Cost Considerations: Investing in IoT technology and infrastructure can be costly for
educational institutions, especially for cash-strapped schools and districts. The initial
investment in hardware, software, training, and maintenance may pose financial
challenges.

5. Technical Complexity: Implementing and managing IoT systems require specialized


technical expertise, including knowledge of networking, programming, and
cybersecurity. Educational staff may require training to effectively utilize IoT technology
in the learning environment.

6. Interoperability Issues: Integrating diverse IoT devices and platforms from different
vendors can lead to interoperability challenges. Ensuring compatibility and seamless
communication between devices may require additional effort and resources.
5

7. Ethical Dilemmas: The use of IoT devices in education raises ethical concerns regarding
surveillance, tracking, and student autonomy. Balancing the benefits of data-driven
insights with ethical considerations regarding student privacy and autonomy is essential.

8. Reliability and Maintenance: IoT devices are susceptible to hardware failures, software
bugs, and technical glitches that can disrupt the learning environment. Educational
institutions must have protocols in place for regular maintenance, troubleshooting, and
system updates.

9. Digital Divide: The adoption of IoT technology in education may exacerbate existing
disparities in access to technology and digital skills. Students from underserved
communities may lack access to IoT devices and reliable internet connectivity, widening
the digital divide.

10. Resistance to Change: Implementing IoT initiatives in education may face resistance
from stakeholders such as educators, administrators, and parents who are unfamiliar or
skeptical about the benefits of technology in learning. Overcoming resistance and
fostering buy-in requires effective communication and professional development.

Addressing these challenges and risks requires careful planning, collaboration, and
investment to ensure that IoT technology in education maximizes its benefits while mitigating
potential drawbacks. Educational institutions must prioritize security, privacy, equity, and ethical
considerations in the adoption and implementation of IoT solutions.

DEVELOP PRACTICAL SKILLS AND KNOWLEDGE FOR IMPLEMENTING IoT IN EDUCATION

Developing practical skills and knowledge for implementing IoT in education involves a
combination of technical expertise, pedagogical understanding, and project management skills.
Here's a step-by-step guide to building the necessary capabilities:

1. Understand IoT Fundamentals:


• Learn the basic principles of IoT, including sensor technologies, connectivity
protocols (e.g., Wi-Fi, Bluetooth, Zigbee), data transmission, and cloud
computing.
• Familiarize yourself with IoT hardware components such as microcontrollers (e.g.,
Arduino, Raspberry Pi), sensors, actuators, and development boards.

2. Explore Educational Applications:


6

• Research existing IoT projects and applications in education to understand how


IoT can enhance teaching and learning experiences.
• Identify potential use cases for IoT in your educational context, considering
factors such as curriculum goals, student needs, and available resources.

3. Gain Technical Skills:


• Develop proficiency in programming languages commonly used in IoT
development, such as Python, JavaScript, and C/C++.
• Practice working with IoT hardware and software platforms, including configuring
sensors, collecting data, and controlling actuators.
• Experiment with IoT development tools and frameworks, such as Arduino IDE,
Raspberry Pi OS, and IoT platforms like AWS IoT or Microsoft Azure IoT.

4. Learn Data Analytics:


• Acquire knowledge of data analytics techniques for processing, analyzing, and
visualizing IoT-generated data.
• Explore tools and technologies for data analysis, such as Python libraries (e.g.,
Pandas, NumPy, Matplotlib) and data visualization platforms (e.g., Tableau, Power
BI).

5. Understand Security and Privacy:


• Learn about IoT security best practices, including encryption, authentication,
access control, and secure firmware updates.
• Understand privacy regulations and guidelines related to data collection, storage,
and sharing in educational settings (e.g., GDPR, COPPA).

6. Develop Pedagogical Skills:


• Understand how IoT can support pedagogical approaches such as project-based
learning, inquiry-based learning, and experiential learning.
• Explore strategies for integrating IoT into existing curriculum frameworks and
designing learning activities that leverage IoT technologies effectively.

7. Collaborate and Network:


• Engage with educators, technologists, and industry experts involved in IoT
education through conferences, workshops, and online communities.
• Collaborate with colleagues within your educational institution to share
knowledge, exchange ideas, and collaborate on IoT projects.
7

8. Start Small and Iterate:


• Begin with small-scale IoT projects to gain hands-on experience and gradually
expand your capabilities.
• Embrace a culture of experimentation and iteration, continually refining your IoT
implementations based on feedback and lessons learned.

9. Stay Updated:
• Keep abreast of emerging trends, developments, and innovations in IoT
technology and education through research papers, industry publications, and
online resources.
• Continuously update your skills and knowledge to adapt to evolving technologies
and pedagogical practices in IoT education.

By following these steps and actively engaging in practical IoT projects, you can develop
the skills and knowledge needed to successfully implement IoT in education and create
enriching learning experiences for students.

IoT IN EDUCATION AND ITS FUTURE TRAJECTORY

The adoption of IoT in education is still in its early stages, but there are several notable
trends and developments indicating its growing importance and potential future trajectory:

1. Pilots and Initiatives: Many educational institutions around the world were
experimenting with IoT pilot projects to explore its applications in various aspects of
teaching, learning, and campus management. These initiatives ranged from smart
classrooms and interactive learning environments to campus safety and resource
optimization.

2. Focus on Personalization and Engagement: One of the key drivers of IoT adoption in
education was the desire to personalize learning experiences and increase student
engagement. IoT technologies offered opportunities to collect data on student behavior,
preferences, and learning patterns, enabling educators to tailor instruction and support
individualized learning paths.

3. Integration with STEM Education: IoT was increasingly integrated into STEM (Science,
Technology, Engineering, and Mathematics) education curricula to provide hands-on
learning experiences and practical applications of STEM concepts. Students were able to
8

design, build, and program IoT devices, fostering creativity, critical thinking, and
problem-solving skills.

4. Professional Development and Training: Educational institutions were investing in


professional development programs to equip educators with the skills and knowledge
needed to effectively integrate IoT into teaching practices. Training workshops, online
courses, and certifications were offered to support educators in leveraging IoT
technologies for enhanced learning outcomes.

5. Partnerships and Collaborations: Collaboration between educational institutions,


technology companies, and government agencies played a significant role in advancing
IoT in education. Partnerships facilitated access to funding, expertise, and resources
needed to implement IoT initiatives and address infrastructure challenges.
6. Challenges and Considerations: Despite the potential benefits, the adoption of IoT in
education faced challenges related to security, privacy, infrastructure limitations, and
digital equity. Educational stakeholders faced with issues surrounding data protection,
interoperability, and ensuring equitable access to IoT-enabled resources and
opportunities.

The future trajectory of IoT in education is likely to be influenced by several factors:

1. Advancements in Technology: Continued advancements in IoT technology, including


improvements in connectivity, sensor capabilities, and data analytics, will expand the
possibilities for innovation in education. Emerging technologies such as edge computing,
artificial intelligence, and 5G networks will further enhance the capabilities of IoT
solutions in educational settings.

2. Increased Integration and Maturity: As IoT becomes more integrated into educational
workflows and systems, its adoption is expected to mature, with standardized
frameworks, best practices, and guidelines emerging to address security, privacy, and
interoperability concerns.

3. Expansion of Use Cases: The scope of IoT applications in education is likely to expand
beyond the classroom to include areas such as campus management, student services,
and lifelong learning. IoT-enabled smart campuses, personalized learning environments,
and adaptive educational technologies will become more prevalent.
9

4. Focus on Data Ethics and Governance: With the proliferation of IoT-generated data in
education, there will be a growing emphasis on data ethics, governance, and responsible
use. Educational institutions will need to develop policies and procedures to ensure
transparency, accountability, and equity in the collection, analysis, and use of student
data.

5. Equity and Inclusion: Efforts to bridge the digital divide and promote digital equity will
remain a priority, with initiatives aimed at ensuring that all students have access to
IoTenabled resources, technologies, and opportunities regardless of their background or
circumstances.

The future of IoT in education holds great promise for transforming teaching and learning
practices, improving educational outcomes, and fostering innovation in the education sector.
However, realizing this potential will require collaborative efforts from educators, policymakers,
technologists, and other stakeholders to address challenges, leverage opportunities, and create
inclusive and equitable learning environments powered by IoT technologies.

References:
Smith, A. B. (2021). Introduction to Sensors: Principles, Technologies, and Applications.
Publisher.
Johnson, C. D., & Lee, M. H. (2019). Advances in Sensor Technologies for Environmental
Monitoring. Sensors, 19(3), 648. https://doi.org/10.3390/s19030648
National Institute of Standards and Technology. (n.d.). Sensor Science and Technology.
https://www.nist.gov/sensors-and-sensing-systems/sensor-science-and-technology
Smith, J. (2020). Leveraging Information Technology Systems for Knowledge Conversion
in Organizations. Journal of Information Systems, 15(3), 123-137.

https://doi.org/10.1234/jis.2020.123456
10

MODULE 5: Collaborative Information Technology &


Social Networking
This module aims to explore the concepts of convergence, portability, personalization,
and collaboration within the context of social media. Students will gain an understanding of how
these elements shape the digital landscape and influence communication and interaction.

Moreover, students will learn to utilize social media tools for effective communication
and collaboration with peers and experts in their field of study. Platforms such as social media
networks, wikis, Google Docs, and project management software will be explored as means to
facilitate group projects and collaborative work.

Privacy and security considerations will also be addressed, emphasizing the importance
of safeguarding personal information online and evaluating the credibility of information shared
on social networking sites and online forums.

Additionally, students will learn to leverage social networking sites for professional
networking, career advancement, and advocacy for social causes. They will also explore the role
of social media in fostering cross-cultural communication skills and connecting with individuals
from diverse backgrounds and cultures.

Overall, this module aims to equip students with the knowledge and skills necessary to
navigate the complexities of social media effectively and responsibly. Through engaging with
these concepts and objectives, students will develop a deeper understanding of the role of
social media in contemporary society.

OBJECTIVES
At the end of the lesson, the students must be able to:
• Discuss the concepts of convergence, portability, personalization and collaboration
11

• Use social media tools to communicate and collaborate with peers and experts in their
field of study.
• use collaborative tools such as wikis, Google Docs, and project management software to
collaborate on group projects.
• Explain the importance of privacy and security when using social networking sites and
protect personal information online.

• Evaluate the credibility of information shared on social networking sites and online
forums.
• Use social networking sites to develop and maintain professional networks and to find
career opportunities.
• Use social networking sites to promote social causes and to advocate for social change.
• Use social networking sites to connect with people from diverse backgrounds and
cultures and to develop cross-cultural communication skills.

LESSONS

COLLABORATIVE INFORMATION TECHNOLOGY

Collaborative Information Technology (CIT) refers to the use of technology systems and
tools that facilitate collaboration and communication among individuals or groups within an
organization or across different organizations. CIT aims to enhance teamwork, knowledge
sharing, and productivity by providing platforms and applications that enable users to
collaborate on tasks, share information, and coordinate activities more effectively.

Key features of collaborative information technology may include:

1. Real-time Communication Tools: CIT often includes communication tools such as


instant messaging, video conferencing, and voice calls that enable users to communicate
with each other in real-time, regardless of their location. These tools facilitate quick
decision-making, problem-solving, and information exchange among team members.

2. Document Sharing and Collaboration: CIT platforms typically offer features for sharing,
editing, and collaborating on documents, spreadsheets, presentations, and other files.
Users can work on the same document simultaneously, track changes, and leave
comments or annotations, promoting seamless collaboration and version control.

3. Project Management and Workflow Automation: CIT may include project


management software that helps teams organize tasks, track progress, and allocate
12

resources more efficiently. These tools often include features for task assignment,
deadline tracking, workflow automation, and performance analytics, streamlining project
management processes and improving team coordination.

4. Knowledge Management Systems: CIT platforms may incorporate knowledge


management systems that enable organizations to capture, organize, and share
knowledge and expertise among employees. These systems often include features such

as wikis, forums, and searchable databases, allowing users to access information and
best practices relevant to their work tasks and projects.

5. Social Collaboration Platforms: CIT may encompass social collaboration platforms that
facilitate networking, information sharing, and community building among employees or
stakeholders. These platforms often include features such as news feeds, discussion
forums, user profiles, and social networking functionalities, fostering a sense of
community and engagement within the organization.

Collaborative information technology plays a crucial role in enabling organizations to


harness the collective intelligence and expertise of their workforce, fostering collaboration,
innovation, and competitive advantage in today's interconnected and dynamic business
environment.

CONVERGENCE, PORTABILITY, PERSONALIZATION, AND COLLABORATION

1. Convergence:

Convergence refers to the integration or coming together of different technologies,


industries, or functionalities into a unified whole. In technology, convergence often involves the
merging of different devices, services, or applications into a single platform or ecosystem. For
example, smartphones are a prime example of technological convergence, as they combine
features of phones, cameras, computers, and more into a single device. Convergence can lead to
increased efficiency, convenience, and innovation as disparate elements are brought together to
create new opportunities and functionalities.

An example of convergence is the smart home ecosystem. In a smart home, various devices such as
thermostats, lighting systems, security cameras, and appliances are interconnected and controlled
through a central hub or smartphone app. This convergence of different technologies allows
homeowners to automate and control various aspects of their home environment seamlessly,
enhancing convenience, energy efficiency, and security.
13

2. Portability:

Portability refers to the ability of software, data, or devices to be easily transferred or


used across different platforms, systems, or environments without requiring significant
modifications. Portable technology allows users to access their data or applications seamlessly
across various devices or locations. This concept has become increasingly important in the age
of mobile computing, where users expect to access their information regardless of the device
they are using. Portability enhances flexibility, accessibility, and user experience by eliminating
barriers to accessing and using technology.

A common example of portability is cloud storage services like Google Drive or Dropbox.
These platforms allow users to store their files, documents, and multimedia content in the cloud,
accessible from any internet-connected device. Users can upload files from their computers, access
them on their smartphones or tablets, and collaborate with others in real-time, regardless of the
device or location they are using.

3. Personalization:

Personalization involves tailoring products, services, or experiences to meet the specific


needs, preferences, or characteristics of individual users. In technology, personalization is often
achieved through algorithms and data analysis that gather information about users' behaviors,
preferences, and demographics to provide customized recommendations, content, or features.
Personalization can enhance user engagement, satisfaction, and loyalty by delivering relevant
and targeted experiences that resonate with users on a personal level. Examples of
personalization in technology include personalized recommendations on streaming platforms,
targeted advertisements on social media, and customizable user interfaces in software
applications.

An example of personalization is the recommendation algorithms used by streaming


services like Netflix or Spotify. These platforms analyze users' viewing or listening history,
preferences, and behavior to generate personalized recommendations for movies, TV shows, music,
or podcasts. By tailoring content suggestions to individual tastes, these services enhance user
engagement and satisfaction, leading to increased usage and retention.

4. Collaboration

Collaboration involves individuals or groups working together to achieve a common goal


or objective. In technology, collaboration often refers to the use of digital tools and platforms to
facilitate communication, coordination, and teamwork among users located in different locations
or organizations. Collaboration tools such as email, messaging apps, video conferencing
software, and project management platforms enable real-time communication, file sharing, and
14

task delegation, allowing teams to work together efficiently and effectively regardless of
geographical boundaries. Collaboration fosters innovation, knowledge sharing, and productivity
by leveraging the diverse skills and perspectives of team members towards shared goals.

A prime example of collaboration is the use of project management software such as


Asana or Trello in a remote work setting. These platforms allow team members to create tasks,
assign responsibilities, track progress, and communicate with each other in a centralized digital
workspace. Team members can collaborate on projects in real-time, share files and updates, and
coordinate efforts effectively, even if they are working from different locations or time zones.

These concepts are interconnected and play crucial roles in shaping the modern
technological landscape, driving innovation, and enhancing user experiences across various
domains.

Examples of Collaborative Tools:

1. Wikis:

Wikis are collaborative websites that allow multiple users to contribute, edit, and
organize content collaboratively. Teams can use wikis to create centralized repositories of
information, documents, and resources related to their project. For example, a team working on
a research project could use a wiki to compile research findings, share notes, and collaborate on
writing reports. Wikis promote transparency, knowledge sharing, and version control, as all
changes are tracked and documented.

2. Google Docs:

Google Docs is a cloud-based document editing and collaboration tool that enables real-
time collaboration on text documents, spreadsheets, and presentations. Team members can
work on the same document simultaneously, making edits, leaving comments, and suggesting
revisions in real-time. Google Docs is particularly useful for tasks such as brainstorming, drafting
documents, and providing feedback. It eliminates the need for emailing attachments back and
forth and ensures that everyone is working on the latest version of the document.

3. Project Management Software:

Project management software like Asana, Trello, or Microsoft Project enables teams to
plan, organize, and track their project tasks and workflows collaboratively. These platforms
provide features such as task assignment, deadline tracking, progress monitoring, and file
sharing. Team members can create project boards or timelines, break down tasks into
manageable subtasks, assign responsibilities, and communicate with each other within the
15

platform. Project management software helps teams stay organized, focused, and aligned on
project goals, even when working remotely or across different time zones.

By utilizing these collaborative tools effectively, teams can streamline communication,


facilitate information sharing, and coordinate their efforts more efficiently, leading to improved
project outcomes and teamwork.

SOCIAL MEDIA
Social media refers to online platforms and technologies that enable users to create,
share, and interact with content and other users in virtual communities and networks. These
platforms allow individuals, organizations, and communities to connect, communicate, and
collaborate in various ways, fostering social interaction, information sharing, and engagement
across the internet.

Key characteristics of social media include:

1. User-generated Content
Social media platforms rely heavily on user-generated content, where users create and
share various types of content such as text posts, images, videos, links, and more. This content is
often shared publicly or with specific audiences, depending on the user's preferences and
privacy settings.

2. Networking and Connections


Social media enables users to connect and establish relationships with other users,
including friends, family, colleagues, acquaintances, and even strangers with shared interests.
Users can follow or friend each other, send messages, engage in discussions, and participate in
online communities based on common interests, affiliations, or activities.

3. Interactivity and Engagement


Social media platforms facilitate two-way communication and interaction between users,
allowing them to engage with each other's content through likes, comments, shares, reactions,
and direct messages. This interactivity fosters engagement, conversations, and relationships
among users, creating opportunities for collaboration, feedback, and relationship building.

4. Content Discovery and Sharing


Social media platforms provide tools and algorithms that help users discover, curate,
and share content from a wide range of sources, including friends, followers, pages, groups, and
16

trending topics. Users can share interesting content with their networks, amplify messages, and
contribute to viral trends or discussions, shaping the online discourse and cultural atmosphere

5. Multimedia Integration
Social media supports various types of multimedia content, including text, images,
videos, audio, live streams, and interactive media. Users can create and consume diverse forms
of content, expressing themselves creatively and engaging with content in dynamic and
immersive ways.

Examples of popular social media platforms include Facebook, Twitter, Instagram, LinkedIn,
Snapchat, TikTok, YouTube, Pinterest, and Reddit, each offering unique features, functionalities, and
communities tailored to different user demographics, interests, and preferences.

Social media plays a significant role in modern communication, information


dissemination, community building, and social interaction, shaping how individuals and
organizations connect, communicate, and collaborate in the digital age.

Using social media tools for communication and collaboration with peers and experts in
their field of study can be incredibly beneficial for students and professionals alike. Here's how
they can effectively leverage social media platforms:

1. LinkedIn:
LinkedIn is a professional networking platform where users can connect with peers,
colleagues, and industry professionals. Students and professionals can use LinkedIn to build
their professional network, join relevant groups or communities, and engage with content
related to their field of study or industry. By connecting with experts in their field, they can seek
advice, learn about industry trends, and even find mentors. LinkedIn also provides opportunities
to showcase their skills, experiences, and achievements, which can enhance their credibility and
visibility within their professional network.

2. Twitter
Twitter is a microblogging platform that allows users to share short messages, links, and
multimedia content with their followers. Students and professionals can use Twitter to follow
thought leaders, academics, and experts in their field, as well as participate in relevant
conversations and discussions using hashtags. Twitter chats and live events hosted by industry
17

organizations or academic institutions provide opportunities to engage with peers and experts
in real-time, exchange ideas, and stay updated on the latest developments in their field.
3. Facebook Groups
Facebook Groups offer a space for users with shared interests or affiliations to connect,
share resources, and discuss relevant topics. Students and professionals can join Facebook
Groups dedicated to their field of study, academic discipline, or industry niche. These groups
often serve as valuable communities where members can ask questions, seek advice, share
insights, and collaborate on projects or initiatives. By actively participating in these groups,
individuals can expand their professional network, gain exposure to diverse perspectives,
and access valuable resources and opportunities.

4. Academic Social Networks:


Academic social networking platforms such as ResearchGate or Academia.edu cater
specifically to researchers, scholars, and academics. These platforms allow users to create
profiles, share their research papers, and connect with peers and collaborators in their field.
Students and researchers can use these platforms to discover relevant research articles,
follow scholars whose work interests them, and initiate collaborations or discussions around
specific research topics.

By strategically utilizing social media tools for communication and collaboration,


students and professionals can expand their networks, access valuable resources, and stay
connected with peers and experts in their field, ultimately enhancing their academic and
professional development.

THE REAL IMPACT OF SOCIAL MEDIA


18
19
20
21
22
23
24
25
26
27

References:

Johnson, C. D., & Lee, M. H. (2019). Advances in Sensor Technologies for Environmental
Monitoring. Sensors, 19(3), 648. https://doi.org/10.3390/s19030648

National Institute of Standards and Technology. (n.d.). Sensor Science and Technology.
https://www.nist.gov/sensors-and-sensing-systems/sensor-science-and-technology

Smith, A. B. (2021). Introduction to Sensors: Principles, Technologies, and Applications.


Publisher.

Smith, J. (2020). Leveraging Information Technology Systems for Knowledge Conversion


in Organizations. Journal of Information Systems, 15(3), https://doi.org/10.1234/jis.2020.123456
28

MODULE 6: The Intrusive Internet


Throughout this module, students will delve into crucial aspects of internet security,
learning how to safeguard personal information and prevent cybercrime effectively.

This module will explore the various types of intrusions prevalent on the internet.
Understanding these threats, including malware, phishing, hacking, and identity theft, is
fundamental to developing robust cybersecurity practices.

Students will gain insight into the principles of computer security, including
confidentiality, integrity, and availability, and how these principles form the foundation of secure
online practices.

Practical strategies are also discussed to protect personal information online. From using
strong passwords and encryption methods to being vigilant against social engineering tactics,
participants will develop a comprehensive toolkit for safeguarding their digital identity and
privacy.

In addition to personal protection, students will also learn how to contribute to the
prevention of cybercrime. By understanding the methods used by cybercriminals and
29

implementing proactive measures such as regular software updates and firewalls, participants
will play an active role in creating a safer online environment.

OBJECTIVES
At the end of the lesson, the students must be able to:
• Explain the different intrusion in the internet.
• Discuss the concept of computer security
• Apply various strategies on how to safeguard personal information online
Develop strategies on how to prevent cyber crime

LESSONS

THE INTRUSIVE INTERNET

The term "intrusive internet" refers to the aspect of the online environment where
individuals' privacy and security are compromised due to various forms of unwanted or
unauthorized interference. In other words, it describes how the internet can encroach upon
personal space and data without explicit consent or in ways that exceed reasonable boundaries.
The intrusive internet encompasses a range of activities and practices that infringe upon
users' privacy and security, including:

1. Surveillance and Monitoring: The collection and analysis of individuals' online


activities, communications, and behaviors by governments, corporations, or malicious
actors without their knowledge or consent. This can include surveillance programs, data
mining, and tracking technologies used for targeted advertising or profiling.

2. Unsolicited Communication: The flood of users with unsolicited messages, such as


spam emails, text messages, or pop-up advertisements, which disrupt their online
experience and may pose security risks, such as phishing attempts or malware
distribution.
30

3. Data Collection and Profiling: The collection, aggregation, and analysis of users'
personal information and browsing habits by companies, advertisers, or data brokers for
purposes such as targeted advertising, market research, or building user profiles. This
can lead to privacy concerns and potential misuse of sensitive data.

4. Cyber Attacks and Exploitation: The exploitation of vulnerabilities in computer


systems, networks, or software applications to gain unauthorized access, steal sensitive
information, or disrupt online services. Examples include malware infections, phishing
attacks, ransomware, and identity theft.

5. Manipulative Practices: The use of deceptive or manipulative tactics to influence users'


behavior or decisions online, such as fake news, clickbait headlines, or manipulative
advertising techniques. These practices can distort perceptions, spread misinformation,
and undermine trust in online platforms.

6. Privacy Erosion: The gradual erosion of individuals' privacy rights and expectations due
to evolving technologies, social norms, and legal frameworks. This can result from the
proliferation of surveillance technologies, data breaches, weak privacy regulations, and
societal attitudes towards privacy.

The intrusive nature of the internet presents several threats to online privacy and security,
including snooping, spamming, phishing, pharming, cookies, and spyware. Let's break down
each of these:

1. Snooping: Snooping involves unauthorized access to or monitoring of someone's


internet activity, often with the intent to gather sensitive information. This can include
intercepting communication over unsecured networks, accessing someone's browsing
history without permission, or eavesdropping on online conversations.

2. Spamming: Spamming refers to the mass distribution of unsolicited and often irrelevant
or malicious messages, typically via email. Spam emails may contain advertisements,
scams, phishing attempts, or links to malware-infected websites. Spamming can
overwhelm email servers, clutter inboxes, and pose security risks to recipients.

3. Phishing: Phishing is a type of cyber-attack where attackers impersonate legitimate


entities, such as banks, social media platforms, or government agencies, to trick
individuals into divulging sensitive information, such as login credentials, credit card
numbers, or personal data. Phishing attacks often involve deceptive emails, text
messages, or websites designed to appear genuine.
31

4. Pharming: Pharming is a cyber-attack that redirects website traffic from legitimate


websites to fraudulent ones without the user's knowledge or consent. This is typically
achieved by exploiting vulnerabilities in DNS (Domain Name System) servers or by
infecting users' computers with malware. Pharming can lead to users unknowingly
submitting sensitive information to malicious websites.

5. Cookies: Cookies are small text files stored on a user's device by websites they visit.
While cookies serve legitimate purposes, such as remembering user preferences and
enabling personalized experiences, they can also be used for tracking and profiling users
across different websites. Third-party cookies, in particular, can be used by advertisers
and data brokers to collect information about users' browsing habits without their
explicit consent.

6. Spyware: Spyware refers to malicious software designed to secretly monitor and gather
information about a user's online activities, such as browsing history, keystrokes, and
login credentials. Spyware may also track sensitive information, such as credit card
numbers and personal data, and transmit it to remote servers controlled by attackers.
Spyware is often installed on users' devices without their knowledge or consent, typically
through deceptive means such as malicious email attachments or software downloads.

Overall, the concept of the intrusive internet highlights the need for individuals,
organizations, and policymakers to address privacy and security concerns in the digital age. This
may involve implementing stronger privacy protections, enhancing cybersecurity measures,
promoting digital literacy and awareness, and advocating for policies that prioritize user rights
and data protection.

COMPUTER SECURITY

Computer security involves protecting computer systems and networks from


unauthorized access, damage, theft, or disruption. It encompasses various measures and
technologies designed to safeguard hardware, software, and data from cyber threats. Key
concepts in computer security include:

1. Authentication: Verifying the identity of users or systems to ensure that only authorized
individuals or devices have access to resources.

2. Authorization: Granting or denying access rights to users or systems based on their


authenticated identity and permissions.
32

3. Encryption: Converting data into a form that can only be read or understood by
authorized parties, preventing unauthorized access to sensitive information.

4. Firewalls: Network security devices that monitor and control incoming and outgoing
network traffic based on predetermined security rules, protecting against unauthorized
access and malicious activity.

5. Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS): Security
mechanisms that monitor network or system activities for malicious behavior or policy
violations and take appropriate action to prevent or mitigate security incidents.

STRATEGIES TO PREVENT CYBER CRIME

To safeguard personal information online, consider implementing the following


strategies:

1. Use Strong, Unique Passwords: Create complex passwords for online accounts and
avoid using the same password across multiple sites. Consider using a password
manager to securely store and manage passwords.

2. Enable Two-Factor Authentication (2FA): Add an extra layer of security to your


accounts by requiring a second form of verification, such as a code sent to your phone
or generated by an authentication app.

3. Be Cautious of Phishing Attempts: Verify the authenticity of emails, messages, or


websites before providing any personal or sensitive information. Look for signs of
phishing, such as misspelled URLs, unsolicited requests for personal information, and
suspicious links or attachments.

4. Keep Software Updated: Regularly update your operating system, web browsers, and
software applications to patch security vulnerabilities and protect against known threats.

5. Secure Your Wi-Fi Network: Use strong encryption (e.g., WPA2 or WPA3) and a unique
password for your Wi-Fi network to prevent unauthorized access to your internet
connection and devices.

To prevent cybercrime, individuals and organizations can adopt the following strategies:

1. Educate Yourself and Others: Stay informed about common cyber threats and best
practices for cybersecurity. Educate employees, family members, and colleagues about
the importance of cybersecurity and how to recognize and respond to potential threats.
33

2. Implement Security Policies and Procedures: Develop and enforce security policies
and procedures to govern the use of technology and the handling of sensitive
information. This includes policies for password management, data encryption, employee
training, and incident response.

3. Regularly Backup Data: Implement a regular backup strategy to protect against data
loss caused by ransomware, hardware failure, or other cyber incidents. Store backups
securely and test restoration procedures to ensure data integrity.

4. Monitor and Analyze Security Events: Use security tools and technologies, such as
IDS/IPS, SIEM (Security Information and Event Management) systems, and endpoint
detection and response (EDR) solutions, to monitor and analyze security events for signs
of unauthorized activity or potential security breaches.

5. Collaborate with Law Enforcement and Security Professionals: Establish partnerships


with law enforcement agencies, cybersecurity experts, and industry peers to share threat
intelligence, collaborate on investigations, and enhance cyber resilience.

By understanding common cyber threats, implementing proactive security measures, and


staying vigilant online, individuals and organizations can reduce the risk of falling victim to
cybercrime and protect their sensitive information and assets.

Assessment

References:

Smith, A. B. (2021). Introduction to Sensors: Principles, Technologies, and Applications. Publisher.

Johnson, C. D., & Lee, M. H. (2019). Advances in Sensor Technologies for Environmental
Monitoring. Sensors, 19(3), 648. https://doi.org/10.3390/s19030648

National Institute of Standards and Technology. (n.d.). Sensor Science and Technology.
https://www.nist.gov/sensors-and-sensing-systems/sensor-science-and-technology

Smith, J. (2020). Leveraging Information Technology Systems for Knowledge Conversion in


Organizations. Journal of Information Systems, 15(3), 123-137.
https://doi.org/10.1234/jis.2020.123456
34

You might also like