Sunteți pe pagina 1din 11

E-Tech ICT for Professional Tracks: EMPOWERMENT TECHNOLOGIES

LESSON 1: UNDERSTANDING ICT

What is Information and Communications Technology?


An umbrella term that includes any communication device or application, encompassing: radio, television, cellular phones,
computer and network hardware and software, satellite systems and so on, as well as the various services and applications
associated with them, such as videoconferencing and distance learning.
A technology required for information processing anytime, anywhere.

3 COMPONENTS OF ICT

 Information
 Communication
 Technology

A. INFORMATION- means valuable context that gives meaning and relevance to many people such as name of place, birth date, color,
money, your name, depending on the context. Technically, information is referred as data (once processed in a computer) which is
accurate and timely committed and organized for a purpose. Other writers have defined information as:

“Any potentially useful fact, quantity or value that can be expressed uniquely with exactness. Information is whatever is capable
of causing a human mind to change its opinion about the current state of the real word.”
~ deWatteville and Gilbert 2000

B. COMMUNICATION- refers to the conveying of information between two or more people in different places. Technically,
communication facilitates the communication between individuals and groups using smart phones, features phones, tablets, radio,
television, and all computer based technology.

“A process involving the passing of messages through the use of symbols which all parties in the communication encounter
understand. It involves the exchange of ideas, facts, opinions, attitudes and beliefs between people. It is not a one-way affair.
There must be a sender to transmit the message, and receiver to make appropriate decisions on how the rest of the exchange
should continue.”
~ James, et al., 2004

C. TECHNOLOGY- means of devoting to create new tools to accomplish various tasks in our daily lives. Typically, technology can
be described as a product, processes, organization, models, prototypes, arts and services. Other writers have defined technology as:

“The acquisition, analysis, manipulation, storage and distribution of information; and the design and provision of equipment
and software for these purposes.”
~ deWatteville and Gilbert 2000

LESSON 2: CURRENT STATE OF PHILIPPINE ICT

Electronic Government (e-Government) is the use of information and communication technology and other web-based technology to enhance
access of information and improve delivery, efficiency and effectiveness of services to the public.

ICT PROJECTS IN THE PHILIPPINES


1. Nationwide Operational Assessment of Hazards (NOAH)
2. Mobile Operational System for Emergency (MOSES)
3. Integrated Government Philippines (iGov Phil)
4. Electronic Governance in Local Government Unit Projects (E-LGU Projects)
5. Contact Center ng Bayan (CCB)
6. Philippines Community eCenter CeC Program
7. E-Government Philippines Health Insurance Corporation (PhilHealth) Personally Controlled Health Records (PCHR)
8. iPinay Program

A. Nationwide Operational Assessment of Hazards (NOAH) - DOST’s mobile version of Project NOAH enables Filipinos to access
real time information relevant to weather conditions and disaster preparedness in the palm of their hands (mobile phone) and new
ways of using mobile devices, thereby saving lives and potential economic loss.

B. Mobile Operational System for Emergency (MOSES)- Aims to support the current operations of project NOAH. - Design to help
Local Disaster Risk Reduction Management Council in making decisions concerning the impending disaster, whether to declare
suspension of works or classes in schools or to take evacuation actions in their areas of concern. - It can receive real-time weather and
flood information from PAGASA and Project NOAH. Additionally, it allows users to access weather data such as: temperature,
moisture, and other vital information directly accessible from Doppler radar, water level sensor, and water gauges.
C. iGov Phil - Integrated government Philippine (iGov Phil) - is a joint project of DOST-ICTO and DOST-ASTI, the project aims to
set-up a government-shared network that will facilitate, deployment and integration of mission-critical ICT projects especially those
that deliver common government services. Initially, the following development systems will be targeted for integration: e-Serbisyo
as the single sign-on portal, Unified-Purpose ID (UMID), the Philippines Key Infrastructure (PKI), eBayad and the Philippines
Government Electronic Procurement System (PhilGEPS).

D. e-LGU Projects - Electronic Governance in Local Government Unit (eLGU) Project - is intended to revolutionized local
governance by making the LGUs electronically enabled thereby improving the delivery of public services, promoting transparency in
government transactions and increasing public access to government information services, among others. Some projects are:
E. Electronic Real Property Tax System (eRPTS)
F. Electronic Business Permit and Licensing System (eBPLS)
G. Electronic Treasury Operations Management System (eTOMS)
H. Contact Center ng Bayan (CCB) - is a joint initiative to improve service delivery and reduce red tape in government frontline services.
Through a single number, a citizen can gain access to government services and information, report complaints and ask assistance
through various communication channels.
I. Philippines Community eCenter (CeC) - is a program that seeks to establish new CeCs in municipalities where there are no shared
internet access facilities, transform existing school computer laboratories and internet cages, where feasible, to become CeCs and
enhance and strengthen existing CeCs.

J. E-Government Philippines Health Insurance Corporation (PhilHealth) - Personally Controlled Health Records (PCHR) - The plan
for PhilHealth to release specifications for PCHR to enable a transformation on health data management is expected to recreate a
patient-centric care as well as stimulating a new business sector on health data stewardship. The PCHR will be owned by the patients
and co-managed with their health providers such as hospitals and clinics

K. iPinay Program - The continuing commitment to address the gender ICT gap, by empowering more women with ICTs. We are also
engaging with more local and international partners to provide opportunities for our CeCs in various areas:

 Health information services & telemedicine


 Employment and Livelihood Opportunities
 Linking with Libraries
 Global connection and Exchange with high school
 Tech Age Girls
 Micro-entrepreneurship & Business skills mentoring Community Based on line content development.

ICT IN THE PHILIPPINES HISTORY


A. Ramos Administration: Policies
1994- National Information Technology Plan 2000 (NITP2000)
1994 & 1998- Executive Order 190 s. 1994 (amended by EO 469 in 1998) established the National Information
Technology Council (NITC)
 Directly policy body in ICT matters in the country
 Mandated the designation of Information System Planners in each government agency to take charge
1997- Government-approved IT21 was formulated
 Countries action agenda for year 2000 and behind
 Promoted best practices in ICT governance
 Encouraged outsourcing of government ICT projects to promote ICT growth
1997- Administrative Order 3332: Directives for Government Agencies’ Internet Connectivity
 Aims to connect for greater efficiency in communication and data interchange.
- Government
- Academe
- Industry business sector

B. Estrada Administration: Policies


2000: The Electronic Commerce Act
 Defines the government’s policies on e-commerce and electronic transactions
 Recognize electronic evidence as admissible in court.
2000: Government Information Systems Plan (GISP) 2000 framework (Executive Order 265 s. 2000
 Computerized key frontline and common government services operation.
Created Information Technology and eCommerce Council (ITECC)
 Partnership between public and private sectors for IT and eCommerce matters
- ISP.COM strategy

C. Arroyo Administration: Policies


Placed ICT as a priority in its agenda
 General Appropriations Act of 2004-2010 establishes an e-Government fund as source of funding for mission-
critical, high-impact, cross-agency government ICT projects.
Strengthened Information Technology and eCommerce Council (ITECC which was created by President Estrada.
2004: Commission on ICT (CICT), a de facto DICT
 CICT formulated Philippines IT Roadmap
- Fell short compared to Malaysia’s Wawasan 2020 and Singapore’s iN2015.
(shortly after roadmap was formulated, National Broadband Network (NBN) scandal erupted, consumed greater part of
public attention)

D. Aquino Administration: Policies


Abolished CICT, instead moved IT directives under DOST-ICTO (Information and Communication Technology Office)
Minimized red-tapes for starting a business, tax holidays for business operating in PEZA
May 23, 2016: Signed into law bill creating the Department of Information and Communications Technology or DICT.
 The department will promote ICT development, institutionalize e-Government and manage the country’s ICT
environment.
 The department shall be the primary policy, planning, coordinating, implementing and administrative entity of
the Executive Branch of the government that will plan, develop and promote national ICT development agenda.

E. Duterte Administration: Policies


Open PH to foreign telos to speed up internet connections
Develop national broadband plan for the Philippines.
Creation of NIPC or National ICT Confederation of the Philippines
 Commit to create one million direct jobs and three million indirect jobs in the countryside by 2020.

CHANGES DRIVEN BY ICT


A. Social Interaction
B. Education
C. Marketplace

DIGITAL DIVIDE- A term that refers to the gap between demographics


and regions that have access to modern information and communications
technology, and those that don't or have restricted access. This technology
can include the telephone, television, personal computers and the Internet.

FACTORS TO DIGITAL DIVIDE


Personal Factors
 Income
 Disability
 Education
 Age
Regional Factors
 Censorship
 Infrastructure

Digital Divide typically exists between:


cities and those in rural areas
the educated and the uneducated
socioeconomic groups; and globally
the more and less industrially developed nations

ICT: AN AGENT FOR SOCIAL CHANGE


ICT has been used around the world to effect positive change in society

Internet helps to Effect Positive Change in the Society


A. Citizens Journalism
e.g., immediate reporting of criminal/ illegal or corrupt activities of government officials
B. e-Bayanihan
e.g., disaster response, donations campaign for the needy, etc.
C. Social Media + Arab Spring
e.g., Social Media had played a great role in a series of people’s uprising that happened in the Middle East and Africa that
toppled authoritarian governments.

Advantages Of Internet As A Platform Of Social Change


 Cheap
 Fast
 Efficient
 No territorial boundaries
 Open and Neutral
ICT TOOLS THAT CAN EMPOWER USERS TO MAKE POSITIVE SOCIAL CHANGE

A. ASSISTIVE MEDIA- a component under Assistive technology (AT), which is a generic term used to refer to a group of software or
hardware devices by which people with disabilities can access computers.

B. COLLABORATIVE PLATFORMS- A category of business software that adds broad social networking capabilities to work
processes. (Skype, Google Hangouts, GoToMeeting, etc.)

C. CONVERGENT TECHNOLOGIES- An extension of the term convergence which means a “coming together of two or more
disparate disciplines or technologies.”

D. INFORMATION AND COMMUNICATIONS TECHNOLOGY- An umbrella term that includes any communication device or
application, encompassing: radio, television, cellular phones, computer and network hardware and software, satellite systems and
so on, as well as the various services and applications associated with them, such as videoconferencing and distance learning.

E. MOBILE MEDIA- This refers to “media devices such as mobile phones and PDA’s were the primary source of portable media from
which we could obtain information and communicate with one another.”
F. ONLINE SYSTEMS- Online versions of information systems which is “the process of and tools for storing, managing, using and
gathering of data and communications in an organization.”
G. SOCIAL MEDIA- “Are computer-mediated tools that allow people or companies to create, share, or exchange information, career
interests, ideas, and pictures/videos in virtual communities and networks.”
H. WEB 2.0- Describes World Wide Web sites that emphasize user-generated content, usability, and interoperability.

LESSON 3: EVOLUTION OF WEB 1.0, WEB 2.0 AND WEB 3.0

WHAT IS WEB 2.0?


A collection of applications and technologies that make it easier for people to find information and connect with one another online.

FEATURES OF WEB 2.0

1. FOLKSONOMY- allows the user to categorize and classify information using freely chosen keywords e.g. Tagging by Facebook,
Twitter, use tags that start with the pound sign “#” referred to as HASHTAG.

2. RICH USER EXPERIENCE- Content is dynamic and is responsive to user’s input

3. USER PARTICIPATION- The owner of the website is not the only one who is able to put content. Others are able to place a
content of their own by means of comments, reviews and evaluation e.g., lazada.com, amazon.com

4. LONG TAIL- services that are offered on demand rather than on a one-time purchase. Opening a market to everyone that had been
previously been supplied by professionals, firms or an elite.
A market that allows everyone to contribute to supply. Where firms or professionals in a particular area may add a great deal of value,
they are outnumbered by a market that allows everyone to participate.

Example: Amazon.com- one of the world’s most successful e-commerce website, uses the Long Tail theory business model which
has given them massive advantages over their competitors and has made them one of the most powerful and popular sites in the
world.

5. SOFTWARE AS A SERVICE- users will subscribe to a software only when needed rather than purchasing them e.g. Google docs
used to create and edit word processing and spreadsheet.

6. MASS PARTICIPATION- diverse information sharing through universal web access. Web 2.0’s content is based on people from
various cultures.

3 IDEAS OF WEB 2.0


- Application Platform
- Democratization of the Web
- Distributing Information

1. Using the Web as Application Platform


a. Provides a service rather than a product. e.g., Facebook, Twitter
2. Democratization of the web
a. Refers to the way people access and contribute to the Internet. e.g., Wikis/Wikipedia and YouTube
3. Distributing Information
a. Users will receive updates from any application (games, websites, social media)

WHAT IS WEB 3.O?

 The next fundamental change in how websites are created and more importantly, how people interact with them
 People call it “The Internet of Things” and “Smart home appliances connected to network”.
 Also known as Semantic Web
 Is like searching for movies and food faster and easier.
 Act as a personal assistance, as you search the web, the browser learns what you are interested in.

Approaches:
 Every user will have a unique internet profile based on that user’s browsing history
 Its foundation will be Application Programming Interface (API)
 Its trends is the Web 3.0 Mash-up
-A combination of API and program created by programmer/s
 More intelligent (It represents all kinds of contents / data that can be easily understood, no matter which computer/ program is
used)
 Mobile Platforms (Web 3.0 frees the user from websites and turns the internet into a repository of useful applications that works on
various kinds of platforms.)
 Social Bookmarking (This would give more accurate results as you would be seeing websites which have been voted on by
humans and so your chances of finding better and more relevant websites are increased.)
 Artificial Intelligence-
 Artificial Intelligence (AI) imitates human behavior.
 Is an extension of the web where content expressed can be processed independently by intelligent software agents.
 These software agents use specific search criteria from the user to find the perfect content to present on the user screen.
 Virtual Games- With the popularity of online games such as League of Legends and virtual worlds some people believe Web 3.0
might set out the foundations for virtual world with building others to interact with.

MOBILE
 A wireless handheld device that allows users to make calls and send text messages
 Global System of Mobile Communications (GSM) network
 Multimedia Messaging Service (MMS)
 Short Messaging Service (SMS)

ASSISTIVE MEDIA
 Also called as ADAPTIVE TECHNOLOGY
 Refers to any product, device or equipment that is used to maintain, increase or improved the functional capabilities of individuals or
with disabilities.

TYPES OF ASSISTIVE MEDIA


 Mobility
 Auditory
 Motor Skills
 Blindness

MAJOR DIFFERENCES AMONG WEB 1.0, 2.0 AND 3.0


 WEB 1.0
It is the “readable” phrase of the World Wide Web with flat data. In Web 1.0, there is only limited interaction between sites and web
users. Web 1.0 is simply an information portal where users passively receive information without being given the opportunity to post reviews,
comments, and feedback.

 WEB 2.0
It is the “writable” phrase of the World Wide Web with interactive data. Unlike Web 1.0, Web 2.0 facilitates interaction between
web users and sites, so it allows users to interact more freely with each other. Web 2.0 encourages participation, collaboration, and information
sharing. Examples of Web 2.0 applications are YouTube, Wiki, Flickr, Facebook, and so on.

 WEB 3.0
It is the “executable” phrase of Word Wide Web with dynamic applications, interactive services, and “machine-to-machine”
interaction. Web 3.0 is a semantic web which refers to the future. In Web 3.0, computers can interpret information like humans and intelligently
generate and distribute useful content tailored to the needs of users. (One example of Web 3.0 is Tivo, a digital video recorder. Its recording
program can search the web and read what it finds to you based on your preferences.)

TRENDS IN ICT
1. CONVERGENT TECHNOLOGIES- Is when the new technologies are created that take over from past technologies and perform
the same task but in a more advance manner.
2. SOCIAL MEDIA- is a website, application or online channel that enables web users to create, discuss, modify and exchange user-
generated contents.

A. SOCIAL NETWORKS- these are sites that allows you to connect with other people with the same interests or
backgrounds. (e.g., Facebook & Google+)

B. BOOKMARKING SITES - these are sites that allows you to store and manage links to various websites and resources.
(StumbleUpon & Pinterest)

C. SOCIAL NEWS- these are sites that allow users to post their own news items or links to other news sources. The users
can also comment on the post and comments may also be ranked. (reddit & dig)

D. MEDIA SHARING- these are sites that allows you to upload and share media content like images, music and video.

E. MICROBLOGGING- these are sites that focusses on short updates from the user. Those subscribed to the user will
receive these updates.

F. BLOGS AND FORUMS- these sites allows users to post their content. Other users are able to comment on the said topic.

MOBILE TECHNOLOGIES
Mobile devices use different Operating Systems:

a. IOS- used in Apple Devices such as iPhone & iPad


b. ANDROID- an open source operating system developed by Google. Being open source means several mobile phone
companies use this mobile OS for free.
c. BLACKBERRY OS- used in Blackberry Devices
d. WINDOWS PHONE OS- A closed source and proprietary OS developed by Microsoft
e. SYMBIAN- The original smartphone OS; used by Nokia devices
f. WEB OS- Originally used for smartphones; now used for smart TVs
g. WINDOWS MOBILE PHONE- Developed by Microsoft for smartphones and pocket PCs

LESSON 4: ONLINE SAFETY, SECURITY, ETHICS AND PRIVACY

SAFETY- Protection against random accidents; the condition of being protected from or unlikely to cause danger, risk, or injury.

SECURITY- Protection against intended incidents; the state of being free from danger or threat.

PRIVACY- Freedom from unwanted attention; the state of being free from public attention.

TIPS HOW TO STAY SAFE ONLINE

1. Be mindful of what you share online and what site you share it to.
2. Do not accept terms and conditions; read it.
3. Check out the privacy policy page of the website to learn how the website handles the information you share.
4. Know the security features of the social networking site you use. Keeping your profile private, search engines will not be able
to scan your profile.
5. Do not share your password with anyone.
6. Avoid logging-in to public networks/ Wi-Fi. Browsing in “incognito mode (or Private),” a feature of a browser will not protect
you from hackers.
7. Do not talk to strangers whether online or face to face.
8. Never post anything about a future vacation. It is similar to posting, “rob my house at this day.”
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an anti-virus software on your computer. Use only one anti-virus software to avoid conflicts.
12. If you have a Wi-Fi at home, make it a private network by adding a password.
13. Avoid downloading anything from untrusted website. You are most vulnerable in peer-to-peer downloads (torrents) as the
download is most likely not monitored by the site owner.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious e-mails.

TYPES OF INTERNET THREATS


A. MALWARE
B. SPAM
C. PHISHING

MALWARE- stands for malicious software

TYPES OF MALWARE
A. VIRUS- a malicious program designed to replicate itself and transfer from one computer to another either through the
internet and local networks or data storage like flash drives and CDs.

B. WORM- a malicious program that transfers form one computer to another by any type of means. Often, it uses a
computer network to spread itself.

C. TROJAN- a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC
unprotected and allows hackers to get your information.

D. SPYWARE- a program that runs in the background without you knowing it (thus called “SPY”). It has the ability to
monitor what you are currently doing and typing through key logging. (*Keyloggers)

E. ADWARE- a program designed to send you advertisements, mostly as pop-ups.

PROTECTING REPUTATIONS ONLINE


Copyright Infringement- a violation of an individual or organization's copyright. It describes the unauthorized use of copyrighted
material, such as text, photos, videos, music, software, and other original content. In the computer
industry, copyright violations often refer to software programs and websites.

Ways to avoid Copyright Infringement


1. UNDERSTAND- copyright protects literary works, photographs, paintings, drawings, films, music (and lyrics), choreography
and sculptures but it generally does NOT protect underlying ideas and facts.
2. BE RESPONSIBLE- Even if a material does not say that it is copyrighted, it is not a valid defense against copyright. Be
responsible enough if something has a copyright.
3. BE CREATIVE- Ask yourself whether what you are making is something that come from you or something made from
somebody else’s creativity.
4. KNOW THE LAW- there are some limitations to copyright laws. If you have doubts that what you are doing does not fall under
the policy of fair use, seek permission first.

GOVERNMENT PROVISIONS FOR ONLINE COURTESY AND ETIQUETTE

The Philippine government ensures the welfare of its people in their ICT experiences by enacting various laws and regulations.
There are incidents of theft, scam, phishing, and other activities that victimize Filipino people.

REPUBLIC ACT 10627 OR ANTI-BULLYING ACT OF 2013

What is BULLYING?
-defined as “severe or repeated use by one or more students of a written, verbal or electronic expression, or a physical
gesture, or any combination thereof, directed to another student that has the effect of actually causing or placing the latter in
reasonable fear of physical or emotional harm or damage to his property.”

- This law includes protection of individuals from bullying through electronic means. Bullying invades an individual’s privacy by
using photos and other information meant to disgrace that individual.

REPUBLIC ACT 10175 OR CYBERCRIME PREVENTION ACT OF 2012

-This law protects an individual from various unwanted online and cyber acts and that may harm or evade one’s privacy and
integrity.

PUNISHABLE ACTS
CYBERCRIME OFFENSES:
Offenses against the confidentiality, integrity and availability of computer data and systems:
1. Illegal Access- The access to the whole or any part of a computer system without right.
2. Illegal Interception- The interception made by technical means without right of any non-public transmission of computer data to,
from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data.
3. Data Interference- The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document,
or electronic data message, without right, including the introduction or transmission of viruses.
4. System Interference- The intentional alteration or reckless hindering or interference with the functioning of a computer or computer
network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic
document, or electronic data message, without right or authority, including the introduction or transmission of viruses.
5. Misuse of Devices
(i) The use, production, sale, procurement, importation, distribution, or otherwise making available without right of:

(aa) A device, including a computer program, designed or adapted primarily for the purpose of committing any of the offenses under
this Act; or
(i) The use, production, sale, procurement, importation, distribution, or otherwise making available without right of:
(bb) A computer password, access code, or similar data by which the whole or any part of a computer system is capable of being
accessed with intent that it be used for the purpose of committing any of the offenses under this Act.
(ii) The possession of an item referred to in paragraphs 5(i) (aa) or (bb) above with intent to use said devices for the purpose of
committing any of the offenses under this section.
6. Cybersquatting- The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive
others from registering the same, if such a domain name is:
(i) Similar, identical, or confusingly similar to an existing trademark registered with the appropriate government agency at the time
of the domain name registration:
(ii) Identical or in any way similar with the name of a person other than the registrant, in case of a personal name; and
(iii) Acquired without right or with intellectual property interests in it.

Example: A cyber squatter could buy Heinz.com if the company hadn't created a website yet, looking to sell the domain to Heinz at a later date
for profit, or use the domain name to attract traffic and generate money through advertising. If a business has a good reputation but
no website, the company either pays the owner of the domain name to transfer the domain or contacts a trademark attorney to start
a lawsuit.

COMPUTER-RELATED OFFENSES
1. Computer-Related Forgery
(i) The input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that
it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly
readable and intelligible; or
(ii) The act of knowingly using computer data which is the product of computer-related forgery as defined herein, for
the purpose of perpetuating a fraudulent or dishonest design.
2. Computer-related Fraud
The unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer
system, causing damage thereby with fraudulent intent: Provided, that if no damage has yet been caused, the penalty
imposable shall be one (1) degree lower.

3. Computer-related Identity Theft


The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to
another, whether natural or juridical, without right: Provided, That if no damage has yet been caused, the penalty imposable
shall be one (1) degree lower.

CONTENT-RELATED OFFENSES
1. Cybersex- The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual
organs or sexual activity, with the aid of a computer system, for favor or consideration.
2. Child Pornography- Refers to any representation, whether visual, audio, or written combination thereof, by electronic, mechanical,
digital, optical, magnetic or any other means, of child engaged or involved in real or simulated explicit sexual activities.
“Explicit Sexual Activity” includes actual or simulated---
(1) sexual intercourse or lascivious act including, but not limited to, contact involving genital to genital, oral to genital, anal to genital,
or oral to anal, whether between persons of the same or opposite sex;
(2) bestiality;
(3) masturbation;
(4) sadistic or masochistic abuse;
(5) lascivious exhibition of the genitals, buttocks, breasts, pubic area and/or anus; or
(6) use of any object or instrument for lascivious acts
The unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti-Child Pornography Act of
2009, committed through a computer system: Provided, that the penalty to be imposed shall be (1) one degree higher than that
provided for in Republic Act No. 9775.
3. Unsolicited Commercial Acts- The transmission of commercial electronic communication with the use of computer system which
seek to advertise, sell, or offer for sale products and services are prohibited unless:
(i) There is prior affirmative consent from the recipient; or
(ii) The primary intent of the communication is for service and/or administrative announcements from the sender to its
existing users, subscribers or customers.
4. Libel- The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through
a computer system or any other similar means which may be devised in the future.
- a false published statement that injures an individual's reputation (as in business) or otherwise exposes him or her to
public contempt.

PENALTIES

Offenses against the confidentiality, integrity, and availability of computer data systems:
1. Illegal Access Computer-related offenses
2. Illegal Interference -Computer-related Forgery
3. Data Interference -Computer-related Fraud
4. System Interference -Computer-related Identity Theft

Any person found guilty of any of the punishable acts enumerated in Sections 4(a) and 4(b) of this Act shall be punished with imprisonment
of prision mayor or a fine of at least Two hundred thousand pesos (PhP200, 000.00) up to a maximum amount commensurate to the damage
incurred or both.
Misuse of Devices- Any person found guilty of the punishable act under Section 4(a)(5) shall be punished with imprisonment of prision mayor
or a fine of not more than Five hundred thousand pesos (PhP500,000.00) or both.

In terms of Illegal Access, Illegal Interference, Data Interference and System Interference. If punishable acts in Section 4(a) are
committed against critical infrastructure, the penalty of reclusion temporal or a fine of at least Five hundred thousand pesos (PhP500,
000.00) up to maximum amount commensurate to the damage incurred or both, shall be imposed.

Cybersex- Any person found guilty of any of the punishable acts enumerated in Section 4(c)(1) of this Act shall be punished with imprisonment
of prision mayor or a fine of at least Two hundred thousand pesos (PhP200,000.00) but not exceeding One million pesos (PhPl,000,000.00) or
both.

Child Pornography- Any person found guilty of any of the punishable acts enumerated in Section 4(c)(2) of this Act shall be punished with
the penalties as enumerated in Republic Act No. 9775 or the "Anti-Child Pornography Act of 2009″: Provided, that the penalty to be imposed
shall be one (1) degree higher than that provided for in Republic Act No. 9775, if committed through a computer system.

Unsolicited Commercial Communications- Any person found guilty of any of the punishable acts enumerated in Section 4(c)(3) shall be
punished with imprisonment of arresto mayor or a fine of at least Fifty thousand pesos (PhP50,000.00) but not exceeding Two hundred fifty
thousand pesos (PhP250,000.00) or both.

ONLINE ETHICS AND ETIQUETTE

ETHICS- moral principles that govern a person's behavior or the conducting of an activity.
ETIQUETTE- proper requirements for social behavior
NET- from the word Internet
NETIQUETTE- proper requirements for social behavior online

Offline Identity- the real you; your family and friends around you know; personal information
Online Identity- the identity that you should use in cyberspace; ideally should be different from your offline identity.

LESSON 5: WHAT IS INTERNET? ADVANTAGES, DISADVANTAGES OF USING THE INTERNET

WHAT IS INTERNET?
- The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to
serve billions of users worldwide.
- It is a network of networks that consists of millions of private, public, academic, business, and government networks.

Advantages Disadvantages
- Part of an everyday life - relationship problems
- Unlimited source of information - sense of loneliness and isolation
- Knowledge - depression or general unhappiness
- News - necessity to show yourself in the best way
- “Staying in touch” with people - turning into introverts
- Remote access - neglecting family activities, social events,
- Relationship with physically separated people work, school.

INTERNET ADDICTION DISORDER (IAD)


- Internet addiction disorder (IAD) is excessive computer use that interferes with daily life.
- IAD was originally proposed as a disorder by Ivan Goldberg in 1995.
- He took pathological gambling as diagnosed by the Diagnostic and Statistical Manual of Mental Disorders (DSM-IV) as his
model for the description of IAD.

TYPES OF INTERNET ADDICTION DISORDER


1. Cybersex Addiction- This type of Internet addiction involves online porn, adult websites. Sexual fantasy chat rooms, web cams with
XXX ratings, and other sexual related activities online. When these activities interfere with real world sexual or romantic relationships
or they are used excessively then this becomes a problem and treatment is usually needed.
2. Computer Addiction- If you have computer addiction then online addiction help is not needed but treatment for compulsive behavior
is. When you use the computer excessively for offline activities that may include games then you could suffer from a type of obsession
compulsion or other disorder that needs to be accurately diagnosed and resolved.
3. Addiction to Cyber Relationships- With this type of Internet addiction the relationships formed online may not be sexual in nature
but they can still be destructive and have negative consequences on your life. You may reach a point where your online social
connections are more important than the real ties with friends and family in the actual world.
4. Information Addiction- This type of addiction means that you do need online addiction help. You may find yourself surfing the web
and looking up information constantly, and this can cause information overload.
5. Online Compulsions- These are Internet addiction issues that are compulsive in nature. Online gambling, trading stocks, or even
buying things from websites and auction sites like eBay can point to online compulsions that need to be addressed. Many people find
that compulsive shopping is a big issue and it may be hard to resist the impulse to make a purchase or place a bet.
SYMPTOMS: CONSEQUENCES
- constantly thinking and talking about Internet - Social isolation
- not being able to limit time online - Family discord
- prefer online communication rather than real one, etc. - Divorce
- decline in study habits, - Job loss
- significant drop in grades - Sleep deprivation
- missed classes - Dry eyes, etc.

PREVENTION:
- Use Minimal Amount of Social Media - turn off notifications
- Limit Internet Gaming Hour - call people instead of sending messages
- Keep Laptop Away - have an internet area only at home
- Hang Out with Friends or Family - block certain websites
- Pursue Other Hobbies - keep electronic device away from bed
- Make Lists on What to Do Before Browsing - have someone keep an eye on you
- Disconnect Internet on Phone

LESSON 7: ONLINE SEARCH AND RESEARCH SKILLS


Research needs and requirements vary with each assignment, project or paper. Although there is no single “right” way
to conduct research, certain methods and skills can make your research efforts more efficient and effective. Research is the
easiest way to use when you do your assignment it can make your assignment done easily.

What is Internet Research?


- Internet research has a profound impact on the way ideas are formed and knowledge is created.
- Internet search is distinct form library research.
- It is the systematic investigation into and study of materials and sources in order to establish facts and reach new
conclusions.

Internet Research’s Strengths and Weaknesses

STRENGTHS WEAKNESSES
Internet researching is faster than other medium. Possibility of leak of someone’s personal information.
Internet researching will save user’s physical distance. There are many incorrect information you can find thus, it
cannot be considered as a reliable source of information.
You can share information with other people quickly. You can possibly get malwares without you knowing it.
Quality of information also better than other medium. Weaknesses include unrecognized bias difficulties in verifying
a writer’s credentials (and therefore the accuracy or pertinence
of the information obtained).
Strength include speed, immediacy, and a complete disregard
for physical distance.

6 ONLINE RESEARCH SKILLS


1. Check your Sources
-Evaluating Web Resources
-Currency -Accuracy
-Authority -Objectivity
-Coverage

2. Ask Good Questions


-“The answers you get in the literature depend on the questions you pose.” Margaret Atwood

3. Go beyond the surface- Persistence by continuing to pursue information to gain a broad perspective.

4. Be patient. Display emotional resilience by persisting in information searching despite challenges.

5. Respect ownership. Respecting intellectual property rights of creators and producers.

6. Use your networks. Using social networks and information tools to gather and share information.

TIPS IN CONDUCTING ONLINE RESEARCH


1. Have a question in mind
2. Narrow it down
3. Advanced Search- Allows you to filter out information you do not need

GOOGLE SEARCH SYMBOLS

A. Dash/ Minus Symbol (-) - used to remove specific words from Google search results.
If you want Google to exclude a word while searching the web page, use – (minus) before the search. The general
syntax is as follows:
(Keyword to search) -(Keyword to exclude)
Example: news -site:cnn.com
free ebooks -site:ebay.com
*When the words are connected with dash symbols as a phrase, Google will consider it as a normal search query and ignore
considering it as a dash symbol as such. For example, searching: do-it-yourself seo will not restrict any words in the results.

B. Dollar Symbol (&) - Dollar symbol is used to get the products with the price in $ mentioned in the search query.
C. At Symbol (@) - used to find relevant social tags mainly from Twitter and other social platforms having usernames
starting with @.

S-ar putea să vă placă și