Documente Academic
Documente Profesional
Documente Cultură
3 COMPONENTS OF ICT
Information
Communication
Technology
A. INFORMATION- means valuable context that gives meaning and relevance to many people such as name of place, birth date, color,
money, your name, depending on the context. Technically, information is referred as data (once processed in a computer) which is
accurate and timely committed and organized for a purpose. Other writers have defined information as:
“Any potentially useful fact, quantity or value that can be expressed uniquely with exactness. Information is whatever is capable
of causing a human mind to change its opinion about the current state of the real word.”
~ deWatteville and Gilbert 2000
B. COMMUNICATION- refers to the conveying of information between two or more people in different places. Technically,
communication facilitates the communication between individuals and groups using smart phones, features phones, tablets, radio,
television, and all computer based technology.
“A process involving the passing of messages through the use of symbols which all parties in the communication encounter
understand. It involves the exchange of ideas, facts, opinions, attitudes and beliefs between people. It is not a one-way affair.
There must be a sender to transmit the message, and receiver to make appropriate decisions on how the rest of the exchange
should continue.”
~ James, et al., 2004
C. TECHNOLOGY- means of devoting to create new tools to accomplish various tasks in our daily lives. Typically, technology can
be described as a product, processes, organization, models, prototypes, arts and services. Other writers have defined technology as:
“The acquisition, analysis, manipulation, storage and distribution of information; and the design and provision of equipment
and software for these purposes.”
~ deWatteville and Gilbert 2000
Electronic Government (e-Government) is the use of information and communication technology and other web-based technology to enhance
access of information and improve delivery, efficiency and effectiveness of services to the public.
A. Nationwide Operational Assessment of Hazards (NOAH) - DOST’s mobile version of Project NOAH enables Filipinos to access
real time information relevant to weather conditions and disaster preparedness in the palm of their hands (mobile phone) and new
ways of using mobile devices, thereby saving lives and potential economic loss.
B. Mobile Operational System for Emergency (MOSES)- Aims to support the current operations of project NOAH. - Design to help
Local Disaster Risk Reduction Management Council in making decisions concerning the impending disaster, whether to declare
suspension of works or classes in schools or to take evacuation actions in their areas of concern. - It can receive real-time weather and
flood information from PAGASA and Project NOAH. Additionally, it allows users to access weather data such as: temperature,
moisture, and other vital information directly accessible from Doppler radar, water level sensor, and water gauges.
C. iGov Phil - Integrated government Philippine (iGov Phil) - is a joint project of DOST-ICTO and DOST-ASTI, the project aims to
set-up a government-shared network that will facilitate, deployment and integration of mission-critical ICT projects especially those
that deliver common government services. Initially, the following development systems will be targeted for integration: e-Serbisyo
as the single sign-on portal, Unified-Purpose ID (UMID), the Philippines Key Infrastructure (PKI), eBayad and the Philippines
Government Electronic Procurement System (PhilGEPS).
D. e-LGU Projects - Electronic Governance in Local Government Unit (eLGU) Project - is intended to revolutionized local
governance by making the LGUs electronically enabled thereby improving the delivery of public services, promoting transparency in
government transactions and increasing public access to government information services, among others. Some projects are:
E. Electronic Real Property Tax System (eRPTS)
F. Electronic Business Permit and Licensing System (eBPLS)
G. Electronic Treasury Operations Management System (eTOMS)
H. Contact Center ng Bayan (CCB) - is a joint initiative to improve service delivery and reduce red tape in government frontline services.
Through a single number, a citizen can gain access to government services and information, report complaints and ask assistance
through various communication channels.
I. Philippines Community eCenter (CeC) - is a program that seeks to establish new CeCs in municipalities where there are no shared
internet access facilities, transform existing school computer laboratories and internet cages, where feasible, to become CeCs and
enhance and strengthen existing CeCs.
J. E-Government Philippines Health Insurance Corporation (PhilHealth) - Personally Controlled Health Records (PCHR) - The plan
for PhilHealth to release specifications for PCHR to enable a transformation on health data management is expected to recreate a
patient-centric care as well as stimulating a new business sector on health data stewardship. The PCHR will be owned by the patients
and co-managed with their health providers such as hospitals and clinics
K. iPinay Program - The continuing commitment to address the gender ICT gap, by empowering more women with ICTs. We are also
engaging with more local and international partners to provide opportunities for our CeCs in various areas:
A. ASSISTIVE MEDIA- a component under Assistive technology (AT), which is a generic term used to refer to a group of software or
hardware devices by which people with disabilities can access computers.
B. COLLABORATIVE PLATFORMS- A category of business software that adds broad social networking capabilities to work
processes. (Skype, Google Hangouts, GoToMeeting, etc.)
C. CONVERGENT TECHNOLOGIES- An extension of the term convergence which means a “coming together of two or more
disparate disciplines or technologies.”
D. INFORMATION AND COMMUNICATIONS TECHNOLOGY- An umbrella term that includes any communication device or
application, encompassing: radio, television, cellular phones, computer and network hardware and software, satellite systems and
so on, as well as the various services and applications associated with them, such as videoconferencing and distance learning.
E. MOBILE MEDIA- This refers to “media devices such as mobile phones and PDA’s were the primary source of portable media from
which we could obtain information and communicate with one another.”
F. ONLINE SYSTEMS- Online versions of information systems which is “the process of and tools for storing, managing, using and
gathering of data and communications in an organization.”
G. SOCIAL MEDIA- “Are computer-mediated tools that allow people or companies to create, share, or exchange information, career
interests, ideas, and pictures/videos in virtual communities and networks.”
H. WEB 2.0- Describes World Wide Web sites that emphasize user-generated content, usability, and interoperability.
1. FOLKSONOMY- allows the user to categorize and classify information using freely chosen keywords e.g. Tagging by Facebook,
Twitter, use tags that start with the pound sign “#” referred to as HASHTAG.
3. USER PARTICIPATION- The owner of the website is not the only one who is able to put content. Others are able to place a
content of their own by means of comments, reviews and evaluation e.g., lazada.com, amazon.com
4. LONG TAIL- services that are offered on demand rather than on a one-time purchase. Opening a market to everyone that had been
previously been supplied by professionals, firms or an elite.
A market that allows everyone to contribute to supply. Where firms or professionals in a particular area may add a great deal of value,
they are outnumbered by a market that allows everyone to participate.
Example: Amazon.com- one of the world’s most successful e-commerce website, uses the Long Tail theory business model which
has given them massive advantages over their competitors and has made them one of the most powerful and popular sites in the
world.
5. SOFTWARE AS A SERVICE- users will subscribe to a software only when needed rather than purchasing them e.g. Google docs
used to create and edit word processing and spreadsheet.
6. MASS PARTICIPATION- diverse information sharing through universal web access. Web 2.0’s content is based on people from
various cultures.
The next fundamental change in how websites are created and more importantly, how people interact with them
People call it “The Internet of Things” and “Smart home appliances connected to network”.
Also known as Semantic Web
Is like searching for movies and food faster and easier.
Act as a personal assistance, as you search the web, the browser learns what you are interested in.
Approaches:
Every user will have a unique internet profile based on that user’s browsing history
Its foundation will be Application Programming Interface (API)
Its trends is the Web 3.0 Mash-up
-A combination of API and program created by programmer/s
More intelligent (It represents all kinds of contents / data that can be easily understood, no matter which computer/ program is
used)
Mobile Platforms (Web 3.0 frees the user from websites and turns the internet into a repository of useful applications that works on
various kinds of platforms.)
Social Bookmarking (This would give more accurate results as you would be seeing websites which have been voted on by
humans and so your chances of finding better and more relevant websites are increased.)
Artificial Intelligence-
Artificial Intelligence (AI) imitates human behavior.
Is an extension of the web where content expressed can be processed independently by intelligent software agents.
These software agents use specific search criteria from the user to find the perfect content to present on the user screen.
Virtual Games- With the popularity of online games such as League of Legends and virtual worlds some people believe Web 3.0
might set out the foundations for virtual world with building others to interact with.
MOBILE
A wireless handheld device that allows users to make calls and send text messages
Global System of Mobile Communications (GSM) network
Multimedia Messaging Service (MMS)
Short Messaging Service (SMS)
ASSISTIVE MEDIA
Also called as ADAPTIVE TECHNOLOGY
Refers to any product, device or equipment that is used to maintain, increase or improved the functional capabilities of individuals or
with disabilities.
WEB 2.0
It is the “writable” phrase of the World Wide Web with interactive data. Unlike Web 1.0, Web 2.0 facilitates interaction between
web users and sites, so it allows users to interact more freely with each other. Web 2.0 encourages participation, collaboration, and information
sharing. Examples of Web 2.0 applications are YouTube, Wiki, Flickr, Facebook, and so on.
WEB 3.0
It is the “executable” phrase of Word Wide Web with dynamic applications, interactive services, and “machine-to-machine”
interaction. Web 3.0 is a semantic web which refers to the future. In Web 3.0, computers can interpret information like humans and intelligently
generate and distribute useful content tailored to the needs of users. (One example of Web 3.0 is Tivo, a digital video recorder. Its recording
program can search the web and read what it finds to you based on your preferences.)
TRENDS IN ICT
1. CONVERGENT TECHNOLOGIES- Is when the new technologies are created that take over from past technologies and perform
the same task but in a more advance manner.
2. SOCIAL MEDIA- is a website, application or online channel that enables web users to create, discuss, modify and exchange user-
generated contents.
A. SOCIAL NETWORKS- these are sites that allows you to connect with other people with the same interests or
backgrounds. (e.g., Facebook & Google+)
B. BOOKMARKING SITES - these are sites that allows you to store and manage links to various websites and resources.
(StumbleUpon & Pinterest)
C. SOCIAL NEWS- these are sites that allow users to post their own news items or links to other news sources. The users
can also comment on the post and comments may also be ranked. (reddit & dig)
D. MEDIA SHARING- these are sites that allows you to upload and share media content like images, music and video.
E. MICROBLOGGING- these are sites that focusses on short updates from the user. Those subscribed to the user will
receive these updates.
F. BLOGS AND FORUMS- these sites allows users to post their content. Other users are able to comment on the said topic.
MOBILE TECHNOLOGIES
Mobile devices use different Operating Systems:
SAFETY- Protection against random accidents; the condition of being protected from or unlikely to cause danger, risk, or injury.
SECURITY- Protection against intended incidents; the state of being free from danger or threat.
PRIVACY- Freedom from unwanted attention; the state of being free from public attention.
1. Be mindful of what you share online and what site you share it to.
2. Do not accept terms and conditions; read it.
3. Check out the privacy policy page of the website to learn how the website handles the information you share.
4. Know the security features of the social networking site you use. Keeping your profile private, search engines will not be able
to scan your profile.
5. Do not share your password with anyone.
6. Avoid logging-in to public networks/ Wi-Fi. Browsing in “incognito mode (or Private),” a feature of a browser will not protect
you from hackers.
7. Do not talk to strangers whether online or face to face.
8. Never post anything about a future vacation. It is similar to posting, “rob my house at this day.”
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an anti-virus software on your computer. Use only one anti-virus software to avoid conflicts.
12. If you have a Wi-Fi at home, make it a private network by adding a password.
13. Avoid downloading anything from untrusted website. You are most vulnerable in peer-to-peer downloads (torrents) as the
download is most likely not monitored by the site owner.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious e-mails.
TYPES OF MALWARE
A. VIRUS- a malicious program designed to replicate itself and transfer from one computer to another either through the
internet and local networks or data storage like flash drives and CDs.
B. WORM- a malicious program that transfers form one computer to another by any type of means. Often, it uses a
computer network to spread itself.
C. TROJAN- a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC
unprotected and allows hackers to get your information.
D. SPYWARE- a program that runs in the background without you knowing it (thus called “SPY”). It has the ability to
monitor what you are currently doing and typing through key logging. (*Keyloggers)
The Philippine government ensures the welfare of its people in their ICT experiences by enacting various laws and regulations.
There are incidents of theft, scam, phishing, and other activities that victimize Filipino people.
What is BULLYING?
-defined as “severe or repeated use by one or more students of a written, verbal or electronic expression, or a physical
gesture, or any combination thereof, directed to another student that has the effect of actually causing or placing the latter in
reasonable fear of physical or emotional harm or damage to his property.”
- This law includes protection of individuals from bullying through electronic means. Bullying invades an individual’s privacy by
using photos and other information meant to disgrace that individual.
-This law protects an individual from various unwanted online and cyber acts and that may harm or evade one’s privacy and
integrity.
PUNISHABLE ACTS
CYBERCRIME OFFENSES:
Offenses against the confidentiality, integrity and availability of computer data and systems:
1. Illegal Access- The access to the whole or any part of a computer system without right.
2. Illegal Interception- The interception made by technical means without right of any non-public transmission of computer data to,
from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data.
3. Data Interference- The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document,
or electronic data message, without right, including the introduction or transmission of viruses.
4. System Interference- The intentional alteration or reckless hindering or interference with the functioning of a computer or computer
network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic
document, or electronic data message, without right or authority, including the introduction or transmission of viruses.
5. Misuse of Devices
(i) The use, production, sale, procurement, importation, distribution, or otherwise making available without right of:
(aa) A device, including a computer program, designed or adapted primarily for the purpose of committing any of the offenses under
this Act; or
(i) The use, production, sale, procurement, importation, distribution, or otherwise making available without right of:
(bb) A computer password, access code, or similar data by which the whole or any part of a computer system is capable of being
accessed with intent that it be used for the purpose of committing any of the offenses under this Act.
(ii) The possession of an item referred to in paragraphs 5(i) (aa) or (bb) above with intent to use said devices for the purpose of
committing any of the offenses under this section.
6. Cybersquatting- The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive
others from registering the same, if such a domain name is:
(i) Similar, identical, or confusingly similar to an existing trademark registered with the appropriate government agency at the time
of the domain name registration:
(ii) Identical or in any way similar with the name of a person other than the registrant, in case of a personal name; and
(iii) Acquired without right or with intellectual property interests in it.
Example: A cyber squatter could buy Heinz.com if the company hadn't created a website yet, looking to sell the domain to Heinz at a later date
for profit, or use the domain name to attract traffic and generate money through advertising. If a business has a good reputation but
no website, the company either pays the owner of the domain name to transfer the domain or contacts a trademark attorney to start
a lawsuit.
COMPUTER-RELATED OFFENSES
1. Computer-Related Forgery
(i) The input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that
it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly
readable and intelligible; or
(ii) The act of knowingly using computer data which is the product of computer-related forgery as defined herein, for
the purpose of perpetuating a fraudulent or dishonest design.
2. Computer-related Fraud
The unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer
system, causing damage thereby with fraudulent intent: Provided, that if no damage has yet been caused, the penalty
imposable shall be one (1) degree lower.
CONTENT-RELATED OFFENSES
1. Cybersex- The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual
organs or sexual activity, with the aid of a computer system, for favor or consideration.
2. Child Pornography- Refers to any representation, whether visual, audio, or written combination thereof, by electronic, mechanical,
digital, optical, magnetic or any other means, of child engaged or involved in real or simulated explicit sexual activities.
“Explicit Sexual Activity” includes actual or simulated---
(1) sexual intercourse or lascivious act including, but not limited to, contact involving genital to genital, oral to genital, anal to genital,
or oral to anal, whether between persons of the same or opposite sex;
(2) bestiality;
(3) masturbation;
(4) sadistic or masochistic abuse;
(5) lascivious exhibition of the genitals, buttocks, breasts, pubic area and/or anus; or
(6) use of any object or instrument for lascivious acts
The unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti-Child Pornography Act of
2009, committed through a computer system: Provided, that the penalty to be imposed shall be (1) one degree higher than that
provided for in Republic Act No. 9775.
3. Unsolicited Commercial Acts- The transmission of commercial electronic communication with the use of computer system which
seek to advertise, sell, or offer for sale products and services are prohibited unless:
(i) There is prior affirmative consent from the recipient; or
(ii) The primary intent of the communication is for service and/or administrative announcements from the sender to its
existing users, subscribers or customers.
4. Libel- The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through
a computer system or any other similar means which may be devised in the future.
- a false published statement that injures an individual's reputation (as in business) or otherwise exposes him or her to
public contempt.
PENALTIES
Offenses against the confidentiality, integrity, and availability of computer data systems:
1. Illegal Access Computer-related offenses
2. Illegal Interference -Computer-related Forgery
3. Data Interference -Computer-related Fraud
4. System Interference -Computer-related Identity Theft
Any person found guilty of any of the punishable acts enumerated in Sections 4(a) and 4(b) of this Act shall be punished with imprisonment
of prision mayor or a fine of at least Two hundred thousand pesos (PhP200, 000.00) up to a maximum amount commensurate to the damage
incurred or both.
Misuse of Devices- Any person found guilty of the punishable act under Section 4(a)(5) shall be punished with imprisonment of prision mayor
or a fine of not more than Five hundred thousand pesos (PhP500,000.00) or both.
In terms of Illegal Access, Illegal Interference, Data Interference and System Interference. If punishable acts in Section 4(a) are
committed against critical infrastructure, the penalty of reclusion temporal or a fine of at least Five hundred thousand pesos (PhP500,
000.00) up to maximum amount commensurate to the damage incurred or both, shall be imposed.
Cybersex- Any person found guilty of any of the punishable acts enumerated in Section 4(c)(1) of this Act shall be punished with imprisonment
of prision mayor or a fine of at least Two hundred thousand pesos (PhP200,000.00) but not exceeding One million pesos (PhPl,000,000.00) or
both.
Child Pornography- Any person found guilty of any of the punishable acts enumerated in Section 4(c)(2) of this Act shall be punished with
the penalties as enumerated in Republic Act No. 9775 or the "Anti-Child Pornography Act of 2009″: Provided, that the penalty to be imposed
shall be one (1) degree higher than that provided for in Republic Act No. 9775, if committed through a computer system.
Unsolicited Commercial Communications- Any person found guilty of any of the punishable acts enumerated in Section 4(c)(3) shall be
punished with imprisonment of arresto mayor or a fine of at least Fifty thousand pesos (PhP50,000.00) but not exceeding Two hundred fifty
thousand pesos (PhP250,000.00) or both.
ETHICS- moral principles that govern a person's behavior or the conducting of an activity.
ETIQUETTE- proper requirements for social behavior
NET- from the word Internet
NETIQUETTE- proper requirements for social behavior online
Offline Identity- the real you; your family and friends around you know; personal information
Online Identity- the identity that you should use in cyberspace; ideally should be different from your offline identity.
WHAT IS INTERNET?
- The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to
serve billions of users worldwide.
- It is a network of networks that consists of millions of private, public, academic, business, and government networks.
Advantages Disadvantages
- Part of an everyday life - relationship problems
- Unlimited source of information - sense of loneliness and isolation
- Knowledge - depression or general unhappiness
- News - necessity to show yourself in the best way
- “Staying in touch” with people - turning into introverts
- Remote access - neglecting family activities, social events,
- Relationship with physically separated people work, school.
PREVENTION:
- Use Minimal Amount of Social Media - turn off notifications
- Limit Internet Gaming Hour - call people instead of sending messages
- Keep Laptop Away - have an internet area only at home
- Hang Out with Friends or Family - block certain websites
- Pursue Other Hobbies - keep electronic device away from bed
- Make Lists on What to Do Before Browsing - have someone keep an eye on you
- Disconnect Internet on Phone
STRENGTHS WEAKNESSES
Internet researching is faster than other medium. Possibility of leak of someone’s personal information.
Internet researching will save user’s physical distance. There are many incorrect information you can find thus, it
cannot be considered as a reliable source of information.
You can share information with other people quickly. You can possibly get malwares without you knowing it.
Quality of information also better than other medium. Weaknesses include unrecognized bias difficulties in verifying
a writer’s credentials (and therefore the accuracy or pertinence
of the information obtained).
Strength include speed, immediacy, and a complete disregard
for physical distance.
3. Go beyond the surface- Persistence by continuing to pursue information to gain a broad perspective.
6. Use your networks. Using social networks and information tools to gather and share information.
A. Dash/ Minus Symbol (-) - used to remove specific words from Google search results.
If you want Google to exclude a word while searching the web page, use – (minus) before the search. The general
syntax is as follows:
(Keyword to search) -(Keyword to exclude)
Example: news -site:cnn.com
free ebooks -site:ebay.com
*When the words are connected with dash symbols as a phrase, Google will consider it as a normal search query and ignore
considering it as a dash symbol as such. For example, searching: do-it-yourself seo will not restrict any words in the results.
B. Dollar Symbol (&) - Dollar symbol is used to get the products with the price in $ mentioned in the search query.
C. At Symbol (@) - used to find relevant social tags mainly from Twitter and other social platforms having usernames
starting with @.