Sunteți pe pagina 1din 54

Empowerment

Technologies
LPU – Davao Junior College
WEB 1.0
WEB 2.0
WEB 3.0
SOCIAL MEDIA
MOBILE MEDIA
ASSISTIVE MEDIA
Technology Convergence

It is an evolution of technological developments that merge into a new


system bringing together different types of applications and media.

It is the single most


important example of
technological convergence.
Facebook
Tumblr
MS PowerPoint
Google Maps
Adobe Photoshop
Google Chrome
YouTube
Blogger
LandBank
Smart Telecommunications
Online Systems, Functions, and
Platforms
INTERNET THREATS
Small Group Discussion
• Leaders will be given the topic to discuss with the groupmates.
• Secretaries will be the in-charge in recording what all other members are
doing during the discussion.
• Secretaries and leaders will rate every member of their group.
• Members will also rate their leaders and secretaries after the activity.
• All members must collaborate with other members in finding resources about
the topic. After which, the group will discuss about it and will prepare a
presentation. All must be in working mode.
Small Group Discussion
• The group will be given a maximum of 1 hr and 30 minutes to discuss and
prepare.
• After the allotted time, each group will share information to the class about
the topics assigned to them.
• The group must submit a fact sheet and prepare a PowerPoint slides for the
presentation and discussion.
• Each group will be given a minimum of 5 minutes and a maximum of 7
minutes to discuss about their topic. Each group must be time conscious.
Every group is required to end within the allotted time.
• The group will choose who will present the group’s output.
Small Group Discussion
• Groups are allowed to go out the classroom in case of difficulty to access the
internet due to poor signal. However, the leaders and secretaries will ensure
that members do not loiter around and do irrelevant and unnecessary things.
Otherwise, quality of group output maybe affected and will eventually affect
the final score.
TOPICS
• SPAM and EMAIL SPOOFING (1)
• Phishing and Pharming (2)
• Computer worm and Trojan Horse (3)
• Spyware and Computer Virus
• Hacking/Cracking
Dangers on the Internet
Email Spam

• AKA Junk mail


• Usually unsolicited commercial email sent from an unknown source with
identical message sent to multiple recipients.
• Usually not dangerous but can be time and space consuming.
• Dangerous ones can carry viruses and other malicious software (Malware)
Dangers on the Internet
Email Spoofing

• It is a deceitful email practice in which the sender address is


changed, so that it would appear to have come from a different
source which is usually someone you know.
• Email spoofing is usually used by spammers to hide the origin of the
spam.
Dangers on the Internet
Phishing

• It is a deceitful practice of trying to get confidential information such


as passwords and usernames, and credit card details by making it
appear as if it comes from a trustworthy source.
• It is usually done through emails or using popular entity such as
Microsoft, Yahoo, Google, Amazon, and financial institutions.
Dangers on the Internet
Pharming

• This is a dangerous hacker attack on a website which directs all traffic to that
website to another fictitious website.
• The main objective is to obtain username and passwords, as well as credit cards ad
financial information, and use these to steal their money electronically or use the
credit cards of the victims.
• It is a major concern of many online banking and electronic commerce transactions.
Dangers on the Internet
Spyware

• A computer program that is installed covertly on a personal computer to


collect information or even take control over the computer without the
knowledge of the user.
• It can monitor and collect information about the user’s internet habits and
practices.
• It can also affect the performance and setting of the computer.
Dangers on the Internet
Computer Worm

• It is a dangerous computer program that replicates itself through a network.


• Some worms delete files, others disrupt the network function.
• It is usually spread through email and running of attachments from suspicious
sources.
• It spreads by exploiting weaknesses in operating systems (but BLESS OS
updates!)
Dangers on the Internet
Trojan Horse

• A malware fronting to perform a good task, but covertly performs


undesirable function with the intention of entering the computer
without the user’s consent.
• It can disable the computer’s defenses, opening it to unauthorized
entry. It can erase data, can corrupt files, allow access to computer,
and
Dangers on the Internet
Computer Virus

• It is a program that duplicates itself and then infects the computer. It


spreads like a biological virus.
• It can be transferred by the use of removable storage media devices.
• Damages may be mild to severe.
Dangers on the Internet
Hacker

• This is a person who is able to enter and control other people’s


computer without authorization.
• Usually vandalizes the victims’ website, steals personal information,
obtains intellectual property, and performs credit card fraud.
• Firewalls are able to prevent entry by hackers.
Other Dangers on the Internet or in Using ICT
tools

Sexting

• Inappropriate photos or text sent via cellphone


Other Dangers on the Internet or in Using ICT
tools

Cyberbullying

• Involves the use of technologies to display behavior that harms


another.
• Through email, instant messaging, text messaging, and social
networking sites, hurtful messages can be posted and shared.
Online Ethics and Etiquette
Avoid plagiarism

• Note all sources in a project. Any material copied from an outside


source, including the Internet, must be cited
• Use quotation marks around sentences or phrases directly copied
from an outside source and cite this information.
Online Ethics and Etiquette
Online Gaming

• Check to see if the game has moderators.


• Do not accept downloads from strangers including cheat programs.
• Be a good sport and what you say online should be appropriate.
Online Ethics and Etiquette
Instant Messaging and E-mail

• Privacy - do not share your password to others


• Unknown – do not open emails or attachments from an unknown
source. Block messages from unknown sources.
• Unsubscribe - scroll to the bottom of the email, ad choose
unsubscribe to be removed from the list of unwanted emails.
Posing Question
• Why do we need to care about online safety , ethics and etiquette?
Republic Act 10175
Electronic Libel and Cybercrime
Prevention Act of 2012

• Provide insights from a legal perspective, regarding online safety.


Debattle
• Each group will face 2 rounds of debattle.
• Every group will have 4 speakers, which will be chosen by the teacher. In the
debattle, each speaker will be given 30 seconds. First speaker will state his
stand in 30 seconds. It will be rebutted by the first speaker by the opposing
team. Rebuttal or presentation of new proposition regarding the topic will be
done by all other speakers.
• Each round will last 4 minutes.
Group activity: Debattle

• Proposition: “Instead of promoting social behavior, internet and


social media promotes disengagement, self-absorption, loneliness,
and sadness.”
Reflection

• Compare and contrast the features of varied online platforms, sites,


and content, and how they achieve specific needs, objectives, or
address challenges in the classroom or that of your community. In a
one whole sheet of yellow pad paper, write down your insights in 350
words.

S-ar putea să vă placă și