0% found this document useful (0 votes)
167 views2 pages

Edsa (People Power Revolution) : - A Summary of Statistics Appear On The Right

The document discusses the role of information and communication technologies in recent history, including major protests in the Philippines enabled by online organizing. It also covers cybercrimes and how to combat them, defining various illegal online acts like phishing, blackmail, and copyright infringement.

Uploaded by

Allyy Binay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
167 views2 pages

Edsa (People Power Revolution) : - A Summary of Statistics Appear On The Right

The document discusses the role of information and communication technologies in recent history, including major protests in the Philippines enabled by online organizing. It also covers cybercrimes and how to combat them, defining various illegal online acts like phishing, blackmail, and copyright infringement.

Uploaded by

Allyy Binay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

The Role of ICT in Recent History Introduction

 EDSA ( PEOPLE POWER REVOLUTION) - Include your group’s mission and vision and a
- A major protest that took place along EDSA brief introduction of your project
from February 22 to 25 1986 involving two
million Filipinos from different sectors. Purpose
 EDSA Dos - Include the reason why this project is worth
- A major protest after prosecutors of former your group and the sponsor’s time, effort, and
president Estrada walked out of the money.
impeachment trial in 2001.
 Million People March Description
- A series of protest that mainly took place in - It involve the sites you are going to produce
Luneta Park from August 22 to 26, 2013. It and purpose of each and how they work in
was fueled by online campaigns. unison.
 Yolanda People Finder
- The people finder was a vital for people Support
across the globe to track the situation of their
- Some concept papers do not specify any
relatives.
amount requested from the sponsor.
Change.org
Contact Information
- A website that contains campaigns for social
- Include information on how the group can be
change.
contacted.
Signing an Online Petition
Monitoring Site Statistics on Different
 Visit change.org Platforms
 Sign up or log in with Face Book
 You can start your own petition but for now Word Press
click an any petition you want under trending
- simple click on My Sites and from there you
petitions.
will see the statistics for your blog
 If it is sign the petition by filling up the
information on the right side of the screen. Face book
 Share the petition on Face Book to promote
it. - a summary of statistics appear on the right
side of your cover photo
Creating a Concept Paper
Overview
Before starting your project, your group should be able
to do the necessary paperwork. This allows experts to - contains the summary of statistics about your page
see if your project is do able over the time frame that
Reach
was given and if it is significant enough to be made
into reality. - overall people or demographic that saw a certain
post
Concept Paper
Demographics
- A document used to convince a panel of
potential funders to help a product, program, - statistics which includes your audience age, location,
or service become a reality. gender, language, and country
Creating Feedback Forms Using Google Forms 2. Investigation- URL tracing and logging are
used by websites to track your unique IP
 Open your browser and go to address
drive.google.com 3. Penalties- more laws are being created and
 Sign in or create an account implemented today. It includes imprisonment.
 On the left hand side of you’re my Drive page,
click New>more>goggle forms Phishing-act of spamming emails
 You will be taken to Google Form’s interface
Spam
 You may now fill out the form with questions
- unwanted emails
Cybercrimes
Blackmail
- illegal acts done through the use of the internet
- act of asking something in return of not showing
1. Phishing/Spoofing- the act of sending multiple
something that could damage someone’s reputation
users in hopes having a number of them
clicking on the links or malwares attached to Hacking
the email
2. Blackmail/Extortion- the act of using the - act of obtaining authorized information
internet to threaten or damage someone’s
reputation to extort money or anything else of Cyber bullying
value
- act of harassment using electronic means
3. Accessing Stored Communication- or hacking.
The act of obtaining unauthorized access to Copyright Infringement
data from a computer network
4. Sports Betting- act of wagering on any sports - act of piracy mainly for financial gain
event over the internet
Encryption
5. Non-Delivery of Merchandise- act of devising
a scheme wherein the culprit posts an item or - the process of converting raw data into code.
services for sale on the internet and once the
transactions have been done, does not really
give the item or service
6. Electronic Harassment- act of anonymously
using the internet to harass, abuse, threaten,
or annoy people. Also an act of cyber bullying
7. Child pornography- act of using the internet to
show child pornography
8. Prostitution- act of using the internet to
engage prostitution
9. Drug trafficking- act of selling illegal
substances using the internet
10. Criminal copyright infringement- act of piracy
 PirateBay-raided due to pirating movies,
music, games, books and other softwares

Combatting Cybercrimes

1. Network security- Before the hacker can get


through the unauthorized files he or she
targeting, the hacker has to get through
several security measures

You might also like