0% found this document useful (0 votes)
1 views

EMTECH-REV

The document provides an overview of Information and Communications Technology (ICT), detailing the evolution of the World Wide Web from Web 1.0 to Web 3.0, highlighting key technologies and applications. It discusses trends in ICT, online safety, ethics, and common internet security threats, emphasizing the importance of user awareness and protective measures against online crimes. Additionally, it covers topics such as identity theft, phishing, copyright laws, and the significance of online etiquette.

Uploaded by

kimadrianribon7
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views

EMTECH-REV

The document provides an overview of Information and Communications Technology (ICT), detailing the evolution of the World Wide Web from Web 1.0 to Web 3.0, highlighting key technologies and applications. It discusses trends in ICT, online safety, ethics, and common internet security threats, emphasizing the importance of user awareness and protective measures against online crimes. Additionally, it covers topics such as identity theft, phishing, copyright laws, and the significance of online etiquette.

Uploaded by

kimadrianribon7
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

EMTECH REV - PLAZA

The World Wide Web—commonly referred to


Lesson 1: Introduction to ICT
as WWW, W3, or the Web—is a system of
Global Village interconnected public webpages accessible through
the Internet. The Web is not the same as the Internet:
It is where the world is viewed as a community in which
the Web is one of many applications built on top of the
distance and isolation have been dramatically reduced
Internet.
by electronic media (such as television and the Internet)
URL
ICT
uniform resource locator/link
Sends, edits, receives, locates, and saves data using
Websites
different hardware and software components

connections between single and multiple web pages


Hardware
Web 1.0- Read-only Web/Syntactic Web/Static Web
computers, laptops, cell phones
Software -Did not provide interactive content
programs, productivity tools, mobile applications -Contents and layouts are inseparable. Creation of
contents of the pages is usually done together with the
Applications
programming of the page layout. These are created
Academe
through html.
LMS, Blackboard, Google Classroom, Canvass
E.g.: MySpace, Live Journal, Geo Cities, Wikipedia
Meteorology
Web 2.0- Dynamic Web/Social Web
Collated weather data, anticipate typhoons or storms
Coined by Darcy Danucci in 1999
Health Sciences
Static characteristics of Web 1.0 was just an embryo of
operations and research
the transformation that comes. Major development is
Transportation (Aviation & Maritime)
yet to come. Dynamic pages were born.
computerized radar systems
Visitors can perform tasks beyond what was possible
Commerce and Trade
that includes commenting, creating account, viewing,
analysis, interpretation, and prediction of movements in
sharing, collaborating, and communicating
market and economy
-Social media, social networking site, video sharing sites
Individual level
-user-generated contents such as comments, reviews,
cell phones, social media, SMS, email, Google Drives
and other inputs from the users.
The World Wide Web -It has emphasis on user experience. It allows full
Introduced by Tim Berners-Lee in 1989, and was interactivity with the users
promoted by the WWW Consortium
-Facebook, Twitter, YouTube
Web 3.0- Semantic Web ios
-Apple Inc.; Apple devices
It is still a debate whether the world is at stage now or is
Windows Mobile & Windows Phone OS
it moving towards this phase because some features are
- Microsoft; discontinued because they want to
already evident.
focus on software development
1) It adheres to the minimalist design. BlackBerry OS
-Simple and usable -BlackBerry Limited; a discontinued proprietary
2) It uses the semantic web framework. mobile OS developed by Canadian company
-Stores data on the web for easy access of Web OS
humans and computers. -LG Electronics; smart TV
3) It is an ever-present web Symbian OS
-Shopping is one click away, news is at our -Symbian Software Limited; Samsung, Motorola,
fingertips, stock market are a browse away from Sony Ericson, Nokia
us. 3) Social Media Platforms
4) It applies and uses artificial intelligence a set of internet-based applications build on
-Improves user experience for more streamlined the technological foundations of Web 2.0, and
experience that enable user-generated content to be

LESSON 2 - Trends in Information and Communications created and exchanged.

Technology "Indeed, one key element of Web 2.0 is the social

Technologies that makes life more comfortable and web, which involves several online platforms where

enjoyable people are active participants, pool resources, and


share their perspectives and experiences.”
1) Convergent and Integrated Technologies
Social Media, the Digital Revolution and Business of
Convergent
Media, Kaplan (2015)
meeting of different elements to make up a
Social Network
whole; unified technology (Ex: Smart TV)
-Allows the creation of personal accounts that will
Integrated
be used to connect with people for different
linking; can be detached from the main
purposes.
technology (early versions of computer),
isolated parts Ex: facebook/ linked in

2) Mobile Technologies Bookmarking Sites

smartphones, 4G and 5G technologies, OS -Searches, manages, organizes, and stores web

Android pages that a person wants to revisit or share with

Open Handset Alliance - a consortium of others.

developers; smartphones and tablets; Ex: Pinterest and Delicious


Social News File Management- Zamzar, Word2PDF
Learning Management System- Blackboard,
- Permit the users to submit news articles, stories,
Canvass, Moodle, portals
videos, and photographs that are worth sharing to
Transportation- Grab, Angkas
their subscribers.
E-Commerce- Lazada, Shopee
Ex: Digg, Propeller, YCombinator Hacker News
Contextualized Online Search and Vital Research
Media Sharing Skills
- Allows the users to share and upload multimedia Searching- Can be done for personal, academic, and
contents like graphics, texts, videos, and audios. professional purposes.
Ex: YouTube, IG Open Access Journals- Scholarly articles that is

Microblogging available and reusable worldwide free of charge and

- Allows the users to post and exchange short without restrictions immediately on publication

contents that may include texts, graphics, audios, Different Open Access Journals

and videos using limited characters. ABM - Journal of Small Business Management

Ex: Twitter and Tumblr. HUMSS - Social Sciences and Humanities Open

Blogging STEM - Applied Sciences


MAD - International Journal of Music and
- author-generated content; content is established
Performing Arts
by the author; typically lengthy; Blogger.com
Sports Track – The Sport Journal
4) Assistive Media Vital Research Skills
adaptive and rehabilitative -Be familiar of search engines that you can use in
Ex: mobility aid, hearing aid, voice recognition your online search.
programs, screen readers, screen enlargement, -Keep a record of websites, web pages, and online
closed captioning databases that you can access for specific
Online System information that you need.
- refers to the integrated and collaborative use of -Know the keywords or key phrases of the topic you
software, hardware, and the internet to deliver their are searching online.
intended functions through an identified platforms. -Utilize commercial searching platforms like EBSCO
Online Platforms and PROQUEST whenever possible.
- platforms that has certain functions with the use of -Organized your searched data by keeping them in
internet well-labeled folders of documents in your external
Search Engines- Google Search, Yahoo, Bing or internal storage devices.
Mapping- Google Map, GPS -Create a backup of the files you researched and
Web Creation- Weebly saved.
Cloud Computing- Google Drive, iCloud, Dropbox -Give credit to your sources.
Presentations- Prezi, Zoho, Slideshare
Lesson 2: Ethics on the Internet Forms of Online Crimes >
Reason for online crimes Cyberbullying
-Lack of knowledge RA 10627 – The Anti-Bullying Act of 2013
-Unethical and unsafe practices of internet users. Bullying – “any severe or repeated use by one or
more students of a written, verbal or electronic
Ways to avoid
expression, or a physical act or gesture, or any
-Enough information
combination thereof
-Proper orientation
Online Safety - causing or placing the latter in reasonable fear of
-Also known as e-safety or cyber safety physical, emotional harm or damage to his property
-Refers to the maximization of internet users’
- disrupting the education process.”
knowledge and awareness of safety protocols,
online crimes, and security risks in the private -“covers social bullying aiming to belittle another

property and information which are connected to individual or group or gender-based bullying that

the use of internet. humiliates another on the basis of perceived or


sexual orientation, or gender identity (Dela Cruz,
User’s precautionary measures
2017).” – Sec 3 of IRR, RA 10627
-When someone sets a strong password with letters,
numbers, and symbols, it is deemed strong because Forms of Cyberbullying >

it is uncommon, unpredictable, and is hard to be > Flaming- Online fight using electronic messages

determined. with angry and vulgar languages


> Harassment- Repeatedly sending nasty, mean, and
Online Security
insulting messages.
“Rules that are followed and the actions that are
> Denigration- Sending or posting gossip or rumors
taken to make sure that online users and data
about a person to damage his or her reputation or
privacy are not compromised by cybercriminals.” -
friendships.
Mocan, 2019
> Impersonation or Trickery- Pretending to be
Designed by websites and other internet pages someone else and sending or posting material to get
-Institutions that allows the creation of online that person in trouble or danger or to damage that
accounts among their employees with encryption person’s reputation or friendships.
techniques. Example: When someone is talking to a person to
let him or her reveal his/her secrets or embarrassing
Online Crimes - “Violations that inflict harm to
information and then, shares the sensitive
other people internet users.”
information online.
Be vigilant of possible dangers and harms that may
> Outing- Sharing someone’s secrets or
be inflicted to you.
embarrassing information or images online.
> Exclusion- When one is intentionally or cruelly Prominent sources of data to steal are SSS number,
excluded from an online group. credit card information, bank account number,
> Cyberstalking- Includes monitoring which can be personal information found in licenses and ID cards.
real-time or offline both are motivated by a desire
Situations where Identity theft may happen >
to control, intimidate, or influence a victim. (Oxford
1) Shoulder surfing
University Press)
Done by criminals as you use online communication
Steps to observe when cyberbullying happens:
in public places such as: dialing of phone numbers,
1) Inform a trusted person.
listening over phone conversations to get credit card
Talk to parents, guardians, teachers, or adult whom
information, birthday, or home address.
you trust.
2) Improper disposal of pre-approved credit cards
2) Try not to instigate
Criminals may be able to activate the trashed cards
Try not to fight back with emotions. Ignore but be
at your expense.
proactive.
3) Block connection with the bully. 3) Responding to spam or unsolicited mails.

Unfriend or block them. This will require you to input your personal data.

4) Always be aware The collected data will later be used to steal other

Be aware of how people treat you online. It will give information or to hack your online accounts.

you a hint of how your perpetrators are starting to Tips to be protected from identity theft

victimize you. 1) Use good password.


5) Logout from online accounts A good password is long enough, has mixed type of
Ensure that you have logged out properly as it may characters, and relevant or irrelevant
give the bully the opportunity to instigate the crime. Ex: “MMBI*135
6) Be not a cyberbully.
Password should be SURP
“Do not do to others what you would not want
others to do to you”. Strong – long enough, composed of random letters,
Never bully other netizens. numbers and special characters
Unique – Not related to your other passwords
Identity Theft
Recent – Updated lately
“all types of crimes in which someone wrongfully
Practical – Can be easily remembered
obtains and uses another person’s personal data in
2) Report
some way that involves fraud or deception, typically
Submission of formal complain to the online site or
for economic gain.” – US
right authorities.
Department of Justice
Avail a legal advice and have this raised to the court.
Identity theft has become rampant because of Ex: NBI Cybercrime Division or Public Attorney’s
people who makes their personal data available Office
online.
Phishing Coverage of Copyright Law
“Practice of sending emails purporting to be from Literary
reputable companies in order to induce individuals Musical dramatics
to reveal personal information such as passwords Pantomimes
and credit card numbers.” – Phishing Choreographies
Phishing may camouflage as congratulatory Pictorial
message for winning, generic or urgent mails. Forms of Plagiarism
Ways to be secured from phishing attacks -Verbatim quotation without clear
1) Be scrutinizing of the website that you are acknowledgement
logged in. -Cutting and pasting ideas from the internet without
Some websites scams users by imitating the original proper citation
sites. -Paraphrasing without due acknowledgement of the
2) Be cautious on giving information online. source
Do not provide your birth date, financial data, -Failure to attribute assistance made
passwords, or home address if you are not sure of
Collusion (pakikipagsabwatan) – Secret
the security.
arrangement or cooperation especially for an illegal
3) Be alert with links sent via messages and emails.
or deceitful purpose.
These schemes may steal your personal information.
Autoplagiarism - resubmission of works already
Copyright
submitted
“Legal protection extended to the owner of the
Fair Use-Copyrighting method where citation is not
rights in an original work. “Original work” refers to
necessary or obligated.
intellectual creation in the literary, scientific and
artistic domain.” – IPOPHIL Website Public Domain- Collection of creative works not

Plagiarism subject to copyright.

“Plagiarism is presenting someone else’s work or Instances where works enters the PD

ideas as your own, with or without consent, by -Expired copyrights

incorporating it in your work without full -Creator who had not registered the copyright of

acknowledgement. All published and unpublished his/her work

material whether in manuscript, printed, or -It is a freeware. (Ex: Adobe Reader, Skype)

electronic form- oxford uk -General facts

Copyright Infringement
Occurs when a copyrighted work is reproduced,
distributed, performed, publicly displayed, or made
into a derivative work without the permission of the
copyright owner.” – US Office of Copyright
Common Internet Security Threats Ex: Logging in to an online account that requires
Internet Security Threats password before performing a bank transfer. Then,
-Dangers that are associated with using the internet. an OTP (one-time password) is sent to the
Common Internet Security Threats registered cellphone number of the account owner.
1) Malwares 4) Firewalls
Shortened form of “malicious software”. These are the first line of defense among networks.
Ex: Computer virus and dishonest spyware. It prevents unauthorized access to a network.
2) Worms It allows or denies access to the system
Programs that can replicate themselves from one Ex: Windows Firewall
computer to another in great volume and can Online Ethics
spread themselves rapidly without human Deals with what is good and bad.
intervention. Set of moral principles that can be taken as a
3) Spam guiding philosophy in life.
Unwanted messages, junk emails Issues Related to Internet Ethics
Contains links that will put you at risk. 1) Privacy- Internet users are required to provide
May be connected to malwares that intend to steal data for online transactions.
data. 2) Big Data- Because of the great number of
internet users, big amounts of data are being
4) Phishing
collected.
Created by cybercriminals who intend to elicit
private information from their victims. 3) Net Neutrality- Internet providers should give
Internet Security Strategies equal treatment to all contents that flow in their
1) Browser Selection network!
Browser uses security architecture that protects it 4) Access to the Internet- The Commission on
and its user from varied cyber attacks. Human Rights of the Philippines has acknowledged
Ex: Mozilla Firefox, Microsoft Edge, Apple Safari, that access to internet is a right.
Google Chrome Online Etiquette
2) Email Security Acceptable conduct that adheres to polite behaviors
Use message encryption feature through and respectful manners
cryptography.
Cryptography - practice and study of techniques for
secure communication in the presence of
adversarial (malicious) behavior.
3) Multifactor Authentication
Process by which device access is controlled by
requiring several authentication mechanisms.

You might also like