Uploaded by IANNE EUNICE VALERIO

M1 MAIN

advertisement
MODULE 1:
INFORMATION AND
COMMUNICATION
TECHNOLOGY
INTRODUCTION TO
INFORMATION AND
COMMUNICATION
TECHNOLOGY
Pβ„Žπ‘œπ‘‘π‘œ π‘π‘Ÿπ‘’π‘‘π‘–π‘‘: β„Žπ‘‘π‘‘π‘π‘ ://𝑀𝑀𝑀. π‘šπ‘œπ‘‘1. π‘π‘œ/2019/04/02/3 − π‘‘β„Žπ‘–π‘›π‘”π‘  − π‘Žπ‘π‘œπ‘’π‘‘ − 𝑖𝑐𝑑 − 𝑖𝑑 − π‘’π‘£π‘’π‘Ÿπ‘¦ − 𝑏𝑒𝑠𝑖𝑛𝑒𝑠𝑠 − π‘ β„Žπ‘œπ‘’π‘™π‘‘
At the end of this lesson, the students should be able
to:
1. improve their knowledge on how ICT affects
their everyday lives and the state of our nation;
2. compare and contrast the differences between
online platforms, sites, and content;
3. understand the features of Web 2.0;
4. understand the future of the World Wide Web
through Web 3.0; and
5. learn the different trends in ICT and use them
to their advantage.
"It has become appallingly
obvious that our
technology has exceeded
our humanity."
— Albert Einstein
Information and Communication Technology (ICT) deals
with the use of different communication technologies
such as mobile phones, telephone, Internet, etc. to
locate, save, send and edit information.
 Access to information: Possibly the greatest effect of ICT on individuals is the huge increase in access to
information and services that has accompanied the growth of the Internet. Some of the positive aspects of
this increased access are better, and often cheaper, communications. In addition, the use of ICT to access
information has brought new opportunities for leisure and entertainment, the facility to make contacts and
form relationships with people around the world, and the ability to obtain goods and services from a
wider range of suppliers.
 Improved access to education, e.g. distance learning and on-line tutorials. New ways of learning, e.g.
interactive multi-media and virtual reality. New job opportunities, e.g. flexible and mobile working, virtual
offices and jobs in the communications industry.
 New tools, new opportunities: The second big effect of ICT is that it gives access to new tools that did not
previously exist. A lot of these are tied into the access to information mentioned above, but there are many
examples of stand-alone ICT systems as well:
a) ICT can be used for processes that had previously been out of the reach of most individuals, e.g.
photography, where digital cameras, photo-editing software and high quality printers have enabled people to
produce results that would previously required a photographic studio.
b) ICT can be used to help people overcome disabilities. e.g. screen magnification or screen reading software
enables partially sighted or blind people to work with ordinary text rather than Braille.

Job loss: One of the largest negative effects of ICT can be the loss of a personβ€Ÿs job. This has both
economic consequences, loss of income, and social consequences, loss of status and self
esteem. Job losses may occur for several reasons, including: Manual operations being replaced by
automation. e.g. robots replacing people on an assembly line.Job export. e.g. Data processing work being
sent to other countries where operating costs are lower. Multiple workers being replaced by a smaller number
who are able to do the same amount of work. e.g. A worker on a supermarket checkout can serve more
customers per hour if a bar-code scanner linked to a computerized till is used to detect goods instead of the
worker having to enter the item and price manually.

Reduced personal interaction: Being able to work from home is usually regarded as being a positive
effect of using ICT, but there can be negative aspects as well. Most people need some form of social
interaction in their daily lives and if they do not get the chance to meet and talk with other people they may
feel isolated and unhappy.

Reduced physical activity: A third negative effect of ICT is that users may adopt a more sedentary
lifestyle. This can lead to health problems such as obesity, heart disease, and diabetes. Many countries have
workplace regulations to prevent problems such as repetitive strain injury or eyestrain, but lack of physical
exercise is rarely addressed as a specific health hazard.
 Communication: By using ICT has brought a number of benefits to organizations, such as: Cost savings by
using e.g. VoIP instead of normal telephone, email / messaging instead of post, video conferencing instead of
traveling to meetings, e-commerce web sites instead of sales catalogues. Access to larger, even worldwide,
markets. Web sites can be seen from all parts of the world and orders can be taken wherever there is a
compatible banking system to process payments, e.g. credit / debit card, Pay-Pal, bank transfer facility. Web
sites also have 24 hour opening and are available every day of the year. Flexible response. Organisations with
good communications can respond to changes quickly. This may mean better customer relations, an improved
supply chain for goods and services, faster development of new products to meet a new opportunity, etc.
 Information management: Organizations can benefit from using ICT for information management. e.g. Data
mining of customer information to produce lists for targeted advertising. Improved stock control, resulting in less
wastage, better cash flow, etc.Mangers are better informed and will have more reliable and up-to-date
information on which to base their decisions.
 Security: Although the use of ICT can bring its own security issues, see next section, it can also solve or reduce
some security problems, e.g. Encryption methods can keep data safe from unauthorized people, both while it is
being stored or while it is being sent electronically. This is important for reasons such as data protection
legislation or commercial secrecy. ICT enables physical security systems such as fingerprint, iris or facial
recognition.
 Cost: the cost of using ICT may cause a number of problems for organizations. A lot of ICT hardware and
software is expensive, both to purchase and to maintain. An ICT system usually requires specialist staff to run it
and there is also the challenge of keeping up with ever-changing technology. These extra costs should be
offset by the poitive effects of using ICT, but if an organisation gets its cost-benefit analysis wrong it may lose
money.
 Competition: this is usually thought of as being a good thing, but for some organisations being exposed to
greater competition can be a problem. If the organisation is competing for customers, donations, or other means
of funding nationally or even internationally, they may lose out to other organisations that can offer the same
service for less money.
 Security: this is always a problem for any organisation that uses ICT. Data must be kept secure, Internet
connections must be protected from attack, new viruses and other forms of malware are released nearly every
day.
Organizations will usually have legal obligations to protect data such as customer information.
Even if the organisation does not have to comply with a specific data protection law it will
usually be in the organisation’s interest to protect data from rivals.
Probably the largest effect that ICT use has on on society is
allowing members of society to have greatly increased access
to information.
This can have numerous positive effects, such as:
a) increasing opportunities for education;
b) improving communication; and
c) allowing people to participate in a wider, even worldwide,
society.
Probably the largest effect that ICT use has on on society is
allowing members of society to have greatly increased access to
information. This can have numerous negative effects, such as:
causing a digital divide between those who can access
information and those who cannot, reducing levels of education
and understanding due to the vast amount of incorrect and
misleading information that is available causing moral and
ethical problems due to the nature of some of the material
available.
The positive impact of ICT on education: On the positive side, the use of
ICT in education can provide opportunities that might not otherwise exist,
such as:
1) distance learning, where students can access teaching materials
from all over the world,
2) the ability to perform „impossibleβ€Ÿ experimentsβ€Ÿ by using simulations,
3) the possibility for students to have individual learning programs
within a topic, rather than everybody having to do the same thing at
the same time at the same pace. More able students can be given
more challenging work, less able students can access remedial
lessons.
When the World Wide Web was
invented, most web pages were
static. Static (also known as flat
page or stationary page) in the
sense that the page is “as is”
and cannot be manipulated by
the user. The content is also the
same for all users. This is
referred to as Web 1.0.
Photo credit: https://disenowebakus.net/en/the-web
Web 2.0 is the evolution of Web
1.0 by adding dynamic web
pages—the user is able to see a
website differently than others.
Examples of Web 2.0 include
social networking sites, blogs,
wikis, video sharing sites,
hosted services, and web
applications.
Photo credit: https://disenowebakus.net/en/web-2
Web 2.0 allows users to interact with
the page: instead of just reading a
page, the user may be able to
comment or create a user account.
Web 2.0 also allows users to use web
browsers instead of just using their
operating system. Browsers can now
be used for their user interface,
application
software
(or
web
applications), and even for file
storage.
Photo credit: https://www.ravendigimark.com/blog/what-is-web-2
Most websites that we visit
today are Web 2.0.
 Folksonomy. It allows users to
categorize and classify/arrange
information using freely chosen
keywords (e.g., tagging). Popular
social networking sites such as
Twitter, Instagram, Facebook, etc.
use tags that start with the pound
sign (#).
This is also referred to as hashtag.
Photo credit: https://medium.com/@shiriendamra/folksonomy-a-key-aspect-ofmodern-information-architecture-cac367a3a957
 Rich User Experience. Content is
dynamic and is responsive to userβ€Ÿs
input.
An example would be a website that
shows local content. In the case of
social networking sites, when logged
on, your account is used to modify
what you see in their website.
Photo credit: https://ashwinrk1115.wordpress.com/rich-user-experience/
 Long Tail. Services are offered on
demand rather than on a one-time
purchase. In certain cases, timebased pricing is better than file-sizebased pricing or vice versa. This is
synonymous to subscribing to a data
plan that charges you for the amount
of time you spent in the Internet, or a
data plan that charges you for the
amount of bandwidth you used.
Photo credit: http://www.rogerclarke.com/EC/Web2C.html
 User Participation. The owner of the
website is not the only one who is
able to put content. Others are able
to place a content of their own by
means of comment, reviews, and
evaluation. Some websites allow
readers to comment on an article,
participate in a poll, or review a
specific product (e.g., Amazon.com,
online stores).
Photo credit: https://janetnovakblog.wordpress.com/2016/10/31/leveraging-participatory-culture-within-the-advertising-industry/

Software as a Service. Users will subscribe to a
software only when needed rather than
purchasing them. This is a cheaper option if you
do not always need to use a software. For
instance, Google Docs is a free web-based
application that allows the user to create and edit
word processing and spreadsheet documents
online. When you need a software, like a Word
Processor, you can purchase it for a one-time
huge amount and install it in your computer and it
is yours forever. Software as a service allows you
to “rent” a software for a minimal fee.
Photo credit: https://labs.sogeti.com/salesforce-spotlight-saas-software-as-a-service-companies/
 Mass Participation. It is a diverse
information
sharing
through
universal web access. Since most
users can use the Internet, Web 2.0β€Ÿs
content is based on people from
various cultures.
Photo credit: https://soni1220.wordpress.com/2011/01/26/web-1-0-web-2-0-web-3-0-web-4-0-%E2%80%93-wh
The Semantic Web is a
movement led by the World
Wide Web Consortium (W3C).
The W3C standard
encourages web developers to
include semantic content in
their web pages
Photo credit: https://disenowebakus.net/en/web-3
According to the W3C, “The Semantic
Web provides a common framework that
allows data to be shared and reused
across application, enterprise, and
community boundaries.”
The aim of Web 3.0 is to have
machines (or servers) understand the
userβ€Ÿs preferences to be able to deliver
web content specifically targeting the
user.
Photo credit: https://blockgeeks.com/guides/web-3-0/
Photo credit: https://chamnanvanakit.wordpress.com/2013/08/02/web-1-0-2-0-and-3-0/
1. Compatibility
HTML files and current web browsers could not support Web 3.0.
2. Security
The userβ€Ÿs security is also in question since the machine is saving his or her
preferences.
3. Vastness
The World Wide Web already contains billions of web pages.
4. Vagueness
Certain words are imprecise. The words “old” and “small” would depend on the user.
5. Logic
Since machines use logic, there are certain limitations for a computer to be able to
predict what the user is referring to at a given time.
1. Convergence
Technological convergence is the synergy of
technological advancements to work on a similar goal or
task.
2. Social Media
Social media is a website, application, or online channels
that enable web users to create, co-create, discuss,
modify, and exchange user-generated content.

Social Networks. These are sites that allow you to connect with other people with the same
interests or background.

Bookmarking Sites. These are sites that allow you to store and manage links to various websites
and resources.

Social News. These are sites that allow users to post their own news items or links to other news
sources.

Media Sharing. These are sites that allow you to upload and share media content like images,
music, and video.

Microblogging. These are sites that focus on short updates from the user.

Blogs and Forums. These websites allow users to post their content.
3. Mobile Technologies
The popularity of smartphones and tablets has taken a
major rise over the years. This is largely because of the
devicesβ€Ÿ capability to do tasks that were originally found
in personal computers.
 iOS
 Android
 Blackberry OS
 Windows Phone OS
 Symbian
 WebOS
 Windows Mobile
4. Assistive Media
Assistive media is a nonprofit service designed to help
people who have visual and reading impairments. A
database of audio recordings is used to read to the user.
Do you have any question?
You may go to our conference and
consult!
 Innovative Training Works Inc. (2016) Empowerment Technology
 Rouse M. (n.d) Pharming, retrieved from:
https://searchsecurity.techtarget.com/definition/pharming#:~:text=1)%20Pharming
%20is%20a%20scamming,%22phishing%20without%20a%20lure.%22
 Swinhoe, D. (2018) Keyloggers, retrieved from:
https://www.csoonline.com/article/3326304/what-is-a-keylogger-how-attackers-canmonitor-everything-you-type.html
 Belding, G. (2019) Malware, retrieved from:
https://resources.infosecinstitute.com/topic/malware-spotlight-rogue-securitysoftware/
 Ajahana (2012) The Positive and Negative impacts of ICT, retrieved from:
https://ajahana.wordpress.com/2012/06/27/the-positive-and-negative-impacts-ofict-5/
Rules
of
Netiquette
Photo credit: https://www.lessonplansdigger.com/2015/07/10/5-minute-speaking-activity-net
At the end of this lesson, the students should be able
to:
1. consider one’s and others’ safety when sharing
information using the Internet;
2. consider one’s and others’ reputation when using the
Internet;
3. determine and avoid the dangers of the Internet;
4. be responsible in the use of social networking sites;
and
5. browse the Internet efficiently and properly through
proper referencing.
―What you post online
speaks VOLUME about who
you really are. POST with
intention. REPOST with
caution.β€–
― Germany Kent
The Internet, truly, is a powerful tool. It can be
used to promote your business, gain new
friends, and stay in touch with the old ones.
It is also a source of entertainment. But like most
things in this world, there is always “another side of
the coin.”
The Internet is one of the most dangerous places,
especially if you do not know what you are doing.
1. Malware – stands for malicious software
Types: Virus, Worm, Trojan, Spyware, Adware
2. Spam – unwanted email mostly from bots or
advertisers. It can be used to send malware.
3. Phishing – Its goal is to acquire sensitive personal
information like passwords and credit card details.
Rogue security software refers to a program that induces internet fraud by using security
exploits on a target system to mislead, scare or deceive the user into downloading a
program, either free for by paying money, in exchange for the removal of malware it claims
is on the target system. If the user complies, the result is the installation of more malware.
Sometimes, rogue security software will threaten the user with ransomware if they do
not pay up.
Rogue security software goes by different names, including the following:
• Scareware
• Fraudware
• Rogue scanner
• Rogue antivirus
Keyloggers are a type of monitoring software designed to
record keystrokes made by a user. One of the oldest forms of
cyber threat, these keystroke loggers record the
information you type into a website or application and
send to back to a third party.
Pharming is a scamming practice in which malicious code
is installed on a personal computer or server,
misdirecting users to fraudulent Web sites without their
knowledge or consent. Pharming has been called
"phishing without a lure."
Photo credit: https://www.cbronline.com/what-is/what-is-cybercrime-4898190/
Identity theft is the crime of
obtaining the personal or
financial information of another
person for the sole purposes
of assuming that personβ€Ÿs
name or identity to make
transactions or purchases.
Photo credit: https://i-sight.com/resources/what-is-deepfake-identity-theft/
In criminal identity theft, a
criminal misrepresents himself
as another person during arrest
to try to avoid a summons,
prevent the discovery of a
warrant issued in his real name
or avoid an arrest or conviction
record.
Photo credit: https://www.globallearningsystems.com/tips-for-identifying-and-preventing-id
In medical identity theft,
someone identifies himself as
another person to obtain free
medical care.
Photo credit: https://www.medwastemngmt.com/blog/medical-identity
In financial identity theft,
someone uses another person's
identity or information to obtain
credit, goods, services or
benefits. This is the most
common form of identity theft.
Photo credit: https://www.consumerjungle.org/jungle-talk/-what-is-id-theft-care
In child identity theft, someone uses a
child's identity for various forms of
personal gain. This is common, as
children typically do not have information
associated with them that could pose
obstacles for the perpetrator, who may
use the child's name and Social Security
number to obtain a residence, find
employment.
Photo credit: https://www.noidentitytheft.com/child-identity-theft/
Synthetic identity theft is a
type of fraud in which a criminal
combines real (usually stolen)
and fake information to create a
new identity, which is used to
open fraudulent accounts and
make fraudulent purchases.
Photo credit: https://tnj.com/10-steps-to-recover-if-your-identity-is-stole
Phishing is a cybercrime in which
scammers send a malicious email to
individual(s) or mass users of any
organization by impersonating a known
individual or a business partner or a
service provider.
It is the fraudulent practice of sending
emails purporting to be from reputable
companies in order to induce individuals
to reveal personal information, such as
passwords and credit card numbers.
Photo credit: https://mytechdecisions.com/network-security/university-phishing-attacks-
Appears to come from a wellknown company like Netflix
and asks you to sign in and
correct an issue with your
account.
Links points to a website
pretending to be a company’s
legitimate site and asks for
your log in credentials
TIP: Do not click any links
in the email- directly log in
to your account by typing
the address into your web
browser. If you are unable
to log in, contact service using
official contact information.
Contains a link to what appears
to be shared file on Google
docs, drop box or another file
sharing.
Link points to a page pretending
to be a file-sharing site and
requests you log in.
TIP: Do not click any links in
the email, instead, log in to
your account and find the
shared file by name.
Remember to verify sender
identity and use established
Cloud file sharing services.
Comes from a domain similar to
the DocuSign domain. Link will
prompt you to sign into view the
document, giving attackers
control of your inbox.
TIP: DocuSign never
attaches item in email attachments are likely
malicious.
Instead, access documents
directly at
www.docusign.com.
Contains document presented
as an unpaid invoice and claims
service will be terminated if
invoice is not paid.
TIP: Do not reply to email.
Contact the
vendor/service directly
using official contact
information before
submitting payment.
Appears to come from a popular
delivery service or online retail
and includes delivery notification
with a malicious link or
attachment.
TIP: Do not click links or
open attachments in
unexpected website and
enter the tracking
information or call the
delivery service’s official
phone number.
Appears to come from a
government tax revenue agency.
Claims you are delinquent on
your taxes and provide a means
to the issue before additional
fines or legal actions are
pursued.
Photo credit: https://www.trendmicro.com/vinfo/ph/security/news/cybercrime-and-digital-threats/what-you
Hacking is the gaining of
unauthorized access to data in a
system or computer.
Photo credit: https://www.information-age.com/criminal-computer-hacking-123477
If you create something—an idea, an invention, a
form of literary work, or a research, you have the
right of how it should be used by others. This is
called intellectual property.
1. Before you post something on the web, ask these questions to
yourself: Would you want your parents or grandparents to see it? Would
you want your future boss to see it? Once you post something on the web,
you have no control of who sees your posts.
2. Your friends depend on you to protect their reputation online. Talk to
your friends about this serious responsibility.
3. Set your post to “private.” In this way, search engines will not be able to
scan that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the
one who posted it to pull it down or report it as inappropriate.
Do you have any question?
You may go to our conference and
consult!
 Innovative Training Works Inc. (2016) Empowerment Technology
 Rouse M. (n.d) Pharming, retrieved from:
https://searchsecurity.techtarget.com/definition/pharming#:~:text=1)%20Pharming
%20is%20a%20scamming,%22phishing%20without%20a%20lure.%22
 Swinhoe, D. (2018) Keyloggers, retrieved from:
https://www.csoonline.com/article/3326304/what-is-a-keylogger-how-attackers-canmonitor-everything-you-type.html
 Belding, G. (2019) Malware, retrieved from:
https://resources.infosecinstitute.com/topic/malware-spotlight-rogue-securitysoftware/
 Ajahana (2012) The Positive and Negative impacts of ICT, retrieved from:
https://ajahana.wordpress.com/2012/06/27/the-positive-and-negative-impacts-ofict-5/
Download