Uploaded by Andrea Francesca Dorupa

Reviewer-STS-Module-4

advertisement
James Robert Messenger - Father of the information age,
● “The Information Age is a truly new age based upon the interrelationship of computers
via telecommunications. With these information structures operating on both real time
and as needed basis. Furthermore, the primary factors driving this new age forward are
convenience and user friendliness, which, in turn, will create user dependence.”
Internet
Beneficial Effect: allowed people to gather and share information in just one click. It also
improves education quality, provides effective communication, and offers a progressive
approach in our daily lifestyle.
Adverse effect: We don't care about the proper grammar and spelling of words
anymore when we text.
Social Media Before 1900
● People used letters of written correspondence delivered by hand from individual to
another.
● 550 B.C. - The primeval form of postal service.
● 1972 - the telegraph was invented (It sent short messages only.).
● 1865 - The pneumatic post - It utilizes below ground pressurized air tubes to carry
capsules from one area to another. Although no longer well-known outside of
drive-through banking.
● 1890 - Telephone (lines)
● 1891 - Radio (signals)
Social Media in the 20th Century (Technology began to change very swiftly in the 20th Century)
● 1940s - creation of primary supercomputers.
The Internet arose after scientists made up ways for computers to connect.
● 1960s - the earliest forms of the Internet, such as CompuServe, were developed.
○ Primitive sorts of the email was also developed.
● 1970s - Networking technology had improved.
○ UseNet granted users to speak through a virtual newsletter in the 1970s.
● 1980s - Home computers were becoming more ordinary, and social media was becoming
more sophisticated.
○ 1988 - Internet relay chats, or IRCs, were utilized.
● 1997 - Six Degrees - The first distinguishable social media site was developed. It
permitted users to upload a profile and make friends with other users.
● 1999 - the primary blogging sites became popular.
Social Media Now (After the creation of blogging, social media began to break out in popularity)
● 2000s - Sites like Myspace and Linked acquired prominence and sites like Photobucket
and Flickr facilitated online photo sharing.
● 2005 - YouTube soared, creating an entirely new way for people to connect and share
across great ranges.
● 2006 -Twitter & Facebook. They remain the most popular social networks on the web.
○ Other sites like Pinterest, Spotify, Foursquare, and Tumblr began going up to fill
specific social networking niches.
○ Numerous sites permit cross-posting. These create an environment where users
can reach the maximum number of individuals without sacrificing personal
communication intimacy.
The Impact of Social Media to Society
Social media is a mighty revolution that has changed our lives— how we socialize,
conduct our businesses, engage in political affairs, shape professions, and set job recruitments.
These are its impacts according to 2019 Social Media Statistics:
1. Socialization - Social media has made it effortless to connect (and share pictures) and
communicate to people who are close to us on an actual time basis. It has strengthened
relationships. Additionally, humans get to make and meet new acquaintances.
2. Business - The online platforms are a less extravagant way for businesses to advertise
their offerings on a real-time basis, reach a broader customer base, and improve
customer loyalty through different programs. Gives Easy access to customers.
a. Through interaction and feedback by businesses to their customers, they can
understand the market quickly, adopt new strategies, and conform to the dynamic
customer's tastes and demands.
3. Politics - Online platforms also grant people to air out their political grievances to their
political leaders and demand actions. Forming political rallies, administering campaigns,
and even political unrest are felt in this medium.
4. Job Hiring - The bulk of companies make their hiring decisions supporting one's social
portfolio. Scouts also use online networks to post job vacancies through which they get
their ideal candidates. It's also made it easy for job seekers to urge access to job posts.
a. Example: LinkedIn, where job aspirant can create their profile consisting their
skills and see what job opportunities recruiters are posting.
5. Education - Multitude skills and professions are built and learned through social media.
a. Online learning or "new normal education.” Through this, one can quickly learn a
skill and build a robust profession around it.
The Negative Impacts of Social Media
a. One's privacy is in danger of impersonations, theft, and stalking. Nowadays, companies
use social media to measure job seekers. Posting anything abusive or embarrassing
could cause you to lose those job opportunities, because 'the internet never forgets.'
b. Online social platforms are irresistible, and this has drastically reduced productivity at the
workplace which impacts companies negatively as they incur losses.
c. Some people— especially introverts — rely on the virtual world as against the vital world.
d. A bit of false information or “fake news” could spread quickly and cause great panic.
e. Cyberbullying. Its effects are seen in victims that fell into depression and even death.
The Cybercrime Law
Cybercrime, also called computer crime, uses a computer as an instrument to further
illegal ends, like committing fraud, trafficking in kiddie porn and property, stealing identities, or
violating privacy.
Most cybercrime is an assault on information about individuals, corporations, or
governments, therefore, attacking a private or corporate virtual body. Cybercrime focuses on the
centrality of networked computers in our lives and the fragility of such seemingly solid facts as
individual identity.
● 1996 - the Council of Europe and government representatives from the US, Canada, and
Japan, drafted an initial treaty covering computer crime.
● Around the globe, civil libertarian groups immediately protested provisions within the
treaty requiring Internet service providers (ISPs) to store data on their customers'
transactions and show this information over demand.
● Work on the treaty proceeded nevertheless.
●
●
●
November 23, 2001 - the Council of Europe Convention on Cybercrime was signed by 30
states.
The convention came into effect in 2004. Additional protocols, covering terrorist activities
and racist and xenophobic cybercrimes, were proposed in 2002 and came into effect in
2006.
Additionally, various national laws, like the USA PATRIOT Act of 2001, have expanded
law enforcement’s power to watch and protect computer networks.
September 12, 2012 - Cybercrime Prevention Act of 2012- Republic Act No. 10175
-. It aims to deal with legal issues concerning online interactions and, therefore, the Philippines'
Internet.
A.
Offenses against the integrity, confidentiality and availability of computer data and
systems:
1. Illegal access – the access to the entire or any part of a computing system with no
permission.
a. Ex. Inaccess ng GF mo yung account mo without permission.
2. Illegal Interception – the interception (EX. Listening to, recording, monitoring, or
surveillance etc.) created by technical ways without the right of any non-public
transmission (in other words, private communication) of computer data to, from, or
within a computing system including electromagnetic emissions from a computing
system carrying such computer data.
a. Man-in-the-middle attack.
b. Hindi kasama ang mga public transmission like message sayo ng DENR.
3. Data Interference - the intentional or irresponsible alteration, damaging, deletion or
deterioration of computer network, electronic document, or electronic data message, with
no permission, including (or through) virus introduction or transmittal.
a. Data: Pictures, etc.
b. May nagsend sayo ng link, tapos yung messages mo ay nadelete or naleak ang
data mo... That is data interference.
c. Onel De Guzman - I LOVE YOU virus.
4. System Interference — the intentional modification or irresponsible hindering or
interference with the operating of a computer or computer network by damaging,
inputting, transmitting, deleting, altering deteriorating, or suppressing computer program
or data, electronic data message or electronic document, without the right or authority,
including the introduction or transmission of viruses.
a. Target: Functioning of computer by deleting yung nakaprogram sa kanya.
b. Ex. Interference sa functioning ng sasakyan, to control yung car nayon.
5. Misuse of Devices - the use, production, sale, procurement, importation, distribution, or
otherwise making available, without right, of:
(a) A device, including a computer program, designed primarily to commit any of the
offenses under this Act; or
(b) A computer password, access code, or similar data by which the whole or any
part of a computer system is capable of being accessed with the intent that it be
used for the purpose of committing any of the offenses under this Act.
6. Cybersquatting – the obtaining of a domain name over the Internet in bad faith to profit,
mislead, destroy the reputation, and deprive others of registering the same, if such a
domain name is:
●
(a) Similar, identical, or confusingly similar to an existing trademark registered with
the appropriate government agency at the time of the domain name registration:
(b) Identical or in any way similar with the name of a person other than the
registrant, in case of a personal name; and
(c) Acquired without right or with intellectual property interests in it.
Ex. Tricking users to go to your site by using altered versions of popular domain
names/Trademarks.
B. Computer-related Offenses:
1. Computer-related Forgery — the input, alteration, or deletion of any computer data
without right leading to inauthentic data with the intent that it's considered or acted
upon for legal aim as if it were authentic, despite everything whether or not the
information is directly readable and intelligible; or, the Act of knowingly using computer
data and that the product of computer-related forgery as defined herein, for the aim of
perpetuating a fraudulent or deceitful design or plan.
2. Computer-related fraud — the unapproved input, alteration, or deletion of computer
data or program or interference within the functioning of a computing system, causing
injury thereby with fraudulent intent: Provided that if no damage has yet been caused,
the punishment imposable shall be one degree under.
3. Computer-related Identity Theft – the willful acquisition, use, misuse, transfer,
possession, alteration or deletion of identifying information belonging to somebody,
whether natural or juridical, without right: Provided, That if no injury has yet been
caused, the punishment imposable shall be one degree under.
● Ex. Ginawang profile pic ang pic mo pero hindi ikaw ang may gamit nung account nayon.
C. Content-related Offenses:
1. Cybersex — the intentional engagement, maintenance, control, or operation, directly or
indirectly, of any lascivious exhibition of sexual organs or sexual deed, with the help of
a computer system, for consideration or favor (May bayad).
2. Child Pornography — the prohibited or unlawful acts defined and punishable by the
Anti-Child Pornography Act of 2009 or Republic Act No. 9775, committed through a
computer system: Provided, That the penalty to be imposed shall be (1) one degree
beyond that provided for in Republic Act No. 9775.
● Producing, disseminating, or distributing child pornography
3. Unsolicited Commercial Communications — the transmission of
economic
transmission with the utilization of a computing system which seeks to advertise, sell or
offer purchasable products and services are prohibited unless: (a) there's prior
confirmative consent from the recipient; or (b) the first intent of the communication is for
service and administrative announcements from the sender to its existing users,
subscribers or customers; or (c) the following conditions are present:
(1) The commercial transmission contains an easy, valid, and reliable way for
the recipient to reject. Receipt of further commercial electronic messages
(opt-out) from an equivalent source;
(2) The commercial transmission doesn't purposely disguise the origin of the
electronic news; and
(3)The commercial communication doesn't intentionally include misleading
information in any part of the message to induce the recipients to read the
statement.
Ex. Spam. Unwanted and unsolicited commercial messages sent by automatic messaging.
Child pornography via computer
Unsolicited Commercial Communications
Jail Term
Reclusion perpetua or 20 to 40
years.
Arresto mayor (imprisonment for
month and one day to 6 months)
Fine
P50 000 to P5 million
P50 000 but not more than P250, 000
one
4. Libel — the unlawful or prohibited acts of libel as defined in Article 355 of the Revised
Penal Code, as amended, committed through a computer system, or any other similar
means which may be devised in the future.
●
●
●
●
March 02, 2020 - the first guilty verdict in a cyber-libel case.
Archie Yongco of Aurora, Zamboanga del Sur was guilty of: Falsely accusing another
local politician of murder-for-hire via a Facebook post, which he deleted minutes later.
The court was unconvinced by his denial that he posted the message
Jail Time: 8 years
Must pay damages of ₱610,000 (US$12,175).
D. Other Offenses
1. Aiding or Abetting in the Commission of Cybercrime – any person who willfully abets or
aids in the commission of any offenses enumerated in this Act shall be held liable.
2. Attempt in the Commission of Cybercrime — any person who consciously attempts to
commit any of the crimes listed in this Act shall be held accountable.
● Consequence: A jail term of prison mayor (6 years and one day to 12 years) or
a fine of at least P200,000 but not exceeding P1 million.
GLOSSARY
1. Information age - The idea that access to and the control of information is the defining
characteristic of this current era in human civilization.
2. Social media - Websites and applications that enable users to create and share content
or to participate in social networking.
3. Cybercrime - Criminal activities carried out by means of computers or the internet.
4. Cybercrime Law - Cybercrime law identifies standards of acceptable behaviour for
information and communication technology (ICT) users; establishes socio-legal
sanctions for cybercrime; protects ICT users, in general, and mitigates and/or prevents
harm to people, data, systems, services, and infrastructure, in particular; protects human
rights; enables the investigation and prosecution of crimes committed online (outside of
traditional real-world settings); and facilitates cooperation between countries on
cybercrime matters (UNODC, 2013, p. 52).
Download