James Robert Messenger - Father of the information age, ● “The Information Age is a truly new age based upon the interrelationship of computers via telecommunications. With these information structures operating on both real time and as needed basis. Furthermore, the primary factors driving this new age forward are convenience and user friendliness, which, in turn, will create user dependence.” Internet Beneficial Effect: allowed people to gather and share information in just one click. It also improves education quality, provides effective communication, and offers a progressive approach in our daily lifestyle. Adverse effect: We don't care about the proper grammar and spelling of words anymore when we text. Social Media Before 1900 ● People used letters of written correspondence delivered by hand from individual to another. ● 550 B.C. - The primeval form of postal service. ● 1972 - the telegraph was invented (It sent short messages only.). ● 1865 - The pneumatic post - It utilizes below ground pressurized air tubes to carry capsules from one area to another. Although no longer well-known outside of drive-through banking. ● 1890 - Telephone (lines) ● 1891 - Radio (signals) Social Media in the 20th Century (Technology began to change very swiftly in the 20th Century) ● 1940s - creation of primary supercomputers. The Internet arose after scientists made up ways for computers to connect. ● 1960s - the earliest forms of the Internet, such as CompuServe, were developed. ○ Primitive sorts of the email was also developed. ● 1970s - Networking technology had improved. ○ UseNet granted users to speak through a virtual newsletter in the 1970s. ● 1980s - Home computers were becoming more ordinary, and social media was becoming more sophisticated. ○ 1988 - Internet relay chats, or IRCs, were utilized. ● 1997 - Six Degrees - The first distinguishable social media site was developed. It permitted users to upload a profile and make friends with other users. ● 1999 - the primary blogging sites became popular. Social Media Now (After the creation of blogging, social media began to break out in popularity) ● 2000s - Sites like Myspace and Linked acquired prominence and sites like Photobucket and Flickr facilitated online photo sharing. ● 2005 - YouTube soared, creating an entirely new way for people to connect and share across great ranges. ● 2006 -Twitter & Facebook. They remain the most popular social networks on the web. ○ Other sites like Pinterest, Spotify, Foursquare, and Tumblr began going up to fill specific social networking niches. ○ Numerous sites permit cross-posting. These create an environment where users can reach the maximum number of individuals without sacrificing personal communication intimacy. The Impact of Social Media to Society Social media is a mighty revolution that has changed our lives— how we socialize, conduct our businesses, engage in political affairs, shape professions, and set job recruitments. These are its impacts according to 2019 Social Media Statistics: 1. Socialization - Social media has made it effortless to connect (and share pictures) and communicate to people who are close to us on an actual time basis. It has strengthened relationships. Additionally, humans get to make and meet new acquaintances. 2. Business - The online platforms are a less extravagant way for businesses to advertise their offerings on a real-time basis, reach a broader customer base, and improve customer loyalty through different programs. Gives Easy access to customers. a. Through interaction and feedback by businesses to their customers, they can understand the market quickly, adopt new strategies, and conform to the dynamic customer's tastes and demands. 3. Politics - Online platforms also grant people to air out their political grievances to their political leaders and demand actions. Forming political rallies, administering campaigns, and even political unrest are felt in this medium. 4. Job Hiring - The bulk of companies make their hiring decisions supporting one's social portfolio. Scouts also use online networks to post job vacancies through which they get their ideal candidates. It's also made it easy for job seekers to urge access to job posts. a. Example: LinkedIn, where job aspirant can create their profile consisting their skills and see what job opportunities recruiters are posting. 5. Education - Multitude skills and professions are built and learned through social media. a. Online learning or "new normal education.” Through this, one can quickly learn a skill and build a robust profession around it. The Negative Impacts of Social Media a. One's privacy is in danger of impersonations, theft, and stalking. Nowadays, companies use social media to measure job seekers. Posting anything abusive or embarrassing could cause you to lose those job opportunities, because 'the internet never forgets.' b. Online social platforms are irresistible, and this has drastically reduced productivity at the workplace which impacts companies negatively as they incur losses. c. Some people— especially introverts — rely on the virtual world as against the vital world. d. A bit of false information or “fake news” could spread quickly and cause great panic. e. Cyberbullying. Its effects are seen in victims that fell into depression and even death. The Cybercrime Law Cybercrime, also called computer crime, uses a computer as an instrument to further illegal ends, like committing fraud, trafficking in kiddie porn and property, stealing identities, or violating privacy. Most cybercrime is an assault on information about individuals, corporations, or governments, therefore, attacking a private or corporate virtual body. Cybercrime focuses on the centrality of networked computers in our lives and the fragility of such seemingly solid facts as individual identity. ● 1996 - the Council of Europe and government representatives from the US, Canada, and Japan, drafted an initial treaty covering computer crime. ● Around the globe, civil libertarian groups immediately protested provisions within the treaty requiring Internet service providers (ISPs) to store data on their customers' transactions and show this information over demand. ● Work on the treaty proceeded nevertheless. ● ● ● November 23, 2001 - the Council of Europe Convention on Cybercrime was signed by 30 states. The convention came into effect in 2004. Additional protocols, covering terrorist activities and racist and xenophobic cybercrimes, were proposed in 2002 and came into effect in 2006. Additionally, various national laws, like the USA PATRIOT Act of 2001, have expanded law enforcement’s power to watch and protect computer networks. September 12, 2012 - Cybercrime Prevention Act of 2012- Republic Act No. 10175 -. It aims to deal with legal issues concerning online interactions and, therefore, the Philippines' Internet. A. Offenses against the integrity, confidentiality and availability of computer data and systems: 1. Illegal access – the access to the entire or any part of a computing system with no permission. a. Ex. Inaccess ng GF mo yung account mo without permission. 2. Illegal Interception – the interception (EX. Listening to, recording, monitoring, or surveillance etc.) created by technical ways without the right of any non-public transmission (in other words, private communication) of computer data to, from, or within a computing system including electromagnetic emissions from a computing system carrying such computer data. a. Man-in-the-middle attack. b. Hindi kasama ang mga public transmission like message sayo ng DENR. 3. Data Interference - the intentional or irresponsible alteration, damaging, deletion or deterioration of computer network, electronic document, or electronic data message, with no permission, including (or through) virus introduction or transmittal. a. Data: Pictures, etc. b. May nagsend sayo ng link, tapos yung messages mo ay nadelete or naleak ang data mo... That is data interference. c. Onel De Guzman - I LOVE YOU virus. 4. System Interference — the intentional modification or irresponsible hindering or interference with the operating of a computer or computer network by damaging, inputting, transmitting, deleting, altering deteriorating, or suppressing computer program or data, electronic data message or electronic document, without the right or authority, including the introduction or transmission of viruses. a. Target: Functioning of computer by deleting yung nakaprogram sa kanya. b. Ex. Interference sa functioning ng sasakyan, to control yung car nayon. 5. Misuse of Devices - the use, production, sale, procurement, importation, distribution, or otherwise making available, without right, of: (a) A device, including a computer program, designed primarily to commit any of the offenses under this Act; or (b) A computer password, access code, or similar data by which the whole or any part of a computer system is capable of being accessed with the intent that it be used for the purpose of committing any of the offenses under this Act. 6. Cybersquatting – the obtaining of a domain name over the Internet in bad faith to profit, mislead, destroy the reputation, and deprive others of registering the same, if such a domain name is: ● (a) Similar, identical, or confusingly similar to an existing trademark registered with the appropriate government agency at the time of the domain name registration: (b) Identical or in any way similar with the name of a person other than the registrant, in case of a personal name; and (c) Acquired without right or with intellectual property interests in it. Ex. Tricking users to go to your site by using altered versions of popular domain names/Trademarks. B. Computer-related Offenses: 1. Computer-related Forgery — the input, alteration, or deletion of any computer data without right leading to inauthentic data with the intent that it's considered or acted upon for legal aim as if it were authentic, despite everything whether or not the information is directly readable and intelligible; or, the Act of knowingly using computer data and that the product of computer-related forgery as defined herein, for the aim of perpetuating a fraudulent or deceitful design or plan. 2. Computer-related fraud — the unapproved input, alteration, or deletion of computer data or program or interference within the functioning of a computing system, causing injury thereby with fraudulent intent: Provided that if no damage has yet been caused, the punishment imposable shall be one degree under. 3. Computer-related Identity Theft – the willful acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to somebody, whether natural or juridical, without right: Provided, That if no injury has yet been caused, the punishment imposable shall be one degree under. ● Ex. Ginawang profile pic ang pic mo pero hindi ikaw ang may gamit nung account nayon. C. Content-related Offenses: 1. Cybersex — the intentional engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual deed, with the help of a computer system, for consideration or favor (May bayad). 2. Child Pornography — the prohibited or unlawful acts defined and punishable by the Anti-Child Pornography Act of 2009 or Republic Act No. 9775, committed through a computer system: Provided, That the penalty to be imposed shall be (1) one degree beyond that provided for in Republic Act No. 9775. ● Producing, disseminating, or distributing child pornography 3. Unsolicited Commercial Communications — the transmission of economic transmission with the utilization of a computing system which seeks to advertise, sell or offer purchasable products and services are prohibited unless: (a) there's prior confirmative consent from the recipient; or (b) the first intent of the communication is for service and administrative announcements from the sender to its existing users, subscribers or customers; or (c) the following conditions are present: (1) The commercial transmission contains an easy, valid, and reliable way for the recipient to reject. Receipt of further commercial electronic messages (opt-out) from an equivalent source; (2) The commercial transmission doesn't purposely disguise the origin of the electronic news; and (3)The commercial communication doesn't intentionally include misleading information in any part of the message to induce the recipients to read the statement. Ex. Spam. Unwanted and unsolicited commercial messages sent by automatic messaging. Child pornography via computer Unsolicited Commercial Communications Jail Term Reclusion perpetua or 20 to 40 years. Arresto mayor (imprisonment for month and one day to 6 months) Fine P50 000 to P5 million P50 000 but not more than P250, 000 one 4. Libel — the unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system, or any other similar means which may be devised in the future. ● ● ● ● March 02, 2020 - the first guilty verdict in a cyber-libel case. Archie Yongco of Aurora, Zamboanga del Sur was guilty of: Falsely accusing another local politician of murder-for-hire via a Facebook post, which he deleted minutes later. The court was unconvinced by his denial that he posted the message Jail Time: 8 years Must pay damages of ₱610,000 (US$12,175). D. Other Offenses 1. Aiding or Abetting in the Commission of Cybercrime – any person who willfully abets or aids in the commission of any offenses enumerated in this Act shall be held liable. 2. Attempt in the Commission of Cybercrime — any person who consciously attempts to commit any of the crimes listed in this Act shall be held accountable. ● Consequence: A jail term of prison mayor (6 years and one day to 12 years) or a fine of at least P200,000 but not exceeding P1 million. GLOSSARY 1. Information age - The idea that access to and the control of information is the defining characteristic of this current era in human civilization. 2. Social media - Websites and applications that enable users to create and share content or to participate in social networking. 3. Cybercrime - Criminal activities carried out by means of computers or the internet. 4. Cybercrime Law - Cybercrime law identifies standards of acceptable behaviour for information and communication technology (ICT) users; establishes socio-legal sanctions for cybercrime; protects ICT users, in general, and mitigates and/or prevents harm to people, data, systems, services, and infrastructure, in particular; protects human rights; enables the investigation and prosecution of crimes committed online (outside of traditional real-world settings); and facilitates cooperation between countries on cybercrime matters (UNODC, 2013, p. 52).