EMPOTEK 1st Monthly: ICT in Global Communication PDF
Document Details
Uploaded by PopularSonnet4194
2023
ilovejungkook
Tags
Summary
This document provides an overview of ICT in global communication. It details various professional applications, internet usage in the Philippines in 2023, and more. The document also touches on topics like ICT and sciences, as well as internet connection speeds.
Full Transcript
EMPOTEK – 1ST MONTHLY 4. ICT in the Social Sciences Professional ICT tools like online surveys, databases, and LESSON 1: ICT IN THE CONTEXT OF GLOBAL statistical...
EMPOTEK – 1ST MONTHLY 4. ICT in the Social Sciences Professional ICT tools like online surveys, databases, and LESSON 1: ICT IN THE CONTEXT OF GLOBAL statistical software help social scientists gather and COMMUNICATION analyze data efficiently. ICT enables social scientists to publish their work in What happens in one minute on the Internet? online journals, blogs, and websites, reaching a broader audience. 5. ICT in the Arts Artists such as singers, painters, and dancers use YouTube to learn more about their craft. They can also use different internet platforms to promote their crafts. For singers, they can refine the sound of their recording, as well as mix and blend music. 6. ICT in the Athletics Information and Communications Technology (ICT) has revolutionized sports and physical education by Information and Communication Technology enhancing training, performance analytics, and fan engagement. ICT refers to all the tools and resources used to communicate, create, share, store, and manage Digital 2024: The Philippines information electronically. This includes things like computers, the internet, Internet use in the Philippines 2023 telephones, and other digital technologies. There were 86.98 million internet users in the ICT plays a crucial role in modern society by Philippines at the start of 2024 enhancing productivity, driving innovation, and The Philippines’ internet penetration rate stood at fostering global connectivity 73.6 percent of the total population at the start of ICT in Various Professions 2024. Kepios analysis indicates that internet users in the 1. ICT in the Academe Philippines increased by 1.8 million (+2.1 percent) Educational Institution now uses their own websites, between January 2023 and January 2024. pages and alike to widen their reach for prospective enrollees. Internet connection speeds in the Philippines in 2024 ICT is now integrated in classroom teaching and Ookla indicate that there is an increase in internet learning. (LMS, software and hardware, and connection speeds at the start of 2024 for the productivity tools) following: Availability of Online Courses (MOOCS) o Median mobile internet connection speed: 3.71 Mbps 2. ICT in the Business Profession o Median fixed internet connection speed: Businesses use computer programs and tools to 10.71 Mbps. improve productivity and efficiency. Example: The use of e-payment; Point of Sale (PoS); Mobile connections in the Philippines in 2024 Data management; Marketing; and Online Selling Data from GSMA Intelligence shows that there were 117.4 million cellular mobile connections in the 3. ICT in the Sciences Philippines at the start of 2024. ICT is used in the development, solving, and analysis Numbers indicate that mobile connections in the of science, math and engineering related problems. Philippines were equivalent to 99.3 percent of the Example: Autocad, modern laboratories, math total population in January 2024. engine, weather analysis, and agriculture. Social media statistics for the Philippines in 2024 ilovejungkook 86.75 million active social media user identities in the X’s ad reach was equivalent to 12.4 percent of the Philippines in January 2024. local internet user base (regardless of age). 99.7 percent of the Philippines’ total internet user base (regardless of age) used at least one social media platform in January 2024. World Wide Web (WWW) 52.3 percent of the Philippines’ social media users The World Wide Web -- also known as the web, were female, while 47.7 percent were male WWW or W3 -- refers to all the public websites or Facebook users in the Philippines in 2024 pages that users can access on their local computers According to META, Facebook had 86.75 million users and other devices through the internet. These pages in the Philippines in early 2024. and documents are interconnected by means of 99.1 percent of the “eligible” audience in the hyperlinks that users click on for information. Philippines uses Meta in 2024. Tim Berners - Lee invented the World Wide Web in 1989 YouTube users in the Philippines in 2024 Google’s advertising resources indicate that YouTube had 58.10 million users in the Philippines in early Versions of the World Wide Web 2024. Web 1.0 YouTube ads reached 66.8 percent of the Philippines’ Web 2.0 total internet user base (regardless of age) Web 3.0 TikTok users in the Philippines in 2024 Web 1.0 (read, write, interface) ByteDance’s advertising resources indicate that Refers to the first stage in the world wide web, which TikTok had 49.09 million users aged 18 and above. was entirely made up of web pages connected by TikTok’s ad audience in the Philippines was equivalent to 56.4 percent of the local internet user hyperlinks. base. Most of the web pages were STATIC also known as flat page or stationary page. Messenger user growth in the Philippines Meta’s planning tools show that Facebook Web 2.0 (read, write, interact) Messenger’s ad reach in the Philippines increased by Allows the user to interact with the page known as 7.6 million (+14.5 percent) between January 2023 DYNAMIC PAGE. and January 2024. Darcy DiNucci coined the term but it was Tim O’Relly who popularized it. LinkedIn users in the Philippines in 2024 Improved user interaction over Web 1.0 Figures published in LinkedIn’s advertising resources Web applications introduced indicate that LinkedIn had 16 million “members” in Interactive advertising and pay-per-click the Philippines in early 2024. 54 percent of LinkedIn’s ad audience in the Cloud computing operations Philippines was female, while 46 percent was male. Centralized data Features of Web 2.0 Snapchat users in the Philippines in 2024 Rich user interface Data published in Snap’s advertising resources Improve inter-operability indicate that Snapchat had 5.91 million users in the Philippines in early 2024. Mass participation Snapchat’s ad reach was equivalent to 6.8 percent of the local internet user base (regardless of age). Web 3.0 (read, write, execute) Third generation of Internet-based services X users in the Philippines in 2024 It is also referred to as Web3, built on a foundation Numbers that there are 10.77 million users in the consisting of the core ideas of decentralization, Philippines in early 2024 openness, and more excellent user utility. Gavin Wood (2014) - coined ilovejungkook Features of Web 3.0 Processing data closer to the source rather Decentralization than relying on a central cloud to reduce Trustful and Permissionless latency and improve real-time processing. Artificial Intelligence and Machine Learning 8. Biotechnology Connectivity and Ubiquity Applying biological processes for technological advancements, particularly in Potential of Web 3.0 healthcare, such as gene editing and Data ownership personalized medicine. There are fewer middlemen. 9. Quantum Computing Transparency for every stakeholder Utilizing quantum bits to perform complex The improvement of internet data connections calculations much faster than classical Pitfalls of Web 3.0 computers, revolutionizing fields like It will be costly. cryptography and drug discovery. Complexity 10. Artificial Intelligence (AI) Difficult to regulate. Developing machines capable of performing Legal Challenges tasks that typically require human intelligence, such as virtual assistants and Technology Trends for 2024 self-driving cars. 1. Block Chain Lesson 2: ONLINE SAFETY, SECURITY, ETHICS AND A secure digital ledger technology used for ETIQUETTE recording transactions across various industries beyond cryptocurrencies. INTERNET 2. Augmented Reality (AR) and Virtual Reality (VR) The Internet is a global system of Technologies creating immersive digital interconnected computer networks that use experiences for applications in gaming, the Internet protocol suite (TCP/IP) to education, healthcare, and more. communicate between networks and 3. Internet of Things (IoT) devices. Connecting everyday devices to the internet, Information Superhighway enabling data sharing and automation for enhanced convenience and efficiency. Online Safety 4. 5G Technology Involves taking measures to protect yourself The latest generation of wireless technology and your personal information from the offering faster internet speeds and lower online threats such as cyber-attacks, scams, latency, enabling advancements in and identity theft. autonomous vehicles, telemedicine, and Practices to Ensure Internet Safety more. Verifying Someone’s Identity 5. Machine Learning (ML) Verifying if a link is safe A branch of artificial intelligence where Identifying an online scam algorithms learn from data to make Protecting Privacy predictions or decisions without explicit Identifying Cyberbullying programming. 6. Cybersecurity Verifying Someone’s Identity The practice of protecting digital systems and Check the names, friend list, profile picture data from cyber threats to ensure and other personal information. information security. Do not talk or add to strangers whether 7. Edge Computing online and face to face. ilovejungkook Verifying if Link is Safe To verify website, check the HOW DO WE MAINTAIN OUR PRIVACY? URL of the link: 1. Authentication o HTTP = UNSECURED a. User Identification o HTTPS = SECURED b. Possessed Objects Avoid visiting untrusted websites. c. Biometric Device Install and update an antivirus software on your d. Call back System computer. User identification Avoid downloading anything from untrusted - Commonly known as password and websites. username. - Your password should pass the SURP Identifying an online scam test Online scam frequently manifest as 2. Be cautious about sharing personal unanticipated emails, instant messages, and information on public forums. calls. Common strategies of scammers 3. Know the security features of the social The sender claims there’s a problem with your networking site you use. account or your payment information. 4. Limit the amount of sharing personal The sender asks you to confirm some personal information on SocMed or financial information. The email includes an invoice you don’t 5. Use privacy-focused search engines and recognize. browsers The sender claims to have noticed some suspicious activity or log-in attempts. The price is too good to be true. Identifying Cyberbullying The sender promises easy money. Cyberbullying is harassment that occurs online The sender requests an unusual payment such as sending or posting harmful or mean option. content about someone else. The offer is only available for a limited time. Insults, derisive jokes, and repeated harassment The sender claims supplies are extremely are common indicators of cyberbullying. limited. RA 10627 or “The Anti-Bullying Act of 2013 Best thing to do: o aims to protect children enrolled in Do not reply or click links from suspicious emails. kindergarten, elementary, and Educate yourself regarding Financial Literacy secondary schools and learning centers USE COMMON SENSE from being bullied. Protecting Privacy FORMS of Cyberbullying: Privacy refers to the ability of an individual or 1. FLAMING – an online fight using electronic message group to seclude themselves or information with angry and vulgar languages. about themselves, allowing them to express After a heated online game, Alex blames Jordan for the themselves selectively. loss in the public chat, saying, "You're the worst player One should always maintain the confidentiality ever! Quit the game, no one wants you here!" Jordan of their information even when this are tries to respond calmly, but Alex continues with insults, requested by social networks. calling Jordan "useless" and "pathetic," making the chat PRIVACY POLICY: hostile and hurtful. o A statement that describes how a website collects, uses, and manages the 2. HARASSMENT – act of repeatedly sending nasty, personal data of consumers mean, and insulting messages. These messages can contain threats. ilovejungkook Emma ends a friendship with Taylor after a disagreement. keep it private, Alex shares Max's secret in a group chat Upset, Taylor begins sending Emma daily threatening with their classmates, saying, "Did you guys know Max messages, saying things like, "You'll regret crossing me," has anxiety? He freaks out over everything!" The and "I'm going to make your life miserable. " Taylor also others in the group start discussing and making fun of posts negative comments about Emma on social media, Max's situation tagging her repeatedly to ensure Emma sees them. 7. EXCLUSION - When someone intentionally or cruelly 3. DENIGRATION – a cyberbully denigrates a victim by excluded from an online group. This can leave a sending, posting, or publishing false information victim feeling isolated and depressed. online about the individual. Denigration usually A group of friends creates an online group chat to plan consists of cruel rumors and gossip about a victim. weekend activities. However, they intentionally leave out Lily and Mia have a falling out at school. Out of spite, Mia one member of the group, Rachel, without telling creates a fake social media account pretending to be Lily. her. When Rachel finds out that everyone has been She starts posting embarrassing and false information hanging out without her, she feels hurt and isolated. The about Lily, claiming that Lily spreads rumors and betrays group continues to exclude Rachel from future chats and her friends. Mia even shares edited photos to make Lily events. look bad, tagging mutual friends to ensure they see the posts. 8. FRAPING - occurs when a cyberbully uses a victim’s social media accounts to post inappropriate content 4. DOXXING - is the act of publicly revealing personally with the victim’s name attached to it. identifiable information about an individual or While at a party, Sam leaves his phone unlocked on the organization, usually via the Internet without their table. His friend, Jake, sees this and decides to play a consent. prank by posting embarrassing and inappropriate status Chris gets into an argument with Jamie on a public forum. updates on Sam's social media account, pretending to be In retaliation, Jamie finds and posts Chris's personal him. The posts cause confusion and concern among information, including their home address, phone Sam’s friends, who think Sam is behaving strangely. number, and workplace, on social media, encouraging others to harass Chris. Soon after, Chris starts receiving 9. CATFISHING - With catfishing, a cyberbully exploits a threatening messages and unwanted contact from victim’s emotions. A cyberbully attempting to catfish strangers. a victim creates a fake online identity and pretends to be someone else. The bully can then engage with 5. IMPERSONATION - A cyberbully can impersonate a a victim using this false identity and build an online victim by posting comments on social media and chat romance. rooms in the individual’s name. Doing so can cause a Emma receives a friend request on social media from victim to experience backlash from others based on someone named "Alex," who claims to be a new student the bully’s online comments. at a nearby school. They start chatting regularly, and Sara's classmate, Emily, is upset after a minor Emma begins to develop feelings for Alex. However, disagreement. To get back at Sara, Emily creates a fake "Alex" is actually a fake profile created by another social media account pretending to be Sara. Using this student, Taylor, who wants to humiliate Emma. Taylor account, Emily sends rude messages to Sara's friends, uses the fake identity to manipulate Emma into sharing posts inappropriate content, and makes offensive personal information and embarrassing photos, which comments in online groups. Sara's friends, thinking it's Taylor later reveals to others. really her, start distancing themselves from her. 6. OUTING - An act of sharing someone’s secrets or Online Security embarrassing information or images online. The practice of defending data, networks, Max confides in a close friend, Alex, about a personal servers, computers, and electronic systems from secret—his struggles with anxiety. Despite promising to malicious attacks. ilovejungkook This practice, also known as IT security or 10. TROJAN HORSE - are malware disguised as cybersecurity, involves using various processes legitimate software. When users download and and technologies to protect IT components from run the seemingly harmless software, the Trojan unauthorized access. can perform various malicious activities, such as stealing sensitive information, providing TYPES of Online Threats: backdoor access, or installing additional 1. PHARMING - Type of cyber-attack that redirects malware. users to fraudulent websites or manipulates their computer systems to collect sensitive information. Computer Ethics 2. CYBER STALKING - form of harassment or Refers to the principles, values, and stalking that occurs online through electronic guidelines that govern appropriate behavior communications, social media, and other digital and responsible conduct in the online platforms. environment ensuring that actions taken 3. COMPUTER BUG - describe an error, flaw, or with them are fair, responsible, and glitch in a computer program or system that respectful of others' rights. causes unexpected behavior or incorrect results. 4. MALWARE - malicious software and refers to any Netiquette software that is designed to cause harm to Comes from the word Network and Etiquette computer systems, networks, or users Is a set of rules and norms for acceptable TYPES OF MALWARES: conduct or behavior online. o Botnets – turn your PC into zombie Netiquette is online etiquette. These are guidelines for o Spyware – steals your data acceptable behavior while interacting with instructors o Adware – spams you with ads and students in an online setting. o Ransomware – blackmails you 1. We Are All Human o Trojans – sneak malware onto your 2. Respect PC 3. Words o Worms – spread across computers 4. Attire 5. RANSOMWARE – is an attack and locks data until 5. Criticism a ransom is paid. It encrypts data files making 6. Professionalism them inaccessible. 7. Privacy & Copyright 6. ADWARE - It displays unwanted ads and pop-ups 8. Records on the computer. It comes along with software 9. Bullying downloads and packages. It generates revenue 10. Sarcasm for the software distributer by displaying ads. 11. Capitals 7. SPYWARE - Its purpose is to steal private 12. Focus On Quality information from a computer system for a third party. Spyware collects information and sends it An online course is a professional environment. to the hacker. There are expectations for your behavior regarding all 8. VIRUS - is a malicious executable code attached activities related to the course. to another executable file. The virus spreads Remember: If it is not acceptable face-to-face behavior, when an infected file is passed from system to then it is not acceptable online behavior either. system. 9. WORMS - replicate themselves on the system, attaching themselves to different files and looking for pathways between computers, such as computer network that shares common file storage areas ilovejungkook