Document Details

AdmirableCarnelian5135

Uploaded by AdmirableCarnelian5135

Technological Institute of the Philippines - Quezon City

Tags

information communication technology ICT cybersecurity technology

Summary

This document is a lesson on Information Communication Technology (ICT). It covers various aspects of ICT, including definitions, characteristics, advantages, disadvantages, and examples of cybercrimes such as phishing, spoofing, blackmail, and online drug trafficking. It also describes what cyber harassment, sports betting, and copyright infringement are.

Full Transcript

TECHNOLOGICAL INSTITUTE OF THE PHILIPPINES - QC SHS 1. compare and contrast the nuances of varied online platforms, sites, and content to best achieve specific class objectives or address situational challenges It...

TECHNOLOGICAL INSTITUTE OF THE PHILIPPINES - QC SHS 1. compare and contrast the nuances of varied online platforms, sites, and content to best achieve specific class objectives or address situational challenges It is the application of According to Oxford, Oxford defined it as the scientific knowledge for these are facts provided imparting or exchanging practical purposes, or learned about of information or news. especially in industry. they something or someone. also defined it as any machinery and equipment developed from the application of scientific knowledge.(Oxford, n.d) It refers to the use of communication technology such as laptop, smart phones, tablet, telephone, internet and etc. to send, save, and edit information these are products that store, process, transmit, convert, duplicate, or receive electronic information (IATP, n.d) Electronic textbooks instructional software E-mail Chat Distance learning programs Software applications Web-based information Worldwide web IMMATERIALIATY INTERCONNECTION DIGITIZATION information that you have can It is a link between various The information we process is be moved from one pllace to technologies. in a single universal format another. INTERACTIVITY INSTANTANEITY INNOVATION exchange of information it is transmitting information It the rise of development of a between a user and a over a long distance and with certain creation of new means computer extreme fast speed. to enhance communication. INFLUENCIALITY DIVERSITY OF INFORMATION It is the possibility of accessing a large It can impact not just a specific group of amount of information to build individulas but also expanded and knowledge from it and also allows pernetratred important areas such as them to do so through association economy, educartion... with other connected users to network. As a source of knowledge As a medium to transit knowledge As a medium of interaction / dialogue As a means of seeking help if needed Communication Destructive and Globalization immoral content Cost-effectiveness Unemployment Greater Availability Privacy Bridging the Lack of job security cultural gap Dominant Culture Cybercrime - illegal acts done using the internet. People all over the world use the Internet to commit a host of crimes, some of which the public doesn’t even know are capable of being done electronically. Phishing - It is the attempt of acquiring sensitive information such as usernames, passwords and credit card details. Spoofing - It is an attack when a malicious party impersonated another device or user on a network in order to launch attacks against network hosts, steal data, spread malware or bypass access controls. Blackmail - unlawfully obtaining money, property, or services from a person, entity, or institution, through coercion. When someone writes you an email and threatens to expose your extramarital affair to your husband unless you pay $1000, this is an example of blackmail. When you are charged with a crime for extorting money by threatening to reveal embarrassing information, the charges are because of an act of blackmail. Accessing Stored Communications or hacking - intentionally accessing, without authorzation, a facilty through which an electronic communication service is provided. financial gain, theft of personal data, access to confidential information, the desire to take down websites, as well as idealism and political activism. While some forms of hacking are completely legal, most of them are not and are considered criminal offenses. Sports Betting is engaging in the business of betting or wagering on any sporting event or contest over the Internet. In some countries, gambling (including sports betting) is illegal even if you are doing it over the Internet. Cyber harassment refers to online harassment. Cyber harassment or bullying is the use of email, instant messaging, and derogatory websites to bully or otherwise harass an individual or group through personal attacks. Child pornography are produced not only on a professional scale by commercial providers, but also privately using victims from the producer’s own environment, from the exploitation of children by clients of child prostitutes. Four women were convicted after they pleaded “guilty” to online sexual exploitation of children in two separate cases in Lapu-Lapu City, Cebu. The first case involved nine minors, two boys and seven girls, who were rescued in an operation conducted by the Women and Children Protection Center Visayas Field Unit (WCPC-VFU) on March 21, 2019. Three female suspects, all related to the victims, were arrested and charged with qualified trafficking under Republic Act (RA) 10364 (Expanded Anti-Trafficking in Persons Act) and violating RA 10175 (Cybercrime Prevention Act). The second case originated from a case buildup by the WCPC-VFU on Feb. 26, 2018, after “Annie” (not her real name) was caught offering her three-year-old son and a five-year-old girl for online sexual exploitation in exchange for money. Persuading, inducing, enticing, or coercing any individual to travel in interstate commerce to engage in Prostitution. The internet has become one of the preferred methods of communication for prostitution, as clients and prostitutes are less vulnerable to arrest or assault and for its convenience sex buyers', pimps', and traffickers' use of the Internet and online classified advertising sites will be provided. the concept of online drug trafficking is simply the act of engaging in drug trafficking on the internet. “drug trafficking” is defined as an illegal trade involving the cultivation, manufacture, distribution, and sale of substances that are subject to drug prohibition laws. Criminal Copyright Infringement, the act of piracy mainly for financial gain. In late 2014, the number one pirate website, The PirateBay, was raided for the second time due to years of pirating movies, music, games, books, and other software. These kinds of websites earn money through advertsing. Brown, T. (2020, May 18). Information communication technology (ICT) - learn the importance. ITChronicles. https://itchronicles.com/information-and-communication-technology/the-importance-of-information-and-communication- technology-ict/#:~:text=Importance%20of%20ICT&text=of%20some%20kind.- Characteristics of Information and Communication Technologies and their roles in daily life. (2019, January 24). Business News. https://www.scenerise.com/characteristics-of-information-and-communication-technologies-and-their-roles-in-daily-life/ Information and Communication Technology (ICT) | Resources | IATP. (n.d.). Idahoat.org. Retrieved July 26, 2022, from https://idahoat.org/services/resources/ICT#:~:text=Electronic%20textbooks%2C%20instructional%20software%2C%20email Joyce Regis. (2018, March 31). Empowerment Technologies LESSONS 1-15. Empowerment Technology. https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/ Malik, Q. (2022, April 22). Write down the advantages and disadvantages of “Information and Communication Technology”. Urdu News. https://urdunews.cc/advantages-and-disadvantages-of-ict/ What are ICTs? Characteristics, Advantages and Disadvantages. (n.d.). Cyzotech.com. https://cyzotech.com/what-are-icts- characteristics-advantages-and-disadvantages/

Use Quizgecko on...
Browser
Browser