lesson-3.pdf
Document Details
Uploaded by IngenuousEuclid2675
Aklan State University
Full Transcript
LESSON 3: THE INTERNET & THE WEB OBJECTIVES: At the end of the lesson, you should be able to: identify the three waves of the Web evolution discuss the different types of connection in the Philippine market describe and appreciate the various uses of the Internet...
LESSON 3: THE INTERNET & THE WEB OBJECTIVES: At the end of the lesson, you should be able to: identify the three waves of the Web evolution discuss the different types of connection in the Philippine market describe and appreciate the various uses of the Internet list and describe the risks of internet use; and, utilize this knowledge and use the Internet and the Web more responsibly Introduction Since its public lunch in 1990, the Internet and the World Wide Web(or simply the Web) have become an enormous part of people's daily lives and Internet access has substantially improved over the last three decades with everyone wanting to be connected to it. Since then, accessing various types of information has been a lot easier. Furthermore, several incredible things we could never have imagined have been possible because of the Internet and the Web. The terms, the Internet, and the Web are frequently used interchangeably; however, they are different things. The Internet is a physical entity that contains parts you can touch and point to. It is a computer network, a worldwide network. A computer network refers to two or more computers connected to broadcast devices (router or switch), either wired or through a Wi-fi (wireless), to exchange or share information and resources. On the other hand, the Web contains documents linked together by hyperlinks. Servers stored these documents. These servers are among the various computers connected to the Internet. In other words, the Web is just one application running on the Internet. This lesson go over the three waves of web evolution, what you'll need to get online, and the many types of Internet connections available in the Philippines. Then, we'll learn about the wide range of activities to do when online as well as the problems and threats that come with them. C. F. Salazar 25 The Evolution of the Web In the early 1990s, Tim Berners-Lee created the World Wide Web, or simply the Web. Tim envisioned the Web as a collaborative platform where people could share information and communicate. New technologies such as cloud computing, on the other hand, have accelerated Web development, resulting in open, interactive, and distributed applications and services. The evolution of the Web is divided into three waves: (1) read-only, 2) read/write Web, and (3) programmable (Roesler, Barrere, and Willrich, 2020). 1. Read-Only web, also called Web 1.0, contains applications capable of providing information in a single direction which users are limited to communicating and interacting with each other. Search engines and e-commerce belong to this first wave. 2. Read/Write Web or Web 2.0 allows interaction in communities through participation, collaboration, and co-creation. Social networks, blogs, and instant messaging represent this wave. 3. Programmable Web or Web 3.0 permits anyone to create a new application or service from a web-supplied infrastructure. This wave is powered by cloud computing which allows the Web to take on a platform for an ecosystem of people, applications, services, and even objects. This ecosystem is otherwise known as the Internet of Things or IoT. Moreover, Web 3.0 consists of emerging technologies such as blockchain technology, AI-based chatbots, and virtual/augmented reality (VR/AR), among others. A man using Samsung Oculus VR Gear Stephan Sorkin on Unsplash C. F. Salazar 26 Types of Internet Connection in the Philippines You need three things to connect to the Internet: 1. Access devices, such as a personal computer with a modem or smartphone. 2. A means of connection, such as telephone line, cable hookup, or wireless capability; 3. An Internet service provider, a commercial online service provider, or a wireless service provider. Here in the Philippines we have three connections to choose from to connect to the Internet: DSL, Fiber, or Wireless Broadband. Choosing your type of connection may be influenced by budget, availability, and speed. 1. DSL - or Digital Subscriber Line uses wireline transmission technology to transmit data over traditional copper telephone lines already installed to homes and businesses. It is the most affordable and has the most availability among all three. It is the go-to connection for basic and moderate internet use because it does not have a data cap, and its connection speed is decent enough to browse, stream, and download. However, higher download speeds can be costly and are mostly packages as internet plans for businesses. To date, 6 MBPS is the maximum download speed available for consumers. 2. Wireless Broadband – This connection provides the Internet through a radio link between the customer's location and the service provider's facility. It can be mobile or fixed. You can connect to the Internet anytime and anywhere as your provider's coverage is extended to that location. It does not have to be plugged in into the power outlet all the time to function, making it a viable backup in cases of a power outage or outdoor connectivity. The downside of wireless broadband is stability.4G technology is used in transmitting data to the devices, but it is not as reliable as a wired connection. Another disadvantage is that service providers set an absolute data cap to their subscriptions. C. F. Salazar 27 3. Fiber – this type of connection uses fiber optics to convert electrical signals that carry data into light and then sends it through transparent glass fibers about the diameter of a human hair. The download speed in fiber connection is breakneck that most likely can provide the user with a seamless experience A bundle of optical fibers in doing simple browsing or Denny Müller on Unsplash gaming. Its limitation is its infancy, where it is only available in a few cities or areas in the country. Below is a list of ISPs and their corresponding major products (Adrian, 2020). Provider Main Products Coverage Areas PLDT 1. DSL and fiber All major cities and selected connection with areas nationwide unlimited internet 2. Wireless connection (LTE) but data capped Prepaid wireless (LTE) Globe 1. Data capped wireless All major cities and selected broadband (Air 5G areas nationwide and LTE) 2. Broadband with Cable Tv Sky Broadband 1. Fiber Unli Broadband Selected major cities and 2. Broadband with Cable nearby areas TV Converge ICT 3. Unlimited Fiber Selected Areas in Metro connection Manila C. F. Salazar 28 Different Internet Uses We use the Internet for a variety of reasons. In reality, most of us rely on it to do our tasks, and it is an excellent communication tool. It is also a fantastic source of amusement and a place where we can share our common interests. There are 73 million Internet users in the Philippines alone and 45% percent of which are adult users. Ninety-eight percent of adult internet users in the country own a Facebook account as of December 2019. It is approximately equal to 29.4 million individuals, or 44 percent of the Philippine Statistics Authority's 2019 medium-population projection of 66.2 million. This means Facebook is the most preferred social media platform for Filipino adults. According to the report, Youtube is the second most popular platform among Filipino adults, followed by Instagram, Snapchat, Twitter, and Viber. In other words, Filipinos do widely use of social networking sites. Accessing the Internet grants the opportunity to engage in a variety of activities, including: Email, o electronic mail – is the exchange of computer-stored messages to and from anyone with an email address by usually in a text format and non-text formal such as graphics and other multimedia. It used to be a killer app. There are two ways to send an email: via an email program or web-based mail. An email program enables you to send emails from your devices such as laptops or smartphones. Examples are Microsoft's Outlook and Apple's Mail. A web-based mail or webmail, sending, and receiving messages is done by interacting via a browser with a website. The big four email carriers are Yahoo! Mail, Microsoft Outlook.com, Gmail, AIM Mail (AOL.com)(Sawyer, 2016). IM or instant messaging is the exchange of near real-time messages through a stand- alone application or embedded software. IM sessions usually involve two users in a private, back-and-forth style of communication(unlike chat rooms with many users engaging in multiple and overlapping conversations).IM is useful in reducing long- distance telephone bills when you have to communicate with friends, families, or geographically remote colleagues. IM systems include Windows Live Messenger, Yahoo Messenger, Microsoft Skype, Apple Messages, and Facebook Messenger. C. F. Salazar 29 FTP (File Transfer Protocol) is an Internet standard for uploading and downloading files between computers, including those with different operating systems. Internet telephony or VoIP (Voice over Internet Protocol), uses the Internet to make phone calls, either one to one or for audioconferencing. There are two reasons to use VoIP: lower cost and increased functionality. Multimedia on the Web is usually handled by plug-ins and small special programs. Plug-in is a program that adds a specific feature or function to a browser, allowing it to play or view specific files. Examples of plug-ins are Flash, QuickTime, and RealPlayer. Webcasting or web broadcasting is customized, text, video, and audio are sent to users automatically or live on-demand. RSS is a short form for really simple syndication or rich site summary. RSS newsreaders or RSS aggregators are programs that scour the Web, sometimes hourly, sometimes more frequently, and pull together in place "feeds" from several websites. Blogs – or weblogs are frequently updated sites on the World Wide Web intended for public consumptions that contain a writer's observations, opinions, images, and links to other websites. Among the variations are video blogs, or vlogs, moblogs, or mobile blogs. Podcasting involves delivering Internet music, radio, or video from the Internet to a computer. Unlike webcasting, podcasts do not use streaming technology; the music of media files must first be downloaded and saved to a computer or a mobile device. E-commerce or electronic commerce is the buying and selling of goods and services over the Internet. Products may be categorized as hard goods and soft goods. Hard goods include products that can be viewed and purchased online and delivered by mail or truck such as clothes. Soft goods are those that can be purchased and downloaded directly from the retailer's site such as music, software, and tickets. Social Networking allows people to create a profile of themselves on the service and share it with users with similar interests to create social networks. Web 3.0 – in this technology, the information will be computer-generated with less human interaction required to discover and integrate it. C. F. Salazar 30 Activity 4. 1: Web Quest – Web 3.0 Type "Web 3.0" into your chosen search engine. Then, using the facts you discovered throughout your search, answer the following questions. 1. How Web 3.0 differs from Web 2.0? Discuss the prominent features of Web 3.0. 2. What are its importance? How it will benefit our lives? 3. What are the risks and threats of Web 3.0? Present your answers in a 2-minute video. (See the rubric for assessment) Risks in Using Online Services You may encounter threats connected to online content and online contact while using online services, such as search engines, social networking sites, and messaging apps. Some of the risks are caused by users' actions, while others are caused by the actions of other users. According to members of the Youth Protection Roundtable (2009), these are: 1. Risks related to Online Content a. Age inappropriate content Access to all information should be restricted for children and teenagers. As a result, careful thought must be made to what content is appropriate for which age group. Content that is not generally forbidden but has the potential to harm younger users should be given special consideration. It can be exceedingly detrimental when young children are unintentionally exposed to age inappropriate content such as adult pornography. The risk of encountering age-inappropriate content might arise from the user's own actions, both while searching for it and when stumbling upon it by accident. Content that is not suitable for all age groups may be offered for commercial purposes, but it can also be created by users. C. F. Salazar 31 b. Violent content Another type of age-inappropriate content is violent content. The impact of violent content on the viewer is mostly determined by the viewer's age, Internet consumption habits, and social milieu. Younger children, in particular, should be prevented from coming across violent content. They should also be prevented from attempting to access stuff that they are not permitted to see or purchase on other media or in stores. c. Illegal content, i.e. racism, child pornography The classification of illegal content is mostly determined by national law. Nonetheless, unlawful content is available and can be accessed both mistakenly and knowingly, particularly by children and teenagers. Images and videos of child sexual abuse, content that encourages terrorist actions, content that promotes, incites, or instructs in crime or violence, and recordings of genuine violence, cruelty, and criminal conduct are all examples of potentially illegal or damaging content. Children and youths should also be considered as victims of illegal content, such as taking and disseminating images or videos of child abuse. d. Incorrect content The risk of encountering incorrect content, such as within Wikipedia or as a fake product advertisement, is primarily related to the behavior of other users and is amplified by the growing number of Web 2.0 applications where the correctness is at most controlled by the users themselves rather than by an editor. Inexperienced users may mistake biased content, i.e. content that is intentionally designed to convey a specific message, for truth. e. Incitement of harm Many websites, such as those encouraging suicide, anorexia, or sectarianism, encourage visitors to harm themselves. With the advent of Web 2.0 and the expanding ability for users to upload their own content, the risk of being exposed to harmful content is increasing. Children and adolescents, in particular, C. F. Salazar 32 are frequently unable to recognize the risks associated with following the instructions provided on such websites. f. Infringement of human rights / defamation Propaganda against specific population groups or people can easily propagate through the anonymity of the Web. Furthermore, it is reasonable to assume that people behave differently online since they are not directly exposed to the reactions of their counterparts or victims, and hence are not instantly confronted with the repercussions of their actions. As a result, the risk of human rights violations and being a victim of defamation is significantly higher online than in real life. Furthermore, libelous content is damaging to children and teenagers whose opinions may be swayed by false information. g. Inappropriate advertisement and marketing to children The hazards of receiving or being exposed to advertisements for products and/or services that are improper for children, such as cosmetic surgery, are referred to as inappropriate advertisement. The more personal information users reveal, such as their name, age, or gender, the more likely they are to get advertisements or be encouraged to participate in lotteries. Children are particularly vulnerable since they are often unaware of the ramifications of typing their names into forms and boxes on the Web. Given the increased prevalence of mobile phones among children and teens, special attention should be made to this additional channel for advertising distribution. h. Data persistence Once anything is released on the internet, it can quickly spread around the globe. Children and teenagers, in particular, are unaware of the short- and long-term consequences, and frequently upload texts and images that they do not want to be publicly available later. Because it is impossible to completely delete this information later, the issue of data persistence is especially significant to irresponsible Internet users. i. Data portability C. F. Salazar 33 Data that has been purposefully saved on a server or platform can be simply moved to a large number of additional servers. People who are unaware of this information may find it difficult to maintain their privacy. Even if younger individuals are more likely to be aware of the web's technical capabilities, the majority of them do not have the ability to estimate the effects of their personal data being mixed with that of others. j. Copyright infringement Copyright infringement is a risk that is primarily caused by users' actions. Whether the holder's copyright is infringed on intentionally or unintentionally, the infringement is an economic fraud for the holder and exposes the violation to penalties. 2. Risks related to Online Contact a. Harmful advice Forums, blogs, or other Web 2.0 applications provide a platform for the exchange of advice between users. This could be beneficial but it could also make it simpler to seek out ineffective and dangerous advices. b. Internet addiction The risk of being addicted to the use of the Internet is increasing as people spend more time online. Young people, in particular, may find it difficult to turn off their laptops. Therefore, this risk is primarily related to one's own activities. c. Identity theft Identity theft is the act of obtaining and using another person's electronic identity (e.g., user name and password) in order to perform commercial or other fraud against that person and profit from it. As the number of virtual identities grows in tandem with the number of people who go online and utilize customized services, identity theft is becoming more common. d. Phishing/losing money Phishing is the technique of collecting sensitive data such as personally identifiable information, banking and credit card details and passwords information to access important accounts resulting to financial loss. e. Commercial fraud C. F. Salazar 34 Commercial fraud happens when merchants pretend to offer items or services, the goods or services either do not reflect the promised features after payment or are not delivered at all. It can also take the form of selling digital services at an exorbitant and unfair price, frequently tied to a long-term membership to the service that the consumer did not want. f. Grooming Grooming can also be done online. Some perpetrators pose as children and communicate with them online, making plans to meet them. The majority of the youngsters targeted are female, and the majority of the victimization occurs through the use of a mobile phone. g. Bullying Because of the anonymity that the Internet affords, it has been assumed that people will bully one another. A user who uses the internet runs the risk of becoming a victim of bullying as well as offender. As a result, bullying is linked to one's own behavior as well as the behavior of others. h. Disclosing personal information When a user creates a profile on a social community platform, he or she is asked to reveal personal information in order to portray themselves to the community. Users may also provide personal information, such as their address or phone number, in chat rooms and forums. Personal information can be used to gain immediate access to financial accounts, credit record and other assets. C. F. Salazar 35 i. Profiling Profiling can be done from a website where personal data is displayed publicly, but it's far riskier when profiles of users or parts of them are collected from the database behind the website and sold to third parties by the platform provider. With the growing number of profiles a person publishes on various platforms, the possibility of personal data being merged with data published on other platforms or given away elsewhere, such as in polling or raffles, increases. As a result, profiles are established that enable for the direct delivery of potentially undesirable content, services, and advertisements to the individual. C. F. Salazar 36 REFERENCES Adrian, M. (2020). The Best Internet Service Providers for 2020. https://www.imoney.ph/articles/broadband-internet-providers-philippines/ Guerrero, AU. (2014). #20PHnet: A timeline of Philippine Internet. Accessed at https://ph.news.yahoo.com/timeline-philippine-internet-20th-anniversary-225454753.html Roesler, V., Barrere, E. and Wiilrich R. (2020). Special Topics in Multimedia, IoT, and Web Technologies. Springer Rouse, M. Instant messaging. Retrieved from https://searchunifiedcommunications.techtarget.com/definition/instant-messaging Nearly half of adult Filipinos using Internet before pandemic — SWS. Retrieved from https://www.cnn.ph/news/2020/9/8/SWS-adult-Filipinos-Internet-use-pre-pandemic.html What is Phishing. Retrieved from https://www.phishing.org/what-is-phishing YPRT Toolkit. Retrieved from https://www.digitale- chancen.de/transfer/assets/final_YPRT_Toolkit.pdf C. F. Salazar 37