Chapter 1 Introduction To ICT

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 52

Chapter 1

Introduction to ICT

Prof. F. V. Andres
Objectives
1. Current state of ICT Technologies
2. Online systems, functions and platforms
3. Online safety, security, ethics and etiquette
4. Contextualized online search and research skills
Current State of ICT Technologies
• Web 1.0 vs Web 2.0 vs Web 3.0
• Convergent technologies
• Social, mobile and assistive media
Web 1.0 vs Web 2.0: Dynamic Web Pages
• Static vs. Dynamic
• Then Web 2.0 came
• Web 2.0 is coined by Darcy DiNucci on
January, 1999 – “Fragmented Future”
• Web 2.0 is the evolution of Web 1.0 by
adding dynamic pages
Web 2.0 Features
• Folksonomy – tagging (#)
• Rich User Experience – responsive to user’s input
• User Participation – others are able to put content of
their own
• Long Tail – services-on-demand vs one-time-purchase
• Software as a Service – software subscription
• Mass Participation – diverse information sharing
What is Semantic Web?
• An extension of the current
web in which information is
given well-defined meaning,
better enabling people and
computers to work in co-
operation (Tim Berners Lee)
• Semantic means “data-
driven”
Semantic Web Examples
Web 3.0 Problems
• Compatibility – html files and web browsers could
not support 3.0
• Security – questionable since the machine is saving
his or her preferences
• Vastness – WWW contains billions of pages
• Vagueness - certain worlds are imprecise
• Logic – certain limitations for a computer to predict
what is user is referring to at the given time.
Online Systems, Functions and
Platforms
Online Systems
• Provides access to a software system using a
computer and internet connection.
Online Functions
• Uses the internet web technologies to deliver
information and services to users or other information
systems/applications.
• Main purpose is to publish and maintain data by using
hyper-text principles (hyperlinks)
Online Platforms
• Any hardware or software used to host an application or service
• Consists of hardware, an operating system and coordinating
programs that use the instruction set for a particular process or
microprocessor
• Creates a foundation that ensures object code will execute
successfully
• Makes it easier for users to interact, to collect and use the data
from the user’s interactions for their own particular needs
Online Platform Categories
• Social Media
• Search Engines
• Communications Services
• Payment Systems
• Advertising Platforms
• Creative Content Outlets
PLATFORMS
Web Search Engines
It is a software system that is designed to search for
information on the World Wide Web (WWW). The search
results are generally presented in a line of results referred to as
Search Engine Results Page (SERPs).
The information may be a mix of webpages, images, and
other types of files.
Top 10 Search Engines (2016)
1. Google
2. Bing (Microsoft)
3. Yahoo (No. 1 email provider)
4. Ask.com (Ask Jeeves)
5. AOL.com (America Online)
6. Baidu (China)
7. Wolframalpha (Computational
Knowledge Engine)
8. DuckDuckGo (simple)
9. Internet Archive (histories of a domain)
10. ChaCha.com (similar to Ask.com)
PLATFORMS
Communication Services
These are outsourced enterprise communications solutions
that can be leased from a single vendor or provider.
A Communications Service Provider (CSP) is a provider that
transports information electronically and can encompass public
and private companies in telecom, internet, cable, satellite, and
managed services business.
Telecom & Internet Cable
PLATFORMS
Payment System
It is any system used to settle financial transactions through
transfer of monetary value, and includes the institutions,
instruments, people, rules, procedures, standards, and
technologies.
PLATFORMS
Advertising Platforms
It allows users to create and manage advertising
campaigns, generate reports, and retrieve information about the
ads, campaigns, and organizations that are associated with an
account.
PLATFORMS
Creative Content Outlets
It is content that needs to be translated creatively.

Topic/concept → Creative presentation


ONLINE PLATFORMS
1. Presentation Tools – Prezi, Zoho Shows, MS PowerPoint.
2. Newsletter, ICT Content Platforms – Dropbox, Tumblr, Wix
3. Photo Editing Tools – Picasa, Adobe Photoshop, GIMP
4. Video Editing Tools – Sony Vegas Pro, Windows Movie Maker, Adobe
Premier Pro
5. Photo uploading and hosting Tools – Dropbox, Flickr
6. Online Collaborative Tools – Google Drive, Viber, Facebook
7. Cloud Computing – Dropbox, Google Drive, Microsoft One Drive
ONLINE PLATFORMS
8. Blog Tools – Blogger, WordPress, LiveJournal
9. Mapping Tools – Google Maps, Waze, Wikimapia
10. Music Production – Sony Vegas Pro, Audacity, Virtual DJ
11. Survey and Forms – Google Forms
12. ICT Projects and Content Publishing and Uploading Platforms –
WordPress, MS Office Project Server, File Manager
13. Web Design Platforms – Wix, Weebly, Adobe Dreamweaver
14. Web Management Platforms – Drupal, WordPress, Joomla
Dangers on the Internet
Dangers on the Internet
• eMail Spam – also known as
junk email, is unsolicited
messages sent in bulk by email
(spamming)

What is the best way to get rid of junk mails?


Dangers on the Internet
• eMail Spoofing – creation of
email messages with a
forged sender address

How would you know if someone is spoofing you?


Dangers on the Internet
• Phishing – the fraudulent
practice of sending emails
purporting to be from reputable
companies in order to induce
individuals to reveal personal
information, such as passwords
and credit card numbers.

How would you know if someone is phishing you?


Dangers on the Internet
• Pharming – the fraudulent
practice of directing internet
users to a bogus website that
mimics the appearance of a
legitimate one in order to obtain
personal information.

How would you know if someone is trying to pharm you?


Dangers on the Internet
• Spyware – software that
enables a user to obtain covert
information about another’s
computer activities by
transmitting data covertly from
their hard drive.

What can we do to prevent installing a spyware?


Dangers on the Internet
• Computer worm –
standalone malware that
replicates itself in order to
spread to other computers.

How do we know it is a worm-infected file?


Dangers on the Internet
• Trojan horse – program
designed to breach the
security of a computer
system while ostensibly
performing some innocuous
function
How do we know it is a trojan-infected file?
Dangers on the Internet
• Computer virus – piece of
code which is capable of
copying itself and typically
has a detrimental effect,
such as corrupting the
system or destroying data.

How do we know it is a virus-infected file?


Dangers on the Internet
• Hacker – a person who uses
computers to gain
unauthorized access to data

How do we know you are being hacked?


Dangers on the Internet
What other dangers can we encounter in the internet?
Windows Security
• Changing and adding user accounts
• Creating a new password
• Setting up/changing the screen saver security setting
• Fortifying the security center
10 Commandments of Computer Ethics
• Created in 1992 by the Computer Ethics Institute.
• Introduced in the paper “In Pursuit of a Ten Commandments for
Computer Ethics” by Dr. Ramon C. Barquin as a means to create a set
of standards to guide and instruct people in the ethical use of
computers.
• Copies the archaic style of “The Ten Commandments” in the Bible.
10 Commandments of Computer Ethics
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people’s computer work.
3. Thou shalt not snoop around in other people’s computer files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
10 Commandments of Computer Ethics
6. Thou shalt not copy or use proprietary software for which you have
not paid.
7. Thou shalt not use other people’s computer resources without
authorization or proper compensation.
8. Thou shalt not appropriate other people’s intellectual output.
9. Thou shalt not think about the social consequences of the you are
writing or the system you are designing.
10. Thou shalt always use a computer in ways that ensure consideration
and respect for your fellow humans.
Online Research and
Search Skill
Online Research
• Research needs and requirements vary with each
assignment, project or paper. Although there is a no single
“right” way to conduct research, certain methods and skills
can make your research efforts more efficient and effective
• Research is the easiest way to use when you do your
assignment. It cn make your assignment done easily.
Online Research
• The process of interactively searching for and retrieving
requested information via a computer from databases that
are online.
• Interactive searched became possible in the 1980s with the
advent of faster databases and smart terminals.
Advantages
• Ability to obtain a large sample, which increases statistical
power
• Data is automatically coded so no data entry errors
• Reduced cost of conducting research
Disadvantages
• Online is not totally secure and theft is one of the numerous
danger it poses, researchers and personal information is at
risk of being accessed by rogue persons.
• Some of the materials on the internet have not been
evaluated by experts or thoroughly screened.
• Lack of accreditation and low quality.
Online Research Skills
• Check your sources – evaluating web
resources - currency, accuracy,
authority, coverage, objectivity
• Ask good questions – the answers
you get in the literature depend on
the questions you pose – Margaret
Atwood
• Go beyond the surface – persistence
by continuing to pursue information
to gain a broad perspective
Online Research Skills
• Be patient
• Respect ownership – respecting
intellectual property rights of
creators and produce
• Use your networks – using social
networks and information tools to
gather and share information
Internet Research’s Strengths
• Internet search is faster than other medium
• Internet searching will save user’s physical distance
• You can share information with other people very quickly
• Quality of information is also better than other medium
• Speed, immediacy and a complete disregard for physical
distance
Internet Research’s Weaknesses
• Possibility of leaking someone’s personal information and it
can make negative effect in your life
• There are so many incorrect information that we try to find
• You can get many harmful objects such as advertising
• Unrecognized bias difficulties in verifying a writer’s
credentials

You might also like