Empowerment Technology

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

Empowerment Technology

Information and Communications Technology


- Deals with the use of different communication technologies such as mobile phones, telephone,
Internet, etc. to locate, save, send, and edit information.

ICT in the Philippines


Several international companies dub the Philippines as the “ICT Hub of Asia”. It is no secret that
there is a huge growth of ICT- related jobs around the country, one of which is the call center or BPO
(Business Process Outsourcing) centers.
According to the 2013 edition of Measuring the Information Society by the International
Telecommunication Union. There are 106.8 cellphones per 100 Filipinos in the year 2012. That would
mean that for every 100 Filipinos you meet, there is a high chance that they have a cellphone and
approximately for the seven of them, they have two.
In the data gathered by the Annual Survey of the Philippine Business and Industries, NSO, in
2010, the ICT industry shares 19.3% of the total employment population here in the Philippines.
To add these statistics, Time Magazine’s “The Selfiest Cities Around the World of 2013 places
two cities from the Philippines in the top 1 and top 10 spots. The study was conducted using Instagram,
a popular photo sharing application.
With these numbers, there is no doubt that the Philippines is one of the countries that benefits
most out of ICT.

The Current State of ICT


Web 1.0 is the term coined to differentiate the first stage of the World Wide Web (WWW) in
comparison with the present stage of the Internet technology. At the beginning of the WWW, there
were few web content creators and many of them were so called “read only web” since there was no
user interaction.

Web 2.0: The Dynamic Web Pages


The Internet has been a vital tool to our modern lives that is why it is also important to make the
best of the Internet. When the World Wide Web was invented, most web pages were STATIC.
STATIC Also known as a flat page or stationary page) in the sense that the page is “as is” and
cannot be manipulated by the user. The content is also the same for all users. This is referred to as Web
1.0. However, the World Wide Web is more than just static pages. Pretty soon, Web 2.0 came to the
picture.
WEB 2.0 is a term coined by Darcy DiNucci on January 1999. In her article titled, “Fragmented Future”
she wrote.
WEB 2.0 is the evolution of WEB 1.0 by adding dynamic web pages- the user is able to see a
website differently than others. Examples of web 2.0 includes social networking sites, blogs, wikis, video
sharing sites, hosted services, and web applications.
WEB 2.0 allows users to interact with the page: instead of just reading a page, thus the user may
be able to comment or create user account.
WEB 2.0 also allows users to use web browsers instead of just using their operating system.
Browsers can now be used for their user interface, application software (or web applications), and even
for file storage. Most websites that we visit today are WEB 2.0.
Web 3.0 and the Semantic Web
The Semantic Web is a movement led by the World Wide Web Consortium (W3C). The W3C
standard encourages web developers to include semantic content in their web pages. The term was
coined by the inventor of the World Wide Web, Tim Berners-Lee. Lee also noted that the Semantic Web
is 3.0.
For Example:
 If you search the Internet for “Where the best place to go shopping?” Web 3.0 will aim to give
you results depending on how you have made choices in the past.
 If you have purchased several shoes online, the Internet will give you results on the best place
with the highest rated shoes around your vicinity.
 When you search for the best restaurant to visit in a specific area. First, it may look for your
previous visits from other restaurants that have a similar menu, good rating, and budget that fit
your preference in the past.

Web 3.0 to be fully realized because of several problems:


1. Compatibility – HTML Files and current web browsers could not support Web 3.0.
2. Security – The user’s security is also in question since the machine is saving his or her
preferences.
3. Vastness – The World Wide Web already contains billions of web pages.
4. Vagueness – Certain words are imprecise. The words “old” and “small” would depend on the
user.
5. Logic – Since machines use logic, there are certain limitations for a computer to be able to
predict what the user is referring to at a given time.

Features of Web 2.0


The key features of WEB 2.0 include:
1. FOLKSONOMY- allows users to categorize and classify/arrange information using freely chosen
keyboards (e.g. tagging). Popular social networking sites such as Twitter, Instagram, Facebook,
etc. use tags that start with the pound sign (#). This is also referred to as hashtags.
2. RICH USER EXPERIENCE – content is dynamic and is responsive to user’s input. An example
would be a website that shows local content. In the case of social networking sites, when logged
on, your account is used to modify what you see on their websites.
3. USER PARTICIPATION – the owner of the website is not the only one who is able to put content.
Others are able to place a content of their own.
4. LONG TAIL – services that are offered on demand rather than on a one-time purchase. In certain
cases, time –based pricing is better than file-size-based pricing or vice-versa. This is synonymous
to subscribing to a data plan that charges you for the amount of time you spent in the Internet,
or a data plan that charges you for the amount of bandwidth you use.
5. SOFTWARE AS A SERVICE - users will subscribe to a software only when needed rather than
purchasing them. This is a cheaper option if you do not always need to use a software. For
instance, Google Docs is a free web-based application that allows the user to create and edit
word processing and spreadsheet documents online. When you need a software, like a Word
Processor, you can purchase it for a one time huge amount and install it in your computer and it
is your forever. Software as a service allows you to “rent” a software for a minimal fee.
6. MASS PARTICIPATION – diverse information sharing through universal web access. Since most
users can use the Internet, Web 2.0’s content is based on people from various culture.
Technical Convergence
 is an evolution of technological developments that merge into a new system bring together
different types of applications and media.
 is the synergy of technological advancements to work on a similar goal or task.
Example:
 The Smartphone is an example of technological convergence as it provides functionality of
various individual separate and different devices now available in one gear. The Smartphone can
function as a telephone, camera, radio, TV, and gaming console.
 Besides using your personal computer to create word documents, you can now use your smart
phone. It can also use cloud technologies to sync files from one device to another while also
using LTE technology you can access files anytime, anywhere.

Social Media
 is a collection of internet based communication tools and computer-assisted channels dedicated
to allow users to interact, communicate, and share information in a virtual community and
network.
 Is a website, application, or online channel that enables web users to create, co-create, discuss,
modify, and exchange user-generated content. According to Nielsen, a global information and
measurement company, Internet users spend more time in social media sites than in any other
type of site. With this, more and more advertisers use social media to promote their product.

Six Types of Social Media


1. Social Networks – these are sites that allow you to connect with other people with the same
interests or background. Once a user creates his or her account, he/she can set up a profile, add
people, create groups, and share content. Examples: Facebook and Google+
2. Bookmarking Sites – These are sites that allow you to store and manage links to various
websites and resources. Most of these sites allow you to create a tag that allows you and others
to easily search or search them. Examples: StumbleUpon and Pinterest
3. Social News – These are sites that allow users to post their own news items or links to other
news sources. The users can also comment on the post and comments may also be ranked. They
are also capable of voting on these news articles of the website. Those who get the most
amount of votes are shown most prominently. Examples: reddit and Digg.
4. Media Sharing – These are sites that allows you to upload and share media content like images,
music, and video. Most of these sites have additional social features like liking, commenting, and
having user profiles. Examples: Flicker, YouTube and Instagram.
5. Microblogging – these are sites that focus on short updates from the user. Those subscribed to
the user will be able to receive these updates. Examples: Twitter and Plurk
6. Blogs and Forums – These websites allow users to post their content. Other users are able to
comment on the said topic. There are several free blogging platforms like Blogger, WordPress,
and Tumblr. On the hand, forums are typically part of a certain website or web service.

Mobile Technologies/Media
With the growing Mobile media, the smart phone has dominated sales growth of the digital
world, outpacing laptops and personal computers. Smartphone is an integration of various technologies
rolled into one, such as the cellular phone, PDA (portable digital assistant), photo, and video camera.
Mobile devices use different operating systems:
1. iOS – used in Apple devices such as iPhone and iPad.
2. Android – an open source operating system developed by Google. Being open source means
several mobile phone companies use this OS for free.
3. Blackberry OS – used in Blackberry devices.
4. Windows Phone OS – a closed source and proprietary operating system developed by
Microsoft.
5. Symbian – the original smartphone OS; used by Nokia devices.
6. WebOS – originally used for smartphones; now used for smart TV’s
7. Windows Mobile - developed by Microsoft for smart phones and pocket PC’s

Assistive Media
Assistive Media is a nonprofit organization founded in 1996 in Ann Arbor, Michigan, USA. The
organization was the first internet-based reading service for persons with visual and reading
impairments, as echoed from the word of its founder David H. Erdody:
“Assistive Media was the first internet-based audio reading service for persons with print
reading barriers thereby operating a unique avenue of accessibility for many individuals with cognitive,
physical, and communication disabilities. Our narrators provide an engaging solution that allows access
to previously inaccessible reading materials leading to greater independence and integration into the
mainstream of society and community life”.

Online System, Functions, and Platforms


The online platform in the use of ICT make it easier for users to interact, to collect, and use the
data from the users’ interactions for their own particular needs.

Following are some of the online platforms and applications that you can use to create online
presentation, web page, newsletter, info graphics, music, video, and other multimedia contents:
 Presentation tools- Prezi, Zoho Show, MS Powerpoint
 Newsletter, ICT content platforms-Dropbox, Tumblr, Wix
 Photo editing tools- Picasa, Adobe Photoshop, MS Paint
 Photo uploading and hosting tools- DropBox, Flickr
 Online collaborative tools- Google Drive, Viber, Facebook
 Cloud computing- DropBox, Google Drive, Microsoft One Drive
 Blog tools- Blogger, WordPress, LiveJournal
 Mapping tools- Google Maps, Wikimapia
 Music production- Sibelius
 Survey and forms- Google Forms
 ICT projects and contents publishing and uploading platforms- WordPress, MS Office Project
Server, File Manager

Online Safety and Security


The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends,
and stay in touch with the old ones. It is also source of entertainment through games, online
communities, and everything in between. But like most things in this world, there is always the “other
side of the coin” The Internet is one of the most dangerous places, especially if you do not know what
you are doing with it.
TIPS TO STAY SAFE ONLINE
1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how the website handles the information
you share.
4. Know the security features of the social networking site you use. By keeping your profile private,
search engines will not be able to scan your profile.
5. Do not share your password with anyone.
6. Avoid logging in to private networks/WI FI. Browsing in “incognito (or private) mode”, a feature
of the browser, will not protect you from hackers.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about a future vacation. It is similar to posting, “ Rob my house at this
date”.
9. Add friends you know in real life.
10. Avoid using untrusted websites.
11. Install and update an antivirus software on your computer. Use only one antivirus to avoid
conflicts.
12. If you have a Wi-Fi at home, make it a private network by adding a password.
13. Avoid downloading anything from untrusted websites. You are most vulnerable in peer-to-peer
downloads (torrent) as the download is mostly likely not monitored by the site owner.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails.

Internet Threats
1. MALWARE – stands for malicious software
a. Virus – a malicious program designed to replicate itself and transfer from one computer to
another either through the Internet or local networks or data storage like flash drives.
b. Worm – a malicious program that transfers from one computer to another by any type of
means. Often, it uses a computer network to spread itself. For example: the ILOVEYOU worm
(Love Bug Worm) created by a Filipino.
c. Trojan – a malicious program that is disguised as a useful program but once downloaded or
installed, leaves your PC unprotected and allows hackers to get your information.
d. Spyware – a program that runs in the background without you knowing it (thus called “spy”). It
has the ability to monitor what you are currently doing and typing through key logging.
e. Adware – a program designed to send you advertisement, mostly as pop-ups.
2. SPAM – unwanted e-mail mostly from bots or advertisers. It can be used to send malware
3. PHISHING – Its goal is to acquire sensitive personal information like passwords and credit card
details. This is done by sending you an e-mail that will direct to user to visit a website and asked
to update his/her username, password, credit card, or personal information.
4. PHARMING - a more complicated way of phishing where it exploits the DNS (Domain Name
Service) system. This is a dangerous hacker attack on a website which directs all traffic to that
web site to another fictitious website. The main object of pharming is to obtain username and
passwords, as well as credit card and financial information, use these to steal their many
electronically or use the credit card of the victims.
5. EMAIL SPAM - also known as junk email, it is usually unsolicited commercial email sent from one
source with identical message sent to multiple recipients. Although some of them are not
harmful, deleting them one by one will eat up your time and can clog your email. Dangerous
spams carry virus like Trojan horse and other malicious software (malware).
Spammer is the term used to refer to a person who creates electronic spam. Spamming is
projected to continue because it is a cheap means of advertising. In addition, many countries do
not have laws to punish spammers.
6. EMAIL SPOOFING - this refers to deceitful email practice in which the sender address is
changed, so that it would appear to have come from a different source usually someone you
know. Usually, the reply to address is the source of email, and when you unknowingly reply to it
you would be replying to the one who spoofed you. Email spoofing is usually used by spammers
to hide the origin of the spam.

THINK BEFORE YOU CLICK


Here are things you might want to consider before posting something over the Internet.
1. Before you post something on the web, ask these questions to yourself: Would you want your
parents or grandparents to see it? Would you want your future boss to see it. Once you post
something on the web, you have no control of who sees your posts.
2. Your friends depend on you to protect their reputation online. Talk to your friends about this
serious responsibility.
3. Set your post to “private”. In this way, search engines will not be able to scan that post.
4. Avoid using names. Names are easy to search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it
down or report it as inappropriate.

Copy Infringement
Here are some tips that could help you avoid copyright infringement.
1. UNDERSTAND – Copyright protects literary works, photographs, paintings, drawings, films,
music (and lyrics), choreography, and sculptures, but it generally does NOT protect underlying
ideas and facts. This means that you can express something using your own words, but you
should give credits to the source.
2. BE RESPONSIBLE – Even if the material does not say that it is copyrighted, it is not a valid
defense against copying. Be responsible enough to know if something has a copyright.
3. BE CREATIVE – Ask yourself whether what you are making is something that came from you or
something made from somebody else’s creativity. It is important to add your own creative
genius in everything that will be credited to you.
4. LOOK FOR CREDIBLE SOURCE – Some wikis, though filled with updated information, are not a
credible source. This is due to the fact that anyone can edit its content. When using wikis, check
out the link of the cited text (indicated by superscript number) to be navigated to the footnote
where the list of sources is located. Click the source of the information and see if it is credible.
5. GIVE CREDIT – If you are going to use the information from a source for educational purposes,
give credit to the original author of the page or information.

STEPS TO MAKE CONTEXTUALIZED ONLINE SEARCH


1. IDENTIFY OR CHOOSE A TOPIC – If the topic is not provided and you are free to choose the
content, choose something you are interested in, new ideas, things, or areas you talk with your
classmates and friends or a current news item. If a topic is provided, make an initial search of
the subject usually with the help of Google or Wikipedia.
2. TOPIC OR TASK DEFINITION – also with the help of the Internet, use the Google search or
Wikipedia or other sources to be able to define the topic or task. The Internet will be able to
provide you with the glimpse of what you want to understand and define.
3. IDENTIFY METHODS OF SEARCH – you can either perform experiments, explore, or get a survey
of the subject matter and textual content of the search.
4. IDENTIFY RESOURCES OF YOUR RESEARCH – reliable sources are very important to obtain the
rich and accurate information for your research. Wikipedia or other reliable online encyclopedia
provides initial information that you need to get started. At the bottom of each topic, you will
find references used in writing a paper.
5. MAKE YOUR RESEARCH STRATEGIES – first, list down all the keywords or specific topic to search
on the Internet. Identified books can be searched by title, subject, author, or ISBN.
6. COMPILING THE RESEARCH RESULTS – the Internet has enormous wealth of information that
can be overwhelming. Strategies of handling large amount of data is necessary for you to be
able to shift through them for your final analysis either to keep or delete them.
7. EVALUATE THE RESULTS OF YOUR SEARCH – go through the materials you have researched and
check them for usefulness, relevance to your research, reliability and accuracy.
8. CREATE A LIST OF REFERENCES FOR CITATION – it is a good practice to keep your sources
updated for your footnotes and bibliography; this will save time going back to the net later for
these. There are free citation apps and tools that can help you do this. It is also important for
students to cite source to avoid the risk of plagiarism.

IMPROVING RESEARCH SKILLS


Enhancing the following skills are important in advancing one’s ability to obtain vital information
on the Internet.
1. CRITICAL THINKING
2. ANALYTICAL SKILLS
3. PROBLEM SOLVING CAPABILITY
4. ORGANIZED DATA MINING
5. RESEARCH PRESENTATION
6. CREATIVITY AND DEVELOPED IMAGINATION
7. COMPUTER LITERACY

HOW TO DETECT SATIRICAL NEWS:


1. If it is too good to be true, then it must be so.
2. If they are from known satirical sites.
3. If the news did not emanate from reliable news site.

List of top sources of satirical news:


1. Adobo Chronicles (adobochronicles.com)
2. So, What’s News? (sowahatsnews.wordpress.com)
3. Eritas Times (eritastimes.com)
4. The Professional Heckler (professionalheckler.wordpress.com)

You might also like