Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

Empowerment

Technologies
QUARTER 1
MODULE Information and Communications Technology
1 Online Safety, Security, Ethics, and Etiquette:
Internet Threats

1erv
Empowerment Technologies
Quarter 1 – Module 1: Information and Communications Technology
Online Safety, Security, Ethics, and Etiquette:
Internet Threats

Republic Act 8293, Section 176 states that no copyright shall subsist in any work of the
Government of the Philippines. However, prior approval of the government agency or office
wherein the work is created shall be necessary for exploitation of such work for profit. Such
agency or office may, among other things, impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from their
respective copyright owners. The publisher and authors do not represent nor claim ownership
over them.

EXPECTATIONS
At the end of the learning period, the students shall have:

✓ compare and contrast the nuances of varied online platforms, sites, and
content to best achieve specific class objectives or address situational
challenges; and
✓ apply online safety, security, ethics, and etiquette standards and practice in
the use of ICTs as it would relate to their specific professional tracks

LESSON 1: Information and Communication


Technology

(or ICT) is an umbrella term which covers any communication devices, applications,
and systems that people use to interact and connect with others. Old form of media like radio
and television are considered as ICT. Various services and applications, software, or
hardware, as well as digital forms of communication such as tools available on the Internet
like blogs and e-mail, and computer software such as Microsoft PowerPoint and Word
considered as ICT.
For example:
1. Cardinal Sin used the radio broadcast of Radyo Veritas to encourage Filipinos to
fight against former President Ferdinand Marcos in the year 1986.
2. In 1989, Tim Berners-Lee invented the World Wide Web and founded World Wide Web
Consortium in 1994.

2erv
3. Today, the latest mobile devices use 5G Networking, which is currently the fastest mobile
network.

The Current State of ICT Technologies


When the World Wide Web (Internet) was invented by Tim
Berners-Lee, most of the web pages were static web (also known as
flat page or stationary page) or the content is “as is”. In this state, the
user cannot manipulate or edit the content of the page, as well as the
content is same for all the users. In addition, static web can be
referred to as Web 1.0. Tim Berners-Lee
Web 1.0 were added by dynamic web pages, Image credit: theverge.com
and eventually evolved into Web 2.0. This term was popularized by Tim
and Dale Dougherly at the O’Reilly Media Web 2.0 in the year 2004.
However, Darcy DiNucci coined this term in January 1999. In this state,
most of the websites contain dynamic content or has interactive
Dale Dougherly characteristics. Currently digital natives, such as the Millennial’s and
Image credit: WordPress.com Gen Z, enjoy websites and applications because they can create, modify,
and exchange content with the other users.
But how can we know if the website or application is an example of Web 2.0?
These are the six features:

Image credit: Google Images

1. Folksonomy – It is a term from the blended words “folks” and “taxonomy”. This feature
allows user to categorize and classify/arrange information (ex.: hashtag like
#NewNormal).
2. Rich User Experience – This feature deals with how a site uses user information
for a personalized content (ex.: blog/vlog, social media accounts)
3. User Participation – This means that those who view the website can also put their
own information (ex.: the comment section and/or the reaction button of Facebook).
4. Long Tail Services – These services offer services on demand as opposed to a one-
time purchase (ex.: the Netflix user must pay the monthly subscription fee to enjoy
binge-watching).
5. Software as a Service – It contains how users would subscribe to a software as
opposed to purchasing them (Ex.: thesis group members can collaborate online
through Google Docs and can create online survey with Google Forms wherein
members can edit and monitor their progress simultaneously).

3erv
6. Mass Participation - This feature deals with diverse information sharing through
universal web access (ex.: regardless your nationality, gender, et cetera, you can share
information online, but make sure, it is not fake).
One of the examples of Web 2.0 is the social networking site
Facebook. Through their personal account, user can share their
personal information, and thoughts. They can connect with their
friends from distant locations and keep in touch with them. In
addition, business-minded user can start their online-selling
business. Though Facebook has a lot of privilege, it also comes with
a great responsibility. As a Facebook user, you should protect
yourself from identity theft or other cybercrimes through changing
your privacy setting. Set your profile from “Public” to “Only Me”
option.
Though netizens experiencing the advancement of Web 2.0,
there are still people who like to improve what we have. Tim Berners-
Lee of World Wide Web Consortium (W3C) encourages web developers
to include Semantic Web in their web pages, which is one of the
components of Web 3.0.
Web 3.0 was coined by John Markoff of the New York Times in 2006. It supposed to be
the third generation of Internet-based services, which aims to produce machine that can
understands the user’s preferences. This machine can server better by “learning” from the
previous choices of the user.
However, it is not fully realized due to several problems.
1. Compatibility – Our currently used web browsers, and HTML files cannot
support the idea of Web 3.0. If this compatibility won’t be achieved, other
things like security will be compromised also.
2. Security – To serve better the user, saving user’s preference is the main idea
of Web 3.0. However, is it achievable with the current state of the ICT?
3. Vastness – Information comes from billions of web pages is the main feature
of the Internet, and it must be organized to specifically deliver what the user’s
need.
4. Vagueness – Web 3.0 machine must cater all languages as this third generation of web
aims to serve diverse users.
5. Logic – Since it uses logic, it might not understand sarcasm nor other messages that might
involving interference or prediction.
Based on the lesson, the ICT is still under some development, however it greatly
impacts our daily life, and became an important part of the Philippine
economy that our country was dubbed as the “ICT Hub of Asia.”
Aside from Ash’s Pokémon creatures, the world of ICT keeps on growing and evolving,
thus the industry keeps on producing innovations that caters the needs of the digital natives
and digital immigrants. When we say “trends”, we are not only talking about the fashion
styles and clothes; but also, we follow trends in ICT. These are the 4 trends in ICT:
1. Social Media – These are the websites, application, or online channel that allows the
netizens (Internet citizen/web users) to create, co-create, discuss, modify, and exchange
user-generated content such as images, documents, et cetera with the other netizens.
People usually misuses the term “social media” by referring it to a specific application or
website, however, this is an umbrella term. It means that social media has six (6) types:

4erv
1.1. Social Networks – This type enables the user to connect with the other user that
has same interest, background, and/or information. It has rich
user experience as the user can personalized their profile
accounts, connect with the other users regardless the distance,
and react and leave comments on other user’s posts (Ex.:
Facebook and Google +).
1.2. Bookmarking Site – This site allows
Image credit: facebook.com
the user to store and manage links to
various websites and resources. Most of these sites allow you to
create a tag that allows you and others to easily search or share
them (Ex.: StumbleUpon and Pinterest). Image credit: play.google.com
1.3. Social Media News – Simply known
as social news. It is far different from traditional news platform.
This site promotes sharing the news provider and the user,
becomes a central for new stories from various other third-party
sources to instant news, and users can interact with the news
Image credit: entrepreneur.com stories by voting, liking, commenting, sharing, etc. (Ex.: Reddit and
Digg).
1.4. Media Sharing – Do you like to share your selfies, or to show your
self-made film? Media sharing applications enable user to upload
and share media content like image, video, and music to like,
comment, and share by the other users (Ex.: TikTok, YouTube, and
Instagram).
mage credit: adweek.com
1.5. Microblogging – Can you say your feelings with
just 280 characters? This type of social media focuses on short updates
from the user (Ex.: Twitter and Plurk).
1.6. Blogs and Forums – Unlike the vlog (video log), blog (web log) user
Image credit: help.twitter.com
posts their own write ups or narratives such as review,
diary, or journal on their customized website. Through
this blogpost, users can share links to other websites with the other
users, and the others can leave comment or reaction. On the other
hand, forum is a part of certain website wherein users can hold an
online discussion about a certain topic (Ex.: Blogger, WordPress, and
Tumblr). Image credit: dreamhost.com

2. Convergent Technologies – In the past, people can


access the applications and websites through the
personal computer. Due to technological
advancement, industry produces devices and
gadgets that achieves similar task or goal with the
personal computer. (Ex.: When I was a college
student, I need to rent a computer at the computer
shop to finish my type-written reports and research
assignments, but now, I can access, download, and
Image credit: Google Images
edit my students’ research through my
smartphone.)
3. Mobile Technologies – Similar with the fashion styles, mobile technologies, such as
smartphones and tablets, change and improve not just yearly, but every time. It becomes
popular because of its capability to do tasks that were originally found in personal
computers. Mobile devices use 4G Networking (LTE) and come along with different
operating

5erv
3.1. iOs – for Apple devices
3.2. Android – an open-source operating system developed by
Google
3.3. Blackberry OS – for Blackberry devices
3.4. Windows Phone OS – a closed source and proprietary
operating system developed by Microsoft.
3.5. Symbian – for Nokia devices
3.6. WebOS – for smart TVs
3.7. Windows Mobile – developed by Microsoft for smartphones
and pocket PCs
4. Assistive Media – Have Image credit: Google Images
you watch the movie
“Unfriended: Dark Web”? The main character used an
assistive media called “Papaya” to communicate with his
deaf and mute girlfriend. This trend refers to a group of
software and hardware devices to help people with
disabilities.
Image from the movie “Unfriended: Dark Web”

Online Systems, Functions, and Platforms


Due to technological advancement,
online versions of information systems were
developed. These online systems are “the
process of and tools for storing, managing,
using, and gathering of data and
communications in an organization.”
On the other hand, platforms are any
hardware or software to host an application.
These platforms come with the different
functions. One example is the collaborative
platforms. It is a that adds broad social
networking capabilities to Image credit: Google Images
example is the web search engines like
Google, Bing, and Yahoo. Once these platforms were programmed, it and become a tool.

LESSON 2: Online Safety, Security, Ethics,


and Etiquette: Internet Threats
Have you encountered the blue screen of death after your accessed or downloaded
a free product from a website? If yes, do not worry. You are not the only one who suffer
this damage o n their ICTs. Some of us, even me, experience this one. Through this
lesson, you will learn how to protect yourself and the other users in the digital world.
The threat on the Internet is real. After all, it become a public place especially billions of
people have an access and knowledge a b o u t Internet. One of the threats that you
must avoid is the malware. This term came from the blended words “malicious” and
“software”. Internet users usually acquired this threat through online. Malware is an
umbrella term covering five (5) different types:
1. Virus – It is malicious p r o g r a m t h a t usually transfer f r om one device to another
w i t h t h e a i d of the Internet and local networks, but commonly through data storage
such as flash drives or hard drive.

6erv
2. Worm – Unlike the virus, this malware replicates itself and can transfer by any type
of means, but more often through computer network. Remember the ILOVEYOU
w o r m , k n o w n a s Love Bug, that infected 4 5 million m a c h i n e s across the
globe, including the Pentagon, within 24 hours last May 4, 2000? (Computer
W e e k l y , 2020.) When the victim opens the attachment, an e-mail entitled LOVE-
LETTER-FOR-YOU, the malware automatically send itself to all the victim’s
Microsoft Outlook contacts.
3. Trojan – Tracing its name origin, it can be link to the mythology story about how
Trojan fell because of Greeks’ wooden horse (Hamilton 1942, 206). Like the
Odysseus’ strategy, this malicious program disguised as a useful program, however
when you left your devices unprotected and became vulnerable to other malwares once
you accessed or downloaded it.
4. Spyware – a malicious program that monitors the device, and the actions of the user
without its knowledge. Another example, the keylogger steals sensitive information using
the recorded user’s keystrokes.
5. Adware – this program automatically sends pop-ups advertisements.
6. Usually spam or unwanted emails contains bots and advertisements, however cyber
criminals can use this to transfer malwares; or worst, do cybercrimes like Phishing. Mr.
Victor Lorenzo, National Bureau of Investigation (NBI) Cybercrime Division Chief, said
that cybercrime incidents rose to 100% during the Covid-19 pandemic, and phishing
ranked one (GMA News Online 2020). Does it sound fishy? Like in fishing, criminal steals
sensitive personal information like account passwords and banking details by sending
out an alarming e-mail as a bait. Usually, they ask you to click a link, or input your
username, password, or any personal info.
Phishing is an example of cybercrime, an illegal act done using Internet, and there’s
more:
1. Hacking – it is unauthorized accessing of data from a computer network. Mostly,
hackers attack commercial and government sites to cause an alarm or to threat
someone.
2. Sport Betting – it is an illegal act of gambling on any sports event that happened
over the Internet.
3. Non-Delivery of Merchandise – a deceiving act which the culprit posted a product
or service on the Internet. Once the victim placed its payment, the culprit does
not give the item or service.
4. Electronic H a r a s s m e n t – an anonymous c r i m i n a l w h o harass, abuse, threat,
or annoy other people. One example of this is cyberbullying or the repeated
h a r a s s m e n t t h a t u s u a l l y h a p p e n s a m o n g the youth, and from the past
years, becomes the main cause of suicide cases.
5. Child Pornography – Based on Republic Act no 9775 or known as Anti- Child
Pornography Act of 2009, it is an act of real or simulated explicit sexual activities that
involves any child aged 18 and below and it is penalized depending on the offender. If
it is the parent or relative of the child, they’ll receive the maximum penalty.
6. Prostitution – it is an illegal act engage in any sexual activities.
7. Criminal Copyright Infringement – it is an unauthorized use or stealing of intellectual
property, such as movies and music, for profitable benefit. Sometimes, students violate
it through plagiarism.
Whether in the reality, or in the digital world, persons with bad intentions are
everywhere, and they are just waiting for an opening to do it. As a responsible digital citizen
(commonly called netizen (Internet citizen), we must be aware about these Internet threats,
how to avoid it, and practice our digital citizenship.

7erv
ACTIVITIES

Activity 1: WORD SEARCH


Can you find the ICTs listed below? Kindly, encircle it.

1. Fax Machine
2. Messenger
3. Telephone
4. Television
5. Text
6. Vlog
7. Pager
8. SMART
9. Radio
10. Laptop

Activity 2: LOGO GAME


Name the 10 social media logos you see in the picture below. Hint: Most of the
answers are mentioned in the lesson.

1. ____________________________ 6. ____________________________
2. ____________________________ 7. ____________________________
3. ____________________________ 8. ____________________________
4. ____________________________ 9. ____________________________
5. ____________________________ 10. ____________________________

Activity 3: TECH ASSISTANCE


Can you help her? Name at least five malwares you see in the picture

8erv
Write your answers here:

1. ____________________________ 4. ____________________________
2. ____________________________ 5. ____________________________
3. ____________________________

Activity 4: OUTSIDE WORLD


At this stay-at-home season, ICTs keep us entertained and informed. From the past
months up until now, illustrate an editorial cartoon featuring your one chosen cybercrime
that happened during this pandemic lockdown.

WRAP-UP

Directions: Fill-in the blanks with the correct missing terms.

1. ____________________________ or ICT is an umbrella term that covers any devices or


applications, as well as digital forms that can locate, save, send, and edit information. Through
Tim Berners-Lee innovation, people started with Web 2.___, and eventually, evolved into Web
3. _____, however, industry keeps on growing and thinking about Web 3.0 to serve people
better. It is a great advancement; however, it comes with a few problems like security, 4.
____________, vastness, logic, and compatibility.

9erv
Currently, digital native and immigrant enjoy the features of Web 2.0 namely, folksonomy,
rich user experience, user participation, 5 . _____services, software as a service, and mass
participation. These features can be seen with the social media applications and sites. ICT
contributes a great part in our daily life. In the Philippines, it is an integral part of
economy, and dubbed the country as the “ICT Hub of Asia.”
From the lesson, malwares have six (6) types. Can you list it? Please, write it down in an
alphabetical order. 1. _____________________ 2. ______________________ 3. ____________________
4. _______________ 5. _______________ 6. _______________. These malwares can be an avenue
for cybercrimes. Can you enumerate the 7 cybercrimes mentioned from this module?
1. _______________________ 2. ______________________ 3. __________________ 4. _______________
5. _______________ 6. _______________ 7. _______________
In wherever world you are, real or digital, threats are just in the corner waiting to harm
someone. Always remember, security and safety always start from us.

VALUING

A. Do you know the term “digital native” and “digital immigrant”? Digital Immigrant is a
person who born or brought up before the widespread use of digital technology; however
digital native is a person grows-up in the digital age, rather than acquiring familiarity
with the digital systems. As a digital native, what can you say about ICT? Is this a
responsibility, a privilege, or both? Please, write your answer and explain below:
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
_____________________________________.
B. Sounds cliché, but honesty is the best policy. Share the “bad things” or any
unwarranted acts (like piracy) you have done using ICT. Ask yourself why you did
that/them. Read your answer in front of the mirror while your alone. Assess yourself
and what you feel.
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
___________________________.

References
Delavega, C. (2020). Quarter 1 – Module 1: Information and Communications Technology (Part
1) [PDF Document]. Department of Education - Schools Division of Pasig City.
Delavega, C. (2020). Quarter 1 – Module 2: Information and Communications Technology (Part
2) [PDF Document]. Department of Education - Schools Division of Pasig City.
Delavega, C. (2020). Quarter 1 – Module 3: Online Safety, Security, Ethics, and Etiquette:
Internet Threats [PDF Document]. Department of Education - Schools Division of Pasig
City.
Yuvienco, J. (2016). Empowerment Technologies Student Reader: 1st Edition [PDF Document].
Department of Education.

10erv

You might also like