Professional Documents
Culture Documents
Lesson 1 What Is Information and Communications Technology
Lesson 1 What Is Information and Communications Technology
Lesson 1 What Is Information and Communications Technology
Communications Technology?
Empowerment Technology or E-Tech often deals with the use of different technologies
such as mobile phones, telephone, computer and other devices to locate, save,
communicate and to inform. Empowerment Technology is important for its innovative
uses is sufficient in our daily lives.
Empowering the World with the use of technology. We're so lucky because the
technologies are present everywhere it help us to make our work quickly and
accurate. It is timely updated and always upgraded. In this generation, technology
has many uses and important role to our lives and what we all to do is to
empower it by doing some things that have value or good benefit to us by the use
of gadgets and computers.
Advantages of
Technology In
Education
1. Parent’s •Cell phones now allow us to stay in contact with our friends and
Peace of family anywhere that we are. It is how students communicate problems
Mind and emergencies with their parents when they are at school as well.
2. The
Information •Any answer to any question can be found with a few clicks of the keys
Highway on the computer or smart phone. Powerful search engines allow an
organized and simply way to find the answers that students may need
for assignments or projects.
3. Broaden •Before the internet, children knew what their family taught them.
The Mind This caused their political and religious views to be the only ones that
the children knew. Having access to the technology will expose them
to things outside of their parents interests and help them to form their
own opinions.
4. Brings •Learning the same exact way from the same person every day can
Some Fun really get…boring. This boredom turns into a lack of motivation in the
Into The students. When they are able to integrate computer learning into
Classroom their normal schedule, they become much more excited to learn.
•In the working world, in nearly every job you may take, you have
5. Applicable to know how to operate a computer. Teaching this skill in children
Education early will give them an advantages and a learning curve for when
they are adults.
Disadvantages of
Technology In
Education
4. Inevitable •While have an easy access to information may seem like a great thing, it
Cheating can become a real problem in a test taking environment. Cell phones
have made cheating easier than ever. You no longer have to figure out
how to write all of the answers down, you can just look them up!
Internet
Image: unet.cz
computer resources
Web Browsers
Image: cnet.com
- a computer program used to open and browse web pages over the internet
- examples of web browsers are Google Chrome, Mozilla Firefox, Safari, Internet
Explorer, etc.
-an information space where documents and other web resources are identified by
Web 1.0
Web 1.0 refers to the first stage in the World Wide Web, which was entirely made up
of web pages connected by hyperlinks. Although the exact definition of Web 1.0 is a
source of debate, it is generally believed to refer to the web when it was a set
Web 2.0
Web 2.0 is the term used to describe a variety of web sites and applications that allow
anyone to create and share online information or material they have created. A key
element of the technology is that it allows people to create, share, collaborate &
communicate.
The social media pages and blogs are examples of Web 2.0.
2. Convergent Technologies
Technological convergence is the synergy of technological advancements to work in a
conveniently.
3. Social Media
Social network
Bookmarking sites
Social News
Media Sharing
Microblogging
4. Mobile Technologies
The popularity of smartphones and tablets has taken rise over the years. This is largely
because of the devices' capability to do tasks that were originally found in personal
computers.
iOS
Android
Blackberry OS
Windows Phone OS
Symbian
WebOS
Windows Mobile
5. Assistive Media
It is a non-profit service designed to help people who have visual and reading
Copyright Infringement
Intellectual Property
Copyright Law
task
Social media – websites, applications, or online channels that enable users to create,
Sources:
https://www.techopedia.com/definition/27960/web-10
https://copyright.unimelb.edu.au/__data/assets/pdf_file/0011/.../wikisblogsweb2blue.pdf
https://www.facebook.com/tongohinNHSempowerment/posts/1842441439354596
The Philippines’ legal framework for cybercrime and electronic evidence is substantially
consistent with the Budapest Convention, with the Cybercrime Prevention Act taking
effect in February 2014.
The Congress of the Philippines passed Republic Act No. 10175, [1] often known as the
“Cybercrime Prevention Act of 2012,” which addresses all types of cybercrime committed
against and by means of computer system on September 12, 2012.
It contains substantive penal regulations, procedural courses of action, and international
cooperation rules. In the Philippines, amendatory bills on cybercrime investigations are
always on hindsight, with contemporary provisions on procedural powers, obligations, and
extradition being continuously explored.
The dynamism of information technology likewise necessitates constant evolution on the
legal approaches that may be subsequently needed as a result of the emergence of novel
situations.
The modifications are intended to give prosecutors and investigators with a structured
approach to cybercrime probes and to further align national legislation with the Budapest
Convention.
The Philippine Cybercrime Prevention Act of 2012 focuses on preventing, detecting, and
prosecuting cybercrimes such as offenses against the confidentiality, integrity, and
availability of computer data and systems, as well as computer-related and content-
related offenses.
Furthermore, Section 6 of the Act states that any crimes specified and punished by
the Revised Penal Code, as amended, and special laws that are committed by, through,
or with the use of information and communications technology are covered by the Revised
Penal Code’s applicable provisions.
It is provided, however, that the penalty imposed shall be one degree greater than that
imposed under the Revised Penal Code, as amended, and special legislation, as
applicable.
Furthermore, Section 7 of the Cybercrime Act states that any prosecution under the Act
is without prejudice to any culpability for violating any provision of the Revised Penal
Code, as amended, or special laws.
What is cybercrime law all about?
Cybercrime law establishes standards of acceptable behavior for users of information and
communication technology (ICT).
It protects ICT users in general, and mitigates and/or prevents harm to people, data,
systems, services, and infrastructure in particular; protects human rights.
This modern day law enables the investigation and prosecution of online crimes and
promotes international cooperation on cybercrime issues.
The usage of the internet, computers, and similar digital technology, as well as the acts
of the public, government, and commercial sector, are governed by cybercrime
legislation, which includes rules of proof and criminal procedure, and other cybercrime-
related criminal justice issues.
This statute [Cybercrime Law], as well, provides regulation in order to decrease risk
and/or ameliorate the harm caused to persons, businesses, and infrastructure in the event
of a cybercrime. As a result, cybercrime law includes substantive, procedural, and
preventive.
The State’s awareness of the information and communications sectors’ critical role in the
nation’s overall social and economic growth, as well as the necessity to preserve and
safeguard computer systems and networks from all types of misuse, abuse, and unlawful
access.
The transgressions against computer data and systems’ confidentiality, integrity, and
availability. This category includes offenses such as unauthorized access to a computer
system or unauthorized access to a computer, as well as cybersquatting, or the
acquisition of a domain name in bad faith in order to profit, mislead, and destroy
reputation, as well as preventing others from registering the name.
What is the punishment of cybercrime?
As stated above, this cybercrime law is punitive in nature. Thus, the Act punishes anyone
who tries to commit a cybercrime, or who intentionally abets or assists in the conduct of
a cybercrime, as defined and penalized under the law itself or in relation to the Revised
Penal Code.
Furthermore, the Act states that all crimes listed under current laws shall be covered by
the Act’s applicable provisions if they are committed through and with the use of
information and communications technologies.
Cybercrime Libel | Online Libel
Several bills were presented shortly after the Cybercrime Prevention Act was signed into
law in September 2012, with the goal of repealing key sections of Republic Act No. 10175,
including the restrictions on online libel.
Such legislation aimed to address the issue of online libel, which was seen as a sort of
online censorship in and of itself.
The Supreme Court ruled that online libel only applies to those who create or publish
libelous content, not to those who read, comment to, like, or share it. A bill was introduced
in the 17th Congress to evaluate these disputed issues that jeopardize the right to free
speech.
Procedural Course of Action
The Philippine Cybercrime Prevention Act of 2012 also establishes procedural
requirements for law enforcement agencies charged with enforcing and
implementing[2] the provisions.
To ensure that the technical nature of cybercrime and its prevention is prioritized, as well
as the procedures for international cooperation, law enforcement authorities, specifically
the computer or technology crime divisions responsible for cybercrime investigations, are
required to submit timely and accurate reports.
The Department of Justice (DOJ) is the one who will handle the evaluation and
monitoring, including pre-operation, post-operation, and investigation outcomes, as well
as any other documentation that may be necessary.
The National Cybersecurity Plan has four main objectives:
(1) ensuring the continuous operation of the nation’s critical information infrastructures,
public and military networks;
(2) implementing cyber resiliency measures to improve the ability to respond to threats
before, during, and after attacks;
(3) effective coordination with law enforcement agencies; and
(4) a cybersecurity-aware society.
Seizure Warrants | Cybercrime | Nutshell Discussion
As a necessary consequence of this cybercrime law is the adoption of cybercrime
warrants. While our procedural rules govern and regulate the issuance of the commonly
known search warrants, nonetheless, by the nature of the object of the seizure or the
things to be seized, which are not tangible object, but virtual ones, such as electronic
information, the present rules[3] relating to regular search warrants may not be sufficient
to address that situation of electronic data seizure.
Hence, when what is involved are electronic data, which are illegal in nature or operation
and can be the object of search and seizure, the Supreme Court of the Philippines, as
part of their rule-making power, promulgated[4] A.M. No. 17-11-03-SC otherwise known
as the Cybercrime Warrants.
References
References
↑1 Cybercrime Prevention Act of 2012
↑2 Implementing Rules, Republic Act No. 10175
↑3 Search and Seizure, Rule 126 of the Rules of Criminal Procedure
↑4 Rule on Cybercrime Warrants, A.M. No. 17-11-03-SC
Hashtag
A hashtag is a metadata tag that is prefaced by the hash (or pound) sign, #. Hashtags
are used on microblogging and photo-sharing services such as Twitter or Instagram as
a form of user-generated tagging that enables cross-referencing of content by topic or
theme.[1] For example, a search within Instagram for the hashtag #bluesky returns all
posts that have been tagged with that term. After the initial hash symbol, a hashtag may
include letters, numerals, or underscores.[2]
The use of hashtags was first proposed by American blogger and product
consultant Chris Messina in a 2007 tweet.[3][4] Messina made no attempt to patent the
use because he felt that "they were born of the internet, and owned by no
one".[5][6] Hashtags became entrenched in the culture of Twitter[7] and soon emerged
across Instagram, Facebook, and YouTube.[8][9] In June 2014, hashtag was added to
the Oxford English Dictionary as "a word or phrase with the symbol # in front of it, used
on social media websites and apps so that you can search for all messages with the
same subject".[10][11
Hashtag - Wikipedia
What is a Hashtag?
A hashtag is a label used on social media sites that makes it easier to find posts or
information with a theme or contains specific content. It is created by including the
symbol “#” in front of a word or words without spaces.
A hashtag is a label used on social media sites that makes it easier to find
information with a theme or specific content.
Hashtags encourage social media users to explore content that catches their eye.
Associations can use hashtags to reach their target audience and to help members
filter information.
Hashtags can be generalized or very specific. The best practice is to experiment and be
consistent with your social media usage. The more you use a specific hashtag, the
greater your chances are to grow an audience. If a certain hashtag isn’t working (i.e., it’s
not catching on and your customers aren’t receptive to it), change it. But, be patient and
give your hashtag time to catch on. Don’t change your hashtag every week.
Consistency is key.
When creating a social media post, do not overuse hashtags. Posts should be concise,
and using too many hashtags can make your message seem cluttered and
unprofessional. Including one to three hashtags per post is sufficient.
Important: Don’t forget to check your analytics. It’s crucial to know what’s working—or
hurting—your social media campaign. You don’t want to continue using a hashtag that
no one is following.
Ask questions
Congratulatory/celebratory tweets
#____________________________
Put your # below
#____________________________
Information and Communications Technology (ICT) is technology that is used to
handle communications processes such as telecommunications, broadcast
media, intelligent building management systems, audiovisual processing and
transmission systems, and network-based control and monitoring functions.