Lesson 1 What Is Information and Communications Technology

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 19

Lesson 1: What is Information and

Communications Technology?

What is Empowerment Technology?

Empowerment Technology or E-Tech often deals with the use of different technologies
such as mobile phones, telephone, computer and other devices to locate, save,
communicate and to inform. Empowerment Technology is important for its innovative
uses is sufficient in our daily lives.

Empowering the World with the use of technology. We're so lucky because the
technologies are present everywhere it help us to make our work quickly and
accurate. It is timely updated and always upgraded. In this generation, technology
has many uses and important role to our lives and what we all to do is to
empower it by doing some things that have value or good benefit to us by the use
of gadgets and computers.

ICT (information and communications technology - or technologies) is an


umbrella term that includes any communication device or application,
Features of encompassing: radio, television, cellular phones, computer and network
Empowerment hardware and software, satellite systems and so on, as well as the various
Technology services and applications associated with them, such as
videoconferencing and distance learning. ICTs are often spoken of in a
particular context, such as ICTs in education, health care, or libraries. The
term is somewhat more common outside of the United States.

Empowerment technology is important , especially to the millennials to


Importance of prepare, to teach the value and to introduce them/us to the proper world of
Technology ICT (Information and Communication Technologies) and also, of course to
teach us the proper etiquette of using it and not the way where people use
it in violence that could end up someone else’s precious life.
10 Advantages and Disadvantages of Technology in Education

Advantages of
Technology In
Education

1. Parent’s •Cell phones now allow us to stay in contact with our friends and
Peace of family anywhere that we are. It is how students communicate problems
Mind and emergencies with their parents when they are at school as well.

2. The
Information •Any answer to any question can be found with a few clicks of the keys
Highway on the computer or smart phone. Powerful search engines allow an
organized and simply way to find the answers that students may need
for assignments or projects.

3. Broaden •Before the internet, children knew what their family taught them.
The Mind This caused their political and religious views to be the only ones that
the children knew. Having access to the technology will expose them
to things outside of their parents interests and help them to form their
own opinions.

4. Brings •Learning the same exact way from the same person every day can
Some Fun really get…boring. This boredom turns into a lack of motivation in the
Into The students. When they are able to integrate computer learning into
Classroom their normal schedule, they become much more excited to learn.

•In the working world, in nearly every job you may take, you have
5. Applicable to know how to operate a computer. Teaching this skill in children
Education early will give them an advantages and a learning curve for when
they are adults.
Disadvantages of
Technology In
Education

•The biggest concern when it comes to the use of technology in schools


1. Access To is how easy pornographic, violent, and other inappropriate materials can
Inappropriate be accessed and viewed. This could cause big problems if the material
Content is shared with other students while in the classroom.

•This harmful effect of technology has already come to light in today’s


2. A
world. People are attached to their screens almost 24/7, which is causing
Disconnected
an entirely new set of social issues to pop up. This translates into the
Youth
school system in a bit of a different way, however. More and more
students are experiencing social anxieties when it comes to face to face
interactions, but are perfectly fine socializing online.

•Giving students access to anonymous accounts and endless contact


3. The avenues can only lead to trouble. Cyber bullying has become a real and
Cyberbullying in our face problem among young people today. This harassment has no
Trap end, which includes the class room. There is also no way to monitor or
discipline students who are involved.

4. Inevitable •While have an easy access to information may seem like a great thing, it
Cheating can become a real problem in a test taking environment. Cell phones
have made cheating easier than ever. You no longer have to figure out
how to write all of the answers down, you can just look them up!

•Attentiveness drops drastically in the classroom when students have


5. A Major their cell phones or other technologies out. The focus shifts from their
Distraction teacher and education, to whatever they are looking at, playing, or doing
on their phones.
The Current State of ICT Technologies (Updated)

Internet

Image: unet.cz

- a large computer network that is made up of thousand network worldwide

- in 1969, the Advanced Research Projects Agency Network or ARPANET was

launched by US Department of Defense to allow scientists to share information and

computer resources

Web Browsers

Image: cnet.com
- a computer program used to open and browse web pages over the internet

- examples of web browsers are Google Chrome, Mozilla Firefox, Safari, Internet

Explorer, etc.

1. World Wide Web (WWW)

-invented by Tim Berners-Lee in 1989

-an information space where documents and other web resources are identified by

Uniform Resource Locators (URLs) interlinked by hypertext links and accessible

through the Internet

Web 1.0

Web 1.0 refers to the first stage in the World Wide Web, which was entirely made up

of web pages connected by hyperlinks. Although the exact definition of Web 1.0 is a

source of debate, it is generally believed to refer to the web when it was a set

of static websites that were not yet providing interactive content.

Example of this type of web page is an information found on http://tilde.club/~choire/.

Web 2.0

Web 2.0 is the term used to describe a variety of web sites and applications that allow

anyone to create and share online information or material they have created. A key

element of the technology is that it allows people to create, share, collaborate &

communicate.

The social media pages and blogs are examples of Web 2.0.

2. Convergent Technologies
Technological convergence is the synergy of technological advancements to work in a

similar goal or task. It is the use of several technologies to accomplish a task

conveniently.

3. Social Media

 Social network

 Bookmarking sites

 Social News

 Media Sharing

 Microblogging

 Blogs and Forums

4. Mobile Technologies

The popularity of smartphones and tablets has taken rise over the years. This is largely

because of the devices' capability to do tasks that were originally found in personal

computers.

Mobile Technologies Operating System:

 iOS

 Android

 Blackberry OS

 Windows Phone OS

 Symbian

 WebOS
 Windows Mobile

5. Assistive Media

It is a non-profit service designed to help people who have visual and reading

impairments. A database of audio recordings is used to read to the user.

Copyright Infringement

 Intellectual Property

 Copyright Law

Folksonomy – allows users to categorize and classify/arrange information.

Hashtag – used to “categorize” posts in website

Convergence – the synergy of technological advancements to work on a similar goal or

task

Social media – websites, applications, or online channels that enable users to create,

co-create, discuss, modify, and exchange user-generated content.

Sources:

https://www.techopedia.com/definition/27960/web-10

https://copyright.unimelb.edu.au/__data/assets/pdf_file/0011/.../wikisblogsweb2blue.pdf

https://www.facebook.com/tongohinNHSempowerment/posts/1842441439354596

The Current State of ICT Technologies (Updated) (shs-etech.blogspot.com)


Cybercrime Law in the Philippines

The Philippines’ legal framework for cybercrime and electronic evidence is substantially
consistent with the Budapest Convention, with the Cybercrime Prevention Act taking
effect in February 2014.
The Congress of the Philippines passed Republic Act No. 10175, [1] often known as the
“Cybercrime Prevention Act of 2012,” which addresses all types of cybercrime committed
against and by means of computer system on September 12, 2012.
It contains substantive penal regulations, procedural courses of action, and international
cooperation rules. In the Philippines, amendatory bills on cybercrime investigations are
always on hindsight, with contemporary provisions on procedural powers, obligations, and
extradition being continuously explored.
The dynamism of information technology likewise necessitates constant evolution on the
legal approaches that may be subsequently needed as a result of the emergence of novel
situations.
The modifications are intended to give prosecutors and investigators with a structured
approach to cybercrime probes and to further align national legislation with the Budapest
Convention.
The Philippine Cybercrime Prevention Act of 2012 focuses on preventing, detecting, and
prosecuting cybercrimes such as offenses against the confidentiality, integrity, and
availability of computer data and systems, as well as computer-related and content-
related offenses.
Furthermore, Section 6 of the Act states that any crimes specified and punished by
the Revised Penal Code, as amended, and special laws that are committed by, through,
or with the use of information and communications technology are covered by the Revised
Penal Code’s applicable provisions.
It is provided, however, that the penalty imposed shall be one degree greater than that
imposed under the Revised Penal Code, as amended, and special legislation, as
applicable.
Furthermore, Section 7 of the Cybercrime Act states that any prosecution under the Act
is without prejudice to any culpability for violating any provision of the Revised Penal
Code, as amended, or special laws.
What is cybercrime law all about?
Cybercrime law establishes standards of acceptable behavior for users of information and
communication technology (ICT).
It protects ICT users in general, and mitigates and/or prevents harm to people, data,
systems, services, and infrastructure in particular; protects human rights.
This modern day law enables the investigation and prosecution of online crimes and
promotes international cooperation on cybercrime issues.
The usage of the internet, computers, and similar digital technology, as well as the acts
of the public, government, and commercial sector, are governed by cybercrime
legislation, which includes rules of proof and criminal procedure, and other cybercrime-
related criminal justice issues.
This statute [Cybercrime Law], as well, provides regulation in order to decrease risk
and/or ameliorate the harm caused to persons, businesses, and infrastructure in the event
of a cybercrime. As a result, cybercrime law includes substantive, procedural, and
preventive.
The State’s awareness of the information and communications sectors’ critical role in the
nation’s overall social and economic growth, as well as the necessity to preserve and
safeguard computer systems and networks from all types of misuse, abuse, and unlawful
access.
The transgressions against computer data and systems’ confidentiality, integrity, and
availability. This category includes offenses such as unauthorized access to a computer
system or unauthorized access to a computer, as well as cybersquatting, or the
acquisition of a domain name in bad faith in order to profit, mislead, and destroy
reputation, as well as preventing others from registering the name.
What is the punishment of cybercrime?
As stated above, this cybercrime law is punitive in nature. Thus, the Act punishes anyone
who tries to commit a cybercrime, or who intentionally abets or assists in the conduct of
a cybercrime, as defined and penalized under the law itself or in relation to the Revised
Penal Code.
Furthermore, the Act states that all crimes listed under current laws shall be covered by
the Act’s applicable provisions if they are committed through and with the use of
information and communications technologies.
Cybercrime Libel | Online Libel
Several bills were presented shortly after the Cybercrime Prevention Act was signed into
law in September 2012, with the goal of repealing key sections of Republic Act No. 10175,
including the restrictions on online libel.
Such legislation aimed to address the issue of online libel, which was seen as a sort of
online censorship in and of itself.
The Supreme Court ruled that online libel only applies to those who create or publish
libelous content, not to those who read, comment to, like, or share it. A bill was introduced
in the 17th Congress to evaluate these disputed issues that jeopardize the right to free
speech.
Procedural Course of Action
The Philippine Cybercrime Prevention Act of 2012 also establishes procedural
requirements for law enforcement agencies charged with enforcing and
implementing[2] the provisions.
To ensure that the technical nature of cybercrime and its prevention is prioritized, as well
as the procedures for international cooperation, law enforcement authorities, specifically
the computer or technology crime divisions responsible for cybercrime investigations, are
required to submit timely and accurate reports.
The Department of Justice (DOJ) is the one who will handle the evaluation and
monitoring, including pre-operation, post-operation, and investigation outcomes, as well
as any other documentation that may be necessary.
The National Cybersecurity Plan has four main objectives:
(1) ensuring the continuous operation of the nation’s critical information infrastructures,
public and military networks;
(2) implementing cyber resiliency measures to improve the ability to respond to threats
before, during, and after attacks;
(3) effective coordination with law enforcement agencies; and
(4) a cybersecurity-aware society.
Seizure Warrants | Cybercrime | Nutshell Discussion
As a necessary consequence of this cybercrime law is the adoption of cybercrime
warrants. While our procedural rules govern and regulate the issuance of the commonly
known search warrants, nonetheless, by the nature of the object of the seizure or the
things to be seized, which are not tangible object, but virtual ones, such as electronic
information, the present rules[3] relating to regular search warrants may not be sufficient
to address that situation of electronic data seizure.
Hence, when what is involved are electronic data, which are illegal in nature or operation
and can be the object of search and seizure, the Supreme Court of the Philippines, as
part of their rule-making power, promulgated[4] A.M. No. 17-11-03-SC otherwise known
as the Cybercrime Warrants.
References
References
↑1 Cybercrime Prevention Act of 2012
↑2 Implementing Rules, Republic Act No. 10175
↑3 Search and Seizure, Rule 126 of the Rules of Criminal Procedure
↑4 Rule on Cybercrime Warrants, A.M. No. 17-11-03-SC
Hashtag

A hashtag is a metadata tag that is prefaced by the hash (or pound) sign, #. Hashtags
are used on microblogging and photo-sharing services such as Twitter or Instagram as
a form of user-generated tagging that enables cross-referencing of content by topic or
theme.[1] For example, a search within Instagram for the hashtag #bluesky returns all
posts that have been tagged with that term. After the initial hash symbol, a hashtag may
include letters, numerals, or underscores.[2]
The use of hashtags was first proposed by American blogger and product
consultant Chris Messina in a 2007 tweet.[3][4] Messina made no attempt to patent the
use because he felt that "they were born of the internet, and owned by no
one".[5][6] Hashtags became entrenched in the culture of Twitter[7] and soon emerged
across Instagram, Facebook, and YouTube.[8][9] In June 2014, hashtag was added to
the Oxford English Dictionary as "a word or phrase with the symbol # in front of it, used
on social media websites and apps so that you can search for all messages with the
same subject".[10][11

Hashtag - Wikipedia

What is a Hashtag?

A hashtag is a label used on social media sites that makes it easier to find posts or
information with a theme or contains specific content. It is created by including the
symbol “#” in front of a word or words without spaces.

 A hashtag is a label used on social media sites that makes it easier to find
information with a theme or specific content.
 Hashtags encourage social media users to explore content that catches their eye.
 Associations can use hashtags to reach their target audience and to help members
filter information.

Do Hashtags Serve a Purpose?


Of course they do! In today’s world of social media, users can quickly get bogged down
by information overload. Using hashtags makes it easy to cut through digital clutter
focus only on the information we really want. Hashtags are typically used on social
media sites such as Twitter, Instagram, YouTube, Google+ and Pinterest.
Copyright
John L. Hart, FLP

Four Reasons to Use Hashtags:


1. Hashtags simplify the process–Searching a hashtag pulls results for each post using
that hashtag. Using a hashtag helps you reach your target audience, and likewise
makes it easier for others to find your information.
2. They compel an action–When a user sees a post that is of interest, they will likely
spend time looking through content brought up by the hashtag.
3. Hashtags evolve–Hashtags are being used by more and more platforms, impacting
the amount of information put directly in front of social media users.
4. They reward the distinctive–Hashtags make finding information easier for social
media users. A unique hashtag makes your message stand out to the users who find
the hashtag valuable.

What Makes a Good Hashtag?


An industry-related hashtag will help you reach your target audience and connect you
with your industry. Hashtags can be used to identify your products, services or
communications.

Hashtags can be generalized or very specific. The best practice is to experiment and be
consistent with your social media usage. The more you use a specific hashtag, the
greater your chances are to grow an audience. If a certain hashtag isn’t working (i.e., it’s
not catching on and your customers aren’t receptive to it), change it. But, be patient and
give your hashtag time to catch on. Don’t change your hashtag every week.
Consistency is key.

When creating a social media post, do not overuse hashtags. Posts should be concise,
and using too many hashtags can make your message seem cluttered and
unprofessional. Including one to three hashtags per post is sufficient.

Important: Don’t forget to check your analytics. It’s crucial to know what’s working—or
hurting—your social media campaign. You don’t want to continue using a hashtag that
no one is following.

How Do I Identify Industry Hashtags?


Start by searching Twitter. Check replies to your association’s tweets and the accounts
of other leading industry organizations to learn what hashtags they are using. You can
also search common industry terms. Compare hashtags by using Topsy
(topsy.com/analytics). This site keeps you up to date with what’s trending and what
people are following.
Are Hashtags Effective?
Yes! Using hashtags puts pertinent information at your fingertips, allowing you to spend
less time searching for information.. Spend just a few minutes researching popular
hashtags and you’re sure to find what works for you. Here are some examples of when
including a hashtag can be effective:

 Digital publication announcements

 Media kits and special offers


 Tradeshow/event information and images

 Retweet, favorite and reply to your association


 Trending industry articles, topics or events

 Ask questions
 Congratulatory/celebratory tweets

 Personal thoughts, achievements, updates, marketing industry topics


Remember not to use special characters or spaces in your in your hashtags. Hashtags
only recognize letters and numbers.
What’s the Most Important Thing about Hashtags?
That they’re easy to use! Remember, hashtags not only help users find posts about
specific content, they help you reach more people who are interested in what your
content. Compose hashtags that fit your industry by using common industry-related
terms. Hashtags are the simplest way to organize the endless amount of information
posted to social media so that you’re only seeing what you find relevant. Less is more
when it comes to hashtags. Keep their use to three or fewer per post/tweet when you
can, and when you find one that works, keep using it.

About The Author


Nancy Taylor is a marketing account specialist for Naylor Association Solutions, with
extensive experience using creative hashtags.

Put your # below

#____________________________
Put your # below

#____________________________
 Information and Communications Technology (ICT) is technology that is used to
handle communications processes such as telecommunications, broadcast
media, intelligent building management systems, audiovisual processing and
transmission systems, and network-based control and monitoring functions.

You might also like