The Disadvantages of Ict

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 39

Let’s have AN ACTIVITY!

Knowledge Base
Corners
TERMS

•Cybercrime •Encryption
•Spam •Republic Act No. 10175
•Blackmail •Cybercrime Prevention
Act
•Identity Theft
GUIDE QUESTIONS:

• What are the internet cybercrimes being tackled or


showed in the video?
• What is the law that was being created and
implemented to help solve and prevent cybercrimes
in our country? Who is the author of the said House
Bill?
FAILON NGAYON-CYBERCRIME CASES IN
THE PHILIPPINES
• What are the internet cybercrimes being tackled or
showed in the video?
(Identity Theft and Trolls)
• What is the law that was being created and
implemented to help solve and prevent cybercrimes
in our country? Who is the author of the said House
Bill?
(House Bill No. 5021 – “Social Media Regulation
Act of 2017”) By: Rep. Pantaleon Alvarez
AND WHY IS IT IMPORTANT TO HAVE
KNOWLEDGE ABOUT THIS LAW? (HOUSE
BILL NO. 5021)

“Social Media Regulation


Act of 2017”
ACCORDING TO FELICIANO R. FAJARDO
(1994),

the country’s growth is a progressive process in


improving the human condition, such as reducing
poverty, unemployment, ignorance, inequality, and
exploitation. (Araling Panlipunan 10 – Konsepto ng Pag-unlad).
The Disadvantages of ICT
CYBERCRIMES
COMBATTING
CYBERCRIMES
At the end of this lesson, you should be able to:
1. Identify the several problems ICT has created and the ways in
combatting cybercrimes;
2. Develop an output using any ICT tools, platform, or application of
choice on how ICT change the world for better or for worse; and
3. Display critical thinking on the formulation of ideas for the
expected output.
WHAT IS CYBERCRIME?

It is an illegal act
done through the use
of the Internet.
IN 2012, STEPHEN NALE
(COMPLEX.COM) POSTED A LIST OF Ten
Most Common Internet Cybercrimes AS
FOLLOWS:
1. Phishing/Spoofing 6. Electronic Harassment
2. Blackmail/Extortion 7. Child Pornography
3. Accessing Stored 8. Prostitution
Communications 9. Drug Trafficking
4. Sports Betting 10. Criminal Copyright
5. Non-Delivery of Infringement
Merchandise
PHISHING/SPOOFING

The act of sending multiple emails to multiple users in hopes of


having a number of them clicking on the links or malwares
attached to the email.
Most email services today have spam or bulk folders that
automatically put these suspicious emails to that folder.
BLACKMAIL/EXTORTION

The act of using the Internet to threaten or damage someone’s


reputation to extort money or anything else of value.
This can be avoided if you are aware of what you should post
on the Internet.
ACCESSING STORED COMMUNICATIONS

Or hacking; the act of obtaining unauthorized access to data


from a computer network.
SPORTS BETTING

The act of wagering on any sports event over the Internet.


In some countries, gambling (including sports betting) is illegal
even if you are doing it over the Internet.
NON-DELIVERY OF MERCHANDISE

The act of devising a scheme wherein a culprit posts an item or


service for sale over the Internet and once the transactions have
been done, does not really give the item or service.
The act of anonymously using the Internet to harass, abuse,
threaten, or annoy other people.
This is also an act of cyberbullying.
CHILD PORNOGRAPHY

This act is highly punishable by law.


The act of using the Internet to show
child pornography.
PROSTITUTION

The act of using the internet to engage in prostitution


DRUG TRAFFICKING

The act of selling illegal substances using the Internet.


The act of piracy mainly for financial
gain.
In late 2014, the number one pirate
website, ThePirateBay, was raided
for the second time due to years of
pirating movies, music, games,
books,
and other software. These kinds of
websites earn money through
advertising.
COMBATTING CYBERCRIMES

There are several ways the authorities can help solve or


prevent cybercrimes. Here are some of them:
1. Network Security
2. Investigation
3. Penalties
NETWORK SECURITY

Before a hacker can get through the unauthorized files he or


she is targeting, the hacker has to get through several security
measures like firewalls, secure connections, passwords, anti-
malwares, and data encryptions.
ENCRYPTION is the process of converting raw data into code
INVESTIGATION

URL tracing and logging are used by websites to track your


unique IP addresses. This can be used by investigators to trace
hackers.
In piracy, trackers are used to identify IP addresses currently
sharing a pirated file.
PENALTIES

More and more laws are being created and implemented today.
Penalties include both a fine and imprisonment.
REPUBLIC ACT NO. 10175 :
“CYBERCRIME PREVENTION ACT OF 2012”

• AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE


PREVENTION, INVESTIGATION, SUPPRESSION AND THE
IMPOSITION OF PENALTIES THEREFOR AND FOR OTHER
PURPOSES
• The Cybercrime Prevention Act of 2012 sanctions content-
related offenses performed using a computer system, such as
cybersex, child pornography, and libel. In addition, unsolicited
commercial communications or content that advertises or sells
products or services is also punished.
LET’S HAVE AN
ACTIVITY
AGAIN! ROLE
PLAYING…
What Will You Do Challenge!
Situation:
If your friend happened to do such
cybercriminal activities specifically identity
theft and prostitution, what will you do?
ROLE PLAY RUBRIC:
CRITERIA LEVEL 4 LEVEL 3 LEVEL 2 LEVEL 1
Works Always willing Usually willing Sometimes Rarely willing
Cooperatively and focused and focused willing and and focused
within the during assigned during assigned focused during during assigned
group task and task and assigned task and task and
presentation presentation presentation presentation
Presentation of Convincing Competent Adequate Limited
Perspective communication communication communication communication
of character’s of character’s of character’s of character’s
role, feelings, role, feelings, role, feelings, role, feelings,
and motives and motives and motives and motives
Use of Non- An impressive Good variety (1 An acceptable Limited variety
verbal Cues variety of non- or more) of non- variety of non- of non-verbal
(voice, gestures, verbal cues were verbal cues were verbal cues were cues were used
eye contact) used in an used in an used in an in an developing
exemplary way competent way adequate way way
TRUE OR FALSE: Write T if the statement is correct,
otherwise, replace the underlined word/s to make the statement
correct.
1. Phishing is the act of sending multiple emails to multiple users
in hopes of having a number of them clicking on the links or
malwares attached to the email.
2. Spoofing is the act of obtaining unauthorized access to data
from a computer network.
3. Extortion is the act of using the internet to threaten or damage
someone’s reputation to extort money or anything else of value.
4. In late 2014, LimeWire was raided for the second time due to
years of pirating movies, music, games, books, and other software.
5. Electronic harassment is also referred to as cyberbullying.
6. Non-delivery of service is the act of devising a scheme wherein a
culprit posts an item or service for sale over the internet, and once
the transactions have been done, does not give the item or service.
7. Encryption is the process of converting raw data to code.
8. In piracy, trackers are used to identify IP addresses currently
sharing a pirated file.
9. Wager gambling is the act of betting on any sports event over the
internet.
10. Most email services today have spam or bulk folder that
automatically puts these suspicious emails to that folder.
ANSWER KEY:

1. T 6. Merchandise
2. Accessing Stored 7. T
Communications
8. T
3. T
9. Sports Betting
4. ThePirateBay
5. T 10. T
ASSIGNMENT/PROJECT!!!

Develop an output using any ICT tools, platform or application


of choice (e.g., video blog, presentation or image gallery,
website, illustrated document, podcast or webcast) about
everything you have learned about ICT and its possible impact
to our society. Talk about its positive and negative impacts and
the youth’s role in helping promote its responsible use.
Interview your classmates and other school personnel.
KEEP EVERYTHING IN PROPER
ORDER
Verse of the Day
The LORD hath made known His Salvation: His righteousness
hath he openly shewed in the sight of the heathen. (Psalm 98:2)

THANK YOU!
AND 39

LET’S PRAY…

You might also like