Developing An ICT Project

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 12

DEVELOPING AN ICT PROJECT

Empowerment Technologies
CREATING A CONCEPT PAPER

Why creating a concept paper is


needed?

- Doable
- Significant to be made in realty
CREATING A CONCEPT PAPER

A concept paper is a document used


to convince a panel of potential
funders to help a product, program,
or service become a reality.
FIVE ELEMENTS OF A CONCEPT PAPER

1. INTRODUCTION II. PURPOSE


– includes your group’s mission and – includes the reasons why this project
vision and a brief introduction of your is worth your group and your sponsor’s
project time, effort, and money

III. DESCRIPTION
– includes all the necessary information about
the project. In ICT, it involves the sites you
are going to produce and the purpose of each
and how they work in unison.
FIVE ELEMENTS OF A CONCEPT PAPER

IV. SUPPORT V. CONTACT


– contains the budget needed for the INFORMATION
project. Some concept papers do not
specify any amount requested from the – includes information on how the
sponsor. group can be contacted
S I M P LI F I ED I CT P RO J E CT P RO C ES S O V ERV I EW
RELEASE AND
PLANNING DEVELOPMENT I N F O R M AT I O N MAINTENANCE

It involves the following It involves the It involves the It involves


tasks (but not limited to): actual creation of the actual release of the responding to the
a. Conceptualizing website(s); involves the website for public view feedback from your site
your project
production of images, and promoting it. The visitors and continuing
b. Researching on
available data about
infographics, etc. promotion typically starts to improve the website.
your topic before the actual release.
c. Setting deadlines
and meetings
d. Assigning people to
various tasks
e. Finding a web or
blog host
f. Creating a sitemap
for your website
g. Listing down all
applications that
you need including
web apps
h. Funding (if
applicable)
DISADVANTAGE OF ICT
CYBERCRIMES

 Cybercrimes are illegal acts done through the use of the Internet. In 2012, here are the ten most common Internet
cybercrimes:

1. Phishing/Spoofing – The act of sending multiple emails to multiple users in hopes of having a number
of them clicking on the links or malware attached to the email. Most email services today have spam or bulk
folders that automatically put these suspicious emails to that folder. However, this is not 100% accurate that
some emails are not filtered and some other emails that are legitimate end up on the spam folder.
2. Blackmail/Extortion – the act of using the Internet to threaten or damage someone’s reputation to
extort money or anything else of value. This can be avoided if you are aware of what you should post on the
Internet. The victims of this act tend to have posted something “inappropriate” over the Internet even if they
put it at a secure location.
3. Accessing Stored Communications – or hacking; the act of obtaining unauthorized access to data
from a computer network. This is typically done to commercial and government sites to threaten its owner. In
late 2014, a group of hackers hacked Sony’s website because of the impending release of the controversial film
“The Interview”.

4. Sports Betting – the act of wagering on any sports event over the Internet. In some countries, gambling
(including sports betting) is illegal even if you are doing it over the Internet.
CYBERCRIMES

5. Non-Delivery of Merchandise – the act of devising a scheme wherein the culprit posts an item or
service for sale on the Internet and once the transactions have been done, does not really give an item or
service.

6. Electronic Harassment – the act of anonymously using the Internet to harass, abuse, threaten or annoy
another people. This is also an act of cyberbullying, however, because the culprit is anonymous, it is hard to
detect who is bullying you.

7. Child Pornography – the act of using the Internet to show child pornography. This act is highly
punishable by law.

8. Prostitution – the act of using the Internet to engage in prostitution.


CYBERCRIMES

9. Drug trafficking – the act of selling illegal substances using the Internet

10. Criminal Copyright Infringement – the act of piracy mainly for financial gain. In late 2014, the
number one pirate website, The PirateBay, was raided for the second time due to years of pirating movies,
music, games, books, and other software. These kinds of websites earn money through advertising.
C O M B AT T I N G C Y B E R C R I M E S

There are several ways the authorities can help solve or prevent cybercrimes. Here are some of them:

1. Network. Before hacker can get through the unauthorized files he or she is targeting the hacker has to get
through several measures like firewalls, secure connections, passwords, anti- malware, and data
encryption. Encryption is the process of converting raw data into code. However, these methods are not
100% secure and there will always be a way for a hacker to hack.

2. Investigation. URL tracking and logging are used by websites to track your unique IP addresses. This can
be used by investigators to trace hackers. In piracy, trackers are used to identifying the IP addresses
currently sharing pirated file.

3. Penalties. More and more laws are being created and implemented today. Penalties include both a fine
and imprisonment.

You might also like