Академический Документы
Профессиональный Документы
Культура Документы
Smoke signals
Vocals Current Situation of ICT in the Philippines
Writings
o Cuneiform Fastest text messaging country
o Phoenician Social media capital of the world
o Paper (Tsai Lun, Chinese) o 7 billion users worldwide
o Printing Press o 83 million users in the Ph
Bible—first book published o 63 million facebook users Ph
Telegraph (1793) o 20 million other platforms
o Morse Code ICT hub of Asia
Telephone (Alexander Graham Bell, 1876) 15 out of 15 in Southeast Asia in terms of internet speed and
Television (1925) cost, with an average of 5.5 mbps (DICT)
Computer (1941) Ph: Priciest and slowest internet speed (SOTI Report, Akamai)
Internet/Arpanet (1969) LTE—long term evolution
Pipol Konek—Ph Public Wifi
RA 8792 E-commerce Act
Uses of ICT RA 8775 Anti Child Pornography Act
Business RA 9995 Anti Photo and Video Voyeurism Act
Education RA 10173 Data Privacy Act
Government RA 10175 Cyber Crime Prevention Act
Health and wellness RA 10844 DICT Act
Agriculture Visual Basic—simplest programming language
Banking and finance
Computer Ethics—right actions while using the computer Prohibits taking photos/videos of sexual acts or any similar
activity, images of private areas of a person…
10 commandments of computer ethics
To use, to copy, to sell sexual photos/videos is illegal
1. thou shall not use computers to harm
RA 10175 Cyber Crime Prevention Act
2. thou shall not interfere with another people’s work
3. thou shall not snoop around another people’s computer files Cyber Libel—uploading photos/videos and attaching false
4. thou shall not use computers to steal/phish messages is punishable
5. thou shall not bear false witnesses Public officials/personalities can be photographed during public
6. thou shall not copy or use proprietary software services
7. thou shall not use another people’s gadgets without Taking photos/videos of public figures during private time is
authorization or compensation illegal
8. thou shall not plagiarize/appropriate another people’s
intellectual output RA8775 Anti-Child Pornography Act
9. thou shall think of the consequences of the programs you create
Explicit sexual activity
10. thou shall use computer with consideration and respect
o Sexual intercourse
o Bestiality
o Masturbation
RA 8792 E-commerce Act o sadistic or masochistic abuse
text messages are accepted as electronic evidence o lascivious exhibition of private parts
o use of object or instruments for lascivious acts
electronic signature—refers to any distinctive mark,
characteristics, and/or sound in electronic form, representing Who may file a complaint?
the identity of a person… o offended party
o parent/guardian
RA 10844 DICT Act o ascendant or collateral relative
o officer, social worker
Give ICT services to the public
o local social welfare development officer
Host Government Websites
o barangay chairman
RA 10178 Data Privacy Act o law enforcement officer
o at least three concerned citizens
Proper disposal of information (burn, shred, soak, etc.) o any person knowledgeable of the circumstance
Supreme court order—needed document to request someone’s Reclusion perpetua and a fine not less than 2M but not more
data from a telecommunications office without the consent of the than 5M
data subject Reclusion temporal
Disclosure of Data (Data Confidentiality)
Data breach through negligence is punishable
RA 9995 Anti Photo and Video Voyeurism Act Trends in ICT
1993—World Wide Web (Tim Berners-Lee)
Web 1.0—Static Web Steal your information
Web 2.0—Dynamic Web o Card number generator
Web 3.0—Semantic Web o Social engineering
o Intelligence Destroy your computer
o Search History To stalk
o Predictive Search
Spyware
TRENDS
Executable file (.exe)
Technological Convergence Tracking your activities
o Syncing Normal flow/no harm done
Social Media—platforms which enables us to connect or interact
with each other Malware
o Social Networking Sites—where we interact with people Malicious software
of the same interest Intended to harm/destroy computers and corrupt files
o Bookmarking sites—where we can save links for future o Worm—through computer networks
use o Virus
o Media Sharing—platform which we can use to share Trojan Horse—blue screen of death
videos, images…
o Microblogging—limited number of characters per post
o Blogs and Forum
Ransomware
Mobile Technologies
Assistive Media all computer files will be encrypted
Connected Augmented Intelligence requires payment to retrieve files
o Predictive Analytics
o Image Analytics (face recognition)
o Machine Learning How to protect your computer?
Tripping
Check their hacking capabilities
Tips to avoid cyber criminals/tips to be safe online 7. Portfolio—Ideal for showcasing your work, to show off your
talent to potential employers
1. Do not share your personal information on your social media
8. Catalogue and Brochure—enable you to display what you have
accounts
to offer and attract potential clients. Ideal for dental surgeries,
2. Do not share your future destination/vacation online
salons, destinations, and manufacturers.
3. Do not post that you are alone in the house
9. Business Directory—they can be dedicated to a specific
4. Do not share your password to anyone
location, topic or industry. They serve as useful lists of resources.
5. Create a strong password
10. Bio—useful in the world of publishing and establishment of a fan
Uppercase base. Includes the author’s biography, catalogue of their works
Lowercase with reviews and comments, links to their socmed, etc.
Numbers
Special characters
6. Change your password at least once a month
7. Do not share your id’s online, to avoid identity theft
8. Do not login to your social media account through public wifi
9. Do not login to your social media accounts through shared
computers
10. Do not open suspicious links
11. Add only accounts of people you know