It Midterms
It Midterms
It is caused by rapid shift from traditional - Computer gaming has also been an
industry to computerization all the way to important influence in the development of
artificial intelligence which brought by graphical interfaces.
Industrial Revolution.
- Technology has been at the forefront of
Digital Technology became prevalent and changes in production and distribution of
widely used around the world. Information music.
can be accessed easily specially with the
use of the internet. Business
- The impact of ICT on business is
The ICT and its role in Social Change particularly significant. It empowers people
Information Communications Technology to share knowledge and advice
(ICT) has the power to transform society. instantaneously and set up an online shop
ICT is defined as a group of interrelated or website at a low cost, dramatically
technologies (electronic devices) for lowering the barriers to starting a
accessing, processing, and disseminating business.
information.
- Online platform has been the
- ICTs are indisputably important part of marketplace where people can transact
our social setting today. and communicate.
- The development of a society mostly
depends on the access to information. - It has made social impact affordable,
- (ICTs) are opening a fresh passageways social impact scalable, and enables new
for transforming the way we live, work, ways to connect to and engage with local
learn, communicate and also provides a communities.
strategic opportunities of diverse and
significant social and economic benefits to Education
people across the globe. - ICT is changing the way of the education
delivery system in the world by enhancing
Social change refers to a transformation of access to information for all. It also
culture and social organizations/structures ensures effective and inclusive education.
over time. The social transformations that
could result from the increasing use of - ICT supports the concept of open
ICTs depend strangely on verdicts made learning where the thrust is upon
by organizations and individuals outside enhanced student access and the
our household, many of whom have great development of student autonomy.
economic leverage, political power or
technical expertise.
- Modern ICT tools not only deliver the THEORIES in TECHNOLOGY
content but also replicate formal learning Understanding the Relationship Between
experience via virtual learning. Technology and Society
✅
- Extreme use of digital technologies may Content:
have negative mental health effects Printing Press → Rise of Literacy &
Reformation
✅Industrial Revolution → Urbanization & changes in technology leads to an
✅
Examples of Social Constructivism;
Telephone Evolution → Business Tool
✅
to Personal Communication Device
Social Media Algorithms → Shaped by
✅
User Preferences & Regulations
Renewable Energy Growth → Pushed
by Society’s Concern for Climate Change
TECHNOLOGICAL CHANGE
Technological change means the technical
knowledge used in the production of
capital and machinery. The various
CHAPTER4: THE NETIQUETTE and the AVOID SLANG, ACRONYMS, AND TEXT
COMPUTER ETHICS TALK
- Communicating effectively in college and
1. Netiquette business environments requires the use of
2. Cybercrimes correct terminology, spelling, and grammar
3. Internet threats that can easily be understood. For
example, use “your” instead of “ur”.
NETIQUETTE
What is Netiquette? AVOID “SCREAMING” IN TYPED
It’s network etiquette – that is the etiquette MESSAGES
of cyberspace and “etiquette” means the - Typing an entire message using all
forms of required by good breeding or capital letters is known as “screaming”. It
prescribed by authority to be required in is distracting and generally frowned upon
social or official life. in professional environments.
- If the material you share with others Rule 2: Adhere to the same standards of
online came from another source, make behavior online that you follow in real life
every effort to gain permission from the While it can be argued that standards of
original author or copyright holder. behavior may be different in the virtual
Copying someone else's work and world, they certainly should not be lower.
passing it off as your own is plagiarism. It You should do your best to act within the
damages your reputation and could laws and ethical manners of society
subject you to serious academic and legal whenever you inhabit "cyberspace."
consequences. Would you behave rudely to someone
face-to-face? On most occasions, no.
RESPECT DIVERSITY IN VIEWPOINTS Neither should you behave this way in the
- Be constructive and respectful when virtual world.
sharing opinions, beliefs, and criticisms, or
responding to those of others in the Rule 3: Know where you are in
conversation. cyberspace
“Netiquette varies from domain to
- When sharing a viewpoint that differs domain.“ (Shea, 1994) Depending on
from someone else’s, it is a best practice where you are in the virtual world, the
to first acknowledge the other person by same written communication can be
briefly restating what he or she said, but in acceptable in one area, where it might be
your own words. This lets the person know considered inappropriate in another. What
that you are listening and trying to you text to a friend may not be appropriate
understand them. in an email to a classmate or colleague.
- When presenting an opinion or criticism, Rule 4: Respect other people's time and
it is helpful to use phrases that identify to bandwidth
whose point of view you are referring. If Electronic communication takes time: time
the opinion is yours, you can begin with to read and time in which to respond. Most
the phrase “In my experience” or “In my people today lead busy lives, just like you
opinion”. If it is a viewpoint of someone do, and don't have time to read or respond
else, make sure you identify that in your to frivolous emails or discussion posts. As
message (Example: “According to Eric a virtual world communicator, it is your
Ericson,” or “The president believes”). responsibility to make sure that the time
spent reading your words isn't wasted. Rule 7: Help keep flame wars under
Make your written communication control
meaningful and to the point, without What is meant by "flaming" and "flame
extraneous text or superfluous graphics or wars?" "Flaming is what people do when
attachments that may take forever to they express a strongly held opinion
download. without holding back any emotion." (Shea,
1994).
Rule 5: Make yourself look good online
writing. While "flaming" is not necessarily
One of the best things about the virtual forbidden in virtual communication, "flame
world is the lack of judgment associated wars," when two or three people exchange
with your physical appearance, sound of angry posts between one another, must
your voice, or the clothes you wear be controlled or the camaraderie of the
(unless you post a video of yourself group could be compromised.
singing Karaoke in a clown outfit.)
Don't feed the flames; extinguish them by
You will, however, be judged by the quality guiding the discussion back to a more
of your writing, so keep the following tips productive direction.
in mind:
- Always check for spelling and grammar Rule 8: Respect other people's privacy
errors Depending on what you are reading in the
- Know what you're talking about and state virtual world, be it an online class
it clearly discussion forum, Facebook page, or an
- Be pleasant and polite email, you may be exposed to some
private or personal information that needs
Rule 6: Share expert knowledge to be handled with care.
The Internet offers its users many
benefits; one is the ease in which Just as you expect others to respect your
information can be shared or accessed privacy, so should you respect the privacy
and in fact, this "information sharing“ of others. Be sure to err on the side of
capability is one of the reasons the caution when deciding to discuss or not to
Internet was founded. So, in the spirit of discuss virtual communication.
the Internet's "founding fathers," share
what you know! Rule 9: Don't abuse your power
Just like in face-to-face situations, there
When you post a question and receive are people in cyberspace who have more
intelligent answers, share the results with "power" than others. They have more
others. expertise in technology or they have years
of experience in a particular skill or subject
Are you an expert at something? Post matter. Maybe it's you who possesses all
resources and references about your of this knowledge and power! Just
subject matter. Recently expanded your remember: knowing more than others do
knowledge about a subject that might be or having more power than others may
of interest to others? Share that as well. have does not give you the right to take
advantage of anyone. Think of Rule 1:
Remember the human.
Rule 10: Be forgiving of other people's to do the same. Copyright infringement is
mistakes the violation, piracy or theft of a copyright
Not everyone has the same amount of holder's exclusive rights through the
experience working in the virtual world. unauthorized use of a copyrighted
And not everyone knows the rules of material or work.
netiquette. At some point, you will see a
stupid question, read an unnecessarily b. Plagiarism
long response, or encounter misspelled An act or instance of using or closely
words; when this happens, practice imitating the language and thoughts of
kindness and forgiveness as you would another author without authorization
hope someone would do if you had
committed the same offense. If it's a minor c. Computer Addiction
"offense," you might want to let it slide. If • Offline: generally used when speaking
you feel compelled to respond to a about excessive gaming behavior, which
mistake, do so in a private email rather can be practiced both offline and online.
than a public forum. • Online: Also known as “Internet
Addiction”, gets more attention in general
CYBERCRIMES from scientific research than offline
What is Cyber? computer addiction, mainly because most
It is the Characteristics of the culture of cases of computer addiction are related to
computers, information, technology and the excessive use of the Internet.
virtual reality. *Virtual Self -The persona you create
Cybercrime is defined as a crime in which about yourself virtually.
a computer is the object of the crime
(hacking, phishing, spamming and child CRIMINAL ACTIVITIES
pornography) is used as a tool to commit a. Hacking
an offense. b. Computer-related forgery, fraud and/or
Cybercriminals may use computer identity theft
technology to access personal c. Electronic theft
information, business trade secrets or use d. Cyberbullying
the internet for exploitative or malicious e. Cybersex
purposes. f. Child Pornography
Republic Act No. 10175 Cybercrime g. Cyber Defamation
Prevention Act of 2012 is a law in the
Philippines approved on September a. Hacking
12,2012 which aims to address legal • Unauthorized access of or interference
issues concerning online interactions and with computer systems, servers, or other
internet. information and communication systems
Republic Act No. 10173 Data Privacy Act • Unauthorized access to corrupt, alter,
of 2012 is an act protecting individual steal, or destroy electronic data using
personal information. computers or other information and
communication systems without the
COMMON FORMS OF CYBERCRIMES computer or system owner’s knowledge
a. Copyright and consent
The exclusive legal right, given to an • The introduction of computer viruses
originator or an assignee to print, publish, resulting in the corruption, alteration, theft,
perform, film, or record literary, artistic, or or loss of such data
musical material, and to authorize others • Illegal Access
• Illegal Interception of any lascivious exhibition of sexual
• Data Interference organs or sexual activity with the aid of a
• System Interference computer system for favor or
• Misuse of Devices consideration.
• Infection of IT Systems with Malware – if • There is a discussion on this matter if it
the act is committed against critical involves “couples” or “people in
infrastructure of the Philippines the, relationship” who engage in cybersex.
penalty is between 12-20 years reclusion • Penalty at least Php 200,000 and or
temporal prison mayor
• Six years up to twelve years of
imprisonment also known as prison mayor f. Child Pornography
• Is a form of child sexual exploitation.
b. Computer-related forgery, fraud and/or • Unlawful or prohibited acts defined and
identity theft punishable by Republic Act No. 9775 or
• An attempt to obtain sensitive the Anti- Child Pornography Act of 2009,
information such as usernames, committed through a computer system.
passwords, and credit card details and • Penalty of 12-20 years of imprisonment
(indirectly money), often for malicious or reclusion temporal
reasons.
• Phishing g. Cyber Defamation
• Pharming • Is an unprivileged false statement of fact
• Spam which tends to harm the reputation of a
• Maximum of Php 200,000 fine or prison person or company.
mayor. • Penalty of 6-12 years of imprisonment or
prison mayor.
c. Electronic theft
• Illegal Downloading INTERNET THREATS
• Obtaining files that you do not have the Hacking
right to use from the internet. is a term used to describe actions taken
• Digital Piracy by someone to gain unauthorized access
• Practice of illegally copying and selling to a computer. The availability of
digital music, video, computer software, information online on the tools,
etc. techniques, and malware makes it easier
• Copyright Infringement for even non-technical people to
• Penalty of Php 50,000 – 500, 000 and or undertake malicious activities. The
prison mayor process by which cyber criminals gain
access to your computer
d. Cyberbullying
• The use of electronic communication to What it can do:
bully a person, typically by sending a • Find weaknesses (or pre-existing bugs)
message of an intimidating or threatening in your security settings and exploit them
nature. in order to access your information.
• The Anti-Bullying Act of 2013 (RA • Install a Trojan horse, providing a back
10627) door for hackers to enter and search for
your information.
e. Cybersex
• Willful engagement, maintenance,
control, or operation, directly or indirectly
Malware What it can do:
is one of the more common ways to • Trick you into giving them information by
infiltrate or damage your computer. asking you to update, validate or confirm
Malicious software that infects your your account. It is often presented in a
computer, such as computer viruses, manner than seems official and
worms, Trojan horses, spyware, and intimidating, to encourage you to take
adware. action.
• Provides cyber criminals with your
What it can do: username and passwords so that they can
• Intimidate you with scareware, which is access your accounts (your online bank
usually a pop-up message that tells you account, shopping accounts, etc.) and
your computer has a security problem or steal your credit card numbers.
other false information.
• Reformat the hard drive of your Ransomware
computer causing you to lose all your is a type of malware that restricts access
information. to your computer or your files and displays
• Alter or delete files. a message that demands payment in
• Steal sensitive information. order for the restriction to be removed.
• Send emails on your behalf. The two most common means of infection
• Take control of your computer and all the appear to be phishing emails that contain
software running on it. malicious attachments and website pop-up
advertisements.
Pharming
is a common type of online fraud. A What it can do:
means to point you to a malicious and • There are two common types of
illegitimate website by redirecting the ransomware:
legitimate URL. Even if the URL is entered • Lockscreen ransomware: displays an
correctly, it can still be redirected to a fake image that prevents you from accessing
website. your computer
• Encryption ransomware: encrypts files
What it can do: on your system's hard drive and
• Convince you that the site is real and sometimes on shared network drives, USB
legitimate by spoofing or looking almost drives, external hard drives, and even
identical to the actual site down to the some cloud storage drives, preventing you
smallest details. You may enter your from opening them
personal information and unknowingly • Ransomware will display a notification
give it to someone with malicious intent. stating that your computer or data have
been locked and demanding a payment
Phishing be made for you to regain access.
is used most often by cyber criminals Sometimes the notification states that
because it's easy to execute and can authorities have detected illegal activity on
produce the results they're looking for with your computer, and that the payment is a
very little effort. Fake emails, text fine to avoid prosecution.
messages and websites created to look
like they're from authentic companies. • Do not pay the ransom. These threats
They're sent by criminals to steal personal are meant to scare and intimidate you,
and financial information from you. This is and they do not come from a law
also known as “spoofing”. enforcement agency. Even if you submit
payment, there is no guarantee that you What it can do:
will regain access to your system. • Collect information about you without
• If your computer has been infected (i.e. you knowing about it and give it to third
you are unable to access your computer parties.
or your files have been encrypted), contact • Send your usernames, passwords,
a reputable computer technician or surfing habits, list of applications you've
specialist to find out whether your downloaded, settings, and even the
computer can be repaired and your data version of your operating system to third
retrieved. parties.
• In order to lessen the impact of a • Change the way your computer runs
ransomware infection, be sure to regularly without your knowledge.
back-up your data with a removable • Take you to unwanted sites or inundate
external storage drive. It's possible that you with uncontrollable pop-up ads.
your files might be irretrievable; having an
up-to-date backup could be invaluable. Trojan Horses
A Trojan horse may not be a term you're
Spam familiar with, but there's a good chance
is one of the more common methods of you or someone you know has been
both sending information out and affected by one. A malicious program that
collecting it from unsuspecting people. is disguised as, or embedded within,
The mass distribution of unsolicited legitimate software. It is an executable file
messages, advertising or pornography to that will install itself and run automatically
addresses which can be easily found on once it's downloaded.
the Internet through things like social
networking sites, company websites and What it can do:
personal blogs. • Delete your files.
• Use your computer to hack other
What it can do: computers.
• Annoy you with unwanted junk mail. • Watch you through your web cam.
• Create a burden for communications • Log your keystrokes (such as a credit
service providers and businesses to filter card number you entered in an online
electronic messages. purchase).
• Phish for your information by tricking you • Record usernames, passwords and
into following links or entering details with other personal information.
toogood- to-be-true offers and promotions.
• Provide a vehicle for malware, scams, Wi-Fi Eavesdropping
fraud and threats to your privacy WiFi eavesdropping is another method
used by cyber criminals to capture
Spyware (Spyware & Adware) personal information. Virtual “listening in”
Spyware and adware are often used by on information that's shared over an
third parties to infiltrate your computer. unsecure (not encrypted) WiFi network.
Software that collects personal information
about you without you knowing. They What it can do:
often come in the form of a ‘free' download • Potentially access your computer with
and are installed automatically with or the right equipment.
without your consent. These are difficult to • Steal your personal information including
remove and can infect your computer with logins and passwords
viruses.
What they can do: caused by Adware that has been installed
• Spread to everyone in your contact list. on your computer).
• Cause a tremendous amount of damage • Web pages are slow to load.
by shutting down parts of the Internet, • Your computer screen looks distorted.
wreaking havoc on an internal network • Programs are running without your
and costing companies’ enormous control.
amounts of lost revenue. • If you suspect a problem, make sure
your security software is up to date and
Viruses run it to check for infection. If nothing is
Most people have heard of computer found, or if you are unsure of what to do,
viruses, but not many know exactly what seek technical help.
they are or what they do. Malicious
computer programs that are often sent as
an email attachment or a download with
the intent of infecting your computer, as
well as the computers of everyone in your
contact list. Just visiting a site can start an
automatic download of a virus.
NEGATIVE IMPACT
- Computers can harm users
- Borderless information can be negative.