Comp 20333 Reviewer (Highlighted)
Comp 20333 Reviewer (Highlighted)
Today it is just as simple to communicate with someone on the other side of the world
as it is to talk to someone next door. Basically, it means using a computer or any other
digital technology to make any information available to everyone else through the
Internet.
GLOBALIZATION is a process of interaction and integration among the people, companies, and
governments of different nations, a process driven by international trade and investment and
aided by information technology.
GLOBALIZATION describes the growing interdependence of the world's economies, cultures, and
populations, brought about by cross-border trade in goods and services, technology, and flows
of investment, people, and information.
Digital Divide is the unequal access of information and communication technology between
different groups of society, and the knowledge of the skills required to use the technology.
CLOUD COMPUTING is a network of resources a company can access, and this method of using
a digital drive increases the efficiency of organizations.
According to Forbes, 83 percent of enterprise workloads will be in the cloud by 2020, which
means 2019 will show an increasing trend closing in on this statistic.
MOBILE COMPUTING SYSTEM is a distributed system, which is connected via a wireless network
for communication. The clients or the nodes possess mobility and the ability to provide
computing at anytime, anywhere.
BIG DATA is a trend that allows businesses to analyze extensive sets of information to achieve
variety in increasing volumes and growth of velocity. Big data has a high return on investment
that boosts the productivity of marketing campaigns, due to its ability to enable high-functioning
processing.
DATA MINING is the process of sorting through large data sets to identify patterns and
relationships that can help solve business problems through data analysis. Data mining is a way
companies can predict growth opportunities and achieve future success.
AUTOMATION is usually used to improve the operation and improvement of an industrial plant
or company, but automation can also be used in the stadium, farm or even in the infrastructure
of cities, and even in all productive areas ready to keep pace with digital transformation.
2. VIRTUAL REALITY
3. AUGMENTED REALITY
In the digital world, security generally refers to the unauthorized access of data, often involving
protection against hackers or cyber criminals. PRIVACY involves your right to manage your
personal information, and SECURITY is the protection of this information.
6. INTERNET OF THINGS
A Multifunction Peripheral (MFP) refers to a device that performs a variety of tasks that are
usually carried out by separate peripheral devices. These tasks can include copying, printing,
scanning, and faxing documents.
ROBOTICS is a branch of engineering that involves the conception, design, manufacture, and
operation of robots. This field overlaps with electronics, computer science, artificial intelligence,
mechatronics, nanotechnology and bioengineering.
Science-fiction author Isaac Asimov is often given credit for being the first person to use the term
robotics in a short story composed in the 1940s. In the story, Asimov suggested three principles
to guide the behavior of robots and smart machines. Asimov's Three Laws of Robotics, as they
are called, have survived to the present:
Application of Robotics
1. Health Care. They can help doctors in performing operations more precisely, be used as
prosthetic limbs, provide therapy to patients.
3. Food Preparation. Robot chefs can create food using hundreds of different recipes.
MOLEY ROBOTICS is one such robotics company that has created a robotic kitchen with
a robot that can cook like a master chef! Moley robotics captures, with an integrated 3d
camera and wired glove, the entire work of a human chef and upload it into a database.
ICT-ENABLED INDUSTRY
These increasingly globalized service activities not only contribute to the development
of the ICT sector but also more broadly to other business and service activities.
Business Process Outsourcing (BPO) is the contracting of a specific business task, such as payroll,
human resources (HR) or accounting, to a third-party service provider.
One of the most dynamic and fastest growing sectors in the Philippines is the Information
Technology - Business Process Outsourcing (IT-BPO) Industry. The industry is composed of eight
sub-sectors, namely, knowledge process outsourcing and back offices, animation, call centers,
software development, game development, engineering design, and medical transcription. The
IT-BPO industry plays a major role in the country's growth and development.
a) Project Based Outsourcing- primarily used for business activities with irregular
frequencies or one-off projects.
b) Dedicated Development Center - primarily used in business cases when there are
changing requirements. In this specific model it could be used for some long-term goals
for developing technology or software.
c) Captive Markets- preferred when core or crucial business activities are needed to be run
at cheaper costs. The rationale for employing such a setup is to cater to long term
strategic plans involving high managerial control.
2. Political Issues
Revision of Republic Act 7916
• exempting the companies from national and local taxes
• only having to pay 5% of their gross income as tax
Approval of RA 7916
• the establishment of the Philippine Economic Zone Authority (PEZA) which
considered IT Parks as special economic zones
• encouraged foreign investment in the industry by providing subsidies for
infrastructure development and tax exemptions
3. Economic Issues
• the BPO industry is the fastest growing sector in the country
• the growth in the BPO industry has barely trickled down to most of the Philippine
population
Those companies, which together enable the provision of telecommunication, information and
entertainment services including voice, internet, SMS, text and other data services
• Mobile banking,
• economic development,
• delivery of health services,
• citizen empowerment,
• greater access to media and education
E - SERVICE/E - GOVERNMENT
INTERNET CENSORSHIP
The Cybercrime Prevention Act of 2012 (Republic Act No. 10175). It aims to address legal issues
concerning online interactions and the Internet in the Philippines. Among the cybercrime
offenses included in the bill are cybersquatting, cybersex, child pornography, identity theft, illegal
access to data and libel.
Internet censorship and content restrictions can be enacted through a number of different
strategies which we describe below.
TECHNICAL BLOCKING - These techniques are used to block access to specific Web Pages,
domains, or IP addresses.
1. IP blocking,
2. DNS tampering, and
SEARCH RESULT REMOVALS - provide Internet search services cooperate with governments to
omit illegal or undesirable websites from search results.
TAKE-DOWN - the simplest strategy is to demand the removal of websites with inappropriate or
illegal content.
FREEDOM OF EXPRESSION
Right to express one's ideas and opinions freely through speech, writing, and other forms
of communication but without deliberately causing harm to others' character and/or
reputation by false or misleading statements.
According to the Universal Declaration of Human Rights, proclaimed in 1948, Everyone
has the right to freedom of opinion and expression.
This right includes freedom to hold opinions without interference and to seek, receive and
impart information and ideas through any media and regardless of frontiers.
The right to freedom of expression is a fundamental human right, which is shown as a corollary
of human dignity, representing a necessary foundation for the survival of the state.
At an individual level, freedom of expression is the key to the development and fulfilment of
every person. People can gain an understanding of their surroundings and the wider world by
exchanging ideas and information freely with others.
• Free debate about new legislation helps ensure that the eventual law has the support
of the population, making it more likely to be respected.
• If people can speak their minds without fear, and the media are allowed to report
what is being said, the government can become aware of any concerns and address
them.
• Free debate about and between political parties exposes their strengths and
weaknesses, as a result media scrutiny of the government and the opposition helps
expose corruption or other improprieties and prevents a culture of dishonesty.
Public authorities may restrict this right if they can show that their action is lawful, necessary and
proportionate in order to:
• protect national security, territorial integrity (the borders of the state) or public safety
• prevent disorder or crime
• protect health or morals
• protect the rights and reputations of other people
• prevent the disclosure of information received in confidence
• maintain the authority and impartiality of judges
• An authority may be allowed to restrict your freedom of expression if, for example,
you express views that encourage racial or religious hatred.
2. YouTube/Soundcloud
- are online websites that enable people to upload and share videos and audio for free.
A variety of businesses, artists, experts and organizations use them to disseminate
ideas and information to a wide audience.
- have been around for decades and new advancements in smartphones support a
variety of additional services such as business, news, social and game applications and
photography.
4. Online Website
- may not be new but the way that they are being used to reach wider demographics
and new audiences can be considered innovative. Being online gives organizations and
businesses a platform to represent their work to the world.
5. Tablet/computers
- are compact mobile computers that are interactive with touchscreens and have
capabilities such as inbuilt cameras and microphones that make them ideal for roving
reporters and journalists who are capturing stories on the go.
Advantages
Conclusion:
Freedom of expression, the right to express one's ideas and opinions freely through speech,
writing, and other forms of communication, has developed towards progress over the years.
However, there is still a long path to tread to type it as universal.
CONTENT FILTERING - is the use of a program to screen and exclude from access or availability of
web pages or e-mail that is deemed objectionable.
CONTENT FILTERING usually works by specifying character strings that, if matched, indicate
undesirable content that is to be screened out.
TYPES OF FILTERING
1. BROWSER BASED FILTERS - It is the most lightweight solution to do content filtering and
is implemented via third party extensions.
2. E-MAIL FILTERS - E-mail filters set on information contained in the mail headers such as
sender, subject, and e-mail attachments to classify, accept or reject messages.
3. SEARCH-ENGINE FILTERS - Many search engines, such as Google and Bing offer users the
option of turning on a safety filter. When this safety filter is activated, it filters out the
inappropriate links from all of the search results.
The Movie and Television Review and Classification Board (MTRCB) – is a Philippine government
agency under the Office of the President of the Philippines that is responsible for the classification
and review of television programs, movies and home videos.
FILMS DESCRIPTION
CHAPTER 5
Whilst using computer as the medium, technology crime is not that much different
from traditional crime. Various common types of technology crime are listed here.
CHILD PORNOGRAPHY
Child pornography is a form of child sexual exploitation. The law defines child pornography as any
visual depiction of sexually explicit conduct involving a minor (persons less than 18 years old).
Images of child pornography are also referred to as child sexual abuse images.
Child pornography images are readily available through virtually every Internet technology,
including social networking websites, file-sharing sites, photo-sharing sites, gaming devices, and
even mobile apps.
Child pornography offenders can also connect on Internet forums and networks to share their
interests, desires, and experiences abusing children, in addition to selling, sharing, and trading
images.
VIRTUAL PROSTITUTION is an activity in which one engages in sexual activity with another
person, whom neither have ever seen/met in real life before. Usually, the two met online.
Using the Internet to access prostitution-related information and engage in virtual prostitution
empowers men to sexually exploit women and children.
The combined experience of using high tech computer hardware and software, finding a
supportive community on the Internet, and having a sexual experience (masturbating to
pornography, live sex shows and writing about prostitution) is reinforcing and empowering.
Prostitution is not a victimless crime. Each sex act, whether online or not, is a violation of
women’s dignity and bodily integrity.
CYBERSEX can be defined as those sexual acts that are derived from surfing electronic media
sites that would titillate the sexual mind, and the act satisfies the erotic needs of an individual.
CYBER SEX
TYPES OF CYBERSEX USER Group 1: RECREATIONAL USERS – APPROPRIATE
This group of cybersex users are able to occasionally explore sex on the internet without
problems. They might use cybersex to enhance their sexual experiences. They are able to enjoy
intimate sexual relationships in the real world and have a healthy attitude to sexuality.
Like appropriate recreational users, this group of cybersex users can also access internet sex
without compulsive use but may use this material inappropriately. This could include sexting or
showing sexual images to other people for amusement or shock value, causing unintentional
embarrassment.
This group has not had any past problems with online other sexual behavior. They may be using
the internet to explore sexuality in a way that normal life has not offered them. They may also
be using dating sites to meet multiple partners in a manipulative or dishonest way.
This group includes people who may have a history of fantasizing about sexual acting out, but
who have never done it until accessing internet-based sexual material.
ONLINE RELATIONSHIPS are a relationship between people who have met online and, in many
ONLINE RELATIONSHIP
cases, know each other only via the Internet.
Even while there are true and honest connections that may be made through technology, it is still
important to be very careful when conversing online.
People who fabricate an online persona in order to deceive others are known as "catfish"
online.
ADVANTAGES DISADVANTAGES
PROFOUNDLY TINDER
NEARGROUP OMEGLE
CHAPTER 6
Almost all the information these devices collect can be sold to companies or used by
government and law enforcement to keep tabs or gather evidence. At the same time,
we use technology so frequently as a society because it allows us to do things faster
and with much less efforts.
IDENTITY THEFT
Also known as IDENTITY FRAUD, is a crime in which an imposter obtains key pieces of Personally
Identifiable Information (PII), such as Social Security or driver's license numbers, to impersonate
someone else.
The taken information can be used to run up debt purchasing credit, goods and services in the
name of the victim or to provide the thief with false credentials.
1. Financial identity theft. This is the most common type of identity theft. Financial identity
theft seeks economic benefits by using a stolen identity.
2. Tax-related identity theft. In this type of exploit, the criminal files a false tax return with the
Internal Revenue Service (IRS). Done by using a stolen Social Security number.
3. Medical identity theft. Where, the thief steals information like health insurance member
numbers, to receive medical services.
Child identity theft - In this exploit, a child's Social Security number is misused to apply for
government benefits, opening bank accounts and other services.
Senior identity theft. This type of exploit targets people over the age of 60. Because senior
citizens are often identified as theft targets, it is especially important for this senior to stay on top
of the evolving methods thieves use to steal information.
Identity cloning for concealment. In this type of exploit, a thief impersonates someone else in
order to hide from law enforcement or creditors. Because this type isn't explicitly financially
motivated, it's harder to track, and there often isn't a paper trail for law enforcement to follow.
Synthetic identity theft. In this type of exploit, a thief partially or completely fabricates
an identity by combining different pieces of PII from different sources.
1. Mail theft. This is stealing credit card bills and junk mail directly from a victim's mailbox
or from public mailboxes on the street.
2. Dumpster diving. Retrieving personal paperwork and discarded mail from trash
dumpsters is an easy way for an identity thief to get information. Recipients of
preapproved credit card applications often discard them without shredding them first,
which greatly increases the risk of credit card theft.
3. Shoulder surfing. This happens when the thief gleans information as the victim fills
out personal information on a form, enter a passcode on a keypad or provide a credit
card number over the telephone.
4. Phishing. This involves using email to trick people into offering up their personal
information. Phishing emails may contain attachments bearing malware designed to
steal personal data or links to fraudulent websites where people are prompted to enter
their information.
INTRUSION/INVASION OF PRIVACY
Employers might also be concerned about the productivity loss resulting from employees using
office technology for personal matters while on the job. At the same time, however, organizations
must balance the valid business interests of the company with employees’ reasonable
expectations of privacy.
INTRUSION/INVASION OF PRIVACY
DECEPTION
One type of invasion of privacy, in some states, is called deception. Deception occurs when an
employer collects information, he claims is for one reason but uses it for another reason, which
could result in the employee's termination.
VIOLATION OF CONFIDENTIALITY
A second type of invasion of privacy is violating an employee's confidentiality. This occurs when
information given in confidence is then given to a third party.
A third type of invasion of privacy is intrusion. This occurs in business when an employer intrudes
in an employee's private life.