It Era Notes

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 26

Lirio V.

Daniel, Instructor
INTRODUCTION
Information Technology (IT) Era: An era where information is the main
strategic resource upon which individuals, organizations, and societies
rely for their growth and development
We live in the information age, which is a period in human history
characterized by the shift from industrial production to one based on
information and computerization.
Living in the Information Technology Era explores the SCIENCE,
CULTURE, and ETHICS of information technology (IT); its various uses
and applications; and its influence on culture and society.
It also aims to strike a balance between conceptual instruction and
socially and culturally oriented discussions, as it not only explains the
basic concepts or key terms in IT but also features the major IT trends
along with the issues and challenges these developments bring.
Through this subject, more knowledgeable and responsible students
who can maximize the benefits of information technology without
compromising values and ethics will be developed."

MODULE 1. INTRODUCTION TO INFORMATION AND


COMMUNICATION TECHNOLOGY
Lesson 1. INFORMATION AND COMMUNICATION TECHNOLOGY

ICT stands for Information and Communication Technology. It


encompasses a broad range of technologies that facilitate the storage,
retrieval, transmission, and manipulation of information. ICT includes
both hardware and software components, as well as networks and
telecommunications technologies.

The boom in ICT can be attributed to several factors:

1
Lirio V. Daniel, Instructor
 Technological
Advancements: Continuous advancements in technology,
particularly in computing power, storage capabilities, and data
transmission speeds, have played a significant role. These
advancements enable the development of more powerful and
efficient ICT systems and devices.

 Internet Connectivity: The widespread availability and


adoption of the internet have been a key driver. Increased
internet connectivity has facilitated global communication,
collaboration, and access to information, leading to the rise of
various online services and applications.

 Smart Devices and Mobile Technology: The widespread


availability of smart gadgets, like tablets and smartphones, has
directly placed ICT in the hands of billions of people. People may
now interact, obtain information, and do a variety of chores while
on the road more easily thanks to mobile technology.

 Globalization: The interconnectedness of the global economy


and the need for seamless communication and data exchange
across borders have fueled the demand for robust ICT
infrastructure and solutions.

 Digital Transformation: Globally, enterprises, governments,


and institutions are undergoing digital revolutions in order to
maintain their competitiveness and improve productivity. This
entails incorporating ICT into many operational areas, such as
supply chain management and customer service.

 E-commerce and Online Services: The growth of e-commerce


and online services has driven the demand for ICT solutions.
Consumers and businesses increasingly rely on digital platforms
for shopping, banking, entertainment, and various other services.

2
Lirio V. Daniel, Instructor
 Remote Work and
Collaboration: The COVID-19 pandemic accelerated the
adoption of remote work and virtual collaboration tools. This shift
emphasized the importance of ICT in maintaining business
continuity and enabling flexible work arrangements.

 Data Analytics and Artificial Intelligence: The increasing


importance of data analytics and artificial intelligence has led to a
greater reliance on ICT. Businesses leverage these technologies
to derive insights, make data-driven decisions, and enhance
overall efficiency.

 Educational Technology: The integration of ICT in education,


including online learning platforms and digital resources, has
become a major trend. The need for remote education during the
pandemic further accelerated the adoption of educational
technology.

Uses of ICT in Daily Life


1: Communication: Bridging Distances

Communication is at the heart of human interaction, and ICT has


revolutionized it. Messaging apps make staying connected with loved
ones across the globe effortless.

Video conferencing tools enable seamless remote meetings for


businesses and real-time family sharing. Social media platforms offer
spaces for networking, information sharing, and staying updated on
news and trends.

 Example: WhatsApp alone has over 2 billion monthly active


users, showcasing the widespread adoption of messaging apps
globally.

3
Lirio V. Daniel, Instructor
2: Education: Knowledge Anytime,
Anywhere

ICT has transformed education, making it accessible worldwide. E-


learning platforms and online courses democratize learning.
Educational apps provide interactive content catering to diverse
learning styles.

Digital libraries ensure easy access to a wealth of information,


fostering a culture of continuous learning.

 Statistic: The global e-learning market is expected to reach


$375 billion by 2026, emphasizing the growing importance of
online education.
3: Healthcare: Remote Care for All

In healthcare, ICT enhances patient care and efficiency. Telemedicine


and virtual consultations offer medical advice from the comfort of
homes. Health tracking apps and wearables help monitor well-being,
providing valuable data to healthcare professionals. Electronic health
records streamline management, ensuring secure and accessible
critical information.

 Fact: During the COVID-19 pandemic, telehealth visits surged by


154%, highlighting the increased reliance on virtual healthcare
services.
4: Entertainment: Endless Choices at Your Fingertips

ICT revolutionizes entertainment (another point of 10 uses of ICT in


daily life), offering myriad options. Streaming services provide on-
demand access to a vast library of music and videos. Online gaming
and virtual reality offer interactive and immersive experiences. Digital
art and creativity tools empower individuals to express themselves
globally.

4
Lirio V. Daniel, Instructor
 Statistic: As of 2021, Netflix had over
208 million subscribers worldwide, illustrating the dominance of
streaming services.

5: Work and Productivity: Redefining the Workplace


Remote work, enabled by ICT, has transformed collaboration. Tools
allow seamless communication across distances. Project management
software streamlines workflow, ensuring tasks are completed
efficiently. Cloud computing revolutionizes data storage, granting
global access.

 Fact: In 2020, the global enterprise collaboration market size


was estimated at $47.2 billion, reflecting the increasing demand
for collaborative tools.
6: Financial Management: Convenient and Secure Transactions

ICT has changed financial management, making transactions


convenient and secure. Online banking and digital transactions simplify
financial processes. Budgeting apps aid effective money management.
Cryptocurrencies and blockchain introduce new possibilities for secure
financial transactions.

 Statistic: The global digital payment market is projected to


reach $154.1 billion by 2025, indicating the rising popularity of
digital transactions.
7: Home Automation: Smart Living

Smart home devices enhance convenience and energy efficiency. From


thermostats to security cameras, they automate routine tasks. The
Internet of Things (IoT) facilitates interconnected homes, creating a
seamless living experience.

 Example: Smart thermostats can reduce energy bills by 10-


23%, showcasing the potential for cost savings through home
automation.

5
Lirio V. Daniel, Instructor
8: Transportation: Navigating
Efficiently

ICT plays a vital role in transportation improvement. Navigation apps


provide real-time traffic updates for efficient travel. Ride-sharing and
car-sharing platforms offer convenient alternatives. IoT in
transportation improves logistics, ensuring the smooth flow of goods
and services.

 Fact: Uber, a prominent ride-sharing platform, completed over 7


billion trips globally in 2019, highlighting its widespread usage.
9: Accessibility and Inclusivity: Empowering All

ICT breaks down barriers and promotes inclusivity. Assistive


technologies empower individuals with disabilities. ICT solutions
contribute to creating an inclusive society where everyone can access
information and engage in activities without limitations.

 Statistic: The global market for assistive technologies is


projected to reach $26.9 billion by 2024, reflecting the growing
demand for inclusive technologies.
10: Energy Efficiency and Smart Grids

Smart technologies powered by ICT contribute to energy efficiency.


Smart grids optimize energy distribution, reducing wastage and
promoting a more sustainable use of resources. Through real-time
monitoring and control, these grids enhance the stability and reliability
of energy systems while minimizing environmental impact.

 Statistic: The global smart grid market is expected to reach


$112.7 billion by 2026, reflecting the increasing adoption of
intelligent energy management systems.

6
Lirio V. Daniel, Instructor

How Can We Add ICT To Our


Life Successfully?
Integrating Information and Communication Technology (ICT) into
your life successfully involves a strategic and mindful approach. Here
are some practical steps to seamlessly incorporate ICT into your daily
routine:

1. Identify Specific Needs and Goals:


 Assess your daily activities and identify areas where ICT can add
value. Whether it’s improving productivity, enhancing
communication, or facilitating entertainment, having clear goals
will guide your integration process.

2. Stay Informed About Latest Technologies:


 Keep yourself updated on the latest ICT advancements.
Subscribe to tech blogs, follow industry news, and attend
relevant webinars or workshops. Understanding new technologies
will help you make informed decisions about their applicability to
your life.

3. Start Small and Prioritize:


 Don’t overwhelm yourself by trying to adopt multiple
technologies simultaneously. Start with one or two areas that
align with your goals. For example, if improving productivity is a
priority, explore project management tools or calendar apps.

4. Choose User-Friendly Tools:


 Opt for user-friendly ICT tools and apps. Intuitive interfaces and
easy setup contribute to a smoother integration process.
Consider tools with a gentle learning curve, especially if you’re
new to certain technologies.

5. Set Realistic Expectations:

7
Lirio V. Daniel, Instructor
 Recognize that implementing ICT
takes time. When it comes to how long it will take to become
used to new tools and technology, be realistic. Give oneself
permission to grow and adapt at a comfortable speed.
6. Invest in Quality Devices:
 Choose reliable and efficient devices to support your ICT
integration. This includes smartphones, laptops, tablets, and
other gadgets. Invest in quality products that align with your
usage patterns and requirements.

7. Explore Training Resources:


 Many ICT tools offer tutorials, help sections, or online courses.
Take advantage of these resources to enhance your
understanding of the technology. Training sessions can empower
you to make the most out of the features available.

8. Embrace Cloud Services:


 Utilize cloud services for data storage and synchronization. This
ensures that your information is accessible from various devices
and locations. Cloud solutions enhance flexibility and security in
managing your digital assets.

9. Secure Your Digital Presence:


 Prioritize cybersecurity by implementing strong passwords,
enabling two-factor authentication, and staying vigilant about
online security. Regularly update your software and be cautious
about sharing personal information online.

10. Customize and Personalize:


 Tailor your ICT tools to suit your preferences. Customize settings,
organize digital spaces, and utilize features that align with your
workflow. Personalizing your digital environment enhances
usability and efficiency.

11. Seek Feedback and Stay Flexible:

8
Lirio V. Daniel, Instructor
 Encourage feedback from others who
use similar technologies. Stay open to adjustments and
improvements based on your experiences. Flexibility is key to
successfully integrating ICT into your life.
12. Balance Screen Time:
 While integrating ICT, be mindful of screen time. Establish a
healthy balance between online and offline activities to avoid
digital fatigue and maintain overall well-being.

IMPACT OF ICT

The Positive Impacts of ICT


Positive and Negative Impacts of ICT in our
Everyday Life 6

 Daily routine Management: We can store and manage our daily


schedule information
 Daily routine Management: We can store and manage our daily
schedule information using ICT gadgets. We can also integrate the
domestic equipment’s to use and control together. We can also use
net banking, online payments and online trading for purchasing daily
needed items. It will save our time to go market and purchase things.
 Social Relationship: ICT provides the facility to make
contacts and maintain relationships with people around the world in
our daily routine. With the use of Internet and communication
channel, we can connect the people via e-mail, social networking
websites and cell phones. It saves time and works inexpensive way.
There are bulletin boards, discussion groups services are available to
communicate with a large number of people at the same time.
 Information Sharing: Now information just right on our fingertips.
We can access any information anywhere and anytime. Information,
news, views, etc. can be shared by people all around the globe
with the use of e-mail, discussion groups on the Internet such as
Google Groups, Yahoo! Groups etc. By the sharing of information, it

9
Lirio V. Daniel, Instructor
develops global awareness such as
cultures, religions, ideologies and lifestyles. These create an
environment of openness and increases mutual respect.
 Communication: We can communicate each other without
boundaries. It becomes quicker because we can send an instant
message in a fraction of time with the low cost which saves costs and
man power for delivery. For that E-mail, teleconferencing, and
video-conferencing are available. By the use of video conferencing
technique, we can get feel to communicate with someone face to
face which is benefit for meeting or communicate together.
 Usage of Free time: ICT can be used to access as an
entertainment. We can play games, launch of digital TV, Chatting,
watch videos, listen songs, watch or listen to the news, pick up on
individual news items, and many more.
 Children’s Education: New ways of learning are possible
through ICT such as e-learning, distance learning, on-line materials,
virtual learning and interactive multi-media. Students can be part of
these various learning and teaching from all over the world. For the
impossible experiments, we can use simulations and virtual reality.
If students and teachers logged at same time at the same pace mad
the virtual classroom for e-learning. This is a smart investment four
our children’s future.
 Self Employment: ICT gadgets are help out us to do our jobs
easier. We can create our own business shops without the heavy
overheads of place, purchase items and sales in market and make the
advertising campaigns use of multimedia application. This increased
sales and encourages the small businesses. We can use net banking,
online payments as the payment option.
 Paperless Environment: ICT mostly uses its gadgets to store
and retrieve information instead of paper. Use of ICT involved less
papers, thus it saves the trees and makes our environment healthy.

10
Lirio V. Daniel, Instructor
 Developing Health Literacy: With
the immediate feedback from doctors, we becomes well sooner.
Health literacy deals with the need for people to access and use high
quality information about disease and medicines through internet
health care services available in ICT gadgets.

Negative Impacts of ICT


 Reduced face-to-face interaction: Now days, people mostly likes
online communication rather than real conversations so people
tend to become more individualistic and introvert. Other limitation
is that we are not able express our feeling or what we are
actually want to say by the use of e-mail or social networking sites.
Thus we required face to face communication with them to express our
real feeling.
 Social Disconnect: Although the internet has reduced physical
distances between people, but that doesn’t means they brought all
closer together and emotional distance is increased in some
aspects. People always busy with their own virtual world and passing a
day. They forget the real world with family and friends and they
becoming a formality. Children too are spending more time in virtual
world and they adopt wrong thoughts thus rising cyber crimes and
extra marital affairs with the use of ICT gadgets.
 Reduced physical activity/Health Problems: Users may accept
a more sitting lifestyle by the use of ICT gadgets. This can lead to
health problems such as headache, fatness, heart disease, diabetes,
repetitive strain injury or eyestrain, wrong posture/position, neck pain,
physical and mental stress, etc because of continuous use. Children
gets stretch by the playing internet games, watching cartoon which
may stop them to go outside and they feel afraid to talk with other
children. In this kind of lifestyle there is lack of physical exercise,
increases our health risk.

11
Lirio V. Daniel, Instructor
 Cost: Many ICT gadgets are expensive. So
they are cost effective to purchase and to maintain. Poor students
cannot get the benefits of e-learning due to the educational
establishments.
 Job loss: Job losses may occur because of manual operations
being replaced by automation.
 Security/loss of privacy: Each ICT gadgets are integrated by
specific technology and uses Internet connections. Data must be
reserved as secure data so it needs to protect from virus attacks and
other forms of malware are released daily. Use of social networking
web site risk of personal data loss. When we use Net banking, online
payment then there is a risk of losing our money by fraud people.
They can transfer our money to their account.

MODULE 2. THE WEB AND THE INTERNET

Lesson 1. The Web

What is World Wide Web (WWW, W3)?

The World Wide Web -- also known as the web, WWW or W3 -- refers
to all the public websites or pages that users can access on their local
computers and other devices through the internet.

It is a collection of all the web pages, and web documents These


pages and documents are interconnected by means of hyperlinks that
users click on for information. This information can be in different
formats, including text, images, audio and video.

The term World Wide Web isn't synonymous with the internet. Rather, the World
Wide Web is part of the internet.

12
Lirio V. Daniel, Instructor
History of the World Wide Web

British physicist Timothy Berners-Lee invented the World Wide Web.


Along with colleagues at Geneva-based CERN -- the European
Organization for Nuclear Research -- Berners-Lee had been working on
the concept since 1989. Their goal was to combine available
technologies and data networks to create a user-friendly system for
global communication and information sharing. At the time, they
began work on the first WWW server, which they called httpd. They
also dubbed the first client WWW.

How does the World Wide Web work?

Paving the way for an internet revolution that has transformed the
world in only three decades, the World Wide Web consists of multiple
components that enable users to access various resources, documents
and web pages on the internet. Thus, the WWW is like a vast
electronic book whose pages are stored or hosted on different servers
worldwide.

These pages are the primary component or building blocks of the


WWW and are linked through hyperlinks, which provide access from
one specific spot in a hypertext or hypermedia document to another
spot within that document or a different one. Hyperlinks are another
defining concept of the WWW and provide its identity as a collection of
interconnected documents.

Components of the Web: There are 3 components of the web:

1. Uniform Resource Locator (URL): serves as a system for resources


on the web. For example, www.geeksforgeeks.org is the URL of the

13
Lirio V. Daniel, Instructor
GFG website, and all the content of this
site like webpages and all the web documents are stored on the
world wide Web.

2. HyperText Transfer Protocol (HTTP): It enables users to access web


pages by standardizing communications and data transfer between
the internet's servers and clients.

3. Hyper Text Markup Language (HTML): Most web documents and


pages are created using Hypertext Markup Language (HTML), a
text-based way of describing how content within an HTML file is
structured. HTML describes the structure of web pages using
elements or tags and displays the content of these pages through
a web browser.

To access one of these pages, a user and their client machine supply a
universal identifier to the web server via a browser. This identifier may
be a uniform resource locator (URL) or uniform resource identifier
(URI) and is unique to each web page.

A collection of web pages belonging to a URL is called a website. For


example, www.techtarget.com is a website,
while https://www.techtarget.com/whatis/definition/World-
Wide-Web is a web page.

Web browser evolution

A browser is a free software program or mobile app that displays web


pages, graphics, and other online content. Popular web
browsers include Chrome, Firefox, Microsoft Edge, and Safari, but
there are many others.

14
Lirio V. Daniel, Instructor
Internet users access the web through web
browser software, which is included in or can be downloaded on
computers and mobile devices. Each web page has a unique address
called a URL, which can be entered in a browser's address bar to
navigate directly to a site.

Browser software is specifically designed to convert HTML and XML


computer code into human-readable documents.

Web Page

A web page is what you see in a web browser when you're on the
internet. You are on a web page right now. Think of the web page as a
page in a magazine. You may see text, photos, images, diagrams,
links, advertisements, and more on any page you view.

Often, you click or tap on a specific area of a web page to expand the
information or move to a related web page. Clicking a link, which is a
snippet of text that appears in a color different from the rest of the
text, takes you to a different web page. If you want to go back, use
the arrow buttons provided for that purpose.

Lesson 2. The Internet

Introduction to Internet
The Internet is the foremost important tool and the prominent
resource that is being used by almost every person across the globe. It
connects millions of computers, webpages, websites, and servers.
Using the internet we can send emails, photos, videos, and messages
to our loved ones. Or in other words, the Internet is a widespread
interconnected network of computers and electronic devices(that
support Internet). It creates a communication medium to share and
get information online. If your device is connected to the Internet then
only you will be able to access all the applications, websites, social

15
Lirio V. Daniel, Instructor
media apps, and many more services. The
Internet nowadays is considered the fastest medium for sending and
receiving information.

History of the Internet


The Internet came in the year 1960 with the creation of the first
working model called ARPANET (Advanced Research Projects Agency).
It allowed multiple computers to work on a single network which was
their biggest achievement at that time. ARPANET uses packet
switching to communicate multiple computer systems under a single
network. In October 1969, using ARPANET first message was
transferred from one computer to another. After that technology
continues to grow.

How is the Internet Set Up?


The internet is set up with the help of physical optical fiber data
transmission cables or copper wires and various other networking
mediums like LAN, WAN, MAN, etc. For accessing the Internet even
the 2G, 3G, and 4G services and the Wifi require these physical cable
setups to access the Internet. There is an authority named ICANN
(Internet Corporation for Assigned Names and Numbers) located in the
USA which manages the Internet and protocols related to it like IP
addresses.

How Does the Internet Work?


The actual working of the internet takes place with the help of clients
and servers. Here the client is a laptop that is directly connected to the
internet and servers are the computers connected indirectly to the
Internet and they are having all the websites stored in those large
computers. These servers are connected to the internet with the help
of ISP (Internet Service Providers) and will be identified with the IP
address.

Each website has its Domain name as it is difficult for any person to
always remember the long numbers or strings. So, whenever you
search for any domain name in the search bar of the browser the

16
Lirio V. Daniel, Instructor
request will be sent to the server and that
server will try to find the IP address from the Domain name because it
cannot understand the domain name. After getting the IP address the
server will try to search the IP address of the Domain name in a Huge
phone directory that in networking is known as a DNS server (Domain
Name Server). For example, if we have the name of a person and we
can easily find the Aadhaar number of him/her from the long directory
as simple as that.

So after getting the IP address, the browser will pass on the further
request to the respective server and now the server will process the
request to display the content of the website which the client wants. If
you are using a wireless medium of Internet like 3G and 4G or other
mobile data then the data will start flowing from the optical cables and
will first reach towers from there the signals will reach your cell phones
and PCs through electromagnetic waves and if you are using routers
then optical fiber connecting to your router will help in connecting
those light-induced signals to electrical signals and with the help of
ethernet cables internet reaches your computers and hence the
required information.

What is an IP Address?
IP Address stands for Internet Protocol Address. Every PC/Local
machine is having an IP address and that IP address is provided by the
Internet Service Providers (ISPs). These are some sets of rules which
govern the flow of data whenever a device is connected to the
Internet. It differentiates computers, websites, and routers. Just like
human identification cards like Aadhaar cards, Pan cards, or any other
unique identification documents. Every laptop and desktop has its own
unique IP address for identification. It’s an important part of Internet
technology. An IP address is displayed as a set of four-digit like
192.154.3.29. Here each number on the set ranges from 0 to 255.
Hence, the total IP address range from 0.0.0.0 to 255.255.255.255.

VARIOUS IMPORTANT COMPONENTS OF INTERNET

17
Lirio V. Daniel, Instructor
 DSL Modem
A DSL modem is a hardware device, the function of a DSL modem is
to convert digital signals into analog signals that are suitable for
sending over a telephone line.

A DSL modem helps your computer communicate with an Internet


service provider over a DSL connection. A phone line connects to
the back of the RJ-11 DSL modem, and a Cat 5 (Ethernet) cable
serves to connect the modem to a router or computer.
 DSL Filter
 NAT Router
 Firewalls
 ICSg
 Network Hub
 Network Switch
 Wireless Access Point

MODULE 3. THE NETETIQUETTE AND COMPUTER ETHICS

Lesson 1. Netiquette
What is Netiquette?
Simple stated, it’s network etiquette – that is the etiquette of
cyberspace and “etiquette” means the forms of required by good
breeding or prescribed by authority to be required in social or official
life. In other words, netiquette is a set of rules for behaving properly
online.

Netiquette, or network etiquette, is concerned with the "proper" way


to communicate in an online environment. Consider the following
“rules,” adapted from Virginia Shea’s the Core Rules of Netiquette,
whenever you communicate in the virtual world. When you use e-
mail, instant messenger, video calls, or discussion boards to
communicate with others online, please be sure to follow the rules of
professional online communications known as netiquette. These rules
will help you communicate with instructors, classmates, and potential
employers more effectively and will help prevent misunderstandings.

18
Lirio V. Daniel, Instructor
REMEMBER THE GOLDEN RULE
– Even though you may be interacting with a computer screen, you are
communicating with a real person who will react to your message. Make a good
impression - treat others with the same respect that you would like to receive and
avoid confrontational or offensive language.

To help convey meaning when creating messages, it is sometimes acceptable to


include appropriate emoticon symbols, such as a smiley face :) However, for
professional communications these would be inappropriate.

AVOID SLANG, ACRONYMS, AND TEXT TALK


– Communicating effectively in college and business environments requires the
use of correct terminology, spelling, and grammar that can easily be understood.
For example, use “your” instead of “ur”.

AVOID “SCREAMING” IN TYPED MESSAGES


– Typing an entire message using all capital letters is known as “screaming”. It is
distracting and generally frowned upon in professional environments. It is better
to draw emphasis to selected words or phrases by: using italic or bold text; using
a different color for text or background color; or denoting emphasis using special
characters (Example: **Important**).

PROOFREAD YOUR MESSAGES BEFORE SENDING THEM


– Proofreading your messages before you send them is a best practice for
effective and efficient communication. Strive to make your communications
concise and free of any:
• Spelling and grammar errors
• Confusing terms or phrases that could be misunderstood
• Errors of omission, such as missing content or recipients
• Errors in accuracy of information

EXERCISE GOOD JUDGMENT WHEN SHARING INFORMATION WITH OTHERS


ONLINE

19
Lirio V. Daniel, Instructor
– E-mail and chat messages that you send or receive
are considered private and should not be forwarded or copied to others without
gaining the consent of all involved participants. In general, messages posted to
discussion boards and social media sites can be read by the public. You may never
know who might read or share what you post. It is a good practice to always ask a
post’s author for permission before sharing a post with other parties.

• To protect your privacy and safety, do not share online any sensitive personal
information such as:
- Your home address or phone number - Personal conversations
- Social plans, such as vacations
- Financial information
- Usernames, passwords, or hints
- Anything personal that you would not want shared by others over the Internet .

• If the material you share with others online came from another source, make
every effort to gain permission from the original author or copyright holder.
Copying someone else's work and passing it off as your own is plagiarism. It
damages your reputation and could subject you to serious academic and legal
consequences.

RESPECT DIVERSITY IN VIEWPOINTS


- Be constructive and respectful when sharing opinions, beliefs, and criticisms, or
responding to those of others in the conversation.
• When sharing a viewpoint that differs from someone else’s, it is a best practice
to first acknowledge the other person by briefly restating what he or she said, but
in your own words. This lets the person know that you are listening and trying to
understand them.

• When presenting an opinion or criticism, it is helpful to use phrases that


identify to whose point of view you are referring. If the opinion is yours, you can
begin with the phrase “In my experience” or “In my opinion”. If it is a viewpoint of
someone else, make sure you identify that in your message (Example: “According
to Eric Ericson,” or “The president believes”).
20
Lirio V. Daniel, Instructor

Ten Commandments of Computer Ethics

a) Rule 1: Remember the Human When communicating electronically, whether


through email, instant message, discussion post, text, or some other method,
practice the Golden Rule: Do unto others as you would have others do unto you.
Remember, your written words are read by real people, all deserving of respectful
communication. Before you press “send” or "submit," ask yourself, "Would I be
okay with this if someone else had written it?"

b) Rule 2: Adhere to the same standards of behavior online that you follow in
real life While it can be argued that standards of behavior may be different in the
virtual world, they certainly should not be lower. You should do your best to act
within the laws and ethical manners of society whenever you inhabit
"cyberspace." Would you behave rudely to someone face-to- face? On most
occasions, no. Neither should you behave this way in the virtual world.

c) Rule 3: Know where you are in cyberspace "Netiquette varies from domain to
domain." (Shea, 1994) Depending on where you are in the virtual world, the same
written communication can be acceptable in one area, where it might be
considered inappropriate in another. What you text to a friend may not be
appropriate in an email to a classmate or colleague. Can you think of another
example?

d) Rule 4: Respect other people's time and bandwidth Electronic communication


takes time: time to read and time in which to respond. Most people today lead
busy lives, just like you do, and don't have time to read or respond to frivolous
emails or discussion posts. As a virtual world communicator, it is your
responsibility to make sure that the time spent reading your words isn't wasted.
Make your written communication meaningful and to the point, without
extraneous text or superfluous graphics or attachments that may take forever to
download.

21
Lirio V. Daniel, Instructor
e) Rule 5: Make yourself look good online
writing.colostate.edu One of the best things about the virtual world is the lack of
judgment associated with your physical appearance, sound of your voice, or the
clothes you wear (unless you post a video of yourself singing Karaoke in a clown
outfit.) You will, however, be judged by the quality of your writing, so keep the
following tips in mind: Always check for spelling and grammar errors Know what
you're talking about and state it clearly Be pleasant and polite

f) Rule 6: Share expert knowledge The Internet offers its users many benefits; one
is the ease in which information can be shared or accessed and in fact, this
“information sharing" capability is one of the reasons the Internet was founded.
So, in the spirit of the Internet's "founding fathers," share what you know! When
you post a question and receive intelligent answers, share the results with others.
Are you an expert at something? Post resources and references about your
subject matter. Recently expanded your knowledge about a subject that might be
of interest to others? Share that as well.

g) Rule 7: Help keep flame wars under control What is meant by "flaming" and
"flame wars?" "Flaming is what people do when they express a strongly held
opinion without holding back any emotion." (Shea, 1994). As an example, think of
the kinds of passionate comments you might read on a sports blog. While
“flaming” is not necessarily forbidden in virtual communication, "flame wars,"
when two or three people exchange angry posts between one another, must be
controlled or the camaraderie of the group could be compromised. Don't feed the
flames; extinguish them by guiding the discussion back to a more productive
direction.

h) Rule 8: Respect other people’s privacy Depending on what you are reading in
the virtual world, be it an online class discussion forum, Facebook page, or an
email, you may be exposed to some private or personal information that needs to
be handled with care. Perhaps someone is sharing some medical news about a
loved one or discussing a situation at work. What do you think would happen if
this information "got into the wrong hands?" Embarrassment? Hurt feelings?
Loss of a job? Just as you expect others to respect your privacy, so should you
22
Lirio V. Daniel, Instructor
respect the privacy of others. Be sure to err on the
side of caution when deciding to discuss or not to discuss virtual communication.

i) Rule 9: Don't abuse your power Just like in face-to-face situations, there
are people in cyberspace who have more "power" than others. They have more
expertise in technology or they have years of experience in a particular skill
or subject matter. Maybe it's you who possesses all of this knowledge and
power! Just remember: knowing more than others do or having more power than
others may have does not give you the right to take advantage of anyone. Think
of Rule 1: Remember the human.

j) Rule 10: Be forgiving of other people's mistakes Not everyone has the
same amount of experience working in the virtual world. And not everyone
knows the rules of netiquette. At some point, you will see a stupid question,
read an unnecessarily long response, or encounter misspelled words; when this
happens, practice kindness and forgiveness as you would hope someone would
do if you had committed the same offense. If it's a minor "offense," you
might want to let it slide. If you feel compelled to respond to a mistake, do so in a
private email rather than a public forum.

Lesson 2: Cybercrimes
What is Cyber? It is the Characteristics of the culture of computers, information,
technology and virtual reality.

Cybercrime is defined as a crime in which a computer is the object of the crime


(hacking, phishing, spamming and child pornography) is used as a tool to commit
an offense.

Cybercriminals may use computer technology to access personal information,


business trade secrets or use the internet for exploitative or malicious purposes.

Republic Act No. 10175 Cybercrime Prevention Act of 2012 is a law in the
Philippines approved on September 12,2012 which aims to address legal issues
concerning online interactions and internet.
23
Lirio V. Daniel, Instructor

Republic Act No. 10173 Data Privacy Act of 2012 is an act protecting individual
personal information.

COMMON FORMS OF CYBERCRIMES:


a. Copyright The exclusive legal right, given to an originator or an assignee to
print, publish, perform, film, or record literary, artistic, or musical material, and to
authorize others to do the same. Copyright infringement is the violation, piracy
or theft of a copyright holder's exclusive rights through the unauthorized use of a
copyrighted material or work.

b. Plagiarism An act or instance of using or closely imitating the language and


thoughts of another author without authorization.

c. Computer Addiction
• Offline: generally used when speaking about excessive gaming behavior, which
can be practiced both offline and online.
• Online: Also known as “Internet Addiction”, gets more attention in general from
scientific research than offline computer addiction, mainly because most cases of
computer addiction are related to the excessive use of the Internet.
*Virtual Self -The persona you create about yourself virtually.

CRIMINAL ACTIVITIES
a. Hacking
• Unauthorized access of or interference with computer systems,
servers, or other information and communication systems
• Unauthorized access to corrupt, alter, steal, or destroy electronic data
using computers or other information and communication systems
without the computer or system owner’s knowledge and consent
• The introduction of computer viruses resulting in the corruption,
alteration, theft, or loss of such data
• Illegal Access
• Illegal Interception
• Data Interference
24
Lirio V. Daniel, Instructor
• System Interference
• Misuse of Devices
• Infection of IT Systems with Malware – if the act is committed against
critical infrastructure of the Philippines the, penalty is between 12-20
years reclusion temporal
• Six years up to twelve years of imprisonment also known as prison
mayor.

b. Computer-related forgery, fraud and/or identity theft


• An attempt to obtain sensitive information such as usernames,
passwords, and credit card details and (indirectly money), often for
malicious reasons.
• Phishing
• Pharming
• Spam
• Maximum of Php 200,000 fine or prison mayor

b. Electronic theft
• Illegal Downloading
• Obtaining files that you do not have the right to use from the internet.
• Digital Piracy
• Practice of illegally copying and selling digital music, video, computer
software, etc.
• Copyright Infringement
• Penalty of Php 50,000 – 500, 000 and or prison mayor
d. Cyberbullying
• The use of electronic communication to bully a person, typically by
sending a message of an intimidating or threatening nature.
• The Anti-Bullying Act of 2013 (RA 10627)

e. Cybersex
• Willful engagement, maintenance, control, or operation, directly
or indirectly of any lascivious exhibition of sexual organs or sexual
activity with the aid of a computer system for favor or consideration.
25
Lirio V. Daniel, Instructor
• There is a discussion on this matter if it
involves “couples” or “people in relationship” who engage in cybersex.
• Penalty at least Php 200,000 and or prison mayor

f. Child Pornography
• Is a form of child sexual exploitation
• Unlawful or prohibited acts defined and punishable by Republic Act
No. 9775 or the Anti- Child Pornography Act of 2009, committed
through a computer system.
• Penalty of 12-20 years of imprisonment or reclusion temporal

g. Cyber Defamation
• Is an unprivileged false statement of fact which tends to harm the
reputation of a person or company.
• Penalty of 6-12 years of imprisonment or prison mayor

26

You might also like