You are on page 1of 14

WHOLE BRAIN LEARNING SYSTEM

OUTCOME-BASED EDUCATION

TECHINICAL VOCATIONAL AND LIVELIHOOD GRADE


EMPOWERMENT
TECHNOLOGIES
12
SECOND
LEARNING SEMESTER
MODULE WEEK 8

WBLS-OBE MELC-Aligned Self-Learning Module TVL 12 0


MODULE
IN
EMPOWERMENT
TECHNOLOGIES

QUARTER 2
WEEK 8

THE DISADVANTAGES OF ICT

Development Team
Writers: Florendo D. Damaso, Jr.
Editor: Eliza G. Salvador
Reviewers: Michael G. Calipjo
Illustrator: Florendo D. Damaso Jr.
Layout Artist: Jhone Terence C. Marucut
Management Team:
Vilma D. Eda Arnel S. Bandiola
Lourdes B. Arucan Juanito V. Labao
Marju R. Miguel

WBLS-OBE MELC-Aligned Self-Learning Module TVL 12 1


Lesson

15 The Disadvantages of ICT

What I Need To Know

What this module is about?


This module is a SELF-PACED learning material for you to continue your
studies in the comfort and safety of your home. This module discusses Cybercrimes
and Combatting Cybercrimes. Activities are found in every lesson to check your
understanding and that will let you create your own ICT contents and evaluate existing
online creation tools, platforms, and applications.

Most Essential Learning Competency (MELC):


Create a reflexive piece or output using an ICT tool, platform, or application of
choice on the learning experience undergone during the semester

What you are expected to learn?


After going through this module, you are expected to:
 understand the several problems ICT has created in their generation; and
 write a reflective essay on how ICT can change the world for better or for worse.

Important Reminder
DO NOT WRITE ANYTHING IN THIS MODULE. This module is government
property and other learners will use it again. You may use any clean sheet of paper
that is available in your home for your answers in the given activities. The rubrics and
answer key for the activities are found in the latter page of this module for you to self-
check your answers. This module will be retrieved by the end of the week.

WBLS-OBE MELC-Aligned Self-Learning Module TVL 12 2


What’s In

Lesson Motivation
In various aspects, ICT and technology as a whole brought us comfort and
consequences to life. We, as Filipinos, have been known to be avid users of
technology. Some even have made a name as an internet sensation. However, aside
from those successes are the downfalls of users.
Be honest with yourself and share in class the “bad things” or any unwarranted
acts (like piracy) you have done using ICT. Ask yourself why you did them and why
your classmates did them.

What Is It

Lesson Discussion
Walking on a sidewalk does not pose danger as opposed to walking in the
middle of the street. Remove the sidewalk and you are left to dodge approaching
vehicles. That is probably how much of us deal with the internet. In the internet, there
are no sidewalks; just a huge superhighway where information freely flows through. If
in the real world we have the police or the military to monitor us, the Internet is
unmonitored making it one of the most abused technology we use.

Cybercrimes
Cybercrimes are illegal acts done through the use of the Internet. In 2012,
Stephen Nale (Complex.com) posted a list of ten most common internet cybercrimes
as follows:

1. Phishing/Spoofing – the act of sending multiple emails to multiple users in


hopes of having a number of them clicking on the links or malwares attached
to the email. Most email services today have spam or bulk folders that
automatically put these suspicious emails to that folder. However, this is not
100% accurate that some emails are not filtered and some other emails that
are legitimate end up on the spam folder.

2. Blackmail/Extortion – the act of using the internet to threaten or damage


someone’s reputation to extort money or anything else of value. This can be
avoided if you are aware of what you should post on the internet. The victims

WBLS-OBE MELC-Aligned Self-Learning Module TVL 12 3


of this act tend to have posted something “inappropriate” over the internet even
if they put it at a secured location.

3. Accessing Stored Communications – or hacking; the act of obtaining


unauthorized access to data from a computer network. This is typically done to
commercial and government sites to threaten its owner. In late 2014, a group
of hackers hacked Sony’s website because of the impending release of the
controversial film “The Interview”.

4. Sports Betting – The act of wagering on any sports event over the Internet. In
some countries, gambling (including sports betting) is illegal even if you are
doing it over the Internet.

5. Non-Delivery of Merchandise – the act of devising a scheme wherein the


culprit posts and item or service for sale on the Internet and one the
transactions have been done, does not really give the item or service.

6. Electronic Harassment – the act of anonymously using the Internet to harass,


abuse, threaten or annoy other people. This is also an act of cyberbullying
however, because the culprit is anonymous. It is hard to detect who is bullying
you.

7. Child Pornography – the act of using the internet to show child pornography.
This act is highly punishable by law.

8. Prostitution – the act of using the internet to engage in prostitution.

9. Drug Trafficking – the act of selling illegal substances using the Internet.

10. Criminal Copyright Infringement – the act of piracy mainly for financial gain.
In late 2014, the number one pirate website, ThePirateBay, was raided for the
second time due to years of pirating movies, music, games, books, and other
software. These kinds of websites earn money through advertising

The Internet is the present and the future of your generation and you define
what impact it can do to shape our society, whether it is negative or positive. The future
is in your hands.
Combatting Cybercrimes

There are several ways the authorities can help solve or prevent cybercrimes.
Here are some of them:
1. Network Security. Before a hacker can get through the unauthorized files he
or she is targeting, the hacker has to get through several security measures
like firewalls, secure connections, passwords, anti-malwares, and data

WBLS-OBE MELC-Aligned Self-Learning Module TVL 12 4


encryptions. Encryption is the process of converting raw data into code.
However. These methods are not 100% secure and there will always be a way
for hacker to hack
2. Investigation. URL tracing and logging are used by websites to track your
unique IP addresses. This can be used by investigators to trace hackers. In
piracy, trackers are used to identify IP addresses currently sharing a pirated
file.
3. Penalties. More and more laws are being created and implemented today.
Penalties include both a fine and imprisonment.

What’s More

Activity 15: Cybercrime Penalties


According to RA 10175 or Cybercrime Prevention Act of 2012, here are the
penalties one must face when committing a Cybercrime. In your own opinion, are the
said penalties fair or not? Justify your answer. Write it in any clean sheet of paper.

Types of Cybercrime Penalty

Prision mayor (imprisonment of six years


and 1 day up to 12 years) or a fine of at
least Two hundred thousand pesos
(P200,000) up to a maximum amount
commensurate to the damage incurred or
1. Illegal access BOTH.————————If committed
Unauthorized access (without right) to a against critical infrastructure: Reclusion
computer system or application. temporal (imprisonment for twelve years
and one day up to twenty years) or a fine
of at least Five hundred thousand pesos
(P500,000) up to a maximum amount
commensurate to the damage incurred or
BOTH

2. Illegal interception
Unauthorized interception of any non-public
transmission of computer data to, from, or – same as above
within a computer system.

WBLS-OBE MELC-Aligned Self-Learning Module TVL 12 5


3. Data Interference
Unauthorized alteration, damaging, deletion or
deterioration of computer data, electronic
document, or electronic data message, and
including the introduction or transmission of – same as above
viruses. Authorized action can also be covered
by this provision if the action of the person went
beyond agreed scope resulting to damages
stated in this provision.

4. System Interference
Unauthorized hindering or interference with the
functioning of a computer or computer network
by inputting, transmitting, damaging, deleting,
deteriorating, altering or suppressing computer
data or program, electronic document, or
– same as above
electronic data messages, and including the
introduction or transmission of viruses.
Authorized action can also be covered by this
provision if the action of the person went
beyond agreed scope resulting to damages
stated in this provision.

5. Misuse of devices
The unauthorized use, possession, production,
sale, procurement, importation, distribution, or
otherwise making available, of devices,
computer program designed or adapted for the
purpose of committing any of the offenses
stated in Republic Act 10175.Unauthorized use
of computer password, access code, or similar
data by which the whole or any part of a – same as above except fine should be
computer system is capable of being accessed no more than Five hundred thousand
with intent that it be used for the purpose of pesos (P500,000).
committing any of the offenses under Republic
Act 10175.

WBLS-OBE MELC-Aligned Self-Learning Module TVL 12 6


6. Cyber-squatting
Acquisition of domain name over the Internet in
bad faith to profit, mislead, destroy reputation,
and deprive others from the registering the
same. This includes those existing trademark at
the time of registration; names of persons other
than the registrant; and acquired with
intellectual property interests in it. Those who
get domain names of prominent brands and – same as above
individuals which in turn is used to damage
their reputation – can be sued under this
provision. Note that freedom of expression and
infringement on trademarks or names of person
are usually treated separately. A party can
exercise freedom of expression without
necessarily violating the trademarks of a brand
or names of persons.

7. Computer-related Forgery
Unauthorized input, alteration, or deletion of
computer data resulting to inauthentic data with
Prision mayor (imprisonment of six years
the intent that it be considered or acted upon
and 1 day up to 12 years) or a fine of at
for legal purposes as if it were authentic,
least Two hundred thousand pesos
regardless whether or not the data is directly
(P200,000) up to a maximum amount
readable and intelligible; or The act of
commensurate to the damage incurred or
knowingly using computer data which is the
BOTH.
product of computer-related forgery as defined
here, for the purpose of perpetuating a
fraudulent or dishonest design.

8. Computer-related Fraud
– same as above Provided, That if no
Unauthorized input, alteration, or deletion of
damage has yet been caused, the
computer data or program or interference in the
penalty imposed shall be one (1) degree
functioning of a computer system, causing
lower.
damage thereby with fraudulent intent.

9. Computer-related Identity Theft


Unauthorized acquisition, use, misuse, transfer,
possession, alteration or deletion of identifying
information belonging to another, whether – same as above
natural or juridical.

WBLS-OBE MELC-Aligned Self-Learning Module TVL 12 7


10. Cybersex
Willful engagement, maintenance, control, or
operation, directly or indirectly, of any
lascivious exhibition of sexual organs or sexual
activity, with the aid of a computer system, for Prision mayor (imprisonment of six years
favor or consideration. There is a discussion on and 1 day up to 12 years) or a fine of at
this matter if it involves “couples” or “people in least Two hundred thousand pesos
relationship” who engage in cybersex. For as (P200,000) but not exceeding One million
long it is not done for favor or consideration, I pesos (P1,000,000) or BOTH.
don’t think it will be covered. However, if one
party (in a couple or relationship) sues claiming
to be forced to do cybersex, then it can be
covered.

11. Child Pornography


Penalty to be imposed shall be one (1)
Unlawful or prohibited acts defined and
degree higher than that provided for in
punishable by Republic Act No. 9775 or the
Republic Act 9775, if committed through
Anti-Child Pornography Act of 2009, committed
a computer system.
through a computer system.

12. Libel
Unlawful or prohibited acts of libel as defined in
Article 355 of the Revised Penal Code, as
amended committed through a computer
system or any other similar means which may
be devised in the future. Revised Penal Code
Art. 355 states Libel means by writings or
similar means. — A libel committed by means
of writing, printing, lithography, engraving,
radio, phonograph, painting, theatrical
exhibition, cinematographic exhibition, or any Penalty to be imposed shall be one (1)
similar means, shall be punished by prision degree higher than that provided for by
correccional in its minimum and medium the Revised Penal Code, as amended,
periods or a fine ranging from 200 to 6,000 and special laws, as the case may be.
pesos, or both, in addition to the civil action
which may be brought by the offended party.
The Cybercrime Prevention Act strengthened
libel in terms of penalty provisions. The
electronic counterpart of libel has been
recognized since the year 2000 when the E-
Commerce Law was passed. The E-Commerce
Law empowered all existing laws to recognize
its electronic counterpart whether commercial
or not in nature.

WBLS-OBE MELC-Aligned Self-Learning Module TVL 12 8


Imprisonment of one (1) degree lower
13. Aiding or Abetting in the commission of than that of the prescribed penalty for the
cybercrime – Any person who willfully abets or offense or a fine of at least One hundred
aids in the commission of any of the offenses thousand pesos (P100,000) but not
enumerated in this Act shall be held liable. exceeding Five hundred thousand pesos
(P500,000) or both.

14. Attempt in the commission of


cybercrime Any person who willfully attempts
– same as above
to commit any of the offenses enumerated in
this Act shall be held liable.

What I Have Learned

Key Terms

 Phishing – also referred to as spoofing: an act of spamming emails


 Spam – unwanted email
 Blackmail – act of asking something in return of not showing something that
could damage someone’s reputation
 Hacking – the act of obtaining authorized information
 Cyberbullying – an act of harassment using electronic means
 Copyright Infringement – an act of piracy mainly for financial gain
 Encryption – the process of converting raw data into code

Lesson Summary

The Internet can sometimes be used for wrong deeds. These cybercrimes
damage not just individuals but the society as a whole.
Cybercrimes can be in the form of the following: phishing or spoofing is an act
of spamming emails; blackmail or extortion is the act of asking something in return of
not showing something that could damage someone’s reputation; hacking is the act of
obtaining authorized information; sports betting is gambling over sports results; non-
delivery of merchandise is faking a sale over the Internet; electronic harassment is the
act of anonymous cyberbullying; child pornography is the exploitation of the youth;
prostitution is the act of using the Internet to engage in sexual acts; drug trafficking is
using the internet for selling illegal substances; and criminal copyright infringement is
an act of piracy mainly for financial gain.

WBLS-OBE MELC-Aligned Self-Learning Module TVL 12 9


Authorities have devised different punishment for those who commit
cybercrimes. For those who own servers and/or computer networks, they can install
firewalls, anti-malwares, passwords, secure connections, and data encryptions to
avoid hacking. However, these methods are not 100% secure.

Assessment

PERFORMANCE TASK (MODULAR)

Write a reflective essay about everything you have learned about ICT and its
possible impact to our society. Discuss how ICT can change the world for better or for
worse. Talk about its positive and negative impacts and the youth’s role in helping
promote its responsible use.

PERFORMANCE TASK (ONLINE)

Write a final video blog post about everything you have learned about ICT and
its possible impact to our society. Discuss how ICT can change the world for better or
for worse. Talk about its positive and negative impacts and the youth’s role in helping
promote its responsible use. Upload it in your website.

Rubrics
Category 4 3 2 1

Skills All skills in All skills in Some skills in Few or no skills


creating creating creating from creating
vlog/writing an vlog/writing an vlog/writing an vlog/writing an
article are well- article are article are article are applied.
applied. applied. applied.

Content The output is The output is The output is The output is not
clear and clear and somewhat clear clear and
complete and complete. and complete. incomplete.
exceeds the
expectations.

Correctness The output is The output The output has The output
free from errors. contains no fewl errors. contains many
And no errors. errors.

WBLS-OBE MELC-Aligned Self-Learning Module TVL 12 10


corrections had
been made.

Efficiency The output is The output is The output is The output is not
done in the done in the in done but used done completely
most effective the effective way methods that which exceeded
way ahead of just on time consumed more the required time
the set time time of finish

WBLS-OBE MELC-Aligned Self-Learning Module TVL 12 11


References
BOOK
Empowerment Technologies: Innovative Training Works, Inc., pages 235 – 241. Rex
Book Store, 2016

ONLINE
https://www.connectontech.com/2016/04/04/2016-4-2-philippine-government-issues-
implementing-rules-under-cybercrime-law-part-ii/

WBLS-OBE MELC-Aligned Self-Learning Module TVL 12 12


For inquiries or feedback, please write or call:

Department of Education – Schools Division of Laoag City


Curriculum Implementation Division
Brgy. 23 San Matias, Laoag City, 2900
Contact Number: (077)-771-3678
Email Address: laoag.city@deped.gov.ph

WBLS-OBE MELC-Aligned Self-Learning Module TVL 12 13

You might also like