You are on page 1of 77

MODULE 1:

INFORMATION AND
COMMUNICATION
TECHNOLOGY
INTRODUCTION
TO
INFORMATION
AND
Pℎ𝑜𝑡𝑜 𝑐𝑟𝑒𝑑𝑖𝑡: ℎ𝑡𝑡𝑝𝑠://𝑤𝑤𝑤. 𝑚𝑜𝑑1. 𝑐𝑜/2019/04/02/3 − 𝑡ℎ𝑖𝑛𝑔𝑠 − 𝑎𝑏𝑜𝑢𝑡 − 𝑖𝑐𝑡 − 𝑖𝑡 − 𝑒𝑣𝑒𝑟𝑦 − 𝑏𝑢𝑠𝑖𝑛𝑒𝑠𝑠 − 𝑠ℎ𝑜𝑢𝑙𝑑

COMMUNICATIO
At the end of this lesson, the students should be able
to:

1. improve their knowledge on how ICT affects


their everyday lives and the state of our nation; "It has become appallingly
obvious that our
2. compare and contrast the differences between technology has exceeded
online platforms, sites, and content; our humanity."

3. understand the features of Web 2.0; — Albert Einstein


4. understand the future of the World Wide Web
through Web 3.0; and

5. learn the different trends in ICT and use them


to their advantage.
Information and Communication Technology
(ICT) deals with the use of different
communication technologies such as mobile
phones, telephone, Internet, etc. to locate,
save, send and edit information.
❑ Access to information: Possibly the greatest effect of ICT on individuals is the huge increase in access to
information and services that has accompanied the growth of the Internet. Some of the positive aspects of
this increased access are better, and often cheaper, communications. In addition, the use of ICT to access
information has brought new opportunities for leisure and entertainment, the facility to make contacts and
form relationships with people around the world, and the ability to obtain goods and services from a
wider range of suppliers.

❑ Improved access to education, e.g. distance learning and on-line tutorials. New ways of learning, e.g.
interactive multi-media and virtual reality. New job opportunities, e.g. flexible and mobile working, virtual
offices and jobs in the communications industry.

❑ New tools, new opportunities: The second big effect of ICT is that it gives access to new tools that did not
previously exist. A lot of these are tied into the access to information mentioned above, but there are many
examples of stand-alone ICT systems as well:
a) ICT can be used for processes that had previously been out of the reach of most individuals, e.g.
photography, where digital cameras, photo-editing software and high quality printers have enabled people to
produce results that would previously required a photographic studio.

b) ICT can be used to help people overcome disabilities. e.g. screen magnification or screen reading software
enables partially sighted or blind people to work with ordinary text rather than Braille.
❑ Job loss: One of the largest negative effects of ICT can be the loss of a person’s job. This has both
economic consequences, loss of income, and social consequences, loss of status and self
esteem. Job losses may occur for several reasons, including: Manual operations being replaced by
automation. e.g. robots replacing people on an assembly line.Job export. e.g. Data processing work being
sent to other countries where operating costs are lower. Multiple workers being replaced by a smaller number
who are able to do the same amount of work. e.g. A worker on a supermarket checkout can serve more
customers per hour if a bar-code scanner linked to a computerized till is used to detect goods instead of the
worker having to enter the item and price manually.

❑ Reduced personal interaction: Being able to work from home is usually regarded as being a positive
effect of using ICT, but there can be negative aspects as well. Most people need some form of social
interaction in their daily lives and if they do not get the chance to meet and talk with other people they may
feel isolated and unhappy.

❑ Reduced physical activity: A third negative effect of ICT is that users may adopt a more sedentary
lifestyle. This can lead to health problems such as obesity, heart disease, and diabetes. Many countries have
workplace regulations to prevent problems such as repetitive strain injury or eyestrain, but lack of physical
exercise is rarely addressed as a specific health hazard.
❑ Communication: By using ICT has brought a number of benefits to organizations, such as: Cost savings by
using e.g. VoIP instead of normal telephone, email / messaging instead of post, video conferencing instead of
traveling to meetings, e-commerce web sites instead of sales catalogues. Access to larger, even worldwide,
markets. Web sites can be seen from all parts of the world and orders can be taken wherever there is a
compatible banking system to process payments, e.g. credit / debit card, Pay-Pal, bank transfer facility. Web
sites also have 24 hour opening and are available every day of the year. Flexible response. Organisations with
good communications can respond to changes quickly. This may mean better customer relations, an improved
supply chain for goods and services, faster development of new products to meet a new opportunity, etc.

❑ Information management: Organizations can benefit from using ICT for information management. e.g. Data
mining of customer information to produce lists for targeted advertising. Improved stock control, resulting in less
wastage, better cash flow, etc.Mangers are better informed and will have more reliable and up-to-date
information on which to base their decisions.

❑ Security: Although the use of ICT can bring its own security issues, see next section, it can also solve or reduce
some security problems, e.g. Encryption methods can keep data safe from unauthorized people, both while it is
being stored or while it is being sent electronically. This is important for reasons such as data protection
legislation or commercial secrecy. ICT enables physical security systems such as fingerprint, iris or facial
recognition.
❑ Cost: the cost of using ICT may cause a number of problems for organizations. A lot of ICT hardware and
software is expensive, both to purchase and to maintain. An ICT system usually requires specialist staff to run it
and there is also the challenge of keeping up with ever-changing technology. These extra costs should be
offset by the poitive effects of using ICT, but if an organisation gets its cost-benefit analysis wrong it may lose
money.

❑ Competition: this is usually thought of as being a good thing, but for some organisations being exposed to
greater competition can be a problem. If the organisation is competing for customers, donations, or other means
of funding nationally or even internationally, they may lose out to other organisations that can offer the same
service for less money.

❑ Security: this is always a problem for any organisation that uses ICT. Data must be kept secure, Internet
connections must be protected from attack, new viruses and other forms of malware are released nearly every
day.

Organizations will usually have legal obligations to protect data such as customer information.
Even if the organisation does not have to comply with a specific data protection law it will
usually be in the organisation’s interest to protect data from rivals.
Probably the largest effect that ICT use has on on society is
allowing members of society to have greatly increased access
to information.
This can have numerous positive effects, such as:
a) increasing opportunities for education;

b) improving communication; and

c) allowing people to participate in a wider, even worldwide,


society.
Probably the largest effect that ICT use has on on society is
allowing members of society to have greatly increased access to
information. This can have numerous negative effects, such as:
causing a digital divide between those who can access
information and those who cannot, reducing levels of education
and understanding due to the vast amount of incorrect and
misleading information that is available causing moral and
ethical problems due to the nature of some of the material
available.
The positive impact of ICT on education: On the positive side, the use of
ICT in education can provide opportunities that might not otherwise exist,
such as:

1) distance learning, where students can access teaching materials


from all over the world,

2) the ability to perform ‘impossible’ experiments’ by using simulations,

3) the possibility for students to have individual learning programs


within a topic, rather than everybody having to do the same thing at
the same time at the same pace. More able students can be given
more challenging work, less able students can access remedial
lessons.
When the World Wide Web was
invented, most web pages were
static. Static (also known as flat
page or stationary page) in the
sense that the page is “as is”
and cannot be manipulated by
the user. The content is also the
same for all users. This is
referred to as Web 1.0. Photo credit: https://disenowebakus.net/en/the-web
Web 2.0 is the evolution of Web
1.0 by adding dynamic web
pages—the user is able to see a
website differently than others.

Examples of Web 2.0 include


social networking sites, blogs,
wikis, video sharing sites,
hosted services, and web Photo credit: https://disenowebakus.net/en/web-2
applications.
Web 2.0 allows users to interact with
the page: instead of just reading a
page, the user may be able to
comment or create a user account.

Web 2.0 also allows users to use web


browsers instead of just using their
operating system. Browsers can now
be used for their user interface,
application software (or web
applications), and even for file Photo credit: https://www.ravendigimark.com/blog/what-is-web-2
storage.
Most websites that we visit
today are Web 2.0.
❑ Folksonomy. It allows users to
categorize and classify/arrange
information using freely chosen
keywords (e.g., tagging). Popular
social networking sites such as
Twitter, Instagram, Facebook, etc.
use tags that start with the pound
sign (#).
This is also referred to as hashtag.

Photo credit: https://medium.com/@shiriendamra/folksonomy-a-key-aspect-of-


modern-information-architecture-cac367a3a957
❑ Rich User Experience. Content is
dynamic and is responsive to user’s
input.

An example would be a website that


shows local content. In the case of
social networking sites, when logged
on, your account is used to modify
what you see in their website.

Photo credit: https://ashwinrk1115.wordpress.com/rich-user-experience/


❑ Long Tail. Services are offered on
demand rather than on a one-time
purchase. In certain cases, time-
based pricing is better than file-size-
based pricing or vice versa. This is
synonymous to subscribing to a data
plan that charges you for the amount
of time you spent in the Internet, or a
data plan that charges you for the
amount of bandwidth you used.
Photo credit: http://www.rogerclarke.com/EC/Web2C.html
❑ User Participation. The owner of the
website is not the only one who is
able to put content. Others are able
to place a content of their own by
means of comment, reviews, and
evaluation. Some websites allow
readers to comment on an article,
participate in a poll, or review a
specific product (e.g., Amazon.com,
online stores).
Photo credit: https://janetnovakblog.wordpress.com/2016/10/31/leveraging-participatory-culture-within-the-advertising-industry/
❑ Software as a Service. Users will subscribe to a
software only when needed rather than
purchasing them. This is a cheaper option if you
do not always need to use a software. For
instance, Google Docs is a free web-based
application that allows the user to create and edit
word processing and spreadsheet documents
online. When you need a software, like a Word
Processor, you can purchase it for a one-time
huge amount and install it in your computer and it
is yours forever. Software as a service allows you
to “rent” a software for a minimal fee.

Photo credit: https://labs.sogeti.com/salesforce-spotlight-saas-software-as-a-service-companies/


❑ Mass Participation. It is a diverse
information sharing through
universal web access. Since most
users can use the Internet, Web 2.0’s
content is based on people from
various cultures.

Photo credit: https://soni1220.wordpress.com/2011/01/26/web-1-0-web-2-0-web-3-0-web-4-0-%E2%80%93-wh


The Semantic Web is a
movement led by the World
Wide Web Consortium (W3C).

The W3C standard


encourages web developers to
include semantic content in
their web pages Photo credit: https://disenowebakus.net/en/web-3
According to the W3C, “The Semantic
Web provides a common framework that
allows data to be shared and reused
across application, enterprise, and
community boundaries.”

The aim of Web 3.0 is to have


machines (or servers) understand the
user’s preferences to be able to deliver
web content specifically targeting the
user. Photo credit: https://blockgeeks.com/guides/web-3-0/
1. Compatibility
HTML files and current web browsers could not support Web 3.0.
2. Security
The user’s security is also in question since the machine is saving his or her
preferences.
3. Vastness
The World Wide Web already contains billions of web pages.
4. Vagueness
Certain words are imprecise. The words “old” and “small” would depend on the user.
5. Logic
Since machines use logic, there are certain limitations for a computer to be able to
predict what the user is referring to at a given time.
1. Convergence
Technological convergence is the synergy of
technological advancements to work on a similar goal or
task.

2. Social Media
Social media is a website, application, or online channels
that enable web users to create, co-create, discuss,
modify, and exchange user-generated content.
❑ Social Networks. These are sites that allow you to connect with other people with the same
interests or background.

❑ Bookmarking Sites. These are sites that allow you to store and manage links to various websites
and resources.

❑ Social News. These are sites that allow users to post their own news items or links to other news
sources.

❑ Media Sharing. These are sites that allow you to upload and share media content like images,
music, and video.

❑ Microblogging. These are sites that focus on short updates from the user.

❑ Blogs and Forums. These websites allow users to post their content.
3. Mobile Technologies
The popularity of smartphones and tablets has taken a
major rise over the years. This is largely because of the
devices’ capability to do tasks that were originally found
in personal computers.
❑ iOS
❑ Android
❑ Blackberry OS
❑ Windows Phone OS
❑ Symbian
❑ WebOS
❑ Windows Mobile
4. Assistive Media
Assistive media is a nonprofit service designed to help
people who have visual and reading impairments. A
database of audio recordings is used to read to the user.
An active participation of the user is a good sign that the
website has a rich media content. These media contents
used advanced technology that allows advanced
animations and/or supports audio/radio for advertising
and communicating immediately for instant user
interactions.
To attract and keep an audience, this platform maximizes
its rich media content to show what they valued the
most; freedom of expression, freedom of information,
freedom of opportunity and freedom to belong. YouTube
provides the tools where people can freely speak their
voices, freely access for information and education, a
chance to discover and build their ventures, and find
communities that shared same interests and passions.
Through this social networking site, people freely
connect and communicate with friends and family, easily
find communities, and can grow businesses. Through its
rich media content, information may be shared through
photos, videos, messages, and status.
The usefulness of a website really depends to the
individual who uses it. It is important to identify the
users or target audience to be able to show the
usefulness of the website.
This is also a challenge to pay attention to accessibility.
Integrating rich media content is not only designed; it
must have a function. Failure to view a link correctly on a
specific screen or in a browser is a case of a
malfunction. It greatly affects the user experience and
the online environment you are creating.
It is a measure of how simple it is for a user to
manipulate the site (especially for the infrequent or
brand-new users) and how convenient it is to use on the
long term (for daily visitors).
Before, most of the websites developed were Web 1.0,
owned by companies, and serve a commercial purpose
such selling products, services, subscriptions, etc.
While it's not more sophisticated than we have now, it
maximizes the functionality of the website for effective
advertising to influence the consumers.
Aside from the function, rich media content must
contribute to the over-all aesthetic of the website.
Integrating rich media content must be placed well
and in strategically places of your websites. It
contributes to user experience and online environment.
Do you have any question?

You may go to our conference and


consult!
❑ Innovative Training Works Inc. (2016) Empowerment Technology
❑ Rouse M. (n.d) Pharming, retrieved from:
https://searchsecurity.techtarget.com/definition/pharming#:~:text=1)%20Pharming
%20is%20a%20scamming,%22phishing%20without%20a%20lure.%22
❑ Swinhoe, D. (2018) Keyloggers, retrieved from:
https://www.csoonline.com/article/3326304/what-is-a-keylogger-how-attackers-can-
monitor-everything-you-type.html
❑ Belding, G. (2019) Malware, retrieved from:
https://resources.infosecinstitute.com/topic/malware-spotlight-rogue-security-
software/
❑ Ajahana (2012) The Positive and Negative impacts of ICT, retrieved from:
https://ajahana.wordpress.com/2012/06/27/the-positive-and-negative-impacts-of-
ict-5/
Rules
of Netiquette

Photo credit: https://www.lessonplansdigger.com/2015/07/10/5-minute-speaking-activity-net


At the end of this lesson, the students should be able
to:

1. consider one’s and others’ safety when sharing


information using the Internet; “What you post online
speaks VOLUME about who
2. consider one’s and others’ reputation when using the you really are. POST with
Internet;
intention. REPOST with
3. determine and avoid the dangers of the Internet; caution.”
― Germany Kent
4. be responsible in the use of social networking sites;
and

5. browse the Internet efficiently and properly through


proper referencing.
The Internet, truly, is a powerful tool. It can be
used to promote your business, gain new
friends, and stay in touch with the old ones.
It is also a source of entertainment. But like most
things in this world, there is always “another side of
the coin.”
The Internet is one of the most dangerous places,
especially if you do not know what you are doing.
1. Malware – stands for malicious software
Types: Virus, Worm, Trojan, Spyware, Adware

2. Spam – unwanted email mostly from bots or


advertisers. It can be used to send malware.

3. Phishing – Its goal is to acquire sensitive personal


information like passwords and credit card details.
Rogue security software refers to a program that induces internet fraud by using security
exploits on a target system to mislead, scare or deceive the user into downloading a
program, either free for by paying money, in exchange for the removal of malware it claims
is on the target system. If the user complies, the result is the installation of more malware.

Sometimes, rogue security software will threaten the user with ransomware if they do
not pay up.

Rogue security software goes by different names, including the following:


• Scareware
• Fraudware
• Rogue scanner
• Rogue antivirus
Keyloggers are a type of monitoring software designed to
record keystrokes made by a user. One of the oldest forms of
cyber threat, these keystroke loggers record the
information you type into a website or application and
send to back to a third party.
Pharming is a scamming practice in which malicious code
is installed on a personal computer or server,
misdirecting users to fraudulent Web sites without their
knowledge or consent. Pharming has been called
"phishing without a lure."
Photo credit: https://www.cbronline.com/what-is/what-is-cybercrime-4898190/
Identity theft is the crime of
obtaining the personal or
financial information of another
person for the sole purposes
of assuming that person’s
name or identity to make
transactions or purchases.
Photo credit: https://i-sight.com/resources/what-is-deepfake-identity-theft/
In criminal identity theft, a
criminal misrepresents himself
as another person during arrest
to try to avoid a summons,
prevent the discovery of a
warrant issued in his real name
or avoid an arrest or conviction
record.
Photo credit: https://www.globallearningsystems.com/tips-for-identifying-and-preventing-id
In medical identity theft,
someone identifies himself as
another person to obtain free
medical care.

Photo credit: https://www.medwastemngmt.com/blog/medical-identit


In financial identity theft,
someone uses another person's
identity or information to obtain
credit, goods, services or
benefits. This is the most
common form of identity theft.

Photo credit: https://www.consumerjungle.org/jungle-talk/-what-is-id-theft-care


In child identity theft, someone uses a
child's identity for various forms of
personal gain. This is common, as
children typically do not have information
associated with them that could pose
obstacles for the perpetrator, who may
use the child's name and Social Security
number to obtain a residence, find
employment.

Photo credit: https://www.noidentitytheft.com/child-identity-theft/


Synthetic identity theft is a
type of fraud in which a criminal
combines real (usually stolen)
and fake information to create a
new identity, which is used to
open fraudulent accounts and
make fraudulent purchases.

Photo credit: https://tnj.com/10-steps-to-recover-if-your-identity-is-stole


Phishing is a cybercrime in which
scammers send a malicious email to
individual(s) or mass users of any
organization by impersonating a known
individual or a business partner or a
service provider.
It is the fraudulent practice of sending
emails purporting to be from reputable
companies in order to induce individuals
to reveal personal information, such as
passwords and credit card numbers. Photo credit: https://mytechdecisions.com/network-security/university-phishing-attacks-
Appears to come from a well-
TIP: Do not click any links
known company like Netflix
in the email- directly log in
and asks you to sign in and to your account by typing
correct an issue with your the address into your web
account. browser. If you are unable
Links points to a website to log in, contact service using
pretending to be a company’s official contact information.
legitimate site and asks for
your log in credentials
Contains a link to what appears
TIP: Do not click any links in
to be shared file on Google
the email, instead, log in to
docs, drop box or another file your account and find the
sharing. shared file by name.
Link points to a page pretending Remember to verify sender
to be a file-sharing site and identity and use established
requests you log in. Cloud file sharing services.
Comes from a domain similar to
the DocuSign domain. Link will TIP: DocuSign never
prompt you to sign into view the attaches item in email -
document, giving attackers attachments are likely
control of your inbox. malicious.
Instead, access documents
directly at
www.docusign.com.
Contains document presented
as an unpaid invoice and claims TIP: Do not reply to email.
service will be terminated if Contact the
invoice is not paid. vendor/service directly
using official contact
information before
submitting payment.
Appears to come from a popular
delivery service or online retail TIP: Do not click links or
and includes delivery notification open attachments in
with a malicious link or unexpected website and
attachment. enter the tracking
information or call the
delivery service’s official
phone number.
Appears to come from a
government tax revenue agency.
Claims you are delinquent on
your taxes and provide a means
to the issue before additional
fines or legal actions are
pursued.

Photo credit: https://www.trendmicro.com/vinfo/ph/security/news/cybercrime-and-digital-threats/what-you


Hacking is the gaining of
unauthorized access to data in a
system or computer.

Photo credit: https://www.information-age.com/criminal-computer-hacking-12347


If you create something—an idea, an invention, a
form of literary work, or a research, you have the
right of how it should be used by others. This is
called intellectual property.
1. Before you post something on the web, ask these questions to
yourself: Would you want your parents or grandparents to see it? Would
you want your future boss to see it? Once you post something on the web,
you have no control of who sees your posts.
2. Your friends depend on you to protect their reputation online. Talk to
your friends about this serious responsibility.
3. Set your post to “private.” In this way, search engines will not be able to
scan that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the
one who posted it to pull it down or report it as inappropriate.
Do you have any question?

You may go to our conference and


consult!
❑ Innovative Training Works Inc. (2016) Empowerment Technology
❑ Rouse M. (n.d) Pharming, retrieved from:
https://searchsecurity.techtarget.com/definition/pharming#:~:text=1)%20Pharming
%20is%20a%20scamming,%22phishing%20without%20a%20lure.%22
❑ Swinhoe, D. (2018) Keyloggers, retrieved from:
https://www.csoonline.com/article/3326304/what-is-a-keylogger-how-attackers-can-
monitor-everything-you-type.html
❑ Belding, G. (2019) Malware, retrieved from:
https://resources.infosecinstitute.com/topic/malware-spotlight-rogue-security-
software/
❑ Ajahana (2012) The Positive and Negative impacts of ICT, retrieved from:
https://ajahana.wordpress.com/2012/06/27/the-positive-and-negative-impacts-of-
ict-5/

You might also like