You are on page 1of 19

EMPOWERMENT

TECHNOLOGIES
WEEK 1
COMPETENCY: COMPARE AND CONTRAST THE NUANCES
OF VARIED ONLINE PLATFORMS, SITES, AND CONTENT
TO BEST ACHIEVE SPECIFIC CLASS OBJECTIVES OR
ADDRESS SITUATIONAL CHALLENGES
OBJECTIVE: IDENTIFY AND RELATE TO THE DIFFERENT
ONLINE AND PLATFORMS
WHAT IS AN “ONLINE PLATFORM”?
• The term “online platform” has been used to describe a range of services
available on the Internet including marketplaces, search engines, social media,
creative content outlets, app stores, communications services, payment
systems, services comprising the so-called “collaborative” or “gig” economy,
and much more. In this report, an online platform is defined as a digital service
that facilitates interactions between two or more distinct but interdependent sets
of users (whether firms or individuals) who interact through the service via the
Internet. This chapter explains that definition and presents some economic
characteristics that are common among online platforms.
Internet - defined as the information superhighway. This
means that anyone has access to this highway, can place info,
and can grab that info.

ICT (Information and Communications Technology) - deals


with the use of different communication technologies such as
mobile phones, telephone, Internet, etc. to locate, save, send,
and edit information.

ICT in the Philippines - Philippines as the “ICT Hub of Asia”.


Huge growth of ICT related jobs around the country, one of
which is call center or BPO (Business Process Outsourcing)
centers.
WWW (WORLD WIDE WEB)
• When WWW was invented, most web pages were static. Static (also known as
flat page or stationary page) in the same that the page “as is” and cannot be
manipulated by the user. This version of WWW was known as the Web 1.O. On
the other hand, Web 2.0 - allows the user to interact with the page known as
DYNAMIC PAGE; instead of just reading a page, the user may be able to
comment or create a user account. Dynamic page refers to the web pages that are
affected by user input or preference manipulated by the user. Now, Web 3.0
(Semantic Web) provides a framework that allows data to be shared and reuse to
deliver web content specifically targeting the user. Semantic Web– is a movement
led by the World Wide Web
TRENDS IN ICT
• 1.Convergence – is the synergy of technological advancements to work on a
similar goal or task. For example, besides using your personal computer to create
word documents, you can now use your smartphone.
• 2. Social Media – is a website, application, or online channel that enables web
users to create, co-create, discuss, modify, and exchange user generated content.
• 3. Mobile Technologies – The popularities of smartphones and tablets has taken
a major rise over the years. This is largely because of the devices capability to do
the tasks that were originally found in PCs.
• 4. Assistive Media – is a non-profit service designed to help people who have
visual and reading impairments. A database of audio recordings is used to read to
the user.
SIX TYPES OF SOCIAL MEDIA:
a. Social Networks – These are sites that allows you to connect with other people with the same interests or
background. Once the user creates his/her account, he/she can set up a profile, add people, share content, etc.
Example: Facebook and Google +.
b. Bookmarking Sites – These are sites that allow you to store and manage links to various website and
resources. Most of these sites allow you to create a tag allows you to and others easily share them. Ex. :
StumbleUpon/Pinterest
c. Social News – These are sites that allow users to post their own news items or links to other news sources.
The users can also comment on the post and comments may also be rank. Example: Reddit and Digg
d. Media Sharing – These are sites that allow you to upload and share media content like images, music and
video. Example: Flickr, YouTube and Instagram.
e. Microblogging – These are sites that focus on short updates from the user. Those that subscribed to the user
will be able to receive these updates. Example: Twitter and Plurk
f. Blogs and Forums – These websites allow user to post their content. Other users can comment on the said
topic. Example: Blogger, WordPress and Tumblr
KEY TERMS:
Static – refers to the web that are the same regardless of the user.
Dynamic – refers to the affected by user input or preference.
Folksonomy – allows user to categorize and classify/arrange information.
Hashtag # – used to “categorize” posts in a website.
Convergence – the synergy of technological advancements to work a
similar goal or task.
Social Media – websites, applications or online channels that enable users
to concrete, discuss, modify, and exchange user generated content.
TIPS TO STAY SAFE ONLINE / ONLINE
NETIQUETTES
1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how the
website handles the information you share.
4. Know the security features of the social networking site you use by
keeping your profile private, search engines will not be able to scan your
profile.
TIPS TO STAY SAFE ONLINE / ONLINE
NETIQUETTES
5. Do not share your password to anyone.
6. Avoid logging in to public Wi-Fi. Browsing in incognito or
private mode will not protect you from hackers.
7. Do not talk to stranger online.
8. Add friends you know in real life.
9. Never post about future vacations. It is similar to posting “rob
my house at this date.”
10.Avoid visiting untrusted websites.
TIPS TO STAY SAFE ONLINE / ONLINE
NETIQUETTES
11. Buy software; do not use pirated ones.
12. Do not reply or click links from suspicious
emails.
13. Install and update your anti-virus.
14. Make you Wi-Fi at home a private network.
INTERNET THREATS
Here are some of the threats you should be aware of when using the Internet:
1. Malware – stands for malicious software.
a. Virus – a malicious software designed to replicate itself and transfer from one
computer to another either from the internet or via local networks or data storage.
b. Worm – a malicious program that transfers from one computer to another by any
type of means.
c. Trojan – a malicious program that is disguised as a useful program but once
downloaded and installed, it leaves your computer unprotected to hackers
d. Spyware – a program that runs in the background without your knowing. It can
monitor what you are currently doing and typing through key logging.
e. Adware – a program designed to send you advertisement, mostly as pop-ups.
INTERNET THREATS
2. Spam – unwanted emails mostly from bots or advertisers. It can be
used to send malwares.
3. Phishing – Its goal is to acquire sensitive personal information like
passwords and credit card details. This is done by sending you an email
that will direct the user to visit a website and be asked to update his/her
username, password, credit card, or personal information.
THINK BEFORE YOU CLICK
1. Before you post something in the web, ask this questions
to yourself: Would you want your grandparents and parents
to see it? Would you want your future boss to see it? Once
you post something in the web, you have no control of who
sees your post.
2. Your friends depends on you to protect their reputation
online. Talk to you friends about this serious responsibility.
THINK BEFORE YOU CLICK
3. Set your post to private. In this way, search engines will
not be able to scan that post.
4. Avoid using names. Names are easy for search engines
to scan.
5. If you feel that a post can affect you and other’s
reputation, ask the one who posted it to pull it down or
report it as inappropriate.
COPYRIGHT INFRINGEMENT
If you create something – an idea, an invention, a form of literary work or a
research, you have the right as to how it should be used by others. This is called
intellectual property. In other words, the copyright law includes your right over
your work, and anyone who uses it without your consent is punishable by law.

Here are some tips that could help you avoid copyright infringement:
1. Understand – This means that you can express something using your own
words, but you should give credits to the source.
COPYRIGHT INFRINGEMENT
2. Be responsible – Even if material does not say that it is not copyrighted, it is not
a valid defense against copyright. Be responsible enough to know if something has
a copyright.
3. Be creative – Ask yourself if what you are making is something that came from
you or something made from somebody else’s creativity.
4. Know the law – There are limitations to the copyright laws and there are also
provisions for “fair use” which means that an intellectual property may be use
without a consent as long as it is use for commentaries, criticism, parodies and new
reports.
Self – Check:

A. Most Of Us Use The Internet Every Day. Sometimes, We Do Not Pay Attention On How
Much Information We Share Online. Below Is A Questionnaire About How Much Information
You Have Shared So Far. Put A Check (✔) Under Shared Or Not Shared.

How Safe Are You?


Type of Information Shared Not Shared
1. First Name
2. Last Name
3. Middle Name
4. Current and Previous School(s)
5. Your cell phone number
6. The name of your mother and father
7. The name of your siblings
8. Your address
9. Your home phone number
10. Your birthday
B. Answer and explicate the following questions.

1. How would you feel if someone posted something embarrassing


about you? What would you do?
2. Why do need to be mindful in sharing or posting information
online?
3. Explain the importance of being able to understand the different
threats over the Internet?
EXERCISES: QUESTIONS TO CONSIDER

1. What kind of impact do ICT and Digital Media


have on you? Explain your answer.
2. What aspects of ICT of Digital Media interest
you the most? Why? Explain your answer.

You might also like