SlideShare a Scribd company logo
1 of 7
The disadvantages of ict
1. Understand the several problems ICT has
created in their generation; and
2. Write a reflective essay on how ICT can
change the world for better or for worse
1. phishing-spoofing- the act of sending multiple emails to multiple users in hopes
of having a number of them clicking on the links or malwares attached to the
emails. Most email services today have spam or bulk folders that automatically
put these suspicious emails to that folder. However, this is not 100% accurate
that some emails not filtered and some others emails that are legitimate end
upon on the spam folder.
2. blackmail/extortion- the act of using the internet to threaten or damage
someone’s Reputation to extort money or anything else of value.This can be
avoided if you are aware of what you should post on the internet.The victims of
this act tend to have posted something “inappropriate” over the internet even if
they put it at secured location
Accessing stored communication- or hacking; the act of obtaining unauthorized
access to data from a computer network.This is typically done to commercial and
government sites to threaten its owner. In late 2014, a group of hackers hacked
sony’s website because of the impending release of the controversial film “the
interview”
3. Sports betting – the act of wagering on any sports event over the internet. In
some countries, gambling (including sports betting) is illegal even if you are doing
it over the internet
4. Non-delivery of merchandise- the act of devising a scheme wherein a culprit post
an item or service for sale on the internet and once the transaction’s have been
done, does really give the item or service.
5. Electronic harassment- the act of anonymously using the internet to harass,
abuse, threaten, or annoy other people.This is also an act of cyber bullying
however, because the culprit is anonymous, it is hard to detect who is bullying you
6. Child pornography- the act of using the internet to show child pornography this
act is highly punishable by law
8. Prostitution- the act of using the internet to engage in prostitution
9. DrugTrafficking- the act of selling illegal substances using internet
10. Criminal copyright infringement- the act of piracy mainly for financial gain. In late 2014,
the number one pirate website, thepirateby, was raided for the second time due to
years of pirating movies, music, games, books, and other software these kinds of
website earn money through advertising.
the Internet is the present and the future of yourr generation and you define what
impact it can do to shape our society, whether it is negative or positive.The future is in
your hands.
there are several ways the authorities can help solve or prevent cybercrimes.
Here are some of them
1. Network Security- before a hacker can get through the unauthorized files he or she is
targeting, the hacker has to get through several security measures like Encryption is the
process of converting raw data into code. However, theses methods are not 100% secure
and there will always be away for hacker to hack
2. Investigation- URL tracing and logging are used by website to track your unique IP
addresses.This can be used by investigators to trace hackers. In piracy, trackers are used
to identify ip addresses currently sharing a pirated file.
3. Penalties- More and more laws are being created and implemented today. Penalties
include both a fine and imprisonment
As responsible users of technology, we should be are of the limitations of using the
internet
1. Form a group of three members
2. Write the Internet crimes that are rampant today
3. Research on the punishments for the said crimes and discuss among yourselves if these
punishment are fair or not
4. Try to revise these punishment as you see fit
5. Report your revisio0n in class

More Related Content

What's hot

What's hot (20)

LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1S
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
 
TNCT PPT.pptx
TNCT PPT.pptxTNCT PPT.pptx
TNCT PPT.pptx
 
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Collaborative ICT Development - Empowerment Technologies
Collaborative ICT Development - Empowerment TechnologiesCollaborative ICT Development - Empowerment Technologies
Collaborative ICT Development - Empowerment Technologies
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Lesson 1 Empowerment Technology
Lesson 1 Empowerment TechnologyLesson 1 Empowerment Technology
Lesson 1 Empowerment Technology
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
 
ICT as a Platform for Change
ICT as a Platform for ChangeICT as a Platform for Change
ICT as a Platform for Change
 
Trends, Network and Critical Thinking Unit 3 Global Networks Labor and Migration
Trends, Network and Critical Thinking Unit 3 Global Networks Labor and MigrationTrends, Network and Critical Thinking Unit 3 Global Networks Labor and Migration
Trends, Network and Critical Thinking Unit 3 Global Networks Labor and Migration
 
8 Collaborative ICT Development
8 Collaborative ICT Development8 Collaborative ICT Development
8 Collaborative ICT Development
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3
 
Online Platform Tools for ICT Content Development
Online Platform Tools for ICT Content Development Online Platform Tools for ICT Content Development
Online Platform Tools for ICT Content Development
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
ICT Project for Social Change - Empowerment Technologies
ICT Project for Social Change - Empowerment TechnologiesICT Project for Social Change - Empowerment Technologies
ICT Project for Social Change - Empowerment Technologies
 
Trends, Network and Critical Thinking Unit 6 information communication techno...
Trends, Network and Critical Thinking Unit 6 information communication techno...Trends, Network and Critical Thinking Unit 6 information communication techno...
Trends, Network and Critical Thinking Unit 6 information communication techno...
 
ICT PROJECT MAINTENANCE
ICT PROJECT MAINTENANCEICT PROJECT MAINTENANCE
ICT PROJECT MAINTENANCE
 
Group 3 basic web page creation
Group 3  basic web page creationGroup 3  basic web page creation
Group 3 basic web page creation
 

Similar to The disadvantages of ict

L15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptxL15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptx
BenjieBarlaan
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
vichu19891
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
Alisha Korpal
 

Similar to The disadvantages of ict (20)

The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
 
L15 The Disadvantages of ICT.ppt
L15 The Disadvantages of ICT.pptL15 The Disadvantages of ICT.ppt
L15 The Disadvantages of ICT.ppt
 
L15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptxL15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptx
 
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptxThe disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx
 
E-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptxE-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptx
 
15_The_Disadvantages_of_ICT.pptx
15_The_Disadvantages_of_ICT.pptx15_The_Disadvantages_of_ICT.pptx
15_The_Disadvantages_of_ICT.pptx
 
Disadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptxDisadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptx
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
 
trial
trialtrial
trial
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
ICT, the Self, and Society.pdf
ICT, the Self, and Society.pdfICT, the Self, and Society.pdf
ICT, the Self, and Society.pdf
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 

The disadvantages of ict

  • 2. 1. Understand the several problems ICT has created in their generation; and 2. Write a reflective essay on how ICT can change the world for better or for worse
  • 3. 1. phishing-spoofing- the act of sending multiple emails to multiple users in hopes of having a number of them clicking on the links or malwares attached to the emails. Most email services today have spam or bulk folders that automatically put these suspicious emails to that folder. However, this is not 100% accurate that some emails not filtered and some others emails that are legitimate end upon on the spam folder. 2. blackmail/extortion- the act of using the internet to threaten or damage someone’s Reputation to extort money or anything else of value.This can be avoided if you are aware of what you should post on the internet.The victims of this act tend to have posted something “inappropriate” over the internet even if they put it at secured location
  • 4. Accessing stored communication- or hacking; the act of obtaining unauthorized access to data from a computer network.This is typically done to commercial and government sites to threaten its owner. In late 2014, a group of hackers hacked sony’s website because of the impending release of the controversial film “the interview” 3. Sports betting – the act of wagering on any sports event over the internet. In some countries, gambling (including sports betting) is illegal even if you are doing it over the internet 4. Non-delivery of merchandise- the act of devising a scheme wherein a culprit post an item or service for sale on the internet and once the transaction’s have been done, does really give the item or service. 5. Electronic harassment- the act of anonymously using the internet to harass, abuse, threaten, or annoy other people.This is also an act of cyber bullying however, because the culprit is anonymous, it is hard to detect who is bullying you 6. Child pornography- the act of using the internet to show child pornography this act is highly punishable by law
  • 5. 8. Prostitution- the act of using the internet to engage in prostitution 9. DrugTrafficking- the act of selling illegal substances using internet 10. Criminal copyright infringement- the act of piracy mainly for financial gain. In late 2014, the number one pirate website, thepirateby, was raided for the second time due to years of pirating movies, music, games, books, and other software these kinds of website earn money through advertising. the Internet is the present and the future of yourr generation and you define what impact it can do to shape our society, whether it is negative or positive.The future is in your hands.
  • 6. there are several ways the authorities can help solve or prevent cybercrimes. Here are some of them 1. Network Security- before a hacker can get through the unauthorized files he or she is targeting, the hacker has to get through several security measures like Encryption is the process of converting raw data into code. However, theses methods are not 100% secure and there will always be away for hacker to hack 2. Investigation- URL tracing and logging are used by website to track your unique IP addresses.This can be used by investigators to trace hackers. In piracy, trackers are used to identify ip addresses currently sharing a pirated file. 3. Penalties- More and more laws are being created and implemented today. Penalties include both a fine and imprisonment
  • 7. As responsible users of technology, we should be are of the limitations of using the internet 1. Form a group of three members 2. Write the Internet crimes that are rampant today 3. Research on the punishments for the said crimes and discuss among yourselves if these punishment are fair or not 4. Try to revise these punishment as you see fit 5. Report your revisio0n in class