SlideShare a Scribd company logo
The Disadvantages of ICT
• Cybercrimes
• Combatting cybercrimes
At the end of this lesson, the students should be
able to:
1. understand the several problems ICT has created in
their generation; and
2. write a reflective essay on how ICT can change the
world for better or for worse.
Cybercrimes
Cybercrimes are illegal acts
done through the use of the
Internet.
In 2012, Stephen Nale (Complex.com)
posted a list of ten most common Internet
cybercrimes as follows:
1. Phishing/Spoofing – the act of sending multiple
emails to multiple users in hopes of having a
number of them clicking on the links or malwares
attached to the email.
2. Blackmail/Extortion – the act of using the
Internet to threaten or damage someone’s
reputation to extort money or anything else of
value. This can be avoided if you are aware of what
you should post on the Internet.
3. Accessing Stored Communications – or hacking; the act
of obtaining unauthorized access to data from a computer
network.
4. Sports Betting – the act of wagering on any sports event
over the Internet. In some countries, gambling (including
sports betting) is illegal even if you are doing it over the
Internet.
5. Non-Delivery of Merchandise – the act of devising a
scheme wherein a culprit posts an item or service for sale
over the Internet and once the transactions have been done,
does not really give the item or service.
6. Electronic Harassment – the act of anonymously using
the Internet to harass, abuse, threaten, or annoy other people.
7. Child Pornography – the act of using the Internet to show
child pornography. This act is highly punishable by law.
8. Drug Trafficking – the act of selling illegal substances
using the Internet.
9. Criminal Copyright Infringement – the act of piracy
mainly for financial gain. In late 2014, the number one pirate
website, ThePirateBay, was raided for the second time due to
years of pirating movies, music, games, books, and other
software. These kinds of websites earn money through
advertising.
Combatting Cybercrimes
1. Network Security. Before a hacker can get through the
unauthorized files he or she is targeting, the hacker has to
get through several security measures like firewalls, secure
connections, passwords, anti-malwares, and data
encryptions. The Disadvantages of ICT 177
2. Investigation. URL tracing and logging are used by
websites to track your unique IP addresses. This can be used
by investigators to trace hackers. In piracy, trackers are used
to identify IP addresses currently sharing a pirated file.
3. Penalties. More and more laws are being created and
implemented today. Penalties include both a fine and
imprisonment.

More Related Content

What's hot

[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
JazzyNF
 
Empowerment Technologies - Online Platforms as Tools for ICT Content Development
Empowerment Technologies - Online Platforms as Tools for ICT Content DevelopmentEmpowerment Technologies - Online Platforms as Tools for ICT Content Development
Empowerment Technologies - Online Platforms as Tools for ICT Content Development
Lany Lyn Magdaraog
 
8 Collaborative ICT Development
8 Collaborative ICT Development8 Collaborative ICT Development
8 Collaborative ICT Development
Teodoro Llanes II
 
EMP TECH Q2 LESSON 1.pptx
EMP TECH Q2 LESSON 1.pptxEMP TECH Q2 LESSON 1.pptx
EMP TECH Q2 LESSON 1.pptx
sherelynbalada1
 
ICT as a Platform for Change
ICT as a Platform for Change ICT as a Platform for Change
ICT as a Platform for Change
Grayzon Gonzales, LPT
 
Contextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsContextualized online-search-and-research-skills
Contextualized online-search-and-research-skills
JohnBarsaga
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
Mark Jhon Oxillo
 
Emp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fvEmp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fv
VivienPastores1
 
ICT_Q2_WEEK 1.pptx
ICT_Q2_WEEK 1.pptxICT_Q2_WEEK 1.pptx
ICT_Q2_WEEK 1.pptx
GeraldineMatias3
 
Empowerment Technologies
Empowerment TechnologiesEmpowerment Technologies
Empowerment Technologies
Michelle Faina
 
ICT PROJECT MAINTENANCE
ICT PROJECT MAINTENANCEICT PROJECT MAINTENANCE
ICT PROJECT MAINTENANCE
IsrailAsnon
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3
Jesus Rances
 
Empowerment Technologies - Module 1.pptx
Empowerment Technologies - Module 1.pptxEmpowerment Technologies - Module 1.pptx
Empowerment Technologies - Module 1.pptx
joelphillipGranada2
 
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
JazzyNF
 
Empowerment Technology Lesson 3
Empowerment Technology Lesson 3Empowerment Technology Lesson 3
Empowerment Technology Lesson 3
alicelagajino
 
Software Applications and Platforms.pptx
Software Applications and Platforms.pptxSoftware Applications and Platforms.pptx
Software Applications and Platforms.pptx
marlonfelizardo3
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
Rochelle Nato
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Mark Jhon Oxillo
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
Jesus Rances
 
ICT as a Platform for Change
ICT as a Platform for ChangeICT as a Platform for Change
ICT as a Platform for Change
George Silandote Jr.
 

What's hot (20)

[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Empowerment Technologies - Online Platforms as Tools for ICT Content Development
Empowerment Technologies - Online Platforms as Tools for ICT Content DevelopmentEmpowerment Technologies - Online Platforms as Tools for ICT Content Development
Empowerment Technologies - Online Platforms as Tools for ICT Content Development
 
8 Collaborative ICT Development
8 Collaborative ICT Development8 Collaborative ICT Development
8 Collaborative ICT Development
 
EMP TECH Q2 LESSON 1.pptx
EMP TECH Q2 LESSON 1.pptxEMP TECH Q2 LESSON 1.pptx
EMP TECH Q2 LESSON 1.pptx
 
ICT as a Platform for Change
ICT as a Platform for Change ICT as a Platform for Change
ICT as a Platform for Change
 
Contextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsContextualized online-search-and-research-skills
Contextualized online-search-and-research-skills
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
 
Emp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fvEmp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fv
 
ICT_Q2_WEEK 1.pptx
ICT_Q2_WEEK 1.pptxICT_Q2_WEEK 1.pptx
ICT_Q2_WEEK 1.pptx
 
Empowerment Technologies
Empowerment TechnologiesEmpowerment Technologies
Empowerment Technologies
 
ICT PROJECT MAINTENANCE
ICT PROJECT MAINTENANCEICT PROJECT MAINTENANCE
ICT PROJECT MAINTENANCE
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3
 
Empowerment Technologies - Module 1.pptx
Empowerment Technologies - Module 1.pptxEmpowerment Technologies - Module 1.pptx
Empowerment Technologies - Module 1.pptx
 
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
 
Empowerment Technology Lesson 3
Empowerment Technology Lesson 3Empowerment Technology Lesson 3
Empowerment Technology Lesson 3
 
Software Applications and Platforms.pptx
Software Applications and Platforms.pptxSoftware Applications and Platforms.pptx
Software Applications and Platforms.pptx
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
 
ICT as a Platform for Change
ICT as a Platform for ChangeICT as a Platform for Change
ICT as a Platform for Change
 

Similar to E-Tech L15 The Disadvantages of ICT.pptx

The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
AnecitaLCalamohoy
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
AnecitaLCalamohoy
 
Disadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptxDisadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptx
DixsonCaluag2
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
cyb1337
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
angellaclarianes1
 
ICT, the Self, and Society.pdf
ICT, the Self, and Society.pdfICT, the Self, and Society.pdf
ICT, the Self, and Society.pdf
TeacherAnneApolinari
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
Neeraj Ahirwar
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
SohailAkbar14
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
Divesh Mewara
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & lawssureshjogesh48
 
4. ONLINE SAFETY.pptx
4. ONLINE SAFETY.pptx4. ONLINE SAFETY.pptx
4. ONLINE SAFETY.pptx
RyanRojasRicablanca
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
Preethi Kumaresh
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
Farjana Akter
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
VivekanandaGN1
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
Jeet Swain
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
Rubi Orbeta
 
cybercreme.pptx
cybercreme.pptxcybercreme.pptx
cybercreme.pptx
hichamelhirch
 

Similar to E-Tech L15 The Disadvantages of ICT.pptx (20)

The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
 
Disadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptxDisadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptx
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
 
ICT, the Self, and Society.pdf
ICT, the Self, and Society.pdfICT, the Self, and Society.pdf
ICT, the Self, and Society.pdf
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
4. ONLINE SAFETY.pptx
4. ONLINE SAFETY.pptx4. ONLINE SAFETY.pptx
4. ONLINE SAFETY.pptx
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
cybercreme.pptx
cybercreme.pptxcybercreme.pptx
cybercreme.pptx
 

More from Leah Condina

Q1 Lesson 1 Reading and Writing 11.pptx
Q1 Lesson 1 Reading and Writing 11.pptxQ1 Lesson 1 Reading and Writing 11.pptx
Q1 Lesson 1 Reading and Writing 11.pptx
Leah Condina
 
EAPP Quarter2 - Module5_ Writing a Research Report.pdf
EAPP Quarter2 - Module5_ Writing a Research Report.pdfEAPP Quarter2 - Module5_ Writing a Research Report.pdf
EAPP Quarter2 - Module5_ Writing a Research Report.pdf
Leah Condina
 
EAPP Quarter2 - Module4_ Data Collection Methods & Tools for Research.pdf
EAPP Quarter2 - Module4_ Data Collection Methods & Tools for Research.pdfEAPP Quarter2 - Module4_ Data Collection Methods & Tools for Research.pdf
EAPP Quarter2 - Module4_ Data Collection Methods & Tools for Research.pdf
Leah Condina
 
EAPP Quarter2 - Module3_ Research Report.pdf
EAPP Quarter2 - Module3_ Research Report.pdfEAPP Quarter2 - Module3_ Research Report.pdf
EAPP Quarter2 - Module3_ Research Report.pdf
Leah Condina
 
EAPP Quarter2 - Module2_ Writing a Position Paper.pdf
EAPP Quarter2 - Module2_ Writing a Position Paper.pdfEAPP Quarter2 - Module2_ Writing a Position Paper.pdf
EAPP Quarter2 - Module2_ Writing a Position Paper.pdf
Leah Condina
 
EAPP Quarter2 - Module1_ Defending a Stand.pdf
EAPP Quarter2 - Module1_ Defending a Stand.pdfEAPP Quarter2 - Module1_ Defending a Stand.pdf
EAPP Quarter2 - Module1_ Defending a Stand.pdf
Leah Condina
 
EAPP Quarter2 - Module5_ Writing a Research Report.pdf
EAPP Quarter2 - Module5_ Writing a Research Report.pdfEAPP Quarter2 - Module5_ Writing a Research Report.pdf
EAPP Quarter2 - Module5_ Writing a Research Report.pdf
Leah Condina
 
EAPP Quarter2 - Module4_ Data Collection Methods & Tools for Research.pdf
EAPP Quarter2 - Module4_ Data Collection Methods & Tools for Research.pdfEAPP Quarter2 - Module4_ Data Collection Methods & Tools for Research.pdf
EAPP Quarter2 - Module4_ Data Collection Methods & Tools for Research.pdf
Leah Condina
 
EAPP Quarter2 - Module3_ Research Report.pdf
EAPP Quarter2 - Module3_ Research Report.pdfEAPP Quarter2 - Module3_ Research Report.pdf
EAPP Quarter2 - Module3_ Research Report.pdf
Leah Condina
 
EAPP Quarter2 - Module2_ Writing a Position Paper.pdf
EAPP Quarter2 - Module2_ Writing a Position Paper.pdfEAPP Quarter2 - Module2_ Writing a Position Paper.pdf
EAPP Quarter2 - Module2_ Writing a Position Paper.pdf
Leah Condina
 
EAPP Quarter2 - Module1_ Defending a Stand.pdf
EAPP Quarter2 - Module1_ Defending a Stand.pdfEAPP Quarter2 - Module1_ Defending a Stand.pdf
EAPP Quarter2 - Module1_ Defending a Stand.pdf
Leah Condina
 
EAPP Q2 - M7_ Summarizing and Reporting.pdf
EAPP Q2 - M7_ Summarizing and Reporting.pdfEAPP Q2 - M7_ Summarizing and Reporting.pdf
EAPP Q2 - M7_ Summarizing and Reporting.pdf
Leah Condina
 
EAPP Q2 - M6_ Gathering Information.pdf
EAPP Q2 - M6_ Gathering Information.pdfEAPP Q2 - M6_ Gathering Information.pdf
EAPP Q2 - M6_ Gathering Information.pdf
Leah Condina
 
EAPP Q2 - M5_ Designing and Conducting ResearchInstruments.pdf
EAPP Q2 - M5_ Designing and Conducting ResearchInstruments.pdfEAPP Q2 - M5_ Designing and Conducting ResearchInstruments.pdf
EAPP Q2 - M5_ Designing and Conducting ResearchInstruments.pdf
Leah Condina
 
EAPP Q2 - M4_ Determining The Objectives and Structures of Reports.pdf
EAPP Q2 - M4_ Determining The Objectives and Structures of Reports.pdfEAPP Q2 - M4_ Determining The Objectives and Structures of Reports.pdf
EAPP Q2 - M4_ Determining The Objectives and Structures of Reports.pdf
Leah Condina
 
EAPP Q2 - M3_ Writing Various Kinds of Position Paper.pdf
EAPP Q2 - M3_ Writing Various Kinds of Position Paper.pdfEAPP Q2 - M3_ Writing Various Kinds of Position Paper.pdf
EAPP Q2 - M3_ Writing Various Kinds of Position Paper.pdf
Leah Condina
 
EAPP Q2 - M2_ Defending A Stand.pdf
EAPP Q2 - M2_ Defending A Stand.pdfEAPP Q2 - M2_ Defending A Stand.pdf
EAPP Q2 - M2_ Defending A Stand.pdf
Leah Condina
 
EAPP Q2 - M1_ Identifying and Analyzing Arguments.pdf
EAPP Q2 - M1_ Identifying and Analyzing Arguments.pdfEAPP Q2 - M1_ Identifying and Analyzing Arguments.pdf
EAPP Q2 - M1_ Identifying and Analyzing Arguments.pdf
Leah Condina
 
EAPP Q 2 – Module 8 Writing the Report Survey Field ReportLaboratoryScientifi...
EAPP Q 2 – Module 8 Writing the Report Survey Field ReportLaboratoryScientifi...EAPP Q 2 – Module 8 Writing the Report Survey Field ReportLaboratoryScientifi...
EAPP Q 2 – Module 8 Writing the Report Survey Field ReportLaboratoryScientifi...
Leah Condina
 
EAPP Q 2 – Module 7 Designing, Conducting and Gathering Information from Surv...
EAPP Q 2 – Module 7 Designing, Conducting and Gathering Information from Surv...EAPP Q 2 – Module 7 Designing, Conducting and Gathering Information from Surv...
EAPP Q 2 – Module 7 Designing, Conducting and Gathering Information from Surv...
Leah Condina
 

More from Leah Condina (20)

Q1 Lesson 1 Reading and Writing 11.pptx
Q1 Lesson 1 Reading and Writing 11.pptxQ1 Lesson 1 Reading and Writing 11.pptx
Q1 Lesson 1 Reading and Writing 11.pptx
 
EAPP Quarter2 - Module5_ Writing a Research Report.pdf
EAPP Quarter2 - Module5_ Writing a Research Report.pdfEAPP Quarter2 - Module5_ Writing a Research Report.pdf
EAPP Quarter2 - Module5_ Writing a Research Report.pdf
 
EAPP Quarter2 - Module4_ Data Collection Methods & Tools for Research.pdf
EAPP Quarter2 - Module4_ Data Collection Methods & Tools for Research.pdfEAPP Quarter2 - Module4_ Data Collection Methods & Tools for Research.pdf
EAPP Quarter2 - Module4_ Data Collection Methods & Tools for Research.pdf
 
EAPP Quarter2 - Module3_ Research Report.pdf
EAPP Quarter2 - Module3_ Research Report.pdfEAPP Quarter2 - Module3_ Research Report.pdf
EAPP Quarter2 - Module3_ Research Report.pdf
 
EAPP Quarter2 - Module2_ Writing a Position Paper.pdf
EAPP Quarter2 - Module2_ Writing a Position Paper.pdfEAPP Quarter2 - Module2_ Writing a Position Paper.pdf
EAPP Quarter2 - Module2_ Writing a Position Paper.pdf
 
EAPP Quarter2 - Module1_ Defending a Stand.pdf
EAPP Quarter2 - Module1_ Defending a Stand.pdfEAPP Quarter2 - Module1_ Defending a Stand.pdf
EAPP Quarter2 - Module1_ Defending a Stand.pdf
 
EAPP Quarter2 - Module5_ Writing a Research Report.pdf
EAPP Quarter2 - Module5_ Writing a Research Report.pdfEAPP Quarter2 - Module5_ Writing a Research Report.pdf
EAPP Quarter2 - Module5_ Writing a Research Report.pdf
 
EAPP Quarter2 - Module4_ Data Collection Methods & Tools for Research.pdf
EAPP Quarter2 - Module4_ Data Collection Methods & Tools for Research.pdfEAPP Quarter2 - Module4_ Data Collection Methods & Tools for Research.pdf
EAPP Quarter2 - Module4_ Data Collection Methods & Tools for Research.pdf
 
EAPP Quarter2 - Module3_ Research Report.pdf
EAPP Quarter2 - Module3_ Research Report.pdfEAPP Quarter2 - Module3_ Research Report.pdf
EAPP Quarter2 - Module3_ Research Report.pdf
 
EAPP Quarter2 - Module2_ Writing a Position Paper.pdf
EAPP Quarter2 - Module2_ Writing a Position Paper.pdfEAPP Quarter2 - Module2_ Writing a Position Paper.pdf
EAPP Quarter2 - Module2_ Writing a Position Paper.pdf
 
EAPP Quarter2 - Module1_ Defending a Stand.pdf
EAPP Quarter2 - Module1_ Defending a Stand.pdfEAPP Quarter2 - Module1_ Defending a Stand.pdf
EAPP Quarter2 - Module1_ Defending a Stand.pdf
 
EAPP Q2 - M7_ Summarizing and Reporting.pdf
EAPP Q2 - M7_ Summarizing and Reporting.pdfEAPP Q2 - M7_ Summarizing and Reporting.pdf
EAPP Q2 - M7_ Summarizing and Reporting.pdf
 
EAPP Q2 - M6_ Gathering Information.pdf
EAPP Q2 - M6_ Gathering Information.pdfEAPP Q2 - M6_ Gathering Information.pdf
EAPP Q2 - M6_ Gathering Information.pdf
 
EAPP Q2 - M5_ Designing and Conducting ResearchInstruments.pdf
EAPP Q2 - M5_ Designing and Conducting ResearchInstruments.pdfEAPP Q2 - M5_ Designing and Conducting ResearchInstruments.pdf
EAPP Q2 - M5_ Designing and Conducting ResearchInstruments.pdf
 
EAPP Q2 - M4_ Determining The Objectives and Structures of Reports.pdf
EAPP Q2 - M4_ Determining The Objectives and Structures of Reports.pdfEAPP Q2 - M4_ Determining The Objectives and Structures of Reports.pdf
EAPP Q2 - M4_ Determining The Objectives and Structures of Reports.pdf
 
EAPP Q2 - M3_ Writing Various Kinds of Position Paper.pdf
EAPP Q2 - M3_ Writing Various Kinds of Position Paper.pdfEAPP Q2 - M3_ Writing Various Kinds of Position Paper.pdf
EAPP Q2 - M3_ Writing Various Kinds of Position Paper.pdf
 
EAPP Q2 - M2_ Defending A Stand.pdf
EAPP Q2 - M2_ Defending A Stand.pdfEAPP Q2 - M2_ Defending A Stand.pdf
EAPP Q2 - M2_ Defending A Stand.pdf
 
EAPP Q2 - M1_ Identifying and Analyzing Arguments.pdf
EAPP Q2 - M1_ Identifying and Analyzing Arguments.pdfEAPP Q2 - M1_ Identifying and Analyzing Arguments.pdf
EAPP Q2 - M1_ Identifying and Analyzing Arguments.pdf
 
EAPP Q 2 – Module 8 Writing the Report Survey Field ReportLaboratoryScientifi...
EAPP Q 2 – Module 8 Writing the Report Survey Field ReportLaboratoryScientifi...EAPP Q 2 – Module 8 Writing the Report Survey Field ReportLaboratoryScientifi...
EAPP Q 2 – Module 8 Writing the Report Survey Field ReportLaboratoryScientifi...
 
EAPP Q 2 – Module 7 Designing, Conducting and Gathering Information from Surv...
EAPP Q 2 – Module 7 Designing, Conducting and Gathering Information from Surv...EAPP Q 2 – Module 7 Designing, Conducting and Gathering Information from Surv...
EAPP Q 2 – Module 7 Designing, Conducting and Gathering Information from Surv...
 

Recently uploaded

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 

Recently uploaded (20)

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 

E-Tech L15 The Disadvantages of ICT.pptx

  • 1. The Disadvantages of ICT • Cybercrimes • Combatting cybercrimes
  • 2. At the end of this lesson, the students should be able to: 1. understand the several problems ICT has created in their generation; and 2. write a reflective essay on how ICT can change the world for better or for worse.
  • 3. Cybercrimes Cybercrimes are illegal acts done through the use of the Internet.
  • 4. In 2012, Stephen Nale (Complex.com) posted a list of ten most common Internet cybercrimes as follows: 1. Phishing/Spoofing – the act of sending multiple emails to multiple users in hopes of having a number of them clicking on the links or malwares attached to the email. 2. Blackmail/Extortion – the act of using the Internet to threaten or damage someone’s reputation to extort money or anything else of value. This can be avoided if you are aware of what you should post on the Internet.
  • 5. 3. Accessing Stored Communications – or hacking; the act of obtaining unauthorized access to data from a computer network. 4. Sports Betting – the act of wagering on any sports event over the Internet. In some countries, gambling (including sports betting) is illegal even if you are doing it over the Internet. 5. Non-Delivery of Merchandise – the act of devising a scheme wherein a culprit posts an item or service for sale over the Internet and once the transactions have been done, does not really give the item or service. 6. Electronic Harassment – the act of anonymously using the Internet to harass, abuse, threaten, or annoy other people.
  • 6. 7. Child Pornography – the act of using the Internet to show child pornography. This act is highly punishable by law. 8. Drug Trafficking – the act of selling illegal substances using the Internet. 9. Criminal Copyright Infringement – the act of piracy mainly for financial gain. In late 2014, the number one pirate website, ThePirateBay, was raided for the second time due to years of pirating movies, music, games, books, and other software. These kinds of websites earn money through advertising.
  • 7. Combatting Cybercrimes 1. Network Security. Before a hacker can get through the unauthorized files he or she is targeting, the hacker has to get through several security measures like firewalls, secure connections, passwords, anti-malwares, and data encryptions. The Disadvantages of ICT 177 2. Investigation. URL tracing and logging are used by websites to track your unique IP addresses. This can be used by investigators to trace hackers. In piracy, trackers are used to identify IP addresses currently sharing a pirated file. 3. Penalties. More and more laws are being created and implemented today. Penalties include both a fine and imprisonment.

Editor's Notes

  1. Ask the students to share to the class an instance when they (or someone they know) became a victim of cybercrime. Ask the students what actions were done to take down their issue (in re: 1st item).
  2. Divide the class into groups, ask them to make an advertisement of their choice (slogan, role play, jingle) to campaign on fight against cyberbullying.