ICT played a vital role in important events in Philippine history such as the EDSA People Power Revolution and recent protests. During EDSA I in 1986, radio was used as a communication technology to spread information beyond the reign of Ferdinand Marcos. The Million People March in 2013 against the pork barrel scam saw Filipinos express anger on social media like Facebook and Twitter. ICT also enabled communication during disasters like through the Yolanda People Finder website during Typhoon Haiyan in 2013.
Current and Future Trends of Media and Information - Part 1.pptxMarylieNoran2
Subject:
Media and Information Literacy
Watch on YouTube: https://www.youtube.com/watch?v=j2hcL8YJ3I0
Topic:
Current and Future Trends of Media and Information (Part 1)
Senior High School
Presentation by: Marylie Noran, LPT
Media and information literacy 2 | Evolution of MediaMarvin Bronoso
Learning Competencies:
•identifies traditional media and new media and their relationships
•editorializes the roles and functions of media in democratic society
•searches latest theory on information and media
Media and Information Literate Individual.pptxMarylieNoran2
Subject: Media and Information Literacy
Topic: Media and Information Literate Individual
For Senior High School students.
Watch the recorded lecture on Youtube:
https://www.youtube.com/watch?v=M6eN7XvvOVo
Presentation by: Marylie Noran, LPT
Current and Future Trends of Media and Information - Part 1.pptxMarylieNoran2
Subject:
Media and Information Literacy
Watch on YouTube: https://www.youtube.com/watch?v=j2hcL8YJ3I0
Topic:
Current and Future Trends of Media and Information (Part 1)
Senior High School
Presentation by: Marylie Noran, LPT
Media and information literacy 2 | Evolution of MediaMarvin Bronoso
Learning Competencies:
•identifies traditional media and new media and their relationships
•editorializes the roles and functions of media in democratic society
•searches latest theory on information and media
Media and Information Literate Individual.pptxMarylieNoran2
Subject: Media and Information Literacy
Topic: Media and Information Literate Individual
For Senior High School students.
Watch the recorded lecture on Youtube:
https://www.youtube.com/watch?v=M6eN7XvvOVo
Presentation by: Marylie Noran, LPT
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfWAIHIGA K.MUTURI
This meeting is scheduled for Wednesday 26th October at 4 pm GMT. Yes, it's only in two days. During this session, we will cover the following topic :
The importance of privacy as culture and how (legal) regulation makes a difference by Eduarda Chacon Rosas (Brazil).
Internet governance and digital rights by Waihiga K. Muturi, Rtn. (Kenya).
Online Apps: Its Regulations and Governance by Antara Jha (India).
Maintaining data integrity through effective regulatory policies by Jonathan Agbo (Nigeria).
I hope you will enjoy those conversations and strongly advise you to mark the date on the calendar.
As a last reminder, here's the link of the event: https://us06web.zoom.us/meeting/register/tZArfuqspz8sHdYTLYvWQcU7GZgCsZrPUSsE
The Largest Democracy (India) Poised forElectronic Government and ElectronicDemocracy Suggested Framework: Verifiable, Open, Transparent, Empathetic, Responsive and Sensitive (VOTERS) eDemocracy (Singara Rao Karna) #CeDEM12
We live in an always connected, digital age. Digitalization has accelerated exponentially, and companies’ survival will depend on their ability to reshape their future. Those who are born after 1980 are called digital natives. Digital natives are assumed to be inherently technology savvy. They have some peculiar characteristics which have attracted the attention of researchers. This paper presents some of those characteristics or personality traits. Matthew N. O. Sadiku | Uwakwe C. Chukwu | Abayomi Ajayi-Majebi | Sarhan M. Musa "Personality Traits of Digital Natives" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-3 , April 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49581.pdf Paper URL: https://www.ijtsrd.com/humanities-and-the-arts/social-science/49581/personality-traits-of-digital-natives/matthew-n-o-sadiku
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
4. ADVOCACY
It is any action that speaks in favor of,
recommends, argues for a cause, supports
or defends, or pleads on behalf of others.
Advocacy seeks to ensure that all people
in society are able to: Have their voice
heard on issues that are important to them.
Protect and promote their rights. Have
their views and wishes genuinely
considered when decisions are being made
about their lives.
5. It is a collective term for website
applications which focus on
community-based input,
communication, interaction, content-
sharing and collaboration.
Advocating in social media means
taking advantage of social networks to
promote your cause and connect with
supporters.
SOCIAL MEDIA
6. This is a term that describes the unequal
distribution of communication and
information across various places around
the globe.
It is commonly described as "the gap
between information haves and have-
nots".
GLOBAL DIGITAL DIVIDE
7. in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT
in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT
Back to Agenda Page
ICT in Philippine
History
8. T in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT in Philippine History • IC
in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT
Did you know that the ICT took a very
important role in the recent philippine
history?
10. A major protest took a place along EDSA
from February 22 to 25, 1986 involving
2 million of Filipinos from different sectors.
EDSA (People Power Revolution)
11. EDSA (People Power Revolution)
ICT played a vital role in the EDSA People Power Revolution
as it becomes the eye opener to the Filipinos to see what is
the reality beyond the reign of the dictator and an
authoritarian president, Ferdinand Marcos for 20 years.
12. EDSA (People Power Revolution)
The traditional media of radio as communication
technology was used.
13. EDSA DOS
Also known as 2001 EDSA Revolution which
happened during January 17-21, 2001.
14. It was through the use of mobile phone by text Brigades that
led the people in EDSA grew over the course of a few days.
EDSA DOS
15. Yolanda People Finder
It was the means of allowing the user to post message and
search for their own families or friends who was affected
by the typhoon.
16. Million People March
The Million People March or the so-called “Pork Barrel Scam” was the first ever
on-going series of protest in the Philippines held at the Luneta Park on the 26th
day of August 2013, about the total abolition of the Pork Barrel or the Priority
Development Assistance Fund scam which triggered the anger of the people
through social medias such as Facebook and Twitter. Many Filipinos expressed
their anger through creating blogs, pages, advertisements and even memes to
show that they agree to the idea of stopping the Pork Barrel Fund.
17. s a Medium for Advocacy • ICT as a Medium for Advocacy • ICT as a Medium for Advocacy • ICT as a Medium for Advocacy • ICT
s a Medium for Advocacy • ICT as a Medium for Advocacy • ICT as a Medium for Advocacy • ICT as a Medium for Advocacy • ICT
Back to Agenda Page
ICT as a
Medium for
Advocacy
18. ICT as a Medium for Advocacy
A process of supporting and enabling people to express
their views and concern, access information and services
defend and promote their rights and responsibilities.
19. Change.org
Change.org is dubbed as the
“world’s platform for change”
where anyone from an online
community can create a
petition and ask others to sign
it.
It gives access to more
people by allowing the online
community to affix their
digital signatures on a
petition.
20. Change.org Its mission is to aid the
people from around the
world to create the change
they want to see.
Sample petitions raised
were: economic problems,
criminal injustice, abuse of
human rights, lack of
education, environmental
concerns, animal abuse,
human health concerns and
world hunger.
21. l Citizenship • Digital Citizenship • Digital Citizenship • Digital Citizenship • Digital Citizenship • Digital Citizenship • Digital Citizen
l Citizenship • Digital Citizenship • Digital Citizenship • Digital Citizenship • Digital Citizenship • Digital Citizenship • Digital Citizen
Back to Agenda Page
Digital
Citizenship
22. Digital Citizenship
It is where information
technology (IT) is used to
participate in matters
involving the society,
politics, and the
government.
K. Mossberger, et al.
define digital citizens as
"those who use the
Internet regularly and
effectively".
23. Digital
Citizenship
Back to Agenda Page
The full electronic participation in
society.
In technology, users do not receive
equal opportunities. In order to
overcome this, users should work
toward equal digital rights and
support electronic access, which is the
starting point of Digital Citizenship.
Digital Access
24. Digital
Citizenship
Back to Agenda Page
It includes the people, processes
and technologies to execute the
offering of development content,
analytics, promotion, pricing,
customer acquisition and
retention, and customer
experience at all touchpoints
throughout the customer buying
journey.
Digital Commerce
25. Digital
Citizenship
Back to Agenda Page
It is also the ability of the
users to recognize that much
of the economy is regulated
online.
It is the process of buying
things online without human
intervention.
Digital Commerce
26. Digital
Citizenship
Back to Agenda Page
Digital communication involves
an organization's online
communication efforts.
It deals with understanding the
variety of online communication
mediums.
Digital Communication
27. Back to Agenda Page
Digital
Citizenship
Digital Literacy
This deals with the understanding
of how to use various digital devices.
It is the ability and knowledge
needed to learn and teach using
technology tools.
As the internet dissolves into
something more seamless, we might
adjust ourselves in parallel.
28. Back to Agenda Page
Digital Literacy
7 KEY COMPONENTS OF DIGITAL
LITERACY
Critical thinking
Online safety skills
Digital culture
Collaboration and creativity
Finding information
Communication and netiquette
Function skills
Digital
Citizenship
29. Back to Agenda Page
Digital Etiquette
Technology users often see
this area as one of the most
pressing problems when dealing
with Digital Citizenship.
We recognize inappropriate
behavior when we see it, but before
people use technology they do not
learn digital etiquette.
Digital
Citizenship
30. Back to Agenda Page
Digital Etiquette
Some Digital
Etiquette Rules
Avoid offensive language
Keep writing to the point
Read first, write later
Consider the privacy of
others.
Do not send, forward, or post
inappropriate material
Digital
Citizenship
31. Digital
Citizenship
Back to Agenda Page
Digital Law
Digital law is the electronic
responsibility for actions, deeds ethical
or unethical. Unethical use manifests
itself in form of theft and/or crime.
Ethical manifests itself in the form of
abiding by the laws of society.
It is basically about what you are and are
not allowed to do while surfing and using
the Internet. Everybody should respect
the law and abide by it.
32. Republic Acts in the Philippines
concerning Digital Safety
Republic Act No. 101175 or Cybercrime Prevention Act
of 2012 was signed by the President of the Philippines
Mr. Benigno Aquino on September 12th of 2012. The
original goal of this Act was to penalize acts like
cybersex, child pornography, identity theft etc.
The key provisions of the Cybercrime Prevention
Act of 2012 are:
33. Cybercrime Prevention Act of 2012
key provisions
Illegal Access: access to a computer or any application
without permission.
Illegal Interception: Interception af any non-public
communication of computer data to, from, or within a
computer system by an unauthorised person.
34. Data Interference: Unauthorized
tampering with, destroying, deleting,
or deteriorating computer data,
electronic documents and data
messages.
Cybercrime Prevention Act of 2012
key provisions
35. System Interference: Unauthorized interference with
the operation of a computer or computer network,
including the introduction or transmission of viruses, by
inputting, transmitting, or suppressing computer data or
programs or by deleting them. This provision can also
cover authorized activity if the persons behavior went
beyond the agreed upon scope and resulted in the
damages listed in this provision.
Cybercrime Prevention Act of 2012
key provisions
36. Misuse of devices: Unauthorized use, possession,
production, sale, importation. Unauthorized use of a
computer password or similar data that allows the
entire or a portion of a computer system to be accessed
with the intent of using it to perpetrate any of the
offences listed in Republic Act 10175.
Cybersquatting: acquisition of a domain name in bad
faith on the internet to profit, deceive, and prevent
others from registering it.
Cybercrime Prevention Act of 2012
key provisions
37. Computer Related Forgery: Unauthorized input,
alteration, or deletion of computer data that results
in authentic data with the intent that it be considered
or acted on for legal purposes as if it were authentic,
regardless of whether the data is directly
readable and intelligible or the act of
knowingly using computer data that is the
product of computer- related forgery
as defined here to perpetuate.
Cybercrime Prevention Act of 2012
key provisions
38. Computer Related Fraud: Unauthorized access to,
alteration of, or deletion of computer data or
programmes, or interference with the operation of a
computer system, with the purpose to cause
damage.
Cybercrime Prevention Act of 2012
key provisions
39. Computer-related Identity Theft: Unauthorized acquisition,
use, abuse, transfer, possession, change, or deletion of an
individual's identifying information, whether natural or
legal.
Cybersex: For favor and consideration, willful
engagement, maintenance, control, or operation,
directly or indirectly, of any lascivious presentation
of sexual organs or sexual activity via
a computer system.
Cybercrime Prevention Act of 2012
key provisions
40. Child Pornography: Unlawful or banned activities
conducted through a computer system, as defined and
punished by Republic Act No.9775 or the anti-child
pornography act of 2009.
Cybercrime Prevention Act of 2012
key provisions
41. Digital
Citizenship
Back to Agenda Page
Digital Rights and Responsibilities
This is the set of
rights that digital
citizens have such as
privacy, speech, and
so forth.
42. Right to access and use computers and/or other electronic
devices
Right to access and use digital content
Right to create and access digital media
Right to privacy in digital communities
Right to express your ideas and opinions freely
Right to report anyone or anything that seems
inappropriate
KEY DIGITAL RIGHTS
43. Use appropriate language and behavior when interacting
with others
Respecting the ideas and opinion of others
Obey all intellectual property laws
Do not use or share others' work without permission
Follow rules and/or codes of conduct for every Internet site
Responsibility to report cyberbullying, threats, and
inappropriate use of digital resources
KEY DIGITAL RESPONSIBILITIES
44. Back to Agenda Page
Digital Citizenship
Digital Health
Mobile health
Health information
technology
Wearable devices
Telehealth and
telemedicine
It is the application of
digital technologies in
healthcare;
45. Back to Agenda Page
Digital Health
Digital health technologies use
computing platforms, connectivity,
software, and sensors for
healthcare and related uses.
They include technologies
intended
for use as a medical product, in a
medical product, as companion
diagnostics, or as an adjunct to
other medical products (Devices,
drugs, and biologics). They may also
be used to develop or study medical
products.
46. Back to Agenda Page
Digital Citizenship
Digital Security
It refers to various ways
of protecting computer's
internet account and files
from intrusion by an
unauthorized user.
An all-encompassing
term which includes the
tools you can use to secure
your identity, data, assets
and technology in the online
and mobile world.
47. Back to Agenda Page
COMMON DIGITAL SECURITY THREATS
PHISHING
Method of online identity theft.
The fraudulent attempt to obtain sensitive
information or data, such as username,
passwords, and credit card details by
impersonating oneself as a trustworthy
entity in a digital communication.
1.
48. Back to Agenda Page
COMMON DIGITAL SECURITY THREATS
Usually in the form of ads or spam emails
that includes promises of rewards and offers
unrealistic amounts of money, and when
clicked on can cause malware.
Scammers try to steal your money and
personal information. They are modern day
fraudsters.
2. ONLINE SCAMS
49. Back to Agenda Page
COMMON DIGITAL SECURITY THREATS
Is a type of computer program that when
executed, replicates itself by modifying
other computer programs and inserting its
own code, which spreads a harmful virus in
the system.
This computer virus ultimately affects the
funcyioning and programming of the device
3. COMPUTER VIRUSES
50. Back to Agenda Page
TYPES OF DIGITAL SECURITY
Antivirus Software
detects and cleans out infections from your system and keeps out suspicious
programs and threats.
prevent unauthorized users from accessing private networks.
a standard security technology for establishing an encrypted links between a
server and a client typically a web server and a browser.
1.
2. Firewalls
3. SSS (Secure Socket Layer)
51. enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenshi
Engage
positively.
Know your
online world.
Choose
consciously.
enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship
Digital Citizenship Principles
52. enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenshi
enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship
Digital Access
Digital Etiquette
Digital Law
It states that the user should
respect himself and the
others.
It includes the following
Digital Citizenship Elements:
1.
2.
3.
Digital Citizenship Principles
Engage
positively.
53. enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenshi
Respecting the rights of
others to have an opinion
Report offensive, violent,
and illegal content
Get permission before
tagging people on posts or
photos
Talk to a trusted adult about
troubling online experiences
enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship
Digital Citizenship Principles
Engage
positively.
54. enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenshi
enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship
Digital Commerce
Digital Communication
Digital Literacy
It states that the user should
educate himself and the
others.
It includes the following
Digital Citizenship Elements:
1.
2.
3.
Digital Citizenship Principles
Know your
online world.
55. enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenshi
enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship
Being familiar with online
sites will help you explore
the internet easier
Recognize online risks and
be capable to manage it
Only use secure websites for
financial and retail services
Password should be unique
strong, and kept as a secret
Digital Citizenship Principles
Know your
online world.
56. enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenshi
enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship
Digital Rights &
Responsibilities
Digital Health & Wellness
Digital Security
It states that the user should
protect himself and the
others.
It includes the following
Digital Citizenship Elements:
1.
2.
3.
Digital Citizenship Principles
Choose
consciously.
57. enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenshi
enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship
Regularly check your privacy
and security settings
Carefully choose users that
you interact with online
Regularly review your
internet connections
Immediately apologize and
take down offensive
material as soon as possible
Digital Citizenship Principles
Choose
consciously.
59. Back to Agenda Page
Members & Contributions
ICT in Philippine
History: Yolanda
People Finder,
Million People
March
Daryl
Julian S.
Delposo
ICT in Philippine
History: EDSA I,
EDSA II
Bryan
Joseph O.
Dicap
Republic Acts in
the Philippines
concerning
Digital Safety
Jerick B.
Ecleo
Jeric A.
Fajardo
Introduction
Althea B.
Caragay
Digital
Commerce and
Digital
Communication
Cyra
Angela
Corre
Digital Health,
Digital Security
Rieze
Marc C.
Dabuet Digital
Citizenship
Principles,
Additional
Slides
Lexine
Gabrielle
V. Daria
ICT as a Medium
for Advocacy,
1st Digital
Citizenship
element
Angel
Grace
Donato
Digital Law and
Republic Acts in
the Philippines
concerning
Digital Safety
Faith
Denise L.
Hernandez
Digital Literacy
and
Digital Etiquette