SlideShare a Scribd company logo
ICT as a
Platform for
Change
11:11PM
GROUP 2: STEM 11-D
enda • Agenda • Agenda • Agenda • Agenda • Agenda • Agenda • Agenda • Agenda • Agenda • Agenda • Agenda • Agenda • Agen
ICT as
Medium for
Advocacy
ICT in
Philippine History
Digital
Citizenship
Introduction
Agenda
Topics Covered
oduction • Introduction • Introduction • Introduction • Introduction • Introduction • Introduction • Introduction • Introducti
troduction • Introduction • Introduction • Introduction • Introduction • Introduction • Introduction • Introduction • Introductio
Back to Agenda Page
Introduction
ADVOCACY
It is any action that speaks in favor of,
recommends, argues for a cause, supports
or defends, or pleads on behalf of others.
Advocacy seeks to ensure that all people
in society are able to: Have their voice
heard on issues that are important to them.
Protect and promote their rights. Have
their views and wishes genuinely
considered when decisions are being made
about their lives.
It is a collective term for website
applications which focus on
community-based input,
communication, interaction, content-
sharing and collaboration.
Advocating in social media means
taking advantage of social networks to
promote your cause and connect with
supporters.
SOCIAL MEDIA
This is a term that describes the unequal
distribution of communication and
information across various places around
the globe.
It is commonly described as "the gap
between information haves and have-
nots".
GLOBAL DIGITAL DIVIDE
in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT
in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT
Back to Agenda Page
ICT in Philippine
History
T in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT in Philippine History • IC
in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT
Did you know that the ICT took a very
important role in the recent philippine
history?
EDSA (People Power Revolution)
A major protest took a place along EDSA
from February 22 to 25, 1986 involving
2 million of Filipinos from different sectors.
EDSA (People Power Revolution)
EDSA (People Power Revolution)
ICT played a vital role in the EDSA People Power Revolution
as it becomes the eye opener to the Filipinos to see what is
the reality beyond the reign of the dictator and an
authoritarian president, Ferdinand Marcos for 20 years.
EDSA (People Power Revolution)
The traditional media of radio as communication
technology was used.
EDSA DOS
Also known as 2001 EDSA Revolution which
happened during January 17-21, 2001.
It was through the use of mobile phone by text Brigades that
led the people in EDSA grew over the course of a few days.
EDSA DOS
Yolanda People Finder
It was the means of allowing the user to post message and
search for their own families or friends who was affected
by the typhoon.
Million People March
The Million People March or the so-called “Pork Barrel Scam” was the first ever
on-going series of protest in the Philippines held at the Luneta Park on the 26th
day of August 2013, about the total abolition of the Pork Barrel or the Priority
Development Assistance Fund scam which triggered the anger of the people
through social medias such as Facebook and Twitter. Many Filipinos expressed
their anger through creating blogs, pages, advertisements and even memes to
show that they agree to the idea of stopping the Pork Barrel Fund.
s a Medium for Advocacy • ICT as a Medium for Advocacy • ICT as a Medium for Advocacy • ICT as a Medium for Advocacy • ICT
s a Medium for Advocacy • ICT as a Medium for Advocacy • ICT as a Medium for Advocacy • ICT as a Medium for Advocacy • ICT
Back to Agenda Page
ICT as a
Medium for
Advocacy
ICT as a Medium for Advocacy
A process of supporting and enabling people to express
their views and concern, access information and services
defend and promote their rights and responsibilities.
Change.org
Change.org is dubbed as the
“world’s platform for change”
where anyone from an online
community can create a
petition and ask others to sign
it.
It gives access to more
people by allowing the online
community to affix their
digital signatures on a
petition.
Change.org Its mission is to aid the
people from around the
world to create the change
they want to see.
Sample petitions raised
were: economic problems,
criminal injustice, abuse of
human rights, lack of
education, environmental
concerns, animal abuse,
human health concerns and
world hunger.
l Citizenship • Digital Citizenship • Digital Citizenship • Digital Citizenship • Digital Citizenship • Digital Citizenship • Digital Citizen
l Citizenship • Digital Citizenship • Digital Citizenship • Digital Citizenship • Digital Citizenship • Digital Citizenship • Digital Citizen
Back to Agenda Page
Digital
Citizenship
Digital Citizenship
It is where information
technology (IT) is used to
participate in matters
involving the society,
politics, and the
government.
K. Mossberger, et al.
define digital citizens as
"those who use the
Internet regularly and
effectively".
Digital
Citizenship
Back to Agenda Page
The full electronic participation in
society.
In technology, users do not receive
equal opportunities. In order to
overcome this, users should work
toward equal digital rights and
support electronic access, which is the
starting point of Digital Citizenship.
Digital Access
Digital
Citizenship
Back to Agenda Page
It includes the people, processes
and technologies to execute the
offering of development content,
analytics, promotion, pricing,
customer acquisition and
retention, and customer
experience at all touchpoints
throughout the customer buying
journey.
Digital Commerce
Digital
Citizenship
Back to Agenda Page
It is also the ability of the
users to recognize that much
of the economy is regulated
online.
It is the process of buying
things online without human
intervention.
Digital Commerce
Digital
Citizenship
Back to Agenda Page
Digital communication involves
an organization's online
communication efforts.
It deals with understanding the
variety of online communication
mediums.
Digital Communication
Back to Agenda Page
Digital
Citizenship
Digital Literacy
This deals with the understanding
of how to use various digital devices.
It is the ability and knowledge
needed to learn and teach using
technology tools.
As the internet dissolves into
something more seamless, we might
adjust ourselves in parallel.
Back to Agenda Page
Digital Literacy
7 KEY COMPONENTS OF DIGITAL
LITERACY
Critical thinking
Online safety skills
Digital culture
Collaboration and creativity
Finding information
Communication and netiquette
Function skills
Digital
Citizenship
Back to Agenda Page
Digital Etiquette
Technology users often see
this area as one of the most
pressing problems when dealing
with Digital Citizenship.
We recognize inappropriate
behavior when we see it, but before
people use technology they do not
learn digital etiquette.
Digital
Citizenship
Back to Agenda Page
Digital Etiquette
Some Digital
Etiquette Rules
Avoid offensive language
Keep writing to the point
Read first, write later
Consider the privacy of
others.
Do not send, forward, or post
inappropriate material
Digital
Citizenship
Digital
Citizenship
Back to Agenda Page
Digital Law
Digital law is the electronic
responsibility for actions, deeds ethical
or unethical. Unethical use manifests
itself in form of theft and/or crime.
Ethical manifests itself in the form of
abiding by the laws of society.
It is basically about what you are and are
not allowed to do while surfing and using
the Internet. Everybody should respect
the law and abide by it.
Republic Acts in the Philippines
concerning Digital Safety
Republic Act No. 101175 or Cybercrime Prevention Act
of 2012 was signed by the President of the Philippines
Mr. Benigno Aquino on September 12th of 2012. The
original goal of this Act was to penalize acts like
cybersex, child pornography, identity theft etc.
The key provisions of the Cybercrime Prevention
Act of 2012 are:
Cybercrime Prevention Act of 2012
key provisions
Illegal Access: access to a computer or any application
without permission.
Illegal Interception: Interception af any non-public
communication of computer data to, from, or within a
computer system by an unauthorised person.
Data Interference: Unauthorized
tampering with, destroying, deleting,
or deteriorating computer data,
electronic documents and data
messages.
Cybercrime Prevention Act of 2012
key provisions
System Interference: Unauthorized interference with
the operation of a computer or computer network,
including the introduction or transmission of viruses, by
inputting, transmitting, or suppressing computer data or
programs or by deleting them. This provision can also
cover authorized activity if the persons behavior went
beyond the agreed upon scope and resulted in the
damages listed in this provision.
Cybercrime Prevention Act of 2012
key provisions
Misuse of devices: Unauthorized use, possession,
production, sale, importation. Unauthorized use of a
computer password or similar data that allows the
entire or a portion of a computer system to be accessed
with the intent of using it to perpetrate any of the
offences listed in Republic Act 10175.
Cybersquatting: acquisition of a domain name in bad
faith on the internet to profit, deceive, and prevent
others from registering it.
Cybercrime Prevention Act of 2012
key provisions
Computer Related Forgery: Unauthorized input,
alteration, or deletion of computer data that results
in authentic data with the intent that it be considered
or acted on for legal purposes as if it were authentic,
regardless of whether the data is directly
readable and intelligible or the act of
knowingly using computer data that is the
product of computer- related forgery
as defined here to perpetuate.
Cybercrime Prevention Act of 2012
key provisions
Computer Related Fraud: Unauthorized access to,
alteration of, or deletion of computer data or
programmes, or interference with the operation of a
computer system, with the purpose to cause
damage.
Cybercrime Prevention Act of 2012
key provisions
Computer-related Identity Theft: Unauthorized acquisition,
use, abuse, transfer, possession, change, or deletion of an
individual's identifying information, whether natural or
legal.
Cybersex: For favor and consideration, willful
engagement, maintenance, control, or operation,
directly or indirectly, of any lascivious presentation
of sexual organs or sexual activity via
a computer system.
Cybercrime Prevention Act of 2012
key provisions
Child Pornography: Unlawful or banned activities
conducted through a computer system, as defined and
punished by Republic Act No.9775 or the anti-child
pornography act of 2009.
Cybercrime Prevention Act of 2012
key provisions
Digital
Citizenship
Back to Agenda Page
Digital Rights and Responsibilities
This is the set of
rights that digital
citizens have such as
privacy, speech, and
so forth.
Right to access and use computers and/or other electronic
devices
Right to access and use digital content
Right to create and access digital media
Right to privacy in digital communities
Right to express your ideas and opinions freely
Right to report anyone or anything that seems
inappropriate
KEY DIGITAL RIGHTS
Use appropriate language and behavior when interacting
with others
Respecting the ideas and opinion of others
Obey all intellectual property laws
Do not use or share others' work without permission
Follow rules and/or codes of conduct for every Internet site
Responsibility to report cyberbullying, threats, and
inappropriate use of digital resources
KEY DIGITAL RESPONSIBILITIES
Back to Agenda Page
Digital Citizenship
Digital Health
Mobile health
Health information
technology
Wearable devices
Telehealth and
telemedicine
It is the application of
digital technologies in
healthcare;
Back to Agenda Page
Digital Health
Digital health technologies use
computing platforms, connectivity,
software, and sensors for
healthcare and related uses.
They include technologies
intended
for use as a medical product, in a
medical product, as companion
diagnostics, or as an adjunct to
other medical products (Devices,
drugs, and biologics). They may also
be used to develop or study medical
products.
Back to Agenda Page
Digital Citizenship
Digital Security
It refers to various ways
of protecting computer's
internet account and files
from intrusion by an
unauthorized user.
An all-encompassing
term which includes the
tools you can use to secure
your identity, data, assets
and technology in the online
and mobile world.
Back to Agenda Page
COMMON DIGITAL SECURITY THREATS
PHISHING
Method of online identity theft.
The fraudulent attempt to obtain sensitive
information or data, such as username,
passwords, and credit card details by
impersonating oneself as a trustworthy
entity in a digital communication.
1.
Back to Agenda Page
COMMON DIGITAL SECURITY THREATS
Usually in the form of ads or spam emails
that includes promises of rewards and offers
unrealistic amounts of money, and when
clicked on can cause malware.
Scammers try to steal your money and
personal information. They are modern day
fraudsters.
2. ONLINE SCAMS
Back to Agenda Page
COMMON DIGITAL SECURITY THREATS
Is a type of computer program that when
executed, replicates itself by modifying
other computer programs and inserting its
own code, which spreads a harmful virus in
the system.
This computer virus ultimately affects the
funcyioning and programming of the device
3. COMPUTER VIRUSES
Back to Agenda Page
TYPES OF DIGITAL SECURITY
Antivirus Software
detects and cleans out infections from your system and keeps out suspicious
programs and threats.
prevent unauthorized users from accessing private networks.
a standard security technology for establishing an encrypted links between a
server and a client typically a web server and a browser.
1.
2. Firewalls
3. SSS (Secure Socket Layer)
enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenshi
Engage
positively.
Know your
online world.
Choose
consciously.
enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship
Digital Citizenship Principles
enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenshi
enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship
Digital Access
Digital Etiquette
Digital Law
It states that the user should
respect himself and the
others.
It includes the following
Digital Citizenship Elements:
1.
2.
3.
Digital Citizenship Principles
Engage
positively.
enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenshi
Respecting the rights of
others to have an opinion
Report offensive, violent,
and illegal content
Get permission before
tagging people on posts or
photos
Talk to a trusted adult about
troubling online experiences
enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship
Digital Citizenship Principles
Engage
positively.
enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenshi
enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship
Digital Commerce
Digital Communication
Digital Literacy
It states that the user should
educate himself and the
others.
It includes the following
Digital Citizenship Elements:
1.
2.
3.
Digital Citizenship Principles
Know your
online world.
enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenshi
enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship
Being familiar with online
sites will help you explore
the internet easier
Recognize online risks and
be capable to manage it
Only use secure websites for
financial and retail services
Password should be unique
strong, and kept as a secret
Digital Citizenship Principles
Know your
online world.
enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenshi
enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship
Digital Rights &
Responsibilities
Digital Health & Wellness
Digital Security
It states that the user should
protect himself and the
others.
It includes the following
Digital Citizenship Elements:
1.
2.
3.
Digital Citizenship Principles
Choose
consciously.
enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenshi
enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship
Regularly check your privacy
and security settings
Carefully choose users that
you interact with online
Regularly review your
internet connections
Immediately apologize and
take down offensive
material as soon as possible
Digital Citizenship Principles
Choose
consciously.
Thank you!
Back to Agenda Page
Members & Contributions
ICT in Philippine
History: Yolanda
People Finder,
Million People
March
Daryl
Julian S.
Delposo
ICT in Philippine
History: EDSA I,
EDSA II
Bryan
Joseph O.
Dicap
Republic Acts in
the Philippines
concerning
Digital Safety
Jerick B.
Ecleo
Jeric A.
Fajardo
Introduction
Althea B.
Caragay
Digital
Commerce and
Digital
Communication
Cyra
Angela
Corre
Digital Health,
Digital Security
Rieze
Marc C.
Dabuet Digital
Citizenship
Principles,
Additional
Slides
Lexine
Gabrielle
V. Daria
ICT as a Medium
for Advocacy,
1st Digital
Citizenship
element
Angel
Grace
Donato
Digital Law and
Republic Acts in
the Philippines
concerning
Digital Safety
Faith
Denise L.
Hernandez
Digital Literacy
and
Digital Etiquette

More Related Content

What's hot

ICT as a Platform for Change
ICT as a Platform for Change ICT as a Platform for Change
ICT as a Platform for Change
Grayzon Gonzales, LPT
 
10 ICT as a Platform for Change
10 ICT as a Platform for Change10 ICT as a Platform for Change
10 ICT as a Platform for Change
Teodoro Llanes II
 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lea Rodriguez
 
Current and Future Trends of Media and Information - Part 1.pptx
Current and Future Trends of Media and Information - Part 1.pptxCurrent and Future Trends of Media and Information - Part 1.pptx
Current and Future Trends of Media and Information - Part 1.pptx
MarylieNoran2
 
ICT in the context of global communication.pptx
ICT in the context of global communication.pptxICT in the context of global communication.pptx
ICT in the context of global communication.pptx
LeifDizon1
 
Module 7: ICT and Social Responsibilities
Module 7: ICT and Social ResponsibilitiesModule 7: ICT and Social Responsibilities
Module 7: ICT and Social Responsibilities
KatherineGarcia94
 
Interactive Multimedia
Interactive MultimediaInteractive Multimedia
Interactive MultimediaJason Hando
 
Collaborative ICT Development - Empowerment Technologies
Collaborative ICT Development - Empowerment TechnologiesCollaborative ICT Development - Empowerment Technologies
Collaborative ICT Development - Empowerment Technologies
Mark Jhon Oxillo
 
Online Systems, Functions and Platforms
Online Systems, Functions and Platforms Online Systems, Functions and Platforms
Online Systems, Functions and Platforms
Aira Shayne Come
 
Media and information literacy 2 | Evolution of Media
Media and information literacy 2 | Evolution of MediaMedia and information literacy 2 | Evolution of Media
Media and information literacy 2 | Evolution of Media
Marvin Bronoso
 
ICT Orientation (CSS)
ICT Orientation (CSS)ICT Orientation (CSS)
ICT Orientation (CSS)
Ydel Capales
 
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
JazzyNF
 
Planning-and-Conceptualizing-an-ICT-for-Social-Change (1).pdf
Planning-and-Conceptualizing-an-ICT-for-Social-Change (1).pdfPlanning-and-Conceptualizing-an-ICT-for-Social-Change (1).pdf
Planning-and-Conceptualizing-an-ICT-for-Social-Change (1).pdf
Eidene Joy Manuel
 
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdfMIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
EricAntonio9
 
MIL Week 1 Lesson 1.pptx
MIL Week 1 Lesson 1.pptxMIL Week 1 Lesson 1.pptx
MIL Week 1 Lesson 1.pptx
Riannel Tecson
 
Media and Information Literate Individual.pptx
Media and Information Literate Individual.pptxMedia and Information Literate Individual.pptx
Media and Information Literate Individual.pptx
MarylieNoran2
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
Mark Jhon Oxillo
 
Module 1 Lesson 1.pptx
Module 1 Lesson 1.pptxModule 1 Lesson 1.pptx
Module 1 Lesson 1.pptx
levipoi
 
Lesson 21 Multimedia and ICT.pdf
Lesson 21 Multimedia and ICT.pdfLesson 21 Multimedia and ICT.pdf
Lesson 21 Multimedia and ICT.pdf
VicenteCarandang
 
Empowerment Technologies Module1
Empowerment Technologies Module1Empowerment Technologies Module1
Empowerment Technologies Module1
Yolie Dags
 

What's hot (20)

ICT as a Platform for Change
ICT as a Platform for Change ICT as a Platform for Change
ICT as a Platform for Change
 
10 ICT as a Platform for Change
10 ICT as a Platform for Change10 ICT as a Platform for Change
10 ICT as a Platform for Change
 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and Etiquette
 
Current and Future Trends of Media and Information - Part 1.pptx
Current and Future Trends of Media and Information - Part 1.pptxCurrent and Future Trends of Media and Information - Part 1.pptx
Current and Future Trends of Media and Information - Part 1.pptx
 
ICT in the context of global communication.pptx
ICT in the context of global communication.pptxICT in the context of global communication.pptx
ICT in the context of global communication.pptx
 
Module 7: ICT and Social Responsibilities
Module 7: ICT and Social ResponsibilitiesModule 7: ICT and Social Responsibilities
Module 7: ICT and Social Responsibilities
 
Interactive Multimedia
Interactive MultimediaInteractive Multimedia
Interactive Multimedia
 
Collaborative ICT Development - Empowerment Technologies
Collaborative ICT Development - Empowerment TechnologiesCollaborative ICT Development - Empowerment Technologies
Collaborative ICT Development - Empowerment Technologies
 
Online Systems, Functions and Platforms
Online Systems, Functions and Platforms Online Systems, Functions and Platforms
Online Systems, Functions and Platforms
 
Media and information literacy 2 | Evolution of Media
Media and information literacy 2 | Evolution of MediaMedia and information literacy 2 | Evolution of Media
Media and information literacy 2 | Evolution of Media
 
ICT Orientation (CSS)
ICT Orientation (CSS)ICT Orientation (CSS)
ICT Orientation (CSS)
 
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
 
Planning-and-Conceptualizing-an-ICT-for-Social-Change (1).pdf
Planning-and-Conceptualizing-an-ICT-for-Social-Change (1).pdfPlanning-and-Conceptualizing-an-ICT-for-Social-Change (1).pdf
Planning-and-Conceptualizing-an-ICT-for-Social-Change (1).pdf
 
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdfMIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
 
MIL Week 1 Lesson 1.pptx
MIL Week 1 Lesson 1.pptxMIL Week 1 Lesson 1.pptx
MIL Week 1 Lesson 1.pptx
 
Media and Information Literate Individual.pptx
Media and Information Literate Individual.pptxMedia and Information Literate Individual.pptx
Media and Information Literate Individual.pptx
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
 
Module 1 Lesson 1.pptx
Module 1 Lesson 1.pptxModule 1 Lesson 1.pptx
Module 1 Lesson 1.pptx
 
Lesson 21 Multimedia and ICT.pdf
Lesson 21 Multimedia and ICT.pdfLesson 21 Multimedia and ICT.pdf
Lesson 21 Multimedia and ICT.pdf
 
Empowerment Technologies Module1
Empowerment Technologies Module1Empowerment Technologies Module1
Empowerment Technologies Module1
 

Similar to ETECH_G2.pdf

9-ictasplatformforchange-180206004734.pptx
9-ictasplatformforchange-180206004734.pptx9-ictasplatformforchange-180206004734.pptx
9-ictasplatformforchange-180206004734.pptx
Kenneth James Alamillo
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
leejhayacosido
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
JhouBautista
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
rommelaa
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
leejhayacosido
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
orosalobarbio
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
orosalegaspi
 
9-ictasplatformforchange-180206004734(1).pptx
9-ictasplatformforchange-180206004734(1).pptx9-ictasplatformforchange-180206004734(1).pptx
9-ictasplatformforchange-180206004734(1).pptx
BenjieBarlaan
 
9-ictasplatformforchange-180206004734.pdf
9-ictasplatformforchange-180206004734.pdf9-ictasplatformforchange-180206004734.pdf
9-ictasplatformforchange-180206004734.pdf
RegineArellano2
 
Emtech2.pptx
Emtech2.pptxEmtech2.pptx
Emtech2.pptx
MarkAnthonyDeVelar1
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
r_bushlow
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
WAIHIGA K.MUTURI
 
The Largest Democracy - India
The Largest Democracy - IndiaThe Largest Democracy - India
Nine elements of digital citizenship
Nine elements of digital citizenshipNine elements of digital citizenship
Nine elements of digital citizenship
monazarrinkelk
 
M.I.L.pptx
M.I.L.pptxM.I.L.pptx
M.I.L.pptx
JoyceNolos
 
Report on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdfReport on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdf
Vincent Mwando
 
Personality Traits of Digital Natives
Personality Traits of Digital NativesPersonality Traits of Digital Natives
Personality Traits of Digital Natives
ijtsrd
 
Digital Citizenship...
Digital Citizenship...Digital Citizenship...
Digital Citizenship...guest8541ec
 
Digital Citizenship by Fatema Salik
Digital Citizenship by Fatema SalikDigital Citizenship by Fatema Salik
Digital Citizenship by Fatema Salikguest8541ec
 

Similar to ETECH_G2.pdf (20)

9-ictasplatformforchange-180206004734.pptx
9-ictasplatformforchange-180206004734.pptx9-ictasplatformforchange-180206004734.pptx
9-ictasplatformforchange-180206004734.pptx
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
9-ictasplatformforchange-180206004734(1).pptx
9-ictasplatformforchange-180206004734(1).pptx9-ictasplatformforchange-180206004734(1).pptx
9-ictasplatformforchange-180206004734(1).pptx
 
9-ictasplatformforchange-180206004734.pdf
9-ictasplatformforchange-180206004734.pdf9-ictasplatformforchange-180206004734.pdf
9-ictasplatformforchange-180206004734.pdf
 
Emtech2.pptx
Emtech2.pptxEmtech2.pptx
Emtech2.pptx
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
 
The Largest Democracy - India
The Largest Democracy - IndiaThe Largest Democracy - India
The Largest Democracy - India
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Nine elements of digital citizenship
Nine elements of digital citizenshipNine elements of digital citizenship
Nine elements of digital citizenship
 
M.I.L.pptx
M.I.L.pptxM.I.L.pptx
M.I.L.pptx
 
Report on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdfReport on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdf
 
Personality Traits of Digital Natives
Personality Traits of Digital NativesPersonality Traits of Digital Natives
Personality Traits of Digital Natives
 
Digital Citizenship...
Digital Citizenship...Digital Citizenship...
Digital Citizenship...
 
Digital Citizenship by Fatema Salik
Digital Citizenship by Fatema SalikDigital Citizenship by Fatema Salik
Digital Citizenship by Fatema Salik
 

Recently uploaded

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 

ETECH_G2.pdf

  • 1. ICT as a Platform for Change 11:11PM GROUP 2: STEM 11-D
  • 2. enda • Agenda • Agenda • Agenda • Agenda • Agenda • Agenda • Agenda • Agenda • Agenda • Agenda • Agenda • Agenda • Agen ICT as Medium for Advocacy ICT in Philippine History Digital Citizenship Introduction Agenda Topics Covered
  • 3. oduction • Introduction • Introduction • Introduction • Introduction • Introduction • Introduction • Introduction • Introducti troduction • Introduction • Introduction • Introduction • Introduction • Introduction • Introduction • Introduction • Introductio Back to Agenda Page Introduction
  • 4. ADVOCACY It is any action that speaks in favor of, recommends, argues for a cause, supports or defends, or pleads on behalf of others. Advocacy seeks to ensure that all people in society are able to: Have their voice heard on issues that are important to them. Protect and promote their rights. Have their views and wishes genuinely considered when decisions are being made about their lives.
  • 5. It is a collective term for website applications which focus on community-based input, communication, interaction, content- sharing and collaboration. Advocating in social media means taking advantage of social networks to promote your cause and connect with supporters. SOCIAL MEDIA
  • 6. This is a term that describes the unequal distribution of communication and information across various places around the globe. It is commonly described as "the gap between information haves and have- nots". GLOBAL DIGITAL DIVIDE
  • 7. in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT Back to Agenda Page ICT in Philippine History
  • 8. T in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT in Philippine History • IC in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT in Philippine History • ICT Did you know that the ICT took a very important role in the recent philippine history?
  • 9. EDSA (People Power Revolution)
  • 10. A major protest took a place along EDSA from February 22 to 25, 1986 involving 2 million of Filipinos from different sectors. EDSA (People Power Revolution)
  • 11. EDSA (People Power Revolution) ICT played a vital role in the EDSA People Power Revolution as it becomes the eye opener to the Filipinos to see what is the reality beyond the reign of the dictator and an authoritarian president, Ferdinand Marcos for 20 years.
  • 12. EDSA (People Power Revolution) The traditional media of radio as communication technology was used.
  • 13. EDSA DOS Also known as 2001 EDSA Revolution which happened during January 17-21, 2001.
  • 14. It was through the use of mobile phone by text Brigades that led the people in EDSA grew over the course of a few days. EDSA DOS
  • 15. Yolanda People Finder It was the means of allowing the user to post message and search for their own families or friends who was affected by the typhoon.
  • 16. Million People March The Million People March or the so-called “Pork Barrel Scam” was the first ever on-going series of protest in the Philippines held at the Luneta Park on the 26th day of August 2013, about the total abolition of the Pork Barrel or the Priority Development Assistance Fund scam which triggered the anger of the people through social medias such as Facebook and Twitter. Many Filipinos expressed their anger through creating blogs, pages, advertisements and even memes to show that they agree to the idea of stopping the Pork Barrel Fund.
  • 17. s a Medium for Advocacy • ICT as a Medium for Advocacy • ICT as a Medium for Advocacy • ICT as a Medium for Advocacy • ICT s a Medium for Advocacy • ICT as a Medium for Advocacy • ICT as a Medium for Advocacy • ICT as a Medium for Advocacy • ICT Back to Agenda Page ICT as a Medium for Advocacy
  • 18. ICT as a Medium for Advocacy A process of supporting and enabling people to express their views and concern, access information and services defend and promote their rights and responsibilities.
  • 19. Change.org Change.org is dubbed as the “world’s platform for change” where anyone from an online community can create a petition and ask others to sign it. It gives access to more people by allowing the online community to affix their digital signatures on a petition.
  • 20. Change.org Its mission is to aid the people from around the world to create the change they want to see. Sample petitions raised were: economic problems, criminal injustice, abuse of human rights, lack of education, environmental concerns, animal abuse, human health concerns and world hunger.
  • 21. l Citizenship • Digital Citizenship • Digital Citizenship • Digital Citizenship • Digital Citizenship • Digital Citizenship • Digital Citizen l Citizenship • Digital Citizenship • Digital Citizenship • Digital Citizenship • Digital Citizenship • Digital Citizenship • Digital Citizen Back to Agenda Page Digital Citizenship
  • 22. Digital Citizenship It is where information technology (IT) is used to participate in matters involving the society, politics, and the government. K. Mossberger, et al. define digital citizens as "those who use the Internet regularly and effectively".
  • 23. Digital Citizenship Back to Agenda Page The full electronic participation in society. In technology, users do not receive equal opportunities. In order to overcome this, users should work toward equal digital rights and support electronic access, which is the starting point of Digital Citizenship. Digital Access
  • 24. Digital Citizenship Back to Agenda Page It includes the people, processes and technologies to execute the offering of development content, analytics, promotion, pricing, customer acquisition and retention, and customer experience at all touchpoints throughout the customer buying journey. Digital Commerce
  • 25. Digital Citizenship Back to Agenda Page It is also the ability of the users to recognize that much of the economy is regulated online. It is the process of buying things online without human intervention. Digital Commerce
  • 26. Digital Citizenship Back to Agenda Page Digital communication involves an organization's online communication efforts. It deals with understanding the variety of online communication mediums. Digital Communication
  • 27. Back to Agenda Page Digital Citizenship Digital Literacy This deals with the understanding of how to use various digital devices. It is the ability and knowledge needed to learn and teach using technology tools. As the internet dissolves into something more seamless, we might adjust ourselves in parallel.
  • 28. Back to Agenda Page Digital Literacy 7 KEY COMPONENTS OF DIGITAL LITERACY Critical thinking Online safety skills Digital culture Collaboration and creativity Finding information Communication and netiquette Function skills Digital Citizenship
  • 29. Back to Agenda Page Digital Etiquette Technology users often see this area as one of the most pressing problems when dealing with Digital Citizenship. We recognize inappropriate behavior when we see it, but before people use technology they do not learn digital etiquette. Digital Citizenship
  • 30. Back to Agenda Page Digital Etiquette Some Digital Etiquette Rules Avoid offensive language Keep writing to the point Read first, write later Consider the privacy of others. Do not send, forward, or post inappropriate material Digital Citizenship
  • 31. Digital Citizenship Back to Agenda Page Digital Law Digital law is the electronic responsibility for actions, deeds ethical or unethical. Unethical use manifests itself in form of theft and/or crime. Ethical manifests itself in the form of abiding by the laws of society. It is basically about what you are and are not allowed to do while surfing and using the Internet. Everybody should respect the law and abide by it.
  • 32. Republic Acts in the Philippines concerning Digital Safety Republic Act No. 101175 or Cybercrime Prevention Act of 2012 was signed by the President of the Philippines Mr. Benigno Aquino on September 12th of 2012. The original goal of this Act was to penalize acts like cybersex, child pornography, identity theft etc. The key provisions of the Cybercrime Prevention Act of 2012 are:
  • 33. Cybercrime Prevention Act of 2012 key provisions Illegal Access: access to a computer or any application without permission. Illegal Interception: Interception af any non-public communication of computer data to, from, or within a computer system by an unauthorised person.
  • 34. Data Interference: Unauthorized tampering with, destroying, deleting, or deteriorating computer data, electronic documents and data messages. Cybercrime Prevention Act of 2012 key provisions
  • 35. System Interference: Unauthorized interference with the operation of a computer or computer network, including the introduction or transmission of viruses, by inputting, transmitting, or suppressing computer data or programs or by deleting them. This provision can also cover authorized activity if the persons behavior went beyond the agreed upon scope and resulted in the damages listed in this provision. Cybercrime Prevention Act of 2012 key provisions
  • 36. Misuse of devices: Unauthorized use, possession, production, sale, importation. Unauthorized use of a computer password or similar data that allows the entire or a portion of a computer system to be accessed with the intent of using it to perpetrate any of the offences listed in Republic Act 10175. Cybersquatting: acquisition of a domain name in bad faith on the internet to profit, deceive, and prevent others from registering it. Cybercrime Prevention Act of 2012 key provisions
  • 37. Computer Related Forgery: Unauthorized input, alteration, or deletion of computer data that results in authentic data with the intent that it be considered or acted on for legal purposes as if it were authentic, regardless of whether the data is directly readable and intelligible or the act of knowingly using computer data that is the product of computer- related forgery as defined here to perpetuate. Cybercrime Prevention Act of 2012 key provisions
  • 38. Computer Related Fraud: Unauthorized access to, alteration of, or deletion of computer data or programmes, or interference with the operation of a computer system, with the purpose to cause damage. Cybercrime Prevention Act of 2012 key provisions
  • 39. Computer-related Identity Theft: Unauthorized acquisition, use, abuse, transfer, possession, change, or deletion of an individual's identifying information, whether natural or legal. Cybersex: For favor and consideration, willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious presentation of sexual organs or sexual activity via a computer system. Cybercrime Prevention Act of 2012 key provisions
  • 40. Child Pornography: Unlawful or banned activities conducted through a computer system, as defined and punished by Republic Act No.9775 or the anti-child pornography act of 2009. Cybercrime Prevention Act of 2012 key provisions
  • 41. Digital Citizenship Back to Agenda Page Digital Rights and Responsibilities This is the set of rights that digital citizens have such as privacy, speech, and so forth.
  • 42. Right to access and use computers and/or other electronic devices Right to access and use digital content Right to create and access digital media Right to privacy in digital communities Right to express your ideas and opinions freely Right to report anyone or anything that seems inappropriate KEY DIGITAL RIGHTS
  • 43. Use appropriate language and behavior when interacting with others Respecting the ideas and opinion of others Obey all intellectual property laws Do not use or share others' work without permission Follow rules and/or codes of conduct for every Internet site Responsibility to report cyberbullying, threats, and inappropriate use of digital resources KEY DIGITAL RESPONSIBILITIES
  • 44. Back to Agenda Page Digital Citizenship Digital Health Mobile health Health information technology Wearable devices Telehealth and telemedicine It is the application of digital technologies in healthcare;
  • 45. Back to Agenda Page Digital Health Digital health technologies use computing platforms, connectivity, software, and sensors for healthcare and related uses. They include technologies intended for use as a medical product, in a medical product, as companion diagnostics, or as an adjunct to other medical products (Devices, drugs, and biologics). They may also be used to develop or study medical products.
  • 46. Back to Agenda Page Digital Citizenship Digital Security It refers to various ways of protecting computer's internet account and files from intrusion by an unauthorized user. An all-encompassing term which includes the tools you can use to secure your identity, data, assets and technology in the online and mobile world.
  • 47. Back to Agenda Page COMMON DIGITAL SECURITY THREATS PHISHING Method of online identity theft. The fraudulent attempt to obtain sensitive information or data, such as username, passwords, and credit card details by impersonating oneself as a trustworthy entity in a digital communication. 1.
  • 48. Back to Agenda Page COMMON DIGITAL SECURITY THREATS Usually in the form of ads or spam emails that includes promises of rewards and offers unrealistic amounts of money, and when clicked on can cause malware. Scammers try to steal your money and personal information. They are modern day fraudsters. 2. ONLINE SCAMS
  • 49. Back to Agenda Page COMMON DIGITAL SECURITY THREATS Is a type of computer program that when executed, replicates itself by modifying other computer programs and inserting its own code, which spreads a harmful virus in the system. This computer virus ultimately affects the funcyioning and programming of the device 3. COMPUTER VIRUSES
  • 50. Back to Agenda Page TYPES OF DIGITAL SECURITY Antivirus Software detects and cleans out infections from your system and keeps out suspicious programs and threats. prevent unauthorized users from accessing private networks. a standard security technology for establishing an encrypted links between a server and a client typically a web server and a browser. 1. 2. Firewalls 3. SSS (Secure Socket Layer)
  • 51. enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenshi Engage positively. Know your online world. Choose consciously. enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Digital Citizenship Principles
  • 52. enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenshi enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Digital Access Digital Etiquette Digital Law It states that the user should respect himself and the others. It includes the following Digital Citizenship Elements: 1. 2. 3. Digital Citizenship Principles Engage positively.
  • 53. enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenshi Respecting the rights of others to have an opinion Report offensive, violent, and illegal content Get permission before tagging people on posts or photos Talk to a trusted adult about troubling online experiences enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Digital Citizenship Principles Engage positively.
  • 54. enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenshi enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Digital Commerce Digital Communication Digital Literacy It states that the user should educate himself and the others. It includes the following Digital Citizenship Elements: 1. 2. 3. Digital Citizenship Principles Know your online world.
  • 55. enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenshi enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Being familiar with online sites will help you explore the internet easier Recognize online risks and be capable to manage it Only use secure websites for financial and retail services Password should be unique strong, and kept as a secret Digital Citizenship Principles Know your online world.
  • 56. enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenshi enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Digital Rights & Responsibilities Digital Health & Wellness Digital Security It states that the user should protect himself and the others. It includes the following Digital Citizenship Elements: 1. 2. 3. Digital Citizenship Principles Choose consciously.
  • 57. enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenshi enship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Principles • Digital Citizenship Regularly check your privacy and security settings Carefully choose users that you interact with online Regularly review your internet connections Immediately apologize and take down offensive material as soon as possible Digital Citizenship Principles Choose consciously.
  • 59. Back to Agenda Page Members & Contributions ICT in Philippine History: Yolanda People Finder, Million People March Daryl Julian S. Delposo ICT in Philippine History: EDSA I, EDSA II Bryan Joseph O. Dicap Republic Acts in the Philippines concerning Digital Safety Jerick B. Ecleo Jeric A. Fajardo Introduction Althea B. Caragay Digital Commerce and Digital Communication Cyra Angela Corre Digital Health, Digital Security Rieze Marc C. Dabuet Digital Citizenship Principles, Additional Slides Lexine Gabrielle V. Daria ICT as a Medium for Advocacy, 1st Digital Citizenship element Angel Grace Donato Digital Law and Republic Acts in the Philippines concerning Digital Safety Faith Denise L. Hernandez Digital Literacy and Digital Etiquette