SlideShare a Scribd company logo
ICT, the Self, and
Society
THE DISADVANTAGES OF ICT
DISADVANTAGES OF ICT
● ICT and technology as a whole brought us comfort and convenience in
life. We Filipino, have been known to be avid users of technology.
Some even have a name as an internet sensation. However, aside from
those successes are the downfall of users.
● Give an example or share in the class the “bad things” or any
unwarranted acts (like piracy) you have done using ICT.
CYBERCRIMES
● CYBER CRIMES - are illegal
acts done through the use of
the internet. In 2012, Stephen
Nale (complex.com) posted a
list of ten most common
internet cyber crimes as
follows:
PHISHING/ SPOOFING
The act of sending multiple emails to multiple users in hopes
of having a number of them clicking on the links or malwares
attached to the email.
BLACKMAIL/ EXTORTION
The act of using the internet to threaten or damage someone’s
reputation to extort money or anything else of value. This is
avoidable if you are aware of what you should post on the
internet.
ACCESSING STORED
COMMUNICATIONS
ACCESSING STORED
COMMUNICATIONS
Or hacking; the act of obtaining unauthorized access to data
from a computer network. This is typically done to commercial
and government sites to threaten its owner. In late 2014, a
group of hackers hacked Sony’s website because of impending
release of the controversial film “The Interview”
THE INTERVIEW SHORT CLIP
NON DELIVERY OF MERCHANDISE
The act of devising a scheme wherein the culprit posts an
item or service for sale on the internet and once the
transactions have been done, does not really give the item or
service.
SPORTS BETTING
SPORTS BETTING
The act of wagering on any sports event over the internet.
In some countries, gambling, (including sports betting) is
illegal even if you are doing it in the internet.
ELECTRONIC HARASSMENT
The act of anonymously using the internet to harass, abuse,
threaten, or annoy other people. This is also an act of
cyberbullying, however, because the culprit is anonymous, it
is hard to detect who is bullying you.
CHILD PORNOGRAPHY
The act of using the internet to show child pornography. This
act is highly punishable by law.
PROSTITUTION
The act of using the internet to engage in prostitution.
DRUG TRAFFICKING
The act of selling illegal substances using the internet
CRIMINAL COPYRIGHT INFRINGEMENT
The act of piracy mainly for
financial gain. In late 2014,
the number one pirate website,
The Pirate Bay, was raided for
the second time due to years of
pirating movies, music, games,
books, and other software.
These kind of websites earn
money through advertising.
THERE ARE SEVERAL WAYS THE AUTHORITIES CAN HELP
SOLVE OR PREVENT CYBER CRIMES. HERE ARE SOME OF THEM
INVESTIGATION
URL tracing and logging are used by
websites to track your unique IP
addresses. (sharing of pirated file)
NETWORK SECURITY
Firewalls, secure connections,
passwords, anti-malwares and data
encryptions.
PENALTIES
More and more laws are being created
and implemented today. Penalties
include both fine and imprisonment.
COMBATTING
CYBERCRIMES
KEY TERMS
PHISHING - also referred to as spoofing, an act of
spamming emails.
SPAM - unwanted emails
BLACKMAIL - act of asking something in return of not
showing something that could damage someone’s
reputation.
HACKING - the act of obtaining unauthorized information
CYBERBULLYING - an act of harassment using electronic
means
COPYRIGHT INFRINGEMENT - an act of piracy mainly for
financial gain.
ENCRYPTION - the process of converting raw data into
code
ACTIVITY
Information and Communications Technology (ICT)
continuously shape the future and how society will be
developed. The improvement of ICT may vary depending on
the situation and resources of once location.
Share your reflection piece about the impact of ICT in
our daily living especially in this time of crisis. Let
the world know how ICT has positively changed your view.
It might encourage other people to learn new things and
innovate their old ways and perspective in life using ICT.
Let them inform, share what you know, and teach the new
ways to have a progressive society.
PERFORMANCE TASK;
CONTINUE WORKING ON YOUR
CONCEPT PAPER.
IT SHOULD CONTAIN THE
FOLLOWING:
● Introduction
● Purpose
● Description
● Support
● Statistics
● Contact Information

More Related Content

What's hot

Interactive Multimedia - Empowerment Technologies
 Interactive Multimedia - Empowerment Technologies Interactive Multimedia - Empowerment Technologies
Interactive Multimedia - Empowerment Technologies
Mark Jhon Oxillo
 
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
bloodyblade06
 
Daily Lesson Log in MIL Week 5.docx
Daily Lesson Log in MIL Week 5.docxDaily Lesson Log in MIL Week 5.docx
Daily Lesson Log in MIL Week 5.docx
RoNTertainmentTV
 
ICT as a Platform for Change
ICT as a Platform for ChangeICT as a Platform for Change
ICT as a Platform for Change
George Silandote Jr.
 
DLL- MIL June 4-10,2019.docx
DLL- MIL June 4-10,2019.docxDLL- MIL June 4-10,2019.docx
DLL- MIL June 4-10,2019.docx
VERNALOU
 
Current and Future Trends of Media and Information
Current and Future Trends of Media and InformationCurrent and Future Trends of Media and Information
Current and Future Trends of Media and Information
Elijah Miguel Cuenca
 
Media and Information Literacy (MIL) 1. Introduction to MIL (Part 2)- Charact...
Media and Information Literacy (MIL) 1. Introduction to MIL (Part 2)- Charact...Media and Information Literacy (MIL) 1. Introduction to MIL (Part 2)- Charact...
Media and Information Literacy (MIL) 1. Introduction to MIL (Part 2)- Charact...
Arniel Ping
 
Managing and sustaining ict projects
Managing and sustaining ict projectsManaging and sustaining ict projects
Managing and sustaining ict projects
Aubrey Mae Antonio
 
Module 1 Lesson 1.pptx
Module 1 Lesson 1.pptxModule 1 Lesson 1.pptx
Module 1 Lesson 1.pptx
levipoi
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
Mark Jhon Oxillo
 
Mil dlp w1
Mil dlp w1Mil dlp w1
Mil dlp w1
MaryJoyPagtakhan2
 
12 Publishing and Sustaining for ICT Project
12 Publishing and Sustaining for ICT Project12 Publishing and Sustaining for ICT Project
12 Publishing and Sustaining for ICT Project
Teodoro Llanes II
 
4 Advance Word Processing Skill
4 Advance Word Processing Skill4 Advance Word Processing Skill
4 Advance Word Processing Skill
Teodoro Llanes II
 
8 Opportunities, Challenges, and Power of Media and Information.pptx
8 Opportunities, Challenges, and Power of Media  and Information.pptx8 Opportunities, Challenges, and Power of Media  and Information.pptx
8 Opportunities, Challenges, and Power of Media and Information.pptx
MagdaLo1
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
JazzyNF
 
1.-MEDIA-DLL week1.docx
1.-MEDIA-DLL week1.docx1.-MEDIA-DLL week1.docx
1.-MEDIA-DLL week1.docx
RoNTertainmentTV
 
EMP TECH Q2 LESSON 1.pptx
EMP TECH Q2 LESSON 1.pptxEMP TECH Q2 LESSON 1.pptx
EMP TECH Q2 LESSON 1.pptx
sherelynbalada1
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1
alicelagajino
 
Publishing and sustaining ict projects
Publishing and sustaining ict projectsPublishing and sustaining ict projects
Publishing and sustaining ict projects
Charlotte Quemada
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
Rochelle Nato
 

What's hot (20)

Interactive Multimedia - Empowerment Technologies
 Interactive Multimedia - Empowerment Technologies Interactive Multimedia - Empowerment Technologies
Interactive Multimedia - Empowerment Technologies
 
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
 
Daily Lesson Log in MIL Week 5.docx
Daily Lesson Log in MIL Week 5.docxDaily Lesson Log in MIL Week 5.docx
Daily Lesson Log in MIL Week 5.docx
 
ICT as a Platform for Change
ICT as a Platform for ChangeICT as a Platform for Change
ICT as a Platform for Change
 
DLL- MIL June 4-10,2019.docx
DLL- MIL June 4-10,2019.docxDLL- MIL June 4-10,2019.docx
DLL- MIL June 4-10,2019.docx
 
Current and Future Trends of Media and Information
Current and Future Trends of Media and InformationCurrent and Future Trends of Media and Information
Current and Future Trends of Media and Information
 
Media and Information Literacy (MIL) 1. Introduction to MIL (Part 2)- Charact...
Media and Information Literacy (MIL) 1. Introduction to MIL (Part 2)- Charact...Media and Information Literacy (MIL) 1. Introduction to MIL (Part 2)- Charact...
Media and Information Literacy (MIL) 1. Introduction to MIL (Part 2)- Charact...
 
Managing and sustaining ict projects
Managing and sustaining ict projectsManaging and sustaining ict projects
Managing and sustaining ict projects
 
Module 1 Lesson 1.pptx
Module 1 Lesson 1.pptxModule 1 Lesson 1.pptx
Module 1 Lesson 1.pptx
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
 
Mil dlp w1
Mil dlp w1Mil dlp w1
Mil dlp w1
 
12 Publishing and Sustaining for ICT Project
12 Publishing and Sustaining for ICT Project12 Publishing and Sustaining for ICT Project
12 Publishing and Sustaining for ICT Project
 
4 Advance Word Processing Skill
4 Advance Word Processing Skill4 Advance Word Processing Skill
4 Advance Word Processing Skill
 
8 Opportunities, Challenges, and Power of Media and Information.pptx
8 Opportunities, Challenges, and Power of Media  and Information.pptx8 Opportunities, Challenges, and Power of Media  and Information.pptx
8 Opportunities, Challenges, and Power of Media and Information.pptx
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
1.-MEDIA-DLL week1.docx
1.-MEDIA-DLL week1.docx1.-MEDIA-DLL week1.docx
1.-MEDIA-DLL week1.docx
 
EMP TECH Q2 LESSON 1.pptx
EMP TECH Q2 LESSON 1.pptxEMP TECH Q2 LESSON 1.pptx
EMP TECH Q2 LESSON 1.pptx
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1
 
Publishing and sustaining ict projects
Publishing and sustaining ict projectsPublishing and sustaining ict projects
Publishing and sustaining ict projects
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 

Similar to ICT, the Self, and Society.pdf

The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
angellaclarianes1
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
AnecitaLCalamohoy
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
AnecitaLCalamohoy
 
L15 The Disadvantages of ICT.ppt
L15 The Disadvantages of ICT.pptL15 The Disadvantages of ICT.ppt
L15 The Disadvantages of ICT.ppt
raffy ursulum
 
L15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptxL15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptx
BenjieBarlaan
 
15_The_Disadvantages_of_ICT.pptx
15_The_Disadvantages_of_ICT.pptx15_The_Disadvantages_of_ICT.pptx
15_The_Disadvantages_of_ICT.pptx
ReminPasion1
 
E-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptxE-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptx
Leah Condina
 
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptxThe disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx
AnecitaLCalamohoy
 
Disadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptxDisadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptx
DixsonCaluag2
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
Soreingam Ragui
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
cyb1337
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
FloroRaphaell
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
VaishnaviPalkar
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
Likan Patra
 
CYBERCRIME.pptx
CYBERCRIME.pptxCYBERCRIME.pptx
CYBERCRIME.pptx
JohnArsenAsuncion
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
BadarHossain
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
Avinash Katariya
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
Kira Dess
 

Similar to ICT, the Self, and Society.pdf (20)

The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
 
L15 The Disadvantages of ICT.ppt
L15 The Disadvantages of ICT.pptL15 The Disadvantages of ICT.ppt
L15 The Disadvantages of ICT.ppt
 
L15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptxL15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptx
 
15_The_Disadvantages_of_ICT.pptx
15_The_Disadvantages_of_ICT.pptx15_The_Disadvantages_of_ICT.pptx
15_The_Disadvantages_of_ICT.pptx
 
E-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptxE-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptx
 
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptxThe disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx
 
Disadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptxDisadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptx
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
CYBERCRIME.pptx
CYBERCRIME.pptxCYBERCRIME.pptx
CYBERCRIME.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 

More from TeacherAnneApolinari

Q3_PPT6_Use of past perfect tenses11.pdf
Q3_PPT6_Use of past perfect tenses11.pdfQ3_PPT6_Use of past perfect tenses11.pdf
Q3_PPT6_Use of past perfect tenses11.pdf
TeacherAnneApolinari
 
Q4_PPT6_Use of Imperatives when giving instructions.pdf
Q4_PPT6_Use of Imperatives when giving instructions.pdfQ4_PPT6_Use of Imperatives when giving instructions.pdf
Q4_PPT6_Use of Imperatives when giving instructions.pdf
TeacherAnneApolinari
 
Tracing the Bioculural and Evolution of Early to Modern Humans.pptx
Tracing the Bioculural and Evolution of Early to Modern Humans.pptxTracing the Bioculural and Evolution of Early to Modern Humans.pptx
Tracing the Bioculural and Evolution of Early to Modern Humans.pptx
TeacherAnneApolinari
 
Q4_PPT7_Practice OHSP in the Kitchen.pptx
Q4_PPT7_Practice OHSP in the Kitchen.pptxQ4_PPT7_Practice OHSP in the Kitchen.pptx
Q4_PPT7_Practice OHSP in the Kitchen.pptx
TeacherAnneApolinari
 
Review in fcs nailcare, NAILCARE SERVICES.pptx
Review in fcs nailcare, NAILCARE SERVICES.pptxReview in fcs nailcare, NAILCARE SERVICES.pptx
Review in fcs nailcare, NAILCARE SERVICES.pptx
TeacherAnneApolinari
 
Q4_PPT3_Classifications of Salad according to ingredients.pptx
Q4_PPT3_Classifications of Salad according to ingredients.pptxQ4_PPT3_Classifications of Salad according to ingredients.pptx
Q4_PPT3_Classifications of Salad according to ingredients.pptx
TeacherAnneApolinari
 
Green-at-Heart_by catherine d. tanPPT.pptx
Green-at-Heart_by catherine d. tanPPT.pptxGreen-at-Heart_by catherine d. tanPPT.pptx
Green-at-Heart_by catherine d. tanPPT.pptx
TeacherAnneApolinari
 
Q3_PPT2_Preparing Tools and Equipment in Agri-crop Farming.pptx
Q3_PPT2_Preparing Tools and Equipment in Agri-crop Farming.pptxQ3_PPT2_Preparing Tools and Equipment in Agri-crop Farming.pptx
Q3_PPT2_Preparing Tools and Equipment in Agri-crop Farming.pptx
TeacherAnneApolinari
 
Fact or Opinion PowerPoint and distinguising fact from opinion
Fact or Opinion PowerPoint and distinguising fact from opinionFact or Opinion PowerPoint and distinguising fact from opinion
Fact or Opinion PowerPoint and distinguising fact from opinion
TeacherAnneApolinari
 
Understanding Culture, Society and Politics.pdf
Understanding Culture, Society and Politics.pdfUnderstanding Culture, Society and Politics.pdf
Understanding Culture, Society and Politics.pdf
TeacherAnneApolinari
 
prepare sandwiches weeks 1-3 .pptx.pdf
prepare sandwiches weeks 1-3 .pptx.pdfprepare sandwiches weeks 1-3 .pptx.pdf
prepare sandwiches weeks 1-3 .pptx.pdf
TeacherAnneApolinari
 
Cook Meat Cuts .pdf
Cook Meat Cuts .pdfCook Meat Cuts .pdf
Cook Meat Cuts .pdf
TeacherAnneApolinari
 
Copy of PEC's (TLE Exploratory 7_8).pptx
Copy of PEC's (TLE Exploratory 7_8).pptxCopy of PEC's (TLE Exploratory 7_8).pptx
Copy of PEC's (TLE Exploratory 7_8).pptx
TeacherAnneApolinari
 
three-good-things.pptx
three-good-things.pptxthree-good-things.pptx
three-good-things.pptx
TeacherAnneApolinari
 
Calculate Cost of Production.pptx.pdf
Calculate Cost of Production.pptx.pdfCalculate Cost of Production.pptx.pdf
Calculate Cost of Production.pptx.pdf
TeacherAnneApolinari
 
emtech advanced presentation skills.pptx
emtech advanced presentation skills.pptxemtech advanced presentation skills.pptx
emtech advanced presentation skills.pptx
TeacherAnneApolinari
 
stocks, soups and sauces .pptx.pdf
stocks, soups and sauces .pptx.pdfstocks, soups and sauces .pptx.pdf
stocks, soups and sauces .pptx.pdf
TeacherAnneApolinari
 
ICT Project Maintenance.pdf
ICT Project Maintenance.pdfICT Project Maintenance.pdf
ICT Project Maintenance.pdf
TeacherAnneApolinari
 
Prepare Meat.pptx.pdf
Prepare Meat.pptx.pdfPrepare Meat.pptx.pdf
Prepare Meat.pptx.pdf
TeacherAnneApolinari
 
Publishing ICT Project (1).pdf
Publishing ICT Project (1).pdfPublishing ICT Project (1).pdf
Publishing ICT Project (1).pdf
TeacherAnneApolinari
 

More from TeacherAnneApolinari (20)

Q3_PPT6_Use of past perfect tenses11.pdf
Q3_PPT6_Use of past perfect tenses11.pdfQ3_PPT6_Use of past perfect tenses11.pdf
Q3_PPT6_Use of past perfect tenses11.pdf
 
Q4_PPT6_Use of Imperatives when giving instructions.pdf
Q4_PPT6_Use of Imperatives when giving instructions.pdfQ4_PPT6_Use of Imperatives when giving instructions.pdf
Q4_PPT6_Use of Imperatives when giving instructions.pdf
 
Tracing the Bioculural and Evolution of Early to Modern Humans.pptx
Tracing the Bioculural and Evolution of Early to Modern Humans.pptxTracing the Bioculural and Evolution of Early to Modern Humans.pptx
Tracing the Bioculural and Evolution of Early to Modern Humans.pptx
 
Q4_PPT7_Practice OHSP in the Kitchen.pptx
Q4_PPT7_Practice OHSP in the Kitchen.pptxQ4_PPT7_Practice OHSP in the Kitchen.pptx
Q4_PPT7_Practice OHSP in the Kitchen.pptx
 
Review in fcs nailcare, NAILCARE SERVICES.pptx
Review in fcs nailcare, NAILCARE SERVICES.pptxReview in fcs nailcare, NAILCARE SERVICES.pptx
Review in fcs nailcare, NAILCARE SERVICES.pptx
 
Q4_PPT3_Classifications of Salad according to ingredients.pptx
Q4_PPT3_Classifications of Salad according to ingredients.pptxQ4_PPT3_Classifications of Salad according to ingredients.pptx
Q4_PPT3_Classifications of Salad according to ingredients.pptx
 
Green-at-Heart_by catherine d. tanPPT.pptx
Green-at-Heart_by catherine d. tanPPT.pptxGreen-at-Heart_by catherine d. tanPPT.pptx
Green-at-Heart_by catherine d. tanPPT.pptx
 
Q3_PPT2_Preparing Tools and Equipment in Agri-crop Farming.pptx
Q3_PPT2_Preparing Tools and Equipment in Agri-crop Farming.pptxQ3_PPT2_Preparing Tools and Equipment in Agri-crop Farming.pptx
Q3_PPT2_Preparing Tools and Equipment in Agri-crop Farming.pptx
 
Fact or Opinion PowerPoint and distinguising fact from opinion
Fact or Opinion PowerPoint and distinguising fact from opinionFact or Opinion PowerPoint and distinguising fact from opinion
Fact or Opinion PowerPoint and distinguising fact from opinion
 
Understanding Culture, Society and Politics.pdf
Understanding Culture, Society and Politics.pdfUnderstanding Culture, Society and Politics.pdf
Understanding Culture, Society and Politics.pdf
 
prepare sandwiches weeks 1-3 .pptx.pdf
prepare sandwiches weeks 1-3 .pptx.pdfprepare sandwiches weeks 1-3 .pptx.pdf
prepare sandwiches weeks 1-3 .pptx.pdf
 
Cook Meat Cuts .pdf
Cook Meat Cuts .pdfCook Meat Cuts .pdf
Cook Meat Cuts .pdf
 
Copy of PEC's (TLE Exploratory 7_8).pptx
Copy of PEC's (TLE Exploratory 7_8).pptxCopy of PEC's (TLE Exploratory 7_8).pptx
Copy of PEC's (TLE Exploratory 7_8).pptx
 
three-good-things.pptx
three-good-things.pptxthree-good-things.pptx
three-good-things.pptx
 
Calculate Cost of Production.pptx.pdf
Calculate Cost of Production.pptx.pdfCalculate Cost of Production.pptx.pdf
Calculate Cost of Production.pptx.pdf
 
emtech advanced presentation skills.pptx
emtech advanced presentation skills.pptxemtech advanced presentation skills.pptx
emtech advanced presentation skills.pptx
 
stocks, soups and sauces .pptx.pdf
stocks, soups and sauces .pptx.pdfstocks, soups and sauces .pptx.pdf
stocks, soups and sauces .pptx.pdf
 
ICT Project Maintenance.pdf
ICT Project Maintenance.pdfICT Project Maintenance.pdf
ICT Project Maintenance.pdf
 
Prepare Meat.pptx.pdf
Prepare Meat.pptx.pdfPrepare Meat.pptx.pdf
Prepare Meat.pptx.pdf
 
Publishing ICT Project (1).pdf
Publishing ICT Project (1).pdfPublishing ICT Project (1).pdf
Publishing ICT Project (1).pdf
 

Recently uploaded

GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 

Recently uploaded (20)

GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 

ICT, the Self, and Society.pdf

  • 1. ICT, the Self, and Society THE DISADVANTAGES OF ICT
  • 2. DISADVANTAGES OF ICT ● ICT and technology as a whole brought us comfort and convenience in life. We Filipino, have been known to be avid users of technology. Some even have a name as an internet sensation. However, aside from those successes are the downfall of users. ● Give an example or share in the class the “bad things” or any unwarranted acts (like piracy) you have done using ICT.
  • 3. CYBERCRIMES ● CYBER CRIMES - are illegal acts done through the use of the internet. In 2012, Stephen Nale (complex.com) posted a list of ten most common internet cyber crimes as follows:
  • 4. PHISHING/ SPOOFING The act of sending multiple emails to multiple users in hopes of having a number of them clicking on the links or malwares attached to the email.
  • 5. BLACKMAIL/ EXTORTION The act of using the internet to threaten or damage someone’s reputation to extort money or anything else of value. This is avoidable if you are aware of what you should post on the internet.
  • 7. ACCESSING STORED COMMUNICATIONS Or hacking; the act of obtaining unauthorized access to data from a computer network. This is typically done to commercial and government sites to threaten its owner. In late 2014, a group of hackers hacked Sony’s website because of impending release of the controversial film “The Interview”
  • 9. NON DELIVERY OF MERCHANDISE The act of devising a scheme wherein the culprit posts an item or service for sale on the internet and once the transactions have been done, does not really give the item or service.
  • 11. SPORTS BETTING The act of wagering on any sports event over the internet. In some countries, gambling, (including sports betting) is illegal even if you are doing it in the internet.
  • 12. ELECTRONIC HARASSMENT The act of anonymously using the internet to harass, abuse, threaten, or annoy other people. This is also an act of cyberbullying, however, because the culprit is anonymous, it is hard to detect who is bullying you.
  • 13. CHILD PORNOGRAPHY The act of using the internet to show child pornography. This act is highly punishable by law.
  • 14. PROSTITUTION The act of using the internet to engage in prostitution.
  • 15. DRUG TRAFFICKING The act of selling illegal substances using the internet
  • 16. CRIMINAL COPYRIGHT INFRINGEMENT The act of piracy mainly for financial gain. In late 2014, the number one pirate website, The Pirate Bay, was raided for the second time due to years of pirating movies, music, games, books, and other software. These kind of websites earn money through advertising.
  • 17. THERE ARE SEVERAL WAYS THE AUTHORITIES CAN HELP SOLVE OR PREVENT CYBER CRIMES. HERE ARE SOME OF THEM INVESTIGATION URL tracing and logging are used by websites to track your unique IP addresses. (sharing of pirated file) NETWORK SECURITY Firewalls, secure connections, passwords, anti-malwares and data encryptions. PENALTIES More and more laws are being created and implemented today. Penalties include both fine and imprisonment. COMBATTING CYBERCRIMES
  • 18. KEY TERMS PHISHING - also referred to as spoofing, an act of spamming emails. SPAM - unwanted emails BLACKMAIL - act of asking something in return of not showing something that could damage someone’s reputation. HACKING - the act of obtaining unauthorized information CYBERBULLYING - an act of harassment using electronic means COPYRIGHT INFRINGEMENT - an act of piracy mainly for financial gain. ENCRYPTION - the process of converting raw data into code
  • 19. ACTIVITY Information and Communications Technology (ICT) continuously shape the future and how society will be developed. The improvement of ICT may vary depending on the situation and resources of once location. Share your reflection piece about the impact of ICT in our daily living especially in this time of crisis. Let the world know how ICT has positively changed your view. It might encourage other people to learn new things and innovate their old ways and perspective in life using ICT. Let them inform, share what you know, and teach the new ways to have a progressive society.
  • 20. PERFORMANCE TASK; CONTINUE WORKING ON YOUR CONCEPT PAPER. IT SHOULD CONTAIN THE FOLLOWING: ● Introduction ● Purpose ● Description ● Support ● Statistics ● Contact Information