SlideShare a Scribd company logo
1 of 7
The Disadvantages of ICT
• Cybercrimes
• Combatting cybercrimes
At the end of this lesson, the students should be
able to:
1. understand the several problems ICT has created in
their generation; and
2. write a reflective essay on how ICT can change the
world for better or for worse.
Cybercrimes
Cybercrimes are illegal acts
done through the use of the
Internet.
In 2012, Stephen Nale (Complex.com)
posted a list of ten most common Internet
cybercrimes as follows:
1. Phishing/Spoofing – the act of sending multiple
emails to multiple users in hopes of having a
number of them clicking on the links or malwares
attached to the email.
2. Blackmail/Extortion – the act of using the
Internet to threaten or damage someone’s
reputation to extort money or anything else of
value. This can be avoided if you are aware of what
you should post on the Internet.
3. Accessing Stored Communications – or hacking; the act
of obtaining unauthorized access to data from a computer
network.
4. Sports Betting – the act of wagering on any sports event
over the Internet. In some countries, gambling (including
sports betting) is illegal even if you are doing it over the
Internet.
5. Non-Delivery of Merchandise – the act of devising a
scheme wherein a culprit posts an item or service for sale
over the Internet and once the transactions have been done,
does not really give the item or service.
6. Electronic Harassment – the act of anonymously using
the Internet to harass, abuse, threaten, or annoy other people.
7. Child Pornography – the act of using the Internet to show
child pornography. This act is highly punishable by law.
8. Drug Trafficking – the act of selling illegal substances
using the Internet.
9. Criminal Copyright Infringement – the act of piracy
mainly for financial gain. In late 2014, the number one pirate
website, ThePirateBay, was raided for the second time due to
years of pirating movies, music, games, books, and other
software. These kinds of websites earn money through
advertising.
Combatting Cybercrimes
1. Network Security. Before a hacker can get through the
unauthorized files he or she is targeting, the hacker has to
get through several security measures like firewalls, secure
connections, passwords, anti-malwares, and data
encryptions. The Disadvantages of ICT 177
2. Investigation. URL tracing and logging are used by
websites to track your unique IP addresses. This can be used
by investigators to trace hackers. In piracy, trackers are used
to identify IP addresses currently sharing a pirated file.
3. Penalties. More and more laws are being created and
implemented today. Penalties include both a fine and
imprisonment.

More Related Content

What's hot

Basic Web Design Principles and Elements
Basic Web Design Principles and ElementsBasic Web Design Principles and Elements
Basic Web Design Principles and ElementsEromRamos
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ictcyb1337
 
Empowerment Technologies
Empowerment TechnologiesEmpowerment Technologies
Empowerment TechnologiesMichelle Faina
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologiesDeped
 
Module 8: ICT Projects for Social Awareness
Module 8: ICT Projects for Social AwarenessModule 8: ICT Projects for Social Awareness
Module 8: ICT Projects for Social AwarenessSherilyn Gabest
 
ICT For advocacy and Developmental Communication
ICT For advocacy and Developmental CommunicationICT For advocacy and Developmental Communication
ICT For advocacy and Developmental CommunicationDeoky5799
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Jesus Rances
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipJohan Koren
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyesandregoron
 
Group 3 basic web page creation
Group 3  basic web page creationGroup 3  basic web page creation
Group 3 basic web page creationFe Lanny Tejano
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
empowerment technology 12.pptx
empowerment technology 12.pptxempowerment technology 12.pptx
empowerment technology 12.pptxJasonPDelosSantos
 
Nature and purposes of of online platforms and applications
Nature and purposes of of online platforms and applicationsNature and purposes of of online platforms and applications
Nature and purposes of of online platforms and applicationswylljie
 
Responsible Use of Media and Information.pptx
Responsible Use of Media and Information.pptxResponsible Use of Media and Information.pptx
Responsible Use of Media and Information.pptxErvinJhonPatrickBina1
 

What's hot (20)

Productivity tools
Productivity toolsProductivity tools
Productivity tools
 
Basic Web Design Principles and Elements
Basic Web Design Principles and ElementsBasic Web Design Principles and Elements
Basic Web Design Principles and Elements
 
9 Interactive Multimedia
9 Interactive Multimedia9 Interactive Multimedia
9 Interactive Multimedia
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
ICT as a Platform for Change
ICT as a Platform for Change ICT as a Platform for Change
ICT as a Platform for Change
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
 
Empowerment Technologies
Empowerment TechnologiesEmpowerment Technologies
Empowerment Technologies
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologies
 
Module 8: ICT Projects for Social Awareness
Module 8: ICT Projects for Social AwarenessModule 8: ICT Projects for Social Awareness
Module 8: ICT Projects for Social Awareness
 
ICT For advocacy and Developmental Communication
ICT For advocacy and Developmental CommunicationICT For advocacy and Developmental Communication
ICT For advocacy and Developmental Communication
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3
 
EMPOWERMENT TECHNOLOGIES - LESSON 5
EMPOWERMENT TECHNOLOGIES - LESSON 5EMPOWERMENT TECHNOLOGIES - LESSON 5
EMPOWERMENT TECHNOLOGIES - LESSON 5
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
 
Group 3 basic web page creation
Group 3  basic web page creationGroup 3  basic web page creation
Group 3 basic web page creation
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
empowerment technology 12.pptx
empowerment technology 12.pptxempowerment technology 12.pptx
empowerment technology 12.pptx
 
ICT introduction
ICT introductionICT introduction
ICT introduction
 
Nature and purposes of of online platforms and applications
Nature and purposes of of online platforms and applicationsNature and purposes of of online platforms and applications
Nature and purposes of of online platforms and applications
 
Responsible Use of Media and Information.pptx
Responsible Use of Media and Information.pptxResponsible Use of Media and Information.pptx
Responsible Use of Media and Information.pptx
 

Similar to L15 The Disadvantages of ICT.pptx

The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxAnecitaLCalamohoy
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxAnecitaLCalamohoy
 
Disadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptxDisadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptxDixsonCaluag2
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptxangellaclarianes1
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitySohailAkbar14
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & lawssureshjogesh48
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesVivekanandaGN1
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 

Similar to L15 The Disadvantages of ICT.pptx (20)

The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
 
Disadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptxDisadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptx
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
 
ICT, the Self, and Society.pdf
ICT, the Self, and Society.pdfICT, the Self, and Society.pdf
ICT, the Self, and Society.pdf
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
4. ONLINE SAFETY.pptx
4. ONLINE SAFETY.pptx4. ONLINE SAFETY.pptx
4. ONLINE SAFETY.pptx
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
cybercreme.pptx
cybercreme.pptxcybercreme.pptx
cybercreme.pptx
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 

More from BenjieBarlaan

english-8-dll-3rd (1).docx
english-8-dll-3rd (1).docxenglish-8-dll-3rd (1).docx
english-8-dll-3rd (1).docxBenjieBarlaan
 
english-8-dll-3rd.docx
english-8-dll-3rd.docxenglish-8-dll-3rd.docx
english-8-dll-3rd.docxBenjieBarlaan
 
G11-Award-Certificates.docx
G11-Award-Certificates.docxG11-Award-Certificates.docx
G11-Award-Certificates.docxBenjieBarlaan
 
editorialcartooning-190225052547.pptx
editorialcartooning-190225052547.pptxeditorialcartooning-190225052547.pptx
editorialcartooning-190225052547.pptxBenjieBarlaan
 
9-ictasplatformforchange-180206004734(1).pptx
9-ictasplatformforchange-180206004734(1).pptx9-ictasplatformforchange-180206004734(1).pptx
9-ictasplatformforchange-180206004734(1).pptxBenjieBarlaan
 
L10 Interactive Multimedia.pptx
L10 Interactive Multimedia.pptxL10 Interactive Multimedia.pptx
L10 Interactive Multimedia.pptxBenjieBarlaan
 
group3-basicwebpagecreation-180605143111.pptx
group3-basicwebpagecreation-180605143111.pptxgroup3-basicwebpagecreation-180605143111.pptx
group3-basicwebpagecreation-180605143111.pptxBenjieBarlaan
 
Name-of-School_Consolidated-List-of-Clubs-and-Organizations-1.docx
Name-of-School_Consolidated-List-of-Clubs-and-Organizations-1.docxName-of-School_Consolidated-List-of-Clubs-and-Organizations-1.docx
Name-of-School_Consolidated-List-of-Clubs-and-Organizations-1.docxBenjieBarlaan
 

More from BenjieBarlaan (8)

english-8-dll-3rd (1).docx
english-8-dll-3rd (1).docxenglish-8-dll-3rd (1).docx
english-8-dll-3rd (1).docx
 
english-8-dll-3rd.docx
english-8-dll-3rd.docxenglish-8-dll-3rd.docx
english-8-dll-3rd.docx
 
G11-Award-Certificates.docx
G11-Award-Certificates.docxG11-Award-Certificates.docx
G11-Award-Certificates.docx
 
editorialcartooning-190225052547.pptx
editorialcartooning-190225052547.pptxeditorialcartooning-190225052547.pptx
editorialcartooning-190225052547.pptx
 
9-ictasplatformforchange-180206004734(1).pptx
9-ictasplatformforchange-180206004734(1).pptx9-ictasplatformforchange-180206004734(1).pptx
9-ictasplatformforchange-180206004734(1).pptx
 
L10 Interactive Multimedia.pptx
L10 Interactive Multimedia.pptxL10 Interactive Multimedia.pptx
L10 Interactive Multimedia.pptx
 
group3-basicwebpagecreation-180605143111.pptx
group3-basicwebpagecreation-180605143111.pptxgroup3-basicwebpagecreation-180605143111.pptx
group3-basicwebpagecreation-180605143111.pptx
 
Name-of-School_Consolidated-List-of-Clubs-and-Organizations-1.docx
Name-of-School_Consolidated-List-of-Clubs-and-Organizations-1.docxName-of-School_Consolidated-List-of-Clubs-and-Organizations-1.docx
Name-of-School_Consolidated-List-of-Clubs-and-Organizations-1.docx
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 

L15 The Disadvantages of ICT.pptx

  • 1. The Disadvantages of ICT • Cybercrimes • Combatting cybercrimes
  • 2. At the end of this lesson, the students should be able to: 1. understand the several problems ICT has created in their generation; and 2. write a reflective essay on how ICT can change the world for better or for worse.
  • 3. Cybercrimes Cybercrimes are illegal acts done through the use of the Internet.
  • 4. In 2012, Stephen Nale (Complex.com) posted a list of ten most common Internet cybercrimes as follows: 1. Phishing/Spoofing – the act of sending multiple emails to multiple users in hopes of having a number of them clicking on the links or malwares attached to the email. 2. Blackmail/Extortion – the act of using the Internet to threaten or damage someone’s reputation to extort money or anything else of value. This can be avoided if you are aware of what you should post on the Internet.
  • 5. 3. Accessing Stored Communications – or hacking; the act of obtaining unauthorized access to data from a computer network. 4. Sports Betting – the act of wagering on any sports event over the Internet. In some countries, gambling (including sports betting) is illegal even if you are doing it over the Internet. 5. Non-Delivery of Merchandise – the act of devising a scheme wherein a culprit posts an item or service for sale over the Internet and once the transactions have been done, does not really give the item or service. 6. Electronic Harassment – the act of anonymously using the Internet to harass, abuse, threaten, or annoy other people.
  • 6. 7. Child Pornography – the act of using the Internet to show child pornography. This act is highly punishable by law. 8. Drug Trafficking – the act of selling illegal substances using the Internet. 9. Criminal Copyright Infringement – the act of piracy mainly for financial gain. In late 2014, the number one pirate website, ThePirateBay, was raided for the second time due to years of pirating movies, music, games, books, and other software. These kinds of websites earn money through advertising.
  • 7. Combatting Cybercrimes 1. Network Security. Before a hacker can get through the unauthorized files he or she is targeting, the hacker has to get through several security measures like firewalls, secure connections, passwords, anti-malwares, and data encryptions. The Disadvantages of ICT 177 2. Investigation. URL tracing and logging are used by websites to track your unique IP addresses. This can be used by investigators to trace hackers. In piracy, trackers are used to identify IP addresses currently sharing a pirated file. 3. Penalties. More and more laws are being created and implemented today. Penalties include both a fine and imprisonment.

Editor's Notes

  1. Ask the students to share to the class an instance when they (or someone they know) became a victim of cybercrime. Ask the students what actions were done to take down their issue (in re: 1st item).
  2. Divide the class into groups, ask them to make an advertisement of their choice (slogan, role play, jingle) to campaign on fight against cyberbullying.