3. REPUBLIC ACT
NO.10175
Republic Act No. 10175
- Or the Cybercrime Prevention Act of 2012
- Is a law in the Philippines approved on
September 12, 2012 which aims to address the
legal issues concerning online interaction and
the internet.
Among the Cybercrime offenses included in the
bill are cybersquatting, Child pornography,
Identify theft, illegal downloading and cybersex.
4. COPYRIGHT
-A legal device that gives the creator of a
literary, artistic, musical , or other
creative work the sole right to publish
and sell that work.
FAIR USE
- Is a legal concept that allows the
reproduction of copyrighted material for
certain purposes without obtaining
permission and without paying a fee.
5. PLAGIARISM
-An act or instance of using or closely
imitating the language and thoughts of
another author without authorization. The
representation of that author's work as
one's own, as by not crediting the original
author.
CYBERCRIME
-Refers to the criminal activities carried
out by means of computers or the
internet.
6. HACKING
- Refers to the practice of modifying or
altering computer software and hardware
to accomplish a goal that is considered
to be outside of the creator's original
objective.
PHISHING
-Is the attempt to obtain sensitive
information such as usernames,
passwords and credit card details,
Often for malicious reasons, by
disguising as a trustworthy entity in an
electronic communication.
7. ILLEGAL
DOWNLOADING
-Refers to obtaining files that you do not
have the right to use from the internet.
DIGITAL PIRACY
-The practice of illegally copying and
selling digital music, video, computer
software, etc.
8. IDENTITY THEFT
-Is the deliberate use of someone else's
identity, usually as a method to gain a
financial advantage or obtain credits and
often benefits in the other person's name,
and perhaps to the other person's
disadvantage or loss.
CYBER
DEFAMATION
-Is an unprivileged false statement of
fact which tends to harm the reputation
of a person or company.
2 types of Defamation:
1. Libel - Written
2. Slander- Verbal
9. CYBERSEX
-Also called computer sex, Internet sex
or net sex.
-Is a virtual sex encounter in which two or
more people (connected via internet)
send each other sexually explicit
contents or sexually explicit acts.
CHILD
PORNOGRAPHY
-Is a form of child sexual exploitation.
10. CYBERSQUATING
-Is registering, trafficking in, or using an
internet domain name with bad faith
intent to profit from the goodwill of a
trademark belonging to someone else.
12. NETIQUETTE IS A MADE-UP WORD FROM
THE WORDS NET AND ETIQUETTE.
NETIQUETTE THUS DESCRIBES THE RULES
OF CONDUCT FOR RESPECTFUL AND
APPROPRIATE COMMUNICATION ON THE
INTERNET. THE RULES OF NETIQUETTE
VERY DEPENDING ON THE PLATFORM
AND ITS PARTICIPANTS . WHEN
COMMUNICATING ON THE INTERNET,
YOU SHOULD ALWAYS REMEMBER THAT
YOU ARE COMMUNICATING WITH PEOPLE
AND NOT SIMPLY WITH COMPUTERS OR
SMARTPHONES.
13. 5 general recommendations for conduct on the internet.
1. Stick to the rules of conduct online that you follow in
real life.
*Respect the opinions of your chat counterparts and
express constructive criticism.
2. Netiquette: Think of the person.
*You are not communicating with a machine, but with
real people.
3. Present your best side online.
*Good netiquette is characterized by respect,
politeness and professionalism.
4. Read first, then ask.
*Remember that conversations online can happen very
quickly. It is therefore important to gather all the
information before responding or asking questions.
5. Netiquette: Pay attention to grammar and
punctuation.
*Grammar, spelling and punctuation become especially
important when composing emails or other
correspondence that you submit to colleagues or
superiors.
1
2
3
14. EXAMPLES OF NETIQUETTE:
*KEEP THE GOOD EDUCATION. ...
*RESPECT EACH OTHER'S BANDWIDTH.
...
*DON'T SEND PICTURES OR VIDEOS OF
OTHER PEOPLE,ESPECIALLY IF THEY'RE
INTIMATE. ...
*ALSO, DO NOT DISSEMINATE PRIVATE
INFORMATION ABOUT YOURSELF OR
OTHERS.
1
2
3
15. THE RULES TO FOLLOW FOR GOOD NETIQUETTE:
1. AVOID POSTING INFLAMMATORY OR OFFENSIVE
COMMENTS ONLINE.
2. RESPECT OTHERS' PRIVACY BY NOT SHARING
PERSONAL INFORMATION, PHOTOS, OR VIDEOS THAT
ANOTHER PERSON MAY NOT WANT PUBLISHED
ONLINE.
3. NEVER SPAM OTHERS BY SENDING LARGE
AMOUNTS OF UNSOLICITED EMAIL.
4. SHOW GOOD SPORTSMANSHIP WHEN PLAYING
ONLINE GAMES, WHETHER YOU WIN OR LOSE.
5. DON'T TROLL PEOPLE IN WEB FORUMS OR
WEBSITE COMMENTS BY REPEATEDLY NAGGING OR
ANNOYING THEM.
1
2
3
17. DIGITAL DIVIDE
THE DIGITAL DIVIDE IS A TERM
THAT REFERS TO THE GAP
BETWEEN DEMOGRAPHICS AND
REGIONS THAT HAVE ACCESS TO
MODERN INFORMATION AND
COMMUNICATIONS TECHNOLOGY
(ICT), AND THOSE THAT DON'T
HAVE RESTRICTED ACCESS. THIS
TECHNOLOGY CAN INCLUDE THE
TELEPHONE, TELEVISION,
PERSONAL COMPUTERS , AND
INTERNET CONNECTIVITY.
SOCIAL MEDIA | QUARTERLY REPORT
18. THERE ARE FOUR(4) CONDITIONS
THAT WE ARE GOING TO USE THE
INTERNET ACCESS.
1.KNOWLEDGE
2.GADGETS
3.MONEY
4.SKILLS
SOCIAL MEDIA | QUARTERLY REPORT DECEMBER 2020
19. 1.GENDER DIGITAL
đ GENDER IS DEFINED AS GENDER
BIASES CODED INTO TECHNOLOGY
PRODUCTS, TECHNOLOGY SECTOR
AND DIGITAL SKILLS EDUCATION.
2.SOCIAL DIVIDE
đTHERE IS NO FAIR LEARNING
ACCESS IN THE COUNTRY.
3.UNIVERSAL DIVIDE
đINDIVIDUAL LIVING WITH PHYSICAL
DISABILITIES ARE OFTEN
DISADVANTAGE WHEN IT COMES TO
ACCESSING THE INTERNET.
WITHOUT BROADBRAND ACCESS AND
RELIABLE INTERNET CONNECTIVITY.
PEOPLE HAVE FAR LESS OF AN ABILITY TO
CONNECR WITH OTHERS THAN THE REST
OF THE WORLD.
IMPORTANCE OF
DIGITAL DIVIDE
3 TYPES OF
DIGITAL DIVIDE
21. POSITIVE AND
NEGATIVE
USES OF
COMPUTERS:
SOCIAL MEDIA | QUARTERLY REPORT DECEMBER 2020
đPOSITIVE EFFECT ARE FASTER
COMMUNICATION OR
ORGANIZATION OF DATA AND
INFORMATION.
đNEGATIVE EFFECT OF
COMPUTERS HUMAN'S BREAK
THEIR SOCIAL INTERACT WITH
FRIENDS AND FAMILIES, CAUSE
BLACK PROBLEM, DEPRESSION ,
AND POOR HEALTH.
23. đIT IS A KIND OF BULLYING THAT
OCCASIONALLY AROUND US. IT
COULD BE CELLPHONES, TABLETS
, OR OUR PERSONAL COMPUTERS,
AND IT GENERALLY OCCURS
THROUGH TEXT MESSAGING,
SOCIAL MEDIA, OR GAMING
CYBERBULLYING IS BY
TRANSFERRING OR SHARING AND
PARTICIPATING IN NEGATIVE
MEAN, AND FALSE COMMENTARY
ABOUT SOMEONE.
CYBERBULLYING
24. WHY DO OTHER PEOPLE
CYBERBULLY?
â˘THEY HAD BEEN VICTIM O
OF CYBER BULLYING
â˘FOR POWER
â˘BECAUSE OF BEING JEALOUS
â˘MIGHT HAVE A DIFFICULT
LIFE AT HOME
WHERE DOES CYBER BULLYING
OCCUR?
1. DIFFERENT SOCILA MEDIA
ACCOUNTS OR APPLICATIONS
2. TEXT MESSAGING
3. ONLINE ROOM WHERE THERE IS
RANDOM CONVERSATION
26. - an artificial environment which is
experience through stimuli ( as
sights and sounds) provided by a
computer and in which one's
actions partially determine what
happens in the environment.
27. The technogy used to create or access a virtual
reality
- virtual self is the personal you create about
yourself.
virtual self it is also a particles art music video.
28. What are examples of
virtual self?
- one example of virtual
self is the avatar that
represents.
78. Ubiquitous learning can be defined as an
everyday learning environment that is
supported by mobile and embedded
computers and wireless networks in our
everyday life
82. PEOPLE AS MEDIA
â˘People who are well-
oriented to media sources and
messages and able to provide
information as accurate and
reliable as possible.
83.
84.
85. PEOPLE IN MEDIA
â˘Media practitioners who
provide information
coming from their expert
knowledge or first-hand
experience of event.
88. Digital- any form of media that uses electronic devices for distribution.
Interactive- refers to products and services on digital computer-based
systems which respond to the user's actions by presenting content.
Hypertextuality- allows a large quantity of information to freely move
around within a series of interconnected nodes in the network.
89. Network- refers to the communication channels used
to interconnect nodes on a computer network.
Virtual- is any type of data storage device â such as CDs,
flash drives, or external hard drives â that you
can connect to remotely to enable data sharing.
Stimulated - it can be defined as âan agency
or influence that stimulates to action or (const. to)
that quickens an activity or process.â
91. RELATIONSHIP/SOCIAL NETWORK-
set of people who are connected to each
other through meaningful social
relationship and patterns of interaction.
MICRO BLOGGING- the activity or practice of
making short frequent post to a microblog.
92. SPECIAL INTEREST NETWORK- promote contact between
regulatory professionals working in the same
specialist sector.
MEDIA SHARING- a social media app. Enable users to create stove
and share their multimedia files, shared media refers to content which
is shared across third party platforms.
94. OPINION LEADERS- is a leader for a certain group who
gives details and information to lesser active persons in the group.
CITIZENS JOURNALIST- people without professional journalism training
that use the tools of modern technology and interact to create argument
of fact check media on their own or in collaboration with others.
95. SOCIAL JOURNALIST- journalist that uses social media to make
their content available to more people.
CROWDSOURCER- the person who obtains needed service ideas or
content by soliciting contributions from a large group of people and
specially from the online community.
97. Introduction Flowchart Building
1. Facilitates open communication leading to enhanced information discovery and
delivery.
2. Allows employees to discuss ideas, post ,news ask question and sharelinks.
3. Provides an opportunity to widen business contacts.
4. Improves business reputation and client base with minimal use of advertising.
5. Expands market research, implemants marketing campaign, delivery
communication and direct interested people to specific websites.
ADVANTAGES
101. Without people, there will be no
information available in any kind of
media. People and media should be
considered as equally important
because people create media and
whatever information we have
depends on the kind of expertise a
person have.