4. LO 1 – Understand opportunities and
challenges in media and information.
(MIL11/12OCP-IIIh-24);
5. LO 2 – Cite an example of an issue
showing the power of media and
information to affect change.
(MIL11/12OCP-IIIh-25)
6. LO 1 – Define and describe what
Massive Open Online Course.
(MIL11/12CFT-IIIi-27)
7. ● After going through this module, you are
expected to:
a. Determine how media and information
affect change in society;
b. Identify the advantages and
disadvantages of the internet in a given
context; and
c. Give an issue that shows the power of
media and information to affect change.
8. ● After going through this module, you are
expected to:
d. Describe the new trend in media and
information in education;
e. Determine the value of progressive
lifestyle and education; and lastly,
f. Predict future innovations based on
observation.
9. Quarter 2 – Module 1 & 2
Opportunities and
Challenges and Current and
Future Trends in Media and
Information
12. What is it?
Money theft/phishing
it refers to the process of harvesting bank details,
in particular, personal identification numbers
(PINs) and transaction authentication numbers
(TANs), with the intent to ransack other people’s
bank accounts.
13. What is it?
8 things you can do to safeguard
yourself against phishing threats:
1. Always be aware of the content of the email that is
sent to you. Never click suspicious links.
2. Be very careful of emails requesting sensitive
information.
3. Always check to make sure that the site is verified. By
checking the actual email that is sent to you and not
just the displayed name.
14. What is it?
8 things you can do to safeguard
yourself against phishing threats:
4. Phishers sometimes use scare tactics. Like
threatening to cancel your service in case you failed
to update information. Don’t react unless you are
sure.
15. What is it?
8 things you can do to safeguard
yourself against phishing threats:
5. Don’t sign up and put your email in sites or forms
when you don’t have to. Most of the spam and junk
you received as a result of you signing up to certain
websites.
16. What is it?
8 things you can do to safeguard
yourself against phishing threats:
6. Never input sensitive information in forms that are present in
suspicious emails.
7. Instead of pressing links in emails, input the links yourself to
prevent being tricked into going to a false site.
8. Check for HTTPS (secure connection on the site) at the start of
the web site link. To make sure that the website you are using
is not a fake one.
17. What is it?
Commercial fraud
Commercial fraud happens when sellers pretend
to sell goods or services which, after payment,
either do not show the promised attributes or are
not delivered at all.
18. What is it?
Grooming
refers to pedophiles using the Internet as a
means to contact children and young people
while concealing their adult identity. (grooming is
also known as Child Sexual Exploitation).
19. What is it?
Here are the warning signs of
grooming:
1. Age difference
2. encouraging you to get involved
in sexual activity early on in the
relationship/friendship.
3. Illegal/criminal activity, travelling
to and from places or parties also
known as trafficking,
20. What is it?
Here are the warning signs of
grooming:
4. controlling behavior
5. telling lies and keeping secrets
from friends and family
6. trying to get you alone as
opposed to meeting your friends
or family.
21. What is it?
Here are the warning signs of
grooming:
7. Overly friendly to your friends
and family to try and win them
over
8. Nudity – sending nude images
22. What is it?
Bullying
is the use of force, coercion, hurtful
teasing or threat, to abuse,
aggressively dominate or
intimidate.
23. What is it?
Computer addiction
the excessive use of computers
to the extent that it interferes
with daily life.
24. What is it?
5 subcategories of specific types of
computer and internet addictions.
1. Cybersex Addiction
2. Net Compulsions
3. Cyber (Online) Relationship Addiction
4. Cumpulsive Information Seeking
5. Computer or Gaming Addiction
25. What is it?
Digital divide
the economic inequality between
groups in terms of access to, use
of, or knowledge of ICT.
26. What is it?
Digital divide
The access divide
It refers to the socioeconomic
differences among people and the
impact on their ability to afford the
devices necessary to get online.
27. What is it?
Digital divide
The use divide
This refers to the difference in
the level of skills possessed by
individuals.
28. What is it?
Digital divide
The quality-of-use gap
It refers to the different ways
that people use the Internet and the
fact that some people are far more
able to get the information they need
from it than others.
29. What is it?
Republic Act 10175
also known as the “Cybercrime
Prevention Act of 2012” which
aims to address legal issues
concerning online interactions
and technology related concerns
in the country.
30. What is it?
CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(a) Offenses against the confidentiality, integrity, and
availability of computer data and systems:
(1) Illegal Access – The access to the whole or any part of a
computer system without right.
31. CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(a) Offenses against the confidentiality, integrity, and
availability of computer data and systems:
(2) Illegal Interception – The interception made by technical
means without right of any non-public transmission of
computer data to, from, or within a computer system
including electromagnetic emissions from a computer
system carrying such computer data.
32. CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(a) Offenses against the confidentiality, integrity, and
availability of computer data and systems:
(3) Data Interference — The intentional or reckless alteration,
damaging, deletion or deterioration of computer data,
electronic document, or electronic data message, without
right, including the introduction or transmission of viruses.
33. CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(a) Offenses against the confidentiality, integrity, and
availability of computer data and systems:
(4) System Interference — The intentional alteration or reckless hindering
or interference with the functioning of a computer or computer
network by inputting, transmitting, damaging, deleting, deteriorating,
altering or suppressing computer data or program, electronic
document, or electronic data message, without right or authority,
including the introduction or transmission of viruses.
34. CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(a) Offenses against the confidentiality, integrity, and
availability of computer data and systems:
(5) Misuse of Devices
(i) The use, production, sale, procurement, importation,
distribution, or otherwise making available, without right,
of:
35. CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(a) Offenses against the confidentiality, integrity, and
availability of computer data and systems:
(6) Cyber-squatting – The acquisition of a domain name over
the internet in bad faith to profit, mislead, destroy
reputation, and deprive others from registering the same.
36. CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(b) Computer-related Offenses:
(1) Computer-related Forgery
(i) The input, alteration, or deletion of any computer data
without right resulting in inauthentic data with the intent
that it be considered or acted upon for legal purposes as
if it were authentic, regardless whether or not the data is
directly readable and intelligible; or
37. CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(b) Computer-related Offenses:
(2) Computer-related Fraud — The unauthorized input,
alteration, or deletion of computer data or program or
interference in the functioning of a computer system,
causing damage thereby with fraudulent intent: Provided,
That if no damage has yet been caused, the penalty
imposable shall be one (1) degree lower.
38. CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(b) Computer-related Offenses:
(3) Computer-related Identity Theft – The intentional
acquisition, use, misuse, transfer, possession, alteration
or deletion of identifying information belonging to another,
whether natural or juridical, without right: Provided, That if
no damage has yet been caused, the penalty imposable
shall be one (1) degree lower.
39. CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(c) Content-related Offenses:
(1) Cybersex — The willful engagement, maintenance, control,
or operation, directly or indirectly, of any lascivious
exhibition of sexual organs or sexual activity, with the aid
of a computer system, for favor or consideration.
40. CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(c) Content-related Offenses:
(2) Child Pornography — The unlawful or prohibited acts
defined and punishable by Republic Act No. 9775 or the
Anti-Child Pornography Act of 2009, committed through a
computer system: Provided, That the penalty to be
imposed shall be (1) one degree higher than that provided
for in Republic Act No. 9775.
41. CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(c) Content-related Offenses:
(3) Unsolicited Commercial Communications. — The
transmission of commercial electronic communication
with the use of computer system which seek to advertise,
sell, or offer for sale products and services are prohibited
unless: (i) There is prior affirmative consent from the
recipient;
42. CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this
Act:
(c) Content-related Offenses:
(4) Libel — The unlawful or prohibited acts of libel as defined
in Article 355 of the Revised Penal Code, as amended,
committed through a computer system or any other similar
means which may be devised in the future.
44. What’s More
Answer the following questions on page 11 on
your module.
1. Discuss how cybercrime becomes a national concern
2. What makes computer addiction a problem?
3. Explain how somebody can be a victim of cyber
bullying?
45. What I Have Learned
Answer the following questions on page 12 on
your module.
1. What is cybercrime?
2. Enumerate examples of cybercrime
3. We can combat cybercrime by…
4. We can protect ourselves from cybercrime by…
46. What I Can Do
Answer the following questions on page 13 on
your module.
Guide Question:
As a student, how can you help combat
cyberbullying? Present your answer through an
infographic.
48. Additional Activities
Answer the activity on page 17 on your module.
Direction:
Create a short rap that suggest ways on
how to stop cyber bullying.
49. Post - Test
1. Economic inequality between groups in terms of
access to, use of, or knowledge of ICT.
a.Digital Divide c. Cyberbullying
b. RA 10175 d. Commercial fraud
2. Sending messages/emails of insult, humiliating
photos and fake profiles deliberately shared across
social media.
a.Digital Divide c. Cyberbullying
b. RA 10175 d. Commercial fraud
50. Post - Test
3. Happens when sellers pretend to sell goods or
services which, after payment, either do not show the
promised attributes or are not delivered at all.
a.Digital Divide c. Cyberbullying
b. RA 10175 d. Commercial fraud
4. Harvesting bank details, in particular personal
identification numbers with the intent to ransack other
people’s bank accounts.
a.RA 8293 c. Cyberbullying
b. Phishing d. Commercial fraud
51. Post - Test
5. A governing act that aims to address legal issues
concerning online interactions and technology related
concerns in the country.
a.RA 8293 c. Cyberbullying
b. RA 10175 d. Commercial fraud
6. The excessive use of computers to the extent that it
interferes with daily life is called?
a.Cyberbullying c. Computer Addiction
b. Grooming d. Phishing
52. Post - Test
7. It refers to pedophiles using the Internet as a means
to contact children and young people while concealing
their adult identity.
a.Grooming c. Computer Addiction
b. Commercial Fraud d. Phishing
53. Post - Test
8. It is one of the offenses against the confidentiality,
integrity, and availability of computer data and
systems which refers to the intentional or reckless
alteration, damaging, deletion or deterioration of
computer data, electronic document, or electronic data
message, without right, including the introduction or
transmission of viruses.
a.Grooming c. Illegal Interception
b. Data Interference d. Illegal Access
54. Post - Test
9. It refers to the willful engagement, maintenance,
control, or operation, directly or indirectly, of any
lascivious exhibition of sexual organs or sexual
activity, with the aid of a computer system, for favor or
consideration.
a.Grooming c. Cybersex
b. Libel d. Child Pornography
55. Post - Test
9. It refers to the unlawful or prohibited acts of libel as
defined in Article 355 of the Revised Penal Code, as
amended, committed through a computer system or
any other similar means which may be devised in the
future.
a.Grooming c. Cybersex
b. Libel d. Child Pornography
56. Post – Test Answer Key
1. a
2. c
3. d
4. b
5. b
6. c
7. a
8. b
9. c
10. b
57. ● Quarter 2 Module 1 &
2
● Opportunities and
Challenges in Media
and Information
● Current and Future
trends in media and
information
● Ma’am Fretzie
Cambiado
Dec. 09,
2021
at 1:00 PM
See you
next week.
58.
59. CREDITS: This presentation template was
created by Slidesgo, including icons by
Flaticon, infographics & images by Freepik
Thank you
for learning
with me Keep safe
everyone , stay
healthy and
strong always