The disadvantages of ICT.pptx-final [Autosaved].pptx
1.
2. At the end of this lesson, the students should be
able to:
1. understand the several problems ICT has created in
their generation; and
2. write a reflective essay on how ICT can change the
world for better or for worse.
5. In 2012, Stephen Nale (Complex.com) posted a list of
ten most common Internet cybercrimes as follows:
1. Phishing/Spoofing – the act of sending multiple emails to
multiple users in hopes of having a number of them clicking
on the links or malwares attached to the email.
2. Blackmail/Extortion – the act of using the Internet to
threaten or damage someone’s reputation to extort money or
anything else of value. This can be avoided if you are aware
of what you should post on the Internet.
3. Prostitution – the act of using the Internet to engage in
prostitution.
6. 4. Accessing Stored Communications – or hacking; the act of
obtaining unauthorized access to data from a computer network.
5. Sports Betting – the act of wagering on any sports event
over the Internet. In some countries, gambling (including sports
betting) is illegal even if you are doing it over the Internet.
6. Non-Delivery of Merchandise – the act of devising a
scheme wherein a culprit posts an item or service for sale over
the Internet and once the transactions have been done, does
not really give the item or service.
7. 7. Electronic Harassment – the act of anonymously using the
Internet to harass, abuse, threaten, or annoy other people.
8. Child Pornography – the act of using the Internet to show
child pornography. This act is highly punishable by law.
9. Drug Trafficking – the act of selling illegal substances
using the Internet.
10. Criminal Copyright Infringement – the act of piracy
mainly for financial gain. In late 2014, the number one pirate
website, The Pirate Bay, was raided for the second time due
to years of pirating movies, music, games, books, and other
software. These kinds of websites earn money through
advertising.
8. Combatting Cybercrimes
1. Network Security. Before a hacker can get through the
unauthorized files he or she is targeting, the hacker has to
get through several security measures like firewalls, secure
connections, passwords, anti-malwares, and data
encryptions.
2. Investigation. URL tracing and logging are used by
websites to track your unique IP addresses. This can be used
by investigators to trace hackers. In piracy, trackers are used
to identify IP addresses currently sharing a pirated file.
3. Penalties. More and more laws are being created and
implemented today. Penalties include both a fine and
imprisonment.
9. THE INTERNET IS THE PRESENT AND THE FUTURE OF
YOUR GENERATION AND YOU DEFINE WHAT IMPACT IT
CAN DO TO SHAPE OUR SOCIETY, WHETHER IT IS
NEGATIVE OR POSITIVE. THE FUTURE IS IN YOUR
HANDS.
10. THANK YOU VERY MUCH BEAUTIFUL STUDENTS
TO GOD BE THE GLORY
I LOVE YOU ALL!!!
Editor's Notes
Ask the students to share to the class an instance when they (or someone they know) became a victim of cybercrime.
Ask the students what actions were done to take down their issue (in re: 1st item).
Divide the class into groups, ask them to make an advertisement of their choice (slogan, role play, jingle) to campaign on fight against cyberbullying.