You are on page 1of 4

ICT deals with the use of different communication technologies tools made it possible for nearly anyone to contribute,

tribute, regardless
such as mobile phones, telephone, internet, etc. to locate, save, of their technical knowledge.
send, and edit information.
Web 2.0 is pronounced web-two-point-o.
When we make a video call, we use the internet. When we send
a text or make a call, we use cellular networks. When we run out The meaning of the term Web 2.0 has evolved over time, but it
of load or battery, we use payphones which use a telephone has come include social media as a major component. Although
network. Having a unified way to communicate is one of the community has always been a part of the web, new web
goals of ICT. In terms of economics, ICT has saved companies a applications such as AJAX and more modern browsers began
lot of resources (time and money) with the kind of providing opportunities for people to express themselves online
communication technology they use, nowadays. In a similar way, as never before, and to combine applications to create a more
we spend less because of ICT. As it normally costs us a peso to integrated web. By 2005, the term Web 2.0 was well-established,
send a text message or SMS, with the internet, we can send and companies such as Google made huge strides to integrate
multiple messages and only be charged by a fraction. information online. For example, a website that reviews
restaurants may use social media, user-generated content,
Philippines is dub as the “ICT Hub of Asia.” photographs from Flickr, Google maps, and content from around
the web to create a more complete user experience.
Because of huge growth of ICT-related jobs, one of which is BPO
(Business Process Outsourcing) or call centers. To a certain extent, Web 2.0 is just an overused buzzword. On
the other hand, there is a genuine difference between the
Dub – to call brochure-ware websites in the early '90s versus the rich web apps
According to the 2013 edition of Measuring the Information of the modern web.
System Society by the International Telecommunication Union, Features of WEB 2.0
there are 106.8 cellphones per 100 Filipinos in the year 2012. that
would mean that for every 100 Filipinos you meet, there is a high 1. Folksonomy - allows users to categorize and classify/arrange
chance that they have a cellphone and approximately for the information using freely chosen keywords (e.g., tagging).
seven of them, the have two.
Popular social networking sites such as Twitter, Instgram,
In a data gathered by the Annual Survey of Philippine Business Facbook, etc. use tags that start with the pound sign (#). This is
and Industries, NSO, in 2010, the ICT industry shares 19.3% of also referred to as hashtag.
the total employment population here in the Philippines.
2. Rich User Experience - content is dynamic and is responsive
To add to these statistics, Time Magazine’s “The Selfiest Cities to user’s input. An example would be a website that shows local
around the World” of 2013 places two cities from the Philippines content.
in the top 1 and top 10 spots. The study was conducted using
Instagram, a popular photo application. In the case of social networking sites, when logged on, your
account is used to modify what you see in their website
The internet has been a vital tool to our modern lives that is why
it is also important to make the best of the internet. 3. User Participation - the owner of the website is not the on one
who is able to put content. Others are able to place a content of
When the World Wide Web was invented, most web pages were their own by means of comments, reviews, and evaluation. Some
static. Static (also known as flat page or stationary page) in the websites allow readers to comment on an article, participate in a
sense that the page is “as is” and cannot be manipulated by the poll, or review a specific product.
user. The content is also the same for all users. This is referred to
as Web 1.0 or the mostly read-only web. 4. Software as a Service - users will subscribe to a software only
when needed rather than purchasing them. This is a cheaper
However, the World Wide Web is more than just static pages. option if you do not always need to use a software.
Pretty soon, Web 2.0 came to the picture.
For instance, Google Docs is a free web-based application that
Web2.0 is the evolution of Web 1.0 by adding dynamic web allows the user to create and edit word processing and
pages – the user is able to see a website differently than others. spreadsheet documents online. When you need a software, like
Examples of Web 2.0 include social networking sites, blogs, Word Processor, you can purchase it for a one-time huge amount
wikis, video sharing sites, hosted services, and web applications. and install it in your computer and it is yours forever. Software
Web 2.0 allows users to interact with the page: instead of just as a service allows you to rent a software for a minimal fee.
reading a page, the user may be able to comment or create a user
account. Web 2.0 also allows users to use web browsers, instead 5. Mass Participation - diverse information sharing through
of just using their operating system. Browsers can now be used universal web access. Since most users can use the internet, web
for their user interface, application software (or web 2.0’s content is based on people from various cultures.
applications), even for file storage. Most websites that we visit
today are Web 2.0
Web 3.0 and the Semantic Web

Semantic Web - Is a movement led by the World Wide Web


Web 2.0 is the name used to the describe the second generation Consortium (W3C).
of the world wide web, where it moved static HTML pages to a
more interactive and dynamic web experience. Web 2.0 is The term was coined by the inventor of the World Wide Web,
focused on the ability for people to collaborate and share Tim Berners-Lee.
information online via social media, blogging and Web-based
According to W3c, “The Semantic Web provides a common
communities.
framework that allows data to be shared and reused across
Web 2.0 signaled a change in which the world wide web became application, enterprise, and community boundaries.”
an interactive experience between users and Web publishers,
rather than the one-way conversation that had previously existed.
It also represents a more populist version of the Web, where new
Aim of Web 3.0 d. Bookmarking Sites - These are sites that allow you to store
and manage links to various websites and resources. Most of
1. Is to have machines (or servers) understand the user’s these sites allow you to create a tag that allows you and others to
preferences to be able to deliver web content specifically easily search or share them.
targeting the user.
e. Media Sharing - These are sites that allow you to upload and
For example, when doing a web search in Web 2.0, the topmost share media content like images, music, and video. Ost of these
result is based on the preference of several users who already sites have additional social features like liking, commenting, and
search for the item. The search engine then labels it the most having user profiles.
common answer to the search query. Though there are instances
wherein several preferences are considered like geographic f. Blogs and Forums - These websites allow users to post their
location, Web 3.0 aims to do better. content. Other users are able to comment on the said topic. There
are several free blogging platforms like Blogger, WordPress, and
This is through studying personal preferences of an individual Tumblr. On the other hand, forums are typicalyy part of a certain
user and showing results based on those preferences. The internet website or web service.
is able to predict the best possible answers to your question by
“learning from your previous choices. 3. Mobile Technologies - - The popularity of smartphones and
tablets has taken a major rise over the years. This is largely
because of the devices’ capability to do tasks that were originally
2. - This is through studying personal preferences of an individual found in personal computers. Several of these devices are capable
user and showing results based on those preferences. The internet of using high-speed internet.
is able to predict the best possible answers to your question by Today, the latest mobile devices use 4G Networking (LTE),
“learning from your previous choices. which is currently the fastest mobile network. Also, mobile
For example, if you search the internet for “Where is the best devices use different operating systems:
place to go shopping?” Web 3.0 will aim to give you results Different Operating Systems
depending on how you have made choices in the past. If you have
purchased several shoes online, the internet will give you results iOS - Used in Apple devices such as iPhone and iPad.
on the best place with the highest rated shoes around your
vicinity. Android - An open source operating system developed by
google. Being open source means several mobile phone
Another example is when you search for the best restaurant to companies use this OS for free
visit in a specific area. First, it may look for your previous visits
from other restaurants and if you have rated them whether good Blackberry OS - Used in Blackberry devices
or bad. In return, Web 3.0 will search for restaurants that have a Windows Phones OS - A closed source and proprietary
similar menu, good rating, and budget that fit your preference in operating system developed by Microsoft
the past.
Symbian - The original smartphone OS; used by Nokia devices
Trends in ICT
WebOS - Originally used for smartphones; now used for smart
1. Convergence - Technological convergence is the synergy of TVs
technological advancements to work on a similar goal or task.
Windows Mobile - Developed by Microsoft* for smartphones
For example, besides using your personal computer to create and pocket PCs.
word documents, you can now use our smartphone. It can also
use cloud technologies to sync files from one device to another 4. Assistive Media - - Is a nonprofit service designed to help
while also using LTE technology which means you can access people who have visual and reading impairments. A data base of
your files anytime, anywhere. Convergence is using several audio recordings is used to read to the user.
technologies to accomplish a task conveniently. Synergy-
Rules of Netiquette
combined action or operation convergent- tending to move
toward one point. 1. Online security, safety, and ethics
2. Social Media - Is a website, application, or online channel that The internet, truly is a powerful a powertool. It can be used to
enables web users to create, co-create, discuss, modify, and promote your business, gain new friends, and stay in touch with
exchange user-generated content. the old ones. It is also a source of entertainment through games,
online communities, and everything in between. But like most
Types of Social Media
things in this world, there is always the “other side of the coin.”
a. Social Networks - These are sites that allow you to connect The internet is one of the most dangerous places, especially if you
with other people with the same interests or background. Once a do not know what are you doing with it. But there is no need to
user creates his or her account, he or she can set up a profile, add worry; it is never too late. Hopefully, by the end of this lesson,
people, create groups, and share content. you are able to consider how you go about your use of the
internet.
b. Social News - These are sites that allow users to post their own
news items or links to other news sources. The users can also Let us go back to the “how safe are you?” test. Let us visit each
comment on the post and comments may also be ranked. They tem and see how risky it is to share them.
are also capable of voting on these news articles of the website.
Personal information is any information that can be used to
Those who get the most amount of votes are shown most
identify you or find out where you are. This includes obvious
prominently.
things like your full name and address, and some less-obvious
c. Microblogging - These are sites that focus on short updates things like your car's license plate number or what sport you play
from the user. Those subscribed to the user will be able to receive at school.
these updates.
Cyber criminals and sneaky weirdo strangers will use
everything they know about you to trick and harm you. Knowing
your personal information just makes it that much easier. They activated, Trojans can enable cyber-criminals to spy on you, steal
might try to find out where you live and break into your house, your sensitive data, and gain backdoor access to your system.
or try to steal your identity or your money. They might even lie These actions can include:
to you about how old they are and try to get you to meet with
them in person to hurt or even kidnap you. - Deleting data

Cyber criminals can be very patient when trying to discover - Blocking data
your offline identity.They'll casually slip it into conversation, - Modifying data
hoping that you won't notice. They remember everything you tell
them and might stick around for a long time trying to get you to - Copying data
slip up and reveal something.
- Disrupting the performance of computers or computer networks
The more personal information you reveal in cyberspace, the
Unlike computer viruses and worms, Trojans are not able to self-
more in danger you are putting yourself and your family in. You
replicate.
must always be on your guard, cyber defenders! Even the littlest
things that seem so harmless can be dangerous to share over time. Spyware is a type of malware that's hard to detect. It collects
information about your surfing habits, browsing history, or
personal information (such as credit card numbers), and often
uses the Internet to pass this information along to third parties
Internet is defined as the information superhighway.
without you knowing. Keyloggers are a type of spyware that
This means that anyone has access to this highway, can place monitors your keystrokes.
information, and can grab that information. Any information,
even things that you have set privately, can be accessed one way
or another. This is why facebook continue to improve their Keyloggers – used to record the keystroke done by the users. This
security features. The threat of cybercrime is very real. While you is done to steal their password or any other sensitive information.
may not experience the threat now, whatever information we It can record email, messages, or any information you type using
share today could affect our future. your keyboard.

Spyware is a type of malware that hackers use to see your


personal information, banking details, or more.
2. Internet threats

Malware is any program or file that is harmful to a computer


user. Spyware is often bundled with other software or downloads on
file-sharing sites (e.g., sites where you download free music or
a. Malware includes computer viruses, worms, Trojan horses,
movies), or is installed when you open an email attachment.
spyware and adware.
Because of the secretive nature of spyware, most people are not
A computer virus, much like a flu virus, is designed to spread aware when spyware is on a computer that’s unprotected by anti-
from host to host and has the ability to replicate itself. Similarly, spyware.
in the same way that viruses cannot reproduce without a host cell,
computer viruses cannot reproduce and spread without
programming such as a file or document. New and/or unidentifiable icons may appear in the task bar at the
bottom of your screen, while searches may result in you being
Once a virus has successfully attached to a program, file, or
redirected to a different search engine. Random error messages
document, the virus will lie dormant until circumstances cause
appear when you perform operations that previously worked fine.
the computer or device to execute its code. In order for a virus to
But the best way to identify if you have been infected is to use a
infect your computer, you have to run the infected program,
spyware scanner, which will be included in any spyware removal
which in turn causes the virus code to be executed. This means
software.
that a virus can remain dormant on your computer, without
showing major sings or symptoms. However, once the virus
infects your computer, the virus can infect other computers on the
same network. Stealing passwords or data, logging keystrokes, How to prevent spyware
corrupting files, spamming your email contacts, and even taking
Use antivirus and anti-spyware software.
over your machine are just some of the devastating and irritating
things a virus can do. Ensure that your browser, operating system, and software have
the latest updates and security patches.
Example, the ILOVEYOU worm (Love Bug Worm) created by a
Filipino. Set your browser security and privacy levels higher.
A worm is a type of malware that spreads to other PCs. Worms Use extreme caution if you frequent file-sharing sites.
can copy themselves and often spread through a PC network by
exploiting security vulnerabilities. Don't click on pop-up ads.

Worms can spread through email attachments, instant messaging Adware is the name given to programs that are designed to
programs, file-sharing programs, social networking sites, display advertisements on your computer, redirect your search
network shares, removable drives, and software vulnerabilities. requests to advertising websites and collect marketing-type data
about you – for example, the types of websites that you visit – so
A Trojan horse or Trojan is a type of malware that is often that customised adverts can be displayed.
disguised as legitimate software. Trojans can be employed by
cyber-thieves and hackers trying to gain access to users' systems. Adware – that collects data with your consent – should not be
Users are typically tricked by some form of social engineering confused with Trojanspyware programs that collect information,
into loading and executing Trojans on their systems. Once without your permission. If Adware does not notify you that it is
gathering information, it is regarded as malicious – for example, Activity 2
malware that uses Trojan-Spy behaviour.
Community Problem: ___________________________
Vicinity: _____________________________________
Campaign Name: ______________________________
There are two main ways in which Adware can get onto your Type of Social Media Used: ______________________
computer: Website Used: ________________________________
Via freeware or shareware What will be the content of your social media site?
Adware can be included within some freeware or shareware
programs – as a legitimate way of generating advertising ___________________________________________________
revenues that help to fund the development and distribution of the ___________________________________________________
freeware or shareware program. ___________________________________________________
___________________________________________________
Infected websites ___________________________________________________
A visit to an infected website can result in unauthorised ___________________________________________________
installation of Adware on your machine. Hacker technologies are ___________________________________________________
often used. For instance, your computer can be penetrated via a ___________________________________________________
browser vulnerability, and Trojans that are designed for stealthy ___________________________________________________
installation can be used. Adware programs that work in this way ___________________________________________________
are often called Browser Hijackers. ___________________________________________________
b. Spam is the electronic equivalent of the ‘junk mail’ that arrives ___________________________________________________
on your doormat or in your postbox. However, spam is more than ___________________________________________________
just annoying. It can be dangerous – especially if it’s part of a ___________________________________________________
phishing scam. ___________________________________________________
___________________________________________________
Spam emails are sent out in mass quantities by spammers ___________________________________________________
and cybercriminals that are looking to do one or more of the
following: Why did you choose that type of social media?

Make money from the small percentage of recipients that actually ___________________________________________________
respond to the message ___________________________________________________
___________________________________________________
Run phishing scams – in order to obtain passwords, credit card ___________________________________________________
numbers, bank account details and more ___________________________________________________
___________________________________________________
Spread malicious code onto recipients’ computers
___________________________________________________
c. Phishing This is done by sending you an email that will direct ___________________________________________________
the user to visit a website and be asked to update his/her ___________________________________________________
username, password, credit card, or personal information. ___________________________________________________
___________________________________________________
Pharming – a more complicated way of phishing where it exploits ___________________________________________________
the DNS (Domain Name Service) system. ___________________________________________________
___________________________________________________
Phishing is a type of Internet fraud that seeks to acquire a user’s
___________________________________________________
credentials by deception. It includes theft of passwords, credit
___________________________________________________
card numbers, bank account details and other confidential
information. Why did you choose that website?
Phishing messages usually take the form of fake notifications ___________________________________________________
from banks, providers, e-pay systems and other organizations. ___________________________________________________
The notification will try to encourage a recipient, for one reason ___________________________________________________
or another, to urgently enter/update their personal data. Such ___________________________________________________
excuses usually relate to loss of data, system breakdown, etc. ___________________________________________________
___________________________________________________
Phishing attacks are becoming more advanced in their
___________________________________________________
exploitation of social engineering techniques. In most cases,
___________________________________________________
fraudsters try to frighten a recipient by providing a seemingly
___________________________________________________
important reason that the recipient should divulge their personal
___________________________________________________
data. Such messages usually contain threats to block an account
___________________________________________________
if a recipient does not fulfill the requirements therein. For
___________________________________________________
instance, “if you do not provide your personal data by the end of
___________________________________________________
the week, your account will be blocked”. Ironically, it is not
___________________________________________________
unknown for phishers to make reference to the necessity of
___________________________________________________
improving anti-phishing systems as one of the reasons for the
___________________________________________________
disclosure of confidential information. A typical ruse might be “if
___________________________________________________
you want to secure yourself against phishing, click the link and
enter your user name and password”.

3. Protecting reputations online

4. Copyright

5. Contextualized online search and research skills

You might also like