Week 1 Emptech
Week 1 Emptech
Week 1 Emptech
1. How many times have you checked your phone during class
today?
2. How many status updates have you made in FaceBook or
Twitter today?
3. Did you use the internet within an hour after you woke up this
morning?
4. Do you stalk a celebrity via their social media account?
So what the bleep is ICT?
Image Source:
https://www.thinglink.com/scene/832303703254892546
Web 1.0 or Static Web Pages
When the World Wide Web was invented, most web pages are
static. When we say static, the page is “as is” and cannot be
manipulated by the user. The content is also the same for all
users. This is referred to as Web 1.0.
Trends:
• Convergence
• Social Media
• Mobile Technologies
• Assistive Media
Technological Convergence
Technology can do more things than its basic function. For
example, besides using your personal computer to create word
documents, you can now use your smartphone.
Social Media
• Social Networks
• Bookmarking Sites
• Social News
• Media Sharing
• Microblogging
• Blogging and Forums
Social Media
a) Social Networks – These are sites allow you to connect with
other people with the same interests or background. Once the user
creates his/her account, he/she can set up a profile, add people,
share content, etc.
Example: Facebook and Google+
b) Bookmarking Sites –These are sites that allow you to store and
manage links to various website and resources. Most of the sites
allow you to create a tag to others.
Example. Stumble Upon, Pinterest
c) Social News – These sites allow users to post their own
news items or links to other news sources. The users can also
comment on the post and comments may be rank.
Example. Reddit and Digg
Cyberspace
refers to the virtual computer world, and more specifically,
is an electronic medium used to form a global computer
network to facilitate online communication
Cybercrime
refers to the criminal activities carried out by means of computers
or the Internet
Cyberbullying
the use of electronic communication
to bully a person,
typically by sending messages of an intimidating or
threatening nature
Hacking
refers to the practice of modifying or altering computer
software and hardware to accomplish a goal that is
considered to be outside of the creator's original objective.
Identity Theft
is the deliberate use of someone else's identity, usually as
a method to gain a financial advantage or obtain credit and
other benefits in the other person's name, and perhaps to
the other person's disadvantage or loss
Cyber Defamation
is an unprivileged false statement of fact which tends to
harm the reputation of a person or company
2 Types of Defamation:
1. Libel - written
2. Slander - verbal
CYBERSEX
also called computer sex, Internet sex, netsex
is a virtual sex encounter in which two or more people
(connected remotely via internet) send each other
sexually explicit contents or sexually
explicit acts
Internet Threats Key Terms:
Internet Threats Key Terms:
Internet Threats Key Terms:
Spyware – a program that runs in the background without you
knowing it. It has the ability to monitor what you are currently doing
and typing through key logging.
Internet Threats Key Terms:
Copyright - a part of law, wherein you have the rights to work,
anyone who uses it w/o your consent is punishable by law.
• Understand
• Be responsible
• Be creative
• Know the law
REFERENCES: