Tags & Description
Information and Communications Technology (ICT)
deals with the use of different communication technologies such as mobile phones, telephones, internet and others to locate save, send and edit information.
digital native
people born surrounded by technology
digital migrants
people who had to learn how to adapt to technology
Birth of PHNET (1993)
ICT in the Philippines timeline
Birth of the Philippine Internet: Philnet project; currently called PHNET
Philippines' First Internet Connection (1994)
ICT in the Philippines timeline
Philippines' first connection to the Internet at a PLDT network
Growth of Mobile Networks (2013)
ICT in the Philippines timeline
Mobile cellular subscriptions reach 102 million
The massive growth of the country's mobile networks
Fastest Growing Connections (2014)
ICT in the Philippines timeline
fastest growing internet population in the last five years with a growth of 531%
Internet connection population penetration (2017)
ICT in the Philippines timeline
119M Mobile Phone Subscriptions
95% Prepaid
Greater 10% Broadband Subscription
55% Mobile Broadband Subscription
80% Subscribed to the Lowest Speed Plans (1-3 MBPS)
Philippines
the "ICT hub of Asia"
Social Media Capital of the World
the 97th of internet connection
the country that currently has one of the highest digital populations in the world
Telecommunications Infrastructure
the aspect as to why the Philippines has slow internet
a physical medium through which all internet traffic flows
the heavy congestion of the Philippines in each cell tower depletes(lowers) the data each user gets
Ex. Cell Towers
Topography
the aspect as to why the Philippines has slow internet
taken into consideration due to the possibility that some places may have electrical problems or fewer internet users
due to the Philippines' many islands it is hard to put up a cell tower in different places
Return of Investment (ROI)
the aspect as why the Philippines has slow internet
each cell tower made must earn enough from internet users for its maintenance, especially in far-off places where it is not as populous.
taken into consideration where cell towers have to be put up because cell towers are expensive
Appropriate legislation
the aspect as to why the Philippines has slow internet
using the Anti-Red Tape Act and Republic Act No. 11032(Ease of Doing Business) it takes cell tower builders less than a month to obtain the proper permits
Lack of Competition
the aspect as to why the Philippines has slow internet
the duopoly of Globe and PLDT is a factor on why the internet service is bad because people do not have a choice but to choose either of the 2 to be their internet provider
therefore the 2 telecoms are not competing with each other to get more internet users *DITO might stop the Duopoly
Government Support
the aspect as to why the Philippines has slow internet
the government must create a better plan when it comes to telecommunications infrastructure to control the major telecoms so that everyone will be able to get broadband connection
Web 1.0
the evolution of the Internet
static websites without interactivity
read-only websites
Web 2.0
the evolution of the Internet
websites that contain dynamic content
read & write websites
its keywords: Taxonomy, Rich User Experience, has a Software as a service
Web 3.0
the evolution of the Internet
has the concept of the World Wide Web (www) that is designed to cater to the individual users
read, write & execute websites
Static
refers to web pages that are the same regardless of the user
Dynamic
refers to web pages that are affected by user input or preference
Convergence
the synergy of technological advancement to work on a similar goal or task
cloud technologies to sync files
uses several technologies to accomplish a task conveniently
Social Media
websites, applications, or online channels that enable users to create, co-create, discuss, modify, and exchange user-generated content
Social Networks
Bookmarking Sites
Social News
Media Sharing
Microblogging
Blogs and Forums
Types of Social Media
Assistive Media
nonprofit service designed to help people who have visual and reading impairments
examples: Braille displays, screen reading software, text-to-speech systems using Optical Character Recognition (OCR), large print materials
iOS
Android -Blackberry OS
Windows Phone OS
Symbian
WebOS
Windows Mobile
Operating Systems of Mobile Technologies
Cybercrime
a crime committed or assisted through the use of the Internet
Privacy Policy
tells the user how the website will handle its data
Malware
stands for malicious software
Virus
a malicious program designed to replicate itself and transfer from one computer to the other
corrupts or deletes data from programs and files but requires human interaction to activate
example: ILOVEYOU, Melissa Virus, Browser Hijacker
Worm
a malicious program that transfers from one computer to another by any type of means
will spread and multiply via networks and work without human action
example: Morris Worm, Nimda, SQL Slammer
Trojans
a malicious program that is disguised as a useful program, like legit websites, and once downloaded or installed, it leaves your PC unprotected and allows hackers to get your information
hides in useful looking programs but wait for human action to work
example: Zeus/Zbot, SpyEye, ice IX
Spyware
a program that runs in the background without you knowing it and has the ability to monitor what you are currently doing and typing through keylogging
example: Advance Keylogger, GO Keyboard, Gator(GAIN)
Keylogging
the use of an activity-monitoring program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
Adware
a program designed to send you advertisements, mostly pop-ups
designed to generate revenue for its developer every time a user clicks on the ad it shows
example: Fireball, Appearch, DollarRevenue
Spam
unwanted email mostly from bots or advertisers
can be advertisements from legit businesses or cyber criminals
not illegal because it is a way for businesses to reach you
Scam
misleads users and targets their personal information through fabricated promises, confidence trick, etc.
completely illegal as these people knowingly trick you intro giving out personal information
Phishing
acquires sensitive personal information by pretending to be a reliable link or source to deceive victims into opening an email or text message that leads to the installation of malware
Smishing
a type of Phishing
Short Message Service(SMS) phishing
attacker send bogus text messages to a website that injects malware into the device
Vishing
a type of Phishing
voice phishing where the attacker pretends to be calling as reliable personnel of the government or bank to fool you into giving out personal information
Search Engine Phishing
a type of Phishing
attacker creates a website that would offer cheap products and too-good-to-be-true deals that would be then detected and indexed by legitimate search engines tricking people into entering their personal information.
Pharming
uses malicious code to direct victims to unconciously go to a spoofed website
a more complicated way of phishing where it exploits the DNS(Domain Name Service) System
can be through Messages or Transactions
Copyright
part of the law, wherein you have the right to use your work and anyone who uses it without your consent is punishable by law
Direct licensing
limitation of copyright ownership
where potential users seek general licensing conditions to follow or directly ask the owner for permission of use
Fair use
limited to the ability to use it without profiting from it
Permits the distribution and reproduction of copyrighted materials under certain conditions and depending on the purpose of its secondary use.
examples: copyright material is cited, only a small portion is used and the value of the material is unaffected
Creative Commons
limitation of copyright ownership
the copyright owner grants authorization for others to utilize their work under specific restrictions
Public Domain
limitation of copyright ownership
all creative works have been placed in public domain by their creators are free from all copyright restrictions, making it possible to use them for profit without seeking permission
Copyright Infringement
illegal usage of other people's intellectual property without permission for monetary gain
properties like: software, written or drawn works, films & photographs, music and sound recordings
Fair Use
a doctrine in copyright law that allows limited, restricted, and monitored use of copyrighted material without requiring permission from the right owners
means that intellectual property may be used without consent as long as it is used in commentaries, criticisms, search engines, parodies, news reports, library archiving, teaching, and education
Purpose of Use
Factors of Fair Use
copyright material can be used for the purpose of criticism or review without resulting to infringement but must also come with acknowledgement
Nature of Work
Factors of Fair Use
Published works: if material is used, will not lead to infringement
Unpublished works: if material is used, will lead to infringement
Amount of Work
Factors of Fair Use
if only a small portion of the work is used and does not affect the original work, it does not amount to infringement
It may result in infringement, however when a major portion is used
Effect of Work
Factors of Fair Use
if a work took a portion from a copyrighted work and affected its market as well as its potential market, then it will lead to infringement