EM-TECH - Handouts 1
EM-TECH - Handouts 1
ICT in the Philippines 1. Web 1.0 – refers to the first stage in the World
Wide Web, which was entirely made up of the
• Philippines is dub as the ‘’ICT Hub of Asia” Web pages connected by hyperlinks.
because of huge growth of ICT-related jobs,
one of which is BPO, Business Process 2. Web 2.0 – is the evolution of Web 1.0 by
Outsourcing, or call centers. adding dynamic pages. The user is able to see
• ICT Department in the Philippines is responsible a website differently than others.
for the planning, development and promotion
of the country’s information and – Allows users to interact with the page; instead
communications technology (ICT) agenda in of just reading the page, the user may be able to
support of national development. comment or create user account.
TRENDS IN ICT
e) Microblogging – focus on short updates from
the user. Those that subscribed to the user will be
able to receive these updates.
1. Convergence– is the synergy of technological Ex. Twitter and Plurk
advancements to work on a similar goal or
task. For example, besides using your
personal computer to create word documents,
f) Blogs and Forums – allow user to post their
you can now use your smartphone.
content. Other users are able to comment on the
said topic.
2. . Social Media– is a website, application, or
Ex. Blogger, WordPress and Tumblr
online channel that enables web users web
users to create , co-create, discuss modify,
and exchange user generated content.
that you follow in real life. • Netiquette does not forgive flaming.
• Netiquette does however forbid people who are
• You need to behave the same way online that flaming to hurt discussion groups by putting
you do in real life. the group down.
• You need to remember that you can get caught
doing things you should not be doing online Rule no. 8: Respect other people’s privacy.
just like you can in real life.
• You are still talking to a real • Do not read other people’s mail without their
permission.
person with feelings even though • Going through other people’s things
could cost you, your job or you could
you can’t see them. Rule no. 3: even go to jail. • Not respecting other
people’s privacy is a bad netiquette.
Know where you are in Rule no. 9: Don’t abuse your power.
Usurpation
Intrusion: an unauthorized entity gains access to Cyber crime- a crime committed or assisted
sensitive data by circumventing a system’s through the use of the Internet.
security protections.
Incapacitation: prevents or interrupts system Privacy Policy/Terms of
operation by disabling a system component.
Services (ToS) – tells the user
Corruption: Undesirably alters system operation
by adversely modifying system functions or data. how the website will handle its
Phishing- acquires
sensitive personal
Pharming- a more
complicated way of