L1b Trends in ICT - Online Safety and Security

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 35

CHAPTER 1

Introduction to Information
and Communication
Technologies
Lesson 2
• Trends in ICT
• Online Safety and Security
LEARNING COMPETENCIES

Learners will be able to:


apply online safety, security, ethics, and etiquette
standards and practice in the use of ICTs as it would
relate to their specific professional tracks
(CS_ICT11/12-ICTPT-Ia-b2)
At the end of this lesson, the students should be able to:

1. learn the different trends in ICT and use them to their advantage;

2. consider one’s and others’ safety when sharing information using the
Internet;

3. consider one’s and others’ reputation when using the Internet;

4. determine and avoid the dangers of the Internet; and

5. be responsible in the use of social networking sites.


LESSON OUTLINE
• Trends in ICT
• Core Rules of Netiquette
• Online security, safety, and ethics
• Internet threats
• Protecting reputations online
• Copyright
Formative Assessment

“My media life is like…


because…”
Complete the statement

“My media life is like…


because…”
TRENDS IN ICT
1. Convergence
Technological convergence is the synergy of
technological advancements to work on a similar
goal or task.
TRENDS IN ICT
2. Social Media
Social media is a website, application, or online
channels that enable web users to create, co-
create, discuss, modify, and exchange user-
generated content.
SIX TYPES OF SOCIAL MEDIA:
• Social Networks. These are sites that allow you to connect
with other people with the same interests or background.
SIX TYPES OF SOCIAL MEDIA:
• Bookmarking Sites. These are sites that allow you to store
and manage links to various websites and resources.
SIX TYPES OF SOCIAL MEDIA:
• Social News. These are sites that allow users to post their
own news items or links to other news sources.
SIX TYPES OF SOCIAL MEDIA:
• Media Sharing. These are sites that allow you to upload
and share media content like images, music, and video.
SIX TYPES OF SOCIAL MEDIA:
• Microblogging. These are sites that focus on short updates
from the user.
SIX TYPES OF SOCIAL MEDIA:
• Blogs and Forums. These websites allow users to post
their content.
3. Mobile Technologies
The popularity of smartphones and tablets
has taken a major rise over the years. This is
largely because of the devices’ capability to
do tasks that were originally found in personal
computers.
KINDS OF MOBILE OPERATING SYSTEMS:

a. iOS
b. Android
c. Blackberry OS
d. Windows Phone OS
e. Symbian
f. WebOS
g. Windows Mobile
KINDS OF MOBILE OPERATING SYSTEMS:

a. iOS
b. Android
c. Blackberry OS
d. Windows Phone OS
e. Symbian
f. WebOS
g. Windows Mobile
KINDS OF MOBILE OPERATING SYSTEMS:

a. iOS
b. Android
c. Blackberry OS
d. Windows Phone OS
e. Symbian
f. WebOS
g. Windows Mobile
KINDS OF MOBILE OPERATING SYSTEMS:

a. iOS
b. Android
c. Blackberry OS
d. Windows Phone OS
e. Symbian
f. WebOS
g. Windows Mobile
KINDS OF MOBILE OPERATING SYSTEMS:

a. iOS
b. Android
c. Blackberry OS
d. Windows Phone OS
e. Symbian
f. WebOS
g. Windows Mobile
KINDS OF MOBILE OPERATING SYSTEMS:

a. iOS
b. Android
c. Blackberry OS
d. Windows Phone OS
e. Symbian
f. WebOS
g. Windows Mobile
KINDS OF MOBILE OPERATING SYSTEMS:

a. iOS
b. Android
c. Blackberry OS
d. Windows Phone OS
e. Symbian
f. WebOS
g. Windows Mobile
4. Assistive Media
Assistive media is a nonprofit service
designed to help people who have visual
and reading impairments. A database of
audio recordings is used to read to the user.
Are we still safe online?
Online Safety and Security
The Internet, truly, is a powerful tool.
It can be used to promote your
business, gain new friends, and stay
in touch with the old ones. It is also a
source of entertainment. But like most
things in this world, there is always
“another side of the coin.” The
Internet is one of the most dangerous
places, especially if you do not know
what you are doing.
Disclosing Information Online
Disclosing Information Online
Disclosing Information Online
Internet Threats:
1. Malware – stands for malicious software
Types: Virus, Worm, Trojan, Spyware, Adware

2. Spam – unwanted email mostly from bots


or advertisers. It can be used to send
malware.

3. Phishing – Its goal is to acquire sensitive


personal information like passwords and
credit card details.
Think Before You Click
1. Before you post something on the web, ask these questions
to yourself: Would you want your parents or grandparents to see
it? Would you want your future boss to see it? Once you post
something on the web, you have no control of who sees your
posts.
2. Your friends depend on you to protect their reputation online.
Talk to your friends about this serious responsibility.
3. Set your post to “private.” In this way, search engines will
not be able to scan that post.
4. Avoid using names. Names are easy for search engines to
scan.
5. If you feel that a post can affect you or other’s reputation, ask
the one who posted it to pull it down or report it as
inappropriate.
COPYRIGHT INFRINGEMENT

If you create something—an


idea, an invention, a form of
literary work, or a research, you
have the right of how it should
be used by others. This is called
intellectual property.
Next Meeting
• Contextualized online search skills
• Review: Core Rules of Netiquette

You might also like