It Social Issues and Professional Issues: Domingo, IVR, Yu-Miclat, S., Hogar-Reyes, ME
It Social Issues and Professional Issues: Domingo, IVR, Yu-Miclat, S., Hogar-Reyes, ME
AND PROFESSIONAL
ISSUES
Prepared by:
1
Course Title : IT SOCIAL AND PROFESSIONAL ISSUES
Course Description : This course introduces the students to the social and professional
issues surrounding the development and use of Information
Communication Technologies (ICTs) in the 21st century. This course
examines the pervading presence of IT in various professions and its
impact on the lives and social culture of people, whether in Medicine,
Business, Entertainment and Education. The course covers topics on
the enabled industries, Internet Censorship and Freedom of
Expression, Sex and Technology, Technology and Privacy, Information
Warfare, E-Health, Online Crimes, E-Lifestyle, and E-Learning and
Distance Education.
INSTITUTIONAL
PROGRAM INTENDED LEARNING COURSE INTENDED LEARNING OUTCOMES (CILO)
INTENDED LEARNING
OUTCOMES (PILO) COLLEGE SUBJECT
OUTCOMES (ILO)
BSIT BSIT Graduate Outcomes Course Outcomes
Creative and Critical IT01 Apply knowledge of computing, Learn the current issues surrounding the development and use
Thinking science, and mathematics appropriate of ICTs
to the discipline.
IT03 Analyze complex problems, and Evaluate the positive and negative side of a critical IT-related
identify and define the computing issues
requirements appropriate to its
solution. Learn the risks involved in using ICT, as well as, the protection
IT05 Design, implement, and evaluate and security measures to avoid becoming victims of
computer based systems, processes, cybercrimes
components, or programs to meet
desired needs and requirements Identify emerging and converging technologies, including trends
under various constraints. in hardware, software and data security
IT06 Integrate IT-based solutions into the
user environment effectively. Develop cooperation in group discussion, research activities and
IT09 Assist in the creation of an effective IT presentations
project plan.
Adeptness in the IT07 Apply knowledge through the use of Present the Pros and Cons of ICT’s societal impact
Responsible Use of current techniques, skills, tools and
practices necessary for the IT Discuss the important role of ICTs in the improvement of the
Technology modern society, as well as its effects in the evolving the
profession
IT02 Understand best practices and culture of things
Community Engagement
standards and their applications.
Imbue the value of integrity and moral responsibility as a future
ICT Professional
2
writing, presentations, and clear
instructions.
Sense of Nationalism and IT11 Analyze the local and global impact of
Global Responsiveness. computing information technology on
individuals, organizations, and
society.
Sense of Personal and IT12 Understand professional, ethical,
Professional Ethics legal, security and social issues and
responsibilities in the utilization of
information technology.
Passion to Life-Long IT13 Recognize the need for and engage in
Learning planning self-learning and improving
performance as a foundation for
continuing professional development.
3
Week 8 7. Information Warfare Understand professional, Lecture forum Recitation
7.1 Cyber Espionage ethical, legal, security and Demonstration Seatwork / Homework
7.2 Intelligence Gathering social issues and Gapped lecture Examination
responsibilities in the Study group and Research
utilization of information Think aloud modeling
technology
Week 9 Midterm Examination
Week 10 8. E-Health Identify and analyze user Lecture forum Recitation
8.1 Telemedicine needs and take them into Demonstration Seatwork / Homework
8.2 Virtual Therapy account in the selection, Gapped lecture Examination
creation, evaluation and Study group and Research
administration of computer- Think aloud modeling
based systems
Week 11- 9. Online Crimes Lecture forum Recitation
12 9.1 Hacking Understand professional, Demonstration Seatwork / Homework
9.2 Spamming ethical, legal, security and Gapped lecture Examination
9.3 Technology-based Terrorism social issues and Study group and Research
9.4 Online Fraud responsibilities in the Think aloud modeling
utilization of information
technology
Week 13- 10. E-Lifestyle Lecture forum Recitation
14 10.1 SMS Addiction Integrate IT-based solutions Demonstration Seatwork / Homework
10.2 Online and Network-based into the user environment Gapped lecture Examination
Gaming effectively Study group and Research
10.3 Online Shopping Think aloud modeling
10.4 Blogging, Social Networks and Apply knowledge through the
Personal Websites use of current technologies,
10.5 Home-based and Mobile Offices skills, tools and practices
Grading System:
General Rules:
Midterm Grade =70% Class Standing (Quizzes,
Recitation, Assignment, Attendance, Research Aside from what is prescribed in the student handbook, the following are the
Work); 30% Midterm Examination professor’s additional house rules: :
1. Assignments and research projects/report works will be given throughout
Second Grading = 70% Class Standing (Quizzes, the semester. Such requirements shall be due as announced in class. Late
Recitation, Assignment, Attendance, Research submission shall be penalized with grade deductions (5% per day) or shall
Work, Case Study); 30% Final Examination no longer be accepted, depending on the subject facilitator’s
discretion. Assignments and exercises are designed to assist you in
understanding the materials presented in class, and to prepare you for the
Final Grade = (Midterm Grade + Second Grading) / 2 exams.
Passing mark is 60% of the total number of items 2. Students are required to attend classes regularly, including possible make-
up classes. The student will be held liable for all topics covered and
assignments made during his/her absence. The university guidelines on
attendance and tardiness will be implemented. Every meeting, an
attendance sheet will be passed around. Be sure to sign it.
3. Academic honesty should be practiced at all times. Any evidence of
copying or cheating on any course work may result in a failing grade for all
parties involved.
4. Students are advised to keep graded work until the semester has ended.
4
5. Contents of the syllabus are subject to modification with notification.
6. Cell phone, radio or other listening devices are not allowed to be used inside
lecture and laboratory rooms to prevent any distractive interruption of the
class activity.
7. No food, drinks, cigarettes, nor children are allowed inside the lecture and
laboratory rooms.
8. Only officially enrolled students are allowed inside the lecture or laboratory
room.
Withdrawal and dropping of the subject should be done in accordance with existing
university policies and guidelines.
References:
1. Lavina, Erise, [Link]. Ethics for I.T. Professionals with Legal Aspects in Computing, 2012.
2. Tavani. Ethics and Technology, 2011.
3. Whitmat, Michael & Mattord. Reading and Cases in the Management of Information Security, 2006.
4. Baase, Sara. A Gift of Fire: Social, Legal and Ethical Issues for Computing and the Internet, 2008
5. Talabis, Mark, [Link]. Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data,
2015.
6. Harris, Charles E., [Link]. Engineering Ethics: Concepts and Cases, 2014.
7. Minelli, Michael, Chambers, Michelle & Dhiraj, Ambiga. Big Data, Big Emerging Business Intelligence and Analytic
Trends for Today’s Businesses, 2013.
8. Whitney, Hunter. Data Insights: New Ways to Visualize and Make Sense of Data, 2013.
9. Procise. Incident Response: Investigating Computer Crime, 2001.
10. Hick, Ed. Human Rights and the Internet, 2000.
5
TABLE OF CONTENTS
1.1 Globalization
1.2 Digital Divide
1.3 Information System Trends
8.1 Telemedicine
8.2 Virtual Therapy
6
CHAPTER 9. ONLINE CRIMES ----------------------------------------------------------------------- 41-45
9.1 Hacking
9.2 Spamming
9.3 Technology-based Terrorism
9.4 Online Fraud
7
CHAPTER 1. GLOBAL DIGITAL ENVIRONMENT
Overview: The Internet has wired the world. Today it is just as simple to communicate with
someone on the other side of the world as it is to talk to someone next door. In this chapter, we
will look at the implications of globalization and the impact it is having on the world.
Learning Objectives:
1.1 GLOBALIZATION
The ability to use and manipulate digitalized technology is very important which is why it
is ideal for everyone to have a share of technology. The digital divide describes the problem we
are faced with.
People most affected include low socio-economic areas, developing countries, rural
women and children. In Africa, only 3% of the population has internet. In Asia, 1% of the
8
population in Cambodia, Laos and Bangladesh has internet. The Middle East accounts for 0.9%
of global Internet users.
a. Cloud Computing
Cloud computing is a network of resources a company can access, and this method of
using a digital drive increases the efficiency of organizations. Instead of local storage on
computer hard drives, companies will be freeing their space and conserving funds. According
to Forbes, 83 percent of enterprise workloads will be in the cloud by 2020, which means 2019
will show an increasing trend closing in on this statistic.
Cloud storage and sharing is a popular trend many companies have adopted and even
implemented for employee interaction. A company-wide network will help businesses save on
information technology infrastructure. Cloud services will also extend internal functions to gain
revenue. Organizations that offer cloud services will market these for external products and
continue their momentum.
Organizations will transfer their stored files across multiple sources using virtualization.
Companies are already using this level of virtualization, but will further embrace it in the year
to come. Less installation across company computers is another positive result of cloud
computing because the Internet allows direct access to shared technology and information.
The freedom of new products and services makes cloud computing a growing trend.
d. Automation
Another current trend in the IT industry is automated processes. Automated processes
can collect information from vendors, customers, and other documentation.
Due to the global pandemic, different platforms are now being used in educational
systems, thanks to the global digital environment. Teachers and students, on the other hand, are
9
both experiencing very poor internet connections as a result of the digital divide. What do you
think the consequences and effects of the digital divide will be in our educational system?
10
CHAPTER 2. EMERGING AND CONVERGING INFORMATION COMMUNICATION
TECHNOLOGIES
Overview: While nanotechnology (and all other emerging, converging technologies) promise
radical changes in science and society, future progress in the field will require overcoming many
scientific challenges.
Learning Objectives:
At the end of the Chapter, the student must be able to:
2. Virtual Reality
Technology that includes virtual reality is becoming prevalent. The software of virtual
reality is making many industries prepared for various scenarios before entering them. The
medical profession is projected to use virtual reality for some treatments and interactions with
patients in the coming years. Virtual training sessions for companies can cut costs, fill in the
need for personnel, and increase education.
3. Augmented Reality
Augmented reality is a more versatile and practical version of virtual reality, as it does
not fully immerse individuals in an experience. Augmented reality features interactive
scenarios that enhance the real world with images and sounds that create an altered
experience. The most common current applications of this overlay of digital images on the
surrounding environment include the recent Pokémon Go fad or the additions on
televised football in the U.S.
Augmented reality can impact many industries in useful ways. Airports are implementing
augmented-reality guides to help people get through their checks and terminals as quickly
and efficiently as possible. Retail and cosmetics are also using augmented reality to let
customers test products, and furniture stores are using this mode to lay out new interior
design options.
The possibilities for augmented reality in the future revolve around mobile applications
and health care solutions. Careers in mobile app development and design will be abundant,
and information technology professionals can put their expertise to use in these interactive
experiences.
4. Blockchain Data
11
Blockchain data, like the new cryptocurrency Bitcoin, is a secure method that will
continue to grow in popularity and use in 2019. This system allows you to input additional
data without changing, replacing, or deleting anything. In the influx of shared data
systems like cloud storage and resources, protecting original data without losing important
information is crucial.
The authority of many parties keeps the data accounted for without turning over too
much responsibility to certain employees or management staff. For transaction
purposes, blockchain data offers a safe and straightforward way to do business with
suppliers and customers. Private data is particularly secure with blockchain systems,
and the medical and information technology industries can benefit equally from added
protection.
6. Internet of Things
The Internet of Things (IoT) is an emerging movement of products with integrated Wi-Fi
and network connectivity abilities. Cars, homes, appliances, and other products can now
connect to the Internet, making activities around the home and on the road an enhanced
experience. Use of IoT allows people to turn on music hands-free with a simple
command, or lock and unlock their doors even from a distance.
([Link]
2.2. MINIATURIZATION
• the trend to manufacture ever smaller mechanical, optical and electronic products and
devices. Examples include miniaturization of mobile phones, computers and vehicle
engine downsizing.
• In electronics, Moore's Law predicted that the number of transistors on an integrated circuit
for minimum component cost doubles every 18 months. This enables processors to be
built in smaller sizes
MULTIFUNCTIONAL MACHINES
12
2.3 THE RISE OF ROBOTICS
Robots in Action
13
LET’S ASSESS WHAT YOU HAVE LEARNED:
14
CHAPTER 3. ICT-ENABLED INDUSTRY
Learning Objective:
a. Business process outsourcing (BPO) is the contracting of a specific business task, such
as payroll, human resources (HR) or accounting, to a third-party service provider. Usually,
BPO is implemented as a cost-saving measure for tasks that a company requires but does
not depend upon to maintain their position in the marketplace.
b. One of the most dynamic and fastest growing sectors in the Philippines is the Information
Technology - Business Process Outsourcing (IT-BPO) Industry. The industry is composed
of eight sub-sectors, namely, knowledge process outsourcing and back offices,
animation, call centers, software development, game development, engineering design,
and medical transcription. The IT-BPO industry plays a major role in the country's growth
and development.
15
e. BPO Setups (Captive Markets and Offshoring/Third Party Outsourcing)
• Captive Markets : Start From Scratch Model
e.1 The usual flow is for the company to develop all its resources in the new designated
area or country of operations.
e.2 preferred by the companies that have high levels of market knowledge and analytics
• Build Operate Transfer Model
e.3 the practice is to contact a 3rd party vendor in order to develop a contract in which
the vendor is the one who develops the property, sources the employees and
manages the BPO center for the first designated period or amount of time.
e.4 preferred by companies that do not have any specialized expertise in the new
country of operations hence needing a local partner or vendor to assist with market
entry strategies
b. Political Issues
• revision of Republic Act 7916 to include floors in buildings where BPO companies
operates to be considered as special economic zones, exempting the companies
from national and local taxes and only having to pay 5% of their gross income as
tax
• approval of RA 7916, the establishment of the Philippine Economic Zone
Authority(PEZA) which considered IT Parks as special economic zones,
encouraged foreign investment in the industry by providing subsidies for
infrastructure development and tax exemptions
c. Economic Issues
• the BPO industry is the fastest growing sector in the country and is expected to
overtake OFW remittances in 2017
• the growth in the BPO industry has barely trickled down to most of the Philippine
population
• the development of the country mainly because of the high unemployment and
underemployment rates; the BPO industry was the fastest growing sector from
2005-2012 but only took in 1% of the labor force
16
Defined as those companies, which together enable the provision of telecommunication,
information and entertainment services including voice, internet, SMS, text and other data
services
• Mobile banking,
• economic development,
• delivery of health services,
• citizen empowerment and;
• greater access to media and education
3.3 E-SERVICES/E-GOVERNMENT
One of the most dynamic and fastest growing sectors in the Philippines is the Information
Technology-Business Process Outsourcing (IT-BPO). Do you think that the BPO Industry
contributes to the development of the ICT Sector and other business and service activities in our
country?
17
CHAPTER 4. INTERNET CENSORSHIP AND FREEDOM OF EXPRESSION
Learning Objective:
It aims to address legal issues concerning online interactions and the Internet in the
Philippines. Among the cybercrime offenses included in the bill are cybersquatting, cybersex, child
pornography, identity theft, illegal access to data and libel.
Internet censorship and content restrictions can be enacted through a number of different
strategies which we describe below. Internet filtering normally refers to the technical approaches
to control access to information on the Internet, as embodied in the first two of the four approaches
described below.
1) TECHNICAL BLOCKING
There are three commonly used techniques to block access to Internet sites: IP
blocking, DNS tampering, and URL blocking using a proxy. These techniques are used to
block access to specific Web Pages, domains, or IP addresses. These methods are most
frequently used where direct jurisdiction or control over websites are beyond the reach of
authorities. Keyword blocking, which blocks access to websites based on the words found in
URLs or blocks searches involving blacklisted terms, is a more advanced technique that a
growing number of countries are employing. Filtering based on dynamic content analysis—
effectively reading the content of requested websites—though theoretically possible, has not
been observed in our research. Denial of service attacks produce the same end result as
other technical blocking techniques—blocking access to certain websites—carried out
through indirect means.
18
2) SEARCH RESULT REMOVALS
In several instances, companies that provide Internet search services cooperate with
governments to omit illegal or undesirable websites from search results. Rather than blocking
access to the targeted sites, this strategy makes finding the sites more difficult.
3) TAKE-DOWN
Where regulators have direct access to and legal jurisdiction over web content hosts,
the simplest strategy is to demand the removal of websites with inappropriate or illegal
content. In several countries, a cease and desist notice sent from one private party to another,
with the threat of subsequent legal action, is enough to convince web hosts to take down
websites with sensitive content. Where authorities have control of domain name servers,
officials can deregister a domain that is hosting restricted content, making the website
invisible to the browsers of users seeking to access the site.
4) INDUCED SELF-CENSORSHIP
Another common and effective strategy to limit exposure to Internet content is by
encouraging self-censorship both in browsing habits and in choosing content to post online.
This may take place through the threat of legal action, the promotion of social norms, or
informal methods of intimidation. Arrest and detention related to Internet offenses, or on
unrelated charges, have been used in many instances to induce compliance with Internet
content restrictions. In many cases, the content restrictions are neither spoken nor written.
The perception that the government is engaged in the surveillance and monitoring of Internet
activity, whether accurate or not, provides another strong incentive to avoid posting material
or visiting sites that might draw the attention of authorities.
The advantage of allowing internet censorship is that content which is violent, obscene,
or dangerous can be immediately blocked. This protects children from inadvertently viewing
content that could be scary or harmful to them, such as the murder and decapitation videos which
have made their way to sites like Facebook and Twitter in recent years. The disadvantage is
obvious: internet censorship is a restriction on a person’s ability to view the content they wish to
see, when they wish to see it. Here are some additional internet censorship pros and cons to
discuss.
1. It creates the chance to set common sense limits. There are some things that just aren’t part
of what a society would deem to be healthy. A simple search right now on an unfiltered public
search can provide anyone with access to numerous videos that purport to show real murders
in progress. High-profile cases, such as the murders of Alison Parker and Adam Ward, were
broadcast on-air and then a first-person video of the event made its way through social circles
afterwards. Restricting this content sets a common-sense limit on the content that van be
viewed.
1. It limits access to harmful activities. There are dark areas of the internet where anything goes
right now. Access to illicit drugs, sex trafficking, human trafficking, and child pornography can
be accessed with relative ease by those who seek out such things. By restricting content that
can be accessed, it limits the opportunities that predators can create to reach out to find new
victims.
19
2. It could lessen the impact of identity theft. One of the fastest growing crimes in the world today
is identity theft. NBC News reports that more US citizens were victims of identity theft in 2016
than any year before. More than 15.4 million reports of identity theft were compiled by Javelin
Strategy and Research, which reflects a 16% increase in the total number of reports from 2015
figures. Restricting content that would allow identity information to be easily shared could
lessen the impact that identity theft causes to a society.
3. It may provide a positive impact on national security. Although hacking will occur no matter
what internet censorship laws may be in place, by creating internet censorship regulations with
strict and mandatory penalties for a violation, it could become possible to reduce the number
of hacking incidents that occur. That could have a positive impact on national security because
the restrictions would possibly prevent alleged incidents like what occurred during the 2016
US Presidential election.
4. It stops fake news. Claims of fake news increased dramatically in 2017. Fake news websites
promote false reports for money through clicks because readers think the news is real. Internet
censorship would provide another level of discernment which could possibly stop divisive
incidents that are based on events that never occurred.
1. Who watches the watchers? Even if internet censorship is directly supervised and ethically
maintained, someone somewhere is deciding on what is acceptable and what is not acceptable
for society to see online. At some level, someone does not have anyone to whom they report
regarding their censorship decisions. With that kind of power, one individual could influence
society in whatever way they chose without consequence.
2. It stops information. Although fake information can be restricted through internet censorship,
so can real information. According to the World Economic Forum, 27% of all internet users live
in a country where someone has been arrested for content that they have shared, published,
or simply liked on Facebook. 38 different countries made arrests based solely on social media
posts in 2016.
FREEDOM OF EXPRESSION
• Right to express one's ideas and opinions freely through speech, writing, and other forms
of communication but without deliberately causing harm to others' character and/or
reputation by false or misleading statements.
• According to the Universal Declaration of Human Rights, proclaimed in 1948, Everyone
has the right to freedom of opinion and expression.
• This right includes freedom to hold opinions without interference and to seek, receive and
impart information and ideas through any media and regardless of frontiers.
20
Freedom of expression is recurrently limited through tactics that include censorship,
restrictive press legislation and harassment of journalists, bloggers and others who voice their
opinions, as well as crackdowns on religious minorities.
As it is a core to the definition of freedom, the importance of free speech as a basic and
valuable characteristic cannot be underestimated.
At an individual level, freedom of expression is the key to the development and fulfilment of every
person.
• People can gain an understanding of their surroundings and the wider world by
exchanging ideas and information freely with others. This makes them more confident and
more able to plan their lives and to work. Sharing ideas can enhance productivity at the
workplace, not to mention that it fosters social relationships
At a national level, freedom of expression is necessary for good government and therefore for
economic and social progress.
• Free debate about new legislation helps ensure that the eventual law has the support of
the population, making it more likely to be respected;
• If people can speak their minds without fear, and the media are allowed to report what is
being said, the government can become aware of any concerns and address them.
• Free debate about and between political parties exposes their strengths and weaknesses,
as a result media scrutiny of the government and the opposition helps expose corruption
or other improprieties and prevents a culture of dishonesty.
Although you have freedom of expression, you also have a duty to behave responsibly and to
respect other people’s rights.
Public authorities may restrict this right if they can show that their action is lawful, necessary and
proportionate in order to:
• protect national security, territorial integrity (the borders of the state) or public safety
• prevent disorder or crime
• protect health or morals
• protect the rights and reputations of other people
• prevent the disclosure of information received in confidence
• maintain the authority and impartiality of judges
• An authority may be allowed to restrict your freedom of expression if, for example, you
express views that encourage racial or religious hatred.
Technically, people can have global access to information. The amount of information
available to the masses is incomprehensible. At the same time, Internet security and monopolistic
structures have created new dangers to freedom of speech and access to information.
1. Social media - is the general term used to describe the plethora of web-based applications
that allow people to create, share and exchange information, opinions and ideas in virtual
communities. Social media use Internet and mobile technologies to create interactive platforms
21
where individuals and communities share, co-create, discuss and modify user-generated
content. however, it is necessary to be mindful of the dangers of using social media as well.
• Social media conjure up many different types of data security and access to information issues.
These platforms are run by businesses after all. Media projects can use social media to reach
current and new audiences. They can also use it to collect and collate data, to crowdsource
information and to develop platforms for discussions on certain topics. Social media can also
be used as advocacy and lobbying tools to raise awareness amongst the general public of a
specific issue.
2. YouTube/Soundcloud - are online websites that enable people to upload and share videos
and audio for free. A variety of businesses, artists, experts and organizations use them to
disseminate ideas and information to a wide audience.
3. Mobile Phones - have been around for decades and new advancements in smartphones
support a variety of additional services such as business, news, social and game applications
and photography.
4. Online Website - may not be new but the way that they are being used to reach wider
demographics and new audiences can be considered innovative. Being online gives
organizations and businesses a platform to represent their work to the world.
5. Tablet/computers - are compact mobile computers that are interactive with touchscreens
and have capabilities such as inbuilt cameras and microphones that make them ideal for
roving reporters and journalists who are capturing stories on the go.
Advantages
• Allows individuals to express their opinions
• Less corruption
• Freedom from hunger
• A healthier society
• Respect for environment
• Respect for fundamental human rights
• Improve national security
• Make the political system more democratic
• Make the government more efficient
• Lead to better decision-making
• Help the economy become more efficient
• Individuals will receive better treatment from institutions
This black and white picture depicts a middle-aged man with his eyes and mouth covered.
The artist creates an atmosphere of sadness, distress and pain, representative of the inability of
the man to open his horizons, to follow his dreams. At the first glance we immediately realize how
lucky we are: we have the power to speak, to think, to argue.
22
Conclusion:
Freedom of expression, the right to express one's ideas and opinions freely through
speech, writing, and other forms of communication, has developed towards progress over the
years. However, there is still a long path to tread to type it as universal.
Some experts have been asking where our freedom stops. In my opinion, there is no
freedom which is absolute and unlimited. The exercise of the right to freedom of expression
carries with its duties and responsibilities; it may be subject to formalities, conditions, restrictions
or penalties as are prescribed by law and are necessary in a democratic society.
“Proclaim the truth and do not be silent through fear.” - Catherine of Siena
Need of filtering:
1. Safe access to the internet
2. For business
3. Protect children for unsuitable contents
Content Filtering
• On the internet, content filtering is the use of a program to screen and exclude from access
or availability web pages or e-mail that is deemed objectionable.
• Content filtering usually works by specifying character strings that, if matched, indicate
undesirable content that is to be screened out.
Types of filtering
Filters can be implemented to many different ways. No solution provides complete
coverage, so most companies deploy a mix of technologies to achieve the proper content control
in line with their policies.
1. Browser Based Filters - It is the most lightweight solution to do content filtering, and is
implemented via third party extensions.
• Blocksi is the #1 rated extension for web & Youtube filtering, time management and
trend analysis for Chrome and Chromebooks.
2. E-Mail Filters - E-mail filters set on information contained in the mail headers such as
sender, and subject, and e-mail attachments to classify, accept or reject messages.
23
3. Search-Engine Filters - Many search engines, such as Google and Bing offer users the
option of turning on a safety filter. When this safety filter is activated, it filters out the
inappropriate links from all of the search result.
Problems with Filtering
It could be expected that allowed content would be blocked. If all pornographic content is to be
blocked, other content with a resemblance in features will also be blocked e.g. sex education,
medical information etc.
Television and Films - The Movie and Television Review and Classification Board (MTRCB) –
is a Philippine government agency under the Office of the President of the Philippines that is
responsible for the classification and review of television programs, movies and home videos.
- The government agency can classify a movie or television program an X-rating which
forbids the material from being shown to the public due to issues such as excessive obscenity.
Films Description
G (General Patronage) – Viewers of all ages are admitted.
PG (Parental Guidance) – Viewers below 13 years old must be accompanied by a parent or a
supervising adult.
R-13 – Only viewers who are 13 years old and above can be admitted.
R-16 – Only viewers who are 16 years old and above can be admitted.
R-18 – Only viewers who are 18 years old and above can be admitted.
X – “X – rated” films are not suitable for public execution.
The right to freely express one's ideas and opinions is known as freedom of expression.
Where do you think our FREEDOM stops?
24
CHAPTER 5. SEX AND TECHNOLOGY
Overview: Modern technology is almost inseparable from our daily lives. However,
criminals often take advantage of vulnerabilities in cyber security to commit crimes through
the use of computer technology. If members of the public lack security awareness of
computer network security, they can easily fall prey to online swindlers. Police appeal to
the public to be vigilant and thereby avoid potential technology crime hazards. Whilst using
computer as the medium, technology crime is not that much different from tradit ional
crime. Various common types of technology crime are listed here.
Learning Objective:
Child pornography is a form of child sexual exploitation. The law defines child pornography
as any visual depiction of sexually explicit conduct involving a minor (persons less than 18 years
old). Images of child pornography are also referred to as child sexual abuse images.
The law prohibits the production, distribution, importation, reception, or possession of any
image of child pornography.
The expansion of the Internet and advanced digital technology lies parallel to the explosion
of the child pornography market. Child pornography images are readily available through virtually
every Internet technology, including social networking websites, file-sharing sites, photo-sharing
sites, gaming devices, and even mobile apps. Child pornography offenders can also connect on
Internet forums and networks to share their interests, desires, and experiences abusing children,
in addition to selling, sharing, and trading images.
These online communities have promoted communication and collaboration between child
pornography offenders, thereby fostering a larger relationship premised on a shared sexual
interest in children. This has the effect of eroding the shame that typically would accompany this
behavior, as well as desensitizing those involved to the physical and psychological damage
caused to the child victims. For this reason, online communities attract and encourage new
individuals to join them in the sexual exploitation of children.
The methods many offenders use to evade law enforcement detection have also become
increasingly sophisticated. Purveyors of child pornography continue to use various encryption
techniques and anonymous networks on “The Dark Internet”, attempting to hide their amassed
collections of illicit child abuse images. Several sophisticated online criminal organizations have
even written security Material s to ensure that their members follow preferred security protocols
and encryption techniques in an attempt to evade law enforcement and facilitate the sexual abuse
of children. ([Link]
25
Virtual sex is sexual activity where two or more people - or one person and a virtual
character - gather together via some form of communications equipment to arouse each other,
often by the means of transmitting sexually explicit messages. (Wikipedia)
Virtual Prostitution is an activity in which one engages in sexual activity with another
person, whom neither have ever seen/met in real life before. Usually the two met online.
([Link]
Prostitution is not a victimless crime. Each sex act, whether online or not, is a violation of
women’s dignity and bodily integrity.
The technology is part of the excitement. The newest, fastest becomes the sexiest and
enables the best sexual experiences online. Using the Internet to access pornography leads to
an escalation of accessing, collecting and using pornography. The cycle continues.
([Link]
Cybersex can be defines as those sexual acts that are derived from surfing electronic
media sites that would titillate the sexual mind and the at satisfies the erotic needs of an individual.
These sites might be on Websites, Chat-rooms with web cams, streaming video materials, live
sex shows and / or SMS messages.
This group pf cybersex users are able to occasionally explore sex on the internet without
problems. They might use cybersex to enhance their sexual experiences. They are able to enjoy
intimate sexual relationships in the real world and have a healthy attitude to sexuality. So,
although they are seeking sexual gratification online, it is considered appropriate and not
pathological. As online dating is increasingly common, they may use website to meet potential
sexual partners, but other than meeting and communicating with partners online, they are as
appropriate and respectful in these relationships as people who enjoy meeting potential dates in
person.
Like appropriate recreational users, this group of cybersex users can also access internet
sex without compulsive use but may use this material inappropriately. This could include sexting
26
or showing sexual images to other people for amusement or shock value, causing unintentional
embarrassment. Such users do not keep their activities secret and may otherwise have a healthy
attitude towards sexuality and relationship.
This group has not had any past problems with online other sexual behavior. They may
be using the internet as a way to explore sexuality in a way that normal life has not offered them.
Examples of problematic users in the discovery group are people who compulsively visit adult
dating sites in the hope of meeting a partner, while avoiding real-life opportunities to meet people;
or people who use the internet in an attempt to meet an underage partnet for sex, despite no prior
history of doing so. They may also be using dating sites to meet multiple partners in a manipulative
or dishonest way.
This group includes people who may have a history of fantasizing about sexual acting out,
but who have never done it until accessing internet-based sexual material. They might have
thought about going to strip clubs or seeing prostitutes for sex, but not taken any action to do so,
perhaps for fear of recognition or other consequences. Their use may be regular but not
excessive, although attention is taken away from real relationships, work life may suffer, or
infidelity can occur.
People in this group are at the extreme end if the continuum of sexual problems. Their
sexual acting out occurs with or without access to the internet—the oneline world simply adds
another avenue to explore sexually inappropriate material. These cybersex users may access
pornography frequently, as part of an ongoing pattern of excessive secual behavior. They may
also engage in predatory behavior in seeking out and exploiting vulnerable partners.
Although not all cybersex users engage in problematic internet use, all take the risk that
their use may become problematic. One difficulty with the online world of sex is that while users
are detached from their surroundings, sexually aroused, and surfing the net, they may be exposed
to images they would never seek out normally. This can lead to exploring illicit sexual material in
a way that was never intended, sometimes with dire legal and relationship consequences.
Why cybersex?
• Websites can be accessed anytime, anywhere with anonymity
• If not participating in cybersex with a known partner, people can portray a new
identity
• There are no consequences like sexually transmitted diseases or pregnancy
• Can experiment sexually without anyone knowing their true identity
• Can portray a different version of themselves that’s a different gender or age
27
b. Spend multiple hours away from their work and family
c. Online at times when the household is asleep -> lack of concentration at work or school
d. Unable to stop themselves from engaging
e. Social relationships may decline as the person spends numerous hours engaging in
cybersex
f. May not be able to refrain from accessing the materials in the workplace (Help Guide,
2014)
g. May grow anxious and restless if unable to access computer (Sexual Recovery Institute,
2014)
5.4 ONLINE RELATIONSHIPS - is a relationship between people who have met online and in
many cases know each other only via the Internet.
ADVANTAGES:
• can immediately focus on people with similar interest, beliefs, age and other important
criteria.
• Meaningful dating can be done at a distance, even in other countries.
• Allows you to expand your options outside you social circle.
DISADVANTAGES:
• Scammers
• Data Shared is Permanent
• Misleading Form of Attraction
• Distance is a Barrier
Each sex act, whether online or not, is a violation of women’s dignity and bodily integrity
and because of technology, such acts can be easily derived from surfing electronic media sites.
How can you, being a responsible student and citizen, avoid a potential technology crime such
as cybersex, virtual prostitution and the like?
28
CHAPTER 6. TECHNOLOGY AND PRIVACY
Overview: Most people know by now social media isn’t free – it’s paid for with the collection of
its users’ sometimes-sensitive information. Your GPS system keeps track of your movements
and your smart TV or webcam can watch you. Almost all the information these devices collect
can be sold to companies or used by government and law enforcement to keep tabs or gather
evidence. At the same time, we use technology so frequently as a society because it allows us
to do things faster and with much less efforts.
Learning Objectives:
• Understand professional, ethical, legal, security and social issues and responsibilities
in the utilization of information technology
6.1 IDENTITY THEFT - also known as identity fraud, is a crime in which an imposter obtains key
pieces of personally identifiable information (PII), such as Social Security or driver's license
numbers, to impersonate someone else.
The taken information can be used to run up debt purchasing credit, goods and services
in the name of the victim or to provide the thief with false credentials. In rare cases, an imposter
might provide false identification to police, creating a criminal record or leaving outstanding arrest
warrants for the person whose identity has been stolen.
1. Financial identity theft. This is the most common type of identity theft. Financial identity theft
seeks economic benefits by using a stolen identity.
2. Tax-related identity theft. In this type of exploit, the criminal files a false tax return with the
Internal Revenue Service (IRS). Done by using a stolen Social Security number.
3. Medical identity theft. Where, the thief steals information like health insurance member
numbers, to receive medical services. The victim's health insurance provider may get the
fraudulent bills. This will be reflected in the victim's account as services they received.
• Criminal identity theft. In this example, a person under arrest gives stolen identity
information to the police. Criminals sometimes back this up with a containing stolen
credentials. If this type of exploit is successful, the victim is charged instead of the
thief.
• Child identity theft. In this exploit, a child's Social Security number is misused to
apply for government benefits, opening bank accounts and other services.
Children's information is often sought after by criminals because the damage may
go unnoticed for a long time.
• Senior identity theft. This type of exploit targets people over the age of 60.
Because senior citizens are often identified as theft targets, it is especially
29
important for this seniors to stay on top of the evolving methods thieves use to
steal information.
1. Mail theft. This is stealing credit card bills and junk mail directly from a victim's mailbox or from
public mailboxes on the street.
2. Dumpster diving. Retrieving personal paperwork and discarded mail from trash dumpsters is
an easy way for an identity thief to get information. Recipients of preapproved credit card
applications often discard them without shredding them first, which greatly increases the risk
of credit card theft.
3. Shoulder surfing. This happens when the thief gleans information as the victim fills out
personal information on a form, enter a passcode on a keypad or provide a credit card number
over the telephone.
4. Phishing. This involves using email to trick people into offering up their personal information.
Phishing emails may contain attachments bearing malware designed to steal personal data or
links to fraudulent websites where people are prompted to enter their information.
MONITORING
Employers are justifiably concerned about threats to and in the workplace, such as theft
of property, breaches of data security, identity theft, viewing of pornography, inappropriate and/or
offensive behavior, violence, drug use, and others. They seek to minimize these risks, and that
often requires monitoring employees at work. Employers might also be concerned about the
productivity loss resulting from employees using office technology for personal matters while on
the job. At the same time, however, organizations must balance the valid business interests of
the company with employees’ reasonable expectations of privacy.
Magnifying ethical and legal questions in the area of privacy is the availability of new
technology that lets employers track all employee Internet, e-mail, social media, and telephone
use.
([Link]
30
INTRUSION/INVASION OF PRIVACY
An invasion of privacy is considered to be a tort. A tort is a wrongful act that causes injury
or loss to someone resulting in legal responsibility for the wrongful act.
a. Deception
One type of invasion of privacy, in some states, is called deception. Deception occurs when
an employer collects information he claims is for one reason but uses it for another reason,
which could result in the employee's termination.
An example of deception is if an employer sets up a blood drive and tells employees that
donations will be used to aid a local blood bank. The blood drawn from employees is tested for
drugs as part of the process. The employer could be accused of deception if he uses the drug
results as a reason to terminate employees if employees did not consent to being drug tested.
b. Violation of Confidentiality
A second type of invasion of privacy is violating an employee's confidentiality. This occurs
when information given in confidence is then given to a third party.
For example, an employee has a wife and children but decides to leave his insurance
policy to an unrelated female coworker. If the human resources manager reveals this
confidential information to another employee, it is considered an invasion of privacy.
We are currently living in the "information age," which can be defined as a period in which
most economic activities are based on information. What impact do you believe technology has
on people's private lives?
31
CHAPTER 7. INFORMATION WARFARE
Overview: into their political intentions and decision making process. Information warfare opens new
avenues for the conduct of politico-military operations. On the low level of the conflict spectrum,
covert intrusion into an opponent's command and control system may provide unique insight
Learning Objective:
• Understand professional, ethical, legal, security and social issues and responsibilities in
the utilization of information technology
Information Warfare (IW) – is a concept involving the battlespace use and management
of information and communication technology (ICT) in pursuit of a competitive advantage over an
opponent. IW is the manipulation of information trusted by a target without the target’s awareness,
so that the target will make decisions against their interest but in the interest of the one conducting
information warfare. As a result, it is not clear when information warfare begins, ends, and how
strong or destructive it is. Information warfare may involve collection of tactical information,
assurance(s) that one’s own information is valid, spreading of propaganda or disinformation to
demoralize or manipulate the enemy and the public, undermining the quality of opposing force
information and denial of information-collection opportunities to opposing forces. Information
warfare is closely linked to psychological warfare.
a. Information Collection
Information collection is included as part of information warfare because “[t]he information
revolution implies the rise of a mode of warfare in which… the side that knows more… will enjoy
decisive advantages,”. The idea is that the more information one has, the higher his/her situational
awareness, which leads to better battle plans and, hopefully, better outcomes. According to Singh,
“[t]ill recently, knowing your position and that of the friendly forces was itself a huge task. Precision
position locating technologies such as navigation based on the Global Positioning System (GPS)
32
has eased those problems to a large extent. Knowing the position of the enemy has also been
made possible to a degree through employment of renaissance and surveillance technologies.”
In information warfare, information collection is much less dangerous and much more complete
because these technologies can be used to infiltrate situations and gather accurate information
with minimal loss of fidelity.
b. Information Transport
Collecting a large amount of comprehensive information is certainly good practice, but
collection is little value if the information sits in a storage facility, unused. As such, the ability to
transport information into the hands of those who need it, in a timely manner, is another essential
aspect of information warfare. The tools used in this domain are not exactly weapons, but rather
civilian technologies put to use in military situations. The most important of these tools is
communication infrastructure, composed of networks of computers, router, telephone lines, fiber
optic cable, telephones, televisions, radios, and other data transport technologies and protocols.
Without these technologies, the ability to transport information in the real-time fashion required
by today’s standards would be impossible.
c. Information Protection
One of the most broadly agreed upon aspects of information warfare is the need to
minimize the amount of information to which your opponent has access. A large part of this is
protecting the information you have from capture by the other side. The weapons used to protect
the security of our information fall in two classes. First are those technologies that physically
protect our vital data storage facilities, computers, and transport mechanisms, including bomb
and bullet proof casings and intrusion prevention mechanisms such as locks and fingerprint
scans. Second, and perhaps more important, are technologies that prevent bits from being seen
and intercepted by the enemy. This certainly includes basic computer security technologies such
as passwords, as well as more sophisticated technologies like encryption.
d. Information Manipulation
The final aspects of information warfare, according to our earlier definition, are
disturbance, degradation, and denial. All three techniques are means to the same general end –
preventing the enemy from getting complete, correct information. Because of their similarity, many
of the same weapons are used to achieve one or more of the goals. As such, it makes sense to
discuss them together. Some of the more popular weapons used to wage these types of
information warfare are spoofing, noise introduction, jamming, and overloading.
33
The integrated use of operations security, military deception, psychological operations,
electronic warfare, and physical destruction, mutually supported by intelligence, to deny
information to, influence, degrade, or destroy adversary command and control capabilities, while
protecting friendly command and control capabilities against such actions.
2. Intelligence-Based Warfare
Intelligence-Based Warfare is a unique concept, you wouldn’t know what parts of the
network to destroy in order to disrupt decision making if you didn’t have good intelligence.
3. Electronic Warfare
Electronic Warfare are those techniques that enhance, degrade or intercept the flow of
information electronically. Any military action involving the use of electromagnetic energy to
determine, exploit, reduce or prevent hostile use of electromagnetic spectrum and action which
retains friendly use of the electromagnetic spectrum.
4. Psychological Warfare
The term used “to denote any action which is practiced mainly by psychological methods
with the aim of evoking a planned psychological reaction in other people”. Psychological Warfare
are planned operations to convey selected information and indicators to audiences to influence
their emotions, motives, objective reasoning and ultimately the behavior of organizations, groups,
and individuals.
5. Hacker Warfare
Hacker Warfare is probably the most familiar portion of Information Warfare for most of
us. This type of warfare is also known as Computer Network Operations (CNO) and is often
portrayed in movies and headlines. One of the biggest areas of IW where the military and civilian
lines get mixed up and you start to see military attacks on civilian companies to gain a desired
effect on an enemy.
7. Cyberwarfare
It is the use of information systems against the virtual personas of individuals or groups.
It is the use of computer technology to disrupt the activities of a state or organization, especially
the deliberate attacking of information systems for strategic or military purposes.
Take this into the cyber world, and the spies are armies of nefarious hackers from around
the globe who use cyber warfare for economic, political, or military gain. These deliberately
recruited and highly valued cybercriminals have the technical know-how to shut down anything
from government infrastructures to financial systems or utility resources. They have influenced
34
the outcome of political elections, created havoc at international events, and helped companies
succeed or fail.
Many of these attackers use advance persistent threats (APTs) as their modus operandi
to stealthily enter networks or systems and remain undetected for years and years.
([Link]
35
publicly available source (as opposed to covert or clandestine sources). It is not related to open-
source software or public intelligence.
OSINT under one name or another has been around for hundred of years. With the advent
of instant communication and rapid information transfer, a great deal of actionable and predictive
intelligence can now be obtained from public, unclassified sources.
As sensitive information is often encrypted, signals intelligence in turn involves the use of
cryptanalysis to decipher the messages. Traffic analysis – the study of who is signaling whom
and in what quantity - is also used to derive information.
Technical intelligence is intended primarily to allow the armed forces to avoid technological
surprise. Knowledge of the characteristics and capabilities or enemy weapons allows nations to
develop effective countermeasures for them. Occasionally, armed forces adopt technology
developed by foreign nations.
8. Financial Intelligence (FININT) – is the gathering of information about the financial affairs of
entities of interest, to understand their nature and capabilities, and predict their intentions.
Generally, the term applies in the context of law enforcement and related activities.
One of the main purposes of financial intelligence is to identify financial transactions that
may involve tax evasion, money laundering or some other criminal activity. FININT may also be
involved in identifying financing of criminal and terrorist organizations.
With the guarantee of a promising career move, your superior directed you to obtain highly
sensitive information from a competitor company. Would you accept or decline the offer, and why?
36
CHAPTER 8. E-HEALTH
OVERVIEW: e-Health is an emerging field in the intersection of medical informatics, public health and
business, referring to health services and information delivered or enhanced through the Internet and
related technologies.
Learning Objectives:
• Identify and analyze user needs and take them into account in the selection, creation,
evaluation and administration of computer-based systems
e-Health – the term characterized not only a technical development , but also a state-of-mind, a
way of thinking an attitude, and commitment for networked, global thinking, to improve a
healthcare locally, regionally and worldwide by using information and communication technology.
(Journal of Medical Internet Research)
The cost effective and secure of information and communication technologies in support
of the health and health-related, health surveillance and health education, knowledge and
research. (World Health Organization WHO)
8.1 TELEMEDICINE
Telemedicine is the practice of medicine using technology to deliver care at a distance.
A physician in one location uses a telecommunications infrastructure to deliver care to a patient
at a distant site.
[Link]
TYPES OF TELEMEDICINE
2. Store-and-Forwards
Also known as asynchronous telemedicine. Store-and-Forward telemedicine allows
provides to share patient information such as lab results, with physical at another location.
37
3. Inter-active Telemedicine
Allows physicians and patients to communicate real-time. Such sessions can be
conducted in the patient’s home or in nearby medical facility and include telephone conversation
of the use of video conferencing software that complies with Health Insurance Portability and
Accounting Act Regulations.
ADVANTAGES OF TELEMEDICINE:
1. Convenience – Patients do have to take away from work for an appointment. There is also
travel time or associated expenses, such as paying for gas of child care.
1. Increased Access – Patients in rural areas can obtain specialty services more easily. Patients
who live in underserved areas have increase accessed primary, dental and mental healthcare.
2. Reduced cancellations or no-shows – Because of its convenience, telemedicine can reduce
the number of cancellations or no-shows. Providers can reach out prior to or at the appointment
time if the patient forgot about the appointment.
3. Encourage Healthy Lifestyle choices – allows providers to encourage their patients’ healthy
lifestyle choices, such as smoking cessation.
DIS-ADVANTAGES OF TELEMEDICINE
a. Inability to prescribe medications – many states generally do not allow online prescribing
(not to be confused with e-prescribing) without an established relationship between the physician
and patient.
b. Technical Training and Equipment – provides need to be trained on how to use telemedicine
equipment. There are also the associated costs of the equipment, such as integrated
telemedicine carts and encounter management software, to consider. The start-up cost of
implementing telemedicine may be especially prohibited to rural facilities.
c. Licensing Issues – certain states may required providers who practice telemedicine across
state lines have a valid license in the state where the patients is located.
Virtual therapy is therapy that takes place via the phone, an app, a video chat, or even a
virtual reality device. These virtual therapy options allow people to seek treatment in the comfort
of their own home, without having to travel to see a therapist in person.
Virtual therapy is a type of telemedicine. It includes any treatment that a person seeks
through an electronic device.
38
• the use of online devices to assess clients or patients remotely — for instance, when a
speech therapist uses online tools to measure progress
In theory, any treatment that does not require physical contact or laboratory testing can
work on a virtual platform. The most prevalent types of virtual therapy include:
A newer form of virtual psychotherapy uses apps or coaching to improve mental health.
This approach is not a form of traditional therapy because a person does not get care from a
licensed practitioner. Instead, they might monitor their own symptoms over time, get virtual
coaching from a bot, or receive daily mental health tips.
2. Virtual physical therapy - offers traditional care but in an online or phone-based setting. A
physical therapist might discuss recent symptoms, recommend exercises, or administer
screenings.
In some cases, a therapist might ask a client to perform exercises and then use a camera
to evaluate their form and progress.
3. Virtual speech therapy - can treat a range of speech disorders, such as a stutter, aphasia
from a stroke, or pronunciation difficulties.
In a virtual session, a therapist may evaluate a person’s speech, offer them strategies for
correcting speech issues, or help them practice new speech patterns. An emerging form of virtual
speech therapy uses bots in place of real people to improve speech.
Virtual speech therapy apps are also available to help people work toward their speech
goals between sessions or track speech changes over time.
4. Virtual occupational therapy - helps people master specific life skills. People often use it in
conjunction with other types of treatment. For example, a person with speech issues resulting
from a stroke might choose speech therapy, then use occupational therapy to help them master
the motor skills necessary to use a speech assistive device.
39
BENEFITS AND DISADVANTAGES
Benefits
a. Virtual therapy is relatively new, and researchers have not thoroughly tested every type of
treatment. However, preliminary research suggests that it could be effective.
For example, a 2020 study of virtual physical therapy following knee surgery found that
virtual therapy offered similar benefits to in-person treatment. It also significantly lowered costs.
The authors of a 2017 systematic review also suggested that telemental health services
provide a quality of care and outcomes similar to those of traditional mental healthcare.
• Increased access to care: People who have physical disabilities, are geographically
isolated, or do not have time to drive to therapy can access treatment with virtual options.
• More privacy: Well-managed virtual therapy means that a person can get care in the
privacy of their own home, without having to sit in a waiting room or interact with other
clients.
• Cost savings: Virtual therapy may cost less. The overheads may be lower for the
therapist, particularly if they switch to an exclusively online model of care.
• Client satisfaction: Most research on satisfaction following virtual therapy suggests that
clients are at least as satisfied with it as they are with traditional care. For some people,
seeking virtual care may be less stressful, greatly increasing satisfaction.
Disadvantages
Some drawbacks of virtual therapy include:
• Data concerns: If a therapist chooses the wrong platform or does not encrypt therapy
sessions, a third party might violate a client’s privacy. If a client seeks care on a public
network or leaves their computer unlocked, their colleagues or housemates may be able
to view their sessions.
• Relationship concerns: Depending on the modality the client chooses, it may be harder
to form a trusting relationship with the therapist. For instance, email-based therapy
removes body language and voice tone cues, potentially causing communication issues.
• Technological limitations: Slow networks, low quality video, and chat delays can make
therapy more difficult.
• Technological expertise and philosophy: People who are not comfortable with
technology may feel less comfortable with or more anxious about virtual treatment.
[Link]
People are afraid to leave their homes as a result of the global pandemic, and even going
to the hospital is a concern. On the other hand, we were introduced to e-Health and Telemedicine
as a result of this. Do you believe this method is effective and can be used even after the virus
has been eradicated?
40
CHAPTER 9. ONLINE CRIMES
Overview: Cyber crimes are criminal offenses committed via the Internet or otherwise aided by
various forms of computer technology, such as the use of online social networks to bully others
or sending sexually explicit digital photos with a smart phone. But while cyber crime is a relatively
new phenomenon, many of the same offenses that can be committed with a computer or smart
phone, including theft or child pornography, were committed in person prior to the computer age.
Learning Objective:
• Understand professional, ethical, legal, security and social issues and responsibilities in
the utilization of information technology
9.1 HACKING
- - refers to unauthorized intrusion into a computer or a network. The person engaged in hacking
activities is known as hacker, This hacker may alter system or security features to accomplish a goal
that differs from the original purpose of the system.
TYPES OF HACKER
1. WHITE HACKERS – are the good guys of the hacker world. They typically have a strong
IT security background, and may even be certified as an ethical hacker. They are
sometimes called “penetration testers”.
2. BLACK HAT HACKERS – are the one’s you hear about in the news. They gain access
to information from banks or other businesses and typically steal money, credit card
information or proprietary data.
3. GRAY HAT HACKERS – are hackers who hack for their own purpose but don’t steal
money or information, and typically don’t do it to help others.
4. GREEN HAT HACKERS – are the black hat hackers who are just starting out in the
hacking world.
5. RED HAT HACKERS – are the vigilante who go after the black hat hackers using
aggressive hacking methods.
HACKING TECHNIQUES
1. VULNERABILITY SCANNER – checks the computers on networks for known
weaknesses.
41
3. PACKET SNIFFER – applications that capture data packets in order to view data and
passwords in transit over networks.
4. SPOOFING ATTACK – involves websites which falsify data by mimicking legitimate sites,
and they are therefore treated as trusted sites by users or other programs.
5. ROOT KIT – represents a set of programs which work to subvert control of an operating
system from legitimate operators.
6. TROJAN HORSE – serves as back door in a computer system to allow an intruder to gain
access to the system later.
8. KEY LOGGERS – tools designed to record every keystroke on the affected machine for
late retrieval.
9.2 SPAMMING
These being said, here are Five of the most common methods spammers use and how you
can effectively protect yourself against them.
• Comment Spam. Comment spam is awful. ...
• Trackback Spam. Trackbacks were created with the intention of being useful. ...
• Negative SEO Attack. ...
• Spiders, Bots and DDoS Attacks. ...
• E-mail Spam.
Spoofing - A technique used to gain unauthorized access to computers, whereby the intruder
sends messages to a computer with an IP address indicating that the message is coming from a
trusted host
Terrorism, per se, is the calculated use of violence to create a general climate of fear in
a population and thereby to bring about a particular political objective. Terrorism has been
practiced by political organizations with both rightist and leftist objectives, by nationalistic and
religious groups, by revolutionaries, and even by state institutions such as armies, intelligence
services, and police.
42
accomplished by the sending of a virus or worm or through the launching of denial-of-service
attack.
9.4 ONLINE FRAUD - is a type of cybercrime fraud or deception which makes use of
the Internet and could involve hiding of information or providing incorrect information for the
purpose of tricking victims out of money, property, and inheritance. [1] Internet fraud is not
considered a single, distinctive crime but covers a range of illegal and illicit actions that are
committed in cyberspace. It is, however, differentiated from theft since, in this case, the victim
voluntarily and knowingly provides the information, money or property to the perpetrator. It is also
distinguished by the way it involves temporally and spatially separated offenders.
43
Scammers, thieves, and saboteurs abound on the internet, making it a dangerous place
to be. It's no surprise that cybercrime is on the rise, given the prevalence of smartphones and
social media that track our every move. In the event of an online crime, how can you protect
yourself?
44
CHAPTER 10. E-LIFESTYLE
Overview: E-lifestyle as patterns in which people live and spend their time and. money through
Internet and electronic mediums. E-lifestyle has been associated with information and
communication technology enabled products and services
Learning Objective:
In modern times, we can trace the desire to call certain behaviors without drugs
“addictions” to the rise and popularity of coin-operated and home video games in the 1970s and
1980s. Parents watch their children move from spending hours in front of the television to
spending hours in front of a video game (or going to the video arcade to escape their parents’
watchful eye). The following pronouncements were not uncommon in the research literature at
the time:
“It is suggested that the potential usefulness or harm of video games is still open to
empirical validation; however, the potential for abuse is inherent” (Soper & Miller, 1983).
Video game addiction, also known as gaming disorder or internet gaming disorder, is
generally defined as the problematic, compulsive use of video games that results in significant
impairment to an individual’s ability to function in various life domains over a prolonged period of
time.
These games are played online with other people and are especially addictive because
they generally have no ending. Gamers with this type of addiction enjoy creating and temporarily
becoming an online character. They often build relationships with other online players as an
escape from reality.
45
1. Convenience of online shopping
Customers can purchase items from the comfort of their own homes or work place.
Shopping is made easier and convenient for the customer through internet. It is also easy to
cancel the transactions.
2. No pressure shopping
Generally, in physical stores, the sales representatives try to influence the buyers to buy
the product. There can be some kind of pressure, whereas the customers are not pressurized in
any way in online stores.
4. Comparisons
Companies display the whole range of products offered by them to attract customers with
different tastes and needs. This enables the buyers to choose from a variety of models after
comparing the finish, features and price of the products on display, Sometimes, price comparisons
are also available online.
6. Online tracking
Online consumers can track the order status and delivery status tracking of shipping is
also available.
1. Delay in delivery
Long duration and lack of proper inventory management result in delays in shipment.
Though the duration of selecting, buying and paying for an online product may not take more than
46
15 minutes; the delivery of the product to customer’ s doorstep takes about 1-3 weeks. This
frustrates the customer and prevents them from shopping online.
People like to visit physical stores and prefer to have close examination of good, though
it consumes time. The electronic images vary from physical appearance when people buy goods
based on electronic images.
The word blog is actually a shortened form of its original name, "weblog." The content of
blogs varies significantly. For example, travel blogs may feature many pictures with few written
47
passages, while political blogs may weigh in with wordy takes on the news of the day. The
popularity of YouTube and similar sites also gave rise to video blogging, or "vlogging."
Blogging refers to writing, photography, and other media that's self-published online. Blogging
started as an opportunity for individuals to write diary-style entries, but it has since been
incorporated into websites for many businesses.
Some people are confused over what constitutes a blog over a website. Part of the
confusion stems from the fact that many businesses use both, usually by adding a blog section
to the company website. However, there are two features of a blog that set it apart from a
traditional website.
First, blogs are updated frequently. Whether it's a mommy blog in which a woman
shares adventures in parenting, a food blog sharing new recipes, or a business providing updates
to its services, blogs have new content added several times a week. Websites might occasionally
have new information, but for the most part, they offer static information that rarely changes.
Secondly, blogs allow for reader engagement. Blogs and social media accounts often
go hand-in-hand because they serve a similar purpose of connecting an audience with each other
and the content creator. Some websites may incorporate features that allow for conversation, but
generally speaking, a blog allows for more conversation and interaction than a traditional website
does.
[Link]
SOCIAL NETWORKS
Is a web site that creates an online community of Internet users that enables members to
break down barriers created by time, distance and cultural difference.
Social networking web sites allow people to interact with others online by sharing opinions,
insights, information, interests and experiences. Members of an online social network may use
the site to interact with friends, family members and colleagues – people they already know – but
they may also make use of the site to develop new personal relationships.
PERSONAL WEBSITES
Personal web pages are world wide web pages created by an individual to contain
content of a personal nature rather than content pertaining to a company, organization or
institution.
Resumes are boring. Career experts tell you to make your resume a one-page, size 11
Time New Roman document printed with black ink with no pictures. Seriously? How are you
supposed to represent — and differentiate – yourself with that? Plus, your resume becomes static
48
and outdated the moment you hand it to someone. You can’t update resumes you’ve already given
out – you have to make new copies.
That’s why you need to create a personal website.A website is the complete
opposite of a resume. Everything bad about resumes can be fixed simply by having a website. I’d
go as far as to say that not having a website is like shooting yourself in the foot – it’s that useful.
b. Having a website makes you more findable. If all you have is a resume, you have to go
out and hand it to people to get your name out. If someone wanted to look you up on the
internet and you didn’t have a website, all they might get is a Facebook or Twitter profile.
However, if you have a website, you can be found by a much wider
audience and control what it is they see first. This is key for establishing your personal
brand and for highlighting your accomplishments.
I’ve been offered jobs, met clients for my web design work, and gotten interviews
simply because I have a website. If I didn’t take the time to create one, I’m confident that I
wouldn’t have been found. Make sure you can be found!
c. Not many people have one. Personal websites may be more common in 2020 than they
were ten years ago, but the vast majority of students and job seekers are still relying on
resumes and job search websites.
Succeeding today requires that you make yourself stand out, and having a
website can help you do that. It shows that you’ve taken the time to learn how to do
something fairly technical, and it shows that you have some skills other people don’t
have.
d. You gain some new skills that can be very useful in the future. Learning how to build
a website involves a number of different skills, especially if you get into customizing and
optimizing things. Even if you’re not looking for a job in a tech field, having these skills
can give you a leg up.
Say you’re applying for a job in advertising. If you can tell the interviewer that
you’re not only a great marketer, but that you also have knowledge of the web, you
become a much more attractive candidate.
What are the differences between working from home versus working in an office? Let’s
compare them side-by-side to help you understand the unique advantages and disadvantages of
each.
49
Research from Owl Labs suggests that approximately half of employees typically work
from home at least once a week and a third work remote jobs full-time.
Many organizations have shifted their tools and systems for remote teams for the first time
due to the COVID-19 pandemic. For employees and employers, this is a major adjustment.
a. Commuting
The average American worker spends at least 27 minutes on their daily commute to work,
and it is getting worse. More than 14 million people spend an hour or more traveling to work,”
according to NPR.
That’s a lot of time you can save by becoming a telecommuter! Telecommuting is another
way to say working remotely or from home by making full use of the internet, email, and phone.
However, some folks enjoy waking up early, getting ready, and having the separation of
home and the office. This is why many folks who work remotely still opt to go to a coffee shop or
a coworking space.
The bottom line is people hate commuting. Work-life balance continues to surge on the
importance meter for modern-day employees. Companies that don’t recognize this are missing a
huge opportunity to adopt work from home strategies that benefit their workforce.
A poll posted by CEO of Product Hunt, Ryan Hoover, suggests that most people would
take a pay cut if it gave them the ability to work remotely. Perks like infinite vacation time, free
food, and 401k weren’t as important when compared to the benefits of working remotely.
b. Communication
According to research from our 2020 State of Business Communication Report, face-to-
face communication is the most preferred communication method by employees.
Not counting video conferencing, face-to-face communication is something you really only
get in an office space. It’s not only beneficial when planning for business, but it strengthens
relationships and rapport with other employees. There’s something about relationship-building
that happens when you sit next to someone or bump into each other at the coffee machine.
Communication still happens when you’re working remotely — it’s just different. Face-to-
face communication turns into video calls. Short conversations turn into Slack messages. Emails
… well, those stay emails. Nobody escapes those!
One compelling advantage of working from home is the ability to work anywhere. You
don’t even need a laptop. With a full-featured business phone app, employees can make and
receive calls, attend conference calls, message colleagues, and stay online using their iPhone or
Android.
To improve communication for remote employees, we’ve seen many organizations require
video conferencing over traditional phone calls when communicating with coworkers. Teams
should have conference calls to align themselves with business goals. For fun, employees can
even host online game nights to get to know each other outside of office life.
50
Some teams even rely on social media for communication. For example, [Link] says
they use Snapchat internally for team building. It’s a cool and clever way to use social media to
stay connected while working remotely.
c. Flexibility
When working from an office, it’s likely you have a set schedule. Your alarm goes off at
the same time every day, you grab your morning coffee at 7:05 am, and you’re at your desk by 9
am ready to work.
When it comes to working from home, it’s a little different. You now have the flexibility to
wake up when you choose and tailor your day to your needs. If your company is new to remote
work, chances are they still want all employees working the traditional work hours of 9-to-5. With
remote work, you can now wake up (a little) later, pick a time for lunch, and close your laptop
when you want — for some, that’s 4 pm, others it could be 7 pm.
As more companies adopt a remote-first policy, working hours will shift to fit the
employee’s schedule. This shift means more flexibility on when you start and end your day and
where you work from. You should be able to work from anywhere that has a solid internet
connection!
The option to freelance and take on side projects is another massive benefit that comes
with working from home. The time you waste on commuting could be put toward taking on side
projects or freelancing. It’s far more lucrative than sitting through traffic jams!
(“Working From Home vs. Working in an Office: Pros & Cons” by JEREMY BOUDINET
[Link]
There are benefits and drawbacks to both online shopping and working from home. Given
all of the possibilities, do you think your lifestyle will improve and become more worry-free?
51
CHAPTER 11. E-LEARNING AND DISTANCE EDUCATION
Overview: E-Learning can play a more support role of the teaching-learning activities organized
in the class. As a result, a teacher may take its use for his better teaching and learning for his
needed learning, e.g. they may use multimedia, internet and web services for their teaching and
learning to enhance their classroom activities. Distance learning includes no in-person
interaction between teachers and students.
Learning Objective:
• Recognize the need for and engage in planning self-learning and improving performance
as a foundation for continuing professional development
Corporate training about topics such as security awareness and harassment often include
difficult concepts for employees to adopt but using alternative training methods such as e-
Learning can be a great way to make such an important and serious topic engaging and easy to
comprehend. In fact, corporate e-Learning has grown by 900% in the past 16 years, and an
Association for Talent and Development (ATD) report found that almost 90% of companies offer
digital learning today.
BENEFITS OF CBT
52
The best way to retain information learned during training is to regularly reinforce it. The
cost of hiring someone to train employees and improve retention can be a large financial burden.
E-Learning allows you to deploy courses to large or small groups of employees in a variety of
time lengths to achieve optimal retention levels.
Additionally, new technology, such as virtual reality, provides engaging and immersive
content that can be accessed by smartphones, thereby freeing users up from desktop computers.
Role-playing can also give learners the opportunity to work through realistic situations with their
coworkers. By handling the learning experience in these unique ways, employees can really get
involved and engaged with training, making the content much more memorable.
5. Enhancing Competitiveness
In a survey by [Link], almost 72% of organizations said that online learning is
instrumental in enhancing their competitive edge. Organizations should consider offering
incentives to individuals or departments in order to increase participation and create a positive
mentality around required training.
Online education is electronically supported learning that relies on the Internet for
teacher/student interaction and the distribution of class materials.” From this simple definition
comes an almost infinite number of ways to teach and learn outside of traditional classrooms and
away from college campuses
53
a. Flexibility. Students have the freedom to juggle their careers and school because they
aren't tied down to a fixed schedule.
b. Reduced Costs. Online education can cost less due to a variety of reasons.
c. Networking Opportunities.
d. Documentation.
e. Increased Instructor - Student Time.
f. Access to Expertise.
DISTANCE LEARNING
Distance education or distance learning is the education of students who may not
always be physically present at a school. Traditionally, this usually involved correspondence
courses wherein the student corresponded with the school via post. Today, it involves
online education.
54
c. Some courses required to complete a degree may not be available online.
Sometimes universities make many required courses online to give students a feel of their
teaching methodologies, quality, and value. After you complete those courses, to get the
degree you might be required to attend some classes in person. These classes will most
likely be less affordable, or you will not be able to travel to the university to take them.
d. You need to be technologically savvy. If you are a person who is not as comfortable to
working with technology, then distance learning will not suit you. Distance learning
requires students to be able to operate with at least a minimum knowledge of different
chat rooms, online examinations, and interaction, and many people do not feel
comfortable if they do not even have physical material to study from.
The days when distance and online education were just beginning to become more visible
and accessible, piqued students' interest, are long gone. Online learning is almost as popular as
on-campus learning these days. Which method of learning, face-to-face or e-learning, do you
believe is more effective?
55
LET’S ASSESS WHAT YOU HAVE LEARNED:
In your opinion, which method of learning is more effective: face-to-face or e-Learning?
Justify your answer in a whole sheet of yellow paper. Submission of the paper is at end of term.
56