Está en la página 1de 25

Module 1:

Information
The Social Media and
Communication
Technology
Online Ethics and Etiquette

Today
Premechanical Period

Mechanical Period

Electromechanical
Period

Electronic Period
Premechanical Period

1. Earliest known form of ICT (3000 BC -


2. Petroglyphs 3. Phoenician Alphabet
1450 AD)

6. Calculator 5. Libraries as data centers 4. Papyrus Plant


Mechanical Period
Electromechanical Period
1 1840 - 1940

2 Beginnings of telecommunications

3 Telegraph by William Cooke and Sir Charles Wheatstone

4 Telephone by Alexander Grahambell (1876)

5 Guglielmo Marconi developed the first radio in 1894.

6 Mark 1 - first large scale automatic digital computer in the U.S. created by Harvard
University in 1940.
Electronic Period
1940 - Present

advent of solid state devices or electronic devices.

ENIAC - Electronic Numerical Integrator and Computer)

Four main sections of Digital Computing: the late vacuum tubes period, the
transistors period, the integrated circuits period and the computer processors
The telegraph
The Pictogram
of Sumerian

The abacus The telephone

The eniac

The Pascaline

Analytical The
engine Transistor
ICT The fusion of hardware equipment, precise
software, GUI and effective
Today communications network.
The
TheWorld
WorldWide
WideWeb
Web

• The World wide WEB (www) is the system that enables you to access hypertext documents and other files
over the internet.
• It also refers to the collection of web sites connected to the internet world wide, together with the client
devices such as computers and cellphones that access its content.
• The Technology was proposed by Tim Berners-Lee in 1989, in which a data base and interface will be
implemented to associate links in readable documents.
• People go to the World Wide Web for directions, instructions, information, and even entertainment.
dynamic web pages that allow the users
to interact with the page.
Aims to improve Web 2.0 by adding user-
specific content through user preferences.
Features of Web 2.0

Folksonomy allows users to categorize and classify information using freely chosen keywords. Deals
with information tagging.

deals with how a site uses user information for a personalized content. The content is
Rich User Experience dynamic and responsive to user’s input.

means that those who view the website can also put their own information by means of
User Participation comments, reviews and evaluation.

Long Tail services that offer services on demand rather than on a one-time purchase.

contains how users would subscribe to a software only when needed rather than
Software as a Service purchasing them.
Several Problems in Web 3.0d

Compatibility

Vastness

Vagueness

Security

Logic
Trends in
ICT
Convergence
Mobile Technologies
Assistive Media
A nonprofit service for people who have visual and reading
impairments. A database of audio recordings is used to read to the
users.
Social Media

1. Social Networks
2. Bookmarking Sites
3. Social News
4. Media Sharing
5. Microblogging
6. Blogs and Forums
Formats
Social Media
Social Networks Bookmarking Sites Social News

Sites that allow you to connect with Sites that allow you to store and Sites that allow users to post their
other people with the same interest or manage links to various websites and own news items or links to other news
background. resources. sources.

Media Sharing Microblogging Blogs and Forums

Sites that allow you to upload and Sites that focus on short updates from Sites that allow users to post their
share media content like images, music the user and those subscribed to the user content. Other users are able to comment
and video. will be able to receive theses updates. on the said topic.
Research and Information Seeking
These are programs designed to search the World Wide Web based on keywords provided by the user. They return search results such as Web sites,
Web Search Engines files, photos, or other media files.

These Web sites dedicated to compile and index researches done by academic researchers, engineers, social scientists, and so on.
Research Indexing Sites

These are Web sites dedicated to teach and inform users focused on different areas. The delivery of information is similar to a
Massive Online Open Course classroom lecture setup, wherein lectures and assignments are delivered and submitted, respectively, online.
Sites or Tutorial Sites

These are Web sites that enable companies to post job vacancies and also accommodate job seekers by providing a resume-submission
Employment Web Sites facility.

This is a technology that uses electronic means to trade products and currencies.
Electronic Commerce It also includes any technology that introduces ease in business management and customer convenience.
Published Author’s
Name

Credible Web Sites

Rating, Number of
Viewers and Shares

Reference and Related


Articles
Online Ethics and Etiquette

Online Netiquette Netizen


ethics
focuses on the is the combination of the words refers to the person
acceptable use of online network and etiquette, and is who is a member or a
resources in an online defined as a set of rules for part of the online
social environment. acceptable online behavior. community
Online Ethics and Etiquette
Recognize that your cyber avatar, or your online representation, is not another world but an extension of your personality and the existing society that you are
part of.

Apply the values and conduct learned since childhood in the online extension of our society.

Keep in mind that there are laws existing in our society and on the Web,
1. Republic Act 10627 or Anti –Bullying Act of 2013
2. Republic Act 10175 or Cybercrime Prevention Act of 2012

Keep in mind that there are differences among the individuals you will interact with and read your published contents.

Everything published on the WWW should be considered as copyrighted or owned by another individual.

Be careful in selecting words to communicate.


spam phishin malware
refers to the g ausedsoftware or program
by an attacker
short term for malicious
software, which is a computer
transmission of software sent by attackers to
to obtain personal
unsolicited information
inflict chaos on computer’s
operation and processes.
messages.

También podría gustarte