You are on page 1of 10

Information technology is the use of computers and software

to manage information.

Developments of Information Technology.
In the 1960s and 1970s, the term information technology or (IT) was a
little known phrase that was use by those who worked in places like
banks and hospitals to describe the processes they use to store
information.
As time pass and technology advanced, such as with the advent of the
personal computer in the 1980s and its everyday use in the home
and the work place, the world moved into the information age.
Communication has advanced, from physical postal mail, to telephone
fax transmissions, to nearly instantaneous digital communication
through electronic mail or (e-mail).
The Information technology industry has turned out to be a huge
employer of people world wide, as the focus shifts in some nations
from manufacturing to service industries.
Nearly any positions that involves the intersection of computers and
information maybe considered part of this field.






This means trying to ensure customers satisfaction and build relationships
with the customers, rather than simply doing the work as quickly as
possible and billing the customer without further communication.

Business Information Technology
Business information technology is becoming a special trend in the
society where an individual is trained to adept at business and IT,
and to bridge the gap between the two.

Information systems
Information systems are environments that intent to
provide the most accurate, up-to-date, and relevant
information to individuals within a particular system.




Elements of a Computer System
A Computer system is composed of Hardware, software, data , and user elements
that exist within it.
Users- Information is only useful if it gets to the people who will
find it relevant and would make good use of it.
Hardware- the physical aspects of a computer system is
composed of species of Hardware. The term Hardware can
describe any piece of equipment that serves as a part of the
system.
Software- Software, on the other hand, are sets of logical
functions and procedures that enable computers to do various tasks
for its users.
Data- Is the primary element traded within a computer system.
Procedures- a list of rules created to regulate the use of a
computer system.
Types of Computers
Desktop computers
Laptops, Notebooks and Netbooks
Servers
Mainframes and Supercomputers
Other Types of Computers
Tablet Computers
Mobile Phones
Game consoles
Internet-enabled Televisions
Embedded Computers

Common uses of the computer
A. In Home Use
Home budget Searching for Jobs
Computer games Online Shopping
Entertainment Online Banking
Information
E-mail
Communication
Communication via Chatting/ Instant Messaging and as Mobile Connectivity
B. In business organization C. In Education Field
D. In medical field
Marketing Computers in Teaching and Learning Process Hospital Administration
Stock exchange Computer Based Training (CBT) Recording Medical History of patients
Banks Online Education Monitoring systems
Email Research Diagnosis of Diseases
Payroll system Institute Administration Life support system
Stock system Faster and Cheaper communications
Fax Clinical image processing
Documentation
Graphics
Presentation
Spreadsheet
Accounts Departments

E. In Industry F. In Computer Science
Automated Production system Data collection
Design systems Analysis and testing of data
Exchanging Information
Simulation of Different Events
Use of Computer in Medical Science
Uses of computer in Space Science

MANILA, Philippines Almost 9 out of 10 Filipino Internet users have been victimized
by cybercrime or a malicious activity on the Internet at one time or another, the
Department of Justice (DOJ) primer on facts and trends about cybercrimes
committed in the country, said on Tuesday.
The primer on Philippine cybercrime has been prepared by the DOJ as part of its
advocacy program to prevent abuses in cyberspace as the legality of the new law
against cybercrime is being deliberated in the Supreme Court.
In October 2012, the implementation of the new Cyber-crime Prevention Act of 2012
was suspended by the high tribunal for four months until Feb.6 following 15 petitions
seeking for the law to be declared unconstitutional wholly or partially. The high court is
set to hear on Jan.15 oral arguments on the law that became controversial because
of its provisions that included the criminalization of online libel.
In the three-page primer presented in a question and answer format, the DOJ said
that cybercrime has become one of the fastest growing crimes globally.
In the Philippines, the primer quoted a 2010 report of the security software firm
Symantec that as many as 87 percent of Filipino internet users (nearly nine out of 10)
were identified as victims of crimes and malicious activities committed online. These
included being victimized in activities such as malware (virus and Trojan) invasion;
online or phishing scams; sexual predation; and services in social networking site like
Facebook and Twitter.
From 2003 to 2012, the Anti-Transnational Crime Division (ATCD) of the Criminal
Investigation and Detection Group (CIDG) of the Philippine National Police (PNP)
looked into 2,778 referred cases of computer crimes from government agencies and
private individuals nationwide.




The primer defined cybercrime as a crime committed with or through the use of information
and communication technologies such as radio, television, cellullar phone, computer and
network, and other communication device or application.
Quoting the 2001 Budapest Convention on Cybercrime, the primer said there were four
types of cybercrime offenses against the confidentiality, integrity and availability of
computer data systems; computer-related offenses; content-related offenses and offenses
related to infringements of copyright and related rights.
The primer also noted that the first cybercrime case in the country was the controversial
case involving Onel de Guzman who in 2000 released the I Love You virus.
The case filed against De Guzman was dismissed at the first stage because there was no
law punishing the deed as of that time in May 2000 in the Philippines, it said.
The primer also said that two cybercriminals had been convicted for hacking under Republic
Act no. 8792 or the Electronic Commerce Act or the E-Commerce Act. The first conviction
involved a person caught hacking the government portal gov.ph and other government
websites while the other involved a person who used the Business Process Outsourcing (BPO)
call center provider Sitel Philippines Corporation to illegally secure credit card information
from the companys sister firm, Sitel USA.
Since the new law against cybercrime has been suspended, the government is dealing with
cybercrime-related cases using existing laws such as the E-Commerce Act, RA 9995 or the
Anti-Photo and Voyeurism Act of 2009, RA 9725 or the Anti-Child Pornography Act of 2009,
RA 9208 or the Anti-Trafficking in Persons Act of 2003, RA 8484 or the Access Device
Regulation Act of 1998 and RA 4200 or the Anti-Wire Tapping Law.

Use anti-virus software
Your net-savvy friend may tell you that he doesn't have anti-virus on his computer because it slows things
down. But look at it this way, one wrong click and he may have to make the entire college project from
scratch.
Ignore pop-ups
Pop-ups can contain malicious software which can trick a user into verifying something. "[But if and when
you do], a download will be performed in the background, which will install malware. This is known as a
drive-by download. Always ignore pop-ups offering things like site surveys on ecommerce sites, as they are
sometimes where the malcode is.

Lock down your FB account
Keeping a common password for all online accounts is a lot like having the same key for all locks. Only
difference being that it is a lot easier to get hold of the online key. Also never reuse your main email
password. But most online users own accounts in over a dozen sites. So either try and use clever variations
or start doing some really heavy memory-enhancement exercise.
Don't store your card details on websites
Err on the side of caution when asked if you want to store your credit card details for future use. Mass data
security breaches (where credit card details are stolen en masse) aren't common, but why take the risk?
The extra 90 seconds it takes to key in your details each time is a small price to pay.

If in doubt, block
Just say no to social media invitations (such as Facebook-friend or LinkedIn connection
requests) from people you don't know. It's the cyber equivalent of inviting home the guy
with an eye-patch who stares at you at the bus stop.

Book:
Business IT for Students
World Wide Web:
http://technology.inquirer.net/21557/87-of-filipino-internet-users-
have-been-victims-of-cybercrimes-doj

You might also like