Sei sulla pagina 1di 3

SH1724

Developing an ICT Project

Creating a Concept Paper


This allows experts to see if your project is doable over the time frame that was given and if it is
significant enough to be made into reality.

A concept paper is a document used to convince a panel of potential funders to help a product, program,
or service become a reality. Your teacher will pay the role of the sponsor and you have to convince
him/her that your project is worth your time and effort.

Five Elements of a Concept Paper

1. Introduction – includes your group’s mission and vision and a brief introduction of your project
2. Purpose – includes the reasons why this project is worth your group and your sponsor’s time,
effort, and money
3. Description – includes all the necessary information about the project. In ICT, it involves the
sites you are going to produce and the purpose of each and how they work in unison.
4. Support – contains the budget needed for the project. Some concept papers do not specify any
amount requested from the sponsor.
5. Contact Information – includes information on how the group can be contacted

Simplified ICT Project Process Overview

Planning Development Release and


Maintenance
Information

1. Planning – involves the following tasks (but not limited to):


a. Conceptualizing your project
b. Researching on available data about your topic
c. Setting deadlines and meetings
d. Assigning people to various tasks
e. Finding a web or blog host
f. Creating a sitemap for your website
g. Listing down all applications that you need including web apps
h. Funding (if applicable)
2. Development – involves the actual creation of the website(s); involves the production of
images, infographics, etc.
3. Release and Promotion – involves the actual release of the website for public view and
promoting it. The promotion typically starts before the actual release.
4. Maintenance – involves responding to the feedback from your site visitors and continuing to
improve the website.

05 Handout 1 *Property of STI


Page 1 of 3
SH1724

The Disadvantage of ICT

Walking on a sidewalk does not pose danger as opposed to walking in the middle of the street. Remove
the sidewalk and you are left to dodge approaching vehicles. That is probably how much of us deal
with the Internet. On the Internet, there are no sidewalks; just a huge superhighway where information
freely flows through. If in the real world we have the police or the military to monitor us, the Internet
is unmonitored making it one of the most abused technologies we use.

Cybercrimes
Cybercrimes are illegal acts done through the use of the Internet. In 2012, here are the ten most
common Internet cybercrimes:

1. Phishing/Spoofing – The act of sending multiple emails to multiple users in hopes of having a
number of them clicking on the links or malware attached to the email. Most email services
today have spam or bulk folders that automatically put these suspicious emails to that folder.
However, this is not 100% accurate that some emails are not filtered and some other emails
that are legitimate end up on the spam folder.
2. Blackmail/Extortion – the act of using the Internet to threaten or damage someone’s reputation
to extort money or anything else of value. This can be avoided if you are aware of what you
should post on the Internet. The victims of this act tend to have posted something
“inappropriate” over the Internet even if they put it at a secure location.
3. Accessing Stored Communications – or hacking; the act of obtaining unauthorized access to
data from a computer network. This is typically done to commercial and government sites to
threaten its owner. In late 2014, a group of hackers hacked Sony’s website because of the
impending release of the controversial film “The Interview”.
4. Sports Betting – the act of wagering on any sports event over the Internet. In some countries,
gambling (including sports betting) is illegal even if you are doing it over the Internet.
5. Non-Delivery of Merchandise – the act of devising a scheme wherein the culprit posts an item
or service for sale on the Internet and once the transactions have been done, does not really
give an item or service.
6. Electronic Harassment – the act of anonymously using the Internet to harass, abuse, threaten
or annoy another people. This is also an act of cyberbullying, however, because the culprit is
anonymous, it is hard to detect who is bullying you.
7. Child Pornography – the act of using the Internet to show child pornography. This act is highly
punishable by law.
8. Prostitution – the act of using the Internet to engage in prostitution
9. Drug trafficking – the act of selling illegal substances using the Internet
10. Criminal Copyright Infringement – the act of piracy mainly for financial gain. In late 2014, the
number one pirate website, The PirateBay, was raided for the second time due to years of
pirating movies, music, games, books, and other software. These kinds of websites earn money
through advertising.

The Internet in the Present and the future of your generation and you define what impact it can do to
shape our society, whether it is negative or positive. The future is in your hands.

05 Handout 1 *Property of STI


Page 2 of 3
SH1724

Combatting Cybercrimes
There are several ways the authorities can help solve or prevent cybercrimes. Here are some of them:
1. Network. Before s hacker can get through the unauthorized files he or she is targeting the hacker
has to get through several measures like firewalls, secure connections, passwords, anti-
malware, and data encryption. Encryption is the process of converting raw data into code.
However, these methods are not 100% secure and there will always be a way for a hacker to
hack.
2. Investigation. URL tracking and logging are used by websites to track your unique IP
addresses. This can be used by investigators to trace hackers. In piracy, trackers are used to
identifying the IP addresses currently sharing pirated file.
3. Penalties. More and more laws are being created and implemented today. Penalties include
both a fine and imprisonment.

Barnes, P. (n.d.). The history of information and communication technology (ICT). Retrieved March
2, 2015, from http://kshq.awardspace.com/downloads/Level 3 comm & dist vers of history &
e-commerce.doc
Rouse, M. (n.d.). ICT (information and communications technology - or technologies) definition.
SearchCIO TechTarget. Retrieved March 3, 2015, from
http://searchcio.techtarget.com/definition/ICT- information-and-communications-technology-
or-technologies

05 Handout 1 *Property of STI


Page 3 of 3

Potrebbero piacerti anche