SEARCH ENGINE OPTIMIZATION (SEO)

What is SEARCH ENGINE OPTIMIZATION (SEO)?

The Search Engine Optimization is the process of affecting the visibility of a website or a web page in in a web search engine’s unpaid results, often referred to as natural, organic or earned results.

Why do we need SEO?

We need Search Engine Optimization so that it performs well organic search. Ranking highly for search terms which are known as keywords increases the visibility of a website and leads to a higher number of visitors to the actual website.

We have Google, Bing, Yahoo, Mozilla are all examples of search engines and they have primary search results, where web pages and other content such as videos or local listings are shown and ranked based on what the search engine considers most relevant to users.

What does Search Engine Optimization do for us?

 Search Engine Optimization is the name given to an activity that attempts to improve search engine rankings. In search result Google displays links to pages it considers relevant and authoritative. Authority is mostly measured by analyzing the number and quality of links from other web pages.

What are Search Engine Optimization techniques?

  • White Hat SEO- techniques that search engines recommend as part of a good design.
  •  Black Hat SEO- techniques that search engines that do not approve and attempt to minimize the effect of. These techniques are also known as spamdexing.

What are the basics of SEO?

Every business with a Web site should make SEARCH ENGINES OPTIMIZATION trying to get your site as high up as possible on Google and Bing search results pages, a part of their growth strategy. At its most basic, “SEO” means finding ways to increase your site’s appearance in a web visitor’s search result.

How do we do Search Engine Optimization?

  • Commit yourself to the process. SEO isn’t a one-time event.
  • Be patient, SEO isn’t about instant gratification.
  • Ask a lot of questions when hiring an SEO company.
  • Become a student of SEO.
  • Have a web analytics in place at the start.
  • Build a great web site.
  • Include a site map page.
  • Make SEO-friendly URL’s.
Advertisements

Republic Act 8792- Philippines E-commerce Law

The Salient Features of Republic Act 8792


Section 6 to 13 It gives legal recognition of electronic data messages, electronic documents, and electronic signatures.

Section 16 Allows the formation of contracts in electronic form. Makes banking transactions done through ATM switching networks absolute once consummated.

Section 24 Parties are given the right to choose the type and level of security methods that suit their needs.

Section 25 and 26 Provides the mandate for the electronic implementation of transport documents to facilitate carriage of goods. This includes documents such as, but not limited to, multi-modal, airport, road, rail, inland waterway, courier, post receipts, transport documents issued by freight forwarders, marine/ocean bill of lading, non-negotiable seaway bill, charter party bill of lading.

Section 27 Mandates the government to have the capability to do e-commerce within 2 years or before June 19,2002.

Section 28 Mandates RPWeb to implemented. RPWeb is a strategy that intends to connect all government offices to the Internet and provide universal access to the general republic. The Department of Transportation and Communications , National Telecommunications, Commission, and National Computer Center will come up with policies and rules that shall lead to substantial reduction of costs of telecommunication and Internet facilities to ensure the implementation of RPWeb. Made cable, broadcast, and wireless physical infrastructure within the activity of telecommunications.

Section 29 Empowers the Department of Trade and Industry to supervise the development of e-commerce in the country. It can also come up with policies and regulations, when needed , to facilitate the growth of e-commerce.

Section 30 Provided guidelines as to when a service provider can be liable.

Section 31 and 32 Authorities and parties with the legal right can gain access to electronic documents, electronic data messages, and electronic signatures. For confidentiality purposes, it shall not share or convey to any other person.

The issues it address before and will be addressing now and in the the future

There are a lot of issues that address in R.A  8792 for example in E-commerce the consumer protection. Like buying online when we order or purchase some products. And essentially consists of the provision of products and services over electronic systems  such as the Emails,mobiles phones and Internet also. That’s why the R.A 8792 must be updated.


 The Cybercrime Prevention Act of 2012

Advantages and Disadvantages 

 

The Cybercrime Prevention Act of 2012

  1. Commission shall refer to the National Privacy Commission created by virtue of this Act.
  2. Consent of the data subject refers to any freely given, specific, informed indication of will, whereby the data subject agrees to the collection and processing of personal information about and or relating to him or to her. Consent shall be evidenced by written, electronic or recorded means. It may also be given on behalf of the data subject by an agent specifically by the data subject to do so.
  3. Data subject refers to an individual whose personal information is processed.
  4. Direct marketing refers to communication by whatever of any advertising or marketing material which is directed to particular individuals.
  5. Filing system refers to any act information relating to natural or juridical persons to the extent that, although the information is not processed by equipment operating automatically in response to instructions given for that purpose, the set is structured, either by reference to individuals or by reference to criteria relating to individuals, in such a way that specific information relating to a particular person is readily accessible.
  6. Information and Communication System refers to a system for generating, sending, receiving, storing or otherwise processing electronic data messages or electronic documents and includes the computer system or other similar device by or which data is recorded, transmitted or stored and any procedure related to the recording, transmission or storage of electronic data, electronic messages, or electronic document.
  7. Personal information refers to any information whether  recorded in a material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information to collect, hold, process, use, transfer or disclose personal information on his or her behalf.
  8. Personal information controller refers to a person or organization who controls the collection , holding , processing or use of personal information, including a person or organization who instructs another person or organization to collect, hold, process, use, transfer or disclose personal information on his or her behalf.

Provisions of the Law are significant to E-commerce

  • Illegal Access – The access to the whole or any part of a computer system without right.
  • Illegal Interception – The interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data.
  • Data Interference – The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses.
  • System Interference – The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or computer program, electronic document, or electronic data message, without right or authority, including the introduction or transmission of viruses.
  • Misuse of Devices – The use, production, sale, procurement, importation, distribution, or otherwise making available, without right, of:
    • A device, including a computer program, designed or adapted primarily for the purpose of committing any of the offenses under this Act; or
    • A computer password, access code, or similar data by which the whole or any part of a computer system is capable of being accessed with intent that it be used for the purpose of committing any of the offenses under this Act.
  • Cyber-squatting – The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same, if such a domain name is:
    • Similar, identical, or confusingly similar to an existing trademark registered with the appropriate government agency at the time of the domain name registration:
    • Identical or in any way similar with the name of a person other than the registrant, in case of a personal name; and
    • Acquired without right or with intellectual property interests in it.

 

Policing the Internet?

zx

Internet Police – According to wikipedia is a generic term of police and secret police departments and other organizations in charge of policing internet in a number of countries. Depending on a states, are fighting are cybercrime aand monitoring & manipulating the online public opinions.

Suppose you are working as a programmer for a big company. One day a law enforcement agency commissioned your company to develop several websites. The purpose of the websites is to gather information in relation to individuals who may be “interested” in extreme forms of violence. You will be assisting “feds” to secretly gather information in relation to people who persue the sites.

If I suppose working as a programmer for a big company. First, I should prioritize and do my job well. And it is duty to obey the mandate law enforcement agency in our company. And our should build a website for  a purpose. Especially , when the main purpose of it is to track those people who are making violence done online. And others may think that it’s bad. Oh well, I”m just doing my job men! If you were just in my position, maybe you will do this. ?

And now , as i have search about Internet Policing I have found Some article. Read this article:

Internet Police is launch

Law enforcement agencies and members of the IT industry will make up the group aiming to curb hi-tech crime and the worrying trend of paedophile activities on the Internet.

Much of the work of the National Hi-Tech Crime Unit (NHTCU), will concentrate on trapping members of paedophile gangs such as the Wonderland Club – seven of whom were jailed earlier this year for their part in the world’s largest paedophile ring.

The 80-strong group of officers will also crack down on people using the Internet for fraud and other crimes.

Mr Straw said the NHTCU will include experts from the National Crime Squad, the National Criminal Intelligence Service, HM Customs and Excise, police forces and the IT industry.

He said: “The Government is committed to ensuring a safe and secure online environment for Internet users in the UK, by tackling hi-tech crime and ensuring our law enforcers have the tools to deal effectively with on-line crime.

“The significant cash injection of 25 million, which I announced last year, has established the National Hi-Tech Crime Unit.

“It will improve the technical capability of the police to detect and investigate hi-tech crime, through the deployment of up to 80 law enforcement specialists, nationally and locally.

“New technologies bring enormous benefits to the legitimate user, but also offer opportunities for criminals, from those involved in financial fraud to paedophiles.

“We are determined that the UK will be the best and safest place in the world to conduct and engage in e-commerce, and that our children receive the full protection they deserve online so they can surf the Net in safety.”

Although the NHTCU is likely to enrage civil liberties groups, it is likely to lead to more prosecutions similar to that of the Wonderland group in February this year.

As part of Operation Cathedral, which involved police forces from across the world, 107 people were arrested in simultaneous dawn raids in the UK, Australia, Austria, Belgium, Finland, France, Germany, Italy, Norway, Portugal, Sweden and the US.

Following the raids in September 1998 a horrifying library of 750,00 computer images of more than 1,200 victims and 1,800 computerized videos depicting children suffering sexual abuse were found.

The videos included the rape of babies as young as two or three months.

In February this year seven men were jailed at Kingston Crown Court, London, for their part in the paedophile ring.

The men, members of the 180-strong ring, swapped thousands of photos of children and regarded themselves as the elite of the world’s paedophiles.

Director General of the National Crime Squad, Bill Hughes, said the group would also be tackling financial crime on the Net.

“Looking to the future the equation is simple – money is going electronic and where money goes so will organised crime,” he said.

“Therefore, as we have learnt from our colleagues in the US, the only way to tackle this type of crime is by using a joined-up approach.”

The NHTCU, which will be London-based, is being launched at the Science Museum in the capital.

Another example. Read this article. 

Anisha Vora remembers when she first realized something was wrong.

It was February 2012, and the then-22-year-old student learned that photos showing her naked or partially clothed were circulating on the Internet. The culprit was an ex-boyfriend she’d dated on and off for four years and had known since childhood.

Photos she’d sent him during their long-distance relationship were soon posted on more than 300 websites, including Tumblr, Flickr and Facebook, and her friends, family and neighbors were invited to view them. Some of the posts gave her name, address and phone number. Strangers were coming by her house.

Online harassment isn’t new. From the earliest message boards to the newest social apps, if there’s a way for people to say something, you can bet someone will say something awful. But it’s gotten even worse. Those operating in the shadows can now connect to billions of users through Facebook, Twitter and Reddit, and disseminate racist and hate-filled messages. Some publish disturbing images of murder, child exploitation and sexual abuse while others resort to so-called revenge porn to humiliate former lovers. Perhaps most distressing: A few threaten rape and other forms of violence, then release their victims’ addresses and phone numbers so strangers can terrorize their targets even further.

“Dangerous people are everywhere, but when they have the power of anonymity behind them and the power of distance, they become more dangerous,” says Karen Riggs, a professor of media arts and studies at Ohio University. “It’s part of human nature: We have people who will be abusive and lurid.”

But then it depend on us, if we will follow the law/s. Because as an individual, we have our different  laws. 🙂

References:

Pro or Against? “Depends on the situation”

z

Pro or Against?

Most of us are using Social Media to communicate with friends and some with strangers to do some research and share thoughts, photos, music, links, and more. But then we don’t think wise. Especially , when we talk about social media . Like when you schedule messages to post  ahead of time , you can share your great content throughout day or week, even while your relaxing. And others do this when they are getting bored.

  • Selfie – is a term for a self portrait photograph typically taken with a digital camera or phone camera. We know all that most us of do this everyday , in every minute or even in every second. And selfie often are shared on social media.
    Cute beautiful fashionable girl makes selfie on the Charles Bridge in Prague
  • Hashtag – is a label used in social media. This is the trending Label in all social media. People always get in trending . Most of us use this label, just to be trend. And others always get IN .

Let me share with you some tips ‘Before Posting Online’ :

– THINK

  • Is it True?
    When you post some controversial issue/s of someone. Make sure that the content of your text is true before you post it online.
  • Is it am I sharing bad side of myself?
    If you want to be respect with others. Please respect first yourself. We don’t use social media to impress others. But to express our thoughts of what we are feel-in inside. Just be yourself. Don’t post things that can hurt you online. And by showing your true self maybe people will know you better than they think.
  • Am I posting in Anger?
    When we are so angry , we can’t control our self. Especially , when we are totally hurt by someone. And we forced to post some negative content/s online. Just because we are angry with.  And others may react on your post/s. Before you do that think twice, before you post on public. So you can avoid some negative feedback’s.
  • Could someone misinterpret what i’m saying?
    We can’t denied that no one of us get misinterpret in understanding the words in a  way he/she post online.
    But before you react, know first what is reality.
  • Is it necessary?
    When you post online, choose only the necessary thing. Don’t give all your information to the public online. It is not necessary to share everyday of what you doing or where you going etc. to others. Because others can make you bad things.But then there is no wrong in posting online on social media. But before you post on public, think wisely. 🙂

Bashers

I’m also a KathNiel Fan. I really like their love team. Even others not, but the important is i like them.

as

  • An individual who is unfriendly and or commits harmful acts to group of people or an individual due to prejudice and or ignorance. “Bashers should be shot on sight”. Bashers is aalso a neutral term for a person, but connoting someone tough and a bit dangerous. “Watchout for that bashers, he/she was an army ranger”. haha 🙂

Others just express their feelings into social media. And others can’t say what they want to say in person. Just because they are shy. Maybe they feel awkward or they feel some doubt to say it in person. And they feel more comfortable when they just say it on social than into personal. But then for me, it depends on the situation.

aa

Got Ethics?

Quote of the day:”Live one day at at a time emphasizing ethics rather than rules

For us what is ethics ? Isn’t important to the world?

111

For us what is Ethics?

Others say that Ethics are very important in guiding us in the choices we make everyday. And I think it is right. Because Ethical values and your views of right / wrong will determine most of our decisions we make throughout our life. And also in Business without Ethics business would fail, and there would be a lot more crime without Laws based on ethics.

Ethics concern an individual’s moral judgments about right and wrong. Decision taken within an organization may be made by individuals or group.

w

In Business, Ethical behavior and corporate social responsibility can bring significant benefits to a business.  For example :

  • Attract employee’s want to firm products.
  • Attract more employee’s wanting to work for business therefor increase productivity.
  • Make employee’s want to stay in business.

a

Ethics important to business for many reasons. Business increase sales or increase their reputation.

Isn’t Ethics important to the World?

Ethics is very important to the world. Without Ethics the world be even more messed up than it already is.

aa

Ethics is very important because of the Following:

  • To satisfy basic human needs– which being a fair and honest is the one of the basic needs of human.
  • To improve decision making– decisions are driven by values. People destiny is that she/he takes in the course of his/her life.
  • To secure the society– often ethics succeed law in safeguarding society.

Most of us would agree that it is ethics in practice that makes sense, just having it carefully drafted. Ethics are the set of moral principle start guide person’s behavior. These morals are shaped  by social norms, practices and religious influences.

We have also an Ethical beliefs. That are held by individuals , they can also be reflected in the values, practices and policies that shape the choices made by decision makers on behalf of their organization.

An alien from planet Tralfamadore comes to the earth and is baffled by the concept of ethics. In their planet, there’s no such thing. There’s only absolute freedom – the same freedom that motivated him to conquer earth. As an earthling, it is your inherent duty to convince the Tralfamadorian that ethics is important. This is the only way to save humanity. )

as

And now, if an Alien from planet Tralfamadore comes to the earth and is baffled by the concept of ethics. Well, I will convince them that ethics is not just a small thing but a very important one that the world need this. I know  they will not get understand it in just “one click” but I slowly explain it to them for them to respect our ‘ethics theories’ . And maybe our ethics theory will help them also..

____________________

Key-points:

  • Ethical behavior is based on written and unwritten codes of principles and values held in society.
  • Ethics reflect beliefs about what is right and what is wrong, what is just , what is good and what is bad terms of human behavior.
  • Ethical principles and values serve a guide to behavior on a level within professions, and at the organization level.
  • Behavior is the way leaving creature acts.

___________________

Saying: “Judge character by Behavior” 🙂

References:

(Read Me)

– “What more Painful ?”

When a person whom You trusted, Hurts you..

or

The person Whom you hurts still trust You..!!!  :/

Computer Illegal Issues Related to Ethics

Quote of the day: ” The Higher the buildings the Lower the Morals

18

Why do people sometimes behave Unethically?

In some point in our career we people make decisions with possible ethical consequences. Guidelines that are clear Decision will be easy. And if it is unclear Decision may be more difficult in some circumstances. And if you make wrong decision you could carry consequences for others or yourself.

Fortunately, most of the time one does not need to rush into a decision. You have to think it first.

And now let me cite with you some Computing-Related Scenarios.

1. Cyber Bullying 

Some people do this by the use of Internet/ Computer  to harass, threaten, embarrass, or bully another person. It occurs among young people. And this also affect to an adult, it may meet the definition of Cyber-Harassment or Cyber-Stalking a crime that can have a legal consequences and maybe involve a jail time. Let just say that cyber bullying happen accidentally.

12

And if this will happen this may results to many effects…

  • a greater risk to anxiety
  • depression
  • and other stress related disorders

These are the following Signs who have experienced in Cyber Bullying :

  •  being emotionally upset during or after using the Internet or the phone.
  • being very secretive.
  • avoiding school gathering.
  • changes in mood.

2. Scamming 

When we talk about “Scamming” they known as the “Cheaters”. From the Scam is to cheat or defraud with a scam. And this performed by a dishonest individual, group, or company in an attempt obtain money or something else of value. They would misrepresent themselves as a someone with skill or authority. And mostly by the use of Internet new forms of scams emerged. Such as lottery scams, Email spoofing, pishing. 

13

And now many dating sites used it to scam many people. Nowadays, so many people so desperate to find their “LOVE“. That they ignore warning signs in a hopeful exchange of possibility of being in love.

If you want to be aware about Scamming. Read this Warning Signs that your ‘Forever/Prince Charming is a totally Scammer.’

  • Uncertain Profile – Scammer often not specific in what they are looking for in a mate. Thus more people will respond, and the scammer now start by complementing on your looks.(#WalayForever) 😛
  • Showing his love – The word “I LOVE YOU” is a statement that everyone wishes to hear. But how do you know if it’s real? And some people can sound great on the phone. But then when you meet them there is nothing there. How can someone honestly love you before having met in you in person? :/
  • Too fast – Others always think that ‘I have found my Soul mate’ again, he hasn’t even met you. How can someone want to spend the rest of their life with you when he’s known you less than a month? 🙂
  • Unexpected calls – This mostly happen, many people lose money to phone scam. If you get a call from someone you don’t know and trying to sell you something you hadn’t planned to buy. Say “No thanks”. And if they pressure you about giving up personal information like credit card, SSS number it’s likely a scam. Hang up and report to the police straightly.

3. Hacking

Computer Hacking is an activity with in the Computer programmer subculture. ‘Hacker’ these individuals could always hack on an unsatisfactory system to solve problems and engage in a little software company espionage by interpreting a competitors code. And they use computer viruses, exploits, norms and more….

16

Depending on the hacker’s intent, the design of a virus can merely be an inconvenience or have very serious consequences. A Virus is a piece of software, a series of data, or a command sequence that exploits a bug. Worms are simply viruses that sent copies over network connection.

References:

Health and Wellness Plan

Nowadays, Computer is very useful in any job. And it requires long hours sitting at a computer.Especially those jobs such as ‘Programming, Accounting, Writing’ it is very easy  to stay in that one position for eight to nine working hours every day.

cc

These are the following of some Health Issues of taking long hours facing at Computer.

1. Poor Blood Circulation

1234

Sitting for an hour at computer in the same position which leads to poor blood circulation. Because prolonged sitting is never good for our body.Our blood will not circulate well.

2. Back Pain

123

Cause of having a back pain is sitting in  uncomfortable chair. The poor alignment of head, neck and shoulders it causes pain and also very harmful everlasting effect in our body.

3. Stress

aa   Also makes us  stress. Working in computer for a long hour gives a lot of feeling of isolation like they have lost contact with the real world. And isolation makes them end up feeling less cheerful & depressed.

4. Eye strain

Any activity that requires intense use of eyes for a prolonged time can cause eye strain. Exposure to bright light or straining to see in dim light can also cause Eye Strain. One of the most common of it is starring for a long periods devices such as : “Computer Screens”, “Smart Phones” and “Video Games”

Humans normally blink in 18 times a minute but we blink half  that often while using computers and other digital screen devices whether for work.

dd

5. Headache

ssg    After staring at a computer screen for a significant amount of time may develop Headache. Because of the brightness and contrast of the monitor that may cause Indirect glare light that shines directly into the eyes.

6. Blurry Vision

It is the loss of sharpness of vision and inability to see small details. Vision maybe blurred by constantly changing focus such as looking looking back and forth between the keyboard and computer screen.

vv

These are the following tips on how to prevent those health Issues.

1. Take regular break to your computer work.Give some few time to walk sometimes so that your blood may circulate well.

2. Use an adjustable chair that you may feel comfortable as you use your computer. To prevent back pain, or muscle pain.

3.Make changes to your work habits.  You may also try the 20-20-20 rule. Every 20 minutes look away or at least six meters (20 feet) away from you  for at least  20 seconds.

4. You may place also the screen (20 to 26 inches) away from your eyes. Use screen filter if needed.

5. Blinking is very basic exercise. But very effective one. While sitting in comfortably chair place your elbow in your desk or table. Then rub your two hands together to produce heat and then place your both hands gently over your eyes for about 10 minutes. Use this time to allow your eyes  to relax, while you breathe deeply and unwind.

By giving properly our eyes a workout we can prevent not only blurred vision but also general decline vision that comes naturally with age.

We exercise our muscle to stay strong and healthy. Don’t let this happen to you. Make some action and do the prevention tips.Our health is very important. We have to take care of it.

‘LOVE YOURSELF ENOUGH TO LIVE A HEALTHY LIFESTYLE’ 🙂