You are on page 1of 13

ICT SAFETY,

SECURITY, AND
NETIQUETTE
MADE BY: IRISH S.
DE LA CRUZ
ONLINE SAFETY
➤ THE MORE INFORMATION YOU
PUT OR USE ONLINE, THE HIGHER
THE RISK PLACED ON YOUR
ICT SAFETY/ ONLINE SAFETY.
ONLINE SAFETY ➤ RISKS SUCH AS:  IDENTITY
THEFT, PHISHING, AND MALWARE
INFECTIONS
➤ IT IS YOUR RESPONSIBILITY TO
SECURE YOUR INFORMA-TION
ONLINE AS WELL AS MAINTAIN
GOOD ETIQUETTE WHEN USING
THESE SERVICES.
ICT SECURITY VERIFICATION OF
ONLINE SOURCE MATERIALS
CRITERIA FOR EVALUATION:
CURRENCY — IS THE INFORMATION UP- TO-DATE?
SECURITY — DOES THE SITE ASK TOO MUCH INFORMATION?
SCOPE — IS THE INFORMATION IN- DEPTH?
AUTHORITY — DOES THE INFOR-MATION COME FROM A TRUSTED
EXPERT?
ICT NETIQUETTE
COMPUTER ETHICS
COMPUTER ETHICS
➤ A NEW BRANCH OF ETHICS THAT IS CONCERNED WITH
STANDARDS OF CONDUCT IN THE USE OF COMPUTERS.
➤ DEALS WITH HOW COM- PUTING PROFESSIONALS
SHOULD MAKE DECISIONS REGARDING PROFES- SIONAL
AND SOCIAL CONDUCT.
THE TEN
COMMANDMENTS OF
COMPUTER ETHICS
1. THOU SHALT NOT USE A
COMPUTER TO HARM IN ANY WAY.
2. THOU SHALT NOT INTERFERE
WITH OTHER PEOPLE’S COMPUTER
WORK.
3. THOU SHALT NOT SNEAK
AROUND OTHER PEOPLE’S FILES.
4. THOU SHALT NOT USE A
COMPUTER TO STEAL.
5. THOU SHALT NOT USE A
COMPUTER TO BEAR FALSE
WITNESS.
6. THOU SHALT NOT COPY OR USE
PROPRIETARY SOFTWARE FOR
WHICH YOU HAVE NOT PAID.
7. THOU SHALT NOT USE OTHER
PEOPLE’S COMPUTER RESOURCES
WITHOUT AUTHORISATION OF PROPER
COMPENSATION.
8. THOU SHALT NOT APPROPRIATE
OTHER PEOPLE’S INTELLECTUAL
OUTPUT.
9. THOU SHALT THINK ABOUT THE
SOCIAL CONSEQUENCES OF THE
PROGRAM YOU ARE WRITING OR THE
SYSTEM YOU ARE DESIGNING.
10. THOU SHALT ALWAYS USE A
COMPUTER IN WAYS THAT ENSURE
CONSIDERATION AND RESPECT FOR
YOUR FELLOW HUMANS.
ICT NETIQUETTE
INTERNET ETHICS
INTERNET ETHICS
➤ OR NETIQUETTE
➤ IS A SET OF RULES THAT
DETERMINES HOW TO
PROPERLY COMMUNICATE
AND BROWSE THE WEB.
GOOD 1. ALWAYS KEEP YOUR SOFTWARE
PRACTICES OR APPLICATION UPDATED AND
UNINSTALL THE ONES THAT YOU
IN USING THE DO NOT USE.
INTERNET 2. DO NOT DIVULGE SENSITIVE
INFORMATION ONLINE, ESPECIALLY
ON UNSAFE WEBSITES.
3. BE CAREFUL WHEN DEALING
WITH EMAILS FROM UNKNOWN
SOURCES OR SPAM.
4. RUN YOUR ANTIVIRUS SOFTWARE
BEFORE GOING ONLINE.
5. THINK BEFORE YOU CLICK.
ICT SECURITY INTELLECTUAL PROPERTY
➤ THE BIGGEST ISSUE SURROUNDING ICT
C O N C E R N S T H E V I O L A T I O N O F I N T E L L E C T U AL
PROPERTY RIGHTS (IPR), WHICH IS THE ACT
OF STEALING OTHER PEOPLE'S WORKS AND
IDEAS, WHETHER KNOWINGLY OR
UNKNOWINGLY.
➤ INTELLECTUAL PROPERTY LAWS (IPL) PROTECT
THE RIGHTS OF PEOPLE TO MAINTAIN LEGAL
OWNERSHIP OF THEIR WORKS AND IDEAS. BUT
IPR IS NOT GIVEN RIGHT: THEY HAVE TO BE
APPLIED FOR AND GRANTED TO THE APPLICANT
BY THE PROPER AUTHORITIES.
➤ GRANTING OWNERSHIP OF AN IDEA
TO A PERSON IS NOT AN EASY THING
TO DO.
➤ ART WORKS, NOVELS, SHORT
STORIES, POEMS, MUSIC AND MOVIES
ARE THE ONLY SOME OF THE
COPYRIGHT THINGS THAT ARE
AVAILABLE ON THE INTERNET.
SIX WAYS TO AVOID PLAGIARISM IN
ICT SAFETY
RESEARCH PAPERS

AVOIDING 1. PARAPHRASE
PLAGIARISM 2. CITE
3. QUOTING

4. CITING QUOTES

5. CITE YOUR OWN MATERIAL

6.REFERENCING

You might also like