You are on page 1of 12

LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 1 S.Y.

2020-2021

Quarter 3

TOPIC: Rules of Netiquette


MODULE

2
Content Standard: Performance Standard:
The learners demonstrate an understanding of: ICT in The learners should be able to independently
the context of global communication for specific compose an insightful reflection paper on the nature
professional track of ICT in the context of their lives, society, and
Most Essential Learning Competency:
professional tracks

Most Essential Learning Competency:


 Apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would
relate to their specific professional tracks.
Time frame: 2 weeks

Learning Targets:
1. Consider one’s and others’ safety when sharing information using the Internet;
2. Consider one’s and others’ reputation when using the Internet;
3. Determine and avoid the dangers of the Internet;
4. Be responsible in the use of social networking sites; and
5. Browse the Internet efficiently and properly through proper
referencing.

BRAIN TEASER

Good Day! After having been informed on the objective of this


module, let us have the first activity that will gauge your
understanding of using ICT properly and avoiding the different
Internet threats.

Directions: Write Yes if you agree with the statement and No if you disagree on the blank
before each number.

____ 1. My Computer has an antivirus so it is okay to open most email attachments like e-
cards and video files.
____ 2. You and your best friend play a lot of video games. One time, she asks you for your
password so she can help you level up and get in-game money. She promises to keep
your password a secret. Is it okay to give away your password?
____ 3. Letting people know your birthday is probably a must if you want to get as many gifts as
possible. But having it in your profile makes you vulnerable to identity theft.
____ 4. You forgot that your essay for English class is due tomorrow. While doing your research,
you found a website offering free essays. Is it okay to use the essays from this free
essay website?
____ 5. Your friend told you that his college application was rejected because you posted a video of him
doing crazy stuff at a party. You posted the video several years ago but later took it down to
protect your friend’s reputation. Can your friend be right that the college found the video?

1
LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 1 S.Y. 2020-2021

Nice one! You did great today. Have you had a


challenging experience? I am sure that it will be
easier for you this time. Let’s do this test.

What’s In
1. Most of us use the internet every day. Sometimes, we do not pay attention on how much
information we share online. Below is a questionnaire about how much information you
have shared so far. Put (√) mark under Shared or Not Shared.
How Safe are you?
Information Shared Not Shared
First Name
Last Name
Middle Name
Current and previous school(s)
Cellphone number
Names of your mother and father
Names of your siblings
Address
Home phone number
Birthday

How many checks did you have for shared?


You probably answered Shared in the first two items.
If that is the case, try using search engine like Google Then type
your first and last name.
Did you get links to your profile page?
Try switching to image search.
Did your Picture appear?
If you have a unique name, chances are, it did. Do not feel bad if it
did not appear thou; in fact, it is probably for your best interest
not to have pictures of yourself in search engine.
So how did these things happen?
How can search engines locate you?
Is there any danger of being found by search engine?

2
LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 1 S.Y. 2020-2021

The Internet, truly, is a powerful tool. It can be used to promote your business, gain new
friends, and stay in touch with the old ones. It is also a source of entertainment. But like most
things in this world, there is always “another side of the coin.” The Internet is one of the most
dangerous places, especially if you do not know what you are doing.

Let us go back to the “How Safe Are You?” test.


Let us visit each item and see how risky it is to
share personal information.

3
LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 1 S.Y. 2020-2021

The internet is defined as information super


highway. This means that anyone has access to this
highway, can place information, and can grab that
information.
Any information, even things that you have set
privately. This is why social networking sites like
Facebook continue to improve their security
features.
The threat of cybercrime is very real
While you may not experience the threat now,
whatever information we share today
could affect us in the future.

Tips to stay safe Online


The internet is a public place and it is up to you to protect yourself. Here are some tips to help
you stay safe when using Internet.
1. Be mindful of what you share and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website.
4. Know the security features of the social networking site you use.
5. Do not share password with anyone.
6. Avoid logging in to public networks/Wi-Fi.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about future vacation.
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your computer.
12. If you have a Wi-Fi at home, make it a private network by
adding password.
13. Never post anything about future vacation.
14. Add friends you know in real life.
15. Avoid visiting untrusted websites.

Most people would dispute that there is no such thing as private over the internet and
they may be right. There are hackers who can find a backdoor even if your profile is
already set to private. You have no control of who whoever is looking at your friend’s
screen whenever they open your profile or chat with you. You have no control over
Core
people getting access to Rules of
your friend’s Netiquette
account and seeing your private stuff.

4
LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 1 S.Y. 2020-2021

Core Rules of Netiquette


Netiquette, or network etiquette, is concerned with the "proper" manner of communication in
the online environment. Whenever you communicate in the virtual world, consider the following
"rules," adapted from Virginia Shea's Core Rules of Netiquette.

Rule 1: Remember the Human


When communicating electronically, whether through email, instant message, discussion post,
text, or another method, practice the Golden Rule: Do unto others as you would have others do
unto you. Remember, your written words are read by real people, all deserving of respectful
communication. Before you press "send" or "submit," ask yourself, "Would I be okay with this if
someone else had written it?"
Rule 2: Adhere to the same standards of behavior online that you follow in real life
While it can be argued that standards of behavior may be different in the virtual world, they
certainly should not be lower. You should do your best to act within the laws and ethical
manners of society whenever you inhabit "cyberspace." Would you behave rudely to someone
face-to-face? On most occasions, no. Neither should you behave this way in the virtual world.
Rule 3: Know where you are in cyberspace
"Netiquette varies from domain to domain." (Shea, 1994) Depending on where you are in the
virtual world, the same written communication can be acceptable in one area, where it might be
considered inappropriate in another. What you text to a friend may not be appropriate in an
email to a classmate or colleague. Can you think of another example?
Rule 4: Respect other people's time and bandwidth
Electronic communication takes time: time to read and time in which to respond. Most people
today lead busy lives, just like you do, and don't have time to read or respond to frivolous emails
or discussion posts. As a virtual world communicator, it is your responsibility to make sure that
the time spent reading your words isn't wasted. Make your written communication meaningful
and to the point, without extraneous text or superfluous graphics or attachments that may take
forever to download.
Rule 5: Make yourself look good online
One of the virtual world's best things is the lack of judgment associated with your physical
appearance, the sound of your voice, or the clothes you wear (unless you post a video of
yourself singing Karaoke in a clown outfit.) The quality of your writing will judge you, so keep the
following tips in mind:
Always check for spelling and grammar errors Know what you're talking about and state it clearly
Be pleasant and polite
Rule 6: Share expert knowledge
The Internet offers its users many benefits; one is the ease in which information can be shared
or accessed, and in fact, this "information sharing" capability is one of the reasons the Internet
was founded. So in the spirit of the Internet's "founding fathers," share what you know! When
you post a question and receive intelligent answers, share the results with others. Are you an
expert at something? Post resources and references for your subject matter. You have recently
expanded your knowledge about a subject that might be of interest to others? Share that as well.
Rule 7: Help keep flame wars under control
What is meant by "flaming" and "flame wars?" "Flaming is what people do when they express a
strongly held opinion without holding back any emotion." (Shea, 1994). As an example, think of
the kinds of passionate comments you might read on a sports blog. While "flaming" is not
necessarily forbidden in virtual communication, "flame wars," when two or three people
exchange angry posts between one another, must be controlled, or the camaraderie of the

5
LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 1 S.Y. 2020-2021

group could be compromised. Don't feed the flames; extinguish them by guiding the discussion
back to a more productive direction.
Rule 8: Respect other people's privacy
Depending on what you are reading in the virtual world, be it an online class discussion forum,
Facebook page, or an email, you may be exposed to some private or personal information that
needs to be handled with care. Perhaps someone is sharing some medical news about a loved
one or discussing a situation at work. What do you think would happen if this information "got
into the wrong hands?" Embarrassment? Hurt feelings? Loss of a job? Just as you expect others
to respect your privacy, so should you respect the privacy of others. Be sure to err on the side of
caution when deciding to discuss or not to discuss virtual communication.
Rule 9: Don't abuse your power
Like in face-to-face situations, there are people in cyberspace who have more "power" than
others. They have more expertise in technology or have years of experience in a particular skill
or subject matter. Maybe it is you who possesses all of this knowledge and power! Just
remember: knowing more than others do or having more power than others may have does not
give you the right to take advantage of anyone. Think of Rule 1: Remember the human.
Rule 10: Be forgiving of other people's mistakes
Not everyone has the same amount of experience working in the virtual world. And not everyone
knows the rules of Netiquette. At some point, you will see a stupid question, read an
unnecessarily long response, or encounter misspelled words; when this happens, practice
kindness and forgiveness as you would hope someone would do if you had committed the same
offense. If it's a minor "offense," you might want to let it slide. If you feel compelled to respond to
a mistake, do so in a private email rather than a public forum.
Shea, V. (1994). Core Rules of Netiquette. Retrieved from
http:/coursedesign.colostate.edu/obj/corerulesnet.html

ACTIVITY 1: Privacy Policies


Directions: Visit a social networking site and look for the site’s privacy policy. The
link is typically found at the bottom of the page and sometimes labelled only
“Privacy”. Write a summary on how the website handles both your private and
public information.

Write your Answer on Attachment 1


(To be submitted on the 12th day of April)

6
LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 1 S.Y. 2020-2021

ACTIVITY 2: Core Rules of Netiquette


Directions: Write what you have learned from the Ten Core Rules of Netiquette.

Write your Answer on Attachment 2


(To be submitted on the 12th day of April)

CHALLENGE QUESTIONS

How did you know you know that your computers/systems had
a virus?

What have you done to prevent or remove the virus?

Internet Threats

1. Malware – stands for Malicious Software.


2. Spam – unwanted email mostly from bots or advertisers.
3. Phishing – its goal is to acquire sensitive personal information like passwords and credit
card details.

Malware
a. Virus – a malicious program designed to replicate itself and transfer from one computer
to another.
b. Worm – a malicious program that transfers from one computer to another by any type of
means.
c. Trojan - a malicious program that is disguised as a useful program but once downloaded
or installed, leaves your PC unprotected and allows hacker to get you information.
* Rouge security software
d. Spyware - a program that runs in the background without you knowing it.
* Keyloggers – used to record the keystroke done by the user.
e. Adware - a program designed to send you advertisements, mostly as pop-ups.

7
LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 1 S.Y. 2020-2021

Protecting Reputations Online


In the past, doing something embarrassing was not much a big deal. Nowadays,
embarrassing moments are captured using any device you could imagine. This could impact not
only your reputation but also the people around you.

Think Before You Click

1. Before you post something on the web, ask these


questions to yourself:

Would you want your parents or grandparents to see it?


Would you want your future boss to see it?

Once you post something on the web, you have no control of


who sees your posts.

2. Your friends depend on you to protect their reputation online. Talk to your friends about this
serious responsibility.
3. Set your post to “private.” In this way, search engines will not be able to scan that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull
it down or report it as inappropriate.

Copyright Infringement
1. Understand. Copyright protect literary works, photographs paintings, drawings, films,
music (and lyrics), choreography, and sculptures.
2. Be responsible. Even if a material does not say that it is copyrighted, it is not a valid
defense against copyright.
3. Be creative. Ask yourself whether what you are making is something that came from you
or something made from somebody else’s creativity.
4. Know the law. There are some limitations to copyright
laws. For instance, in the Philippines, copyrights only last a
lifetime (of the author) plus 50 years. There are also
provision for “fair use,” which means that an intellectual
property may be used without a consent as long as it used
in commentaries, criticisms, search engines, parodies,
news reports, research, library archiving, teaching, and
education.
If you have doubts that what you are doing does not fall under the policy of fair use, seek
permission first.

Another misconception is that fan-fiction is not copyright infringement. In reality, it is and


some copyright holders ignore them but they can opt to use their rights.

8
LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 1 S.Y. 2020-2021

If you create something—an idea, an invention, a form of


literary work, or a research, you have the right of how it
should be used by others. This is called intellectual
property.

Online Research
The information that we need is more likely already on the internet. It is just a
matter of how to look for it and how to use information from the most credible source.
Here are some tips in conducting online research:
1. Have a question in mind. Focus on a question you want answered.
2. Narrow it down. Search engines like Google, Bing, or Yahoo use several filters to
determine the most appropriate result for you.
3. Advanced Search. The best way to filter information you get from search engines is
by using the advanced search.

9
LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 1 S.Y. 2020-2021

4. Look for a credible source. Some wikis, filled with updated information, are not a credible source. When
using wikis, check out the link of the cited text.

This is due to the fact that anyone can edit its content

5. Give
Name credit.
of the Give
person orcredit to the original
organization author
(the author of of
thethe page or information.
information). Title of theTohome
properly
pagesite a reference,
in Italics (title you
mayinuse
is shown thethe
barformat
but is below.
sometimes missing or unrelated). URL. Date last seen.

Examples:

Lapis, Adrian Harold L. “Oleander’s Fun Facts about Bananas.”


http://oleander.penz.com/random/bananalove/html.Lastview on September 7, 2015

“Accounting: What should know.” Jargon Online Network.


http://www.jargononline.com/accounting101.html. Last viewed on april 13, 2015

Performance task1: Cyber News Report


Direction: Create an Infomercial about “think before you Click.”

(To be submitted on the 12th day of April


on my facebook messenger account )

FB Account: Leona G. Alicpala

Resources
Lessons: Rex Book Store, Empowerment Technologies innovative training Works, Inc. First Edition
Images: Google images
Fb pages: Empowerment Technologies (EmTech) for Teachers

LEONA G. ALICPALA
Subject Teacher

10
LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 1 S.Y. 2020-2021

Attachment
Name: ______________________________ Score: ______________
Grade/ Section: _______________________ Date: ______________
1
Privacy Policy

Directions: Visit a social networking site and look for the site’s privacy policy. The link is typically found
at the bottom of the page and sometimes labelled only “Privacy”. Write a summary on how the website
handles both your private and public information.

Name of Website: ___________________________________________________________


URL: _______________________________________________________________________

Summary:

Name of Website: _________________________________________


URL: ____________________________________________________

Summary:

Name of Website: _________________________________________


URL: ____________________________________________________

Summary:

Rubrics: Content = 10 Organization = 6 Grammar = 4

11
LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 1 S.Y. 2020-2021

Attachment
Name: ______________________________ Score: ______________
Grade/ Section: _______________________ Date: ______________
2

Accomplish the items below using what you have learned from the Ten Rules of Netiquette.

1. In cyberspace, it is important to remember the___________________ . “Do unto others as


you would have others do unto you.”

2. Why are spelling and grammar crucial on the Internet?

____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

3. Is it okay to read other people's files and emails without their permission? Why?

____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

4. What do you need to be careful about if you are in control of a network?

____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

5. What should you do about a newbie who continually makes the same error on the Internet?

____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
___________________________________________________________________________

12

You might also like