You are on page 1of 12

11/12

Empowerment
Technologies
Quarter 1 - Module 2:
ONLINE SAFETY, SECURITY,
ETHICS AND ETIQUETTE
Republic of the Philippines
Department of Education
Region I
Pangasinan Division II
MANGALDAN NATIONAL HIGH SCHOOL
SY 2021-2022
QUARTER 1 - WEEK2
EMPOWERMENT TECHNOLOGIES

LESSON 2 Discussion: ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTE

OBJECTIVES:

• Consider one’s and others’ safety when sharing information using internet;
• Consider one’s and others’ reputation when using the Internet
• Determine and avoid the dangers of the internet
• Be responsible in the use of social networking sites; and
• Browse the internet efficiency and properly through proper referencing.

How many hours do you spend on the internet per day? Can you live without the internet for a
week? How many times have you complained about your internet connection speed?

As teenagers, you are all exposed to many things powered by the internet. Whether it is
socializing, playing games, reading sports news, shopping, etc., the internet has given you one of the
most powerful tools that your parents, during their teenage years, did not have. Because of this, do
you not think that it is also important to wield this powerful tool properly? Without proper training, a
swordsman can easily injure himself when wielding a sword; the same could be said for you whenever
you use the internet

Netiquette- is a combination of ‘net’ (from internet) and etiquette. It means respecting other users’
views and displaying common courtesy when posting your views to online discussion groups.

Core Rules of Netiquette

Rule 1: Remember the Human

When communicating electronically, whether through email, instant message, discussion


post, text, or some other method, practice the Golden Rule: Do unto others as you would have others
do unto you. Remember, your written words are read by real people, all deserving of respectful
communication. Before you press "send" or "submit," ask yourself, "Would I be okay with this if
someone else had written it?"

Rule 2: Know where you are in cyberspace


E-Tech Page 2
"Netiquette varies from domain to domain." (Shea, 1994) Depending on where you are in the
virtual world, the same written communication can be acceptable in one area, where it might be
considered inappropriate in another. What you text to a friend may not be appropriate in an email to
a classmate or colleague. Can you think of another example?

Rule 3: Make yourself look good online

o Always check for


spelling and
grammar errors
o Know what you're
talking about and
state it clearly
o Be pleasant and
polite

One of the best things about the virtual world is the lack of judgment associated with your
physical appearance, sound of your voice, or the clothes you wear (unless you post a video of yourself
singing Karaoke in a clown outfit.) You will, however, be judged by the quality of your writing, so keep
the following tips in mind:

Always check for spelling and grammar errors


Know what you're talking about and state it clearly
Be pleasant and polite

Rule 4: Help keep flame wars under control

What is meant by "flaming" and "flame wars?" "Flaming is what people do when they express
a strongly held opinion without holding back any emotion." (Shea, 1994). As an example, think of the
kinds of passionate comments you might read on a sports blog. While "flaming" is not necessarily
forbidden in virtual communication, "flame wars," when two or three people exchange angry posts
between one another, must be controlled or the camaraderie of the group could be compromised.
Don't feed the flames; extinguish them by guiding the discussion back to a more productive direction.

Rule 5: Respect other people's privacy

E-Tech Page 3
Depending on what you are reading in the virtual world, be it an online class discussion forum,
Facebook page, or an email, you may be exposed to some private or personal information that needs
to be handled with care. Perhaps someone is sharing some medical news about a loved one or
discussing a situation at work. What do you think would happen if this information "got into the wrong
hands?" Embarrassment? Hurt feelings? Loss of a job? Just as you expect others to respect your
privacy, so should you respect the privacy of others. Be sure to err on the side of caution when deciding
to discuss or not to discuss virtual communication.

Rule 6: Don't abuse your power

Just like in face-to-face situations, there are people in cyberspace who have more "power"
than others. They have more expertise in technology or they have years of experience in a particular
skill or subject matter. Maybe it's you who possesses all of this knowledge and power! Just remember:
knowing more than others do or having more power than others may have does not give you the right
to take advantage of anyone. Think of Rule 1: Remember the human.

Rule 7: Be forgiving of other people's mistakes

Not everyone has the same amount of experience working in the virtual world. And not
everyone knows the rules of netiquette. At some point, you will see a stupid question, read an
unnecessarily long response, or encounter misspelled words; when this happens, practice kindness
and forgiveness as you would hope someone would do if you had committed the same offense. If it's
a minor "offense," you might want to let it slide. If you feel compelled to respond to a mistake, do so
in a private email rather than a public forum.

ONLINE SAFETY AND SECURITY

The Internet, truly, is a powerful tool. It can be used to promote your business, gain new
friends, and stay in touch with the old ones. It is also a source of entertainment. But like most things
in this world, there is always “another side of the coin.” The Internet is one of the most dangerous
places, especially if you do not know what you are doing.

Let us go back to the “How Safe are You?” test. Let us visit each item and see how risky it is to share
them.

E-Tech Page 4
The Internet is defined as the Information Superhighway. This means that anyone has access to
this highway, can place information, and can grab that information. Any information, even things that
you have set privately, can be accessed one way or another. This is why social networking sites like
Facebook continue to improve their security features. The threat of cybercrime is very real. While you
may not experience the threat now, whatever information we share today could affect our future.

TIPS TO STAY SAFE ONLINE

1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how the website handles the
information you share.
4. Know the security features of the social networking site you use. By keeping you profile
private, search engines will not be able to scan your profile.
5. Do not share your password with anyone.
6. Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or private) mode,” a feature
of the browser, will not protect you from hackers.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about a future vacation. It is similar to posting, “Rob my house at this
date.”
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your computer. Use only one antivirus software
to avoid conflicts.
12. If you have Wi-Fi at home, make it a private network by adding a password.
13. Avoid downloading anything from untrusted websites. You are most vulnerable in peer-to-
peer download (torrents) as the download is most likely not monitored by ht e website owner.

E-Tech Page 5
14. But the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails.

INTERNET THREATS

Here are some of the threats you should be aware of when using the Internet
1. Malware –stands for malicious software
a. Virus - a malicious program designed to replicate itself and transfer from one computer
to another either through the internet and local networks or data storage like flash
drives and CDs.
b. Worm – a malicious program that transfers from one computer to another by any type
of means. Example: the I LOVE YOU worm (Love Bug Worm) created by Filipino.
c. Trojan – a malicious program that is disguised as a useful program but once downloaded
or installed, leaves your pc unprotected that allows hackers to get your information
d. Spyware – a program that runs in the background without you knowing it (thus called
“spy”). It has the ability to monitor what you are currently doing and typing through
keylogging.
*Key loggers – used to record the keystroke than by the users. This is done to steal their
password or any other sensitive information.
e. Adware – a program designed to send you advertisements, mostly as popups.

2. Spam – unwanted email mostly from bots and advertisers. It can be used to send malware
3. Phishing –acquires sensitive information like passwords and credit card details.
* Pharming – a more complicated way of phishing where it exploits the DNS (Domain Name Service)
system.
Here are things you might want to consider before posting something over the internet:

1. Before you post something on the web, ask these questions to yourself: Would you want
your parents or grandparents to see it? Would you want your future boss to see it? Once
you post something on the web, you have no control of who sees your posts.
2. Your friends depend on you to protect their reputation online. Talk to your friends about this
serious responsibility.
3. Set you post to “private”. In this way, search engines will not be able to scan that post.
4. Avoid using names. Names are easy for search engines to scan
5. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull
down or report it as inappropriate.

COPYRIGHT INFRINGEMENT

If you create something –an idea, an invention, a form of literary work, or a research, you have the
right as to how it should be used by others. This is called Intellectual Property. In other words, the
copyright law includes your rights over your work, and anyone who uses it without your consent is
punishable by law.

Here are some tips that could help you avoid copyright infringement:

E-Tech Page 6
1. Understand. Copyright literary works, photographs, paintings, drawings, films, music (and
lyrics) choreography and sculptures, but it generally does NOT protect underlying ideas and
facts. This means, you can express something using your own words, but should give credit to
the source.

2. Be Responsible. Even if material does not say that it is copyrighted, it is not a valid defense
against copyright, Be responsible enough to know If something has a copyright.

3. Be creative. Ask yourself whether what you are making is something that came from you or
something made from somebody else’s creativity.

4. Know the Law. There are some limitations to copyright laws. For instance, in the Philippines,
copyrights only last a lifetime (of the author) plus 50 years. There are also provisions for “fair
use” which mean that an intellectual property may be used without a consent as long as it is
used in commentaries, criticisms, search engines, parodies, news reports, research, library
archiving, teaching and education.

Figure 1. Fair Use Logo


ONLINE RESEARCH

It is a research method that involves the collection of information from the internet. Online
surveys, polls, questionnaires, forms, focus groups, are various tools of online research that are vital
in gathering information essential for market research.
Here are some tips in conducting online research:
1. Have a question in mind. Focus on a question you want to answer
2. Narrow it down. Search engines like Google, Bing, or yahoo use several filters to
determine the most appropriate result for you.
3. Advanced Research. The best way to filter information you get from the search engines
is by using the advacned search. This will allow you to filter out information you do not
need
4. Look for credible source. When using wikis, check out the link of the cited text(ndicated
by superscript number) to be navigatee to the footnote where the list of sources is
located. Click the source of the information and see it it credible.
5. Give credit. If you are going to use the information from a source for educational
purposes, give credit to the original author of the page or information.

Prepared by:
SHS Teachers in Empowerment Technologies
References:
A. Books
Empowerment Technologies page 17-35
B. Online and Other Sources

https://www.academia.edu/36905646/Lesson_2_Empowerment_Technology_Information_and_Communication_Technology
http://rubistar.4teachers.org/index.php

E-Tech Page 7
Name: ___________________________________ Date: _____________

Grade/Section: Score: ____________

EMPOWERMENT TECHNOLOGIES
THIRD QUARTER WEEK No.2
WORKSHEET NO.1

Most Essential Learning Competency: Apply online safety, security, ethics, and etiquette standards
and practice in the use of ICTs as it would relate to their specific professional tracks. And use the
Internet as a tool for credible research and information gathering to best achieve specific class
objectives or address situational.
• K to 12 BEC CG: CS_ICT11/12-ICTPT-Ia-b-2 to 3

I. Directions: Write YES if you agree with the statement and NO if you disagree on
the blank before each number.

_______1. My computer has an antivirus so it is okay to open most email attachments like e-cards and
Video files.

_______2. Your friend told you that his college application was rejected due to the fact that you posted
a video of him doing crazy stuff at a party. You posted the video several years ago but later took it
down to protect your friend’s reputation. Can your friend be right that the college found the video?

_______3. You and your best friend play a lot of video games. One time, she asks you for your
password so she can help you level up and get in- game money. She promises to keep your password
a secret. It’s okay to give away your password?

_______4. You received an email stating that your mother’s bank account is going to be forfeited if
you do not respond to the email. Is it safe to reply?

_______5, You forgot that your essay for English class is due tomorrow. While doing your research,
you found a website offering free essays. It is okay to use the essays from this free essay website?

_______6. A virus is a malware that multiplies and infects other computers through flash drive.

_______7. Keyloggers are software that show pop-up ads even if you are not using your browser.

_______8. Search engines scan websites for search results even if you have set your post to “private”.

_______9. There is a danger in posting information about a future vacation.

_______10. Letting people know your birthday is probably a must if you want to get as many gifts as
possible. But having it in your profile makes you vulnerable to identify theft.

II. Directions: Most of us use the Internet every day. Sometimes, we do not pay
attention on how much information we share online. Below is a questionnaire about how much
information you have shared so far. Put a check ( ⁄) under Shared or Not Shared. A short explanation
if you check Not Shared you can write your explanation provided below.
E-Tech Page 8
Type of Information Shared Not Shared

1.First Name

2. Last Name

3. Middle Name

4. Current and previous school(s)

5.Your cellphone number

6.The name of your Mother and Father

7. The name of your siblings

8. Your Address

9. Your home phone number

10.Your Birthday

Not Shared

__________________________________________________________________________________

__________________________________________________________________________________

__________________________________________________________________________________

__________________________________________________________________________________

__________________________________________________________________________________

__________________________________________________________________________________

E-Tech Page 9
Name: ___________________________________ Date: _____________

Grade/Section: Score: ____________

EMPOWERMENT TECHNOLOGIES
THIRD QUARTER WEEK No.2
WORKSHEET NO.2

Most Essential Learning Competency: Apply online safety, security, ethics, and etiquette standards
and practice in the use of ICTs as it would relate to their specific professional tracks. And use the
Internet as a tool for credible research and information gathering to best achieve specific class
objectives or address situational.
• K to 12 BEC CG: CS_ICT11/12-ICTPT-Ia-b-2 to 3

I. Matching type: Match Column A with Column B. Write the letter of the correct answer on the space
before each number.

A B
______1. virus a. designed to send you advertisement
______2. rogue b. sends on official-looking email and is designed to steal
sensitive personal information
______3. keylogger c. a provision that allows you to use copyrighted work
without consent with certain limitations
______4. adware d. a browser feature that Is synonymous to “private”
browsing
______5. spam e. replicates and can transfer from one computer to another
______ 6. phishing f. exploits
______ 7. fair use g. states that anyone who uses you work without
your consent in punishable by law
______ 8. spyware h. rums in the background and monitors what you are
doing
______ 9. private i. unwanted email most from bots
______ 10. malware j disguised as a useful program but is not
______ 11. incognito k. the information superhighway
______ 12. internet l. tricks the user into posing that is a security software
______ 13. Trojan m. a malicious software
______ 14. copyright n. an option to hide a post so that search engines could not
scan it
______ 15. Pharming o. used to record the keystrokes done by the user

E-Tech Page 10
EMPOWERMENT TECHNOLOGIES
THIRD QUARTER WEEK No.2

Most Essential Learning Competency: Apply online safety, security, ethics, and etiquette standards
and practice in the use of ICTs as it would relate to their specific professional tracks. And use the
Internet as a tool for credible research and information gathering to best achieve specific class
objectives or address situational.
• K to 12 BEC CG: CS_ICT11/12-ICTPT-Ia-b-2 to 3

PERFORMANCE TASK: NO.2

Group Activity Title: CYBER NEWS REPORT

Form a four (4) Groups, Research for several News and Events related to
“CyberCrime”. Using your cellphone or any video-recording devices, report it as
if you were a Newscaster. The video has a 2-4 minutes recording.

Note: Group may change depends on the volume of class


Your Group may compose the following:
▪ Group Leader
▪ Video Editor
▪ Secretary and
▪ Members

The selected video editor of each group may use any video editing application/software. Each group
leader may upload their video of their group output to your respective E-TECH Group Chat Room with
your Subject Teacher. Secretary will be the one to write on a piece of paper the following: Group
Name, Group Leader and the list of the members and their contributions to the group activity and
write the specific date when was the video uploaded. The said paper written by your group secretary
will submit on the day of retrieval schedule.

RUBRICS

CATEGORY POOR FAIR GOOD EXCELLENT TOTAL


10% 15% 20% 25%
Creativity Makes little or Attempts to Effectively Video is
no effort to engage the engages the memorable and
engage and hold audience but audience and uniquely
the attention of lacks of demonstrates represents of the
the audience originality imagination topic
Accuracy Has no Gives a minimal Display Demonstrates
knowledge of amount of knowledge of comprehensive
the topic and information topic and knowledge with
/or gives about the topic. communicates complete and
inaccurate clearly and detailed
information accurately. explanations.
Organization Information is Information is Logically Information is
poorly loosely organized with organized
structured and organized and clearly stated thoughtfully,
is difficult for unclear about topics followed presenting
the listener to main idea by an audience with
follow explanation

E-Tech Page 11
new ways to think
about topic.
Professionalism Poor video Video and audio Video quality is Excellent video
quality, audio is is fair, or difficult acceptable for quality, audio is
not clear/hard to understand; clients, audio is dynamic and
to understand , personal clearly personal
and personal presentation is understood, and presentation
presentation is acceptable personal exceeds
unacceptable presentation is expectations.
appropriate
Total 100%
Mgl/2020

Prepared by:

SHS Teachers in Empowerment Technologies

E-Tech Page 12

You might also like