You are on page 1of 54

RULES OF

NETIQUETTE
Unit I: Lesson 2 Part 2

ALPINE SKI HOUSE


Teenagers

“ Without proper training, a


swordsman can easily injure himself
when wielding a sword.”
Internet
ALPINE SKI HOUSE 2
“ Like most things in the world,
there is always the other side of
the coin.”

ALPINE SKI HOUSE 3


ACTIVITY

Try using a search engine like Google then


type your first and last name.

Search Google or type a URL

ALPINE SKI HOUSE 4


INTERNET
• The Internet is defined as the
information superhighway.
• This means that anyone has access
to this highway, can place
information, and can grab that
information.

ALPINE SKI HOUSE 5


1987 MEMO ON ETHICS OF THE INTERNET ADVISORY BOARD

• Following this memo, the Computer Ethics Institute created


the Ten Commandments of Computer Ethics in 1992.
• It where introduced by Ramon C. Barquin in his paper entitled
“In Pursuit of a ‘Ten Commandments’ for Computer Ethics.”
• It means to create “a set of standards to guide & instruct
people on the ethical use of computers.”

ALPINE SKI HOUSE 6


THE TEN COMMANDMENTS OF COMPUTER ETHICS

• Be polite when you are sending


messages to people.
I. Thou shalt not use a • Treat other people the way you
computer to harm would like to be treated.

people • Think before you hit the “send”


command. The things you text
or email could hurt someone.

ALPINE SKI HOUSE 7


THE TEN COMMANDMENTS OF COMPUTER ETHICS

• If someone forgets to log out,


II. Thou shalt not log out for them.
interfere with other • Leave other people’s files alone.

people’s computer work • Treat other people the way you


would like to be treated.

ALPINE SKI HOUSE 8


THE TEN COMMANDMENTS OF COMPUTER ETHICS

III. Thou shalt not snoop • Be careful to “log out” of sites


around in other you have signed into.
• Be a good Cyber Citizen
people’s files

ALPINE SKI HOUSE 9


THE TEN COMMANDMENTS OF COMPUTER ETHICS

• Illegal gambling and fraud are


examples of using a computer
to steal.
IV. Thou shalt not use a • Using your computer as place
computer to steal to store illegal or stolen
information is wrong.
• Using email or texting to plan
crimes is wrong.
ALPINE SKI HOUSE 10
THE TEN COMMANDMENTS OF COMPUTER ETHICS

• “False witness” means telling


V. Thou shalt not use a lies about people.
computer to bear false • Be considerate of other
people’s feelings.
witness
• Don’t spread rumors.

ALPINE SKI HOUSE 11


THE TEN COMMANDMENTS OF COMPUTER ETHICS

• “Software” is a term for


computer programs. Software
VI. Thou shalt not use allows you to do things on the
or copy software for computer.

which you have not • Examples are video games, and


media players like iTunes.
paid
• “Open source” and “shareware”
are free and OK to use.
ALPINE SKI HOUSE 12
THE TEN COMMANDMENTS OF COMPUTER ETHICS

• “Authorization” means
VII. Thou shalt not use permission.
• “Computer resources” are
other people’s
people’s hardware (the
computer resources computer) and software (the
without authorization programs).
• If it’s not yours, ASK first.

ALPINE SKI HOUSE 13


THE TEN COMMANDMENTS OF COMPUTER ETHICS

• “Intellectual output” can be


books, artwork, music, films,
VIII. Thou shalt not magazine articles, video, and
appropriate other games.

people’s intellectual • “Appropriate” means copying


other people’s work and
output passing it off as your own.
• Always site your source.
ALPINE SKI HOUSE 14
THE TEN COMMANDMENTS OF COMPUTER ETHICS

IX. Thou shalt think • If you create a computer


program that helps others steal
about the social or do anything against the law,
consequences of the you have done wrong.
program you write. • Hacking is wrong.

ALPINE SKI HOUSE 15


THE TEN COMMANDMENTS OF COMPUTER ETHICS

X. Thou shalt use a


• The computer is a wonderful
computer in ways that
tool. Use it in a way that it will
show consideration and not hurt somebody.
respect

ALPINE SKI HOUSE 16


TIPS TO STAY
SAFE ONLINE
The Internet is a public place and it is
up to you to protect yourself.

ALPINE SKI HOUSE 17


TIPS TO STAY SAFE ONLINE

1.Be mindful of what you


share online and what site
you share it too.

ALPINE SKI HOUSE 18


TIPS TO STAY SAFE ONLINE

2. Do not just accept terms


and conditions; read it.

ALPINE SKI HOUSE 19


TIPS TO STAY SAFE ONLINE

3. Check out the privacy


policy page of a website
to learn how the website
handles the information
you share.

ALPINE SKI HOUSE 20


TIPS TO STAY SAFE ONLINE

4. Know the security


features of the social
networking site you use.

ALPINE SKI HOUSE 21


TIPS TO STAY SAFE ONLINE

5. Do not share your


password with anyone.

ALPINE SKI HOUSE 22


TIPS TO STAY SAFE ONLINE

6. Avoid logging in to public


networks/Wi-Fi.

ALPINE SKI HOUSE 23


TIPS TO STAY SAFE ONLINE

7. Do not talk to strangers


whether online or face-
to-face.

ALPINE SKI HOUSE 24


TIPS TO STAY SAFE ONLINE

8. Never post anything


about a future vacation.

ALPINE SKI HOUSE 25


TIPS TO STAY SAFE ONLINE

9. Add friends you know in


real life.

ALPINE SKI HOUSE 26


TIPS TO STAY SAFE ONLINE

10. Avoid visiting untrusted


websites.

ALPINE SKI HOUSE 27


TIPS TO STAY SAFE ONLINE

11. install and update an


antivirus software on your
computer.

ALPINE SKI HOUSE 28


TIPS TO STAY SAFE ONLINE

12. If you have a Wi-Fi at


home, make it a private
network by adding
password.

ALPINE SKI HOUSE 29


TIPS TO STAY SAFE ONLINE

13. Avoid downloading


anything from untrusted
websites.

ALPINE SKI HOUSE 30


TIPS TO STAY SAFE ONLINE

14. Buy the software; do not


use pirated ones.

ALPINE SKI HOUSE 31


TIPS TO STAY SAFE ONLINE

15. Do not reply or click links


from suspicious emails.

ALPINE SKI HOUSE 32


INTERNET THREATS
Web-based threats, or
online threats, are a
category of cybersecurity
risks that may cause an
undesirable event or
action via the internet.

ALPINE SKI HOUSE 33


1. MALWARE
Adware Virus
Stands for Malicious Software.

Typically consists of code Malware


developed by cyberattackers,
designed to cause extensive
damage to data and systems or Spyware Worm
to gain unauthorized access to
a network
Trojan

ALPINE SKI HOUSE 34


1.1 VIRUS
A malicious program designed
to replicate itself and transfer
from one computer to another
either through the Internet and
local network or data storage.

ALPINE SKI HOUSE 35


1.2 WORM
A malicious program that
transfers from one computer to
another by any type of means.

Often, it uses a computer


network to spread itself.

ALPINE SKI HOUSE 36


1.3 TROJAN
A malicious program that is
disguised as a useful program
but once downloaded or
installed, leaves your PC
unprotected an allows hackers
to get your information.

ALPINE SKI HOUSE 37


1.4 SPYWARE
A program that runs in the
background without you
knowing it.

It has the ability to monitor


what you are currently doing
and typing through keylogging.

ALPINE SKI HOUSE 38


1.5 ADWARE
A program designed to send
you advertisements, mostly as
pop-ups.

ALPINE SKI HOUSE 39


2. SPAM
Unwanted email mostly from
bots or advertisers.

It can be used to send malware.

ALPINE SKI HOUSE 40


3. PHISHING
Its goal is to acquire sensitive
personal information like password
and credit card details.

This is done by sending you an


email that will direct the user to
visit a website and be asked to
update his/her username,
password, credit card, or personal
information.

ALPINE SKI HOUSE 41


ALPINE SKI HOUSE
INTELLECTUAL PROPERTY RIGHT (IPR)

• The biggest issue surrounding ICT concerns the violation of


intellectual property rights, which is the act of stealing other
people’s works and ideas, whether knowingly or unknowingly.
• An intellectual property laws (IPL) protect the rights of people
to maintain legal ownership of their works and ideas.

ALPINE SKI HOUSE 43


REPUBLIC ACT NO. 8293

• This Act shall be known as the “Intellectual Property Code of


the Philippines.”
• An Act that protect individual’s legal ownership.
• The Philippine copyright law also protects trademarks,
patents and even various forms of intellectual property.

ALPINE SKI HOUSE 44


6 WAYS TO AVOID PLAGIARISM

1. PARAPHRASE – Read the material you wish to use and


rephrase it in your own words. Using two copied words
consecutively must be avoided. However, in a situation
wherein it cannot be avoided, quotation marks must be used.

- 6 Ways to Avoid Plagiarism in Research Papers (WriteCheck, 2017)


ALPINE SKI HOUSE 45
6 WAYS TO AVOID PLAGIARISM

2. CITE - Proper citation must be observed when referencing


existing material. Examples are the guidelines established
by the American Psychological Association (APA). Citation
often requires the name of the author of the material you
intend to reference and the publication date.

- 6 Ways to Avoid Plagiarism in Research Papers (WriteCheck, 2017)


ALPINE SKI HOUSE 46
6 WAYS TO AVOID PLAGIARISM

3. QUOTING - Directly quoting the source material is


recommended in order to avoid misquotation or
misinterpretation. It is still best to paraphrase your source
materials and avoid quoting directly as much as possible.

- 6 Ways to Avoid Plagiarism in Research Papers (WriteCheck, 2017)


ALPINE SKI HOUSE 47
6 WAYS TO AVOID PLAGIARISM

4. CITING QUOTES - The methods of citing quotes and citing


the paraphrased material generally differ. The former often
includes the page number written after the name of the
author if the source material is a book, a magazine, or a
newspaper, among several other sources

- 6 Ways to Avoid Plagiarism in Research Papers (WriteCheck, 2017)


ALPINE SKI HOUSE 48
6 WAYS TO AVOID PLAGIARISM

5.CITING YOUR OWN MATERIAL - Although the reference you


may want to use is your own work, it is still necessary to cite
yourself as you would the work of another person. Failure to
provide citations for your own material is known as “self-
plagiarism.”

- 6 Ways to Avoid Plagiarism in Research Papers (WriteCheck, 2017)


ALPINE SKI HOUSE 49
6 WAYS TO AVOID PLAGIARISM

6.REFERENCING - Apart from citing direct quotes and


paraphrased text, it is also important to provide a page for
references and other materials used at the end of your work.

- 6 Ways to Avoid Plagiarism in Research Papers (WriteCheck, 2017)


ALPINE SKI HOUSE 50
THANK
YOU
Do you have any questions,
concerns, or clarifications?

ALPINE SKI HOUSE


REFERENCES:

• Empowerment Technologies; Innovative Training


Works, Inc. 2017. Lipa City: Rex Book Store, pp. 21-30
• Juanillo, Melissa P. MIT / Tan, Emelita Jane M. MAET.
2019. E-Tech: technology empowerment in a
connected, digital world.Quezon City: TechFactors Inc.,
pp. 30-33
ALPINE SKI HOUSE 52
REFERENCES:

• “Ten Commandments of Cyber Ethics.” The Cyber Citizen


Partnership. 10 Jun. 2010
http://cybercitizenship.org/ethics/commandments.html
• “What Is Cyber Crime?” The Cyber Citizen Partnership. 10
Jun. 2010
http://www.cybercitizenship.org/crime/crime.html

ALPINE SKI HOUSE 53


REFERENCES:

• “Republic Act No. 8293”


https://www.officialgazette.gov.ph/1997/06/06/republic-
act-no-8293/

ALPINE SKI HOUSE 54

You might also like