You are on page 1of 8

LEARNING MODULE IN EMPOWERMENT TECHNOLOGIES 11

NAME: WEEK 2:
GRADE & SECTION:

What I Need to Know

Welcome to another fun filled adventure as we take another


journey to the world of Information and Communication Technology.

The importance of internet plays a crucial part in human development. Life becomes easy and
comfortable because of this technology. Most of us are connected to the internet via laptop, mobile
phone, tablet, personal computer and other electronic gadgets. Behind this technology there is a risk
that everyone should be aware of. You could be at risk on scam, bullying, and illegal activities if you
will not take precautions in using internet. We need to keep ourselves safe and secure whenever we
use the internet. That is why it is very important to know and learn the ways on how to be safe and
secured online.

Content Standard: The learners demonstrate an understanding of: ICT in the context of global
communication for specific professional track.

Performance Standard: The learners shall be able to: independently compose an insightful reflection
paper on the nature of ICT in the context of their lives, society, and professional
tracks.

Most Essential Learning Competency: Apply online safety, security, ethics, and etiquette standards
and practice in the use of ICTs as it would relate to their specific professional tracks (CS_ICT11/12-
ICTPT-Ia-b-2)

Learning Targets: At the end of the lesson, the student should be able to:

1. Consider one’s and others’ safety when sharing information using the Internet;
2. Consider one’s and others’ reputation when using the Internet;
3. Determine and avoid the dangers of the Internet;
4. Be responsible in the use of social networking sites; and
5. Browse the Internet efficiently and properly through proper referencing.

Address: Nicolasa Virata, General Mariano Alvarez, Cavite


Telephone No.: (02) 808-7139
Email: depedcavite.sanjosechs@gmail.com
https://www.facebook.com/DepEdSJCHS
LESSON
Online Safety, Security, Ethics and
2 Etiquette

What I Know BRAIN TEASER

Good Day! After having been informed on the objective of this module, let
us have the first activity that will gauge your understanding of using ICT
properly and avoiding the different Internet threats.
.

Directions: Write Yes if you agree with the statement and No if you disagree on the blank before
each number.
____ 1. My Computer has an antivirus so it is okay to open most email attachments like e-cards and
video files.
____ 2. You and your classmate play a lot of online games. You are a Noob while he is an Ult. You
admired him of his skills from Killing Spree to Legendary. One time you asked him for tips on
how to be a Nerf like him, but instead of teaching and guiding you, he asks you for your
password so he can help you level up and get in-game money. He promises to keep your
password a secret. Is it okay to give away your password?
____ 3. Letting people know your birthday is probably a must if you want to get as many gifts as possible
and flood like greetings on your wall. But having it in your profile makes you vulnerable to
identity theft.
____ 4. You forgot that your essay for English class is due tomorrow. While doing your research, you
found a website offering free essays. Is it okay to use the essays from this free essay website?
____ 5. Your brother is a teacher, one day during meal time he informed everyone not to tagged him
with photos or post that might contains malicious act or jokes, even his picture during family gatherings
that he is drinking liquor or popping cigarette. He wanted it to be shared via messenger. If you are his
sibling are you going to follow his request? Do believed that this is needed in his work?

What’s In We have learned in lesson 1 about the current state of Information and Communication
Technology in global setting. There are various online platforms and sites that people used
today as their medium of communication and source of information. This communication
technology spread fast to the people and even controls their lives. Despite of the good benefits
given to us by the technology there are still things that we must be aware of. In this lesson we
will discuss and give importance in online safety, security, ethics and etiquette.

Address: Nicolasa Virata, General Mariano Alvarez, Cavite


Telephone No.: (02) 808-7139
Email: depedcavite.sanjosechs@gmail.com
https://www.facebook.com/DepEdSJCHS
Activity 1. Most of us use the internet every day. Sometimes, we do not pay attention on how much
information we share online. Below is a questionnaire about how much information you have shared
so far. Put (√) mark under Shared or Not Shared. The answer on this activity must be based on your
FB account.
Risky or Not?

Information Shared Not Shared


First Name
Last Name
Middle Name
Current and previous school(s)
Cellphone number
Names of your mother and father
Names of your siblings
Address
Home phone number
Birthday
Email address

What’s New Let go back to the “Risky or Not?” test. Let us visit each item and see
how risky it is to share personal information.

The Internet, truly, is a powerful tool. It can be used to promote your business, gain new
friends, and stay in touch with the old ones. It is also a source of entertainment. But like most things
in this world, there is always “another side of the coin.” The Internet is one of the most dangerous
places, especially if you do not know what you are doing.

Address: Nicolasa Virata, General Mariano Alvarez, Cavite


Telephone No.: (02) 808-7139
Email: depedcavite.sanjosechs@gmail.com
https://www.facebook.com/DepEdSJCHS
Activity 2: Self-Check on Online Habits

Directions: Reflect and assess yourself on your online habits. Check “Yes” or “No” on the table
below.
Online Habits Yes No
I always talk to strangers on social media.
Giving your password to your friends
Posting about your future vacations
Ranting on social media
Posting images or videos without asking permission from the owner

Try to evaluate the result of your self test in online habits. Always
remember that internet is defined as information super highway. This
means that anyone has access to this highway, can place information,
What is It and can grab that information. Those habits might be good or bad that
you must be aware of it. If you keep practicing those bad habits it might
bring you danger.
Safety is the first thing you must consider in using internet!

Tips on how to be safe online


 Be mindful of what you share and what site you share it to.
 Do not just accept terms and conditions; read it.
 Check out the privacy policy page of a website.
 Do not share your password with anyone.
 Add friends you know in real life.
 Do not visit untrusted websites.
 Add password to your WIFI at home to make it private.
 Install and update antivirus in your computer.
 Do not give your personal information to anyone
 Do not talk to strangers whether online or face-to-face.
 Think before you click.
 Never post about your future vacation.

Internet Risk
Cyberbullying
It happens when someone intentionally abused, harass, and mistreated by other person
using electronic communication.

Identity Theft
It is a crime of stealing personal information for the purpose of assuming that person’s
name or identity to make any form of transactions.

Cyber Stalking
A criminal practice where electronic communication is used to stalk or harass individual or
group.

Sexting
The act of sending sexually explicit text messages, images, and videos.

Address: Nicolasa Virata, General Mariano Alvarez, Cavite


Telephone No.: (02) 808-7139
Email: depedcavite.sanjosechs@gmail.com
https://www.facebook.com/DepEdSJCHS
Internet Threats

Malware – also known as Malicious Software.

Types of Malware
1. Virus – a malicious program that replicate itself by copying itself to another program.
2. Trojan Horse – a malicious program that disguised as legitimate program that user will
accept and use but take control of your computer.
3. Worm – malicious program that copy’s itself and spreads to other computers.
4. Spyware – A malicious program that gathers information from victim’s computer and send
it back to the hacker.
5. Adware – An unwanted advertisement that will pop-up several times on victim’s computer
then behave abnormally and tedious to close them.
6. Keylogger – A program that runs in the background and steals user credentials and
confidential information and send back to hack by recording every keystroke that a user
makes on their computer or device.
7. Botnet – A collection of infected internet–connected devices such as PC and mobile phone
that are controlled by a common type of malware.
8. Rootkit – A software tools used by hackers to gain control over a computer on a network
without being exposed.
9. Ransomware – A ransom virus that block the user from accessing the programs or files and
demands to pay the ransom through online method for the removal of the virus.

Spam
Also known as junk email or unwanted email send by advertiser or bot. It can be used to
send malware.

Phishing
A cyberattack method using deceptive emails and websites to acquiring sensitive personal
information.

Cybercrime
A crime in which computer is used as object and tool in committing a crime such hacking,
phishing, spamming, child pornography, libel, hate crimes, identity thief and others.

Cybercrime Law
A law that deals with all forms of cybercrime.

Netiquette

It is a word that came from the two words “net” and “etiquette”. It is an etiquette applied online
that shows proper manner and behavior. If you are a member of an online society through social media
you are called netizen. And in interacting with other netizen online, we need to maintain good behavior
which is acceptable to others in online community.

Address: Nicolasa Virata, General Mariano Alvarez, Cavite


Telephone No.: (02) 808-7139
Email: depedcavite.sanjosechs@gmail.com
https://www.facebook.com/DepEdSJCHS
The Core Rules of Netiquette by Seth T. Ross

1. Remember the human.


2. Adhere to the same standards of behavior online that you follow in real life.
3. Know where you are in cyberspace.
4. Respect other people's time and bandwidth.
5. Make yourself look good online.
6. Share expert knowledge.
7. Help keep flame wars under control.
8. Respect other people's privacy.
9. Don't abuse your power.
10. Be forgiving of other people's mistakes.

Protecting Reputations Online

In the past, doing something embarrassing was not much a big deal. Nowadays, embarrassing
moments are captured using any device you could imagine. This could impact not only your reputation
but also the people around you.

Think Before You Click

1. Before you post something on the web, ask these questions to yourself:

Would you want your parents or grandparents to see it?


Would you want your future boss to see it?

Once you post something on the web, you have no control of who sees your posts.

2. Your friends depend on you to protect their reputation online. Talk to your friends about this
serious responsibility.
3. Set your post to “private.” In this way, search engines will not be able to scan that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it
down or report it as inappropriate.

Copyright Infringement
1. Understand. Copyright protect literary works, photographs paintings, drawings, films, music
(and lyrics), choreography, and sculptures.
2. Be responsible. Even if a material does not say that it is copyrighted, it is not a valid defense
against copyright.
3. Be creative. Ask yourself whether what you are making is something that came from you or
something made from somebody else’s creativity.
4. Know the law. There are some limitations to copyright laws. For instance, in the Philippines,
copyrights only last a lifetime (of the author) plus 50 years. There are also provision for “fair use,”
which means that an intellectual property may be used without a consent as long as it used in
commentaries, criticisms, search engines, parodies, news reports, research, library archiving,
teaching, and education. If you have doubts that what you are doing does not fall under the
policy of fair use, seek permission first.

Another misconception is that fan-fiction is not copyright infringement. In reality, it is and some
copyright holders ignore them but they can opt to use their rights.

If you create something—an idea, an invention, a form of literary work, or a research, you have
the right of how it should be used by others. This is called intellectual property.
Address: Nicolasa Virata, General Mariano Alvarez, Cavite
Telephone No.: (02) 808-7139
Email: depedcavite.sanjosechs@gmail.com
https://www.facebook.com/DepEdSJCHS
Nice one! You did great today. Have you had a challenging experience? I
What’s More am sure that it will be easier for you this time. Let’s do this test.

Activity 3: Situational Analysis

Direction: Write your scholastic answer to the question below. Your output will be evaluated by the
rubric below.

Practicality-10 Organization-5 Mechanics-2

1. You received a text message that your mobile number won in a raffle draw of Globe Telecom. The
price will only be awarded if you provide your personal information. What will you do in this situation?

2. Your friend Darlene has a lot of friends on Facebook. She always accepts friend request even from
strangers. One time, she received a friend request from a guy whose profile picture is a celebrity. The
account has no posts and updates, no other information except the name “Random Stranger”. She
accepted the request. They both had a conversation and became online friends. This random stranger
now begins to ask personal information. What advise can you give to your friend? What should be done
in this kind of situation?

3. Your classmate was offended by a teacher because he copied his assignment from someone. Your
classmate was so upset. He decided to create a dummy account to take revenge. He uploaded a video
of your teacher embarrassing another classmate. It went viral. Your teacher was suspended. Now, the
school is investigating the origin of the post. Do you think your classmate was right in doing that? What
online ethics was violated? What you think is the best solution to his problem?

Activity 4: It’s a threat

Direction: Identify the type of malware on the space provided. Please refer to your lesson.

_______________ 1. While browsing online, a commercial about winning lottery popped up tempting
you to click it.

_______________ 2. You classmate’s flash drive that contains your research manuscript suddenly
hides files even corrupting it.

_______________ 3. You normally borrow flash drive from a classmate, you noticed that a file keeps
on appearing no matter what computer you use the flash drive in.

_______________ 4. You installed a new version of Mobile Legends on you phone. After the
installation, a lot of apps now keeps on opening. Your Facebook account was even hacked.

_______________ 5. The front camera of your phone keeps on capturing videos and photos even if
you don’t do it. Someone might be monitoring your activity.

Address: Nicolasa Virata, General Mariano Alvarez, Cavite


Telephone No.: (02) 808-7139
Email: depedcavite.sanjosechs@gmail.com
https://www.facebook.com/DepEdSJCHS
What I Have Learned You are learning a lot! The best way to improve skills and get the
proper direction to express your feelings about your learning is to write
a self- reflection. Let’s do it.

Activity 5: My Reflection

Directions: Think about, reflect carefully, and answer the questions. Write your reflection below.

1. How do you keep yourself safe and secured online?

2. Why it is important to observe netiquette online? Answer by giving example, elaborate.

Activity 6: My Mind Says

Directions: Make a poster with a theme “think before you click”. Use a ¼
illustration board. (To be submitted on November 14, 2020 – this OUTPUT will
be graded under PERFORMANCE TASK)
What I Can Do
Category 4 3 2 1

All graphics
Graphics – All graphics are Some Many graphics
Relevance are related to related to the graphics are are not related
the topic except 1. not related to to the topic.
topic/theme the topic.
and makes it
easier to
understand.

Attractiveness The poster is The poster is The poster is The poster is


attractive,
exceptionally neat acceptably not attractive
attractive, and clean. attractive but it and has many
neat and has few erasures.
clean. erasures.

Prepared by: Noted: Approved by:

MICHELLE P. AMBUNAN, LPT, M.Ed. GREGORIA M. TILA GINA C. BENCITO, PhD.


Teacher II Head Teacher III Principal III

Address: Nicolasa Virata, General Mariano Alvarez, Cavite


Telephone No.: (02) 808-7139
Email: depedcavite.sanjosechs@gmail.com
https://www.facebook.com/DepEdSJCHS

You might also like