You are on page 1of 16

LESSON 2:

Rules of Netiquette
Netiquette represents the importance of proper manners and behavior online. In
general, netiquette is the set of professional and social etiquettes practiced and
advocated in electronic communication over any computer network. Common guidelines
include being courteous and precise, and avoiding cyber-bullying. Netiquette also dictates
that users should obey copyright laws and avoid overusing emoticons. Netiquette is a
short form of network etiquette or Internet etiquette
In this generation, people are dependent on the
Internet. Like how people socialize face to face, we should
follow etiquette at all times as it mirrors our personality. Being
on different platforms. we should be aware of our actions and
protect ourselves at the same time. Remember that once
something has been shared online, it cannot be deleted
This lesson provides information about netiquette, it will serve as your guide on
how to behave appropriately online. It is vital to use netiquette because communication
online is non-verbal. Most often, online discussion consists of reading something else has
typed. To understand better the Do's and Don'ts of Netiquette you watch this video
through this link https://bit.ly/3Hi253W.

LIKE to Engage

I. Pre-Assessment
Instruction: Write Yes if you agree with the statement and No if you disagree on the blank
before each number.
______1. My computer has an antivirus so it is okay to open most email attachments like
e-cards and video files.
______2. Your Friend told you that his college application was rejected due to the fact
that you posted a video of him doing crazy stuff at a party. You posted the video several
years ago but later took it down to protect your friend’s reputation. Can your friend be
right that the college found the video?
______3. You and your best friend play a lot of video games. One time, she asks you for
your password so she can help you level up and get in-game money. She promises to
keep your password a secret. Is it okay to give away your password?
______4. You receive an email stating that your mother’s bank account is going to be
forfeited of you do not respond to the email. Is it safe to reply?
______5. You forgot that your essay for English class is due tomorrow. While doing your
research, you found a website offering free essays. Is it okay to use the essays from this
free essay website?
______6. A virus is a malware that multiplies and infects other computers
through flash drives.
______7. Keyloggers are software that show pop-up ads even if you are not
using your browsers.
______8. Search engines scan websites for search results even if you have set
your post to “private”.
______9. There is a danger in posting information about a future vacation.
______10. Letting people know your birthday is probably a must if you want to
get as many gift as possible. But having it in your profile makes you vulnerable
to identity theft.

PIN the AIM


II. Objectives
At the end of this lesson, you should be able to:
• consider one’s and others’ safety when sharing information using the Internet;
• consider one’s and others’ reputation when using the Internet;
• determine and avoid the dangers of the Internet;
• be responsible in the use of social networking sites; and
• browse the Internet efficiently and properly through proper referencing.

SUBSCRIBE to Acquire
III. Lesson Proper
Key terms
• Online safety and security
• How to stay safe online
• Cybercrime
• Internet threats
• Copyright
• Privacy policy
Scan me to view
• Online search
Lesson 2 in PDF form.
• Fair use

Ask yourself
1. Have you tried searching your profile in Google?
2. Did you get links to your profile page? How did these things happen?
3. How can search engines locate you?
4. Is there any danger of being found by search engines?
Let’s Reflect
How many hours do you spend on the internet per day?
Can you live without the Internet for a week?
How many aspects of your life depend on the Internet?
How many times have you complained about your Internet connection speed?

Online Safety and Security


The Internet, truly is a powerful tool.
It can be used to promote your business, gain new friends,
and stay in touch with the old ones.
It is also a source of entertainment through games, online
communities, and everything in between.

How Safe are You? Let us visit each item and see how risky it is to share them.
Type of Risks
Information

1. First name There is a risk in sharing your first name. Chances are, a
hacker may already know plenty of stuff about you even if you
only give out your first name.

2. Last name If sharing your first name is a small risk, having both your first
and last is riskier. You will be vulnerable to being searched for
using search engines, which include image search. Matching
a name with a face is modus to several cybercrimes like
identity theft.

3. Middle name Sharing your middle name alone is probably not the riskiest of
this shared information, but sharing your full name would be.

4. Current and Most people who steal identities study their subject. They can
previous use this information for verification purposes.
school(s)

5. Your cellphone Your cellphone number should never be posted over the
number Internet. The Internet is a public place. It is the same as posting
your number on a billboard.

6. The name of Risky, yet not as risky as posting their full names, especially
your mother and your mother’s maiden name.
father

7. The name of Disclosing this is a huge risk. Strangers may pretend or use
your siblings their identity to dupe you.
8. Your address Hopefully, you answered “no” to this one. Giving the Internet
your number is one thing; giving them your address is a whole
other level. It would be much easier for criminals to find you.

9. Your home This shared information is riskier than sharing your personal
phone number phone number. Scams usually use this information to deceive
you, one of which is when a stranger pretends to know your
parents or pretend to be you.

10. Your Birthday Letting people know your birthday is probably a must if you
want to get as many gifts as possible. But having it in your
profile makes you vulnerable to identity theft.

Online Safety and Security


The Internet: “Information Superhighway”.
This means that anyone has access to this highway, can place information, and can grab
that information. Any information, even things that you have set privately, can be
accessed one way or another. To know more about online safety and safe web surfing
you may watch this video through this link https://bit.ly/3uhAYCq.

Tips to Stay Safe Online


1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how
the website handles the information you share.
4. Know the security features of the social networking site you
use.
5. Do not share your password with anyone.
6. Avoid logging in to public networks/Wi-Fi. Browsing in
“incognito (or private) mode”, a feature of the browser, will not
protect you from hackers.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about a future vacation. It is similar to
posting, “Rob my house at this date.”
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your computer.
Use only one anti-virus software to avoid conflicts.
12. If you have a Wi-Fi at home, make it a private network by
adding a password.
13. Avoid downloading anything from untrusted websites.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails.
1. Thou shalt not use a computer to harm other people in any way.
2. Thou shalt not interfere with other people’s work.
3. Thou shalt not sneak around in other people’s computer files.
4. Thou shalt not use computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use proprietary software for which you have not paid.
7. Thou shalt not use other people’s computer resources without authorization or
proper compensation.
8. Thou shalt not appropriate other people’s intellectual output.
9. Thou shalt think about the consequences of the program you are writing or the
system you are designing.
10. Thou shalt always use a computer in ways that ensure consideration and respect
for your fellow humans.

Internet Threats
An Internet threat is a threat that makes use of the World Wide Web
to disperse, conceal, and update themselves with the intention of
facilitating cybercrime.

1. Malware (Malicious Software)


a. Virus – loaded into a user’s computer without the user’s
knowledge and perform malicious actions and can be trans
ferred from one computer to another.
b. Worm – stand-alone malicious software that can self-
replicate and propagate via computer networks w/o human
help.For example, the ILOVEYOU worm (Love Bug Worm)
created by a Filipino (Onel de Guzman).
c. Trojan – disguised as a useful program but once
downloaded or installed, leaves your PC unprotected and
allows hackers to get your information.
*Rouge Security software – tricks the user into
posing that it is a security software. It asks the
user to pay to improve his/her security but in reality,
they are not protected at all.
d. Spyware – a program that runs in the
background without you knowing it (thus called
“spy”) It has the ability to monitor what you are
currently doing and typing through keylogging.
*Keyloggers – used to record the keystroke
done by the users. This is done to steal their
password or any other sensitive information.
e. Adware – a program designed to send you
advertisements, mostly as pop-ups

2. Spam – unwanted email mostly from bots or advertisers. It can


be used to send malware.

3. Phishing – Its goal is to acquire sensitive personal


information like passwords and credit card details.
*Pharming – a more complicated way of phishing where it
exploits the DNS (Domain Name Service) system.

Protecting Reputation Online (Think before you Click)


• Nowadays, embarrassing moments are captured using any
device you could imagine. This could impact not only your
reputation but also the people around you.
• Once you post something over the Internet, search engines
keep them in their archives for search results. This makes
anything you post to last forever.
• Before, hiring, companies do a background check on the applicant, and the
easiest way to check your background is to visit pages that are related to
you.

Copyright Infringement
If you create something – a idea, an invention, a form of
literary work, or a research, you have the right as to how it should be
used by others. This is called intellectual properly. In other words,
the copyright law includes your rights over your work, and
anyone who uses it without your consent is punishable by law.
To better understand copyright, public domain, and fair use you may watch this
video through this link https://bit.ly/3oeLwy8.
Tips to avoid copyright infringement:
1. Understand – Copyright protects literary works, photographs, paintings,
drawings, films, music (and lyrics), choreography, and sculptures, but it
generally does NOT protect underlying ideas and facts.

2. Be responsible – Even if material does not say that it is copyrighted, it is


not a valid defense against copyright.

3. Be creative – Ask yourself whether you are making is something that


came from you or something made from somebody else’s creativity.

4. Know the law – There are some limitations to copyright


laws. For instance, in the Philippines, copyrights only last a lifetime
(of authors) plus 50 years. There are also provisions for “fair use”
which mean that intellectual property may be used without a consent.

Six ways to avoid Plagiarism


1. Paraphrase
2. Cite
3. Quoting
4. Citing quotes
5. Citing your own material
6. Referencing

Online Research
What is the difference between “Madonna” and “the Madonna”? Try to search
it on the net and see the difference.

Madonna The Madonna

Have you searched the Internet for certain information where the search engine
returned a different result? The information that we need is more likely already in the
Internet. It is just a matter of how to look for it and how to use information from the most
credible source. Here are some tips in conducting online research:
1. Have a question in mind.
Focus on a question you want answered. If it is a series of questions, start with
one. Never search everything on one go. Here is an Essential Google Search Tricks for
Research - https://bit.ly/3HjWbPI.

2. Narrow it down.
Search engines like Google, Bing, or Yahoo use several filters to determine the
most appropriate result for you. These search engines use your previous search
history and your geographical location, and send you the result which is the most related
to you. But if all these filters fail, you should remember to narrow it down what you are
searching for. For example, if you were to look for Tom Sawyer, the animation series, you
would better use the keywords “Tom Sawyer animation” rather than just “Tom Sawyer”.
Another example is if you were to look for science research experiments, it would be
better to include what branch of science it is or what type of study it is.

3. Advanced Search.
The best way to filter information you get from search engines is by using the
advanced search. This will allow you to filter out information you do not need. In Google,
simply search a word like you would normally do, and then click the advance search
option on the options button located at the upper right corner of the page.

4. Look for credible source.


Some wikis, are not a credible source. This is due to the fact that anyone can
edit its content. The more credible sources are scientific journals, websites, online
encyclopedias and scholarly databases.
You can also check the URL of a website if it ends with a .org. .gov, and .edu. A
website that ends with .com is intended to be a commercial website. In most cases, .edu
websites are best for research as government and organization websites may have a
tendency to make information favorable to them. Unfortunately, not all websites follow the
standards in domain name conventions. Some sites use the suffixes like .com loosely;
some sites are not credible even though they use a .edu suffix. Another tip to validate if
the information is correct is to have multiple sources of information. Having two or more
websites will tell you whether the Information is reliable or not.
5. Give credit.
If you are going to use information from a source for education purposes, give
credit to the original author of the page or information. To properly cite a reference, you
may use the format below:

INSTA-practice

IV. Practice
Instruction: The class will be divided by five
members in each group (approximately 7 groups).
They will access this link https://bit.ly/3s50jg5 to
do the activity. Through the link using Jamboard
the groups must sort the information if it is safe or
unsafe. The groups will be given five minutes to do
the task. After the groups were finished, they will
present their output in the class. Discussion of the
correct answers will be presented after the
presentations.
Assess your STATUS
V. Written Work
Understanding Social Issues (Online Research)
Instruction: Take a three (3) screenshot or picture of any social issue on Facebook,
Instagram or Twitter including the author/reference. Paste the pictures in the table
below. Create a short description of the issue (E.g., Excessive use of Plastic Bag – the
use of excessive single use plastic that greatly affected our environment. Global warming
is one of the effects of improper plastic waste disposal.), Campaign name (“No to plastic
for greener community”) and at least three ways on how to solve each issue.
Examples of Social issue are as follows: Poverty, Unemployment, Terrorism,
Discrimination, Health Concerns, etc.

INSERT PHOTO/s HERE

Social Issue 1:
Campaign Name:
Solutions:
1.
2.
3.
References:

INSERT PHOTO/s HERE

Social Issue 1:
Campaign Name:
Solutions:
1.
2.
3.
References:
INSERT PHOTO/s HERE

Social Issue 1:
Campaign Name:
Solutions:
1.
2.
3.
References:

Rubric (20 points):


Criteria Exemplary Satisfactory Developing Beginning Score
9-10 6-8 4-5 1-3
All Minor issues of Confusing
The issues have
components clarity causing writing that can
very confusing
are clear, confusion that only be
writing.
organized, and can be overcome interpreted with
easy to follow. by careful significant
reading and effort.
Content and interpretation by
Clarity the reader.
Content to the Content is Content Content
assigned topic thoughtful and adequately consists of
is thorough fairly well written; addresses unsupported
and well most opinions some aspects opinions only
written with supported with of the assigned marginally
supported facts. topic. related to the
facts. topic.
5 4 2-3 1
All
All components One or more No genuine
components
are present, but components attempt at a
are present
Completeness some are are missing, or complete
and complete.
somewhat all components solution.
incomplete. are severely
incomplete.
5 4 2-3 1
Images are Some images No image or
Images have a
related to the are related to images are not
Images strong relation
community the community related to the
to the post.
problem. problem. community
problem.
TOTAL ____/20
REDDIT to Demonstrate

VI. Performance Task


Cyber Radio News Report

Instruction:
The class will be divided into six (6) groups with five to six members each. They
need to research several cyber news online and current events related to cybercrime in
the Philippines. Students must apply the tips on how to do proper online researching by
getting the right facts and relevant sources. Students must also bear in mind the tips on
avoiding copyright infringement by while researching their content. The script for the radio
broadcast will be submitted to the teacher including the sources and references gathered
by each group.

Using a cellphone or any audio recording device, the group must report as if they
were a newscaster. The groups must also create or research two to three advertisement
on how to be safe and secure online by following ICT netiquette and ethics. The groups
must present the edited audio recording with a minimum of 5 minutes and a maximum of
10 minutes. Each group must submit their output here: https://bit.ly/3riOgwD.

Below is a guide on how the students can create their cyber radio news report:
• Write like you speak: Write in your own voice, in a conversational tone, as if you’re
speaking to only one listener. Keep sentences short. If you have a long sentence,
follow it up with a short one. When you go back and read your narration aloud, do
you truly sound like yourself?
• Keep it simple: Allot a sentence to each idea. Be clear and concise, stick to the
story and don't try too hard to be "clever." Too much detail can become irrelevant
and make the story lose focus. Avoid most multiple-syllable words, words that are
tough to pronounce and long, convoluted sentences.
• Provide specificity: Although the goal is to write clearly, you must also avoid
being too general. Dillon says reporters should provide context for anything that
may cause confusion or "raise eyebrows." When describing people, don't label
them. Tell exactly what they do as opposed to using their official title.
• Tell stories in a logical order: Make sure that your content has a beginning, a
middle and an ending. Don't bury the lead; state the news near the top, without too
much buildup.
• Use the present tense and active voice: You're writing for flow and to express
what is going on now. Broadcast strives for immediacy. To convey this to the
listener, use the active voice whenever possible. In English, try to use a subject-
verb-object sentence structure. For example: "Police (subject) have arrested (verb)
21 activists (object) for staging a protest at Merlion Park on Saturday afternoon."
• Use imagery: Radio audiences need to imagine the people, places and things in
your story. With your words, create powerful and straightforward imagery. Use
descriptive verbs instead of adjectives. For example, if you say “he struts or
saunters” you’re giving a picture without using an adjective. But don't let vivid,
imagery-rich writing turn verbose. Use words sparingly.
• Let the speaker speak: If you’re hosting a show or an interview, be the host. Don't
overpower the subject of the story. When interviewing, "Don’t 'mm hmm' them and
don't keep talking and talking about yourself," Irani says. "You’re just a conduit
whose job it is to relay a story/experience/emotion from the guest to the audience."
Reference: https://ijnet.org/en/resource/how-write-broadcast-news-stories

Their cyber radio news report must have following elements/features:


1. A well-researched topic.
2. An introduction or a lead.
3. A main body with a clear narrative pattern.
4. Interviews and/or sound bites.
5. A conversational writing style.
6. The topic’s character and personality.
7. A wrap up that completes the story.
Reference: https://understandmedia.com/topics/media-production/68-writing-radio-news
Rubric (30 points):
Category Excellent Good Adequate Inadequate
Content 9 – 10 6–8 3–5 1–2
Evidence clearly Evidence perhaps Evidence, facts, Lacks key
presented. Thorough, not and interpretation observations.
knowledgeable quite clearly difficult to untangle Evidence unclear.
interesting, logical. separated from facts from one another. Appears largely
Facts and and interpretation of opinion-based.
interpretations clear, evidence, but story
and clearly identified. is logical.
Opening & 5 4 2–3 1
intro Clearly, quickly Established focus by Audience had an Little or no intro,
established the focus the end of the intro, idea of what was such that audience
of the presentation, but went off on a coming, but the did not know the
gained audience tangent or two. intro did not clarify speaker’s main
attention Gained attention. the main focus. focus.

Clarity & 5 4 2–3 1


Organization Main points clearly Main points fairly Main points must Presentation
stated and explained; clear; some missing be inferred by jumps among
logical, smooth links or transitions. audience; holes random
organization are evident. topics. Main points
unclear
Style & Delivery 5 4 2–3 1
Audience could see & Audience could see Audience could Speakers spoke
hear speakers & hear speakers mostly see & hear to the screen or
clearly. Effective clearly, most speakers. Speakers mostly to one
pauses and verbal pauses & verbal show some person in the
intonation. intonation were hesitation or audience. Poorly
effective. uncertainty. timed. Appears to
have not
practiced.
Summary 5 4 2–3 1
Conclusions clearly Conclusions stated. Summary shown Summary non-
stated. Summary Summary perhaps but poorly existent or
integrated main not quite fully explained by very abrupt.
points and brought supported by speaker. Lack of
the presentation to evidence shown, Audience has to synthesis.
a logical & effective but main points summarize for
closure clear. themselves.

BOOKMARKS for the Soul

VII. Quotations/Bible Verses


“Passwords are like underwear, don’t let people see it, change it very often, and you
shouldn’t share it with strangers.” – Chris Pirillo

SNAP of Key Points

VIII. Lesson Summary


Most teenagers spend their time online. It is vital to consider what information you
share because Internet us a public place. There are several ways to stay safe online and
it is essential that we know and apply them. Several Internet threats include malwares,
spams, and phishing. Malwares could be in the form of a virus, worm, Trojan, spyware,
or adware.
We are responsible of what we post online. It is also our responsibility to protect
other’s reputation. We should be mindful of what we post when others are involved.
Copyright laws protect the authors or producers of literary works, photographs, paintings,
drawings, films, music, choreography, and sculptures from having their work used without
their permission. It is important to understand the laws to avoid being sanctioned.
When researching online, remember to narrow down your topic. Use advanced
search features. Look for a credible source and cite your references.
References:
BOOKS/EBOOK/PDF:
Manila. DepEd. (2020). K-12 Most Essential Learning Competencies with
Corresponding Codes [Ebook] (1st ed., pp. 548-551). Manila. Retrieved from
https://lrmds.deped.gov.ph/
Rex publishing. (2019). Empowerment Technologies.

WEBSITES:
https://www.slideshare.net/jandextercai/admshs-emp-techq1m2netiquettes
https://www.techopedia.com/definition/25061/netiquette

You might also like