You are on page 1of 50

LESSON 2: HOW CAN I USE INTERNET AS A TOOL

FOR EFFECTIVE RESEARCH?

• Contextualized Search and Research


• ICT Tools Useful in Research
• ICT Safety, Security and Netiquette

?
Contextualized Online Search and
Research Skills
Contextualized Search – skilled or
optimized way of searching the
Internet based on the “context”
provided, therefore narrowing down
the results given back to you by the
search engine.

What is Research?
Research – is a systematic inquiry that
attempts to provide solutions to existing
problems and questions using facts
and data.
Forms of Research
1. Original Research – primary source
2. Scientific Research – providing explanations about the
world.
3. Humanities Research – historical and sociological research.
4. Artistic Research – practice based research.
Purpose: To discover new information, to interpret existing
facts, to revise, accepted knowledge in light of newly
discovered facts, or to apply theories and laws into practice.
What are the Research Skills I Need to
Develop?
1. Check Your Sources
2. Ask Good Questions
3. Go Beyond the
Surface
4. Be Patient
5. Respect Ownership
6. Use your Networks
ICT Tools Useful in Research
1. Google Search – capable of searching the web through
voice input and filtering the results according to your
behavioral data gathered by the search engine.
2. Google Scholar – a simpler way to search for scholarly
literature on the Internet. Great tool when looking for
contents for the Related Literature section of your research
paper.
3. Online Journals – are scholarly publications released in a
format accessible via the internet.
4. Academic Websites – Wikipedia is a common starting point
when conducting research.
 Internet Archive – is a non-profit electronic library that has a
free-to-access collection of digitized materials ranging from
websites, multimedia files, and academic materials.
 EBSCO Information Service EBSCOHOST – digital library that
offers premium free-based access to mainly academic
materials that are normally not available for public use.
 JSTOR – digital library that is primarily licensed to academic,
scientific, and other research and educational institutions.
ICT Safety, Security, and Netiquette
Verification of Online Source Materials
Currency – Is the information up to date?
Security – Does the site ask too much
personal information?
Scope – Is the information in-depth?
Authority – Does the information come from
a trusted expert?
What is Online Safety?
It is the knowledge of maximizing the user’s personal safety and security
risk to private information, and the self-protection from computer crime in
general.

10 Internet Safety Tips:


1. Know the Scams
10 Internet Safety Tips:
2. Think Before You Click
3. Safety Peruse
4. Shop Wisely
5. Kick Butt
Passwords
6. Protect your Information. Keep your
guard up.
7. Watch your WIFI Connectivity
8. Install a
Firewall
9. Keep up to Date
10. Use your Noggin
Computer Ethics and Netiquette
Computer Ethics – is a new branch of ethics that is concerned with
standards of conduct in the use of computers.
Internet Ethics or Netiquette – is a set of rules that determines how to
properly communicate and browse the web.
Good Practices when using the Internet:
 Always keep your software or application updated and uninstall the ones
that you do not use.
 Do not divulge sensitive information online, especially on unsafe websites.
 Be careful when dealing with emails from unknown sources or spam.
 Run your antivirus, software before going online.
 Think before you click. What you post on the Internet may stay online
forever.
Credits: https://4.bp.blogspot.com
Computer Security – refers to protecting computer
systems and information they contain against unwanted
access, damage, modification or destruction.
A Filipino Computer Science Student wrote the Love Bug
Virus or “I Love You’’
Ten Commandments of Computer Ethics
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other people's computer files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use proprietary software for which you have not paid
(without permission).
7. Thou shalt not use other people's computer resources without authorization or
proper compensation.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you are writing
or the system you are designing.
10. Thou shalt always use a computer in ways that ensure consideration and respect
for your fellow humans.
Intellectual Property

An idea, invention, or process that derives from


the work of the mind or intellect.
Intellectual Property Law (IPL)
It is designed to protect intellectual property.
DIFFERENT BRANCHES OF INTELLECTUAL PROPERTY:
 COPYRIGHTS – the set of exclusive rights granted to the author or creator
of an original work, including the right to copy, distribute, and adapt the
work.
 PATENTS – the set of exclusive rights granted by the state to an inventor or
their assignee for a limited period of time in exchange for public disclosure
of an invention.
 TRADEMARK – the law intended to protect the distinctive sign or indicator
used by an individual, company, organization or any other legal entity to
identify itself and its products as being unique to that organization and
different from any other organization.
LAWS CONCERNING IPR AND ICT
In 1972, the Decree on the Protection of Intellectual Property
(Presidential Decree No. 49) was enacted, which made the Philippines
one of the first countries to recognize software as intellectual property.

In the Philippines the existing law related to intellectual property is


Republic Act No. 8293, the Intellectual Property Code of the Philippines,
which was a consolidation of two previous acts and which was enacted
on June 06, 1997. An Amendment to RA 8293, Republic Act No. 9150,
was enacted on August 6, 2001, and dealt with the layout and design of
integrated circuits.
Avoiding Plagiarism
Six Ways:
1. Paraphrase
2. Cite
3. Quoting
4. Citing Quotes
5. Citing your Own Materials
6. Referencing
Cyber Crimes – is crime that involves a computer and a network.

Common Examples of Cyber Crime


1. Damage to computers, programs or files
– viruses and worms.
2. Theft / Stealing
 Of Hardware, software, data and
computer time.
 Software piracy
 Identity Theft
 Phishing
3. View / Manipulation
 Unauthorized entry and harmless
message
 Cyberbullying

You might also like