You are on page 1of 46

CHAPTER 1: ICT Applications, Research, Productivity, Safety, and Ethics

Safety, Security and


Ethics
LESSON 2
C I C N A U MMO O T I N

Derived from the Latin word Communicare


which means “to share with, and Communis
which means “to work together”. next
return

FIX

Bayugan City Senior High School w bayugancityshs@gmail.com w fb.com/bayugancityshsofficial


M D E I A

It is referred to as the channel of information


or the channel for communication
next
return

FIX

Bayugan City Senior High School w bayugancityshs@gmail.com w fb.com/bayugancityshsofficial


V R E B A L

It is a spoken type of communication


next
return

FIX

Bayugan City Senior High School w bayugancityshs@gmail.com w fb.com/bayugancityshsofficial


A SocMed
Post

next
return

Bayugan City Senior High School w bayugancityshs@gmail.com w fb.com/bayugancityshsofficial


MELC
TODAY’S Apply online safety, security, ethics, and
etiquette standards and practice in the use of
TARGET! ICTs as it would relate to their specific
professional tracks

Menu Start

Bayugan City Senior High School w bayugancityshs@gmail.com w fb.com/bayugancityshsofficial


DIRECTION
DO NOT WRITE YOUR NAME!
In 5 minutes, write as many as possible of
CONFESS your online activities that you think are
embarrassing or unethical. DO NOT
SHARE WITH YOUR CLASSMATES

Menu Start

Bayugan City Senior High School w bayugancityshs@gmail.com w fb.com/bayugancityshsofficial


DIRECTION

RULES! This activity shall last for 3 minutes. You


are to list ten (10) things you should and
should not do on an online environment.

Menu Start

Bayugan City Senior High School w bayugancityshs@gmail.com w fb.com/bayugancityshsofficial


THE NETIQUETTE

Menu Start

Bayugan City Senior High School w bayugancityshs@gmail.com w fb.com/bayugancityshsofficial


Netiquette

INTE NE E IQUETT
R T
Observance T E
of proper return
etiquette while engaging
activities over the Internet

Bayugan City Senior High School w bayugancityshs@gmail.com w fb.com/bayugancityshsofficial


10 RULES OF
NETIQUETTE
BY VIRGINIA SHEA

Menu Start

Bayugan City Senior High School w bayugancityshs@gmail.com w fb.com/bayugancityshsofficial


The Netiquette

RULE 1:

Remember the human.


12
The Netiquette

RULE 2:
Adhere to the same
standards of behavior
online that you follow in
real life. 13
The Netiquette

RULE 3:
Know where you are in
cyberspace
14
The Netiquette

RULE 4:
Respect other people’s time
and bandwidth

15
The Netiquette

RULE 5:
Make yourself look good
online

16
The Netiquette

Tips to look good online:


• Always check for spelling and grammar
errors
• Know what you're talking about and
state it clearly
• Be pleasant and polite 17
The Netiquette

RULE 6:
Share expert knowledge

18
The Netiquette

RULE 7:
Help keep flame wars
under control

19
The Netiquette

RULE 8:
Respect other people’s
privacy

20
The Netiquette

RULE 9:
Don’t abuse your power

21
The Netiquette

RULE 10:
Be forgiving of other
people’s mistakes

22
Online Safety and Security

• Theinternet is a powerful tool for learning and


communicating with people. However, there are many
dangers that you must watch.
Dangers on the Internet
• Email Spam. Known as junk email, it is usually unsolicited commercial email sent from
one source with identical message sent to multiple recipients. Some of them were not
harmful. Spammer is the term used to refer to a person who creates electronic spam.
Spamming is projected to continue because it is a cheap means of advertising.
• Email Spoofing. Deceitful email practice in which the sender address is changed, so
that it would appear to have come from a different source usually someone you know.
• Phising. Deceitful practice of trying to get confidential information such as passwords
and usernames, and credit card details by making it appear as if it comes from a
trustworthy source.
• Pharming. The main objective of pharming is to obtain username and passwords, as
well a credit card and financial information, and use these to steal their money
electronically or use the credit card of the victims.
• Spyware. It is a program that is installed covertly on a personal computer to collect
information or even take control over the computer without the knowledge of the user.
It would be able to monitor and collect information about the user and his internet
habits and practices.
• Computer worm. It is a computer program that replicate through a network. Some
worms delete files, others disrupt the network function and still, others send junk email
from infected computer. It usually spreads by exploiting weakness in operating system.
• Trojan horse. It can disable the computer’s defenses opening it to unauthorized entry. It
can erase data, can allow access of the victim’s computer, can corrupt files, and can be
used in Phishing for bank accounts.
• Computer virus. It duplicates itself and then infects the computer. It spreads like a
biological virus, wherein it attaches itself to a host program and infect other computer.
• Hacker. A person who is able to enter and control other people's computer without
authorization.
Window Security
• Windows Security, which provides the latest antivirus protection. Your device will be
actively protected from the moment you start Windows. Windows Security continually
scans for malware (malicious software), viruses, and security threats. In addition to this
real-time protection, updates are downloaded automatically to help keep your device
safe and protect it from threats.

• It is sometimes necessary to protect important work and personal information stored in


the computer.
• Changing and Adding User Accounts
 Control panel -> user accounts -> Pick a task -> Change an Account -> Pick an account to change

• Creating a New Password


 Creating a secure password should be at least eight characters which could be a combination of
uppercase and lowercase letters, symbols, and numbers.
 Ideally should not a real word that anyone can easily guess.
 Make sure to remember the password or create a password hint.
Screen Saver Security

• Most operating systems has a


feature that allows you to lock the
computer even when the computer
is in screen saver mode. This means
that even, if your computer is open,
no one will be able to access your
computer account from a screen
saver mode.
Security Center.
The place where you can set additional protection threat to your computer, esp. when the internet.

• Firewall helps in protecting your computer from unauthorized entries, viruses, or


worms from the Internet or network. It is recommended that you keep this setting
turned on.
• Automatics Updates is another feature of windows which when turned on will
automatically download updates from Microsoft. It meant to update some windows
feature, secure areas of vulnerability, fix any bugs in the operating system, and others.
• Virus Protection is usually about the current antivirus installed in your computer.
Antivirus software is meant to locate, find, and remove virus threats that are already in
your computer.
COMMON
ONLINE
THREATH
S
Menu Start

Bayugan City Senior High School w bayugancityshs@gmail.com w fb.com/bayugancityshsofficial


MALWARES Common
Online
Threats
MALICIOUS
SOFTWARES
Includes all kinds of
computer viruses and return
other ill-intention
softwares
31

Bayugan City Senior High School w bayugancityshs@gmail.com w fb.com/bayugancityshsofficial


TROLLING Common
Online
Threats
• Unknowingly attacking
other netizens, or
expressing in aggressive
manner his/her opinion
on controversial issues. return

32

Bayugan City Senior High School w bayugancityshs@gmail.com w fb.com/bayugancityshsofficial


Common
CYBERBULLYING Online
Threats
• A typeof offensive
actions towards
another which takes
place using electronic
technology return

33

Bayugan City Senior High School w bayugancityshs@gmail.com w fb.com/bayugancityshsofficial


FLAMING Common
Online
Threats
• Anact of engaging an
exchange of attacks
online through posts.
return

34

Bayugan City Senior High School w bayugancityshs@gmail.com w fb.com/bayugancityshsofficial


INTERNET Common
ADDICTION Online
Threats
• An impulsive control
problem of using the
internet.
• -HealthGuide.org
return

35

Bayugan City Senior High School w bayugancityshs@gmail.com w fb.com/bayugancityshsofficial


PLAGIARISM Common
Online
Threats
• “Takingover of ideas,
methods, or written words of
another, without
acknowledgement and with
the intention that they be return
taken as the work of the
deceiver.”
• -AAUP 36

Bayugan City Senior High School w bayugancityshs@gmail.com w fb.com/bayugancityshsofficial


PHISHING Common
Online
Threats
Stealing of somebody’s
personal information

return

37

Bayugan City Senior High School w bayugancityshs@gmail.com w fb.com/bayugancityshsofficial


POSING Common
Online
Threats
Assuming of
somebody’s personal
information
return

38

Bayugan City Senior High School w bayugancityshs@gmail.com w fb.com/bayugancityshsofficial


Why do we need to follow the safety rules
in the internet?

next
return

Bayugan City Senior High School w bayugancityshs@gmail.com w fb.com/bayugancityshsofficial


As part of different tracks, why is
it important to be safe in an online
environment? next
return

Bayugan City Senior High School w bayugancityshs@gmail.com w fb.com/bayugancityshsofficial


How do we show that we are more
safe online compared to others?
next
return

Bayugan City Senior High School w bayugancityshs@gmail.com w fb.com/bayugancityshsofficial


How can we help others become
safe in an online environment?
next
return

Bayugan City Senior High School w bayugancityshs@gmail.com w fb.com/bayugancityshsofficial


DIRECTION
I AM A You will be given different situations of which
you will portray how will you act as a safe and

MODEL responsible netizen in your given situation. You


will be given 3-5 minutes to prepare. Then
present it to class

Menu Start

Bayugan City Senior High School w bayugancityshs@gmail.com w fb.com/bayugancityshsofficial


  Description Points
1. Correctness of respond to the The act shows the desirable respond as a digitally 10
situation safe netizen to the given situation.
2. Body movement Student's movement helped express character to 30
The principles of design are the audience. Body was rarely stiff and movement
balance, emphasis, movement, interacted with the dialogue.
pattern, repetition, proportion,
rhythm, and unity

3. Vocal Work Student was always heard. Excellent use of 30


projection, inflection, and articulation.
4. Listening/Reacting Believe- Student always said lines in character and listened 10
ability and reacted in character. Character was always
believable.
5. Commitment/Energy Student had amazing energy and never broke 20
character. Student did not giggle at all through
performance.
TOTAL 100
Reference
• Empowerment Technology Curriculum Guide from DepEd
• Empowerment Technology. Jemma Development Group 2017
ACTIVITY 2

You might also like