Online Safety, Security, Ethics, and Etiquette (Lesson 2)
Document Details
Uploaded by LargeCapacityHydrogen3440
Lydia D. Villangca Trade School
Tags
Summary
This document is a lesson on online safety, security, ethics, and etiquette. It covers various aspects of using the internet responsibly and addresses important topics like cyberbullying, online predators, and digital media. The materials also cover basic netiquette rules.
Full Transcript
EMPOWERMENT TECHNOLOGIES QUARTER 1 – MODULE 2: ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTE As our society faces the ‘new normal’, most of our daily tasks now need the assistance of Information and Communication Technologies. Thanks to the internet, because we can now meet and communicate Payi...
EMPOWERMENT TECHNOLOGIES QUARTER 1 – MODULE 2: ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTE As our society faces the ‘new normal’, most of our daily tasks now need the assistance of Information and Communication Technologies. Thanks to the internet, because we can now meet and communicate Paying bills, buying goods, growing your network of friends and even learning can be done online. Life now is almost turning to digital media. According to (Preston n.d.), digital media is any form of media that uses electronic devices for distribution. This form of media can be created, viewed, modified and distributed via electronic devices And it is very important that you not only know how to use and deal with these technologies but it is necessary to know the different threats brought by the internet and be equipped on how to keep your private information safe and secure online. Private information is your sensitive personal information. ONLINE ETHICS AND ETIQUETTE In order for you to be safe and you can protect your private information while you are working online, you need to know and apply online ethics and etiquette. Online ethics focuses on the acceptable use of online resources in an online social environment. Netiquette is a combination of the words network and etiquette and is defined as a set of rules for acceptable online behaviour. 10 BASIC RULES OF NETIQUETTE 1 Make Real People a Priority If you are talking personally 1. and face to face with someone, stop browsing or chatting with anybody else in your cellphone. 2. Use Respectful Language.Avoid name-calling, cursing, expressing deliberately offensive opinions. In typing, don't use caps lock. Text in all caps is generally perceived as yelling or flaming which cause misunderstanding and trouble. Please don't forget to say please and thank you as appropriate.. 3. Share With Discretion Avoid sending naked sexy pictures, drunk pictures, drug use pictures or unedited home video. If you would have a problem with your boss, your parents, or your kids seeing it now, or at any point in the future, don't post it online. Children should not post private information online. Do not also share your location or picture where you are currently at. Keep your personal information private. 4. Don't Exclude Others Don’t let others feel that they are the one you are talking to in your obscure comment to your Facebook status, forum or Instagram story. And if you have an in-joke to share with one other person, or a small number of people in a larger online group, send them a private message. 5. Choose Friends Wisely It is insulting to be dropped from someone's friend list on a social media site. So, think about it before sending a friend request or accepting an invitation. If you don't want to be in touch with someone, don't add them in the first place. This must be observed by kids or teens so they will not be a victim of online predation. People sometimes are good in pretending just to get your attention or use fake accounts. 6. Respect People's Privacy One example is when you send email to multiple recipients, don’t send it at once, you can send it privately individually or use BCC (blind carbon copy) rather than CC (carbon copy). The same goes for uploading photos or videos that include other people because others who are in this photo don’t want to be viewed by unknown friends. This also applies for tagging people on Facebook because others don’t want to be tagged. Another example is don't sign up for newsletters and other communications using someone else's email address. If you apply this rule, hackers might not have chance to enter and ruin your digital life. 7.Fact Check Before Reposting If you aren't sure of the facts that you’re going to repost, email it to someone who does know or can find out. Or do a search on Google or snopes.com. Because once you’ve reposted a fake news or false facts, many can possibly believe it and spread once again. Don't forget also that many viruses are circulated via chain letters and invitations. So forwarding or reposting this kind of messages will not bring good luck but rather bad luck. Don’t forget to cite the owner of the post or where it came from. And before posting, check whether it is appropriate or inappropriate to others 8. Respond to Emails Promptly In doing this, you can easily check whether the emails you received are spams, unsolicited messages or crafty stuffs and delete these right away. But if you send your email to your friends or set it as public, then you need to respond immediately. But double-check where it really came because there are people who are fond of playing or making fake emails just to get in touch with you. 9. Update Online Information Don't leave inaccurate information online that will mislead your friends or your customers if you have an online business. If you have a business website, update it regularly. Like your operating hours, if you are not available for that time, change it right away 10.Think before Click Don’t hesitate to think before clicking because you might click an unknown links or files that are likely to contain malware which will infect your devices or a link to hacker’s website. Think before clicking Like in social media posts because it might be a suicide post that will end to death because you liked his suicidal post WHAT CAN I DO ACTIVITY 2:MATCH A WITH COLUMN B. CHOOSE FROM COLUMN B THE NAME OF THE INTERNET THREAT BEING DESCRIBED IN COLUMN A 1. This is one form of internet advertising A. Computer Virus used by advertisers to get the attention of web users but sometimes has an obscene or an offensive content. 2. A 12-year old girl reported to her mother that an old man appeared in her chat room B. Cyberbullying asking and seducing her to chat with him. The old man is doing an act of _____________. 3. Devon is fund of taking photos. While they are practicing their play, he takes an embarrassing photo of Lori who is a very shy girl. He then posts the photo on social media and spread it to his friends. Lori is a victim of C. Cyberstalking ___________________. 4. Because of what Devon did to Lori, Lori fought back by sending D. Flaming this message “YOU IDIOT! BASTARD!! GO TO HELL!!!” to Devon. He received a _____________ words. 5. Mona is the most beautiful girl and very famous in town. She has a suitor who is always following her. One day, she wants to be free and wants to go to somewhere else alone. Nobody knows where she will go. When she reached the place, she takes photo and post it in social media. A few hours later, E. Hacker her avid suitor is already in her place. So, the avid suitor is _______________ Mona. 6. Lydia has learned how to transact online using her credit card as a mode of payment. She is using her laptop and since she is new, she browses the internet and click something out of curiosity. She got a problem when she received her credit card statement because of the big amount she needs to pay. Lydia was attacked by ______. F. Online Predation 7.Dan has finished all the written reports. He saved it in G. Pharming a flash drive and he submitted it to his manager. The manager called him and said that his flash drive is empty. Dan’s flash drive was infected with______ 8. Daine is fond of downloading pirated movies. Then suddenly, there are pop-ups about upcoming movies showing on his screen every now and then. H. Phishing And his computer becomes slow. His computer is already infected with ____________. 9. Precy has received an email from the bank asking her to I. Pop-ads update her personal information for security purposes. She clicked the link and signed in. Unknowingly, Precy is already a victim of ____________. 10. Lily knows that the website of BPI Bank is www.bpibank.com so she typed it in the address bar and log in to the system. Unknowingly upon signing in, Lily’s username and password has already been compromised and is now a victim of ___________ J. Spyware