Online Safety, Security, Ethics and Etiquette - Lesson 2 PDF
Document Details
Uploaded by Deleted User
University of Makati
Tags
Related
- Digital Citizenship (المواطنة الرقمية) PDF
- Lesson-2_Online-Safety-Security-Ethics-and-Netiquette.pdf
- E-Technology: Online Safety, Security, Ethics, and Etiquette PDF
- Reviewer Empowerment Technologies 11-12 Online Safety and Security PDF
- Week 002-Module Online Safety and Security PDF
- ETech Week 1 PPT 2024-2025 PDF
Summary
This document is a lesson plan on online safety, security, ethics, and etiquette. It covers topics like cybersecurity, data privacy, cybercrime, and netiquette. It's presented as a series of slides or pages, likely used for a secondary school class or similar educational setting.
Full Transcript
ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTES Empowerment Technologies – Lesson 2 OBJECTIVES At the end of the lesson, the students should be able to: - prioritize one’s and others’ reputation when using the internet; - evaluate the dangers of the internet; - determine o...
ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTES Empowerment Technologies – Lesson 2 OBJECTIVES At the end of the lesson, the students should be able to: - prioritize one’s and others’ reputation when using the internet; - evaluate the dangers of the internet; - determine once responsibility in the use of social networking sites; - cite the importance of one’s and others’ safety when sharing information using the internet. CYBERSECURITY Refers to the online security or safety of people and their information when using the internet; a general term for technologies, practices and processes used to protect online data from unauthorized access or misuse COMMON ISSUES AND THREATS TO ONLINE SAFETY AND SECURITY WHAT IS DATA PRIVACY? The ability of a person to determine for themselves when, how, and to what extent personal information about them is shared with or communicated to others COMMON ISSUES ON DATA PRIVACY HACKING PHISHING IDENTITY THEFT Involves activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire HACKING networks through unauthorized access A type of social engineering attack often used to steal user data, including login credentials and credit card numbers by “reeling in” victims through several and often PHISHING unsophisticated ways Occurs when a criminal obtains or uses the personal information of someone else to assume their identity or access their accounts for the purpose of committing fraud, receiving IDENTITY THEFT benefits, or gaining financially in some way CYBERCRIME Also called computer crime; any criminal activity that involves the use of a computer, networked device, or a network as an instrument to further illegal ends OTHER FORMS OF CYBERCRIMES Piracy and Illegal Downloads Cybersquatting Online Drug Trafficking Cyber Libel or Cyber Defamation Online Harassment (Cyberstalking, Internet Trolls, etc.) Internet Pornography Online Predators and Other Sex Crimes FAKE INFORMATION News, stories, or hoaxes created to deliberately misinform or deceive readers and created to either influence people’s views, push a political agenda, or cause confusion and can often be a profitable business for online publishers CLICKBAIT PROPAGANDA SATIRE/PARODY FALSE CONTEXT MANIPULATED CONTENT MISLEADING HEADLINES BIASED/SLANTED NEWS ICT-RELATED LAWS IN THE PHILIPPINES An act providing for the recognition and use of electronic commercial and non- commercial transactions and Electric documents, penalties Commerce Act for unlawful use thereof and for other of 2000 purposes (RA 8792) Department of Information and Communications Technology Act Provide quality of 2015 and affordable (RA 10844) ICT services to every Filipino Data Privacy Provide quality Act of 2012 and affordable (RA 10173) ICT services to every Filipino Cybercrime Provide quality Prevention Act and affordable (RA 10175) ICT services to every Filipino TIPS ON STAYING SAFE ONLINE Keep your devices, programs, and applications updated. Make sure your devices are secured; use a good anti-virus Always back up data. Keep personal information private Protect your personal information with strong passwords Make sure your devices are secured, use multi-factor authentication wherever possible Be careful where you connect. Avoid connecting to unsecured public WiFi networks. Be careful of suspicious links and where you click. Be careful what you download. NETIQUETTE Network etiquette; proper manner of communication in the online environment VIRGINIA SHEA’S CORE RULES OF NETIQUETTE 1 REMEMBER THE HUMAN Your written words are read by real people, deserving of respectful communication. Before you press send or submit, ask yourself, “Would I be okay with this if someone else had written it?” ADHERE TO THE SAME STANDARDS OF BEHAVIOR 2 ONLINE THAT YOU FOLLOW IN REAL LIFE Do your best to act within the laws and ethical manners of society whenever you inhabit cyberspace KNOW WHERE YOU ARE IN 3 CYBERSPACE Netiquette varies from domain to domain (Shea, 1994). The same communication can be acceptable in one, where it might be inappropriate in another. RESPECT OTHER PEOPLE’S 4 TIME AND BANDWIDTH It is your responsibility to make sure that time spent reading your words isn’t wasted. Make communication meaningful and to the point. MAKE YOURSELF LOOK GOOD 5 ONLINE Online communication - Free commerce icons Always check for spelling and grammar errors. Know what you’re talking about and state it clearly. Be pleasant and polite. 6 SHARE EXPERT KNOWLEDGE Share what you know, what you’ve learned, and information that might be of interest to others! HELP KEEP FLAME WARS UNDER 7 CONTROL Don’t engage in angry exchange, extinguish them by guiding the discussion back to a more productive direction. 8 RESPECT OTHER PEOPLE’S PRIVACY Be sure to err on the side of caution when deciding to discuss or not to discuss things in virtual communication. 9 DON’T ABUSE YOUR POWER Knowing more than others do or having more power than others may have does not give you the right to take advantage of anyone. 10 BE FORGIVING OF OTHER’S MISTAKES Practice kindness and forgiveness as you would hope someone would do if you had committed the same offense. SOURCES AND REFERENCES Empowerment Technologies – DepEd Module (Quarter 1-Module 2) http://www.albion.com/netiquette/corerules.html https://www.snbsd.com/about/online-safety-guide https://www.kaspersky.com/resource-center/preemptive- safety/top-10-preemptive-safety-rules-and-what-not-to-do- online Images courtesy of Google Image Search