🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

REVIEWER-empowerment-technologies11-12_q1_wk2_Online-Safety-and-Security.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

Republic of the Philippines Department of Education Region III SCHOOLS DIVISION OF ZAMBALES Zone 6, Iba, Zambales Te...

Republic of the Philippines Department of Education Region III SCHOOLS DIVISION OF ZAMBALES Zone 6, Iba, Zambales Tel./Fax No. (047) 602 1391 E-mail Address: [email protected] website: www.depedzambales.ph Name: _________________________________ Grade/Section___________________ School: ________________________________ Date: ___________________________ LEARNING ACTIVITY SHEET EMPOWERMENT TECHNOLOGY 11/12 I. Introduction As the Internet becomes an increasingly integral part of daily life, questions about privacy and security on the Internet are on the rise. Keeping your personal information, private data and finances safe can be difficult, but by following a few tips, you can avoid the vast majority of scams, spyware and privacy breaches Online ethics refers to patterns of behavior used when on the Internet, guided both by law and personal philosophy. The great capabilities of this communication medium allow for the potential of great harm, cruelty, and even crime. Major concerns in the field of online ethics include the protection of private information, the limits of a presumed freedom of expression, and issues of libel. Understanding legal difficulties and trusting personal philosophy used in other areas of life can help a person determine his or her online ethics. II. Learning Competency Apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would relate to their specific professional tracks Code: CS_ICT11/12-ICTPT-Ia-b-2 Use the Internet as a tool for credible research and information gathering to best achieve specific class objectives or address situational Code: CS_ICT11/12-ICTPT-Ia-b-3 1 III. Objectives At the end of this learning activity sheet, you are expected to: 1. discuss precautionary measures when sharing information in the internet; 2. use social networking sites responsibly; and 3. apply the Internet efficiently and properly through proper referencing. Online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would relate to their specific professional tracks ISSUES: 1. Cyber Bullying 2. Social Networks 3. Online Privacy & Online Reputation 4. Identity Theft 5. Online Predator 6. Online Etiquette & Digital Ethics 7. Sexting 8. Professional Boundaries TECHNOLOGY USED ONLINE Computer Game Consoles Mobile Phone IPod Camera THREE RISKS: 1. Inappropriate Contact- to recognize and protect themselves against contact with. 2 2. Inappropriate Content – to escape from unnecessary images, products that influence to use. 3. Inappropriate Conduct – to avoid cyberbullying and unnecessary bad words that posting in social media INTERNET THREATS 1. Malware – stands for malicious software. a. Virus – a malicious program designed to replicate itself and transfer from one computer to another either through the internet and local networks or data storage like flash drives. Vital Information Resources Under Siege (VIRUS) b. Worm – a malicious program that transfers from one computer to another by any type of means. c. Trojan – a malicious program that is disguised as useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information. d. Spyware – a program that runs in the background without you knowing it (thus called “spy”). It has the ability to monitor what you doing and typing through key are logging. e. Adware – a program designed to send you advertisements, mostly as pop-ups. 2. Spam – unwanted email mostly from bots or advertisers. It can be used to send malware. a. Phishing – Its goal is to acquire sensitive personal information like passwords and credit card details. You can avoid malware today. There are some people who are truly worried about this. They have sensitive information that they do not want to lose, and they are willing to take bold action to protect their devices from malware as soon as possible. 3 Protecting your devices from hackers is not hard if you know what you are doing. We are going to let you know about some tips that you can use to give your mobile devices the protection they need against malware. These tips will make you think and take action right away too. 1. Update Apps and Avoid Public Wi-Fi - you need to update your apps and operating system on your mobile device as soon as possible. This will allow you to add a layer of protection to your devices too. You will also get the security improvements that you want. 2. Avoiding public Wi-Fi - is another security measure that you should take right away. You should have a private connection to the Internet because this will allow you to avoid a lot of issues in the future too. A VPN app will allow you to get an almost private connection to the Internet. 3. Lock Phone and Two-factor Authentication - you need to lock your phone as soon as possible to add another layer of security against a malware out there. Use a 6-digit passcode so you can keep your device protected. This will also allow you to have the peace of mind that you want to get. 4. Strong Password and Avoid Phishing -use a strong password by taking advantage of a password generator. The Internet offers a wide array of these tools so you can keep your password strong at all times too. Do this and have the peace of mind that you want to get today. You have to remember also that hacker will try to use your email box to get what they want and hurt you somehow. Phishing scams are a dime a dozen, and you have to protect yourself against this as soon as you can. Do not hand over access to your accounts to anyone out there because this might be a scam too. We have talked about some things that you can do to avoid malware these days. Remember that a strong password will allow you to avoid a lot of headaches in the future. You can take advantage of any password generator out there so you can add a layer of protection to your devices. Remember also that the two-factor authentication will allow you to add another layer of security, and you can also avoid any sort of public Wi-Fi out there. Keep your data connection on so you can truly add a layer of protection to your devices as soon as possible. Do this and have fun while at it too. 4 CHAT LINGO LOL- Laughing Out Loud ASL- Age, Sex, Location? BRB- Be Right Back SLR- Sorry Late Reply LDR- Long Distance Relationship WTG- Where To Go OTW- On The Way ATM- At This Moment LF-Looking For? OOTD- Outfit Of The Day CYBERBULLYING Is the use of e-mail, instant messaging, chat rooms, pagers, cell phones, or other forms of information technology to deliberately harass, threaten, or intimidate someone. The problem is compounded by the fact that a bully can hide behind an electronic veil, disguising his or her true identity. This makes it difficult to trace the source, and encourages bullies to behave more aggressively than they might face-to-face. Note for the learners when encountering Cyberbully: 5 Steps to prevent Cyberbullying 1. Don’t react (this is often the bully’s goal) 2. Don’t retaliate (don’t get revenge) 3. Block the bully 4. Save the evidence 5. Talk to a trusted adult SOCIAL NETWORKING SITES (SNS) Allow them to exchange information about themselves and communicate with others using blogs, chat rooms, email and instant messaging. While these sites have the ability to extend their circle of friends, they also expose them to those who may have bad intentions from peers to sexual predators. Even though many sites have a minimum age for signup (usually 13 or 14), these sites do not have the ability to verify age. Most young people apply common-sense principles and rules taught at home and school to avoid harmful situations in the “real world”. ENCOURAGE AND REMINDERS FOR LEARNERS: 5 1. Encourage to use privacy settings and security features to limit who has access to their information 2. Encourage to never post full name, address, phone numbers, email address, instant message username, passwords and identity or financial numbers 3. Teach students to use “throwaway” email addresses when signing up for SNS 4. Remind students that once information is posted online and deleted or modified, the original will never be completely deleted 5. Encourage students to use privacy settings and security features to limit who has access to their information. WHEN USING FACEBOOK (FB) AND MYSPACE YOU MUST DO THESE: 1. “Only My Friends” setting makes profile content available only to people on friends list – this is default for those under 18. 2. If a user is under 18, they can choose to make profile content available only to friends and others under 18. 3. Photo Albums, Videos and Blogs each have per item privacy settings that you can choose when you upload that content and modify any time. Your FACEBOOK should be modified by yourself in your General Privacy. 6 ONLINE PRIVACY AND ONLINE REPUTATION Remind students to post information that is appropriate for the entire public. Anyone can see individual web pages including parents, teachers, college admission officers, potential employers or police -What is posted today may be harmful in the future IDENTIFY THE THEFT 1. Don’t share passwords with others (except their parents!) 2. Don’t discuss using personal information such as birth dates or social security numbers in passwords or usernames to strangers. 3. Educate yourself about making purchases online. 4. Make sure that a web page where they provide personal and financial information is secure. ONLINE PREDATORS 1. Keep personal information personal Students should be cautious about sharing other information such as the name of their school, sports team, hobbies, where they work or hang out, or any other information that could be used to identify them or locate. 2. Ensure user names do not reveal too much personal information It is inappropriate and dangerous for children to use their name or home town as their name. Most user names made up of personal information are easily decoded which can lead perpetrators to a student’s identity and/or location. 7 3. Students should be aware that posting inappropriate photos can lead to damaged reputations and unwanted attention Posting inappropriate photos, especially those that are explicit, can attract individuals who have bad intentions. 4. Educate students about the dangers of flirting with strangers Students can give the wrong impression when flirting with a real stranger as well as an online stranger. 5. Be careful about adding strangers to your Social Accounts or friend lists people are not always who they say they are. Students should not add people as “friends” unless they know for sure who the person is. If individuals cannot provide solid information as to how they know the student, the student should delete the user name or block that user. ONLINE ETIQUETTE AND DIGITAL ETHICS 1. Students to be civil in what they say and show on the internet 2. Talk to students about respecting the reputation and privacy of others when they post anything about them (especially pictures) 3. Model ethical behavior 4. Reinforce ethical behavior 5. Draw parallels between offline behaviors and similar situations online -Demeaning someone online is just as bad as it is in person. Plagiarism is still plagiarism whether it’s copying from a book or a website. 6. Teach students to take a moment before responding to a mean or insulting comment, message, email, etc. instead of reacting out of anger. Teach students not to respond to these type of actions and to speak with a trusted adult 7. Share the risks and consequences associated with plagiarism, file sharing, downloading and copying software, music, movies and games illegally. May Result: Bad grade, School discipline, Crime, Fines. Being a Digital Citizen We use information and technology in safe, legal, and responsible ways. We embrace the following conditions or facets of being a digital citizen. Respect Yourself. I will select online names that are appropriate, I will consider the information and images that I post online. Protect Yourself. I will not publish my personal details, contact details or a schedule of my activities. 8 Respect Others. I will not use technologies to bully or tease other people. Protect Others. I will protect others by reporting abuse and not forwarding inappropriate materials or communications. Respect Intellectual Property. I will suitably cite any and all use of websites, books, media. Protect Intellectual Property. I will request to use the software and media others produce. SEXTING The sending of sexually explicit messages or images by cellphone. 1. Encourage students to think about the consequences of taking, sending or forwarding sexual pictures of underage children. Students could get kicked off sports team or school club, Students could receive disciplinary action at school, Students could get arrested. 2. Tell students not to take pictures of themselves that they don’t want everyone to see. Students should not take pictures that they don’t want their parents, grandparents, teachers, employers or the police seeing. 3. Tell students to think before they send the picture because they don’t know where it might end up. Remind them that if it doesn’t feel right to send it, they probably shouldn’t. 4. Remind students that they are not anonymous when they send sexual pictures. These pictures can be tracked through the phone or internet. PROFESSIONAL BOUNDERIES 1. Make sure you’re in compliance with your school policy. If you don’t and if you have one, you better find out. 2. If you’re considering adding a student as a friend to your personal profile, notify parents and receive permission before doing so. Make sure the student the required age for the social networking site. 3. If using Facebook, you could create a Friends List called “Students” and adjust privacy settings to control what they see. 4. Create two profiles (personal + professional) or create Group for specific class projects 5. You have to watch what you post and who you share it with. Ask these questions before you post anything: a. Would it be appropriate for me to say this in the classroom? b. Would I say this to the student in front of the students’ parents? 9 If the answer to either is “No”, then you probably shouldn’t post it. Contextualized Online Search and Research Skills Use the Internet as a tool for credible research and information gathering to best achieve specific class objectives or address situational Research -is a contextualization, a careful study that is done to find and report new knowledge about something and collect information or to investigate in a certain topic. Search- is to carefully look, find or inquire something and an attempt to find information in a database, network or website by using a computer program. What is Online Search? -is the process of interactively searching for and retrieving requested information via a computer from databases that are online. -Interactive searches became possible in the 1980s with the advent of faster databases and smart terminals. Advantages: Ability to obtain a large sample, which increases statistical power Data is automatically coded so no data entry errors Reduced cost of conducting research Disadvantages: Online is not totally secure and theft is one of the numerous danger it poses, researchers’ personal information is at risk of being accessed by rogue persons. Some of the materials on the internet have not been evaluated by experts or thoroughly screened. Lack of accreditation and low quality Research Skills In order to achieve or access what you are looking for you need to improve yourself. As the old saying goes “Practice Makes Perfect”. Good research is a product of multiple and continuous searches. 1. “Research” sometimes just means finding out information about a topic. You can certainly develop advanced information retrieval skills in Working with Sources. 2. However, in specific understandings of “research” carry a lot of weight. 10 3. The classic definition is that “research” leads to an original contribution to knowledge in a particular field of inquiry by defining an important question or problem and then answering or solving it in a systematic way. 4. So you will need to read on to develop a relevant understanding of what research means in your subject. Important Aspects of Research 1. Research design covers the key issues in developing a successful research project. 2. Research methods takes you to resources on essential techniques for carrying out convincing research. 3. Working with data will provide resources on the use of statistics and other numerical skills in research. Some examples of research skills that you may include: 1. Report writing 2. Analyzing lots of information from different sources 3. Finding information off the internet 4. Critical thinking Remember that not searches are good ones, some are considered as satirical or untrue. Here are some tips in identifying good searches from satirical searches. 1. If the contents of the source are too impossible to happen, or too good to be true, then there must be something wrong. 2. If the site started as a false site for public figures such as television personalities or political figures, then uploaded stories from different sources, it is a satirical one. 3. If the site is unfamiliar and continuously popping ads, then it is satirical. “Be Thankful for Your Mistakes, they Teach You Valuable Lessons”- Anonymous 11

Use Quizgecko on...
Browser
Browser