Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Lesson 3

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

MODULE 1-2: INFORMATION AND COMMUNICATION AND TECHNOLOGY TODAY EMPOWERMENT TECHNOLOGY

LESSON 3: ONLINE ETHICS AND ETIQUTTE

- World Wide Web (WWW) and internet has made great breakthrough in
the field of information sharing and communication. It helped connect
people miles away from each other. However, these advances carried
drawbacks wherein the issue of safety, security and ethics of the
consumers are compromised.

A. NETIQUETTE
- A netiquette is a set of ideal rules and conduct that a netizen should
observe in communicating and/or publishing information and materials
over the World Wide Web and in ICT in general.
- The term “Netiquette” is a coined or
portmanteau term of network and
etiquette. The term “Netizen” refers
to the person who is member or a
part of the online community.

B. GOOD PRACTICES WHEN USING THE INTERNET


1. Recognize that your cyber avatar, or your online
representation, is not another world but an
extension of your personality and an extension of
the existing society. Anything you publish, post
or share affects you and other individual who
exists somewhere in the globe.
2. You should apply the values and conduct
you learned since childhood, such as respect, kindness
and courtesy to others should be observed. Theft, hate
speech, gossip, pornography, and bullying are
unacceptable in the online community.
3. Keep in mind that there are laws existing in our
society and on the Web. Remember that there are
punishment laid by the government, not for the sake
of punishing but for peace and order among citizen.
Developed by School of Saint Joseph (Naguilian, Isabela), Inc. Page | 11
EMPOWERMENT TECHNOLOGY MODULE 1-2: INFORMATION AND COMMUNICATION AND TECHNOLOGY TODAY

4. Keep in mind that there are differences among


individuals you will interact with and the
individuals who will read your publish. Be
sensitive with their belief, cultures and religions.
The differences will result in different behaviors
and social norms.

5. Everything published on World Wide Web should be considered as


copyrighted or owned by another individual. You cannot use these materials
for personal use. If the materials are going to be used for educational
purposes, certain rules should be followed in
academic writing, referencing and making
citation acknowledgement. It is also unethical
to disseminate the personal information of
others without their permission. Using the
Web to distribute photos, videos and other
information such as names, addresses and
bank accounts is not acceptable.

6. In sending correspondence in either e-mail or


chat, be careful in selecting words to
communicate and avoid threatening and
disrespectful words.

C. ONLINE SAFETY AND SECURITY

- Each individual when accessing the World


Wide Web is concerned with the safety of his
or her terminal or computer and the
information that will be transmitted or
received. Here are a number of threats that
can be acquired from connecting to the
World Wide Web.

Page | 12 Developed by School of Saint Joseph (Naguilian, Isabela), Inc.


MODULE 1-2: INFORMATION AND COMMUNICATION AND TECHNOLOGY TODAY EMPOWERMENT TECHNOLOGY

1. Spam – this refers to the transmission of unsolicited messages from


various origins using electronic messaging systems such as e-mail and
chat messengers. Typically, attackers use spam as a tool for advertisement.
Email spam is the most common form, which is also known as
unsolicited bulk e-mail (UBE).
2. Phishing – This defined as software or a program used by an attacker
to obtain personal information. Attackers commonly target user
passwords to hack and take control of a user account. Furthermore, credit
card numbers are also targeted by phishing.
3. Malware – This is the short term for malicious software, which is a
computer software scent by attackers to inflict chaos on computer‟s
operation and processes. Malwares are used to spy upon the activity of the
computer and steal information. There are 7 types of malware:
1. Virus - a virus is malicious software attached to a document or file that
supports macros to execute its code and spread from host to host.
2. Worms - Worms are malicious software that rapidly replicates and
spreads to any device within the network. Like viruses, worms can
severely disrupt the operations of a device and cause data loss.
3. Trojan Viruses - Trojan viruses are disguised as helpful software
programs. But once the user downloads it, the Trojan virus can gain
access to sensitive data and then modify, block, or delete the data.
4. Spyware - Spyware is malicious software that runs secretly on a
computer and reports back to a remote user.
5. Adware - Adware is malicious software used to collect data on your
computer usage and provide appropriate advertisements to you.
6. Ransomware - is malicious software that gains access to sensitive
information within a system, encrypts that information so that the user
cannot access it, and then demands a financial payout for the data to be
released.
7. Fileless Malware - fileless malware is a type of memory-resident
malware. As the term suggests, it is malware that operates from a
victim‟s computer‟s memory, not from files on the hard drive.

Developed by School of Saint Joseph (Naguilian, Isabela), Inc. Page | 13


EMPOWERMENT TECHNOLOGY MODULE 1-2: INFORMATION AND COMMUNICATION AND TECHNOLOGY TODAY

- There are a number of treats lingering on the


World Wide Web, and users are very prone
to being infected by these treats. A very
effective way of avoiding these treats is
verifying the authenticity and credibility of
the web source. The methods are similar to
the methods of verifying the authenticity of
information from the World Wide Web.

D. GOVERNMENT PROVISIONS FOR ONLINE COURTESY AND ETIQUETTE


- The Philippine government ensures the welfare of its people in their ICT
experience by enacting various laws and regulations. Laws that aim to
protect the people from these illegal activities were presented.
 Republic Act 10627 or Anti-Bullying Act of 2013
– Bullying is defined as “severe or repeated use by one
or more students of a written, verbal or electronic expression,
or a physical gesture, or any combination thereof, directed to
another student that has the effect of actually causing or
placing the latter in reasonable fear of physical or emotional
harm or damage to his property.” This law also includes
protection of individuals from bullying through electronic means.

 Republic Act 10175 or Cybercrime Prevention Act of 2012


– This law protects an individual from various unwanted
online and cyber acts that may harm or evade one‟s privacy and
integrity. Cybercrime offences include, but are not limited to,
integrity and availability of data, illegal access of computers
through remote means of permission, interception of one‟s
information from a private
conversation or correspondence,
acquisition of passwords and other
vital information from individual,
computer forgery and libel.

Page | 14 Developed by School of Saint Joseph (Naguilian, Isabela), Inc.

You might also like