This document discusses online safety, ethics, and intellectual property. It defines key concepts like digital citizenship, netiquette, and the different forms of intellectual property. It outlines 10 core rules of netiquette, including remembering the human on the other side, adhering to the same standards of behavior online as offline, and avoiding cyberbullying and sharing fake news. The document also discusses copyright infringement and provides tips to avoid it, such as understanding copyright law, being responsible with others' work, and following fair use guidelines. The objectives are for students to understand these concepts and apply them in real-world situations.
This document discusses online safety, ethics, and intellectual property. It defines key concepts like digital citizenship, netiquette, and the different forms of intellectual property. It outlines 10 core rules of netiquette, including remembering the human on the other side, adhering to the same standards of behavior online as offline, and avoiding cyberbullying and sharing fake news. The document also discusses copyright infringement and provides tips to avoid it, such as understanding copyright law, being responsible with others' work, and following fair use guidelines. The objectives are for students to understand these concepts and apply them in real-world situations.
This document discusses online safety, ethics, and intellectual property. It defines key concepts like digital citizenship, netiquette, and the different forms of intellectual property. It outlines 10 core rules of netiquette, including remembering the human on the other side, adhering to the same standards of behavior online as offline, and avoiding cyberbullying and sharing fake news. The document also discusses copyright infringement and provides tips to avoid it, such as understanding copyright law, being responsible with others' work, and following fair use guidelines. The objectives are for students to understand these concepts and apply them in real-world situations.
This document discusses online safety, ethics, and intellectual property. It defines key concepts like digital citizenship, netiquette, and the different forms of intellectual property. It outlines 10 core rules of netiquette, including remembering the human on the other side, adhering to the same standards of behavior online as offline, and avoiding cyberbullying and sharing fake news. The document also discusses copyright infringement and provides tips to avoid it, such as understanding copyright law, being responsible with others' work, and following fair use guidelines. The objectives are for students to understand these concepts and apply them in real-world situations.
Download as PPTX, PDF, TXT or read online from Scribd
Download as pptx, pdf, or txt
You are on page 1of 24
ONLINE SAFETY, SECURITY,
ETHICS, AND ETIQUETTE:
NETIQUETTE AND INTELLECTUAL PROPERTY EMPOWERMENT AND TECHNOLOGY REVIEW:
Before we proceed on how to avoid the Internet threats, as
well as we won’t be a threat to anyone online, let’s review the past lesson. Classify the following terms by writing malware or cybercrime. 1. Virus 2. Hacking 3. Trojan 4. Copyright Infringement 5. Cyberbullying OBJECTIVES: At the end of the lesson the student should be able to: 1. understood the concept of digital citizenship, netiquette, intellectual property and fair use; 2. assessed and applied appropriate actions in the real-life situations or conflict regarding online usage or interaction; and 3. done a self-evaluation regarding yourself as a digital citizen. DIGITAL CITIZENSHIP - is the way we think, act and be online (Common Sense Org. n.d.). NETIQUETTE - a certain set of standards that we must follow when we’re online. - This term created by compounding "net“ and "etiquette" (from the Internet). Virginia Shea - referred to as "Ms. Manners” of the Internet, wrote the 10 core Netiquette rules (Albion.com.n.d.): 10 core Netiquette rules • Remember the human on the other side of the electronic communication. • Adhere to the same standards of behavior online that you follow in real life. • Know where you are in cyberspace. • Respect other people’s time and bandwidth. • Make yourself look good online. • Share expert knowledge. • Keep flame wars under control. • Respect other people’s privacy. • Don’t abuse your power. • Be forgiving of other people’s mistakes 10 core Netiquette rules Rule 1: While conversing online, remember always that there is a vulnerable human like you behind the screen of our device. Let's be mindful toward others about our words and apply the golden rule. We might think what we’re saying is a joke, though other people might take it differently. Rule 2: Whatever laws or values we follow in real life, they also apply in digital space, and we must follow them as a responsible user. Rule 3: Know first on what platform you are and who are your audiences before interacting with others on any platform. Netiquette varies according to which platform you are. Rule 4: Remember you 're not the only cyberspace user. When posting or uploading something online, make sure it is worth the other people's time. Respect the bandwidth, the cables and channels' information-carrying capacity, as everybody in cyberspace attempts to connect online. Rule 5: It's a cliché but it's safe to say, "Think before you click." Don't post anything you might soon regret like a wild party night photo. Always remember that it leaves a digital footprint whatever you posted and/or deleted online. Your cyber avatar is an extension of your real-life self, so make it look good for not just everyone, but your future self as well. You may encounter someone from the Human Resource office in the future, who scrolls your online profile account meticulously. Rule 6: Avoid sharing the fake news and believing it. Just because it does have lots of likes and shares, it doesn't mean it's genuine. Do critical thinking. Don't settle for one single source. Look for more and trust worthier sources. Fake news can victimize everyone, your parents included. Rule 7: Flame or an act of expressing mean or insulting online messages and aims to humiliate others. Often, they use ALL CAPS (shouting). It is popular among the youth now, and they do it in an exclusive community chat "Rambulan.” If you have entered these wars of flame, you have already broken Rule No. 1. Avoid getting involved in this. Rule 8: As the old saying goes, “do not touch what is not yours.” This saying is not only applicable in our lunch boxes or packages; it is also applied in our personal accounts and messages; whether it is written or electronic. The privacy of others must be respected regardless of whether you are in a relationship or married couple. Note to yourself: offering your partner password for the social networking site does not mean loyalty. Confidence, honesty and respect remain the foundation of a strong relationship. Rule 9: Were you aware that hacking can be a respectable work? White hat hacker, also known as ethical hacker, who has the same features as black hat hackers, except they are paying workers also company contractors and they do it legally. No matter what strength or information you have, do not misuse it like them (US Norton n.d.). Note also that a great power comes with a great responsibility. Rule 10: Whether it's a spelling error, a senseless question or an unnecessary long answer, it's normal for us, human, to commit a mistake. Let's forgive the error of another user. Republic Act No. 8293 - recognized as the Philippines Intellectual Property Code. Copyright Infringement - is one of the cybercrimes - This is usually done by students when they copy-paste a sentence or paragraph from a website and place it in their procrastinated essay without proper attribution or reference to the source, and make it like their own concept, in short, plagiarism. - Another way to violate it, when the student took pictures of the content of the thesis or a book without the consent of the author. Not only are we the recipient of information; we are also a producer and provider. Any original creation — an invention, a form of literary work, or a research — has what we call intellectual property (IP).
Intellectual property has 6 forms based on the World
Intellectual Property Organization (WIPO), namely: • Copyright • Industrial Design • Patent • Geographical Indication • Trademark • Trade Secret 6 FORM OF INTELLECTUAL PROPERTY According to WIPO
1. Copyright – It is the owner's legal right to literary or
“All rights reserved. No part of this material may be
reproduced or transmitted in any form or by any means— electronic or mechanical including photocopying—” 2. Be responsible. Although you have not noticed a copyright page, or the author has written that you can use it freely and for a variety of purposes, it is still our responsibility to know more about whether something is protected by copyright and to ask the author's permission. It is a form of respect to the original creator.
3. Be creative. Include your creativity particularly if it is
attributed to you in each of your work or outputs. 4. Know the law. How well do you know the copyright law? Did you know there's a loophole in the Philippine Intellectual Code? As written in Section 185 of Chapter VIII, you may use copyrighted work under the Fair Use provisions. Fair use is permission to use works that are protected by copyright, such as books, music and lyrics, etc. for the following purposes: teaching, news reporting, criticizing or commenting, and comedy or parody (Common Sense Education 2014). Besides that, there are 4 fair use points which must be followed: 1. Small cropped part of the work can be used. 2. You must add your imagination to make it original by giving it a new sense. 3. The job must be done in a totally different way. 4. You are prohibited from using it for any profitable purpose. Whether or not your work falls within the policy of fair use, giving credit to the creator as a respect and using it responsibly is still a good thing. MULTIPLE CHOICE. Directions: Choose the letter of the best answer. Write the chosen letter and the word on a separate sheet of paper.
1. Innovation is a common thing in the ICT industry. The
_______________ media is a non-profit service designed to help the people who have visual and reading impairments. A. Assistive C. Blogging B. Folksonomy D. Social 2. Developed by Google, Android is an open source operating system that is being used by several mobile phone companies. Which device uses iOs? A. Nokia devices C. smart TVs B. Blackberry devices D. Apple devices
3. Social Media is a website, application, or online channel that
enables web users to create, co-create, discuss, modify, and exchange user-generated content. Which one of the options is NOT an example of social media? A. Social Networks C. Both A and B B. Media Sharing D. None among the option 4. Currently, this is the fastest mobile network. A. 2G B. 3G C. 4G D. 5G
5. TikTok is a social media application that can be
classified as: A. Bookmarking site C. Microblogging B. Media sharing D. Blogs and forums ANSWER KEY 1. A 2. D 3. D 4. D 5. B
Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's Guide to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing