Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

11

Empowerment
Technologies
Quarter 1 – Week 2
• Online Safety, Security, Ethics and Etiquette
• Contextualized Online Search and Research
Skills

Jdc
INSTRUCTIONS:

This is a reading material which contains information necessary for you to


understand the topic. It has learning activities that may help you understand the
given concept in able to attain the set learning competency and objectives. Follow
and perform the activities on your own. If you have questions, do not hesitate to ask
for assistance from your facilitator. Always bear in mind that you are not alone.

Remember to:

• Read each direction carefully


• Work through all the information and complete the activities in each section
We hope that through this material, you will experience meaningful learning and
gain deep understanding of the relevant competencies. You can do it!

LEARNING COMPETECY:

• Apply online safety, security, ethics, and etiquette standards and practice
in the use of ICTs as it would relate to their specific professional tracks

OBJECTIVES:

After going through the activities in this module you will be able to:

1. practice privacy of important information;


2. consider your reputation when using the Internet;
3. determine and avoid the dangers of the internet;
4. act as a responsible user and content producer of new media, and;
5. apply online safety, security, ethics, and etiquette standards and practice
in the use of ICTs as it would relate to their specific professional tracks

2
Lesson
Online Safety, Security,
2 Ethics, and Etiquette

In the previous discussion, it opens your door way in understanding ICT. The impact
of ICT to humanity, its current trends and how the different online platforms, sites,
and content were used to best achieve specific objectives.
In today’s modern world, ICT plays its significant role in acquiring, storing, and
sharing of various contents online. Using your gadgets, you can easily view,
download and save files from different websites. But there might be times that you
have encountered trouble with the websites and the file that you have run on your
computing devices. Have you asked yourself, what had caused this trouble? Sharing
of personal information and activities had become also a trend online. But, is it safe
to share this information? How should we behave online to maintain our reputation
even in the virtual world?

START-UP ACTIVITY:
DIRECTIONS: Using the jumbled letters, identify the word that you can derive from
the pictures. Write your answer on a separate sheet.

3
If you have internet connection, you may also watch the full episode of MMK Identity
Theft online

LESSON DISCUSSION

Communication can now be virtually done. Thanks to the ingenious mind behind the
invention of Internet and the world wide web. Internet connects people virtually and
making a digital community across the world where you can share idea.

The Internet is a network of global exchanges including private, public, business,


academic and government networks connected by guided, wireless and fiber-optic
technologies. It is also said that internet is an information superhighway which
connects everybody to be globally aware of the recent happenings around us and
that users has the access to various contents place on it. Users can place, edit and
get information. With this, you should be watchful of the information you share
online especially to social media that you are using. This thing might put harm to
you in the end. There is a need be a keen observer with the information by reading
and understanding the whole text and do fact check.

In communicating online, you should also uphold the same standards in real life
situation. You must observe proper decorum in dealing with other users and be
mindful with the information you feed. With the large amount of available
information online, you cannot say that all of the contents available are accurate and
came from reliable sources? Which information we share are risky?

Types of information with risk:


❑ Name (First, Middle and Last) ❑ Current and Previous School
❑ Birthday ❑ Home and Cell Phone Numbers
❑ Address ❑ Father’s and Mother’s Name
❑ E-mail address ❑ Sibling’s name

Keep your personal information private to avoid being a victim of cyber-creeps.

Note: Keep your personal information private to avoid being a victim of cyber-
creeps.
We are Digital Citizens

Digital citizen refers to a person who has the


knowledge and skills to effectively use digital
technologies to communicate with others, participate in
society and create and consume digital content. Digital
citizenship is about confident and positive engagement
with digital technologies.

4
As a digital citizen, you are required to be a steward having a holistic and positive
approach to help children learn how to be safe and secure, as well as smart and
effective participants in a digital world. Remember that every trail of data you create
while using the Internet known as digital footprint will be there forever.

In using the internet, there’s a set of rules in behaving properly online known as
Netiquette. Netiquette is a combination of “net” (from internet) and “etiquette” a set
of rules adhere to respect other users’ views and displaying common courtesy when
posting your views to online groups discussion. The internet is a powerful tool for
learning and communicating, yet there is danger on it.

The Core Rules of Netiquette by Virginia Shea


Rule 1: Remember the human
Rule 2: Adhere to the same standards of behavior online that you follow in real life
Rule 3: Know where you are in cyberspace
Rule 4: Respect other people's time and bandwidth
Rule 5: Make yourself look good online
Rule 6: Share expert knowledge
Rule 7: Help keep flame wars under control
Rule 8: Respect other people's privacy
Rule 9: Don't abuse your power
Rule 10: Be forgiving of other people's mistakes

Tips to Stay Safe Online:


✓ Be mindful on what you share online.
✓ Do not just accept terms and conditions, read it.
✓ Do not share your password with anyone.
✓ Create a good password.
o Good password consists of more than 8 characters which is a
combination of alphanumeric characters and symbols.
✓ Do not talk to strangers whether online or face-to- face
✓ Never post anything about a future vacation.
✓ Add friends you know in real life
✓ Avoid visiting and downloading from untrusted websites
✓ If you have Wi-Fi at home, make it private by adding a password
✓ Install and update an antivirus software on your computer
✓ Buy the software, do not use pirated ones
✓ Do not reply or click links from suspicious emails
✓ Keep your computer firewall on
✓ Don’t share unreliable information and plagiarized, always give credits
Figure 1. The picture
shows that the website
that have been visited
secures the information
that you have sent to that
website

Online Threats

1. MALWARE stands for malicious software. This is the umbrella term used to refer
to a variety of forms of harmful or intrusive software.

TYPES OF MALWARE
VIRUS is a malicious program designed to replicate itself and
transfer from one computer to another either through the
Internet and local networks or data storage like flash drives
and CDs. Viruses are typically attached to an executable file
or a word document.
WORM is a malicious program that replicates itself through a
network. Some worms delete files, others interrupt the
network function and others send junk mail from infected
computers.
For example, the ILOVEYOU worm
TROJAN is a malicious program that is disguised as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hackers to get
your information.
• Rogue Security Software — tricks the
user into posing that it is a security
software. It asks the user to pay to
improve his/her security but in reality,
they are not protected at all.
Sample of Trojan attack

SPYWARE is a program that runs in the background without you knowing it


(thus called “spy”). It has the ability to monitor what you are currently doing
and typing through keylogging.

• Keyloggers used to record the keystroke done by the users. This is done to
steal their password or any other sensitive information. It can record email,
messages, or any information you type using your keyboard.

ADWARE is a program designed to send you advertisements, mostly as pop-


ups.
2. SPAM is also known as junk email. An unsolicited commercial email sent from
one source with identical message from bots or advertisers. It can he used to send
malware. Spammer is a term used to refer to a person who creates electronic
spam.

3. PHISHING is an attempt to acquire information by pretending to be a trustworthy


entity. Its goal is to acquire sensitive personal information like passwords and
credit card details. It is usually done by email or other similar means.

• Pharming — a more complicated way of phishing where hackers attack


on a website which directs all traffics (users) of the website to
another fictitious website. It exploits the DNS (Domain Name Service)
system.

Sample of phishing message send to an individual Pharming Diagram

4. HACKER
This is a person who is able to enter and control other people’s computer
without authorization. By activating your computers firewall it can prevent
the entry of hackers.
Lesson
Contextualized Online
3 Search and Research Skills
LEARNING COMPETECY:

• use the Internet as a tool for credible research and information gathering
to best achieve specific class objectives or address situational.
OBJECTIVES:

After going through the activities in this module you will be able to:

1. practice online research efficiently using advance keywords and symbols


and execute proper citation;
2. evaluate information as a good source of information, and;
3. use the Internet as a tool for credible research and information gathering
to best achieve specific class objectives or address situational.

After dealing on how to be safe and secure online, how about dealing with various
information we research online? While using the internet, have you ever searched
over the Internet for certain information where the search engine returned a different
result? What have you done to finally look for that certain information you need? Or
are you a victim of fake information online?

As an online researcher, one should improve his/her skills in searching online


though the improved and advance method of searching so that online tools provide
information instantly.

LESSON DISCUSSION

When in need of answers to queries and academic requirements, using your devices,
you browse thru the internet by typing some key words you wanted to search on a
search engine and thereafter the search engine will return back pages with
hyperlinks of possible answers. This is how information seekers able get answers
online easily but there are times that certain information that search engine returned
have different result.

With the vastness of information available online, sometimes tagging of information


are not meant properly. Determining which of the information marks credible or
reliable also one of top concerns of online users. Without hesitancy, online research
methods help people find the information they need quickly but with caution.
Online Research

Online research is a research method that involves the collection of information from
the internet. With the advent of the internet, the traditional pen-and-paper research
techniques have taken a backseat and made room for online research.

The information that we need is more likely already in the Internet. It is just a matter
of how to look for it and how to use information from the most credible source.

The user enters keywords or key phrases into a search engine and receives a list of
web content results from the websites. The list of content returned via search engine
to a user is known as a SERP (Search Engine Results Page)

Search Engine is a service that allows Internet users to search for content via the
World Wide Web (www).

Figure 1. Examples of search engines used by online users


Tips in Conducting Online Research
1. Have a question in mind. Focus on a question you want an answer
2. Narrow it down. Be specific with the topic or idea you wish to search on
3. Used Advanced Search. The best way to filter information you get from search
engines is by using advanced search. This will allow you to filter out
information you do not need.
4. Look for credible sources.
- Evaluate the sources of information, its date of
publication, author, and accuracy of the
information given.
- Some wikis, though filled with updated
information, are not a credible source. This
is due to the fact that anyone can edit its
content.
- Google Scholar allows the students and
educators to search across a wide range of
academic literature.
How to check the information’s credibility online
• Check the Domain. Some
domains such as .com, .org, and
.net can be purchased and used
by any individual. .edu is reserved for
colleges and universities and .gov
denotes a government website. These two are usually credible sources for
information. Be careful with the domain .org, because .org is usually used by
non-profit organizations which may have an agenda of persuasion rather than
education.
• Check the Author. Information on the internet with a listed author is one
indication of a credible site. Is the author affiliated to an academic institution
or credible organization?
• Check Dates. Including a date, the website allows readers to make decisions
about whether that information is recent enough for their purposes. With that
we can say that the information is timely.
• Check the Sources. Credible websites, like books and scholarly articles,
should cite the source of the information presented. Thus, the information can
also be verified through another source.

How to detect fake news


• Headline is catchy. Headlines are sensationalist
• Substance is too impressive. Details is too good to be true
• Source of information is unverified.
• Article is out of date
• There are many Grammar flaws on the Article.

5. Give credit. If you are going to use information from a source for educational
purposes, give credit to the original author of the page or information.
APA format

Last, F. M. (Year, Month Date Published). Article title. Retrieved


from URL
Example:
• Satalkar, B. (2010, July 15). Water aerobics. Retrieved from
http://www.buzzle.com
• Cain, K. (2012, June 29). The Negative effects of Facebook on
communication. Social Media Today RSS. Retrieved from
http://socialmediatoday.com
Copyright and Fair Use

Copyright is a legal term used to describe the rights that


creators have over their literary and artistic works. Works
covered by copyright range from books, music, paintings,
sculpture and films, to computer programs, databases,
advertisements, maps and technical drawings. This kind
of Intellectual Property (IP) is protected under the
Intellectual Property Code of the Philippines or the R.A.
8293 in our country which can also be under World
Intellectual Property Organization (WIPO) for global market.

Violation against Copyright is called Copyright infringement. It is the


use of works protected by copyright law without permission, infringing certain
exclusive rights granted to the copyright holder.

There are also provisions for “Fair Use” which mean that
an intellectual property may be used without a consent
as long as it is used in commentaries, criticisms, search
engines, parodies, news reports, research, library
archiving, teaching, and education.

Using Google Advance Search

Narrow down search results for complex searches by using the Advanced Search
page. For example, you can find sites updated in the last 24 hours or images that
are in black and white.
Steps
1. Go to Google. Navigate to www.google.com in your web browser.

2. Click on the "Settings" text at the bottom of the page. Now a list will appear
there. Click on the "Advanced search" from the list
3. Type your search terms in the Find pages with section and choose the filters
you want to use from the Then narrow your results by section. Hit the
Advanced Search button to search

Or visit www.google.com/advanced_search in your browser to access this feature.

In other search engines, such as Bing, you can use certain keywords and
symbols for your advanced search:
ANSWER THE FOLLOWING:

• LEARNING ACTIVITY 2: HOW SAFE ARE YOU?


• LEARNING ACTIVITY 4: MY MEDIA LIFE
• LEARNING ACTIVITY 6: SKILL EXPLORATION
Note: Please be guided with the Attached Rubric for scoring

• And make your reflection


o I learned that ________________
o I enjoyed most on ____________
o I want to learn more __________
References

Rex Book Store, Inc. (2016) Empowerment Technologies - Innovative Training Works,
Inc.
CHED (2016) Media and Information Literacy Teaching Guide for Senior High School
Arnel Ping (2018) PPT “Legal, Ethical and Societal Issues in Media and Information”
Retrieved January 22, 2018
ABS-CBN MMK Episodes (2018) “MMK Identity Theft” retrieved from
https://mmk.abs-cbn.com/episode/mmk-identity-theft
Albion.com and Seth T. Ross (2011) “THE CORE RULES OF NETIQUETTE” retrieved
from http://www.albion.com/netiquette/corerules.html
WebWise Yeam (2012) “ What is netiquette?” retrieved from
http://www.bbc.co.uk/webwise/guides/about-netiquette
Adi Bhat “ONLINE RESEARCH- DEFINITION, METHODS, TYPES AND EXECUTION”
retrieved from https://www.questionpro.com/blog/execute-online-research/

Websites

• https://www.techopedia.com/definition/2419/internet
• https://usa.kaspersky.com/resource-center/threats/computer-viruses-vs-
worms
• https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx
• https://www.google.com/search?q=pharming&source=lnms&tbm=isch&sa=
X&ved=0ahUKEwisqLKF3f7hAhXb8HMBHf7LBVYQ_AUIDigB&biw=1366&bi
h=625#imgrc=ZfwexE1K1EfjNM:
• http://weyburnpolice.ca/internet-safety/
• http://www.easybib.com/reference/guide/apa/website
• https://www.techopedia.com/definition/1327/domain-name
• https://www.scholar.google.com
• https://www.google.com/advanced_search

You might also like