Professional Documents
Culture Documents
ET Week 2-2021
ET Week 2-2021
Learning Module #2
EMPOWERMENT
TECHNOLOGIES
Performance Standards
1. The learners shall be able to independently compose an insightful reflection paper on the nature of ICT in
the context of their lives, society, and professional tracks
Objectives
As a learner you should be able to;
1. Consider one’s and other’s safety when sharing information using internet;
2. Consider one’s and other’s reputation when using internet;
3. Determine and avoid the dangers of the internet;
4. Be responsible in the use of social networking sites; and
5. Browse the internet efficiently and properly through the proper referencing.
Assessment
Steps to check for student understanding
1. Journal
2. Written Work
3. Performance task :Campaign Poster for “Think Before You Click” Or Video Report Recording
For those who don’t have access in internet connection and cannot do this online, do the following steps below;
1. Have a cattleya or notebook or bond paper (not necessarily a new one) that will serve as your Journal to be
submitted to your instructor.
2. Copy the title of the activity. You may also apply your creativity.
3. Answer the questions in your cattleya.
4. Share the file to this email address laurencebana@mcc.ph.education or send the file via messenger. If you
are still unfamiliar with this you may ask your instructor.
Topic 1: Netiquettes
In this generation, people are dependent on the Internet. Like how people socialize face to face, we should follow
etiquette at all times as it mirrors our personality. Being on different platforms, we should be aware of our actions and
protect ourselves at the same time. Remember that once something has been shared online, it cannot be deleted.
This lesson provides information about Netiquette. It will serve as your guide on how to behave appropriately online.
It is vital to use Netiquette because communication online is non-verbal. Most often, online discussion consists of
reading something someone else has typed.
Netiquette, or network etiquette, is concerned with the "proper" manner of communication in the online environment.
Whenever you communicate in the virtual world, consider the following "rules," adapted from Virginia Shea's Core
Rules of Netiquette.
When communicating electronically, whether through email, instant message, discussion post, text,
or another method, practice the Golden Rule: Do unto others as you would have others do unto
you. Remember, your written words are read by real people, all deserving of respectful
communication. Before you press "send" or "submit," ask yourself, "Would I be okay with this if
someone else had written it?"
Rule 2: Adhere to the same standards of behavior online that you follow in real life
While it can be argued that standards of behavior may be different in the virtual world, they
certainly should not be lower. You should do your best to act within the laws and ethical
manners of society whenever you inhabit "cyberspace." Would you behave rudely to
someone face-to-face? On most occasions, no. Neither should you behave this way in the
virtual world.
Electronic communication takes time: time to read and time in which to respond.
Most people today lead busy lives, just like you do, and don't have time to read or
respond to frivolous emails or discussion posts. As a virtual world communicator, it
is your responsibility to make sure that the time spent reading your words isn't
wasted. Make your written communication meaningful and to the point, without
extraneous text or superfluous graphics or attachments that may take forever to
download.
One of the virtual world's best things is the lack of judgment associated with your physical appearance, the sound of
your voice, or the clothes you wear (unless you post a video of yourself singing Karaoke in a clown outfit.) The quality
of your writing will judge you, so keep the following tips in mind:
The Internet offers its users many benefits; one is the ease in which information can be shared or accessed, and in
fact, this "information sharing" capability is one of the reasons the Internet was founded. So in the spirit of the
Internet's "founding fathers," share what you know! When you post a question and receive intelligent answers, share
the results with others. Are you an expert at something? Post resources and references for your subject matter. You
have recently expanded your knowledge about a subject that might be of interest to others? Share that as well.
Like in face-to-face situations, there are people in cyberspace who have more "power" than others. They have more
expertise in technology or have years of experience in a particular skill or subject matter. Maybe it is you who
possesses all of this knowledge and power! Just remember: knowing more than others do or having more power than
others may have does not give you the right to take advantage of anyone. Think of Rule 1: Remember the human. 7
Let us go back to “How Safe Are You?” test. Let us visit each item and see how risky it is to share them.
Type of Information Risks
First Name There is a risk in sharing your first name. Chances are, a hacker may already
know plenty of stuff about you even if you only give out your first name.
Likewise, you cannot just walk in a room and start introducing yourself to
everyone. You do not know whom you can come across with.
Last Name If sharing your first name is a small risk, having both your first and last is more
risky. You will be vulnerable to being searched for using search engines, which
include image search. Matching a name with a face is a modus to several
cybercrimes like identity theft.
Middle Name Sharing your middle name alone is probably not the most risky of these shared
information for verification purposes.
Current and previous school(s) Most people who steal identities study their subject. They can use this
information for verification purposes.
Your cellphone number Your cellphone number should never be posted over the internet. The internet is
a public place. It is the same as posting your number on a billboard. You would
not want random strangers to text or call you, or worse, pretend that they are
someone else.
The name of your mother and Risky, yet not as risky as posting their full names, especially your mother’s
father maiden name. In fact, you may have already encountered many websites that
require your mother’s maiden name as an answer to a secret question
whenever you lose your password.
The name of your siblings Disclosing this is a huge risk. Strangers may pretend or use their identity to
dupe you.
Your address Hopefully, you answered “no” to this one. Giving the internet your number is
one thing; giving them your address is a whole other level. It would be much
easier for criminals to find you.
Your home phone number This shared information is more risky than sharing your personal phone
number. Scams usually use this information to deceive you, one of which is
when a stranger pretends to know your parents or pretends to be you.
Your birthday Letting people know your birthday is probably a must if you want to get as many
gifts as possible. But having it in your profile makes you vulnerable to identity
theft.
The Internet is defined as the information superhighway. This means that anyone has access to this highway, can
place information and can grab that information. Any information, even things that you have set privately, can be
accessed one way or another. This is why social networking sites like Facebook continue to improve their security
features. The threat of cybercrime is very real. While you may not experience the threat now, whatever information
we share today could affect our future.
The Internet is a public pace and it is up to you to protect yourself. Here are some tips to help you stay safe
when using the internet.
1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions read it
3. Check out privacy policy page of a website to learn how the website handles the information you share
4. Know the security of the social network site you use. By keeping your profile private
5. Do not share passwords with anyone.
6. Avoid logging in to public networks/Wi-Fi. Browsing in incognito [or private mode a feature of the browsing
incognito [or private] mode a feature of the browser. Will not protect you from hackers
7. Do not talk to strangers whether online or face to face
8. Never post anything about a future vacation. It is similar to posting rob my house at this date
9. Add friends you know in real time
10. Avoid visiting untrusted website
11. Install and update antivirus software on your computer. Use only one anti-virus software to avoid conflicts
12. If you have Wi-Fi at home. Make it a private network by adding a password
13. Avoid downloading anything from an untrusted website. Unbearable peer to peer download torrents as the
downloading is most likely not monitored by the owner
14. Buy the software do use to prepare ones
15. Do not reply or click licks from suspicious emails.
Most people would dispute that there is no such thing as private over the internet and they may be right there are
hacker who can find a backdoor even if your profile is already set to private you have control whoever is looking at
your friend screen whenever they open profile or chat with you have no control over people access to your friends
account and seeing your private stuff.
1. Before you post something on the web, ask these questions to yourself:
• Would you want your parents or grandparents to see it?
• Would you want your future boss to see it?
Once you post something on the Web, you have no control of who see your posts.
2. Your friends depend on you to protect their reputation online. Talk to your friends about this serious
responsibility.
3. Set your post to “private”. In this way, search engines will not be able to scan that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it down or report
it as inappropriate.
1. Netiquette: https://www.youtube.com/watch?v=_KM1eN6ZC3k
2. Failon Ngayon: Identity Theft: https://www.youtube.com/watch?v=TY1lzy_ZF8c
3. Identity Theft Prevention – Don’t Become a Victim of ID Theft
https://www.youtube.com/watch?v=Fztuohj3Fck
Here are some of the threats you should be aware of when using the internet:
* Rouge security software- tricks the user into posting that it is a security software. It asks the
user to pay to improve his or her security but in reality they are not protected at all.
D. Spyware - a program that runs in the background without you knowing it(thus called “spy”). It has the
ability to monitor what you are currently doing and typing thr ugh keylogging.
* Keyloggers – used to record the keystroke done by the user. This is done to steal their password
or any other sensitive information. It can record email, messages, or any other information you type
on your keyboard.
3. Phishing – its goal is to acquire sensitive personal information like passwords and credit card details. This
is done by sending you an email that will direct the user to visit a website and be asked to update his/her
username, password, credit card or personal information.
*Pharming- a more complicated way of phishing where it exploits the DNS (Domain Name Service)
system.
As a responsible user of the internet, you have to consider that not everything out there is free for you to
use. Just like your own, contents that you see from websites have their respective copyrights. There are several
instances where employees and business owners face copyright infringement and are sentenced to a huge fine due
to reckless copying of materials.
Here are some tips that could help you avoid copyright infringement:
1. Understand. Copyright protects literary works, photographs, paintings, drawings, films, music (and lyrics),
choreography, and sculptures, but it generally does NOT protect underlying ideas and facts. This means that
you can express something using your own words, but you should give credit to the source.
2. Be responsible. Even if a material does not say that it is copyrighted, it is not a valid defence against
copyright. Be responsible enough to know if something has a copyright.
3. Be creative. Ask yourself whether what you are making is something that came from you or something
made from somebody else’s creativity. It is important to add your own creative genius in everything that will
be credited to you.
4. Know the law. There are some limitations to copyright laws. For instance in the
Philippines, copyrights only last a lifetime (of the author) Plus 50 years. There
are also provisions for “fair use” which means that an intellectual property may
be used without a consent as long as it is used in commentaries, criticism,
search engines, parodies, news reports, research , library archiving, teaching ,
and education. If you have doubts that what you are doing does not fall under
the policy of fair use, seek permission first.
Online Research
The information that we need is more likely already on the Internet. It is just a matter of how to look for it and how to
use information from the most credible sources. Here are some tips in conducting online research:
3. Advanced Search. The best way to filter information you get from
search engines is by using advanced search. This will allow you
to filter out the information you do not need.
4. Look for credible sources. Some wikis, filled with updated information, are not a credible source. This is
due to the fact that anyone can edit its content. When using wikis, check out the link of the cited text to be
navigated to the footnote where the list of sources is located. Click the source of the information and see if it
is credible.
5. Give credit. Give credit to the original author of the page or information. To properly cite a reference, you
may use the format below.
Scenario 1: A professor wishes to use a textbook he considers to be too expensive. He makes copies of the book for
the class. Is it okay to reproduce the said book? Is it covered under fair use? Why?
Scenario 2: A teacher wishes to show a movie clip of “The 3 Idiot” to her class for instructional purposes. Is it okay
for him to use the video in his class? Is it covered under fair use? Why?
Scenario 3: You forgot that your essay for Empowerment Technologies class is due tomorrow. While doing your
research, you found a website offering free essays. Is it okay to use the essays from this website? Why?
Create campaign materials Research for several news and Create an electronic poster
promoting “Think Before You events related to cybercrime. promoting “Think Before You
Click”. Using your cellphone or any Click”.
video recording device, report as
It could be in the form of small if you were a newscaster.
posters using cartolina or Video recording should be 1-2
illustration board. minutes only.
RUBRICS
Congratulations!
Module 2 is Complete