Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

Senior High School Department

Learning Module #2

EMPOWERMENT
TECHNOLOGIES

Teacher: Laurence H. Baña


Mary Chiles College- Senior High School Department

Most Essential Learning Competencies (MELCS)


Apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would relate
to their specific professional tracks

Performance Standards
1. The learners shall be able to independently compose an insightful reflection paper on the nature of ICT in
the context of their lives, society, and professional tracks

Objectives
As a learner you should be able to;
1. Consider one’s and other’s safety when sharing information using internet;
2. Consider one’s and other’s reputation when using internet;
3. Determine and avoid the dangers of the internet;
4. Be responsible in the use of social networking sites; and
5. Browse the internet efficiently and properly through the proper referencing.

Assessment
Steps to check for student understanding
1. Journal
2. Written Work
3. Performance task :Campaign Poster for “Think Before You Click” Or Video Report Recording

Mr. Laurence H. Baña-2021 Page 1 of 14


Mary Chiles College- Senior High School Department

Lesson 2: Rules of Netiquette


For those who have an internet connection and can do this online, do the following steps below;

1. Join the Google Classroom,


Emp Tech 2021- G12-Humility
https://classroom.google.com/c/MzIwODgwODAxMjU4?cjc=jk46g2p

Emp Tech 2021- G12-Patience


https://classroom.google.com/c/MzIwODc4ODY4MTU5?cjc=nss6ec5

2. Do the posted activity in google classroom.


3. If you are still unfamiliar with this, you may ask your instructor.

For those who don’t have access in internet connection and cannot do this online, do the following steps below;

1. Have a cattleya or notebook or bond paper (not necessarily a new one) that will serve as your Journal to be
submitted to your instructor.
2. Copy the title of the activity. You may also apply your creativity.
3. Answer the questions in your cattleya.
4. Share the file to this email address laurencebana@mcc.ph.education or send the file via messenger. If you
are still unfamiliar with this you may ask your instructor.

Mr. Laurence H. Baña-2021 Page 2 of 14


Mary Chiles College- Senior High School Department

Lesson 1: Rules of Netiquette

Topic 1: Netiquettes
In this generation, people are dependent on the Internet. Like how people socialize face to face, we should follow
etiquette at all times as it mirrors our personality. Being on different platforms, we should be aware of our actions and
protect ourselves at the same time. Remember that once something has been shared online, it cannot be deleted.

This lesson provides information about Netiquette. It will serve as your guide on how to behave appropriately online.
It is vital to use Netiquette because communication online is non-verbal. Most often, online discussion consists of
reading something someone else has typed.

Core Rules of Netiquette

Netiquette, or network etiquette, is concerned with the "proper" manner of communication in the online environment.
Whenever you communicate in the virtual world, consider the following "rules," adapted from Virginia Shea's Core
Rules of Netiquette.

Rule 1: Remember the Human

When communicating electronically, whether through email, instant message, discussion post, text,
or another method, practice the Golden Rule: Do unto others as you would have others do unto
you. Remember, your written words are read by real people, all deserving of respectful
communication. Before you press "send" or "submit," ask yourself, "Would I be okay with this if
someone else had written it?"

Rule 2: Adhere to the same standards of behavior online that you follow in real life

While it can be argued that standards of behavior may be different in the virtual world, they
certainly should not be lower. You should do your best to act within the laws and ethical
manners of society whenever you inhabit "cyberspace." Would you behave rudely to
someone face-to-face? On most occasions, no. Neither should you behave this way in the
virtual world.

Rule 3: Know where you are in cyberspace

"Netiquette varies from domain to domain."(Shea, 1994) Depending on where you


are in the virtual world, the same written communication can be acceptable in one
area, where it might be considered inappropriate in another. What you text to a
friend may not be appropriate in an email to a classmate or colleague. Can you
think of another example?

Mr. Laurence H. Baña-2021 Page 3 of 14


Mary Chiles College- Senior High School Department

Rule 4: Respect other people's time and bandwidth

Electronic communication takes time: time to read and time in which to respond.
Most people today lead busy lives, just like you do, and don't have time to read or
respond to frivolous emails or discussion posts. As a virtual world communicator, it
is your responsibility to make sure that the time spent reading your words isn't
wasted. Make your written communication meaningful and to the point, without
extraneous text or superfluous graphics or attachments that may take forever to
download.

Rule 5: Make yourself look good online

One of the virtual world's best things is the lack of judgment associated with your physical appearance, the sound of
your voice, or the clothes you wear (unless you post a video of yourself singing Karaoke in a clown outfit.) The quality
of your writing will judge you, so keep the following tips in mind:

✔ Always check for spelling and grammar errors


✔ Know what you're talking about and state it clearly
✔ Be pleasant and polite

Rule 6: Share expert knowledge

The Internet offers its users many benefits; one is the ease in which information can be shared or accessed, and in
fact, this "information sharing" capability is one of the reasons the Internet was founded. So in the spirit of the
Internet's "founding fathers," share what you know! When you post a question and receive intelligent answers, share
the results with others. Are you an expert at something? Post resources and references for your subject matter. You
have recently expanded your knowledge about a subject that might be of interest to others? Share that as well.

Mr. Laurence H. Baña-2021 Page 4 of 14


Mary Chiles College- Senior High School Department

Rule 7: Help keep flame wars under control

What is meant by "flaming" and "flame wars?" "Flaming is what people do


when they express a strongly held opinion without holding back any
emotion."(Shea, 1994). As an example, think of the kinds of passionate
comments you might read on a sports blog. While "flaming" is not
necessarily forbidden in virtual communication, "flame wars," when two or
three people exchange angry posts between one another, must be
controlled, or the camaraderie of the group could be compromised. Don't
feed the flames; extinguish them by guiding the discussion back to a more
productive direction.

Rule 8: Respect other people's privacy

Depending on what you are reading in the virtual world, be it an online


class discussion forum, Facebook page, or an email, you may be exposed
to some private or personal information that needs to be handled with care.
Perhaps someone is sharing some medical news about a loved one or
discussing a situation at work. What do you think would happen if this
information "got into the wrong hands?" Embarrassment? Hurt feelings?
Loss of a job? Just as you expect others to respect your privacy, so should
you respect the privacy of others. Be sure to err on the side of caution
when deciding to discuss or not to discuss virtual communication.

Rule 9: Don't abuse your power

Like in face-to-face situations, there are people in cyberspace who have more "power" than others. They have more
expertise in technology or have years of experience in a particular skill or subject matter. Maybe it is you who
possesses all of this knowledge and power! Just remember: knowing more than others do or having more power than
others may have does not give you the right to take advantage of anyone. Think of Rule 1: Remember the human. 7

Rule 10: Be forgiving of other people's mistakes

Not everyone has the same amount of experience working in


the virtual world. And not everyone knows the rules of
Netiquette. At some point, you will see a stupid question, read
an unnecessarily long response, or encounter misspelled
words; when this happens, practice kindness and forgiveness
as you would hope someone would do if you had committed
the same offense. If it's a minor "offense," you might want to let
it slide. If you feel compelled to respond to a mistake, do so in a
private email rather than a public forum.

Mr. Laurence H. Baña-2021 Page 5 of 14


Mary Chiles College- Senior High School Department

Online Safety and Security

The internet, truly, is a powerful tool. It can be used to


promote your business, gain new friends, and stay in touch
with the old ones. It is also a source of entertainment through
games, online communities and everything in between. But
like most things in this world, there is always the “other side
of the coin.” The internet is one of the most dangerous
places, especially if you do not know what you are doing with
it. But there is no need to worry; it is never that late.
Hopefully, by the end of this lesson, you are able to consider
how you go about your use of the internet.

Let us go back to “How Safe Are You?” test. Let us visit each item and see how risky it is to share them.
Type of Information Risks
First Name There is a risk in sharing your first name. Chances are, a hacker may already
know plenty of stuff about you even if you only give out your first name.
Likewise, you cannot just walk in a room and start introducing yourself to
everyone. You do not know whom you can come across with.
Last Name If sharing your first name is a small risk, having both your first and last is more
risky. You will be vulnerable to being searched for using search engines, which
include image search. Matching a name with a face is a modus to several
cybercrimes like identity theft.
Middle Name Sharing your middle name alone is probably not the most risky of these shared
information for verification purposes.
Current and previous school(s) Most people who steal identities study their subject. They can use this
information for verification purposes.
Your cellphone number Your cellphone number should never be posted over the internet. The internet is
a public place. It is the same as posting your number on a billboard. You would
not want random strangers to text or call you, or worse, pretend that they are
someone else.
The name of your mother and Risky, yet not as risky as posting their full names, especially your mother’s
father maiden name. In fact, you may have already encountered many websites that
require your mother’s maiden name as an answer to a secret question
whenever you lose your password.
The name of your siblings Disclosing this is a huge risk. Strangers may pretend or use their identity to
dupe you.
Your address Hopefully, you answered “no” to this one. Giving the internet your number is
one thing; giving them your address is a whole other level. It would be much
easier for criminals to find you.
Your home phone number This shared information is more risky than sharing your personal phone
number. Scams usually use this information to deceive you, one of which is
when a stranger pretends to know your parents or pretends to be you.
Your birthday Letting people know your birthday is probably a must if you want to get as many
gifts as possible. But having it in your profile makes you vulnerable to identity
theft.

The Internet is defined as the information superhighway. This means that anyone has access to this highway, can
place information and can grab that information. Any information, even things that you have set privately, can be
accessed one way or another. This is why social networking sites like Facebook continue to improve their security
features. The threat of cybercrime is very real. While you may not experience the threat now, whatever information
we share today could affect our future.

Mr. Laurence H. Baña-2021 Page 6 of 14


Mary Chiles College- Senior High School Department

Tips to stay safe online

The Internet is a public pace and it is up to you to protect yourself. Here are some tips to help you stay safe
when using the internet.
1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions read it
3. Check out privacy policy page of a website to learn how the website handles the information you share
4. Know the security of the social network site you use. By keeping your profile private
5. Do not share passwords with anyone.
6. Avoid logging in to public networks/Wi-Fi. Browsing in incognito [or private mode a feature of the browsing
incognito [or private] mode a feature of the browser. Will not protect you from hackers
7. Do not talk to strangers whether online or face to face
8. Never post anything about a future vacation. It is similar to posting rob my house at this date
9. Add friends you know in real time
10. Avoid visiting untrusted website
11. Install and update antivirus software on your computer. Use only one anti-virus software to avoid conflicts
12. If you have Wi-Fi at home. Make it a private network by adding a password
13. Avoid downloading anything from an untrusted website. Unbearable peer to peer download torrents as the
downloading is most likely not monitored by the owner
14. Buy the software do use to prepare ones
15. Do not reply or click licks from suspicious emails.

Most people would dispute that there is no such thing as private over the internet and they may be right there are
hacker who can find a backdoor even if your profile is already set to private you have control whoever is looking at
your friend screen whenever they open profile or chat with you have no control over people access to your friends
account and seeing your private stuff.

Protecting Reputations Online


In the past, doing something embarrassing
was not much of a big deal. It happened; people
would laugh at it, and they would move on. Nowadays,
embarrassing moments are captured using any device
you could imagine. What is worse is that people can
easily upload it to the internet, where it can be stored
forever. This could impact not only your reputation but
also the people around you. What is worse is that
people tend to ignore this fact, and suffer later in their
life.
Once you post something over the internet,
search engines keep them in their archives for search
results. This makes anything you post to last forever
even if you delete it in your page. Something you and your friends find funny today may be something that could
harm someone’s reputation later.
Before hiring, companies do a background check on the applicant, and the easiest way to check your
background is to visit pages that are related to you. Thus, if they find disreputable information about you, it may harm
your reputation even if this information has been discarded.

Think Before You Click


Here are things you might want to consider before posting something on the Internet:

1. Before you post something on the web, ask these questions to yourself:
• Would you want your parents or grandparents to see it?
• Would you want your future boss to see it?

Mr. Laurence H. Baña-2021 Page 7 of 14


Mary Chiles College- Senior High School Department

Once you post something on the Web, you have no control of who see your posts.
2. Your friends depend on you to protect their reputation online. Talk to your friends about this serious
responsibility.
3. Set your post to “private”. In this way, search engines will not be able to scan that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it down or report
it as inappropriate.

Watch these videos for further explanation.

1. Netiquette: https://www.youtube.com/watch?v=_KM1eN6ZC3k
2. Failon Ngayon: Identity Theft: https://www.youtube.com/watch?v=TY1lzy_ZF8c
3. Identity Theft Prevention – Don’t Become a Victim of ID Theft
https://www.youtube.com/watch?v=Fztuohj3Fck

Written Work #2.1 Let's Reflect!

Mr. Laurence H. Baña-2021 Page 8 of 14


Mary Chiles College- Senior High School Department

Topic 2: Internet threats

Here are some of the threats you should be aware of when using the internet:

1. Malware – stands for Malicious Software.

A. Virus – a malicious program designed to replicate itself and transfer


from one computer to another either through the Internet and local
networks or data storage like flash drives and CDs.

B. Worm – a malicious program that transfers from one computer to


another by any type of means. Often, it uses a computer network to
spread itself. For example, the ILOVEYOU worm (Love Bug Worm)
created by a Filipino.

C. Trojan - a malicious program that is disguised as a useful program


but once downloaded or installed, leaves your PC unprotected and
allows hacker to get you information.

* Rouge security software- tricks the user into posting that it is a security software. It asks the
user to pay to improve his or her security but in reality they are not protected at all.

D. Spyware - a program that runs in the background without you knowing it(thus called “spy”). It has the
ability to monitor what you are currently doing and typing thr ugh keylogging.

* Keyloggers – used to record the keystroke done by the user. This is done to steal their password
or any other sensitive information. It can record email, messages, or any other information you type
on your keyboard.

E. Adware - a program designed to send you advertisements, mostly as pop-ups.

2. Spam – unwanted email mostly from bots or advertisers.

Mr. Laurence H. Baña-2021 Page 9 of 14


Mary Chiles College- Senior High School Department

3. Phishing – its goal is to acquire sensitive personal information like passwords and credit card details. This
is done by sending you an email that will direct the user to visit a website and be asked to update his/her
username, password, credit card or personal information.

*Pharming- a more complicated way of phishing where it exploits the DNS (Domain Name Service)
system.

Watch these videos for further explanation.

1. Malware: Difference Between Computer Viruses, Worms and Trojans


https://www.youtube.com/watch?v=n8mbzU0X2nQ

Performance Task #2 Internet Threats Poster


Create a poster showing the Internet threats with examples on how to avoid them in your daily life, primarily
online. You may use an interactive online tool like Canva, Glogster, Piktochart, etc. You may choose from any
of the Internet threats as your baseline idea in crafting your E-Posters.

Take note of the criteria:

Mr. Laurence H. Baña-2021 Page 10 of 14


Mary Chiles College- Senior High School Department

Topic 3: Copyright infringement

If you create something—an idea, an


invention, a form of literary work, or
research, you have the right as to how it
should be used by others. This is called
intellectual property. In other words, the
copyright law includes your rights over your
work, and anyone who uses it without your
consent is punishable by law. Try grabbing
any book then browse its first few pages and
you will find a page with a disclaimer with the
words: “No part of this book may be copied,
reproduced…” That is the copyright page.

As a responsible user of the internet, you have to consider that not everything out there is free for you to
use. Just like your own, contents that you see from websites have their respective copyrights. There are several
instances where employees and business owners face copyright infringement and are sentenced to a huge fine due
to reckless copying of materials.

Here are some tips that could help you avoid copyright infringement:

1. Understand. Copyright protects literary works, photographs, paintings, drawings, films, music (and lyrics),
choreography, and sculptures, but it generally does NOT protect underlying ideas and facts. This means that
you can express something using your own words, but you should give credit to the source.

2. Be responsible. Even if a material does not say that it is copyrighted, it is not a valid defence against
copyright. Be responsible enough to know if something has a copyright.

3. Be creative. Ask yourself whether what you are making is something that came from you or something
made from somebody else’s creativity. It is important to add your own creative genius in everything that will
be credited to you.

4. Know the law. There are some limitations to copyright laws. For instance in the
Philippines, copyrights only last a lifetime (of the author) Plus 50 years. There
are also provisions for “fair use” which means that an intellectual property may
be used without a consent as long as it is used in commentaries, criticism,
search engines, parodies, news reports, research , library archiving, teaching ,
and education. If you have doubts that what you are doing does not fall under
the policy of fair use, seek permission first.

Mr. Laurence H. Baña-2021 Page 11 of 14


Mary Chiles College- Senior High School Department

Online Research

The information that we need is more likely already on the Internet. It is just a matter of how to look for it and how to
use information from the most credible sources. Here are some tips in conducting online research:

1. Have a question in mind. Focus on a question you want


answered. If it is a series of questions, start with one. Never
search everything in one go.

2. Narrow it down. Search engines like Google, Bing, or Yahoo use


several filters to determine the most appropriate result for you.

These search engines use your previous search history and


geographical location, and send you the result which is the
most related to you.

3. Advanced Search. The best way to filter information you get from
search engines is by using advanced search. This will allow you
to filter out the information you do not need.

4. Look for credible sources. Some wikis, filled with updated information, are not a credible source. This is
due to the fact that anyone can edit its content. When using wikis, check out the link of the cited text to be
navigated to the footnote where the list of sources is located. Click the source of the information and see if it
is credible.

5. Give credit. Give credit to the original author of the page or information. To properly cite a reference, you
may use the format below.

Watch these videos for further explanation.

1. Understanding Copyright, Public Domain, and Fair Use


https://www.youtube.com/watch?v=XzzkSZ0Jrko&t=9s
2. Avoiding Plagiarism
https://www.youtube.com/watch?v=PzZsButRaHs

Mr. Laurence H. Baña-2021 Page 12 of 14


Mary Chiles College- Senior High School Department

Written Work #2.2 Case Scenario


Read the questions very carefully and analyze the situations. Write Yes if you agree with the
statement and No if you disagree. Followed by an explanation why it’s a YES or a NO. (5 points
each)

Scenario 1: A professor wishes to use a textbook he considers to be too expensive. He makes copies of the book for
the class. Is it okay to reproduce the said book? Is it covered under fair use? Why?

Scenario 2: A teacher wishes to show a movie clip of “The 3 Idiot” to her class for instructional purposes. Is it okay
for him to use the video in his class? Is it covered under fair use? Why?

Scenario 3: You forgot that your essay for Empowerment Technologies class is due tomorrow. While doing your
research, you found a website offering free essays. Is it okay to use the essays from this website? Why?

Performance Task #2.1 Internet Threats Poster


Create a poster showing the Internet threats with examples on how to avoid them in your daily life, primarily
online. You may use an interactive online tool like Canva, Glogster, Piktochart, etc. You may choose from any of the
Internet threats as your baseline idea in crafting your E-Posters.

Take note of the criteria:

Mr. Laurence H. Baña-2021 Page 13 of 14


Mary Chiles College- Senior High School Department

Performance Task #2.2


You may choose an activity that you wish to perform that depends on your capability or
resources. Submit your work through Google Classroom or messenger.. Make sure that this is
your original work. Our platform is equipped with anti-plagiarism software.

Option 1 Option 2 Option 3

Create campaign materials Research for several news and Create an electronic poster
promoting “Think Before You events related to cybercrime. promoting “Think Before You
Click”. Using your cellphone or any Click”.
video recording device, report as
It could be in the form of small if you were a newscaster.
posters using cartolina or Video recording should be 1-2
illustration board. minutes only.

RUBRICS

Congratulations!
Module 2 is Complete

Mr. Laurence H. Baña-2021 Page 14 of 14

You might also like