Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 15

ONLINE SAFETY, Arian M.

Edullantes, MMITM,
SECURITY, ETHICS AND MMEPM
Empowerment Technologies
ETIQUETTE
GOAL
At the end of the lesson, you will be able to
understand better the 24/7, social nature of digital
media. In particular, you will be able to:
 Explore your digital life; and
 Learn that it is important to act responsibly when
carrying out relationships over digital media
QUESTIONS TO CONSIDER:
 Are digital media a big part of your life?
 What kind of impact do digital media have on you?
 What are your favorite and least-favorite things to do with
digital media?
 Do you connect with others or create things with digital media?

 FINISH THE STATEMENT:


My media life is like ____________ because ________________.
ETHICS
 the discipline and practice of applying value to human behavior,
resulting to meaningful conduct
 ethos (Greek) – custom, habit, way of living

 Computer Ethics
 the application of classical and ethical principles when using computer
technology
IMPORTANCE OF COMPUTER
ETHICS
 Primary focus: to determine right and wrong conduct, both in
theory and in specific situations.
 It gives individuals a basis on which to praise or decry an action
and punish or reward it.
 Ethics seeks to protect parties that cannot speak for themselves.
 Without Ethics: all actions are equally acceptable and no one is
safe from his neighbor.
ETHICAL PROBLEMS RELATED
TO THE USE OF COMPUTERS:
 Privacy
 Computers created a false sense of security
 People do not realize how vulnerable information stored on computers
are
 Property
 Physical property
 Intellectual property
 Data as property
 Access
 Access to computing technology
 Access to data
 Accuracy
 Accuracy of information stored

 Hacking, cracking and virus creation

 Software piracy
THE TEN COMMANDMENTS
OF COMPUTER ETHICS
(FROM COMPUTER ETHICS
INSTITUTE)
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people’s computer work.
3. Thou shalt not snoop in other people’s files
4. Thou shalt not use a computer to steal
5. Thou shalt not use a computer to bear false witness
6. Thou shalt not use or copy software for which you have not paid
7. Thou shalt not use other people’s computer resources without authorization
8. Thou shalt not appropriate other people’s intellectual output
9. Thou shalt think about the social consequences of the program you write
10.Thou shalt use a computer in ways that show consideration and respect
INFORMATION SECURITY
Computer virus
 small programs that are designed to spread form one computer to another to
interfere with computer operation.

Spreading of Virus
 Through E-mail attachments, instant messaging messages, funny images,
audio and videos files
 downloading files from Internet – Greeting cards and many more
STEPS TO HELP AVOID
VIRUSES
 Use an Internet firewall
 Subscribe to industry standard antivirus software
 Never open an e-mail attachment from someone you don’t know
 Scan each and every attachment
 Read and understand the rules to be followed while surfing the
net
Hacker
 someone who bypasses the system’s access controls by taking
advantage of security weakness left in the system by developers.

Tactics used in Hacking


 Access confidential information
 Threaten someone from YOUR computer
 Broadcast your confidential letters or materials
 Store illegal materials
TRIVIA/GLOSSARY OF TERMS
 Aggregator
- A website or Web application where headlines and other content are collected for
easy viewing (Google News)
 Avatar
- A two or three-dimensional icon that represents a computer user or a gamer.
- Can be a cartoonish graphic, a photograph, a screen name, or a fully developed
character
 Blog
- From weblog
- A type of website usually updated by an individual or a group of bloggers
- Some provides news or opinions on specific topics while others are more like
online journals
- Comments are allowed
 Flaming
- The act of saying mean things online, usually in ALL CAPS, and often in a
public forum with the intention to humiliate
 Mash-up
- A remix or blend of multiple songs, videos, or other media content into one
product (e.i. Fan Fiction Writing)
 Massively Multiplayer Online Game (MMOG)
- Online virtual world that multiple players navigate and play in together
Peer-to-peer (P2P)
- A network that allows for sharing of mp3, videos and other digital files by
transferring information directly between two computers rather than by
going through a central server (Skype)
Phishing
- Illegal act of sending emails or messages that appear to come from authentic
sources, but really come from scammers.
 Podcast
- A downloadable video or audio file
- Can be verbal based on a certain topic, or can include music, video and
commentary
 Short Message Service (SMS)
- Text message, a short message of fewer than 160 characters sent from a cellphone.
 Multimedia Messaging Service (MMS)
- A text message that contains an attached multimedia file, such as a picture or song.

You might also like