Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 44

ONLINE SAFETY,

SECURITY, ETHICS,
AND ETIQUETTE
PREPARED BY: MR. PATRICK ANSON G. SALANGSANG
OBJECTIVES
At the end of the lesson, you will be able to
understand better the 24/7 social, nature of digital
media. In particular, you will be able to:
• Explore digital life; and
• Learn that it is important to act responsibly when
carrying out relationships over digital media.
How is your digital media life like?
Questions to consider:
1. Are digital media a big part of your life?
2. What kind of impact do digital media
have on you?
3. What are your favorite things to do with
digital media?
Glossary of Terms
Aggregator - a website or Web
application where headlines and other
content are collected for easy viewing.
Aggregators such as Google News
compile news articles and posts.
An avatar is a two- or three-dimensional
icon that represents a computer user or a
gamer. Avatar can be a cartoonish
graphic, a photograph, a screen name, or
a fully developed character.
Blog, from the term “weblog”, is a type
of website usually updated by an
individual or a group of bloggers. Some
blogs provide news or opinions on a
specific subject.
Flaming is the act of saying mean things
online, usually in ALL CAPS, and often
in a public forum with the intention to
humiliate. Flame wars can occur easily
online, as it can be difficult to figure out
people’s intentions or emotions online.
Mash-up is a remix or blend of multiple
songs, videos, or other media content into one
product. Fan fiction writing is one form of a
mash-up, as writers take characters from a
well-known video game, movie, or book, and
rewrite their actions or relationships.
Massively multiplayer online game
(MMOG) is usually an online virtual
world that multiple players navigate and
play in together.
P2P, or Peer-to-Peer, network allows for
sharing of mp3s, videos, and other digital
files by transferring information directly
between two computers rather than by
going through a central server.
Phishing is the illegal act of sending
emails or messages that appear to come
from authentic sources, but really come
from spammers.
Podcast is a downloadable video or audio
file. Podcasts can be verbal, based on a
certain topic, or can include music,
video, and commentary.
Short Message Service (SMS), or text
message, is a short message of fewer than
160 characters sent from a cell phone.
Tips to Stay Safe Online
1. Be mindful of what you share online
and what site you share it to.
2. Do not just accept terms and
conditions; read it.
3. Check out the privacy policy page of a
website to learn how the website handles
the information you share.
4. Know the security features of the
social networking site you use.
5. Do not share your password with
anyone.
6. Avoid logging in to public
networks/WiFi.
7. Do not talk to strangers whether online
or face-to-face.
8. Never post anything about a future
vacation.
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus
software on your computer.
12. If you have a Wi-Fi at home, make it
a private network by adding a password.
13. Avoid downloading anything from
untrusted websites.
14. Buy the software; do not use pirated
ones.
15. Do not reply or click links from
suspicious emails.
Internet Threats
1. Malware – stands for malicious
software. Examples are the
following:
A. Virus – a malicious program
designed to replicate itself and transfer
from one computer to another either
through the internet and local networks
or data storage like flash drives and
CDs.
B. Worm – a malicious program
that transfers from one computer
to another by any type of means.
C. Trojan – a malicious program that
is disguised as useful program but
once downloaded on installed, leaves
your PC unprotected and allows
hackers to get your information
3. Trojan – a malicious program that
is disguised as useful program but
once downloaded on installed, leaves
your PC unprotected and allows
hackers to get your information
D. Spyware – a program that
runs in the background without
you knowing it. Example of it is
Keyloggers.
E. Adware – a program designed
to send you advertisements,
mostly as pop-ups
2. Spam – unwanted email mostly
from bots or advertisers. It can
be sued to send malware.
3. Phishing – its goal is to acquire
sensitive personal information
like passwords and credit card
details.
Protecting Reputations Online
Once you post something over the
internet, search engines keep them in
their archives for search results. This
makes everything you post to last
forever even if you delete it in your
page.
Before hiring, companies do a
background check on the
applicant, and the easies way to
check your background is to visit
pages that are related to you.
Copyright Infringement
If you create something – an idea, an
invention, a form of literary work, or
a research, you have the right as how
it should be used by others. This is
called intellectual property.
Tips to avoid copyright
infringement
1. Understand. Copyright protects
literary works, photographs,
paintings, drawings, films, music
(and lyrics), choreography, and
sculptures.
2. Be responsible. Even if a
material does not say that it is
copyrighted, it is not a valid
defense against copyright.
3. Be creative. Ask yourself
whether what you are making is
something that came from you or
something made from somebody
else’s creativity.
4. Know the law. There are some
limitation to copyright laws.
Q3 Performance Task 3
1. If your digital life will be a thing that you
use in school, what would it be? Illustrate
and explain it in a long bond paper.
2. Write your name and section.
3. Submit it on time.

You might also like