0% found this document useful (0 votes)
144 views12 pages

Empowerment Lesson 2

The document discusses online safety, security, ethics, and etiquette. It defines computer ethics and the importance of following moral standards when using technology. Some key issues covered include privacy concerns like hacking and data protection, intellectual property rights, and the ten commandments of computer ethics.

Uploaded by

Alexis V. Larosa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
144 views12 pages

Empowerment Lesson 2

The document discusses online safety, security, ethics, and etiquette. It defines computer ethics and the importance of following moral standards when using technology. Some key issues covered include privacy concerns like hacking and data protection, intellectual property rights, and the ten commandments of computer ethics.

Uploaded by

Alexis V. Larosa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

ALUBIJID NATIONAL COMPREHENSIVE HIGH SCHOOL

SENIOR HIGH SCHOOL


OPEN HIGH SCHOOL

EMPOWERMENT TECHNOLOGY

Name: _______________________________ Year Level: ___________________

Section: _____________________________

ONLINE SAFETY AND INFORMATION SECURITY

Learning Objectives
1. Define computer ethics and know the ethical issues related to the use of computer
2. Apply online safety, security, ethics, and etiquette standards and practices in ICT

Review/Lesson Preview
From our previous class, we have discussed about the current state of ICT in the Philippines,
online systems and its functions, and the current trends in both online systems and ICT
devices. Below are questions for our review.
1. What are the six (6) components of ICT?

1.___________________________ 2. _________________________ 3.________________________

4.___________________________ 5. _________________________ 6.________________________

Lessons & Concepts


While there is no official list of netiquette rules or guidelines, the general idea is to respect
others online. What is ethics?

1. Ethics or moral philosophy is a branch of philosophy that involves systematizing,


defending, and recommending concepts of right and wrong conduct.
ALUBIJID NATIONAL COMPREHENSIVE HIGH SCHOOL
SENIOR HIGH SCHOOL
OPEN HIGH SCHOOL

EMPOWERMENT TECHNOLOGY
Computer Ethics

2. Computer ethics are a set of moral standards that govern the use of computers. It is
society's views about the use of computers, both hardware and software.
3.
4. Importance of Computer Ethics
5.
6. Computer ethics essentially protect individuals online from predation: they prevent
breach of privacy, identify theft, interference with work and unlawful use of proprietary
software, among other events. Computer ethics govern the behavior of users online, and
date back to 1992.
7.
8. Without the study of ethics, there can be no government and no laws. Without an ethical
system in place, all actions are equally acceptable and no one is safe from his neighbor.
Ethics seeks to protect parties that cannot speak for themselves. It is a major factor in
industries that deal with human and their actions.
9.
10. Ethical problems related to the use of computers and internet
 Privacy Concerns
 Hacking – is unlawful intrusion into a computer or a network. A hacker can
intrude through the security levels of a computer system or network and can
acquire unauthorised access to other computers.
 Malware – means malicious software which is created to impair a computer
system. Common malware are viruses, spyware, worms and trojan horses. A
virus can delete files from a hard drive while a spyware can collect data from a
computer.
 Data Protection – also known as information privacy or data privacy is the
process of safeguarding data which intends to influence a balance between
individual privacy rights while still authorizing data to be used for business
purposes.
 Anonymity – is a way of keeping a user’s identity masked through various
applications.
 Intellectual Property Rights
 Copyright – is a form of intellectual property that gives proprietary publication,
distribution and usage rights for the author. This means that whatever idea the
author created cannot be employed or disseminated by anyone else without
the permission of the author.
 Plagiarism – is an act of copying and publishing another person’s work without
proper citation. It’s like stealing someone else’s work and releasing it as your
own work.
 Cracking – is a way of breaking into a system by getting past the security
features of the system. It’s a way of skipping the registration and
authentication steps when installing a software.
 Software License – allows the use of digital material by following the license
agreement. Ownership remains with the original copyright owner, users are
ALUBIJID NATIONAL COMPREHENSIVE HIGH SCHOOL
SENIOR HIGH SCHOOL
OPEN HIGH SCHOOL

EMPOWERMENT TECHNOLOGY

The Ten Commandments of computer ethics


(From Computer Ethics Institute)
1 Thou shalt not use a computer to harm other people.
2 Thou shalt not interfere with other people's computer work.
3 Thou shalt not snoop around in other people's files.
4 Thou shalt not use a computer to steal.
5 Thou shalt not use a computer to bear false witness.
6 Thou shalt not use or copy software for which you have not paid.
7 Thou shalt not use other people's computer resources without authorization.
8 Thou shalt not appropriate other people's intellectual output.
9 Thou shalt think about the social consequences of the program you write.
10 Thou shalt use a computer in ways that show consideration and respect

Cyber Security & Information Security


These two words “Cyber Security” and “Information Security” are generally used as synonyms
in security terminology, and create a lot of confusion among security professionals

Following Venn diagram can be helpful to understand the differences.

Reference- Center for Cyber and Information Security (https://ccis.no/cyber-security-versus-information-security/)


ALUBIJID NATIONAL COMPREHENSIVE HIGH SCHOOL
SENIOR HIGH SCHOOL
OPEN HIGH SCHOOL

EMPOWERMENT TECHNOLOGY
Notice that cyber security (right set) includes everything and everyone that can be accessed through
cyberspace. So, one could argue that everything in this world is vulnerable through ICT. However, going by
the definition of cyber security, we should protect which is to be protected, because of the security
challenges posed by the use of ICT.

Activity 1. Identify what is asked on each number.


_________________1. is unlawful intrusion into a computer or a network. A hacker can
intrude through the security levels of a computer system or network and can acquire
unauthorised access to other computers.
_________________2. means malicious software which is created to impair a computer
system. Common malware are viruses, spyware, worms and trojan horses. A virus can
delete files from a hard drive while a spyware can collect data from a computer
_________________3. Copyright – is a form of intellectual property that gives proprietary
publication, distribution and usage rights for the author. This means that whatever idea
the author created cannot be employed or disseminated by anyone else without the
permission of the author
_________________4. is an act of copying and publishing another person’s work without
proper citation. It’s like stealing someone else’s work and releasing it as your own work.
_________________5. is a way of breaking into a system by getting past the security
features of the system. It’s a way of skipping the registration and authentication steps
when installing a software
Activity 2. Record Yourself.
Option 1: Using your mobile phone or any recording media record yourself reciting the ten
(10) commandments of computer ethics. Post this on your social media account and tag your
classmates and your teacher

Option 2: recite the ten commandments in front of the class.

Cybersecurity: The ability to protect or defend the use of cyberspace from cyber attacks.
Information Security (1): The protection of information and information systems from unauthorized access, use,
disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.
Information Security (2): Protecting information and information systems from unauthorized access, use, disclosure,
disruption, modification, or destruction in order to provide —

1) integrity, which means guarding against improper information modification or destruction, and includes ensuring
information non-repudiation and authenticity;

2) confidentiality, which means preserving authorized restrictions on access and disclosure, including means for
protecting personal privacy and proprietary information; and

3) availability, which means ensuring timely and reliable access to and use of information.
ALUBIJID NATIONAL COMPREHENSIVE HIGH SCHOOL
SENIOR HIGH SCHOOL
OPEN HIGH SCHOOL

EMPOWERMENT TECHNOLOGY
Independent Learning:

Directions: Choose the letter that will best answer the ff. questions. Write the letter of your choice.

1. One example of a computer ethic commandment is:


a. You cannot snoop on others' computers
b. You cannot share a flashdrive
c. You cannot have multiple computers
d. You cannot share pictures online
2. Ethical behavior that should be modeled in a classroom is:
a. Mutual respect
b. Trust
c. Equality
d. All of these are correct
3. Ethical behavior that should be modeled in a classroom is:

a. Downloading as much music as you want


b. Using any website you want
c. Using information from the internet in student projects
d. Letting students search whatever they want
ALUBIJID NATIONAL COMPREHENSIVE HIGH SCHOOL
SENIOR HIGH SCHOOL
OPEN HIGH SCHOOL

EMPOWERMENT TECHNOLOGY
Case Study:
"The Captain Knows BEST"

A tale of two designs

Fred Fredson, an experienced consultant, is working on a contract with the U.S. Navy to develop a
critical system. The system will manage the processing of some very dangerous materials.

The exposure of two sailors to these materials and their subsequent deaths led Captain Birk to request
the redesign of the system used to manage these materials. The only one in his area with any computer
training, he saw a way to use computer technology to significantly reduce the dangers of this process.

Fred is one of a small number of people who have worked with the type of computer used to manage
this process. During several meetings with Captain Birk, Fred has gathered the external requirements
for the system. Fred then designs the system which he believes will best control the process.

Captain Birk requests that he be shown Fred's internal software design for the system. Fred, who has
taken great pains to develop a system that can be proven to be highly reliable and clearly
demonstrated to do what has been requested, welcomes the opportunity to show the details of his
work. Fred arranges a meeting with the captain.

At the meeting, halfway into Fred's presentation, Fred is interrupted by the captain who says that the
design of the software is not the way he wants it. The captain then describes how he wants the software
designed. Fred is greatly concerned because he believes that there is no adequate way to test the
software if it follows the captain's design.
ALUBIJID NATIONAL COMPREHENSIVE HIGH SCHOOL
SENIOR HIGH SCHOOL
OPEN HIGH SCHOOL

EMPOWERMENT TECHNOLOGY
Fred tries gently to point this out to the captain. But the subtle reasons for this are missed by the
captain who accuses Fred of merely having an egotistical commitment to his own design. The meeting
ends acrimoniously with the captain saying that if Fred does not agree to the new design then the
contract will be cancelled.

Fred calls you and asks for your help. He relates his belief that if the contract is cancelled that the navy
will not deal with this problem again until there is another death. Fred reminds you of his expertise in
testing. He assures you that he designed the software so that the testing would yield a very high level
of confidence that the software would be safe and would resolve the problem that led to the two deaths.
He further assures you that even though you could not prove that the captain's design was wrong, Fred
could not think of any tests that could demonstrate the reliability of the captain's design. Fred could
provide no assurance that the captain's design was reliable and would not at a later date cause
significant problems if it were adopted.

He knows that you have been concerned with ethical and legal issues and asks for your advice.
Write down your advice below:

______________________________________________________________________________________________________

______________________________________________________________________________________________________

______________________________________________________________________________________________________

______________________________________________________________________________________________________

______________________________________________________________________________________________________

______________________________________________________________________________________________________

Closure Activity:

1. Using the internet read about “Cyberbullying” and in 300 words write your personal
insights about the topic.
OR READ THE CYBERBULLYING REFERENCE AT THE END OF THIS LESSON

Feedback:

How do you feel about the activity?

_____________________________________________________________________________________________

____________________________________________________________________________________________

References:

https://www.dinwiddie.k12.va.us/app/uploads/2018/12/Cyberbullying.pdf
https://techterms.com/definition/netiquette
https://teachcomputerscience.com/computer-ethics/
https://www.cisoplatform.com/profiles/blogs/understanding-difference-between-cyber-security-information
https://www.researchgate.net/topic/Computer-Ethics
CYBERBULLYING REFERENCE
ALUBIJID NATIONAL COMPREHENSIVE HIGH SCHOOL
SENIOR HIGH SCHOOL
OPEN HIGH SCHOOL

EMPOWERMENT TECHNOLOGY
ALUBIJID NATIONAL COMPREHENSIVE HIGH SCHOOL
SENIOR HIGH SCHOOL
OPEN HIGH SCHOOL

EMPOWERMENT TECHNOLOGY
ALUBIJID NATIONAL COMPREHENSIVE HIGH SCHOOL
SENIOR HIGH SCHOOL
OPEN HIGH SCHOOL

EMPOWERMENT TECHNOLOGY
ALUBIJID NATIONAL COMPREHENSIVE HIGH SCHOOL
SENIOR HIGH SCHOOL
OPEN HIGH SCHOOL

EMPOWERMENT TECHNOLOGY
ALUBIJID NATIONAL COMPREHENSIVE HIGH SCHOOL
SENIOR HIGH SCHOOL
OPEN HIGH SCHOOL

EMPOWERMENT TECHNOLOGY

You might also like