0% found this document useful (0 votes)
54 views9 pages

EmTech Q3 M1

The document discusses online safety, security, ethics, and etiquette when using information and communication technologies like the internet and social media. It defines key concepts like cyberbullying, identity theft, malware, spam, phishing, and cybercrime risks people face online. The document provides tips for safe internet use and outlines proper online etiquette called "netiquette" that promotes respectful interactions between users.

Uploaded by

Duncan Osoteo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views9 pages

EmTech Q3 M1

The document discusses online safety, security, ethics, and etiquette when using information and communication technologies like the internet and social media. It defines key concepts like cyberbullying, identity theft, malware, spam, phishing, and cybercrime risks people face online. The document provides tips for safe internet use and outlines proper online etiquette called "netiquette" that promotes respectful interactions between users.

Uploaded by

Duncan Osoteo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Lesson

Lesson
The Current State of ICT
1 Technologies

What I Need to Know


Information and Communication Technology
It refers to the use of communication technology such as laptop, smart phones,
tablet, telephone, internet etc. to send, save, and edit information.

ICT in the Philippines


The use of communication technology spread in the entire country now a day even
in rural areas. According to Rappler blog site there are 119 million mobile phone
subscriptions from a total population of 101 million and 47 million active Facebook
accounts. The Philippines is the fastest growing app market in Southeast Asia and
the highest digital population in the world. The top online activities are social media,
videos, online mobile games, location-based search, and online shopping. Staying
connected with loved ones, friends, and relatives is a fundamental need for
Filipinos.

World Wide Web


It is also known as WWW or W3 introduce by Tim Berners-Lee. It consists of
different pages that are formatted in a markup language called HTML (Hypertext
Markup Language) and linked to each other that contain text, graphics, multimedia
files, hyperlinks etc.

Web 1.0
The first development of World Wide Web where web pages are static. It also
known as flat or stationary page and it cannot be manipulated by users.

Web 2.0
It is a dynamic web page where user can interact with page like creating a user
account, posting comments, uploading files and images, and others. Example: Blog
sites, Facebook, Twitter, Instagram, YouTube

1
Features of Web 2.0

1. Folksonomy – users can classify and arrange information by adding tag or


label. Pound sign (#) is used in Facebook, Twitter, Instagram and other social
networking sites.
Example in tagging on Facebook: #TeamKawayan, #Single
2. Rich User Experience – user can have high interaction with the content of
the page and can achieve level of expertise.
3. User Participation – user can put content on their own in web page like
comment, evaluation, and etc.
4. Long Tail – A site that offers services and brings individual and businesses
into selling different goods and commodities such as shopping site like OLX,
Lazada, Shopee, Zalora and others.
5. Software as a service – users can subscribe to a software when they need it
instead of purchasing them.
6. Mass Participation – sharing of diverse information through universal web
access.
Web 3.0 The Semantic Web
A new paradigm in web interaction extension of led by World Wide Web
Consortium (W3C) where it provides framework that allows data to be shared and
reuse.

What Is It

Technology keeps rising and improving every time. The use of technology connects
us to the people around the globe and gives us current information on the trends in
information and communication. As what you have written in the activity above, it
shows that social media is mostly used by people and one of the current trends in
information and communication technology.

Trends in ICT
1. Convergence – it refers to fusing of technological advancement to work on a
similar task.
Example. Using smartphone as camera in taking pictures instead of DSLR
camera.
2. Social Media – an application and website where user can communicate,
create, and share content, and participate in online communities.

Type of Social Media


A. Social Network – A website where people with the same come
together to share information.
2
Examples: Twitter, Instagram, Facebook
B. Social News – A website where user can post stories and are
ranked based on the popularity through voting.
Examples: Digg, Reddit, Propeller, Slashdot, Fark
C. Bookmarking Sites – A website that allows you to share and store
internet bookmarks, articles, posts, blogs, images, and others.
Examples: Pinterest, StumbleUpon, Dribble
D. Media Sharing – A website that allows you to share and store
multimedia files such as video, photos, and music.
Examples: Instagram, YouTube, Flickr
E. Microblogging – a website that allows you to broadcast short
message. Examples: Twitter, Tumblr, Meetme
F. Blogs and Forums – a discussion website that allows user to ask
questions and comments on a journal posted by an individual or
group. Examples: WordPress, Blogger

3. Mobile Technologies – a technology used in cellular and other devices such


netbook, laptop, tablet, smartphones etc.
4. Assistive Media - A platform that assist people with disability. It will guide
the individual like a blind person by using an audio recording.

Lesson
Lesson
Online Safety, Security, Ethics
2 and Etiquette

What’s In

We have learned in lesson 1 about the current state of Information and


Communication Technology in global setting. There are various online platforms
and sites that people used today as their medium of communication and source of
information. This communication technology spread fast to the people and even
controls their lives. Despite of the good benefits given to us by the technology there
are stills things that we must be aware of. In this lesson we will discuss and give
importance in online safety, security, ethics, and etiquette.

3
What I Need to Know

Online Safety
The importance of internet plays a crucial part in human development. Life
becomes easy and comfortable because of this technology. Most of us are
connected to the internet via laptop, mobile phone, tablet, personal computer, and
other electronic gadgets. Behind this technology there is a risk that everyone should
be aware of. You could be at risk on scam, bullying, and illegal activities if you will
not take precautions in using internet. We need to keep ourselves safe and secure
whenever we use the internet. That is why it is very important to know and learn the
ways on how to be safe and secured online.

What Is It

In the activity above you assessed yourself in online habits. Those habits might be
good or bad that you must be aware of. If you keep practicing those bad habits it
might bring you danger. Safety is the first thing you must consider in using internet.

Tips on how to be safe online


 Do not share your password with anyone.
 Add friends you know in real life.
 Do not visit untrusted websites.
 Add password to your WIFI at home to make it private.
 Install and update antivirus in your computer.
 Do not give your personal information to anyone.
 Think before you click.
 Never post about your future vacation.

4
Internet Risk
 Cyberbullying - It happens when someone intentionally abused, harass, and
mistreated by other person using electronic communication.
 Identity Theft - It is a crime of stealing personal information for the purpose of
assuming that person’s name or identity to make any form of transactions.
 Cyber Stalking - A criminal practice where electronic communication is used
to stalk or harass individual or group.
 Sexting - The act of sending sexually explicit text messages, images, and
videos.

Internet Threats
 Malware - also known as Malicious Software.
Types of Malware
1. Virus – a malicious program that replicate itself by copying itself to
another program.
2. Trojan Horse – a malicious program that disguised as legitimate program
that user will accept and use but take control of your computer.
3. Worm – malicious program that copies itself and spreads to other
computers.
4. Spyware – A malicious program that gathers information from victim’s
computer and send it back to the hacker.
5. Adware – An unwanted advertisement that will pop-up several times on
victim’s computer then behave abnormally and tedious to close them.
6. Keylogger – A program that runs in the background and steals user
credentials and confidential information and send back to hack by
recording every keystroke that a user makes on their computer or device.
7. Botnet – A collection of infected internet–connected devices such as PC
and mobile phone that are controlled by a common type of malware.
8. Rootkit – A software tools used by hackers to gain control over a
computer on a network without being exposed.
9. Ransomware – A ransom virus that block the user from accessing the
programs or files and demands to pay the ransom through online method
for the removal of the virus.
 Spam - Also known as junk email or unwanted email send by advertiser or
bot. It can be used to send malware.
 Phishing - A cyberattack method using deceptive emails and websites to
acquiring sensitive personal information.
 Cybercrime - A crime in which computer is used as object and tool in
committing a crime such hacking, phishing, spamming, child pornography,
libel, hate crimes, identity thief and others.
 Cybercrime Law - A law that deals with all forms of cybercrime.

5
Netiquette
It is a word that came from the two words “net” and “etiquette”. It is an etiquette
applied online that shows proper manner and behavior. If you are a member of an
online society through social media, you are called netizen. And in interacting with
other netizen online, we need to maintain good behavior which is acceptable to
others in online community.

The Core Rules of Netiquette by Seth T. Ross


1. Remember the human.
2. Adhere to the same standards of behavior online that you follow in real
life.
3. Know where you are in cyberspace.
4. Respect other people's time and bandwidth.
5. Make yourself look good online.
6. Share expert knowledge.
7. Help keep flame wars under control.
8. Respect other people's privacy.
9. Don't abuse your power.
10. Be forgiving of other people's mistakes.

What I Can do

Activity: Shout Your Mind


Directions: Make a poster with a theme “think before you click”. Use an A4 size
bond paper

Category 4 3 2 1
Graphics – All graphics All graphics Some Many graphics
Relevance are related to are related to graphics are are not related
the the topic not related to to the topic.
topic/theme except 1. the topic.
and makes it
easier to
understand.

Attractiveness The poster is The poster is The poster is The poster is


exceptionally attractive, neat acceptably not
attractive, and clean. attractive but it

6
neat and has few attractive and
clean. erasures. has many
erasures.

Lesson
Lesson
Contextualized Online Search
3 and Research Skills

What’s In

In previous lesson, we discussed on online safety, security, ethics and etiquette that
we must take into consideration in using internet. Technology such mobile phone,
laptop, computer, and other electronic gadgets connect us to world through different
online platforms. Security and safety have been taught to us so that we can avoid
risk and danger online. As an individual who is part of online community must
maintain good social behavior. We need to adhere to the same standard behavior
online that we follow in real life. Now that you are ready to enter and explore the
online world, this lesson will teach you on online search and research skills.

What I Need to Know

Internet Research is a research method in collecting and gathering information via


internet by using search engine such as google.

Search Engine is a program that allows users to search for content on internet.

Examples of Search Engine


Google Aol Search Wow Baidu
Web Crawler Yahoo! Search MyWebSearch Wolframalpha
Bing Info Dogpile DuckDuckGo
Ask Infospace Contenko Internet Archive
7
Searching the Web
Getting the correct and reliable information is our goal in internet research. We may
rely on the capability of search engine but sometimes it may not give us the correct
information because of the keywords we entered into a search engine. There are
techniques in searching information that can be applied in search engine to get a
better result. Some search engines allow combination of words and logic connectors
of AND, OR, and NOT.

Tips for Effective Internet Research by George Mathews


1. Know what kind of research you want to do.
2. Make a list of keywords you will use in your search.
3. Enclose keywords in quotation marks.
4. Use the minus sign (-).
5. Try specialized search engines.
6. Skim through search results web pages.
7. Bookmark
8. Review your bookmarks.

Online Research Skills by Hannah Trierweiler Hudson


1. Check Your Sources
2. Ask Good Questions
3. Go Beyond the Surface
4. Be Patient
5. Respect Ownership
6. Use Your Networks

Copyright Issues
There are millions of information that we can get from the internet. Some of this
information are free but others are not. They are protected by a copyright law.

What is Copyright?
Copyright is a protection given to the owner of the rights in an original work such as
books, musical works, films, paintings, and other works, and computer programs.
This original work is called intellectual property which is protected under Republic
Act 8293 known as the “Intellectual Property Code of the Philippines”.

Copyright Infringement
This happens when the copyrighted work is use by other person without permission
of the author or copyright holder. Any person who is infringing the right protected
work would be liable under the law. An example of this is the case of M.Y.
Intercontinental Trading Corporation (MITC), Tedwin T. Uy, Allianz Marketing and
Publishing Corp. (Allianz), and Fujian New Technology Color Making and Printing
Company, LTD (Fujian) against St. Mary’s Publishing Corporation (SMPC). Manila
regional trial court ordered Fujian and its partners to pay P24.7 million for the
damages and cost of litigation for copyright infringement to SMPC. Fujian and its
three local partners were guilty of printing, copying, reproducing, importing,
distributing, and selling of original and revised textbooks that they have illegally sold
8
to Department of Education in Zamboanga, Municipality of Cabuyao in Laguna and
Municipality of Matnog in Sorsogon without the approval of SMPC, the copyright
owner of the textbooks.

Fair Use
Research is important to the students and other people. Most of them rely on the
information that they can get online. Although this information is protected by a
copyright law but we can still use this information without permission in a limited
way under certain condition and purpose.

Fair use is the use of copyrighted material for comment, teaching, criticism, news
reporting, research, scholarship, and other similar purpose is not an infringement of
copyright.

Example of this is when you post a quote from a person in your Facebook wall.
Include the name of person who owns the quote in your post. Another example is
when you copy image from internet, give credit to the creator of image. The copied
image should be use for educational purpose not for commercial use.

In fair use, 5% of the content of reference can only be copied. If 20% or less of
reference copied, there must be a secondary use agreement and fee. And if 20% or
more of reference copied, it requires purchasing of creative work.

Guidelines for Fair Use


1. Majority of the contents created must be yours.
2. Give credit to the owner.
3. Don’t make profit of the copyrighted work.

Summary
The community online never stops upgrading. Before, users of Web 1.0 can only
read through the content of the website but now with presence of Web 3.0 we can
now create our own profile and communicate online. However, you need to be
careful while you are online since there are possibilities that your identity or
personal information might be stolen, or your personal files might be deleted by
malicious software. So always bear in your mind that you need to "Think Before You
Click".

You might also like