Week4Session1 3

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 44

Picture Analysis

Questions:
• What do you think the picture is
portraying?
• Have you experienced something
similar on what is being portrayed
in the picture?
Online Safety, Security,
Ethics, and Netiquette
ONLINE SAFETY AND SECURITY TIPS
AND THREATS TO ONLINE SAFETY
Objectives:
1.Point out what are the best practices for searching.
2.Reflect on the importance of observing netiquettes and
avoiding plagiarism when searching.
3.Discuss and appreciate the importance of avoiding web
threats
Online Safety
Concepts
Data Privacy
• Data privacy is the right to protect your
personal information from
unauthorized access, use, or disclosure.
It is also the right to control how your
personal information is collected,
stored, and used.
• Personal information is any information
that can be used to identify you as an
individual, such as your name, address,
date of birth, Social Security number,
financial information, and medical
information.
Data Privacy Act of 2012 (DPA)
• The Data Privacy Act of 2012 (DPA) is a
comprehensive law that governs the
collection, use, disclosure, storage, and
disposal of personal data in the
Philippines. It covers both public and
private sector entities.
• The DPA requires entities to obtain the
consent of individuals before collecting or
processing their personal data. Entities
must also have a legitimate purpose for
collecting and using personal data, and
they must take reasonable steps to protect
the data from unauthorized access, use, or
disclosure.
Plagiarism
• Plagiarism is the act of passing off
someone else's work as your own. This
can include copying someone else's
words, ideas, or structure without
giving them proper credit. Plagiarism
can be intentional or unintentional,
but it is always wrong.
Types of Plagiarism
Direct plagiarism: This is the most common type of plagiarism, and it involves
copying someone else's work word-for-word without giving them credit.
Paraphrasing plagiarism: This type of plagiarism involves copying someone else's
ideas and putting them into your own words without giving them credit.
Self-plagiarism: This type of plagiarism involves reusing your own work without
properly citing yourself.
Mosaic plagiarism: This type of plagiarism involves copying and pasting pieces of
text from different sources together to create a new work without giving credit to
the original authors.
Online Safety Tips
Online Safety Tips
• Keep Personal Information Professional and Limited
• Keep Your Privacy Settings On
• Practice Safe Browsing
• Make Sure Your Internet Connection is Secure, Use a
Secure VPN Connection
• Be Careful What You Download
Online Safety Tips
• Choose Strong Passwords
• Make Online Purchases From Secure Sites
• Be Careful What You Post
• Be Careful Who You Meet Online
• Keep Your Antivirus Program Up To Date
The “I LOVE YOU” VIRUS
The ILOVEYOU virus comes in an
email with "ILOVEYOU" in the subject
line and contains an attachment that,
when opened, results in the message
being re-sent to everyone in the
recipient's Microsoft Outlook address
book. Perhaps more seriously, it
results in the loss of every JPEG, MP3
and certain other files on all
Onel De Guzman, creator of the virus
recipients' hard disks.
Online Safety, Security,
Ethics, and Netiquette
INTERNET THREATS AND ITS TYPES
Objectives:
1. Determine and avoid the dangers of the
internet.
2. Identify the different internet threats.
Internet Threats and Its
Types
Internet Threats

• An internet threat is anything that can harm your computer or your personal
information when you are using the internet. These threats can come from a
variety of sources, including hackers, cybercriminals, malware, and even other
users.
Types of Internet Threats
 Malware: Malware is a type
of software that is designed
to harm your computer or
steal your personal
information. Malware can
include viruses, worms,
Trojans, keyloggers, and
spyware.
Types of Internet Threats
 Phishing:Phishing is a type of
scam where attackers try to trick
you into revealing confidential
information, such as your
passwords or credit card
numbers. Phishing attacks often
involve sending fake emails or
text messages that appear to be
from legitimate companies.
Types of Internet Threats
 Ransomware: Ransomware is a
type of malware that encrypts
your files and demands a ransom
payment in exchange for the
decryption key.
Types of Internet Threats

 Denial-of-service
(DoS) attacks: DoS attacks are designed to
overwhelm a website or server with traffic, making it unavailable
to legitimate users.
Types of Internet Threats

 Man-in-the-middle attacks: Man-in-the-middle attacks are where an


attacker intercepts communication between two parties and
impersonates one of them. This can be used to steal personal
information or to spread malware.
Green Flag or Red Flag
WHAT ARE SOME OF YOUR RED FLAGS WHEN IT COMES TO
INTERNET BEHAVIOR?
Pressures others to do
things they're not
comfortable with online.
Uses emojis and GIFs to
add humor and
personality to their
messages.
Is honest about their
identity and age online.
Creates fake profiles to
catfish people.
Takes break from social
media to avoid burnout.
Online Safety, Security,
Ethics, and Netiquette
PART I: NETIQUETTE
Objectives:
Understand the concept of netiquette.
Create a slogan promoting awareness of netiquette.
Value the importance of netiquette when using the
Internet.
In recent news . . .
Rendon Labador’s facebook and tiktok account got deleted.
What is netiquette?
Netiquette
Netiquette is defined as “network
etiquette” the code of conduct for
online communication. Netiquette is
important for maintaining a positive
and productive online environment,
whether it's in emails, social media,
forums, chat rooms, or any other
online platform.
Common Principles of
Netiquette
Common Principles of Netiquette
Respect others: Treat others with Use proper grammar and spelling:
the same respect and courtesy Clear and well-structured
you would in face-to-face communication is essential for
effective online communication. Avoid
interactions. Avoid offensive excessive use of abbreviations and
language, insults, or harassment. acronyms that others may not
understand.
Common Principles of Netiquette
Be Concise: Keep your messages Use appropriate tone and language:
and comments brief and to the Choose your words carefully and avoid
point. Avoid writing using all caps, which can be
interpreted as shouting. Be mindful of
unnecessarily long messages that cultural differences and potential
may lose the misunderstandings.
Common Principles of Netiquette
Be cautious with humor and Respect privacy: Don't share personal
sarcasm: Humor and sarcasm can information about others without their
be easily misinterpreted online. consent. Be mindful of data privacy
and security when discussing sensitive
Use emoticons or emojis to topics.
clarify your tone when necessary.
Common Principles of Netiquette
Stay on topic: When participating Use meaningful subject lines: In
in online discussions or forums, emails and forum posts, provide clear
stick to the topic at hand. Avoid and descriptive subject lines to help
others understand the content of your
derailing conversations with message.
unrelated comments.
Common Principles of Netiquette
Avoid spam: Don't flood forums Read and follow community
or email inboxes with irrelevant guidelines: Different online platforms
or unsolicited messages. Be may have their own rules and
guidelines for conduct. Familiarize
mindful of the frequency and yourself with these rules and abide by
relevance of your them.
communication.
Common Principles of Netiquette
Use private channels for Be patient and tolerant: Not everyone
personal matters: When online will share your views or
discussing personal or sensitive opinions. Be open to constructive
criticism and engage in civil discussions
issues, use private messaging or when disagreements arise.
email rather than public forums
or social media.
What would you do?
What would you do?
You notice a heated argument between two users on a forum. How would you
intervene to promote a more respectful and constructive discussion while respecting
netiquette principles?
Your friend posts a potentially embarrassing photo of you on their social media
without your consent. How would you address this situation while adhering to
netiquette guidelines?
You receive an email from a colleague with multiple spelling errors and a rude tone.
How would you respond professionally, keeping in mind the principles of netiquette?
What would you do?
During an online game, a teammate starts using offensive language and insults
others. How would you handle the situation to maintain a positive gaming
environment in line with netiquette?
You've been chatting with someone you met on a dating app, and they suddenly
stop responding. How would you follow up or handle the situation without violating
netiquette or making the other person uncomfortable?
Activity 3: Creating a
Jingle
Jingle Making on Netiquette
Criterion Points Description

The students will create a Creativity 10


The jingle is original and unique and uses creative
language to convey its message.
jingle promoting the The jingle is clear and concise, and its message is easy
importance of netiquette. Clarity 10 to understand.
The jingle is relevant to the topic of netiquette and its
They will compose and Relevance 10 importance.
create a jingle promoting The jingle is memorable and thought-provoking, and it
Impact 10 effectively conveys its message.
the awareness and
The jingle is well-written and effective in promoting
practice of netiquette. Overall 10 netiquette.

You might also like