Anda di halaman 1dari 23

ONLINE SAFETY, SECURITY, ETHICS,

AND ETIQUETTE
• GOAL: At the end of the lesson, you will able
to understand better the 24/7, social nature of
digital media.
 explore your digital life, and
Learn that is important to act responsibly
when carrying out relationships over digital
media.
ONLINE SAFETY, SECURITY, ETHICS,
AND ETIQUETTE
• CHALLEGE QUESTIONS:
• How is your digital media life like? Hint: You
have to think figuratively.

• Think about your life with media. First


consider the questions below. Use your
responses to help you finish the statement
“My media life is like a ….”
ONLINE SAFETY, SECURITY, ETHICS,
AND ETIQUETTE
• This statement is simile, a literary device for
comparing two unlike things. For instance,
someone who does not use much media
might say that her media life is like a desert,
because there is a little life there. Someone
might say that his media life is like a track
meet, because he is exhausted at the end of
the day, Finally, make a picture or drawing of
the simile you created. The drawing can
include text.
ONLINE SAFETY, SECURITY, ETHICS,
AND ETIQUETTE
• Questions to consider:
• Are digital media a big part of your life?
• What kind of impact do digital media have on you
(a little, some, a lot)
• What are your favorite and least-favorite things
to do with digital media?
• Do you connect with others or create things with
digital media? Finish this statement: My media
life is like _______________________ because
ONLINE SAFETY, SECURITY, ETHICS,
AND ETIQUETTE
• Illustrate your simile in the box below ( or on
separate piece of paper)
• Similes are used in literature to make writing more vivid and powerful. In everyday speech, they can be
used to convey meaning quickly and effectively, as many commonly used expressions or idioms are similes.
• For example, when someone says "He is as busy as a bee," it means he is working hard, as bees are known
to be extremely busy. If someone says "I am as snug as a bug in a rug," they mean that they feel very
comfortable and cozy or are tucked up tight in bed.
• Some other well-known similes you will often hear are:
• As cute as a kitten
• As happy as a clam
• As light as a feather
• As blind as a bat
• As bold as brass
• As bright as a button
• As shiny as a new pin
• As cold as ice
• As common as dirt
• As cool as a cucumber
• As hard as nails
• As hot as hell
• As innocent as a lamb
• As tall as a giraffe
• As tough as nails
• As white as a ghost
• As sweet as sugar
• As black as coal
TRIVIA/GLOSSARY OF TERMS
• 1. Aggregator is a website or Web application
where headlines and other content are collected
for easy viewing. Aggregators such as Google
News compile news articles and posts. An avatar
is a two- or three-dimensional icon that
represents a computer user or a gamer.
• 2. Avatar can be a cartoonish graphic, a
photograph, a screen name, or a fully-developed
character.
• 3. Blog, from the term “weblog, ” is a type of
website usually updated by an individual or a
group of bloggers. Some blogs provide news or
opinions on a specific subject, while others are
more like online journals. Most blogs allow
readers to leave comments on blog posts.
• 4. Flaming is the act of saying mean things online
usually in ALL CAPS, and often in a public forum
with the intention to humiliate. Flame wars can
occur easily online, as it can be difficult to figure
out people’s intentions or emotions online.
• 5. Mash-up is a remix or blend of multiple songs,
videos, or other media content into one product.
Fan fiction writing is one form of a mash-up, as
writers take characters from a well-known video
game, movie, or book, and rewrite their actions
or relationships.
• 6. Massively multiplayer online game (MMOG) is
usually an online virtual world that multiple
players navigate and play in together. While in
this virtual world, their avatars chat, cooperate,
and quest together, oftentimes towards a goal.
• 7. P2P, or Peer-to-Peer, network allows for sharing of
mp3s, videos, and other digital files by transferring
information directly between two computers rather
than by going through a central server. P2P technology
is also behind the popular Internet phone service
Skype.
• 8. Phishing is the illegal act of sending emails or
messages that appear to come from unthentic sources,
but really come from spammers. Phishers often try to
get people to send them their personal information,
everything from account numbers to passwords.
• 9. Podcast is a downloadable video or audio file.
Podcasts can be verbal, based on a certain topic,
or can include music, video, and commentary.
Most podcasts are updated regularly through the
addition of new episodes.
• 10. Short Message Service (SMS), or text
message, is a short message of fewer than 160
characters sent from a cell phone. A Multimedia
Messaging Service (MMS) is a text message that
contains an attached multimedia file, such as a
picture or song.
• Cybercrime – a crime committed or sssisted
through the use of the internet
• Privacy policy – tells the users how the
website will handle its data
• Malwares – stands for malicious software.
• Virus – a malicious program designed to
replicate itself and transfer from one
computer to another.
• Worm – a malicious program that transfers from
one computer to another by any type of means.
• Trojan – a malicious program that is disquised as
a useful program but once downloaded or
installed, leaves your PC unprotected and allows
hackers to get your information.
• Spyware – a program that runs in the background
without knowing it. It has the ability to monitor
what you are currently doing and typing through
keylogging.
• Adware – a program designed to send you
advertisements, mostly pop-ups
• Spam – unwanted email mostly from bots or
advertisers
• Phishing – acquires sensitive personal
information like passwords and credit card
details.
• Pharming – a more complicated way of phishing
where it exploits the DNS (Domain Name Service)
system.
• Copyright – a part of the law, wherein you have
the rights to your work, and anyone who uses it
without your consent is punishable by law.
• Fair use – means that an intellectual property
may be used without a consent as long as it is
used in commentaries, criticisms, search engines,
parodies, news reports, research, library
archiving, teaching, and education.
Protecting Reputations Online
• In the past, doing something embarrassing
was not much a big deal.
• Nowadays, embarrassing moments are
captured using any device you could imagine.
Copyright Infringement
• Intellectual Property
• Copyright Law
• Copyright Page “No part of this book may be copied,
reproduced”
• Understand- Copyright protect literary works, photographs
paintings, drawing, films, music choreography and
sculptures.
• Be Responsible- even if a material does not say that it is
copyrighted, it is not a valid defense against copyright.
• Be Creative- ask yourself whether what you are making is
something that came from you or something made from
somebody else creativity.
• Know the Law- there are some limitations to copyright laws
Online Research
1. Have a question in mind- Focus on a question
you want answered.
2. Narrow it down- Search engines like Google,
Bing, or Yahoo use several filters to determine
the most appropriate result for you.
3. Advanced Search- The best way to filter
information you get from search engines is by
using the advanced search.
Online Research
4. Look for a credible sources- Some wikis, filled
with updated information, are not a credible
source. When using wikis, check out the link of
the cited texts.
5. Give credit- Give credit to the original author
of the page or information. To properly site a
reference, you may use the format below.
Advanced Productivity Tools
• Spreadsheet
• Word Processing
• Presentation
• Database
• Graphics
TIPS TO STAY ONLINE
• Be mindful of what you share and what site you
share it to.
• Do not just accept terms and conditions; read it.
• Check out the privacy policy page of a website.
• Know the security features of the social
networking site you use.
• Do not share password with anyone.
• Avoid logging in to public networks/Wi-Fi.
• Do not talk to strangers whether online or face to
face.
• Never post anything about future vacation.
• Add friends you know in real life.
• Avoid visiting untrusted website.
• Install and update an anti virus software on your
computer.
• If you have a Wifi at home , make it a private
network by adding password.
TIPS TO STAY ONLINE
• Avoid downloading anything from untrusted
websites.
• Buy the software; do not use pirated ones.
• Do not reply or click links from suspicious
email.

Anda mungkin juga menyukai