SlideShare a Scribd company logo
1 of 13
Cyber Security Ethics Netiquette
Online Safety and Security, Ethics and
Netiquette
• The introduction of the World Wide Web (WWW) and internet has made
great breakthroughs in the field of information sharing and communication.
It helped connect people miles away from each other. However, these
advances carried drawbacks wherein the issue of safety, security, and ethics
of the consumers are compromised.
Common issues and crimes on the internet
are the following:
1. Cyberbullying
2. Hacking
3. Identity theft
4. Plagiarism
5. Intellectual property rights and copyright issues
These issues caused the formulation of the rule and regulation to be followed
when using the internet. Since the internet, especially social media,
allows you to post everything everyday, some personal information might be
given to or seen by unknown people. Online safety and security defines how
you are going to keep yourself safe while surfing the web
Online Ethics and Netiquette
Online ethics focuses on the acceptable use of online resources in an online
environment. Netiquette, on the other hand, focuses on the acceptable
behavior of the person while using the internet resource.
Netiquette is a combination of the words, “net” (from internet) and
“etiquette”(netiquette).
Many websites and organizations have created their own list of netiquettes for
kids, teens, and even parents for them to be able to protect their children.
The ones given on the left are general rules or netiquettes when using the
internet.
Online Search and Research Skills
Since the web is a maze of connected data and information, you may not be
able to really get the best out of it when searching. Search engines, on the other
hand, have their own systems of giving you their best results. But this can be
solve by helping the computer in searching by using advanced techniques in
information gathering. Just take note, most techniques will best suit with
Google search engine.
1. Choose your web browser based on the best search engine for you.
2. Use punctuation and Boolean Operators (AND, OR, NOT).
3. Filter results by setting the range of time it was searched.
4. Use truncations (*, !, ?, and $).
5. Limit your search to specifics.
6. Use quotation marks for specific phrases.
7. Use the Advanced Search button to refine the search.
8. Use Browser history.
9. Read and spell – check.
Improving Your Research Skills Online
1. Know your sources. Make sure to find the most reliable information which can be found in multiple
sources or, better, have the original source.
2. Use your web browser properly. Know the capabilities of your preferred browser to help make sure your
search faster and easier.
3. Organize your bookmarks. Use your browser’s bookmark manager to organize the links you have
marked. If possible, create folders and subfolders.
4. Learn to use search techniques. Practice using advanced search techniques which are readily available on
Google for instance
5. Follow the web. Follow the wave of information in the web. Just make sure to read and be critical in
every link or page you click
Looking Forward… E –commerce
The Philippines is now considered as one of the countries in Asia Pacific that
consumes more than 3 hours on the web. Users are mostly the younger generation,
and social media is the most popular platform being visited. An article features the
positive responses of the young Filipinos toward e-commerce. It was mentioned in the
article (79%) mostly discuss products and services while staying online. Even though
most netizens are knowledgeable of the different online stores, many are still afraid to
make purchases due to credibility issues. Another article also featured the
opportunities and challenges facing e-commerce in the country. It was mentioned that
social networking still dominates the activities dine by most netizens. Despite the
situation, the rise of e-commerce websites are still growing and promising.
E-commerce has the following advantages to organizations, to consumers, and
to society
1. It allows expansion of market and competition.
2. It provides more choices or customers.
3. It enables easy access to products to rural areas.
Concepts at a Glance
1. Information and communications technology (ICT) refers to all technology that is used to handle
telecommunication and access information.
2. Most common mobile communication technologies include Wi-Fi, Bluetooth, 3G, 4G, GPRS, dial-
app, and virtual private networks.
3. Emerging technologies, not only in ICT, include artificial intelligence, robotics, biometrics, quantum
cryptogrophy, computer-assisted translation, 3D imaging and holography, and virtual reality.
4. An online platform is a group of technologies used to develop different online applications.
5. Common online platforms include social media platforms, e-commerce
platforms, online learning platforms, and online video platforms.
6. Online ethics are the acceptable use of online resources in an online
environment.
7. Netiquettes are the guidelines of acceptable behavior of the person while
using the internet resources.
8. Online search skills can be improved using the different advanced search
techniques.

More Related Content

Similar to DIWAN2 HUMSS 11 A.pptx

REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxEhraicaSaquing
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxDineLiwan
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxLiberty Aquino
 
Lesson-1-Introduction-and Current-Situation-of-ICT.pptx
Lesson-1-Introduction-and Current-Situation-of-ICT.pptxLesson-1-Introduction-and Current-Situation-of-ICT.pptx
Lesson-1-Introduction-and Current-Situation-of-ICT.pptxjjjaca
 
The-Current-State-of-ICT-Empowerment Technology.pptx
The-Current-State-of-ICT-Empowerment Technology.pptxThe-Current-State-of-ICT-Empowerment Technology.pptx
The-Current-State-of-ICT-Empowerment Technology.pptxMarieChileMutia
 
Computer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdfComputer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdfmt5854804210
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxsittiepalao
 
Knowledge management for professionals
Knowledge management for professionalsKnowledge management for professionals
Knowledge management for professionalsEsteban Romero Frías
 
Ashford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docx
Ashford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docxAshford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docx
Ashford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docxdavezstarr61655
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technologyJohan Koren
 
Reliability_Undesirability
Reliability_UndesirabilityReliability_Undesirability
Reliability_UndesirabilityMohamed Omar
 
Setareh Gerashi 9 B
Setareh Gerashi 9 BSetareh Gerashi 9 B
Setareh Gerashi 9 Bjboulanger
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1alicelagajino
 
Lesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety OnlineLesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety Onlinessuser9cd7f3
 

Similar to DIWAN2 HUMSS 11 A.pptx (20)

REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
 
ICT.pptx
ICT.pptxICT.pptx
ICT.pptx
 
Lesson-1-Introduction-and Current-Situation-of-ICT.pptx
Lesson-1-Introduction-and Current-Situation-of-ICT.pptxLesson-1-Introduction-and Current-Situation-of-ICT.pptx
Lesson-1-Introduction-and Current-Situation-of-ICT.pptx
 
The-Current-State-of-ICT-Empowerment Technology.pptx
The-Current-State-of-ICT-Empowerment Technology.pptxThe-Current-State-of-ICT-Empowerment Technology.pptx
The-Current-State-of-ICT-Empowerment Technology.pptx
 
Computer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdfComputer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdf
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptx
 
Knowledge management for professionals
Knowledge management for professionalsKnowledge management for professionals
Knowledge management for professionals
 
Ashford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docx
Ashford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docxAshford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docx
Ashford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docx
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Reliability_Undesirability
Reliability_UndesirabilityReliability_Undesirability
Reliability_Undesirability
 
Setareh Gerashi 9 B
Setareh Gerashi 9 BSetareh Gerashi 9 B
Setareh Gerashi 9 B
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1
 
Lesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety OnlineLesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety Online
 

More from JoshuaCasas7

Intro to Publisher.ppt
Intro to Publisher.pptIntro to Publisher.ppt
Intro to Publisher.pptJoshuaCasas7
 
Intro to Publisher.ppt
Intro to Publisher.pptIntro to Publisher.ppt
Intro to Publisher.pptJoshuaCasas7
 
Microsoft excel lessons FINAL GRADE 8 edited and final one.pptx
Microsoft excel lessons FINAL GRADE 8 edited and final one.pptxMicrosoft excel lessons FINAL GRADE 8 edited and final one.pptx
Microsoft excel lessons FINAL GRADE 8 edited and final one.pptxJoshuaCasas7
 
Correlations and Scatterplots MS Excel Lesson 2 Grade 8.ppt
Correlations and Scatterplots MS Excel Lesson 2 Grade 8.pptCorrelations and Scatterplots MS Excel Lesson 2 Grade 8.ppt
Correlations and Scatterplots MS Excel Lesson 2 Grade 8.pptJoshuaCasas7
 
EDUCATIONAL SOCIOLOGY2023.pptx
EDUCATIONAL SOCIOLOGY2023.pptxEDUCATIONAL SOCIOLOGY2023.pptx
EDUCATIONAL SOCIOLOGY2023.pptxJoshuaCasas7
 
microsoft excel february 2, 2020 (2).pptx [Autosaved].pptx
microsoft excel february 2, 2020 (2).pptx [Autosaved].pptxmicrosoft excel february 2, 2020 (2).pptx [Autosaved].pptx
microsoft excel february 2, 2020 (2).pptx [Autosaved].pptxJoshuaCasas7
 

More from JoshuaCasas7 (6)

Intro to Publisher.ppt
Intro to Publisher.pptIntro to Publisher.ppt
Intro to Publisher.ppt
 
Intro to Publisher.ppt
Intro to Publisher.pptIntro to Publisher.ppt
Intro to Publisher.ppt
 
Microsoft excel lessons FINAL GRADE 8 edited and final one.pptx
Microsoft excel lessons FINAL GRADE 8 edited and final one.pptxMicrosoft excel lessons FINAL GRADE 8 edited and final one.pptx
Microsoft excel lessons FINAL GRADE 8 edited and final one.pptx
 
Correlations and Scatterplots MS Excel Lesson 2 Grade 8.ppt
Correlations and Scatterplots MS Excel Lesson 2 Grade 8.pptCorrelations and Scatterplots MS Excel Lesson 2 Grade 8.ppt
Correlations and Scatterplots MS Excel Lesson 2 Grade 8.ppt
 
EDUCATIONAL SOCIOLOGY2023.pptx
EDUCATIONAL SOCIOLOGY2023.pptxEDUCATIONAL SOCIOLOGY2023.pptx
EDUCATIONAL SOCIOLOGY2023.pptx
 
microsoft excel february 2, 2020 (2).pptx [Autosaved].pptx
microsoft excel february 2, 2020 (2).pptx [Autosaved].pptxmicrosoft excel february 2, 2020 (2).pptx [Autosaved].pptx
microsoft excel february 2, 2020 (2).pptx [Autosaved].pptx
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

DIWAN2 HUMSS 11 A.pptx

  • 2. Online Safety and Security, Ethics and Netiquette • The introduction of the World Wide Web (WWW) and internet has made great breakthroughs in the field of information sharing and communication. It helped connect people miles away from each other. However, these advances carried drawbacks wherein the issue of safety, security, and ethics of the consumers are compromised.
  • 3. Common issues and crimes on the internet are the following: 1. Cyberbullying 2. Hacking 3. Identity theft 4. Plagiarism 5. Intellectual property rights and copyright issues
  • 4. These issues caused the formulation of the rule and regulation to be followed when using the internet. Since the internet, especially social media, allows you to post everything everyday, some personal information might be given to or seen by unknown people. Online safety and security defines how you are going to keep yourself safe while surfing the web
  • 5. Online Ethics and Netiquette Online ethics focuses on the acceptable use of online resources in an online environment. Netiquette, on the other hand, focuses on the acceptable behavior of the person while using the internet resource. Netiquette is a combination of the words, “net” (from internet) and “etiquette”(netiquette). Many websites and organizations have created their own list of netiquettes for kids, teens, and even parents for them to be able to protect their children.
  • 6. The ones given on the left are general rules or netiquettes when using the internet.
  • 7. Online Search and Research Skills Since the web is a maze of connected data and information, you may not be able to really get the best out of it when searching. Search engines, on the other hand, have their own systems of giving you their best results. But this can be solve by helping the computer in searching by using advanced techniques in information gathering. Just take note, most techniques will best suit with Google search engine.
  • 8. 1. Choose your web browser based on the best search engine for you. 2. Use punctuation and Boolean Operators (AND, OR, NOT). 3. Filter results by setting the range of time it was searched. 4. Use truncations (*, !, ?, and $). 5. Limit your search to specifics. 6. Use quotation marks for specific phrases. 7. Use the Advanced Search button to refine the search. 8. Use Browser history. 9. Read and spell – check.
  • 9. Improving Your Research Skills Online 1. Know your sources. Make sure to find the most reliable information which can be found in multiple sources or, better, have the original source. 2. Use your web browser properly. Know the capabilities of your preferred browser to help make sure your search faster and easier. 3. Organize your bookmarks. Use your browser’s bookmark manager to organize the links you have marked. If possible, create folders and subfolders. 4. Learn to use search techniques. Practice using advanced search techniques which are readily available on Google for instance 5. Follow the web. Follow the wave of information in the web. Just make sure to read and be critical in every link or page you click
  • 10. Looking Forward… E –commerce The Philippines is now considered as one of the countries in Asia Pacific that consumes more than 3 hours on the web. Users are mostly the younger generation, and social media is the most popular platform being visited. An article features the positive responses of the young Filipinos toward e-commerce. It was mentioned in the article (79%) mostly discuss products and services while staying online. Even though most netizens are knowledgeable of the different online stores, many are still afraid to make purchases due to credibility issues. Another article also featured the opportunities and challenges facing e-commerce in the country. It was mentioned that social networking still dominates the activities dine by most netizens. Despite the situation, the rise of e-commerce websites are still growing and promising.
  • 11. E-commerce has the following advantages to organizations, to consumers, and to society 1. It allows expansion of market and competition. 2. It provides more choices or customers. 3. It enables easy access to products to rural areas.
  • 12. Concepts at a Glance 1. Information and communications technology (ICT) refers to all technology that is used to handle telecommunication and access information. 2. Most common mobile communication technologies include Wi-Fi, Bluetooth, 3G, 4G, GPRS, dial- app, and virtual private networks. 3. Emerging technologies, not only in ICT, include artificial intelligence, robotics, biometrics, quantum cryptogrophy, computer-assisted translation, 3D imaging and holography, and virtual reality. 4. An online platform is a group of technologies used to develop different online applications.
  • 13. 5. Common online platforms include social media platforms, e-commerce platforms, online learning platforms, and online video platforms. 6. Online ethics are the acceptable use of online resources in an online environment. 7. Netiquettes are the guidelines of acceptable behavior of the person while using the internet resources. 8. Online search skills can be improved using the different advanced search techniques.