4. republic act no. 10175
Cybercrime prevention of 2012
Is a law in the Philippines approved on September 12, 2012, which aims to
address legal issues concerning online interactions and the Internet.
Among the cybercrime offenses included in the bill are cybersquatting,
cybersex, child pornography, identity theft, illegal access to data and
libel.
7. cyberspace
refers to the virtual computer, and world
specifically, it is an electronic used to form
a global computer network to facilitate
communication
9. cyberbullying
the use of electronic communication to
bully a person, typically by sending of an
intimidating or threatening nature.
10. hacking
refers to the practice of modifying or
altering computer and hardware to
accomplish a goal that is considered to be
outside of the creator's original objective.
those individuals who engage in computer
activities are referred to as "hackers".
11. phishing
is the attempt to obtain sensitive such as
usernames, passwords, and credit card
details, often for malicious reasons by
disguising as a trustworthy entity in a
electronic communication.
14. identity theft
is the delibrate use of someone else's identity, usually
as a method to gain a financial advantage or obtain
credit and other benefit in the other person's name,
and perhaps to other person's disadvantages or loss
15. cyber defamation
is an unprivileged false statement of fact
which tenda to harm the reputation of a
person or company.
2 types of cyber defamation
1. libel-written
2. slander-verbal
16. cybersex
also called computer sex, internet sex, netsex
is a virtual sex encounter in which two or more people
(connected via internet) send each other sexually
explicit content or sexually explicit act.
18. cybersquatting
is registering, trafficking in, or using an
internet domain name with bad faith
intent to profit from the goodwill of a
trademark belonging to someone else.
19. plagiarism
an act or instance of using or closely
imitating the language and thoughts of
another person without authorization; the
representation of that autho 's work as one's
, as by not's crediting the originak author
20. 2 types of plagiarism
"Sources Not Cited"
1. The Ghost Writer-The writer turns in another's work, word-for-word, as his or her own.
2. The Photocopy- The writer copies significant portions of text straight from a single source,
without alteration.
3. The Potluck Paper- The writer copies from different sources and alters the sentences to
make them fit together while retaining most of the original phrasing.
4. The Poor Disguise- The writer has altered the paper's appearance slightly by changing
keywords and phrases.
5. The Labor of Laziness - The writer takes the time to paraphrase most
of the paper from other sources and make it all fit together.
6. The Self-Stealer- The writer "borrows" generously from his or her previous work.
21. 2 types of plagiarism
"sources Not Cited (But still plagiarized)"
1. The Forgotten Footnote - The writer mentions an author's name for a source,
but neglects to include specific information on the location of the material
referenced.
2. The Misinformer - The writer provides inaccurate information regarding the sources, making
it impossible to find them.
3. The Too-Perfect Paraphrase - The writer properly cites a source but neglects to put in
quotation marks on a text that has been copied word-for-word, or close to it.
4. The Resourceful Citer- The writer properly cites all sources, paraphrasing, and using
quotations appropriately. The catch? The paper contains almost no original work!
22. fair use
is a legal concept that allows the reproduction of
copyrighted material for certain purposes without
obtaining permission and without paying a fee. Purposes
permitting the application of fair use generally include
review, news reporting, teaching, or scholarly research.
23. computer addiction
the excessive use of computers to the extent that it
interferes with daily life. This excessive use may for
example interfere with work or sleep, result in
problems with social interaction, or affect mood,
relationships and thought processes.
24. digital divide
an economic inequality between groups in terms of
access to, use of, or knowledge of ICT. The divide within
countries can refer to inequalities between
individuals, households, businesses, and geographic
areas at different socioeconomic (and other
demographic) levels
26. intellectual property (Ip)
refers to creations of the mind, such as
inventions; literary and artistic
works designs and symbols, names, and
images used in commerce
27. copyright
types of intellectual property
a legal device that gives the creator of a literary, artistic,
musical, or other creative work the sole right to publish and
sell that work.
Copyright owners have the right to control the reproduction
of their work, including the right to receive payment for that
reproduction.
Violation of a copyright is called infringement.
29. 10 rules of netiquette
Rule 1: Remember the Human
Rule 2: Adhere to the same standards behavior
online that you follow in real life of
Rule 3: Know where you are in cyberspace
Rule 4: Respect other people's time and bandwidth
Rule 5: Make yourself look good online
30. 10 rules of netiquette
Rule 6: Share expert knowledge
Rule 7: Help keep flame wars under control
Rule 8: Respect other people's privacy
Rule 9: Don't abuse your power
Rule 10: Be forgiving of other people's
mistakes