7. As our society faces the ‘new normal’, most of our
daily tasks now need the assistance of Information
and Communication Technologies. Thanks to the
internet,
because we can now meet and communicate with
each other online. Paying bills, buying goods, growing
your network of friends and even learning can be
done online.
Life now is almost turning to digital media. According
to (Preston n.d.), digital media is any form of media
that uses electronic devices for distribution. This form
of media can be created, viewed, modified and
distributed via electronic devices.
8. • And it is very important that you not only know how to use and deal
with these technologies but it is necessary to know the different
threats brought by the internet and be equipped on how to keep your
private information safe and secure online.
• Private information is your sensitive personal information or your
identity such as your online safety or web safety or internet safety. It is
also necessary to apply ethics and etiquette online to avoid problems
in facing digital media.
9. • username and passwords or bank accounts. Even though the
government has
• already set a policy, the Republic Act 10173 or the Data Privacy
Act of 2012, that
• is to protect the fundamental human right of privacy, of
communication while
• ensuring free flow of information to promote innovation and
growth (Republic Act
• 10173 – Data Privacy Act of 2012 n.d.), it is important to have
the knowledge of
• maximizing your private information in order to keep it safe
and secure is called
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22. Some of the internet threats you need to be aware of:
23.
24.
25.
26. • Pharming - is a scamming practice in which malicious
code is installed on a personal computer or server,
misdirecting users to fraudulent Web sites without their
knowledge or consent.
• This happened when the code sent in an e-mail
modifies local host files on a personal computer. A
computer with a compromised host file will go to the
fake Web site even if a user types in the correct
Internet address or clicks on an affected bookmark
entry.
27.
28. Email Scam/Junk Mail/Spam Mail - Usually
unsolicited commercial email sent from an unknown
source with identical message sent to multiple
recipients. Usually not dangerous but can be time
and space consuming. Dangerous ones can carry
viruses and other malicious software or malware.
29. • Email Spoofing - is the creation of emails with a forged
sender address. The goal of email spoofing is to get
recipients to open, respond and engage with the email
message.
Email spoofing can greatly increase the effectiveness of
phishing and other email-based cyber-attacks by tricking
the recipient into trusting the email and its sender
(Tunggal 2019). It is usually used by spammers to hide
the origin of the spam.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43. • Cyberstalking – is the same as physical stalking by
giving unwanted obsessive attention to a specific
person like following secret surveillance, persistent
and manipulative calling and texting, and other
means of approaching the victim unexpectedly but
cyber stalkers rely on online technology to do it.
Email, social networks, instant messaging, personal
data available online –everything on the Internet can
be used by cyberstalkers to make inappropriate
contact with their victims.
44.
45. • Cyberbullying - is bullying that takes place over digital
devices like cell phones, computers, and tablets. It
can occur through SMS, Text, and apps, or online in
social media, forums, or gaming where people can
view, participate in, or share content.
• It includes sending, posting, or sharing negative,
harmful, false, or mean content about someone else
like sharing personal or private information causing
embarrassment or humiliation.
• Some cyberbullying crosses the line into unlawful or
criminal behavior
46.
47. Online Predation - is the act of engaging an underage
minor into inappropriate sexual relationships through
the internet.
Online predators may attempt to initiate and seduce
minors into relationships through the use of chat rooms
or internet forums.
Online predators may try to lure kids and teens into
sexual conversations or even face-to-face meetings.
Predators will sometimes send obscene material or
request that kids send pictures of themselves.
48. • Flaming - is the act of saying mean things online,
usually in ALL CAPS, and often in a public forum
with the intention to humiliate.
49. • Online Ethics and Etiquette In order for you to be
safe and you can protect your private
information while you are working online, you
need to know and apply online ethics and
etiquette.
• Online ethics focuses on the acceptable use of
online resources in an online social environment.
Netiquette is a combination of the words network
and netiquetteand is defined as a set of rules for
acceptable online behaviour
50. 10 Basic Rules of Netiquette
The rules of etiquette are just as important in cyberspace as
they are in the real world (Hartney 2020)
1. Make Real People a Priority - If you are talking personally
and face to face with someone, stop browsing or chatting
with anybody else in your cellphone.
2. Use Respectful Language - Avoid name-calling, cursing,
expressing deliberately offensive opinions. In typing, don't
use caps lock. Text in all caps is generally perceived as yelling
or flaming which cause misunderstanding and trouble.
Please don't forget to say please and thank you as
appropriate.
51. • 3. Share With Discretion - Avoid sending naked sexy
pictures, drunk pictures, drug use pictures or unedited
home video. If you would have a problem with your
boss, your parents, or your kids seeing it now, or at any
point in the future, don't post it online. Children
should not post private information online. Do not also
share your location or picture where you are currently
at. Keep your personal information private.
• 4. Don't Exclude Others - Don’t let others feel that they
are the one you are talking to in your obscure
comment to your Facebook status, forum or Instagram
story. And if you have an in-joke to share with one
other person, or a small number of people in a larger
online group, send them a private message.
52. 5. Choose Friends Wisely- It is insulting to be
dropped from someone's friend list on a social
media site. So, think about it before sending a friend
request or accepting an invitation.
• If you don't want to be in touch with someone,
don't add them in the first place.
• This must be observed by kids or teens so they will
not be a victim of online predation.
• People sometimes are good in pretending just to
get your attention or use fake accounts.
53. 6. Respect People's Privacy - One example is when you
send email to multiple recipients, don’t send it at once,
you can send it privately individually or use BCC (blind
carbon copy) rather than CC (carbon copy). The same
goes for uploading photos or videos that include other
people because others who are in this photo don’t
want to be viewed by unknown friends.
• This also applies for tagging people on Facebook
because others don’t want to be tagged. Another
example is don't sign up for newsletters and other
communications using someone else's email address.
If you apply this rule, hackers might not have chance
to enter and ruin your digital life.
54. • 7. Fact Check Before Reposting - If you aren't sure of
the facts that you’re going to repost, email it to
someone who does know or can find out. Or do a
search on Google or snopes.com. Because once
you’ve reposted a fake news or false facts, many can
possibly believe it and spread once again.
• Don't forget also that many viruses are circulated via
chain letters and invitations. So forwarding or
reposting this kind of messages will not bring good
luck but rather bad luck.
• Don’t forget to cite the owner of the post or where it
came from. And before posting, check whether it is
appropriate or inappropriate to others.
55. • 8. Respond to Emails Promptly
• In doing this, you can easily check whether the
emails you received are spams, unsolicited messages
or crafty stuffs and delete these right away. But if
you send your email to your friends or set it as public,
then you need to respond immediately. But double-
check where it really came because there are people
who are fond of playing or making fake emails just to
get in touch with you.
56. • 9. Update Online Information
• Don't leave inaccurate information online that will
mislead your friends or your customers if you have
an online business. If you have a business website,
update it regularly. Like your operating hours, if you
are not available for that time, change it right away.
57. 10. Think before Click
Don’t hesitate to think before clicking because you
might click an unknown links or files that are likely to
contain malware which will infect your devices or a
link to hacker’s website. Think before clicking Like in
social media posts because it might be a suicide post
that will end to death because you liked his suicidal
post.
Editor's Notes
As our society faces the ‘new normal’, most of our daily tasks now need the
assistance of Information and Communication Technologies. Thanks to the internet,
because we can now meet and communicate with each other online. Paying bills,
buying goods, growing your network of friends and even learning can be done online.
Life now is almost turning to digital media. According to (Preston n.d.), digital media
is any form of media that uses electronic devices for distribution. This form of media
can be created, viewed, modified and distributed via electronic devices. And it is very
important that you not only know how to use and deal with these technologies but it
is necessary to know the different threats brought by the internet and be equipped
on how to keep your private information safe and secure online. Private
information is your sensitive personal information or your identity such as your
username and passwords or bank accounts. Even though the government has
already set a policy, the Republic Act 10173 or the Data Privacy Act of 2012, that
is to protect the fundamental human right of privacy, of communication while
ensuring free flow of information to promote innovation and growth (Republic Act
10173 – Data Privacy Act of 2012 n.d.), it is important to have the knowledge of
maximizing your private information in order to keep it safe and secure is called
online safety or web safety or internet safety. It is also necessary to apply ethics
and etiquette online to avoid problems in facing digital media.