SlideShare a Scribd company logo
1 of 40
Download to read offline
WEEK 3: INTERNET SAFETY,
SECURITY AND RULES OF
NETIQUETTE
OBJECTIVE
Define modern times in the
internet application
Adapt proper computer ethics in
using computers
Discuss online security and safety
Discuss Copyright and Intellectual
property rights
Contextualized online searching
skills
The Internet, truly, is a powerful tool. It can be used
to promote your business, gain new friends, and stay
in touch with the old ones.
It is also a source of entertainment. But like most
things in this world, there is always “another side of
the coin.” The Internet is one of the most dangerous
places, especially if you do not know what you are
doing.
THE INTERNET
What is
Internet?
The Internet is a network or system
that connects millions of computers
worldwide
Invention of the
Internet
In the 1960s, the United States
government, businesses, and
colleges collaborated to develop
a system that would allow
computers across the country to
share information
In 1969, they developed
ARPANET, an early form of the
Internet
Electronic mail, or e-mail, was
invented in 1971 as a method of
sending a message from one
computer to another
Invention of the
Internet
A hypertext link connects
different parts of an electronic
document or different documents
Hypertext was invented in 1989 The World Wide Web, or "the
Web," was created in the early
1990s on the basis of hypertext
The Internet, truly, is a powerful tool. It can be used
to promote your business, gain new friends, and stay
in touch with the old ones.
It is also a source of entertainment. But like most
things in this world, there is always “another side of
the coin.” The Internet is one of the most dangerous
places, especially if you do not know what you are
doing.
THE INTERNET
INFORMATION YOU MUST LIMIT TO SHARE
ONLINE
PERSONAL | CONTACT | EDUCATION | FINANCIAL & LOCATION
NETIQUETTE
"Netiquette" is a term derived from the combination of "internet" and
"etiquette." It refers to the set of rules and guidelines for proper
behavior and communication when interacting online. Netiquette helps
create a positive and respectful digital environment, fostering
effective and courteous communication among internet users.
Virginia Shea authored the book "Netiquette," which is
considered a seminal work on internet etiquette. Published in
1994, the book outlines guidelines for proper behavior and
communication on the internet.
NETIQUETTE
“10 COMMANDMENTS OF NETIQUETTE”
THE CORE RULES OF NETIQUETTE FROM THE BOOK OF
NETIQUETTE BY VIRGINIA SHEA
RULE NO. 1:
REMEMBER THE
HUMAN
•You need to remember that you are
talking to a real person when you are
online.
•The internet brings people together who
would otherwise never meet.
•Remember this saying when sending an
email: “Would I say this to the person’s
face.”
RULE NO. 2:
ADHERE TO THE SAME
STANDARDS ONLINE
THAT YOU FOLLOW IN
REAL LIFE.
•You need to behave the same way
online that you do in real life.
•You need to remember that you
can get caught doing things you
should not be doing online just like
you can in real life.
•You are still talking to a real
person with feelings even though
you can’t see them.
RULE NO. 3:
KNOW WHERE YOU ARE
IN CYBERSPACE
•Always take a look around when
you enter a new domain when
surfing the web.
•Get a sense of what the discussion
group is about before you join it.
RULE NO. 4:
RESPECT OTHER
PEOPLE’S TIME AND
BANDWIDTH
•Remember people have other things
to do besides read your email.
•You are not the center of their
world.
•Keep your post and emails to
minimum by saying what you want to
say.
•Remember everyone won’t answer
your questions.
RULE NO. 5:
MAKE YOURSELF LOOK GOOD
ONLINE
•Be polite and pleasant
to everyone.
•Always check your
spelling and grammar
before posting.
•Know what you are
talking about and make
sense saying it.
RULE NO. 6:
SHARE EXPERT
KNOWLEDGE
•Ask questions online
•Share what you know
online.
•Post the answers to
your questions online
because someone may
have the same question
you do.
RULE NO. 7:
HELP KEEP FLAME WARS UNDER CONTROL
•Netiquette does not forgive flaming.
•Netiquette does however forbid people
who are flaming to hurt discussion groups
by putting the group down.
RULE NO. 8:
RESPECT OTHER
PEOPLE’S PRIVACY
•Do not read other people’s
mail without their permission.
•Going through other people’s
things could cost you, your
job or you could even go to
jail.
•Not respecting other
people’s privacy is a bad
netiquette.
RULE NO. 9:
DONT ABUSE YOUR
POWER
•Do not take advantage of
other people just because you
have more knowledge or power
than them.
•Treat others as you would
want them to treat you if the
roles were reversed.
RULE NO. 10:
BE FORGIVING OF
OTHER PEOPLE'S
MISTAKE
•Do not point out mistakes to
people online.
•Remember that you were once
the new kid on the block.
•You still need to have a good
manners even though you are
online and cannot see the
person face to face.
INTERNET
SAFETY
INTERNET THREATS
Internet threats, also known as
cybersecurity threats, refer to
various risks and malicious
activities that can compromise
the security and integrity of
information, systems, and
networks connected to the
internet.
VIRUS
A piece of code that is capable of
corrupting the file system or destroy
data
MALWARE
Malware is an umbrella word for any sort
of malicious software that is intended to
harm or exploit any programmable
device, service, or network.
One type of malware
Must be triggered by a user
Self-replicating
Terms for malicious software
Any malicious code
Harms devices and steal data
All viruses are malware
but not all types of
malware are viruses.
INTELLECTUAL
PROPERTY RIGHTS
Intellectual property (IP) is a category of
property that includes intangible
creations of the human intellect. There are
many types of intellectual property, and
some countries recognize more than
others. The most well-known types are
copyrights, patents, trademarks, and
trade secrets.
4 TYPES OF INTELLECTUAL PROPERTY
PATENT

Utility patent-It protects a process,
manufacture, composition of matter, and a
useful machine. Design patent-It protects
the shape, appearance, pattern design,
layout, and looks of a product. The
protection is granted for a limited period,
generally 20 years from the filing date of the
application.
TRADE SECRET

A trade secret is any valuable information that
is not publicly known (a well guarded secret)
e.g. ingredients used in their food products,
business methods, customer data. Trade
secret protection is not limited in time
(patents last in general for up to 20 years). It
may continue indefinitely as long as the
secret is not revealed to the public;
TRADE MARK

A trademark offers legal protection for
logo, design, symbol, phrase,
wordmarks, or a combination of those
that represents a source of goods or
services. The term of trademark
registration can vary but it is usually
ten years. It can be renewed
indefinitely on payment of additional
fees.
COPYRIGHT

Copyright protects the original work of
authorship. Such works are literature,
drawings, paintings, songs, music,
computer software, films, photos, web
content. The time limit should be equal
to or longer than 50 years after the
creator’s death. Longer periods of
protection may however be provided
at the national level.
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf

More Related Content

Similar to W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf

Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104Marvin Broñoso
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfMelchorTolentino2
 
Netiquette Wiki Presentation
Netiquette Wiki Presentation Netiquette Wiki Presentation
Netiquette Wiki Presentation shoetzlein
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Perempuan dan Kesalihan Digital
Perempuan dan Kesalihan DigitalPerempuan dan Kesalihan Digital
Perempuan dan Kesalihan DigitalIsmail Fahmi
 
Lesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety OnlineLesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety Onlinessuser9cd7f3
 
Responsible Digital Citizenship
Responsible Digital CitizenshipResponsible Digital Citizenship
Responsible Digital CitizenshipAlex Noudelman
 
CAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internetCAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internetHendrixAntonniAmante
 
Respect%20 yourself/Respect Others
Respect%20 yourself/Respect OthersRespect%20 yourself/Respect Others
Respect%20 yourself/Respect Othersnealbd
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptxreport_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptxprincesskatemannag14
 
Rules of Netiquette.pptx
Rules of Netiquette.pptxRules of Netiquette.pptx
Rules of Netiquette.pptxPaulineMae5
 
Media and Information Literacy Netiquette
Media and Information Literacy NetiquetteMedia and Information Literacy Netiquette
Media and Information Literacy NetiquetteJPAballe
 

Similar to W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf (20)

Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104
 
Netiquette
NetiquetteNetiquette
Netiquette
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdf
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Netiquette Wiki Presentation
Netiquette Wiki Presentation Netiquette Wiki Presentation
Netiquette Wiki Presentation
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Netiquettes.pptx
Netiquettes.pptxNetiquettes.pptx
Netiquettes.pptx
 
Perempuan dan Kesalihan Digital
Perempuan dan Kesalihan DigitalPerempuan dan Kesalihan Digital
Perempuan dan Kesalihan Digital
 
Lesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety OnlineLesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety Online
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Netiquette mine
Netiquette mineNetiquette mine
Netiquette mine
 
MIL WEEK 8.pptx
MIL WEEK 8.pptxMIL WEEK 8.pptx
MIL WEEK 8.pptx
 
Responsible Digital Citizenship
Responsible Digital CitizenshipResponsible Digital Citizenship
Responsible Digital Citizenship
 
CAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internetCAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internet
 
Respect%20 yourself/Respect Others
Respect%20 yourself/Respect OthersRespect%20 yourself/Respect Others
Respect%20 yourself/Respect Others
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptxreport_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
 
Rules of Netiquette.pptx
Rules of Netiquette.pptxRules of Netiquette.pptx
Rules of Netiquette.pptx
 
Media and Information Literacy Netiquette
Media and Information Literacy NetiquetteMedia and Information Literacy Netiquette
Media and Information Literacy Netiquette
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf

  • 1. WEEK 3: INTERNET SAFETY, SECURITY AND RULES OF NETIQUETTE
  • 2. OBJECTIVE Define modern times in the internet application Adapt proper computer ethics in using computers Discuss online security and safety Discuss Copyright and Intellectual property rights Contextualized online searching skills
  • 3. The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with the old ones. It is also a source of entertainment. But like most things in this world, there is always “another side of the coin.” The Internet is one of the most dangerous places, especially if you do not know what you are doing. THE INTERNET
  • 4. What is Internet? The Internet is a network or system that connects millions of computers worldwide
  • 5. Invention of the Internet In the 1960s, the United States government, businesses, and colleges collaborated to develop a system that would allow computers across the country to share information In 1969, they developed ARPANET, an early form of the Internet Electronic mail, or e-mail, was invented in 1971 as a method of sending a message from one computer to another
  • 6. Invention of the Internet A hypertext link connects different parts of an electronic document or different documents Hypertext was invented in 1989 The World Wide Web, or "the Web," was created in the early 1990s on the basis of hypertext
  • 7. The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with the old ones. It is also a source of entertainment. But like most things in this world, there is always “another side of the coin.” The Internet is one of the most dangerous places, especially if you do not know what you are doing. THE INTERNET
  • 8. INFORMATION YOU MUST LIMIT TO SHARE ONLINE PERSONAL | CONTACT | EDUCATION | FINANCIAL & LOCATION
  • 9. NETIQUETTE "Netiquette" is a term derived from the combination of "internet" and "etiquette." It refers to the set of rules and guidelines for proper behavior and communication when interacting online. Netiquette helps create a positive and respectful digital environment, fostering effective and courteous communication among internet users. Virginia Shea authored the book "Netiquette," which is considered a seminal work on internet etiquette. Published in 1994, the book outlines guidelines for proper behavior and communication on the internet. NETIQUETTE
  • 10. “10 COMMANDMENTS OF NETIQUETTE” THE CORE RULES OF NETIQUETTE FROM THE BOOK OF NETIQUETTE BY VIRGINIA SHEA
  • 11. RULE NO. 1: REMEMBER THE HUMAN •You need to remember that you are talking to a real person when you are online. •The internet brings people together who would otherwise never meet. •Remember this saying when sending an email: “Would I say this to the person’s face.”
  • 12. RULE NO. 2: ADHERE TO THE SAME STANDARDS ONLINE THAT YOU FOLLOW IN REAL LIFE. •You need to behave the same way online that you do in real life. •You need to remember that you can get caught doing things you should not be doing online just like you can in real life. •You are still talking to a real person with feelings even though you can’t see them.
  • 13. RULE NO. 3: KNOW WHERE YOU ARE IN CYBERSPACE •Always take a look around when you enter a new domain when surfing the web. •Get a sense of what the discussion group is about before you join it.
  • 14. RULE NO. 4: RESPECT OTHER PEOPLE’S TIME AND BANDWIDTH •Remember people have other things to do besides read your email. •You are not the center of their world. •Keep your post and emails to minimum by saying what you want to say. •Remember everyone won’t answer your questions.
  • 15. RULE NO. 5: MAKE YOURSELF LOOK GOOD ONLINE •Be polite and pleasant to everyone. •Always check your spelling and grammar before posting. •Know what you are talking about and make sense saying it.
  • 16. RULE NO. 6: SHARE EXPERT KNOWLEDGE •Ask questions online •Share what you know online. •Post the answers to your questions online because someone may have the same question you do.
  • 17. RULE NO. 7: HELP KEEP FLAME WARS UNDER CONTROL •Netiquette does not forgive flaming. •Netiquette does however forbid people who are flaming to hurt discussion groups by putting the group down.
  • 18. RULE NO. 8: RESPECT OTHER PEOPLE’S PRIVACY •Do not read other people’s mail without their permission. •Going through other people’s things could cost you, your job or you could even go to jail. •Not respecting other people’s privacy is a bad netiquette.
  • 19. RULE NO. 9: DONT ABUSE YOUR POWER •Do not take advantage of other people just because you have more knowledge or power than them. •Treat others as you would want them to treat you if the roles were reversed.
  • 20. RULE NO. 10: BE FORGIVING OF OTHER PEOPLE'S MISTAKE •Do not point out mistakes to people online. •Remember that you were once the new kid on the block. •You still need to have a good manners even though you are online and cannot see the person face to face.
  • 21. INTERNET SAFETY INTERNET THREATS Internet threats, also known as cybersecurity threats, refer to various risks and malicious activities that can compromise the security and integrity of information, systems, and networks connected to the internet.
  • 22. VIRUS A piece of code that is capable of corrupting the file system or destroy data MALWARE Malware is an umbrella word for any sort of malicious software that is intended to harm or exploit any programmable device, service, or network. One type of malware Must be triggered by a user Self-replicating Terms for malicious software Any malicious code Harms devices and steal data All viruses are malware but not all types of malware are viruses.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27. INTELLECTUAL PROPERTY RIGHTS Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others. The most well-known types are copyrights, patents, trademarks, and trade secrets.
  • 28. 4 TYPES OF INTELLECTUAL PROPERTY PATENT  Utility patent-It protects a process, manufacture, composition of matter, and a useful machine. Design patent-It protects the shape, appearance, pattern design, layout, and looks of a product. The protection is granted for a limited period, generally 20 years from the filing date of the application. TRADE SECRET  A trade secret is any valuable information that is not publicly known (a well guarded secret) e.g. ingredients used in their food products, business methods, customer data. Trade secret protection is not limited in time (patents last in general for up to 20 years). It may continue indefinitely as long as the secret is not revealed to the public; TRADE MARK  A trademark offers legal protection for logo, design, symbol, phrase, wordmarks, or a combination of those that represents a source of goods or services. The term of trademark registration can vary but it is usually ten years. It can be renewed indefinitely on payment of additional fees. COPYRIGHT  Copyright protects the original work of authorship. Such works are literature, drawings, paintings, songs, music, computer software, films, photos, web content. The time limit should be equal to or longer than 50 years after the creator’s death. Longer periods of protection may however be provided at the national level.