2. OBJECTIVE
Define modern times in the
internet application
Adapt proper computer ethics in
using computers
Discuss online security and safety
Discuss Copyright and Intellectual
property rights
Contextualized online searching
skills
3. The Internet, truly, is a powerful tool. It can be used
to promote your business, gain new friends, and stay
in touch with the old ones.
It is also a source of entertainment. But like most
things in this world, there is always “another side of
the coin.” The Internet is one of the most dangerous
places, especially if you do not know what you are
doing.
THE INTERNET
5. Invention of the
Internet
In the 1960s, the United States
government, businesses, and
colleges collaborated to develop
a system that would allow
computers across the country to
share information
In 1969, they developed
ARPANET, an early form of the
Internet
Electronic mail, or e-mail, was
invented in 1971 as a method of
sending a message from one
computer to another
6. Invention of the
Internet
A hypertext link connects
different parts of an electronic
document or different documents
Hypertext was invented in 1989 The World Wide Web, or "the
Web," was created in the early
1990s on the basis of hypertext
7. The Internet, truly, is a powerful tool. It can be used
to promote your business, gain new friends, and stay
in touch with the old ones.
It is also a source of entertainment. But like most
things in this world, there is always “another side of
the coin.” The Internet is one of the most dangerous
places, especially if you do not know what you are
doing.
THE INTERNET
8. INFORMATION YOU MUST LIMIT TO SHARE
ONLINE
PERSONAL | CONTACT | EDUCATION | FINANCIAL & LOCATION
9. NETIQUETTE
"Netiquette" is a term derived from the combination of "internet" and
"etiquette." It refers to the set of rules and guidelines for proper
behavior and communication when interacting online. Netiquette helps
create a positive and respectful digital environment, fostering
effective and courteous communication among internet users.
Virginia Shea authored the book "Netiquette," which is
considered a seminal work on internet etiquette. Published in
1994, the book outlines guidelines for proper behavior and
communication on the internet.
NETIQUETTE
10. “10 COMMANDMENTS OF NETIQUETTE”
THE CORE RULES OF NETIQUETTE FROM THE BOOK OF
NETIQUETTE BY VIRGINIA SHEA
11. RULE NO. 1:
REMEMBER THE
HUMAN
•You need to remember that you are
talking to a real person when you are
online.
•The internet brings people together who
would otherwise never meet.
•Remember this saying when sending an
email: “Would I say this to the person’s
face.”
12. RULE NO. 2:
ADHERE TO THE SAME
STANDARDS ONLINE
THAT YOU FOLLOW IN
REAL LIFE.
•You need to behave the same way
online that you do in real life.
•You need to remember that you
can get caught doing things you
should not be doing online just like
you can in real life.
•You are still talking to a real
person with feelings even though
you can’t see them.
13. RULE NO. 3:
KNOW WHERE YOU ARE
IN CYBERSPACE
•Always take a look around when
you enter a new domain when
surfing the web.
•Get a sense of what the discussion
group is about before you join it.
14. RULE NO. 4:
RESPECT OTHER
PEOPLE’S TIME AND
BANDWIDTH
•Remember people have other things
to do besides read your email.
•You are not the center of their
world.
•Keep your post and emails to
minimum by saying what you want to
say.
•Remember everyone won’t answer
your questions.
15. RULE NO. 5:
MAKE YOURSELF LOOK GOOD
ONLINE
•Be polite and pleasant
to everyone.
•Always check your
spelling and grammar
before posting.
•Know what you are
talking about and make
sense saying it.
16. RULE NO. 6:
SHARE EXPERT
KNOWLEDGE
•Ask questions online
•Share what you know
online.
•Post the answers to
your questions online
because someone may
have the same question
you do.
17. RULE NO. 7:
HELP KEEP FLAME WARS UNDER CONTROL
•Netiquette does not forgive flaming.
•Netiquette does however forbid people
who are flaming to hurt discussion groups
by putting the group down.
18. RULE NO. 8:
RESPECT OTHER
PEOPLE’S PRIVACY
•Do not read other people’s
mail without their permission.
•Going through other people’s
things could cost you, your
job or you could even go to
jail.
•Not respecting other
people’s privacy is a bad
netiquette.
19. RULE NO. 9:
DONT ABUSE YOUR
POWER
•Do not take advantage of
other people just because you
have more knowledge or power
than them.
•Treat others as you would
want them to treat you if the
roles were reversed.
20. RULE NO. 10:
BE FORGIVING OF
OTHER PEOPLE'S
MISTAKE
•Do not point out mistakes to
people online.
•Remember that you were once
the new kid on the block.
•You still need to have a good
manners even though you are
online and cannot see the
person face to face.
21. INTERNET
SAFETY
INTERNET THREATS
Internet threats, also known as
cybersecurity threats, refer to
various risks and malicious
activities that can compromise
the security and integrity of
information, systems, and
networks connected to the
internet.
22. VIRUS
A piece of code that is capable of
corrupting the file system or destroy
data
MALWARE
Malware is an umbrella word for any sort
of malicious software that is intended to
harm or exploit any programmable
device, service, or network.
One type of malware
Must be triggered by a user
Self-replicating
Terms for malicious software
Any malicious code
Harms devices and steal data
All viruses are malware
but not all types of
malware are viruses.
23.
24.
25.
26.
27. INTELLECTUAL
PROPERTY RIGHTS
Intellectual property (IP) is a category of
property that includes intangible
creations of the human intellect. There are
many types of intellectual property, and
some countries recognize more than
others. The most well-known types are
copyrights, patents, trademarks, and
trade secrets.
28. 4 TYPES OF INTELLECTUAL PROPERTY
PATENT
Utility patent-It protects a process,
manufacture, composition of matter, and a
useful machine. Design patent-It protects
the shape, appearance, pattern design,
layout, and looks of a product. The
protection is granted for a limited period,
generally 20 years from the filing date of the
application.
TRADE SECRET
A trade secret is any valuable information that
is not publicly known (a well guarded secret)
e.g. ingredients used in their food products,
business methods, customer data. Trade
secret protection is not limited in time
(patents last in general for up to 20 years). It
may continue indefinitely as long as the
secret is not revealed to the public;
TRADE MARK
A trademark offers legal protection for
logo, design, symbol, phrase,
wordmarks, or a combination of those
that represents a source of goods or
services. The term of trademark
registration can vary but it is usually
ten years. It can be renewed
indefinitely on payment of additional
fees.
COPYRIGHT
Copyright protects the original work of
authorship. Such works are literature,
drawings, paintings, songs, music,
computer software, films, photos, web
content. The time limit should be equal
to or longer than 50 years after the
creator’s death. Longer periods of
protection may however be provided
at the national level.