Lesson - 2 - Online Safety-Security - Netiquette PDF
Lesson - 2 - Online Safety-Security - Netiquette PDF
Lesson - 2 - Online Safety-Security - Netiquette PDF
1 2
3 4
1
Lesson 2
5 6
Example: Keyloggers – used to record the keystroke done by users. This • PHISHING – its goal is to acquire sensitive personal information like passwords
is done to steal their password or any other sensitive information. It can and credit card details. This is done by sending (you) an email that will
record email, messages, or any information you type using your keyboard. direct the user website and be asked to update his/her username, password,
credit card, or personal information.
• ADWARE – a program designed to send you advertisements, mostly as Pharming – a more complicated way of phishing where it exploits the
pop-ups. DNS (Domain Name Service) systems.
7 8
2
Lesson 2
9 10
11 12
3
Lesson 2
13 14
15 16
4
Lesson 2
17 18
Computer Ethics
- It is a part of practical philosophy which concerns with how computing
professionals should make decisions regarding professional and social
MAJOR CONCERNS OF COMPUTER ETHICS
conduct.
Why study Ethics? • The protection of private information
• According to Bowyer (2001), through
ethics you become a more ethical • The limits of a presumed freedom of expression
person, particularly in your career as
a computer professional. • Issues of libel.
• It is important to note that as Johnson
has proposed (2001), we should think
of computer ethical issues as
new species of moral issues.
19 20
5
Lesson 2
Intellectual Property and Copyright Law Intellectual Property and Copyright Law
• If you create something – an idea, an invention, a form
of literary work, or a research, you have the right of Copyright Infringement
how it should be used by others. This is called
intellectual property. “..copyright infringement is a violation of an
individual or organization’s copyright.
Copyright Law – a part of a law, wherein you have It describes the unauthorized use of copyrighted
the right/s to your work, and anyone who uses it material such as text, photos, videos, music,
without your consent is punishable by law. software, and other original content. In the
computer industry, copyright violations often
• As a responsible user of Internet, you have to refer to software programs and websites..”
consider that not everything out there is free for
you to use.
Source: https://techterms.com/definition/copyright_infringement
21 22
1. Understand – copyright protects literary works, 3. Be creative – ask yourself whether what you
photographs, paintings, drawings, films, music are making is something that came from you or
(and lyrics), choreography, and sculptures, but it something made from somebody else’s creativity.
generally does NOT protect underlying ideas and facts. This It is important to add your own creative genius in everything
means that you can express something using your own words, that will be credited to you.
but you should give credit to the source. 4. Know the law – there are some limitations to copyright laws.
2. Be responsible – even if a material does not say that it is For instance in the Philippines, copyrights only last a lifetime
copyrighted, it is not a valid defense against copyright. (of the author) plus 50 years.
Be responsible enough to know if something has a copyright.
23 24
6
Lesson 2
• Online safety and security defines how you are going to keep
Fair use – means that an intellectual yourself safe while surfing the web and using these technologies.
property may be used without a consent as
long as it is used in commentaries, criticisms, • Online ethics focuses on the acceptable use of online resources in
search engines, parodies, news reports, an online environment.
research, library archiving, teaching and
education. • Netiquette focuses on the acceptable behavior of the person while
using the internet resource.
25 26
Sources
• http://www.personalizemedia.com/the-count/
• https://www.commonsensemedia.org/video/modal/2078096
• https://prezi.com/sbrdbl67fj7d/online-safety-security-ethics-etiqutte/
• https://howsecureismypassword.net/
• https://www.youtube.com/watch?v=uquRzrcwA18
• Social, Ethical, Legal & Professional Issues in Computing by Charlemagne
Lavina
• IT Ethics.pdf by Jordan Aiko Deja
27