Empowerment Technologies - Rules of Netiquette
Summary
TLDRIn this educational video, Serge Eriksson S. Chua discusses the importance of online safety and netiquette. The video covers the potential risks of sharing personal information online, such as full names and addresses, and offers tips for staying safe, including being cautious about what is shared and understanding privacy policies. It also touches on the ten commandments of computer ethics, various internet threats like malware and phishing, and the significance of protecting one's reputation online. The video concludes with advice on avoiding copyright infringement and conducting effective online research.
Takeaways
- 😀 The video emphasizes the importance of online safety and security, urging viewers to understand the potential risks associated with sharing personal information on the internet.
- 🔍 It discusses the various types of information that can be risky to share online, such as full names, addresses, and phone numbers, and advises using nicknames and being cautious with details.
- 💡 The video provides practical tips for maintaining online safety, including being mindful of what is shared, reading terms and conditions, and understanding privacy policies.
- 🛡️ It highlights the necessity of using strong, unique passwords and the importance of not sharing them with others to protect personal accounts.
- 🏠 The video warns against the dangers of using public Wi-Fi and the potential for hackers to exploit unprotected networks.
- 🚫 It advises against oversharing on social media, especially about future plans or personal details that could make one vulnerable to scams or identity theft.
- 👥 The video introduces the 'Ten Commandments of Computer Ethics' and encourages ethical behavior online, such as respecting others' work and not using computers to harm others.
- 📚 It touches on the concept of copyright and intellectual property, explaining the legal protections for creative works and the importance of avoiding infringement.
- 🔎 The video offers advice for effective online research, including using advanced search features, verifying sources, and properly citing information to avoid plagiarism.
- 🌐 It concludes with a reminder of the permanence of the internet, advising viewers to think carefully before posting anything online to protect their reputation and that of others.
Q & A
What is the main focus of the second lesson in Empowerment Technologies?
-The main focus of the second lesson is on the rules of netiquette, which includes understanding internet threats, ensuring online safety and security, proper online behavior, computer ethics, responsible use of social networking sites, efficient internet browsing, proper referencing, and the importance of online security, safety, and ethics.
How does the lesson suggest one can be found by search engines?
-The lesson suggests that search engines can locate individuals through various online information and links to their profile pages, which can happen if personal details are shared online.
What are some of the risks associated with sharing personal information online?
-Sharing personal information online can lead to risks such as identity theft, cybercrime, and being vulnerable to hackers. It's advised to use nicknames instead of full names and to be cautious about the details shared.
Why is it risky to share your full name online?
-Sharing your full name online is risky because it can make you more easily searchable through search engines, including image search, which can lead to identity theft and other cybercrimes.
What is the advice given for protecting one's online safety and security?
-To protect online safety and security, the lesson advises being mindful of what is shared online, reading terms and conditions, checking privacy policies, knowing the security features of social networking sites, not sharing passwords, avoiding public Wi-Fi, and installing and updating antivirus software.
What are the 'Ten Commandments of Computer Ethics' as mentioned in the script?
-The 'Ten Commandments of Computer Ethics' include not using a computer to harm others, not interfering with others' work, not sneaking around in others' computer files, not using a computer to steal, not bearing false witness, not copying or using proprietary software without payment, not using others' computer resources without authorization, not appropriating others' intellectual output, considering the consequences of the programs or systems designed, and using computers in ways that ensure consideration and respect for fellow humans.
What is the significance of the phrase 'Passwords are like underwear' in the context of the lesson?
-The phrase 'Passwords are like underwear' signifies that one should not let others see their passwords, change them regularly, and not share them with strangers, emphasizing the importance of password security.
What are some of the common internet threats discussed in the lesson?
-Common internet threats discussed include malware (viruses, worms, trojans, rogue security software, spyware, keyloggers, adware), spam, phishing, and pharming.
How can one protect their reputation online according to the lesson?
-To protect one's reputation online, one should think before posting, ask for consent before sharing others' information, set posts to private, avoid using real names, and remove or report posts that could affect one's or others' reputation.
What is the importance of copyright in the context of online activities?
-Copyright is important as it protects the rights of authors and producers of literary works, photographs, paintings, and other creations from unauthorized use. Understanding and respecting copyright laws help avoid legal sanctions and protect intellectual property.
What are some tips for effective online research as discussed in the lesson?
-Effective online research tips include having a specific question in mind, narrowing down search results, using advanced search features, looking for credible sources, and properly citing references.
Outlines
🔐 Introduction to Online Safety and Netiquette
The first paragraph introduces the topic of online safety and netiquette, emphasizing the importance of understanding how search engines locate personal information and the potential dangers associated with being found online. The learning objectives for the lesson are outlined, which include identifying internet threats, ensuring online safety, understanding proper online behavior, applying computer ethics, using social networking sites responsibly, and developing efficient internet browsing and research skills. The instructor prompts the audience to reflect on their internet usage and the dependency on the internet in their daily lives.
🚨 Risks of Personal Information Sharing Online
This section delves into the risks associated with sharing personal information online. It discusses the potential consequences of revealing one's first name, last name, middle name, and full name, highlighting how these can lead to identity theft and other cybercrimes. The paragraph also covers the risks of sharing other personal details such as current and previous skills, cell phone numbers, parents' names, siblings' names, and home addresses. The advice given is to use nicknames and to be cautious about the level of detail shared on social media platforms.
🛡️ Tips for Safe Online Behavior
The third paragraph offers practical tips for maintaining online safety. It advises users to be mindful of what they share online, to read terms and conditions and privacy policies of websites, and to understand the security features of social networking sites. The importance of not sharing passwords, avoiding public Wi-Fi, and not talking to strangers online is stressed. Additionally, the paragraph warns against posting about future vacations, adding strangers on social media, visiting untrusted websites, and downloading from untrusted sources. It also recommends installing and updating antivirus software and keeping home Wi-Fi networks private.
💡 The Ten Commandments of Computer Ethics
This paragraph introduces the Ten Commandments of Computer Ethics as outlined by the Computer Ethics Institute. The commandments serve as a guide for ethical behavior in the digital world, covering aspects such as not harming others with computers, not interfering with others' work, respecting privacy, and not using computers for theft or deception. The commandments also emphasize the importance of considering the consequences of one's actions in computer programming and design, and using computers with respect and consideration for others.
👀 Understanding and Avoiding Internet Threats
The fifth paragraph discusses various types of internet threats, including malware, worms, Trojans, rogue security software, spyware, keyloggers, adware, spam, phishing, and pharming. It provides examples of each threat and explains how they can compromise personal information and security. The paragraph also touches on the importance of protecting one's online reputation, advising users to think before they post and to consider the potential long-term effects of sharing content on the internet.
📚 Copyright and Plagiarism in Online Research
The final paragraph addresses the issue of copyright infringement and the importance of giving credit to original content creators. It explains that copyright law protects various forms of creative work and that using someone else's work without permission can result in legal consequences. The paragraph advises on how to avoid plagiarism and uphold academic integrity by paraphrasing, citing sources, and referencing materials properly. It also provides tips for effective online research, including using advanced search features, looking for credible sources, and citing references accurately.
Mindmap
Keywords
💡Netiquette
💡Online Safety and Security
💡Search Engines
💡Cybercrime
💡Computer Ethics
💡Malware
💡Phishing
💡Social Networking Sites
💡Cybersecurity
💡Copyright
💡Online Research
Highlights
Introduction to the second lesson on empowerment technologies focusing on netiquette.
Question posed about the visibility of personal profiles on search engines and the associated risks.
Learning objectives include understanding internet threats, ensuring online safety, and applying computer ethics.
Discussion on the amount of time spent on the internet and dependency on it in daily life.
Explaining the risks associated with sharing personal information like names and contact details online.
Advice on using nicknames instead of full names for a safer online presence.
Importance of not sharing sensitive information like middle names, parents' names, and birthdays online.
Tips for online safety, such as being mindful of shared information and reading terms and conditions.
Recommendations for checking privacy policies and security features of social networking sites.
Emphasis on not sharing passwords and the risks of logging into public Wi-Fi networks.
The Ten Commandments of Computer Ethics by the Computer Ethics Institute, providing a moral framework for computer use.
Explanation of different types of malware, including viruses, worms, trojans, and spyware, and their impact on users.
Discussion on spam, phishing, and farming as internet threats and how to avoid them.
Advice on protecting one's reputation online by being cautious about the content shared on social media.
Importance of copyright and how it protects creators' works from unauthorized use.
Guidelines on avoiding copyright infringement and the legal implications of using copyrighted material without permission.
Tips for effective online research, including using advanced search features and citing sources properly.
Transcripts
[Music]
good day everyone i am serge eriksson s
chua and welcome to empowerment
technologies
hello everyone and welcome to the second
lesson in empowerment technologies which
is the rules of netiquette
let's try to ask ourselves the following
question
have you tried searching your profile in
google did you get links to your profile
page how did these things happen
how can search engines locate you is
there any danger of being found by
search engines
our learning objectives by the end of
the lesson the students should have
identified the varying internet threats
and ensure online safety and security
measures understand proper behavior when
communicating online apply computer
ethics in dealing with computer tasks
use social networking sites responsibly
browse the internet efficiently and
properly through proper referencing
use proper contextualized online search
and research skills and express the
importance of online security safety and
ethics
so let's proceed to our lesson
discussion and try to answer the
following question
how many hours do you spend on the
internet per day
can you live without the internet for a
week
how many aspects of your life depend on
the internet
how many times have you complained about
your internet connection speed
[Music]
online safety and security so it says
here the internet truly is a powerful
tool because it can be used to promote
your business gain new friends and stay
in touch with the old ones it is also a
source of entertainment through games
online communities and everything in
between
so let's proceed to how safe are you so
here are the type of information that we
share online and
what are the possible risks that is
associated with sharing them on the
internet so the first one is your first
name so there is a risk in having your
uh first name shared on the internet
chances are a hacker may already know
plenty of stuff about you even if you
only shared your first name okay
especially for those people who share
their name which are unique okay we also
have their last name if sharing your
first name is a small risk having both
your first name and last name is more
risky you will be vulnerable to being
searched for using search engines which
includes image search matching a name
with a face is a modest several cyber
crime like identity theft so
basically when we share our sharing
information a nickname would be enough
okay next we also have your middle name
sharing your middle name alone is
probably not the most risky of this
but sharing your full name would be it
means that you will place your first
name middle name and last name on the
net okay so don't do that because it's
very risky we also have current and
previous skill most people who steal
their identities study their subject and
they will use this information for
verification purposes your cell phone
number should not be posted over the
internet because
basically the internet is a public place
it means that
it is similar to posting your cell phone
number on a billboard okay so don't post
your cell phone number online
next we also have the name and mother
name of your mother and father it's a
risky yet not as risky as posting your
full name okay especially your mother's
maiden name because
some accounts
need the
mothers made the name for verification
purposes so don't post the name of your
mother and father on the net name of
your siblings disclosing this is a huge
risk and strangers may pretend to use
this to
do you so be careful with that your
address hopefully answer answer to this
one no and giving this on the internet
okay would be another level it would be
much easier for criminals to find you so
when posting your address you just need
to place the municipality in the
province that's enough so don't place
the whole address for example the lot
number the
rock address the barangay and so on so
don't post the whole address on your
social media accounts okay next your
home phone number this shared
information is more risky than sharing
your personal number because camps
usually come in this kind of information
and they see view one of which is when a
stranger pretends to know your parents
or pretend to be you okay so be careful
in sharing your home phone number
um your birthday letting know your
birthday is probably a must if you want
to get as many gifts as possible but
having it in your profile makes you
vulnerable to identity theft okay
next okay let's proceed to online safety
and security so it says here that the
internet is so called the information
super highway because this means that
anyone has access to the highway and
completes information and even grab
those information and information even
things
that have said privately maybe access
one way or another especially that
hackers nowaday have
many
things okay that can get your
personal information online okay
so what are the tips to stay safe online
now that we know
what are the possible risks that we can
get when sharing our information so the
first one we need to be mindful of what
we share online and what site you share
it to meaning we need to think before we
click okay next do not just accept terms
and conditions you need to read it okay
meaning you just need to skim and scan
not necessarily reading it if you are in
a hurry as much as possible
um
try to
read some of the important aspects of
that terms of conditions next we also
have here check out the privacy policy
page of websites and usually the
different social media account has this
if you want to see what are the
inclusions about your information
what can be disclosed and not and what
are the information that is get
thing of that particular website you
just need to check the privacy policy of
that page next know the security
features of the social networking site
you used to similar with privacy policy
the information can be seen on
our
next do not share your password with
anyone so meaning that we don't need to
share it to our loved ones or our
boyfriend and your friends so just be
careful with your password because
anyone can have access on your account
number six avoid logging into public
wi-fi or networks browsing in incognito
or private mode a feature of the browser
will not protect you from hackers okay
so just be careful on browsing on the
net
next not talk to strangers whether
online or face to face okay never post
anything about your future vacation it
is similar to posting rob my house at
this date okay so be careful on posting
about your future
occasions we also have here at friends
you know in real life okay not just
adding some stranger on the social media
accounts that we have avoid visiting
untrusted websites so check the
padlock part of the website if you can
see some padlock okay on this particular
website that is secured but if you don't
see this kind of icon okay check the
privacy policy of that particular page
next we also have here you need to
install and update anti-virus software
on your computer use only one antivirus
software to avoid conflict okay so the
antivirus that i usually use is maddov
and
we also have asset is another good
antivirus that you can install on your
computers um if you have a wi-fi at home
make it a private network by adding a
password so that um
other people will not connect to the to
your wi-fi okay
next um avoid downloading anything from
untrusted websites
it is possible that
hackers may also get some personal
informations on your laptops or
computers if you do this okay so be
careful on the websites that you go to
okay and you have to make sure that is
trusted next buy the software do not use
pirated ones and do not reply or click
links from suspicious emails and
especially this can be used for fishing
and farming activities and even for
downloading some trojan virus to the
uh to your pcs or laptops
so let's proceed to the ten commandments
of computer ethics according to computer
ethics institute number one thou shall
not use a computer to harm other people
in any way number 2 thou shall not
interfere with other people's work
3 thou shall not sneak around in other
people's computer files
or thou shall not use computer to steal
5. thou shall not use a computer to bear
false fitness
6 thou shall not copy or use propriety
software for which you have not paid 7
thou shall not use other people's
computer resources without authorization
or proper compensation
number eight thou shall not appropriate
other people's intellectual output
nine now shall think about the
consequences of the program you're
writing or the system you are designing
and number ten thou shall always use a
computer in ways that ensure
consideration and respect for your
fellow humans so as students we should
be reminded of the commandments of
computer ethics
so for our code of the day passwords i
like underwear don't let people see it
change it very often and you shouldn't
share it with a stranger this is
according to please
so let's proceed to the different
internet threats so an internal threat
is a threat that can be used on the
world web to disperse conceal and update
themselves with the intention of
facilitating cyber crime
so we have here several internet threats
the first one is a malware or malicious
software so this is a virus which is
loaded into a user's computer without
the user's knowledge and perform
malicious actions and can be transferred
from one computer to another so this can
be done through your flash drives or
your
cds and even your phones
next we also have a worm which is a
standalone malicious software that can
self-replicate and propagate through
computer networks without human help for
example we have the i love you worm or
love bug worm which is created by a
filipino okay so this is done through
the use of the
email so once you have clicked that
particular email the worm will
self-replicate and later on your
computer will shut down on its own
so the i love you worm virus is a
computer worm that is spread through
email attachments in 2000 so i love you
were best created by annel de guzman of
the philippines and infecting about 45
million
machines worldwide leading to more than
8 billion in damages okay so imagine how
um he made a great impact on the
different companies okay before
uh another malaysia software is what we
call a trojan so a trojan is disguised
as a useful program but once downloaded
or installed it leaves your pc
unprotected and allows hackers to get
into your information so it's just a
particular software okay that can be
downloaded on the different app stores
or the web but be careful on the
um
on
installing those applications maybe it
be a project okay if you download it
from untrusted websites
we also have rogue security software
it's similar with trojan but it takes
you into posing that this is a security
software it asks the users to pay to
improve his or her security but in
reality they are not protected at all so
using the raw security software it may
get your credit card details or debit
card details so be careful on
downloading several
security software online
we also have spyware which is a program
that runs in the background without you
knowing it thus it's called a spy it has
the ability to monitor what you are
typing okay and currently doing through
the use of the
webcam that you have on your computers
okay actually this was an issue in the
us before where people okay see what you
are doing through the webcam without you
knowing it okay
next we also have keyloggers this is
used to record the keystroke done by the
users and this is done to steal the
password or any sensitive information
that you have on your phones or your
lock types
okay next we also have adware so these
are usually um
that pops up on the different websites
that you go to so this is a program that
is designed to send you advertisements
mostly by pop-ups and some bots okay
also do this to get your personal
information so be careful on clicking
some adwares
okay number two internet threat is what
we call a spam so this are unwanted
email mostly from bots or advertisers
and it can be used to send malware so be
careful when opening some spam messages
it can be used to get
you um
malwares
next we also have shang okay this uh the
goal of this is to acquire personal
information like passwords and credit
card details through emails okay so um
sometimes banks okay or other government
agencies send some
email on you but be careful
to check the
email it comes from because sometimes
the um some hackers may also uh use that
as a means of getting the phishing um
activity okay so another um example of
uh
activity of an internet threat is what
we call farming this is a more
complicated way of fishing where it
exploits the dns okay which is an
example which is people that
incorporated or domain system if you see
this there is a lock while this one that
hasn't have a lock so um if you check
the privacy policy this is more secured
compared to this one so this can be an
example of a farming website so be
careful when checking the different
websites
so in summary of the different internet
threads so we have malware under malware
we have pyrus worm trojan or rogue
security software spyware or keyloggers
and adware we also have spam and fishing
and farming so those are the different
internet tracks
so let's proceed to protecting our
reputation online so nowadays
embarrassing moments can be captured
using any device um that you have okay
even your smartphone can be used to do
this okay and this could impact not only
your reputation but also the people
around you okay so sometimes okay um
some funny moments can be recorded
through your phones but be careful when
posting it on the net because it can be
degradable to his or her personality
once you have posted it because many
people will see it okay so
if you want to post it on the net you
just need to get the content of that
particular person before you post it on
this different social media that you
have okay
um it says here that once you have post
something over the internet search
engine keep them in their archives for
search results and this makes anything
you post to last forever and sets here
the internet is forever that's why it's
always um important to think before you
click because all of the information
that you will share on the websites or
internet will just be there and it will
not be deleted even if you delete it on
purpose okay
um
those information will be saved in the
different infrastructures or um
database from the different websites
that you go to okay so be careful on the
things that you share on the net
uh it says here before hiring companies
do a background check on the applicant
and the easiest way to check your
background is to visit pages that are
related to you okay so some companies
now do
social media checking okay to see what
you are doing on your different accounts
okay think before you click as i said a
while ago so it says here that before
you post something on the web ask this
question to yourself would you want your
parents or grandparents to see it in the
future would you want your future boss
to see it okay so think about this
question before you post on things two
your friends depend on you to protect
your reputation online talk to your
friends about this serious
responsibility and when sharing some
information please ask consent
set your post to private as much as
possible in this research engine will
not be able to scan your post avoid
using names names are easy to research
engines to skype okay so think before
you click
and then number five if you feel that
post can affect you or others reputation
as the one who posted it to pull it down
or report it as inappropriate especially
on the different social media nowadays
where people are clicking some adwares
and then um some scandalous videos can
be tagged on you so be careful with that
okay so ask the person who posted it to
put the post down okay so that's how you
protect the reputation online
okay so let's proceed to corporate
infringement so meaning when we say
copyright this is something that you
create an idea an invention or a form of
literary work or research and you have
the right to ask how it should be used
by others because basically you you are
the one who created it so this is also
known as your intellectual property so
in other words the copyright is a law
that includes your rights over your work
and anyone who uses it without your
consent is punishable by the law
so what are the things that we need to
consider when um
avoiding copyright infringement so the
first one is we need to understand okay
so when we say understand copyright
protects literary works photographs
paintings drawings
films music and lyrics choreography and
sculptures but it generally does not
protect underlying ideas and facts okay
so you need to understand first okay
before
sharing those personal information or
those literary works next be responsible
even if the material does not say that
it is copyrighted it is not valid
defense against copyright that's why
when researching online we always say as
teachers to get the references because
basically that's we one way of
doing um
or avoiding copyright infringement okay
so when you search online getting those
ideas okay if you paraphrase interface
it you need to still get the reference
from it okay because that's how we do
um or avoid copyright infringement
third one be creative ask yourself
whether you are making it something that
came from you or something made from
somebody else's creativity okay so
that's why we need to rephrase empire
your face
okay number four note the law there are
some limitations of copyright law for
instance in the philippines copyright
law only lasts for
[Music]
the lifetime of the author and plus 50
years and there are also provisions of
areas which means that intellectual
property may be used without consent so
if you see some logo like this you may
use the
information but beside the sources
so let's proceed to the six ways to
avoid leisure asm so we need to
paraphrase site code setting codes
citing your own materials and
referencing so it says here promote your
original writing avoid plagiarism and
uphold academic integrity
so let's proceed to online research so
what is the difference between madonna
and the madonna so once you search this
two information it will give different
results so when we search madonna it
means this is the singer while the
madonna is the image of mother mary
holding jesus christ so um in searching
um we need to be specific because there
will be some different information that
will be
gathered okay once we have
clicked the button search on that
okay so online researching what are the
tips that we need to consider number one
you need to have a question in mind
meaning that you need to focus on the
question you wanted to answer if it's a
series of questions start with one and
never search everything on the go so be
specific just use the keywords in
searching and then search your
information
next narrow it down meaning search
engines like google bing or yahoo use
several filters to determine the most
appropriate result for you so be
specific you need to narrow it down
third advanced search is also one of the
feature of different websites this is
the way best way to filter information
you get from search engines and this is
by using the advanced search and this
will allow you to filter out information
you need okay so this is an ad and
search in google so you may search all
these words
this exact words our face any of these
words none of these words and number
ranging from and so on so you just need
to click or search on google and search
and this will pop up and in your
browsers
number four you need to look for
credible sources okay not all
information on the web is credible so
some wikis are not credible source this
is due the fact that anyone can have or
edit its content the more credible
sources are scientific journals websites
online encyclopedias and scholarly
databases that's why on our google when
we say scholarly articles those are more
reliable compared to those that are not
and last one is you need to give credit
when researching online if you are going
to use the information from a source of
for educational purposes you need to
give the reference to the original
author of the page or information and do
it properly okay and you may use the
following format below for
online research you may get the name of
the person or organization
the title of the home page in italics
and url in the date classy so in summary
of our discussion most teenagers spend
their time online it is vital to
consider that information you share
because the internet is a public place
there are several ways to stay safe
online and this is essential that we
know and apply them
there are several threats that includes
malware spams and fishing and malwares
could be in the form of virus worms
trojan spyware or eyewear and be careful
on these particular threats because it
may have great impact on our lives
and we are responsible of what we post
online it is also our responsibility to
protect others reputation we should be
mindful of what we post when others are
involved
and copyright lives protects the authors
or producers of literary works
photographs paintings and others from
having their work used without their
permission and it is important for
everyone to understand the laws to avoid
being sanctioned
and when researching online remember to
narrow down your topic use advanced
search features look for credible source
and cite your references
[Applause]
تصفح المزيد من مقاطع الفيديو ذات الصلة
5.0 / 5 (0 votes)