Empowerment Technologies - Rules of Netiquette

jerickson chua
9 Feb 202224:17

Summary

TLDRIn this educational video, Serge Eriksson S. Chua discusses the importance of online safety and netiquette. The video covers the potential risks of sharing personal information online, such as full names and addresses, and offers tips for staying safe, including being cautious about what is shared and understanding privacy policies. It also touches on the ten commandments of computer ethics, various internet threats like malware and phishing, and the significance of protecting one's reputation online. The video concludes with advice on avoiding copyright infringement and conducting effective online research.

Takeaways

  • 😀 The video emphasizes the importance of online safety and security, urging viewers to understand the potential risks associated with sharing personal information on the internet.
  • 🔍 It discusses the various types of information that can be risky to share online, such as full names, addresses, and phone numbers, and advises using nicknames and being cautious with details.
  • 💡 The video provides practical tips for maintaining online safety, including being mindful of what is shared, reading terms and conditions, and understanding privacy policies.
  • 🛡️ It highlights the necessity of using strong, unique passwords and the importance of not sharing them with others to protect personal accounts.
  • 🏠 The video warns against the dangers of using public Wi-Fi and the potential for hackers to exploit unprotected networks.
  • 🚫 It advises against oversharing on social media, especially about future plans or personal details that could make one vulnerable to scams or identity theft.
  • 👥 The video introduces the 'Ten Commandments of Computer Ethics' and encourages ethical behavior online, such as respecting others' work and not using computers to harm others.
  • 📚 It touches on the concept of copyright and intellectual property, explaining the legal protections for creative works and the importance of avoiding infringement.
  • 🔎 The video offers advice for effective online research, including using advanced search features, verifying sources, and properly citing information to avoid plagiarism.
  • 🌐 It concludes with a reminder of the permanence of the internet, advising viewers to think carefully before posting anything online to protect their reputation and that of others.

Q & A

  • What is the main focus of the second lesson in Empowerment Technologies?

    -The main focus of the second lesson is on the rules of netiquette, which includes understanding internet threats, ensuring online safety and security, proper online behavior, computer ethics, responsible use of social networking sites, efficient internet browsing, proper referencing, and the importance of online security, safety, and ethics.

  • How does the lesson suggest one can be found by search engines?

    -The lesson suggests that search engines can locate individuals through various online information and links to their profile pages, which can happen if personal details are shared online.

  • What are some of the risks associated with sharing personal information online?

    -Sharing personal information online can lead to risks such as identity theft, cybercrime, and being vulnerable to hackers. It's advised to use nicknames instead of full names and to be cautious about the details shared.

  • Why is it risky to share your full name online?

    -Sharing your full name online is risky because it can make you more easily searchable through search engines, including image search, which can lead to identity theft and other cybercrimes.

  • What is the advice given for protecting one's online safety and security?

    -To protect online safety and security, the lesson advises being mindful of what is shared online, reading terms and conditions, checking privacy policies, knowing the security features of social networking sites, not sharing passwords, avoiding public Wi-Fi, and installing and updating antivirus software.

  • What are the 'Ten Commandments of Computer Ethics' as mentioned in the script?

    -The 'Ten Commandments of Computer Ethics' include not using a computer to harm others, not interfering with others' work, not sneaking around in others' computer files, not using a computer to steal, not bearing false witness, not copying or using proprietary software without payment, not using others' computer resources without authorization, not appropriating others' intellectual output, considering the consequences of the programs or systems designed, and using computers in ways that ensure consideration and respect for fellow humans.

  • What is the significance of the phrase 'Passwords are like underwear' in the context of the lesson?

    -The phrase 'Passwords are like underwear' signifies that one should not let others see their passwords, change them regularly, and not share them with strangers, emphasizing the importance of password security.

  • What are some of the common internet threats discussed in the lesson?

    -Common internet threats discussed include malware (viruses, worms, trojans, rogue security software, spyware, keyloggers, adware), spam, phishing, and pharming.

  • How can one protect their reputation online according to the lesson?

    -To protect one's reputation online, one should think before posting, ask for consent before sharing others' information, set posts to private, avoid using real names, and remove or report posts that could affect one's or others' reputation.

  • What is the importance of copyright in the context of online activities?

    -Copyright is important as it protects the rights of authors and producers of literary works, photographs, paintings, and other creations from unauthorized use. Understanding and respecting copyright laws help avoid legal sanctions and protect intellectual property.

  • What are some tips for effective online research as discussed in the lesson?

    -Effective online research tips include having a specific question in mind, narrowing down search results, using advanced search features, looking for credible sources, and properly citing references.

Outlines

00:00

🔐 Introduction to Online Safety and Netiquette

The first paragraph introduces the topic of online safety and netiquette, emphasizing the importance of understanding how search engines locate personal information and the potential dangers associated with being found online. The learning objectives for the lesson are outlined, which include identifying internet threats, ensuring online safety, understanding proper online behavior, applying computer ethics, using social networking sites responsibly, and developing efficient internet browsing and research skills. The instructor prompts the audience to reflect on their internet usage and the dependency on the internet in their daily lives.

05:02

🚨 Risks of Personal Information Sharing Online

This section delves into the risks associated with sharing personal information online. It discusses the potential consequences of revealing one's first name, last name, middle name, and full name, highlighting how these can lead to identity theft and other cybercrimes. The paragraph also covers the risks of sharing other personal details such as current and previous skills, cell phone numbers, parents' names, siblings' names, and home addresses. The advice given is to use nicknames and to be cautious about the level of detail shared on social media platforms.

10:02

🛡️ Tips for Safe Online Behavior

The third paragraph offers practical tips for maintaining online safety. It advises users to be mindful of what they share online, to read terms and conditions and privacy policies of websites, and to understand the security features of social networking sites. The importance of not sharing passwords, avoiding public Wi-Fi, and not talking to strangers online is stressed. Additionally, the paragraph warns against posting about future vacations, adding strangers on social media, visiting untrusted websites, and downloading from untrusted sources. It also recommends installing and updating antivirus software and keeping home Wi-Fi networks private.

15:03

💡 The Ten Commandments of Computer Ethics

This paragraph introduces the Ten Commandments of Computer Ethics as outlined by the Computer Ethics Institute. The commandments serve as a guide for ethical behavior in the digital world, covering aspects such as not harming others with computers, not interfering with others' work, respecting privacy, and not using computers for theft or deception. The commandments also emphasize the importance of considering the consequences of one's actions in computer programming and design, and using computers with respect and consideration for others.

20:06

👀 Understanding and Avoiding Internet Threats

The fifth paragraph discusses various types of internet threats, including malware, worms, Trojans, rogue security software, spyware, keyloggers, adware, spam, phishing, and pharming. It provides examples of each threat and explains how they can compromise personal information and security. The paragraph also touches on the importance of protecting one's online reputation, advising users to think before they post and to consider the potential long-term effects of sharing content on the internet.

📚 Copyright and Plagiarism in Online Research

The final paragraph addresses the issue of copyright infringement and the importance of giving credit to original content creators. It explains that copyright law protects various forms of creative work and that using someone else's work without permission can result in legal consequences. The paragraph advises on how to avoid plagiarism and uphold academic integrity by paraphrasing, citing sources, and referencing materials properly. It also provides tips for effective online research, including using advanced search features, looking for credible sources, and citing references accurately.

Mindmap

Keywords

💡Netiquette

Netiquette refers to the etiquette guidelines for using the internet responsibly and respectfully. In the video, netiquette is a central theme as it discusses the rules for proper online behavior, emphasizing the importance of being considerate and secure in one's online interactions. The script mentions that students should understand proper behavior when communicating online, which is a key aspect of netiquette.

💡Online Safety and Security

Online safety and security encompass the measures taken to protect one's personal information and digital assets from potential online threats. The video script discusses various aspects of online safety, such as the risks associated with sharing personal information and the importance of being cautious about what one posts online. It also provides tips for staying safe online, like being mindful of what is shared and understanding the privacy policies of websites.

💡Search Engines

Search engines are tools used to search for information on the internet. The script raises the question of how search engines locate personal profiles, highlighting the need for individuals to be aware of their digital footprint. It also touches on the concept of being found by search engines, which can have implications for privacy and personal security.

💡Cybercrime

Cybercrime refers to criminal activities carried out using the internet. The video script mentions cybercrime in the context of identity theft and the risks associated with sharing personal information online. It serves as a reminder of the potential dangers lurking online and the importance of protecting oneself against such threats.

💡Computer Ethics

Computer ethics involves the moral and ethical guidelines for the use of computer technology. The video script references the 'ten commandments of computer ethics' as a framework for ethical behavior in the digital world. These commandments provide a set of principles to guide individuals in using computers and the internet responsibly.

💡Malware

Malware, short for malicious software, is any software intentionally designed to cause harm to a computer, server, client, or computer network. The script discusses various types of malware, including viruses, worms, and trojans, which can infiltrate systems and compromise security. Understanding malware is crucial for maintaining online safety.

💡Phishing

Phishing is a type of cybercrime where attackers attempt to obtain sensitive information such as usernames, passwords, and credit card details by disguising themselves as a trustworthy entity in an electronic communication. The video script warns about phishing attacks, advising viewers to be cautious of unsolicited emails and messages that may be attempts to steal personal information.

💡Social Networking Sites

Social networking sites are web-based services that allow individuals to build social networks and share information. The script discusses the responsible use of social networking sites, highlighting the need for individuals to be mindful of their online behavior and the information they share on these platforms.

💡Cybersecurity

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. The video script touches on various cybersecurity measures, such as using strong passwords, updating antivirus software, and being cautious when using public Wi-Fi. These measures are essential for safeguarding personal information and digital assets.

💡Copyright

Copyright is a legal right that grants the creator of an original work exclusive rights to its use and distribution. The video script discusses copyright in the context of protecting intellectual property, emphasizing the importance of understanding copyright laws to avoid infringement and respecting the rights of content creators.

💡Online Research

Online research involves the process of searching for information on the internet. The script provides tips for effective online research, such as using specific keywords, narrowing down search results, and verifying the credibility of sources. It also stresses the importance of proper citation to avoid plagiarism and maintain academic integrity.

Highlights

Introduction to the second lesson on empowerment technologies focusing on netiquette.

Question posed about the visibility of personal profiles on search engines and the associated risks.

Learning objectives include understanding internet threats, ensuring online safety, and applying computer ethics.

Discussion on the amount of time spent on the internet and dependency on it in daily life.

Explaining the risks associated with sharing personal information like names and contact details online.

Advice on using nicknames instead of full names for a safer online presence.

Importance of not sharing sensitive information like middle names, parents' names, and birthdays online.

Tips for online safety, such as being mindful of shared information and reading terms and conditions.

Recommendations for checking privacy policies and security features of social networking sites.

Emphasis on not sharing passwords and the risks of logging into public Wi-Fi networks.

The Ten Commandments of Computer Ethics by the Computer Ethics Institute, providing a moral framework for computer use.

Explanation of different types of malware, including viruses, worms, trojans, and spyware, and their impact on users.

Discussion on spam, phishing, and farming as internet threats and how to avoid them.

Advice on protecting one's reputation online by being cautious about the content shared on social media.

Importance of copyright and how it protects creators' works from unauthorized use.

Guidelines on avoiding copyright infringement and the legal implications of using copyrighted material without permission.

Tips for effective online research, including using advanced search features and citing sources properly.

Transcripts

play00:04

[Music]

play00:06

good day everyone i am serge eriksson s

play00:09

chua and welcome to empowerment

play00:11

technologies

play00:14

hello everyone and welcome to the second

play00:17

lesson in empowerment technologies which

play00:19

is the rules of netiquette

play00:23

let's try to ask ourselves the following

play00:25

question

play00:26

have you tried searching your profile in

play00:29

google did you get links to your profile

play00:31

page how did these things happen

play00:34

how can search engines locate you is

play00:36

there any danger of being found by

play00:38

search engines

play00:40

our learning objectives by the end of

play00:42

the lesson the students should have

play00:44

identified the varying internet threats

play00:46

and ensure online safety and security

play00:48

measures understand proper behavior when

play00:51

communicating online apply computer

play00:54

ethics in dealing with computer tasks

play00:57

use social networking sites responsibly

play01:00

browse the internet efficiently and

play01:02

properly through proper referencing

play01:05

use proper contextualized online search

play01:07

and research skills and express the

play01:09

importance of online security safety and

play01:11

ethics

play01:14

so let's proceed to our lesson

play01:15

discussion and try to answer the

play01:17

following question

play01:19

how many hours do you spend on the

play01:21

internet per day

play01:22

can you live without the internet for a

play01:24

week

play01:25

how many aspects of your life depend on

play01:27

the internet

play01:29

how many times have you complained about

play01:31

your internet connection speed

play01:34

[Music]

play01:36

online safety and security so it says

play01:39

here the internet truly is a powerful

play01:41

tool because it can be used to promote

play01:43

your business gain new friends and stay

play01:45

in touch with the old ones it is also a

play01:48

source of entertainment through games

play01:50

online communities and everything in

play01:52

between

play01:54

so let's proceed to how safe are you so

play01:56

here are the type of information that we

play01:58

share online and

play02:00

what are the possible risks that is

play02:02

associated with sharing them on the

play02:04

internet so the first one is your first

play02:06

name so there is a risk in having your

play02:09

uh first name shared on the internet

play02:11

chances are a hacker may already know

play02:13

plenty of stuff about you even if you

play02:15

only shared your first name okay

play02:18

especially for those people who share

play02:20

their name which are unique okay we also

play02:23

have their last name if sharing your

play02:24

first name is a small risk having both

play02:26

your first name and last name is more

play02:28

risky you will be vulnerable to being

play02:31

searched for using search engines which

play02:33

includes image search matching a name

play02:35

with a face is a modest several cyber

play02:37

crime like identity theft so

play02:40

basically when we share our sharing

play02:42

information a nickname would be enough

play02:44

okay next we also have your middle name

play02:47

sharing your middle name alone is

play02:48

probably not the most risky of this

play02:51

but sharing your full name would be it

play02:54

means that you will place your first

play02:56

name middle name and last name on the

play02:58

net okay so don't do that because it's

play03:01

very risky we also have current and

play03:03

previous skill most people who steal

play03:05

their identities study their subject and

play03:07

they will use this information for

play03:08

verification purposes your cell phone

play03:11

number should not be posted over the

play03:13

internet because

play03:15

basically the internet is a public place

play03:18

it means that

play03:19

it is similar to posting your cell phone

play03:22

number on a billboard okay so don't post

play03:25

your cell phone number online

play03:27

next we also have the name and mother

play03:29

name of your mother and father it's a

play03:30

risky yet not as risky as posting your

play03:34

full name okay especially your mother's

play03:35

maiden name because

play03:37

some accounts

play03:39

need the

play03:40

mothers made the name for verification

play03:42

purposes so don't post the name of your

play03:45

mother and father on the net name of

play03:47

your siblings disclosing this is a huge

play03:49

risk and strangers may pretend to use

play03:52

this to

play03:53

do you so be careful with that your

play03:56

address hopefully answer answer to this

play03:58

one no and giving this on the internet

play04:02

okay would be another level it would be

play04:06

much easier for criminals to find you so

play04:09

when posting your address you just need

play04:11

to place the municipality in the

play04:13

province that's enough so don't place

play04:15

the whole address for example the lot

play04:18

number the

play04:20

rock address the barangay and so on so

play04:24

don't post the whole address on your

play04:26

social media accounts okay next your

play04:29

home phone number this shared

play04:30

information is more risky than sharing

play04:32

your personal number because camps

play04:34

usually come in this kind of information

play04:37

and they see view one of which is when a

play04:39

stranger pretends to know your parents

play04:40

or pretend to be you okay so be careful

play04:43

in sharing your home phone number

play04:45

um your birthday letting know your

play04:47

birthday is probably a must if you want

play04:49

to get as many gifts as possible but

play04:52

having it in your profile makes you

play04:54

vulnerable to identity theft okay

play04:57

next okay let's proceed to online safety

play05:00

and security so it says here that the

play05:02

internet is so called the information

play05:05

super highway because this means that

play05:07

anyone has access to the highway and

play05:11

completes information and even grab

play05:13

those information and information even

play05:15

things

play05:16

that have said privately maybe access

play05:19

one way or another especially that

play05:21

hackers nowaday have

play05:23

many

play05:25

things okay that can get your

play05:29

personal information online okay

play05:32

so what are the tips to stay safe online

play05:35

now that we know

play05:36

what are the possible risks that we can

play05:38

get when sharing our information so the

play05:40

first one we need to be mindful of what

play05:43

we share online and what site you share

play05:45

it to meaning we need to think before we

play05:48

click okay next do not just accept terms

play05:50

and conditions you need to read it okay

play05:53

meaning you just need to skim and scan

play05:55

not necessarily reading it if you are in

play05:57

a hurry as much as possible

play06:00

um

play06:01

try to

play06:02

read some of the important aspects of

play06:04

that terms of conditions next we also

play06:08

have here check out the privacy policy

play06:10

page of websites and usually the

play06:12

different social media account has this

play06:14

if you want to see what are the

play06:17

inclusions about your information

play06:19

what can be disclosed and not and what

play06:21

are the information that is get

play06:24

thing of that particular website you

play06:27

just need to check the privacy policy of

play06:29

that page next know the security

play06:31

features of the social networking site

play06:33

you used to similar with privacy policy

play06:36

the information can be seen on

play06:39

our

play06:42

next do not share your password with

play06:44

anyone so meaning that we don't need to

play06:47

share it to our loved ones or our

play06:49

boyfriend and your friends so just be

play06:50

careful with your password because

play06:52

anyone can have access on your account

play06:54

number six avoid logging into public

play06:57

wi-fi or networks browsing in incognito

play06:59

or private mode a feature of the browser

play07:01

will not protect you from hackers okay

play07:04

so just be careful on browsing on the

play07:07

net

play07:09

next not talk to strangers whether

play07:11

online or face to face okay never post

play07:14

anything about your future vacation it

play07:16

is similar to posting rob my house at

play07:18

this date okay so be careful on posting

play07:22

about your future

play07:23

occasions we also have here at friends

play07:26

you know in real life okay not just

play07:28

adding some stranger on the social media

play07:31

accounts that we have avoid visiting

play07:33

untrusted websites so check the

play07:36

padlock part of the website if you can

play07:39

see some padlock okay on this particular

play07:42

website that is secured but if you don't

play07:44

see this kind of icon okay check the

play07:48

privacy policy of that particular page

play07:51

next we also have here you need to

play07:54

install and update anti-virus software

play07:56

on your computer use only one antivirus

play07:59

software to avoid conflict okay so the

play08:02

antivirus that i usually use is maddov

play08:05

and

play08:06

we also have asset is another good

play08:08

antivirus that you can install on your

play08:10

computers um if you have a wi-fi at home

play08:13

make it a private network by adding a

play08:15

password so that um

play08:18

other people will not connect to the to

play08:20

your wi-fi okay

play08:22

next um avoid downloading anything from

play08:24

untrusted websites

play08:26

it is possible that

play08:28

hackers may also get some personal

play08:30

informations on your laptops or

play08:32

computers if you do this okay so be

play08:34

careful on the websites that you go to

play08:36

okay and you have to make sure that is

play08:38

trusted next buy the software do not use

play08:41

pirated ones and do not reply or click

play08:44

links from suspicious emails and

play08:46

especially this can be used for fishing

play08:49

and farming activities and even for

play08:52

downloading some trojan virus to the

play08:55

uh to your pcs or laptops

play08:57

so let's proceed to the ten commandments

play08:59

of computer ethics according to computer

play09:01

ethics institute number one thou shall

play09:04

not use a computer to harm other people

play09:06

in any way number 2 thou shall not

play09:09

interfere with other people's work

play09:11

3 thou shall not sneak around in other

play09:14

people's computer files

play09:17

or thou shall not use computer to steal

play09:20

5. thou shall not use a computer to bear

play09:23

false fitness

play09:24

6 thou shall not copy or use propriety

play09:27

software for which you have not paid 7

play09:30

thou shall not use other people's

play09:31

computer resources without authorization

play09:34

or proper compensation

play09:36

number eight thou shall not appropriate

play09:38

other people's intellectual output

play09:40

nine now shall think about the

play09:43

consequences of the program you're

play09:45

writing or the system you are designing

play09:47

and number ten thou shall always use a

play09:50

computer in ways that ensure

play09:51

consideration and respect for your

play09:54

fellow humans so as students we should

play09:57

be reminded of the commandments of

play09:59

computer ethics

play10:02

so for our code of the day passwords i

play10:04

like underwear don't let people see it

play10:07

change it very often and you shouldn't

play10:09

share it with a stranger this is

play10:12

according to please

play10:15

so let's proceed to the different

play10:17

internet threats so an internal threat

play10:19

is a threat that can be used on the

play10:21

world web to disperse conceal and update

play10:24

themselves with the intention of

play10:25

facilitating cyber crime

play10:28

so we have here several internet threats

play10:30

the first one is a malware or malicious

play10:32

software so this is a virus which is

play10:35

loaded into a user's computer without

play10:38

the user's knowledge and perform

play10:39

malicious actions and can be transferred

play10:42

from one computer to another so this can

play10:44

be done through your flash drives or

play10:47

your

play10:48

cds and even your phones

play10:50

next we also have a worm which is a

play10:52

standalone malicious software that can

play10:54

self-replicate and propagate through

play10:56

computer networks without human help for

play10:58

example we have the i love you worm or

play11:01

love bug worm which is created by a

play11:03

filipino okay so this is done through

play11:06

the use of the

play11:08

email so once you have clicked that

play11:10

particular email the worm will

play11:12

self-replicate and later on your

play11:14

computer will shut down on its own

play11:18

so the i love you worm virus is a

play11:20

computer worm that is spread through

play11:21

email attachments in 2000 so i love you

play11:24

were best created by annel de guzman of

play11:26

the philippines and infecting about 45

play11:28

million

play11:29

machines worldwide leading to more than

play11:31

8 billion in damages okay so imagine how

play11:36

um he made a great impact on the

play11:39

different companies okay before

play11:43

uh another malaysia software is what we

play11:45

call a trojan so a trojan is disguised

play11:47

as a useful program but once downloaded

play11:50

or installed it leaves your pc

play11:52

unprotected and allows hackers to get

play11:54

into your information so it's just a

play11:57

particular software okay that can be

play11:59

downloaded on the different app stores

play12:01

or the web but be careful on the

play12:04

um

play12:05

on

play12:06

installing those applications maybe it

play12:08

be a project okay if you download it

play12:11

from untrusted websites

play12:14

we also have rogue security software

play12:16

it's similar with trojan but it takes

play12:18

you into posing that this is a security

play12:20

software it asks the users to pay to

play12:23

improve his or her security but in

play12:25

reality they are not protected at all so

play12:28

using the raw security software it may

play12:30

get your credit card details or debit

play12:32

card details so be careful on

play12:35

downloading several

play12:37

security software online

play12:39

we also have spyware which is a program

play12:41

that runs in the background without you

play12:43

knowing it thus it's called a spy it has

play12:46

the ability to monitor what you are

play12:47

typing okay and currently doing through

play12:50

the use of the

play12:52

webcam that you have on your computers

play12:55

okay actually this was an issue in the

play12:58

us before where people okay see what you

play13:02

are doing through the webcam without you

play13:04

knowing it okay

play13:05

next we also have keyloggers this is

play13:07

used to record the keystroke done by the

play13:09

users and this is done to steal the

play13:12

password or any sensitive information

play13:15

that you have on your phones or your

play13:17

lock types

play13:18

okay next we also have adware so these

play13:21

are usually um

play13:23

that pops up on the different websites

play13:25

that you go to so this is a program that

play13:27

is designed to send you advertisements

play13:29

mostly by pop-ups and some bots okay

play13:32

also do this to get your personal

play13:33

information so be careful on clicking

play13:36

some adwares

play13:38

okay number two internet threat is what

play13:40

we call a spam so this are unwanted

play13:42

email mostly from bots or advertisers

play13:44

and it can be used to send malware so be

play13:46

careful when opening some spam messages

play13:49

it can be used to get

play13:52

you um

play13:53

malwares

play13:55

next we also have shang okay this uh the

play13:58

goal of this is to acquire personal

play13:59

information like passwords and credit

play14:01

card details through emails okay so um

play14:05

sometimes banks okay or other government

play14:08

agencies send some

play14:09

email on you but be careful

play14:12

to check the

play14:14

email it comes from because sometimes

play14:16

the um some hackers may also uh use that

play14:20

as a means of getting the phishing um

play14:23

activity okay so another um example of

play14:27

uh

play14:28

activity of an internet threat is what

play14:30

we call farming this is a more

play14:32

complicated way of fishing where it

play14:34

exploits the dns okay which is an

play14:37

example which is people that

play14:38

incorporated or domain system if you see

play14:42

this there is a lock while this one that

play14:44

hasn't have a lock so um if you check

play14:47

the privacy policy this is more secured

play14:49

compared to this one so this can be an

play14:51

example of a farming website so be

play14:54

careful when checking the different

play14:56

websites

play14:58

so in summary of the different internet

play15:00

threads so we have malware under malware

play15:02

we have pyrus worm trojan or rogue

play15:05

security software spyware or keyloggers

play15:07

and adware we also have spam and fishing

play15:10

and farming so those are the different

play15:12

internet tracks

play15:15

so let's proceed to protecting our

play15:17

reputation online so nowadays

play15:19

embarrassing moments can be captured

play15:21

using any device um that you have okay

play15:24

even your smartphone can be used to do

play15:26

this okay and this could impact not only

play15:28

your reputation but also the people

play15:30

around you okay so sometimes okay um

play15:33

some funny moments can be recorded

play15:35

through your phones but be careful when

play15:38

posting it on the net because it can be

play15:40

degradable to his or her personality

play15:43

once you have posted it because many

play15:45

people will see it okay so

play15:48

if you want to post it on the net you

play15:49

just need to get the content of that

play15:51

particular person before you post it on

play15:54

this different social media that you

play15:55

have okay

play15:57

um it says here that once you have post

play15:59

something over the internet search

play16:00

engine keep them in their archives for

play16:02

search results and this makes anything

play16:04

you post to last forever and sets here

play16:06

the internet is forever that's why it's

play16:09

always um important to think before you

play16:12

click because all of the information

play16:14

that you will share on the websites or

play16:16

internet will just be there and it will

play16:19

not be deleted even if you delete it on

play16:21

purpose okay

play16:22

um

play16:23

those information will be saved in the

play16:25

different infrastructures or um

play16:28

database from the different websites

play16:30

that you go to okay so be careful on the

play16:33

things that you share on the net

play16:36

uh it says here before hiring companies

play16:39

do a background check on the applicant

play16:41

and the easiest way to check your

play16:42

background is to visit pages that are

play16:44

related to you okay so some companies

play16:47

now do

play16:48

social media checking okay to see what

play16:50

you are doing on your different accounts

play16:54

okay think before you click as i said a

play16:56

while ago so it says here that before

play16:58

you post something on the web ask this

play17:01

question to yourself would you want your

play17:02

parents or grandparents to see it in the

play17:04

future would you want your future boss

play17:06

to see it okay so think about this

play17:08

question before you post on things two

play17:11

your friends depend on you to protect

play17:12

your reputation online talk to your

play17:14

friends about this serious

play17:15

responsibility and when sharing some

play17:18

information please ask consent

play17:22

set your post to private as much as

play17:24

possible in this research engine will

play17:26

not be able to scan your post avoid

play17:28

using names names are easy to research

play17:30

engines to skype okay so think before

play17:34

you click

play17:36

and then number five if you feel that

play17:38

post can affect you or others reputation

play17:40

as the one who posted it to pull it down

play17:42

or report it as inappropriate especially

play17:44

on the different social media nowadays

play17:47

where people are clicking some adwares

play17:50

and then um some scandalous videos can

play17:52

be tagged on you so be careful with that

play17:55

okay so ask the person who posted it to

play17:58

put the post down okay so that's how you

play18:01

protect the reputation online

play18:04

okay so let's proceed to corporate

play18:05

infringement so meaning when we say

play18:08

copyright this is something that you

play18:11

create an idea an invention or a form of

play18:13

literary work or research and you have

play18:16

the right to ask how it should be used

play18:18

by others because basically you you are

play18:20

the one who created it so this is also

play18:22

known as your intellectual property so

play18:24

in other words the copyright is a law

play18:26

that includes your rights over your work

play18:28

and anyone who uses it without your

play18:30

consent is punishable by the law

play18:34

so what are the things that we need to

play18:36

consider when um

play18:38

avoiding copyright infringement so the

play18:40

first one is we need to understand okay

play18:42

so when we say understand copyright

play18:44

protects literary works photographs

play18:47

paintings drawings

play18:49

films music and lyrics choreography and

play18:51

sculptures but it generally does not

play18:54

protect underlying ideas and facts okay

play18:58

so you need to understand first okay

play19:00

before

play19:01

sharing those personal information or

play19:03

those literary works next be responsible

play19:07

even if the material does not say that

play19:08

it is copyrighted it is not valid

play19:10

defense against copyright that's why

play19:12

when researching online we always say as

play19:15

teachers to get the references because

play19:17

basically that's we one way of

play19:20

doing um

play19:22

or avoiding copyright infringement okay

play19:24

so when you search online getting those

play19:26

ideas okay if you paraphrase interface

play19:29

it you need to still get the reference

play19:31

from it okay because that's how we do

play19:34

um or avoid copyright infringement

play19:36

third one be creative ask yourself

play19:38

whether you are making it something that

play19:40

came from you or something made from

play19:42

somebody else's creativity okay so

play19:44

that's why we need to rephrase empire

play19:46

your face

play19:48

okay number four note the law there are

play19:50

some limitations of copyright law for

play19:51

instance in the philippines copyright

play19:53

law only lasts for

play19:55

[Music]

play19:56

the lifetime of the author and plus 50

play19:59

years and there are also provisions of

play20:00

areas which means that intellectual

play20:02

property may be used without consent so

play20:05

if you see some logo like this you may

play20:07

use the

play20:09

information but beside the sources

play20:13

so let's proceed to the six ways to

play20:15

avoid leisure asm so we need to

play20:17

paraphrase site code setting codes

play20:20

citing your own materials and

play20:22

referencing so it says here promote your

play20:25

original writing avoid plagiarism and

play20:27

uphold academic integrity

play20:31

so let's proceed to online research so

play20:33

what is the difference between madonna

play20:35

and the madonna so once you search this

play20:38

two information it will give different

play20:40

results so when we search madonna it

play20:42

means this is the singer while the

play20:45

madonna is the image of mother mary

play20:48

holding jesus christ so um in searching

play20:51

um we need to be specific because there

play20:54

will be some different information that

play20:56

will be

play20:58

gathered okay once we have

play21:00

clicked the button search on that

play21:03

okay so online researching what are the

play21:05

tips that we need to consider number one

play21:08

you need to have a question in mind

play21:09

meaning that you need to focus on the

play21:11

question you wanted to answer if it's a

play21:13

series of questions start with one and

play21:15

never search everything on the go so be

play21:18

specific just use the keywords in

play21:19

searching and then search your

play21:22

information

play21:23

next narrow it down meaning search

play21:25

engines like google bing or yahoo use

play21:27

several filters to determine the most

play21:29

appropriate result for you so be

play21:32

specific you need to narrow it down

play21:35

third advanced search is also one of the

play21:38

feature of different websites this is

play21:40

the way best way to filter information

play21:42

you get from search engines and this is

play21:45

by using the advanced search and this

play21:47

will allow you to filter out information

play21:49

you need okay so this is an ad and

play21:51

search in google so you may search all

play21:53

these words

play21:55

this exact words our face any of these

play21:57

words none of these words and number

play21:59

ranging from and so on so you just need

play22:01

to click or search on google and search

play22:03

and this will pop up and in your

play22:06

browsers

play22:08

number four you need to look for

play22:09

credible sources okay not all

play22:11

information on the web is credible so

play22:14

some wikis are not credible source this

play22:16

is due the fact that anyone can have or

play22:18

edit its content the more credible

play22:20

sources are scientific journals websites

play22:23

online encyclopedias and scholarly

play22:25

databases that's why on our google when

play22:28

we say scholarly articles those are more

play22:31

reliable compared to those that are not

play22:35

and last one is you need to give credit

play22:38

when researching online if you are going

play22:39

to use the information from a source of

play22:41

for educational purposes you need to

play22:44

give the reference to the original

play22:46

author of the page or information and do

play22:48

it properly okay and you may use the

play22:50

following format below for

play22:52

online research you may get the name of

play22:54

the person or organization

play22:56

the title of the home page in italics

play22:58

and url in the date classy so in summary

play23:02

of our discussion most teenagers spend

play23:04

their time online it is vital to

play23:06

consider that information you share

play23:08

because the internet is a public place

play23:11

there are several ways to stay safe

play23:12

online and this is essential that we

play23:15

know and apply them

play23:17

there are several threats that includes

play23:19

malware spams and fishing and malwares

play23:22

could be in the form of virus worms

play23:24

trojan spyware or eyewear and be careful

play23:27

on these particular threats because it

play23:30

may have great impact on our lives

play23:34

and we are responsible of what we post

play23:36

online it is also our responsibility to

play23:39

protect others reputation we should be

play23:42

mindful of what we post when others are

play23:45

involved

play23:47

and copyright lives protects the authors

play23:49

or producers of literary works

play23:51

photographs paintings and others from

play23:53

having their work used without their

play23:54

permission and it is important for

play23:56

everyone to understand the laws to avoid

play23:59

being sanctioned

play24:02

and when researching online remember to

play24:04

narrow down your topic use advanced

play24:06

search features look for credible source

play24:09

and cite your references

play24:13

[Applause]

Rate This

5.0 / 5 (0 votes)

Связанные теги
Online SafetyNetiquette RulesDigital EthicsInternet SecurityCyber ThreatsSocial MediaPrivacy ProtectionComputer EthicsCybercrime PreventionOnline Reputation
Вам нужно краткое изложение на английском?