SlideShare una empresa de Scribd logo
1 de 19
ICT SAFETY,
SECURITY, AND
NETIQUETTE
11 - SAINT CATHERINE OF SIENA
ICT
SAFETYONLINE SAFETY
ONLINE SAFETY
➤ THE MORE INFORMATION YOU
PUT OR USE ONLINE, THE
HIGHER THE RISK PLACED ON
YOUR ONLINE SAFETY.
➤ RISKS SUCH AS:
— IDENTITY THEFT,
— PHISHING, AND
— MALWARE INFECTIONS
➤ IT IS YOUR RESPONSIBILITY TO
SECURE YOUR INFORMA-TION
ONLINE AS WELL AS MAINTAIN
GOOD ETIQUETTE WHEN
USING THESE SERVICES.
ICT
SECURI
TYVERIFICATION OF ONLINE
SOURCE MATERIALS
CRITERIA FOR
EVALUATION➤ CURRENCY
— IS THE INFORMATION UP-
TO-DATE?
➤ SECURITY
— DOES THE SITE ASK TOO
MUCH INFORMATION?
➤ SCOPE
— IS THE INFORMATION IN-
DEPTH?
➤ AUTHORITY
— DOES THE INFOR-MATION
COME FROM A TRUSTED
EXPERT?
ICT
NETIQUE
TTE
COMPUTER ETHICS
COMPUTER
ETHICS➤ A NEW BRANCH OF ETHICS
THAT IS CONCERNED WITH
STANDARDS OF CONDUCT
IN THE USE OF
COMPUTERS.
➤ DEALS WITH HOW COM-
PUTING PROFESSIONALS
SHOULD MAKE DECISIONS
REGARDING PROFES-
SIONAL AND SOCIAL
CONDUCT.
“
— A SET OF STANDARDS TO GUIDE
AND INSTRUCT PEOPLE.
From the paper of
Ramon C. Barquin, 1992
Computer Ethics Institute created the Ten Commandments of Comp
Ethics in 1992 entitled;
IN PURSUIT OF A TEN COMMANDMENTS
where it is a means to create —
ICT
NETIQUE
TTETHE TEN COMMANDMENTS
OF COMPUTER ETHICS
1. THOU SHALT NOT USE A COMPUTER TO HARM IN ANY
WAY.
2. THOU SHALT NOT INTERFERE WITH OTHER PEOPLE’S
COMPUTER WORK.
3. THOU SHALT NOT SNEAK AROUND OTHER PEOPLE’S
FILES.
4. THOU SHALT NOT USE A COMPUTER TO STEAL.
5. THOU SHALT NOT USE A COMPUTER TO BEAR FALSE
WITNESS.
6. THOU SHALT NOT COPY OR USE PROPRIETARY
SOFTWARE FOR WHICH YOU HAVE NOT PAID.
7. THOU SHALT NOT USE OTHER PEOPLE’S COMPUTER
RESOURCES WITHOUT AUTHORISATION OF PROPER
COMPENSATION.
8. THOU SHALT NOT APPROPRIATE OTHER PEOPLE’S
INTELLECTUAL OUTPUT.
9. THOU SHALT THINK ABOUT THE SOCIAL
CONSEQUENCES OF THE PROGRAM YOU ARE WRITING
OR THE SYSTEM YOU ARE DESIGNING.
10. THOU SHALT ALWAYS USE A COMPUTER IN WAYS
THAT ENSURE CONSIDERATION AND RESPECT FOR YOUR
FELLOW HUMANS.
ICT
NETIQUE
TTE
INTERNET ETHICS
INTERNET
ETHICS➤ OR NETIQUETTE
➤ IS A SET OF RULES THAT
DETERMINES HOW TO
PROPERLY COMMUNICATE
AND BROWSE THE WEB.
GOOD PRACTICES IN USING THE
INTERNET
1. ALWAYS KEEP YOUR SOFTWARE OR APPLICATION
UPDATED AND UNINSTALL THE ONES THAT YOU DO
NOT USE.
2. DO NOT DIVULGE SENSITIVE INFORMATION ONLINE,
ESPECIALLY ON UNSAFE WEBSITES.
3. BE CAREFUL WHEN DEALING WITH EMAILS FROM
UNKNOWN SOURCES OR SPAM.
4. RUN YOUR ANTIVIRUS SOFTWARE BEFORE GOING
ONLINE.
5. THINK BEFORE YOU CLICK.
ICT
SECURI
TYINTELLECTUAL
PROPERTY
➤ The biggest issue surrounding ICT concerns the violation of
Intellectual Property Rights (IPR), which is the act of stealing other
people's works and ideas, whether knowingly or unknowingly.
➤ Intellectual Property Laws (IPL) protect the rights of people to
maintain legal ownership of their works and ideas. But IPR is not
given right: they have to be applied for and granted to the applicant
by the proper authorities.
➤ Granting ownership of an idea to a person is not an easy thing to do.
➤ Art works, novels, short stories, poems, music and movies are the
only some of the copyright things that are available on the Internet.
ICT
SAFETYAVOIDING PLAGIARISM
SIX WAYS TO
AVOID
PLAGIARISM IN
RESEARCH
PAPERS1. PARAPHRASE
2. CITE
3. QUOTING
4. CITING QUOTES
5. CITE YOUR OWN MATERIAL
6. REFERENCING
EMPOWERMEN
T
TECHNOLOGY 11

Más contenido relacionado

La actualidad más candente

EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)bloodyblade06
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of NetiquetteLeelet1121
 
Contextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsContextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsJohnBarsaga
 
Empowerment technologies byShyna Gane Daleon and Galasao
Empowerment technologies byShyna Gane  Daleon and Galasao Empowerment technologies byShyna Gane  Daleon and Galasao
Empowerment technologies byShyna Gane Daleon and Galasao janelle17
 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and EtiquetteLea Rodriguez
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Jesus Rances
 
Empowerment technology Group 7
Empowerment technology Group 7Empowerment technology Group 7
Empowerment technology Group 7FrancisJuanson1
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Lesson 1 introduction to ict
Lesson 1   introduction to ictLesson 1   introduction to ict
Lesson 1 introduction to ictACLC Antipolo
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1alicelagajino
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technologypizonaim
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Jesus Rances
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT TechnologiesMaria Eloisa Blanza
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesMark Jhon Oxillo
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologiesDeped
 
Lesson 3 advanced word processing skills
Lesson 3 advanced word processing skillsLesson 3 advanced word processing skills
Lesson 3 advanced word processing skillsEmmanuelaSernicul
 
Contextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsContextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsAngelito Quiambao
 
Online Systems, Functions, and Platforms
Online Systems, Functions, and PlatformsOnline Systems, Functions, and Platforms
Online Systems, Functions, and PlatformsMaria Eloisa Blanza
 

La actualidad más candente (20)

EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
EMPOWERMENT TECHNOLOGY (INTRODUCTION TO INFORMATION COMMUNICATION TECHNOLOGY)
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Contextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsContextualized online-search-and-research-skills
Contextualized online-search-and-research-skills
 
Empowerment technologies byShyna Gane Daleon and Galasao
Empowerment technologies byShyna Gane  Daleon and Galasao Empowerment technologies byShyna Gane  Daleon and Galasao
Empowerment technologies byShyna Gane Daleon and Galasao
 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and Etiquette
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
 
Empowerment technology Group 7
Empowerment technology Group 7Empowerment technology Group 7
Empowerment technology Group 7
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Lesson 1 introduction to ict
Lesson 1   introduction to ictLesson 1   introduction to ict
Lesson 1 introduction to ict
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT Technologies
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologies
 
Lesson 3 advanced word processing skills
Lesson 3 advanced word processing skillsLesson 3 advanced word processing skills
Lesson 3 advanced word processing skills
 
Contextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsContextualized Online Search and Research Skills
Contextualized Online Search and Research Skills
 
Online Systems, Functions, and Platforms
Online Systems, Functions, and PlatformsOnline Systems, Functions, and Platforms
Online Systems, Functions, and Platforms
 

Similar a EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE

Computer & Internet Security.pptx
Computer & Internet Security.pptxComputer & Internet Security.pptx
Computer & Internet Security.pptxPratheeshKumarN
 
The current state of ict technologies.pptx
The current state of ict technologies.pptxThe current state of ict technologies.pptx
The current state of ict technologies.pptxMerlindaCarillo
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and securityAjay Singh
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsgppcpa
 
Smart-phone-with-Chains-PowerPoint-Widescreen (1)
Smart-phone-with-Chains-PowerPoint-Widescreen (1)Smart-phone-with-Chains-PowerPoint-Widescreen (1)
Smart-phone-with-Chains-PowerPoint-Widescreen (1)Tanvi Jindal
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & SecurityNetstarterSL
 
recent trends in technology.pptx
recent trends in technology.pptxrecent trends in technology.pptx
recent trends in technology.pptxkeerthivemireddy
 
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverMindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverPJStarr
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2JeffUrgelles
 

Similar a EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE (20)

INT 1010 10-3.pdf
INT 1010 10-3.pdfINT 1010 10-3.pdf
INT 1010 10-3.pdf
 
cybersecurity-101_4
cybersecurity-101_4cybersecurity-101_4
cybersecurity-101_4
 
Computer & Internet Security.pptx
Computer & Internet Security.pptxComputer & Internet Security.pptx
Computer & Internet Security.pptx
 
The current state of ict technologies.pptx
The current state of ict technologies.pptxThe current state of ict technologies.pptx
The current state of ict technologies.pptx
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Smart-phone-with-Chains-PowerPoint-Widescreen (1)
Smart-phone-with-Chains-PowerPoint-Widescreen (1)Smart-phone-with-Chains-PowerPoint-Widescreen (1)
Smart-phone-with-Chains-PowerPoint-Widescreen (1)
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 
recent trends in technology.pptx
recent trends in technology.pptxrecent trends in technology.pptx
recent trends in technology.pptx
 
Mis chapter 9
Mis chapter 9Mis chapter 9
Mis chapter 9
 
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverMindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no cover
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Webgraphicorganizerkaur
WebgraphicorganizerkaurWebgraphicorganizerkaur
Webgraphicorganizerkaur
 
Webgraphicorganizerkaur
WebgraphicorganizerkaurWebgraphicorganizerkaur
Webgraphicorganizerkaur
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
 
ke-1.pptx
ke-1.pptxke-1.pptx
ke-1.pptx
 
Network security
Network securityNetwork security
Network security
 
TOPIC7.pptx
TOPIC7.pptxTOPIC7.pptx
TOPIC7.pptx
 

Último

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 

Último (20)

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 

EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE

  • 1. ICT SAFETY, SECURITY, AND NETIQUETTE 11 - SAINT CATHERINE OF SIENA
  • 3. ONLINE SAFETY ➤ THE MORE INFORMATION YOU PUT OR USE ONLINE, THE HIGHER THE RISK PLACED ON YOUR ONLINE SAFETY. ➤ RISKS SUCH AS: — IDENTITY THEFT, — PHISHING, AND — MALWARE INFECTIONS ➤ IT IS YOUR RESPONSIBILITY TO SECURE YOUR INFORMA-TION ONLINE AS WELL AS MAINTAIN GOOD ETIQUETTE WHEN USING THESE SERVICES.
  • 5. CRITERIA FOR EVALUATION➤ CURRENCY — IS THE INFORMATION UP- TO-DATE? ➤ SECURITY — DOES THE SITE ASK TOO MUCH INFORMATION? ➤ SCOPE — IS THE INFORMATION IN- DEPTH? ➤ AUTHORITY — DOES THE INFOR-MATION COME FROM A TRUSTED EXPERT?
  • 7. COMPUTER ETHICS➤ A NEW BRANCH OF ETHICS THAT IS CONCERNED WITH STANDARDS OF CONDUCT IN THE USE OF COMPUTERS. ➤ DEALS WITH HOW COM- PUTING PROFESSIONALS SHOULD MAKE DECISIONS REGARDING PROFES- SIONAL AND SOCIAL CONDUCT.
  • 8. “ — A SET OF STANDARDS TO GUIDE AND INSTRUCT PEOPLE. From the paper of Ramon C. Barquin, 1992 Computer Ethics Institute created the Ten Commandments of Comp Ethics in 1992 entitled; IN PURSUIT OF A TEN COMMANDMENTS where it is a means to create —
  • 10. 1. THOU SHALT NOT USE A COMPUTER TO HARM IN ANY WAY. 2. THOU SHALT NOT INTERFERE WITH OTHER PEOPLE’S COMPUTER WORK. 3. THOU SHALT NOT SNEAK AROUND OTHER PEOPLE’S FILES. 4. THOU SHALT NOT USE A COMPUTER TO STEAL. 5. THOU SHALT NOT USE A COMPUTER TO BEAR FALSE WITNESS. 6. THOU SHALT NOT COPY OR USE PROPRIETARY SOFTWARE FOR WHICH YOU HAVE NOT PAID.
  • 11. 7. THOU SHALT NOT USE OTHER PEOPLE’S COMPUTER RESOURCES WITHOUT AUTHORISATION OF PROPER COMPENSATION. 8. THOU SHALT NOT APPROPRIATE OTHER PEOPLE’S INTELLECTUAL OUTPUT. 9. THOU SHALT THINK ABOUT THE SOCIAL CONSEQUENCES OF THE PROGRAM YOU ARE WRITING OR THE SYSTEM YOU ARE DESIGNING. 10. THOU SHALT ALWAYS USE A COMPUTER IN WAYS THAT ENSURE CONSIDERATION AND RESPECT FOR YOUR FELLOW HUMANS.
  • 13. INTERNET ETHICS➤ OR NETIQUETTE ➤ IS A SET OF RULES THAT DETERMINES HOW TO PROPERLY COMMUNICATE AND BROWSE THE WEB.
  • 14. GOOD PRACTICES IN USING THE INTERNET 1. ALWAYS KEEP YOUR SOFTWARE OR APPLICATION UPDATED AND UNINSTALL THE ONES THAT YOU DO NOT USE. 2. DO NOT DIVULGE SENSITIVE INFORMATION ONLINE, ESPECIALLY ON UNSAFE WEBSITES. 3. BE CAREFUL WHEN DEALING WITH EMAILS FROM UNKNOWN SOURCES OR SPAM. 4. RUN YOUR ANTIVIRUS SOFTWARE BEFORE GOING ONLINE. 5. THINK BEFORE YOU CLICK.
  • 16. ➤ The biggest issue surrounding ICT concerns the violation of Intellectual Property Rights (IPR), which is the act of stealing other people's works and ideas, whether knowingly or unknowingly. ➤ Intellectual Property Laws (IPL) protect the rights of people to maintain legal ownership of their works and ideas. But IPR is not given right: they have to be applied for and granted to the applicant by the proper authorities. ➤ Granting ownership of an idea to a person is not an easy thing to do. ➤ Art works, novels, short stories, poems, music and movies are the only some of the copyright things that are available on the Internet.
  • 18. SIX WAYS TO AVOID PLAGIARISM IN RESEARCH PAPERS1. PARAPHRASE 2. CITE 3. QUOTING 4. CITING QUOTES 5. CITE YOUR OWN MATERIAL 6. REFERENCING