You are on page 1of 24

Rules of Netiquette

Online security, safety,


and ethics
Internet threats
Protecting reputations
online
Copyright
Contextualized online
search and research
skills
Objectives
1. Know the appropriate and inappropriate online
behavior;
2. Identify deceptive information and wrongly
evaluated data; and
3. Understand the importance of making judgment
calls on possible implications and consequences of
making certain information public.
Media vs Digital Media

Media is the main means of mass communication


(broadcasting, publishing, and the Internet), regarded
collectively.

Digital media and technologies are electronic devices and


media platforms such as computers, cell phones, digital video,
social networking sites, the Internet, video games, and virtual
worlds, which allow users to create, communicate and interact
with one another or with the device or application themselves.
Digital Life 101
How does your digital media
life look like?
• My media life is like a _________ , because
______________.
• This statement is a simile, a literary device for comparing two
unlike things.
• For instance, someone who does not use much media might
say that her media life is like a desert, because there is little
life there.
• Someone might say that his media life is like a track meet,
because he is exhausted at the end of the day.
Internet

(sometimes with a capital) the internet, the single worldwide


computer network that interconnects other computer
networks, on which end-user services, such as World Wide Web
sites or data archives, are located, enabling data and other
information to be exchanged. Also known as the Net.

Source: internet. (n.d.). Collins English Dictionary - Complete &


Unabridged 10th Edition. Retrieved November 21, 2016 from
Dictionary.com website
http://www.dictionary.com/browse/internet
Language in the Digital Media
Netizen - a term used to describe people who avidly use the Internet
Digital citizen - has grown in use amid concerns that more people,
especially young people, need to learn how to safely and effectively
navigate the Internet.
Netiquette - the rules of etiquette for communicating online
Web – World Wide Web
IM – instant message
email, e-learning, e-wallet, e-signature, and e-commerce
Surfed the web, browse or search the web
An SMS, or text message, is a short message of fewer than 160
characters sent from a cell phone. An
MMS is a text message that contains an attached multimedia file,
such as a picture or song.
Language in the Digital Media
Avatar – a two- or three-dimensional icon that represents a computer
user or a gamer. It can be a cartoonish graphic, a photograph, a
screen name, or a fully-developed character.
Mash-up - a remix or blend of multiple songs, videos, or other media
content into one product. Fan fiction writing is one form of a mash-
up, as writers take characters from a well-known video game, movie,
or book, and rewrite their actions or relationships.
P2P or Peer-to-Peer network- allows sharing of mp3s, videos, and
other digital files by transferring information directly between two
computers rather than by going through a central server. Ex. Skype
Podcast – a downloadable video or audio file. Podcasts can be verbal,
based on a certain topic, or can include music, video and
commentary.
Language in the Digital Media
Aggregator - a website or Web application where headlines and other
content are collected for easy viewing. Aggregators such as Google
News compile news articles and posts.
Blog, from the term “weblog, ” - a type of website usually updated by
an individual or a group of bloggers. Some blogs provide news or
opinions on a specific subject, while others are more like online
journals. Most blogs allow readers to leave comments on blog posts.
Flaming - the act of saying mean things online, usually in ALL CAPS,
and often in a public forum with the intention to humiliate. Flame
wars can occur easily online, as it can be difficult to figure out
people’s intentions or emotions online.
Massively multiplayer online game (MMOG) - usually an online virtual
world that multiple players navigate and play in together. While in
this virtual world, their avatars chat, cooperate, and quest together,
oftentimes towards a goal.
Take the quiz!
1. 82% of teens say that they own which of the following?
a) cell phone
b) smartphone
c) iPod Touch or similar device
d) iPad or similar device
2. What percent of teens describe themselves as “addicted” to
their cell phones?
a) 11%
b) 27%
c) 41%
d) 63%
Take the quiz!
3. 68% of teens say they do which of the following at least once
a day?
a) text
b) visit a social network
c) instant message (IM)
d) use email
4. How many characters (letters, punctuation marks, symbols,
and spaces) can you send in a regular text message?
a) 110
b) 140
c) 200
d) 250
Take the quiz!
5. How often do 34% of teens visit social networking sites?
a) at least once a day
b) several times a day
c) once a week or less
d) never
6. What percent of teens say that they don’t understand their
social networking site’s privacy policies?
a) 24%
b) 35%
c) 46%
d) 61%
Take the quiz!
7. What percent of teens still prefer face-to-face communication
with their friends over communication online or via texting?
a) 22%
b) 36%
c) 49%
d) 61%
8. What percent of teens say they have said something bad
about someone online that they wouldn’t have said in person?
a) 33%
b) 67%
c) 49%
d) 25%
Take the quiz!
9. What percent of teens say that social networking helps them
connect with people who share a common interest?
a) 35%
b) 42%
c) 57%
d) 66%
10. What percent of teens agreed they wish they could “unplug”
for a while?
a) 13%
b) 27%
c) 29%
d) 43%
Answers to the quiz!
1. a
2. c
3. a
4. b
5. b
6. a
7. c
8. d
9. c
10. d
Type of Information and
its related risk
1. First name – a hacker may already know plenty of stuff
about you even if you only give out your first name. You
cannot just walk in a room and start introducing yourself to
everyone. You do not know whom you can come across
with.
2. Last name – vulnerable to being searched for using search
engines, which include image search. Matching a name with
a face is a modus to several cybercrimes like identity theft.
3. Middle name – most risky
4. Current and previous school(s) – most people who steal
identities study their subject. They can use this information
for verification purposes.
Type of Information and
its related risk
5. Your cellphone number – should never be posted over the
Internet. The Internet is a public place (information
superhighway). You would not want random strangers to
text or call you, or worse, pretend that they are someone
else.
6. The name of your mother and father – risky (posting their
full names). You encountered many websites that require
your mother’s maiden name as an answer to a secret
question whenever you lose your password.
7. The name of your siblings – strangers may pretend or use
their identity to dupe you.
Type of Information and
its related risk
8. Your address – easier for criminals to find you.
9. Your home phone number – scams usually use this
information to deceive you, one of which is when a stranger
pretends to know your parents or pretends to be you.
10. Your birthday – if you want to get as many gifts as possible.
But having it in your profile makes you vulnerable to
identity theft.

You may not experience the threat now, whatever information


we share today could affect our future.
Watch: Dangers of Oversharing
on the Internet
Watch: Online Safety, Security,
Ethics, and Etiquette
8. Your address – easier for criminals to find you.
9. Your home phone number – scams usually use this
information to deceive you, one of which is when a stranger
pretends to know your parents or pretends to be you.
10. Your birthday – if you want to get as many gifts as possible.
But having it in your profile makes you vulnerable to
identity theft.

You may not experience the threat now, whatever information


we share today could affect our future.
Internet Threats
1. Malware – malicious software
a) Virus – replicate it self and transfer from one computer to
another either through the Internet and local networks or
data storage like flash drives and CDs
b) Worm – transfer from one computer to another by any type
of means. Often, it uses a computer network to spread it self.
Ex. ILOVEYOU worm (Love Bug Worm)
c) Trojan – disguised as a useful program but once downloaded
or installed, leaves your PC unprotected and allows hackers to
get your information.
Internet Threats
d) Spyware – runs in the background without knowing it (“spy”).
It has the ability to monitor what you are currently doing and
typing through keylogging.
*Keyloggers – used to record the keystroke done by the users.
This is done to steal their passwords or any other sensitive
information. It can record email, messages, or any information
you type using your keyboard.
e) Adware – send you advertisements, mostly as pop-ups.
2. Spam – unwanted email mostly from advertisers. It can be
used to send malware.
Internet Threats
3. Phishing – acquire sensitive personal information like
passwords and credit card details. This is done by sending
you an email that will direct the user to visit a website and
be asked to update his/her username, password, credit card
details, or personal information.
*Pharming – a more complicated way of phishing where it
exploits the DNS (Domain Name Service) system.
Think Before You Click
1. Before you post something on the web, ask these questions to
yourself: Would you want your parents or grandparents to see it?
Would you want your future boss to see it? Once you post
something on the web, you have no control of who sees your
posts.
2. Your friends depend on you to protect their reputation online.
Talk to your friends about this serious responsibility.
3. Set your post to “private”. In this way, search engines will not be
able to scan that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the
one who posted it to pull it down or report it as in appropriate.

You might also like