Lesson 2
Lesson 2
LESSON 2:
RULES OF NETIQUETTE
LESSON
OBJECTIVES:
At the end of this, the students Page 17 in Empowerment Technologies
should be able to: Book (Second Edition)
consider one's and others'
safety when sharing
information using the
Internet
consider one's and others'
reputation when using the
Internet
determine and avoid the
dangers of the Internet
be responsible in the use of
social networking sites; and
browse the Internet
efficiently and properly
through proper WHAT IS
referencing.
'NETIQUETTE?' DEFINITION
IMPORTANCE
ONLINE SAFETY
AND SECURITY
INFORMATION RISKS
INFORMATION RISKS
TIPS TO
STAY SAFE
ONLINE
Page 21 to 22 (Empowerment
Technologies Book)
1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read them.
3. Check out the privacy policy page of a website to learn how the
website handles the information you share.
4. Know the security features of the social networking site you use. By
keeping your profile private, search engines will not be able to scan
your profile
5. Do not share any of your password with anyone.
6. Avoid logging in to public networks/Wi-Fi. Browsing in "incognito"
(or private) mode, a feature of the browser, will not protect you from
hackers.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about a future vacation. It is similar posting,
"Rob my house at this date."
9. Add friends you know in real life and refrain from adding strangers.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your computer. Use only
one anti-virus software to avoid conflicts.
12. If you have Wi-Fi at home, make it a private network by creating a
password.
13. Avoid downloading anything from untrusted websites. You are most
vulnerable in peer-to-peer downloads (torrents) as the download is
most likely not monitored by the site owner.
14. But the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails.
Lesson 2 Empowerment Technologies
INTERNET THREATS
Here are some of the threats you should be aware of when using
the Internet:
Page 22 (Empowerment
Technologies Book
Lesson 2 Empowerment Technologies
d. SPYWARE - unwanted
email mostly from bots or
advertisers. It can be used
to send malware.
1. *KEYLOGGERS - used
to record the keystroke
done by the users. This
is done to steal their
password or any other
sensitive information.
It can record email,
messages, or any
information you type
using your keyboard.
e. ADWARE - a program
designed to send you
advertisements, mostly as pop-ups.
Page 24 (Empowerment
Technologies Book)
SOME
your parents or grandparents to see it?
Would you want your future boss to
THINGS see it? Once you post something on
the web, you have no control of who
YOU MIGHT WANT TO can see your post.
CONSIDER BEFORE 2. Your friends depend on you to protect
POSTING SOMETHING their reputation online. Talk to your
ON THE INTERNET: friends about this serious
responsibility.
3. Set your post to "private". In this way,
search engines will not be able to scan
In the past, doing
that post.
something embarrassing 4. Avoid using names. Names are easy
was not much of a big for search engines to scan.
deal. It happened; people 5. If you feel that a post can affect you or
would laugh at it, and other's reputation, ask the one who
they would move on. posted it to take it down or report it as
inappropriate.
Lesson 2 Empowerment Technologies
COPYRIGHT
INFRINGEMENT
As a responsible Internet user, you have to consider that not
everything out there is free for you to use. Just like your own,
contents that you see from websites have their respective
copyrights. There are several instances where employees or
business owners face copyright infringement and are
sentenced to a huge fine due to reckless copying of
materials.
ONLINE
RESEARCH
PAGE 25 TO 30
Lesson 2 Empowerment Technologies
Figure 1. Google Search results when you use "Madonna" as your keyword.
Figure 2. Google Search results when you use "The Madonna" as your
keyword.
Page 26 to 30 (Empowerment
Technologies Book)
Lesson 2 Empowerment Technologies
Once you are done, you can now filter your search results:
Page 28 (Empowerment
Technologies Book)
SYMBOL FUNCTION
Find web pages that contain all the terms that are
+ preceded by the + symbol; allows you to include terms
that are usually ignored.
AND or & Finds wed pages that contain all the terms or phrases
Page 28 (Empowerment
Technologies Book)
READ!
4. LOOK FOR A CREDIBLE SOURCE.
Some wikis, though filled with updated information, are not credible
sources. This is because anyone can edit its content. When using wikis,
check out the link of the cited text (indicated by superscript number)
to be navigated to the footnote where the list of sources is located.
Click the source of the information and see if it is credible.
Page 29 (Empowerment
Technologies Book)
READ!
5. GIVE CREDIT.
If you are going to use pieces of information from a source for
educational purposes, give credit to the original author of the page or
information. To properly cite a reference, you may use the format
below:
EXAMPLES:
Lapiz, Adrian Harold L. "Oleander's Fun Facts about Bananas."
https://oleander.penz.com/random/bananalove.htm. Last viewed on September 7, 2015.
KEY TERMS
TO REMEMBER