0% found this document useful (0 votes)
33 views

MELC 2

Uploaded by

chyna par
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views

MELC 2

Uploaded by

chyna par
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 34

LESSON 2

OBJECTIVES:
1. Discuss online safety, security, ethics,
and netiquette standards.

2.Practice in the use of ICT’s as it would relate to


their specific professional tracks.

3. Perform the task using differentiated


classroom instruction activity.
ETECH - EMPOWERMENT TECHNOLOGIES
QUOTE OF THE DAY:
“WITH GREAT POWER
COMES GREAT
RESPONSIBILITY.”
- Uncle Ben
QUESTION:
What are your ideas about
online safety and ethics, &
netiquette standards?
INTRODUCTION
▪The INTERNET is a vast network of
computers where many users, content, tools,
and resources are made accessible.

▪The INTERNET, truly, is a powerful tool as it is


considered as the “Information
Superhighway” .
INTRODUCTION
▪It can be used to promote your business, gain
new friends, and stay in touch with the old
ones. It is also a source of entertainment.

▪The Internet is one of the most dangerous


places, especially if you do not know what you
are doing.
Are we
safe and
secure
online?
QUESTION:
What is the difference
between safety from
security?
DEFINITIONOF TERMS:
▪ SAFETY - the condition of being protected
from or unlikely to cause danger, risk, or
injury.

▪ SECURITY - the state of being free from


danger or threat.
COMPUTER
ETHICS
▪ It is a new branch of ethics that is concerned
with standards of conduct in the use of
computers.

▪It deals with how computing professionals


should make decisions regarding professional
and social conduct.
TEN COMMANDMENTS OF COMPUTER ETHICS

▪Created by the COMPUTER ETHICS INSTITUTE


in 1992.
▪Following the 1987 MEMO ON ETHICS of the
Internet Advisory Board.
▪Introduced by RAMON C. BARQUIN in his paper
entitled “In Pursuit of a ‘Ten Commandments’ for
Computer Ethics.”
TEN COMMANDMENTS
OF COMPUTER ETHICS
TEN COMMANDMENTS OF COMPUTER ETHICS

1. Thou shalt not use a computer to


harm other people in any way.

2. Thou shalt not interfere with other


people’s computer work.
TEN COMMANDMENTS OF COMPUTER ETHICS

3. Thou shalt not sneak around in


other people’s computer files.

4. Thou shalt not use a computer to


steal.
TEN COMMANDMENTS OF COMPUTER ETHICS

5. Thou shalt not use a computer to


bear false witness.

6. Thou shalt not copy or use


proprietary software for which you
have not paid.
TEN COMMANDMENTS OF COMPUTER ETHICS

7. Thou shalt not use other people’s


computer resources without
authorization or proper compensation.

8. Thou shalt not appropriate other


people’s intellectual output.
TEN COMMANDMENTS OF COMPUTER ETHICS

9. Thou shalt think about the social


consequences of the program you are
writing or the system you are designing.

10. Thou shalt always use a computer in


ways that ensure consideration and respect
for your fellow humans.
ICT SAFETY, SECURITY and NETIQUETTE
NETIQUETTE
- It is the correct or acceptable
way of communicating on the
Internet.
Rule 1: Remember the Human
▪When communicating electronically, whether through email, instant
message, discussion post, text, or some other method, practice the
Golden Rule: Do unto others as you would have others do unto you.
Rule 2: Adhere to the same standards of behavior online that you
follow in real life
▪While it can be argued that standards of behavior may be different in
the virtual world, they certainly should not be lower.You should do
your best to act within the laws and ethical manners of society
whenever you inhabit "cyberspace."
Rule 3: Know where you are in cyberspace
▪"Netiquette varies from domain to domain." (Shea, 1994) Depending
on where you are in the virtual world, the same written
communication can be acceptable in one area, where it might be
considered inappropriate in another.
Rule 4: Respect other people's time and bandwidth
▪Electronic communication takes time: time to read and time in which
to respond. Most people today lead busy lives, just like you do, and
don't have time to read or respond to frivolous emails or discussion
posts.

Rule 5: Make yourself look good online


▪One of the best things about the virtual world is the lack of judgment
associated with your physical appearance, sound of your voice, or the
clothes you wear .You will, however, be judged by the quality of your
writing, so keep the following tips in mind:
• Always check for spelling and grammar errors , Know what you're
talking about and state it clearly, Be pleasant and polite
Rule 6: Share expert knowledge
The Internet offers its users many benefits; one is the ease
in which information can be shared or accessed and in
fact, this "information sharing" capability is one of the
reasons the Internet was founded.

Rule 7: Help keep flame wars under control


What is meant by "flaming" and "flame wars?"
"Flaming is what people do when they express a
strongly held opinion without holding back any
emotion." (Shea, 1994).
Rule 8: Respect other people's privacy
▪Depending on what you are reading in the virtual world, be it an online
class discussion forum, Facebook page, or an email, you may be exposed to
some private or personal information that needs to be handled with care.
Rule 9: Don't abuse your power
▪Just like in face-to-face situations, there are people in cyberspace who have
more "power" than others. They have more expertise in technology or they
have years of experience in a particular skill or subject matter.
Rule 10: Be forgiving of other people's mistakes
▪Not everyone has the same amount of experience working in the
virtual world. And not everyone knows the rules of netiquette.

Adapted from The Core Rules of Netiquette Shea,V. (1994). Core rules of netiquette. Netiquette (Online ed., pp. 32-45). San Francisco: Albion Books.
WRAP-UP:
What is the importance of
learning the Online safety,
security, ethics, and
Netiquette?
Present the following 10 Netiquette Rules
using differentiated instructions.
1 Song (Cover) Composition
2 Newscasting
3 Public Service Announcement
4 Spoken Poetry
5 Talk Show
POSTER
MAKING
Directions: Create a
(digital/traditional )poster
using any editing software
with the theme “Whoever
controls the media,
controls the culture”.

You might also like