0% found this document useful (0 votes)
59 views47 pages

LESSON 2 - Rules of Netiquette - Students'

Includes The rules of netiquette, Information about Contextualized online search and research skills, importance of research, etc.

Uploaded by

Connopy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views47 pages

LESSON 2 - Rules of Netiquette - Students'

Includes The rules of netiquette, Information about Contextualized online search and research skills, importance of research, etc.

Uploaded by

Connopy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 47

LESSON 2:

RULES OF NETIQUETTE
LEARNING OBJECTIVES
• Use the Internet as a tool for credible
research and information gathering;
• Gain awareness on cybercrimes;
• Differentiate copyright infringement and
plagiarism; and
• Practice computer ethics, online safety, and
security.
LESSON OUTLINE:
A. Rules of Netiquette B. Computer Ethics
• Internet as a tool for effective C. Copyright Infringement
research • Copyright
• Research • Infringement
• Importance of research • Copyright Infringement vs.
• Research skills Plagiarism

• Verification of online source


materials
INITIAL ACTIVITY:
Where do you often get information for your projects?
Fill out the graphic organizer below.
Identify which of the following information have
you shared online.
Now, try using a search engine like Google then
type your first and last name. Did you get links to
your profile page? Try switching to image search
Did your pictures appear?
Contextualized Online Search
And Research Skills
Contextualized Online Search and Research Skills or
optimized way of searching the internet based on the
“context” provided, therefore narrowing down the results
given back to you by the search engine (Feldman 2012).
This increases the chances of you receiving the most
appropriate reply to your query.
Alex, a senior in high school, has
been given the task by Mr.
EXAMINE AND
Johnson, their history teacher, to
REALIZE
learn about and prepare a
presentation on a significant
historical figure. Alex begins by
generating a list of notable
historical personalities they find
intriguing. They choose to explore
Nikola Tesla, the renowned
inventor and electrical
engineer since they are
passionate about science and
invention.
AFTER RESEARCH
WHAT IS RESEARCH?
WHY IS RESEARCH IMPORTANT?
WHAT ARE THE RESEARCH SKILLS I NEED TO
DEVELOP?
VERIFICATION OF ONLINE SOURCE MATERIALS

Currency Security Scope Authority


Is the Does the site Is the Does the
information up- ask too much information in- information
to-date? personal depth? come from a
information? trusted expert?
COMPUTER ETHICS &
NETIQUETTE
Internet ethics or netiquette is a set of
rules that determine how to properly
communicate and browse the web.
The following are some of the good
practices when using the Internet:
1. Always keep your software or application
updated and uninstall the ones that you do not use.
2. Do not divulge sensitive information online,
especially on unsafe websites.
3. Be careful when dealing with emails from
unknown sources or spam.
4. Run your antivirus software before going
online.
5. Think before you click. What you post on the
internet may stay online forever.
CORE RULES OF
NETIQUETTE
1. Remember the human
2. Adhere to the same standards of behavior
online that you follow in real life.
3. Know where you are in cyberspace.
4. Respect other people’s time and
bandwidth.
5. Make yourself look good online.
6. Share expert knowledge
7. Help keep flame wars under control.
8. Respect other people’s privacy.
9. Don’t abuse your power.
10. Be forgiving of other people’s mistakes.
COPYRIGHT
INFRINGEMENT
WHAT IS COPYRIGHT?
Copyright is a legal right that grants the creator of an
original work exclusive control over how that work is used
and distributed. It is a form of intellectual property law
that protects various types of creative works, such as
books, music, movies, software, artworks, and more. The
purpose of copyright is to incentivize creators to produce
new and innovative works by providing them with certain
exclusive rights for a limited period.
WHAT IS INFRINGEMENT?
Infringement refers to the violation or breach of a law, right, or
agreement. It is commonly used in the context of intellectual
property rights, such as copyright, trademark, or patent
infringement, where someone uses, copies, or reproduces
another person or entity's protected work without permission.
Infringement can also occur in various other legal areas, such
as contractual agreements or property rights.
COPYRIGHT INFRINGEMENT
A copyright infringement occurs
when someone uses, reproduces,
distributes, or displays protected
content without the owner's consent.
Copyright is a legal privilege that
gives the author of an original work
the sole right to its use and
dissemination for a predetermined
amount of time. Books, music,
movies, artwork, software, and other
creative works are included in this.
INTELLECTUAL PROPERTY OR COPYRIGHT LAW
It is a legal right created by the law
of a country that grants the creator
of an original work exclusive
rights for its use and distribution.
COPYRIGHT INFRINGEMENT VS. PLAGIARISM
COPYRIGHT INFRINGEMENT VS. PLAGIARISM
EXAMPLES OF COPYRIGHT INFRINGEMENT
1. Downloading and sharing MP3 files of music, videos
and games without permission of the copyright owner.
EXAMPLES OF COPYRIGHT INFRINGEMENT

2. Making a movie file or a large segment of a movie


available on a web site without permission of the
copyright owner. Recording movies in a theater.
EXAMPLES OF COPYRIGHT INFRINGEMENT

3. Using others’ photographs for a blog without permission


Scanning a photograph that has been published and using it
without permission or attribution.
EXAMPLES OF COPYRIGHT INFRINGEMENT

4. Downloading licensed software from non-authorized


sites without the permission of the copyright or
license holder.
EXAMPLES OF COPYRIGHT INFRINGEMENT

5. Copying books, blogs or podcasts


without permission.
EXAMPLES OF COPYRIGHT INFRINGEMENT

6. Using corporate logos without


permission.
EXAMPLES OF COPYRIGHT INFRINGEMENT

7. Anything where you are copying someone


else’s original work without an agreement.
INTELLECTUAL PROPERTY RIGHTS
It is any and all rights associated with
intangible assets owned by a person or
company and protected against use
without consent. Intangible assets refer to
non-physical property, including right of
ownership in intellectual property.

You might also like