0% found this document useful (0 votes)
21 views5 pages

Lite - Semifinal Reviewer (1) - 095113

The document discusses online ethics and etiquette, highlighting principles such as 'Do No Harm' and 'Respect Privacy' while addressing issues like cyberbullying and misinformation. It also explains the role of the Internet and World Wide Web in modern society, detailing how they facilitate communication and access to information. Additionally, it covers the importance of information control and privacy, emphasizing the need for data protection regulations.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views5 pages

Lite - Semifinal Reviewer (1) - 095113

The document discusses online ethics and etiquette, highlighting principles such as 'Do No Harm' and 'Respect Privacy' while addressing issues like cyberbullying and misinformation. It also explains the role of the Internet and World Wide Web in modern society, detailing how they facilitate communication and access to information. Additionally, it covers the importance of information control and privacy, emphasizing the need for data protection regulations.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

LIVING IN INFORMATION TECHNOLOGY ERA

ONLINE ETHICS AND ONLINE ETIQUETTE . ONLINE ETHICS & ONLINE ETIQUETTE PRINCIPLES

ONLINE ETHICS PRINCIPLES


ONLINE ETHICS
- Refers to the moral principles that govern behavior in online 1. Do No Harm — Avoid actions that could harm others, such as
environments. It encompasses acceptable conduct regarding honesty, cyberbullying or spreading misinformation.
respect for others' rights and property, and adherence to laws such as 2. Respect Privacy — Protect personal information and seek consent
copyright regulations. before sharing others' data.
3. Intellectual Property Rights — Acknowledge and respect copyright and
CYBERBULLYING ownership of digital content.
- Poor online behavior can lead to harassment and toxic interactions, 4. Honesty and Transparency — Communicate truthfully and avoid
impacting mental health and potentially resulting in legal consequences. deception in online interactions.
5. Accountability — Take responsibility for your actions and their
MISUSE OF PERSONAL DATA consequences in the digital space.
- The collection and exploitation of personal information by companies raise
significant privacy concerns. ONLINE ETIQUETTE PRINCIPLES

SPREAD OF MISINFORMATION 1. Be Respectful — Treat others as you wish to be treated; use polite
- The rapid dissemination of unverified information can lead to public language and avoid offensive remarks.
confusion and harm. 2. Mind Your Tone — Be aware that written communication can be
misinterpreted; clarify your intentions.
LACK OF ACCOUNTABILITY 3. Use Proper Grammar — Maintain clarity by using correct spelling and
- Ambiguity about responsibility for data governance complicates ethical grammar.
compliance among businesses and users. 4. Keep It Concise — Be direct and to the point to respect others' time.
5. Avoid All Caps — Writing in all caps is perceived as shouting; use it
sparingly for emphasis.
ONLINE ETIQUETTE
- Often referred to as netiquette, encompasses the guidelines for respectful DIFFERENCE OF ONLINE ETHICS AND ONLINE ETIQUETTE:
communication in digital environments. It emphasizes courteous behavior, ● Online Etiquette - Also known as netiquette, refers to the accepted
including being polite in emails, avoiding all caps (considered shouting), norms and guidelines for respectful communication online.
and respecting others' privacy. This access makes it all the more ● Online Ethics - On the other hand, focuses on the moral implications of
important to understand our roles as digital citizens. online behavior.

COMMON PROBLEMS IN ONLINE ETIQUETTE

1. MISINTERPRETATION OF TONE
- Written communication can easily be misunderstood, leading INTERNET & WORLD WIDE WEB .
to perceived rudeness or sarcasm.
2. FLAMING AND AGGRESSION The role of internet and WWW in Modern Society
- Users often engage in aggressive behaviors, such as personal ● The Internet and the World Wide Web play a crucial role in our modern
attacks or heated arguments, known as "flame wars." society. They enable instant communication, allowing people to connect
3. INAPPROPRIATE LANGUAGE with others across the globe effortlessly.
- The use of coarse or rude language is prevalent, which can ● These technologies provide quick access to vast amounts of information
create a hostile environment. and facilitate remote work, education, and commerce.
4. OVERUSE OF CAPS ● The Web serves as a platform for sharing ideas, fostering creativity, and
- Writing in all capital letters is interpreted as shouting and can maintaining relationships with friends and family, regardless of distance.
be seen as impolite. Overall, the Internet and WWW have transformed how we live, work, and
5. NEGLECTING PRIVACY interact, shaping many aspects of our daily lives.
- Sharing personal information without consent or failing to
respect others' privacy is a significant concern. What is internet?
- It is a vast system of interconnected computers and servers. Each
computer on the internet can send and receive information from other
COMMON PRACTICES THAT BECOME NORM BUT ARE NOT PART OF ONLINE computers.
ETHICS AND ONLINE ETIQUETTE: - This connection is made possible through various technologies; it also
supports various services. Essentially, it’s the backbone that allows
1. TROLLING - Deliberately provoking others for amusement, often leading everything to connect and communicate.
to toxic discussions.
Kudos Trolling: To describe trolling for mutual enjoyment and entertainment. Origins of the Internet
Flame Trolling: To describe trolling that is abusive and not intended - It originated in the late 1960s, developed as ARPANET, a project funded
to be humorous. by the U.S Department of Defense.

2. DOXXING - Publicly revealing private information about individuals as a ARPANET utilized packet-switching technology, allowing multiple computers to
form of harassment. communicate simultaneously by breaking data into smaller packets.
3. CANCEL CULTURE - Publicly shaming or ostracizing individuals for their
opinions or past actions, often without context. The introduction of TCP and IP in the 1970s established standardized communication
4. SPAMMING - Posting irrelevant or promotional content in discussion, methods, leading to the modern internet. The network expanded in the 1980s,
which disrupts meaningful conversations. connecting universities and research institutions.
5. MISINFORMATION - Sharing unverified or false information without
fact-checking.
6. HATE SPEECH - Spreading discriminatory or offensive comments,
particularly on social media.
7. EXCESSIVE USE OF EMOJIS AND ABBREVIATIONS - While intended
to convey emotions, overuse can lead to misunderstandings and dilute
communication.
4. SQL (Structured Query Language) - Used for database management
WHAT ARE THE TECHNOLOGIES THAT MADE THE CONNECTION POSSIBLE? and operations.
5. Python - Used for web development frameworks like:
1. FIBER OPTIC CABLES a. Django b. Flask
● They are a thin strand of glass or plastic that carry information using light. HOW IS THE INTERNET AND WORLD WIDE WEB CONNECTED?
● High speed in transmitting data over long distances, and it is the
FASTEST, due to it using light to transmit data through glass. ❖ Interdependent systems: The internet serves as the foundational
● Often used to connect cities and internet service providers because they infrastructure that facilitates the operation of the World Wide Web.
can send a lot of data all at once without losing quality. Without the internet, the web could not function.

2. SATELLITES ❖ Complementary functions: The internet covers a wide array of


● They are objects that orbit the earth in space; they can receive signals communication services, while the World Wide Web is concerned with the
from the ground. retrieval and presentation of interconnected documents and multimedia
● It helps transmit data over long distances where wires cannot reach. content. The web uses the internet to transfer information to users.
● It is fast but not as fast as fiber optic cables and Wireless signals due to
latency (delays), as the signal travels up and comes down to earth. ❖ Protocol Utilization: The internet protocols are TCP and IP, while the
World Wide Web operates using protocols like HTTP and HTTPS, which
3. Wireless signals are built upon the internet’s protocols.
● They are invisible waves that carry information without the use of wires or
cables.
● This signal travels through the air and allows your devices to
communicate with each other and access the internet.
● It does not need a physical connection to transfer information. INFORMATION CONTROL AND PRIVACY: Protecting personal data
● It is FASTER than Satellites but NOT as fast as fiber optic cables, as it is integrity and rights .
affected by distance and interference (walls or other signals).
Introduction
What kind of services are supported by the internet? ● Information Control and Privacy will give an overview about control and
1. Email privacy, define the different characteristics of information, discuss why
2. Online gaming information security and privacy is a contemporary issue, and explain
3. File sharing what privacy is along with data privacy and protection regulation.
4. Video streaming
5. Web browsing Characteristics of Information
6. Social media 1. Accuracy
7. Video conferencing - means that information should be precise enough for its intended use,
though expecting 100% accuracy can be unrealistic due to time and cost
constraints. The necessary degree of accuracy depends on the context.
What is the World Wide Web? - For example, if government statistics incorrectly show an increase in
● It is a specific part of the internet, consisting of all websites and webpages births in an area, resources might be misallocated to build schools or
you can visit. The web uses a system of hyperlinks, which are clickable housing, leading to financial losses if the population doesn't grow as
links that take you from one page to another, making it easy to navigate expected. Therefore, accuracy is crucial to ensure informed decisions and
and find information. avoid costly mistakes.
● When you enter a web address (known as URL [Uniform Resource
Locator]) into your browser, it uses the internet to locate that specific site. 2. Availability
- means that information should be consistently accessible for authorized
Origin of the World Wide Web users by maintaining necessary hardware and infrastructure.
● It was invented by Tim Berners-Lee in 1898 to facilitate information - This ensures information is easy to access when needed, such as using
sharing among researchers. local resources like telephone directories or centralized systems in
● He developed technologies such as HTML (Hypertext Markup Language) businesses for customer data retrieval.
and HTTP (Hypertext Transfer Protocol), allowing users to create and link - For example, with centralized systems, businesses like banks can quickly
documents intuitively. access customer details from any branch, improving efficiency and
● It was publicly released in 1991, marking the start of widespread internet service quality across locations.
use. The rapid expansion led to commercialization of the internet and the
rise of various online services. 3. Authenticity
- ensures that a message, transaction, or other information exchange truly
What are the webpages you can visit using a web browser? comes from the claimed source.
- This involves verifying identity through authentication, which typically
1. Informational websites - News sites, educational resources, requires more than one proof of identity (though one may be enough).
encyclopedias (Wikipedia). - For instance, a user might prove their identity with something they know,
2. Social media - Platforms like Facebook, Twitter, and Instagram. like a password, or something they have, like a keycard. Modern systems
3. E-commerce - Online stores such as Amazon, eBay. also use biometric methods, which prove identity based on something the
4. Blogs - Personal or professional blogs on various topics. user is, such as fingerprint scans.
5. Streaming services - Sites like Netflix, YouTube for video content.
6. Forums and communities - Discussion boards like Reddit, Quora. 4. Confidentiality
7. Government websites - Official sites for local, state, or federal agencies. - protects sensitive information from unauthorized access, especially in
8. Banking and Finance - Online banking platforms and financial services. fields like healthcare and law, where privacy is legally required
9. Health and wellness - Medical information and wellness resources. - . For example, online banking requires account numbers and uses
10. Creative content - Sites for art, music, and other creative works. two-factor authentication (2FA) to ensure security. Confidentiality
measures also include training on risk prevention, using strong
What are the languages used to build websites? passwords, and data encryption.

1. HTML (HyperText Markup Language) - The standard language for


creating the structure of web pages. 5. Integrity
2. CSS (Cascading Style Sheets) - Used to style and layout web pages. - means keeping data consistent, accurate, and trustworthy throughout its
3. JavaScript - A scripting language that adds interactivity and dynamic lifecycle. To protect data from unauthorized changes, organizations use
behavior to web pages. measures like file permissions and access controls.
- For example, version control helps track changes and prevents accidental ● This crime can happen in many ways, and victims often suffer damage to
deletions by authorized users. Additionally, checksums can detect any their credit, finances, and reputation. An example of identity theft is when
alterations caused by issues like server crashes, while backups allow for a criminal uses stolen credit card information to make online purchases
easy restoration of data. without the victim's knowledge.
- Digital signatures also play a key role by ensuring that actions, such as
logins and sending documents, cannot be denied, reinforcing the reliability
of the data. What is Privacy?
❖ Privacy is a fundamental right, essential to autonomy and the protection of
6. Utility human dignity, serving as the foundation upon which many other human
- refers to how useful the information is to its intended users, while rights are built
objectivity focuses on whether the information is presented accurately, ❖ . Privacy enables us to create barriers and manage boundaries to protect
clearly, completely, and without bias. ourselves from unwarranted interference in our lives, which allows us to
- Essentially, utility measures the value of the information, and objectivity negotiate who we are and how we want to interact with the world around
ensures that it is reliable and trustworthy for decision-making. us.
❖ Privacy helps us establish boundaries to limit who has access to our
7. Possession bodies, places, and things, as well as our communications and our
- means to hold occupancy with or without rights of ownership. This exactly information. The rules that protect privacy give us the ability to assert our
describes possession in the psychic sense. It is the possession of the rights in the face of significant power imbalances.
physical body with—though frequently without—the permission of the
owner.
- An example of possession is when someone rents a car; they have the Data Privacy and Protection Regulation
right to use the vehicle during the rental period, but they do not own it.
Scope and Application
❖ The Data Privacy Act is important because it governs how individuals and
What Makes Information Security and Privacy a Current Concern? organizations handle personal information, with some exceptions. It
applies not only to businesses in the Philippines but also to those using
Fraud equipment in the country, covering the personal information of Filipino
● is commonly understood as dishonesty calculated for advantage. A citizens regardless of their location.
person who is dishonest may be called a fraud. Fraud is most common in ❖ An exception allows for the processing of personal information collected
the buying or selling of property, including real estate, personal property, lawfully from foreign jurisdictions, which benefits Philippine companies
and intangible property, such as stocks, bonds, and copyrights. that provide cloud services.
● An example of fraud is when someone sells a car but hides its mechanical
issues, presenting it as being in good condition to get a higher price. Approach
❖ The Philippines law takes the approach that “The processing of personal
Hoaxes data shall be allowed subject to adherence to the principles of
● are falsehoods created to appear as the truth. They differ from mistakes, transparency, legitimate purpose, and proportionality.”
rumors, urban legends, pseudoscience, and April Fools' jokes that people
share in good faith. Hoaxes deceive individuals into believing something
false and often ridiculous. Fundamental Principles
● An example of a hoax is the "War of the Worlds Radio broadcast in 1938, 1.Collection
which led many listeners to believe that an alien invasion was occurring, - This is the process of gathering personal information from people, which
causing widespread panic when it was actually a fictional story. can happen through online forms, purchases, or interactions. It’s
important that this is done openly and fairly.
System Hacking
● is when someone breaks into software-based systems like laptops and 2. Processing
desktops to access sensitive information. It means getting unauthorized - This involves managing and analyzing the collected data to gain insights,
access to computers by exploiting weaknesses to steal or misuse data. make decisions, and enhance services.
● Terms like hackers and crackers are often used the same way, but a - It’s crucial to handle this data securely and follow privacy rules.
"cracker" specifically refers to someone who acts with bad intentions for
illegal gain, making cracking illegal and unethical. 3. Consent
- This is the clear permission individuals give for their data to be collected
Phishing and used. Ensuring they understand what data is involved and how it will
● is when a scammer uses fake emails, texts, or copycat websites to trick be applied, allowing for informed choices.
you into sharing valuable personal information, like account numbers,
social security numbers, or login IDs and passwords. Scammers create a
false sense of security by imitating the logos of trusted companies to lure Information Control
their victims. ● Information control involves granting access to and use of information to
individuals who have the appropriate authority based on the level of
Privacy Breach authority they hold.
● A privacy breach occurs when an organization or individual, either ● This process ensures that sensitive information is only accessible to those
intentionally or accidentally, provides unauthorized or accidental access to who need it for their roles, helping to protect data from unauthorized
someone’s personal information, discloses, alters, loses, or destroys it, or access or misuse. Establishing clear policies and procedures for
fails to allow someone access to their personal information, such as when information access is essential for maintaining data security, complying
their account is hacked. with regulations, and safeguarding personal and organizational
information.

Disclosure of information
● is the release of information from one party to another. It typically refers Intellectual Property (IP)
to sharing management information that is relevant to collective ● Intellectual Property (IP) refers to various types of intangible assets that
bargaining and can be useful for trade union negotiators. are granted exclusive rights. IP includes musical, literary, and artistic
works, but it also encompasses words, phrases, symbols, and designs.
Identity Theft Essentially, IP represents any creation or product of the human mind,
● is the crime of stealing someone’s personal or financial information to use expressed through original ideas, expressions, and processes.
their identity for fraud, like making unauthorized transactions or
purchases.
● Intellectual Property Rights (IPR) are the rights granted to individuals over IT, CULTURE, AND SOCIETY : AN OVERVIEW .
their creations, providing them with exclusive rights to use their work for a
specific period. Exploring how information technology shapes modern culture and social behavior.

Intellectual Property Code of the Philippines Current IT Trends


● Republic Act No. 8293, also known as the Intellectual Property Code of 1. IoT and Smart Home - Connected devices revolutionizing
the Philippines, defines different types of intellectual property rights, which everyday life.
include: 2. AR and VR - Blending digital and physical realities.
3. Machine Learning - AI systems improving through experience.
1. Copyright and related rights: Protects the rights of creators over their 4. Automation - Streamlining processes across industries.
original works, including music, literature, and art.
2. Trademarks and service marks: Protects brands, logos, and symbols
that help identify goods and services. Internet of Things (IoT)
3. Geographic Indications: Identifies products that come from a specific - Is a set-up of devices and objects which are connected together in a given
place, giving them unique qualities linked to that area. network. Their connection, often wirelessly, is possible using both
4. Industrial design: Protects the look of a product, including its shape, color, hardware and software.
and design.
5. Patents: Gives inventors exclusive rights to their inventions, allowing CAPABILITIES OF IoT
them to control how their creations are used for a set time. 1. Integration - Connecting diverse technologies and business processes.
6. Layout designs (topographies) of Integrated Circuits (ICs): Protects the 2. Data Analysis - Synchronizing information for improved decision-making.
designs of electronic circuits used in chips. 3. Security - Implementing safeguards to protect interconnected systems.
7. Protection of undisclosed information: Includes trade secrets and
confidential business information, protecting them from unauthorized use
or disclosure. Automation in Society
Process Automation - Streamlining daily operations across industries.
Copyright IT Support Management - Automated systems for infrastructure
● Copyright is a set of exclusive rights given by the government to the and troubleshooting.
creator of an original work or their assignee for a limited time. It includes Automated Assistants - AI-powered helpers in various domains.
the right to copy, share, and perform the work in exchange for making it
public.
● Copyright owners can also allow others to use their rights or give them Impact on Culture
away completely. Digital rights, on the other hand, refer to the permissions Online Reviews - Shaping consumer decisions and experiences.
given to people to legally use a computer, electronic device, or the Social Media - Transforming communication and self-expression.
internet. This idea focuses on protecting and ensuring existing rights are YouTube Learning - Democratizing education through video content.
respected in the world of new digital technologies. Digital Identity - Creating and managing online personas.

Techniques designed to control access and reproduction of online information


Influence on Social Behavior
❖ Encryption: This process converts data so only authorized users can Digital Communication - Reshaping interpersonal interactions.
understand it. It protects digital data’s confidentiality, like when using Information Access - Instant knowledge at our fingertips.
ATMs or shopping online. Online Communities - Forming connections beyond physical
❖ Serial Keys: Also called product keys, these are unique alphanumeric boundaries.
codes that verify a product’s originality and can activate software.
❖ Scrambling: This technique hides sensitive information from
unauthorized users by altering the original data, often using encryption to Cyberbullying
make it difficult to extract. 1. Recognition - Identifying signs of online harassment.
❖ Tag Embedding: Similar to watermarks on images, this adds identifying 2. Prevention - Implementing safeguards and education.
information to content. It can include metadata that shows the owner’s 3. Support - Providing resources for victims.
name, author, and purchase date, aiding in copyright enforcement. 4. Legal Action - Enforcing cyberbullying laws and regulations.
Property Rights

A patent - is a set of exclusive rights given by the government to an inventor for a Netiquette
limited time in exchange for sharing details about their invention. Respect - Treating others with courtesy online.
This right allows the patent holder to stop others from making, using, selling, or Privacy - Protecting personal information and boundaries.
sharing the patented invention without their permission. Honesty - Maintaining truthfulness in digital interactions.
Responsibility - Being accountable for online actions.
A trademark - is a special sign used by a person, business, or organization to
identify their products or services to consumers. Professional Ethics in IT
This mark comes from a unique source and helps distinguish their product ● Contribute to society
(trademark) or services (service mark) from others. Rights to a trademark are ● Avoid harm
obtained through valid registration according to the rules of the Intellectual Property ● Be honest and trustworthy
Code. ● Be fair
● Honor property rights
● Give proper credit
● Respect privacy
● Honor confidentiality

Future of IT and Society


Human-AI Collaboration - Integrating AI into daily life and work.
Smart Cities - Technology-driven urban environments
improving quality of life.
Brain-Computer Interfaces - Direct neural connections reshaping
human-computer interaction.

You might also like