EMPOWERMENT
TECHNOLOGIES
1
Review
We have defined ICT or Information Communication
and Technology.
Explained the effects of ICT in the Philippines from
different sectors
Tackled about the state of ICT existing worldwide, its
progress from Web 1.0 to Web 3.0.
Discussed Trends in ICT, current and existing trends
all over the world and its components and why are
they important.
2
ONLINE SAFETY, SECURITY,
ONLINE SEARCH SKILLS
Empowerment Technologies
3
ONLINE SAFETY,
SECURITY, ETHICS,
AND ETIQUETTE
and
CONTEXTUALIZED
ONLINE SEARCH AND
RESEARCH SKILLS
Empowerment Technologies 4
Learning Competency
apply online safety, security, ethics, and
etiquette standards and practice in the use of
ICTs as it would relate to their specific
professional tracks
use the Internet as a tool for credible research
and information gathering to best achieve
specific class objectives or address situational.
Objectives
At the end of this lesson, the students should be able to:
practice privacy of important information;
consider his/her reputation when using the Internet;
determine and avoid the dangers of the internet;
be a responsible user and content producer of new
media, and;
use the Internet as a tool for credible research and
information gathering
6
GUESS THE WORD
(W,V,I,S,R,U,T)
ANSWER:
V
_ _I R
_U_ _S
7
GUESS THE WORD
(P,R,I,C,Y,A,G,F,V)
ANSWER:
P_ R
_ _I V_ A
_C_ _Y
8
GUESS THE WORD
(E,R,I,N,C,S,I,T,U,Y)
ANSWER:
S_
_ E_
C _U _R_I T
_Y_
9
GUESS THE WORD
(A,C,G,H,D,E,Y,K,R)
ANSWER:
H
_A_C
_K E_
__ R
10
Think of this:
Am I Safe and Secured online?
How Safe and Secured are you
online?
11
INTERNET
Internet is defined as the
information superhighway
12
What kind of
information
do you
usually share
online?
13
14
INFORMATION
AT RISK
Empowerment Technologies
15
Information with RISK
Complete Name (First, Middle,
and Last)
Birthday
Address
E-Mail Address
Current & Previous School
Home and Cell Phone Numbers
Father’s and Mother’s Name
Sibling’s Name
16
HOW TO BE
SAFE ONLINE
Empowerment Technologies
17
ONLINE
SAFETY TIPS
Empowerment Technologies
18
SOME TIPS TO STAY SAFE ONLINE:
Be mindful on what you
share online
Do not just accept terms
and conditions, read it.
19
SOME TIPS TO STAY SAFE ONLINE:
Do not share
your password
with anyone.
20
21
Have a
good
Password
22
SOME TIPS TO STAY SAFE ONLINE:
Do not talk to
strangers whether
online or face-to-
face.
23
SOME TIPS TO STAY SAFE ONLINE:
Never post anything about a
future vacation.
24
SOME TIPS TO STAY SAFE ONLINE:
Add friends
you know in
real life.
25
SOME TIPS TO STAY SAFE ONLINE:
Avoid visiting untrusted
websites.
26
SOME TIPS TO STAY SAFE ONLINE:
Avoid
visiting
untrusted
websites.
27
SOME TIPS TO STAY SAFE ONLINE:
If you have WiFi at
home, make it private by
adding a password.
Install and update an
antivirus software on
your computer.
28
SOME TIPS TO STAY SAFE ONLINE:
Buy the software,
do not use pirated
ones.
29
SOME TIPS TO STAY SAFE ONLINE:
Do not reply or click
links from suspicious
emails.
Avoid downloading
anything from
untrusted websites.
30
SOME TIPS TO STAY SAFE ONLINE:
Don’t share
unreliable
information and
plagiarized,
always give
credits
31
ONLINE THREATS
Empowerment Technologies
32
Online Threats
MALWARE
stands for malicious
software
An umbrella term used to
refer to a variety of forms
of harmful or intrusive
software. 33
Types of Malware
A. VIRUS
a malicious program designed to
replicate itself and transfer from one
computer to another either through the
V – VITAL Internet and local networks or data
I - INFORMATION storage like flash drives and CDs.
R - RESOURCE This are typically attached to an
U - UNDER executable file or a word document
S - SIEGE
34
Types of Malware
B. WORM
a malicious program that replicates
itself through a network.
Worms may delete files, others
interrupt the network functions and
LOVEYOU worm other send junk mails from infected
computers.
35
Types of Malware
C. TROJAN
a malicious program that disguises as a
useful program but once downloaded or
installed, leaves your PC unprotected
and allows hackers to get your
information.
ROGUE SECURITY SOFTWARE —
tricks the user into posing that it is a
security software. It asks the user to pay
to improve his/her security but in reality,
they are not protected at all 36
Types of Malware
D. SPYWARE
a program that runs in the background
without you knowing it (thus called
“spy”). It has the ability to monitor what
you are currently doing and typing
through keylogging.
37
Types of Malware
E. ADWARE
a program designed to send you
advertisements, mostly as pop-ups.
38
Types of Malware
E. ADWARE
a program designed to send you
advertisements, mostly as pop-ups.
39
Online Threats
SPAM
unwanted email mostly
from bots or advertisers.
It can be used to send
malware.
40
Online Threats
PHISHING
is an attempt to acquire
information by
pretending to be a
trustworthy entity.
41
42
Online Threats
PHARMING
a more complicated
way of phishing
where it exploits the
DNS (Domain Name
Service) system.
43
HOW SHOULD WE
BEHAVE ONLINE?
Empowerment Technologies
44
What is NETIQUETTE?
interNET + etIQUETTE
set of rules for behaving properly online
( The Core Rules of Netiquette by Virginia Shea )
respecting other users’ views and
displaying common courtesy when
posting your views to online discussion
groups 45
10 Rules of NETIQUETTE
[Link] THE HUMAN
2. Adhere to the same standards of
behavior online that you follow in
real life
3. Know where you are in cyberspace
46
10 Rules of NETIQUETTE
4. Respect other people's time and
bandwidth
5. Make yourself look good online
6. Share expert knowledge
47
10 Rules of NETIQUETTE
7. Help keep flame wars under control
8. Respect other people's privacy
9. Don't abuse your power
[Link] forgiving of other people's
mistakes 48
THINK BEFORE YOU CLICK
Everyone’s own information is
important, we must keep this on to
ourselves and if ever shared by
others, we must learn to keep it.
Respect begets respect is also
applied in technology settings, not just
real life setting.
49
3 Quiz
rd
in EMTECH
REMAIN SILENT
DURING THE
QUIZ.
¼ SHEET OF
PAPER
ERASURES
ARE
WRONG!
Know
the
rules!
1. The fraudulent practice
of sending emails
purporting to be from
reputable companies in
order to induce individuals
to reveal personal
information, such as
passwords and credit card
numbers.
2. These malicious programs
can infect a user’s computer or
network, alter DNS settings, or
manipulate the host’s file.
When users try accessing a
legitimate website, they’re
unknowingly redirected to a
malicious site.
3. It is a malware that
misleads users of its true
intent by disguising itself
as a standard program.
4. Twitter is an example of
what type of social media?
5. These are sites that
allow users to post their
own news items or links to
other news sources.
6. It is a multitasking
operating system for
smart devices such as
Smart TVs and it has
been used as a mobile
operating system.
7. It is a mobile
operating system
developed by Google and
designed primarily for
touchscreen mobile
devices such as
smartphones and
tablets.
8. It refers to a mobile
operating system
created and developed
by Apple Inc. exclusively
for its hardware.
9. Refers to a group of
software or hardware
devices by which people
with disabilities can
access computers.
10. It has the ability to
monitor what you are
currently doing and
typing through
keylogging.
11. It refers to
different forms of
dangerous or
unwelcome
software.
12. It refers to
the combination
of technological
features in one
device.
13. These are sites
that allow you to
upload and share
media content like
images, music, and
video.
14. It is an interactive
experience that combines
the real world and
computer-generated
content.
15. It copied the
capability to do
tasks that were
originally found in
personal computers.
PERFORMANCE
TASK
Empowerment Technologies
71
DEADLINE:
September 27, 2023
Wednesday
You will be doing a short
video clip about the
problems within your
barangay, school, or
community. You have to
message me personally
about the final output.
You have your free will, you
may use your creativity in
presenting the problem
such as but not limited to
vlogging, reporting or
documenting.
PERFORMANCE TASK
75
ONLINE
SEARCHING
Empowerment Technologies
76
WHAT DO YOU THINK?
An article from RELIABLE
Wikipedia about
CoVID-19.
NOT RELIABLE
77
WHAT DO YOU THINK?
NOT RELIABLE
Wikipedia authors are anonymous, and any Wikipedia reader can
contribute information to most posted articles. Readers have no way of
knowing if authors and contributors are experts.
Wikipedia articles often provide lists of sources to consult, but these
also may or may not be reliable. Consult with caution!
78
ONLINE SEARCH
• Online Search - is the
process of interactively
searching for and
retrieving requested
information via a
computer from
databases that are
online.
79
SEARCH ENGINE
Search Engine – is a
software system that is
designed to search for
information on the World
Wide Web. The search
results are generally
presented in a line of
results often referred to
as search engine results
pages. 80
EXAMPLES OF
SEARCH ENGINE
Google [Link]
Bing Yandex
Yahoo DuckDuckGo
Baidu
81
TIPS IN CONDUCTING ONLINE
RESEARCH
Have a question in
mind.
Narrow it down.
Use Advanced search.
Look for credible
sources.
Give credit.
82
USE ADVANCED SEARCH
[Link]
USE
ADVANCED
SEARCH
WEBSITE CREDIBILITY
1. Check the Domain – Some domains such
as .com, .org, and .net can be purchased and used by any
individual.
.edu is reserved for colleges and universities
.gov denotes a government website.
These two are usually credible sources for information
CHECK THE DOMAIN
87
CHECK THE DOMAIN
88
CHECK THE DOMAIN
Be careful with the
domain .org, because .org is
usually used by non-profit
organizations which may
have an agenda of
persuasion rather than
education.
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol Secure (HTTPS)
89
WEBSITE CREDIBILITY
2. Check the Author
Information on the internet with a
listed author is one indication of a
credible site.
Is the author affiliated to an academic
institution or credible organization?
CHECK THE AUTHOR
91
WEBSITE CREDIBILITY
3. Check the DATE
By including a date, the website
allows readers to make decisions
about whether that information is
recent enough for their purposes.
look for a "last updated" date on the
page or site.
CHECK THE DATE
93
WEBSITE CREDIBILITY
4. Check the SOURCE
Credible websites, like books and
scholarly articles, should cite the
source of the information presented.
Can information be verified through
another source?
GOOD SOURCE OF INFORMATION
Google Scholar allows the students
and educators to search across a
wide range of academic literature.
[Link]
95
GIVE CREDITS
Format in citing a reference :
Name of the person or organization (the
author of the information). Title of the home
page in italics (title is shown in title bar but is
sometimes missing or unrelated). URL. Date
last seen.
GIVE CREDITS
Example 1:
Lapiz, Adrian Harold L. “Oleander’s Fun
Facts about Bananas.”
[Link]
[Link] on September 7, 2015.
GIVE CREDITS
Example 2:
“Accounting: What you should know.”
Jargon Online Network.
[Link]
.[Link] on April 13, 2015
PLAGIARISM
What is intellectual property?
is claiming attribution
for a work you did not
author, or using
someone else's work
without proper
attribution
INTELLECTUAL PROPERTY
What is intellectual property?
refers to creations of the
mind, such as inventions;
literary and artistic works;
designs; and symbols,
names and images used in
commerce
(Source: [Link]
INTELLECTUAL PROPERTY IS PROTECTED BY LAW
TYPES OF INTELLECTUAL PROPERTY
TYPES OF IP DEFINITION
1. Copyright • a legal term used to describe the rights
that creators have over their literary and
artistic works
• books, music, paintings, sculpture and
films, to computer programs, databases,
advertisements, maps and technical
drawings
COPYRIGHT INFRINGEMENT
The use of works protected by
copyright law without permission,
infringing certain exclusive rights
granted to the copyright holder
FAIR USE
Fair use means you can use copyrighted
material without a license only for certain
purposes. These include:
• Commentary
• Criticism
• Reporting
• Research
• Teaching
Fair use
Guidelines for Fair Use
• A majority of the content you create
must be your own.
• Give credit to the copyright holder.
• Don't make money off of the
copyrighted work.
Rubric
CRITERIA Points
Clarity and focus of the idea and based from
Ideas the set topic and the ability to holds the readers 5
attention.
The idea is organize which showcases and
Organization 5
enhances the central idea or the theme.
The writings have an easy flow and rhythm.
Sentence
Stanzas are well built with strong and varied 5
Fluency
structure that invites expressive oral reading
Creative idea and presentation of the literary
Creativity 5
work.
TOTAL 20
LET’S DO THIS: LET US ALL BE SAFE ONLINE
Create an acrostic poem on how can you
apply online safety, security and ethics and
how can we use internet as a reliable source
of information for research.
Use your First Name for applying online safety,
security and ethics
And your Last Name for using internet as a reliable
source of information for research
Make your acrostic poem creative (do it on a clean sheet of
bond paper or special paper if you have. you may use recycle
paper in making your output)
[Link]
d1/5b14d1b80ba533e118761b2df8f634a0--acrostic-poems-test-
[Link]
MY Reflection:
• I learned that __________________
• I enjoyed most on ______________________
• I want to learn more ____________________
108