RESEARCH AND INFORMATION SEEKING
Web Search Engines – program designed to search or mine the world wide web on
keywords provided by the user (ex: bing, duckduckgo, google, yahoo)
Research Indexing sites – web sites dedicated to compile and index researches
done by academic researchers (ex: IEEE Xplore, google scholar)
Massive Online Open Course(MOOC) – web sites dedicated to teach and inform
users focused on different areas (ex: coursera, edX, Udemy)
Employment Web Sites – web sites that enable companies to post job vacancies
also accommodate job seekers by providing a resume-submission facility. (ex:
JobStreet, Bestjobs)
Electronic Commerce (E-commerce) – a technology that uses electronic means to
trade products and currencies.
AUTHENTICITY VERIFICATION OF INFORMATION
1. Published Author’s Name – publishing the name of the one who wrote the
article or information is one of sign that the information is valid, credible and
legitimate.
2. Credible Web Sites – error-free articles are more likely published by web
sites of this big international or local companies
3. Rating, number of viewers and number of shares – credible articles is
more likely to receive a high rating or a normally high number of stars from
viewers
4. Reference and related articles - most of credible articles include a list of
references or articles related to the published one.
Netiquette – coined from the term of network and etiquette,
– set of ideal rules and conduct that a netizen should observe in
communicating and/or publishing information and materials over the WWW and in
ICT
Netizen – refers to the person who is a member or a part of the online community
Avatar – online representation
ONLINE SAFETY AND SECURITY
Spam – refers to the transmission of unsolicited messages from various origin using
electronic messaging systems (Unsolicited Bulk Email – email spam in common
form)
Phishing – software or a program used by attacker to obtain personal info
(attackers commonly targets users password)
Malware – short term for malicious software, computer software sent by an attacker
to inflict chaos on a computer’s operation and processes.
RA 10627 or Anti-Bullying Act of 2013 – protection of individuals from bullying
through electronic means
RA 10175 or Cybercrime Prevention Act of 2012 – protects an individual from
various online and cyber acts that may harm or evade one’s privacy and
integrity.
Data Privacy Act of 2012 – protects personal information and data from
being divulges without consent
Bullying – severe or repeated use by one or more students of a written, verbal, or
electronic expression, or physical gesture, or any combination