0% found this document useful (0 votes)
50 views34 pages

1.2 Ethics On The Internet

The document discusses concepts related to internet safety, security, and ethics. It defines key terms like online safety, online security, cyberbullying, identity theft, and phishing. It also outlines common internet security threats like malware, computer worms, and spam. The document recommends strategies for internet security including browser selection, email security, multifactor authentication, and firewalls. It concludes with a discussion of online etiquette and ethical behaviors when interacting with others online.

Uploaded by

Venise Revilla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views34 pages

1.2 Ethics On The Internet

The document discusses concepts related to internet safety, security, and ethics. It defines key terms like online safety, online security, cyberbullying, identity theft, and phishing. It also outlines common internet security threats like malware, computer worms, and spam. The document recommends strategies for internet security including browser selection, email security, multifactor authentication, and firewalls. It concludes with a discussion of online etiquette and ethical behaviors when interacting with others online.

Uploaded by

Venise Revilla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 34

L e s s o n 1 .

ETHICS
ON THE
INTERNET
Prepared by: Ms. Maricel M. Prongo
Lesson Objectives
In this lesson, you will able to:
1. demonstrate understanding of concepts
in internet security and ethics;
2. utilize online security and safety
measures;
3. apply ethical standards and practices in
online transactions;
4. assess instances that breach online
safety, security, and ethical standards;
and
5. value the essence of security and ethics in
the use of internet technology.
WHAT IS
ONLINE SAFETY?
Online Safety
refers to the maximization of internet

user's knowledge and awareness of

safety protocols, online crimes, and

security risk in the private property and

information in which are connected to

the use of the internet.


Online Security
refers to the "rules that are followed

and actions that are taken to make

sure that online users and data

privacy aren't compromised by

cybercriminals," (Mocan, 2019).


ONLINE
C R I M E S
Republic Act 10627 or The Cyberbullying
Anti - Bullying Act of 2013
defines bullying as "any 01
severe or repeated use
by one or more students
of a written, verbal or
electronic expression, or
a physical act or
gesture.
CYBERBULLYING
it comes in different forms.

it can be flaming, harassment,

denigration, impersonation,

outing, trickery, exclusion and

cyberstalking.
CYBERBULLYING
FLAMING

is an online fight using

electronic messages with

angry and vulgar languages.


CYBERBULLYING
HARASSMENT

is the act of repeatedly

sending nasty, mean and

insulting messages.
CYBERBULLYING
DENIGRATION

is sending or posting gossip

or rumors about a person to

damage his or her reputation

or friendship.
CYBERBULLYING
IMPERSONATION

is when someone is pretending to be

someone else and sending or

posting material to get that person

in trouble or danger or to damage

that person's reputation or frienship.


CYBERBULLYING
OUTING

is the act of sharing

someone's secrets or

embarrassing information

or images online.
CYBERBULLYING
TRICKERY

is when someone is talking to a

person to let him or her reveal his or

her secrets or embarassing

information and then shares the

sensitive information online.


CYBERBULLYING
EXCLUSION

is when one is intentionally

or cruelly excluded from

an online group.
CYBERBULLYING
CYBERSTALKING

is the act of repeated, intense

harrassment and denigration

that includes threats or

creates significant fear.


When
cyberbullying is
observed, it is
best to do the
following:
When cyberbullying is observed, it is best to do
the following:

Inform a trusted person.

Try not to instigate.

Block connection with the bully.

Always be aware.

Logout from online accounts.

Be not a cyberbully. (The Golden Rule)


"Do not do to others
what you would not
want others to do to
you"
US Department of Justice Identity Theft
02
defines "identity theft" and
"identity fraud" as "all types
of crimes in which someone
wrongfully obtains and
uses another person's
personal data in some way
that involves fraud or
deception, typically for
economic gain".
The US Department of Justice further
explain that identity theft and fraud may
Identity Theft
commonly happen in this situation:
When “shoulder surfing” is done by
02
criminals, as you use online
communication in public places.
When you receive pre-approved credit
cards but discard them improperly.
When you respond to spam mails or
unsolicited emails which require you to
input personal data.
Use Good Password
Report Identity Theft
Practical Tips
stopping credit companies from
letting you pay fraudulent
transactions at your name.
removing false accounts
extending fraud alert on your
account
examining your report to find out
the thief.
Oxford Lexico defines Phishing
03
phishing as, "the fraudulent
practice of sending emails
purporting to be from
reputable companies in
order to induce individuals
to reveal personal
information such as
passwords and credit card
numbers".
be scrutinizing of website Ways to be
that you are logged in. Secured
be cautious on giving
information online.
be alert with links sent via
messages and emails.
The University of Oxford
Plagiarism and
Copyright Infringement
in the UK states that
"plagiarism is presenting
someone else's work or
04
ideas as your own, with
or without their consent,
by incorporating it in
your work without full
acknowledgement.
Common Internet Security Threats
Many threats are present on the internet. Internet

security threats are dangers that are associated with

using the internet. There are multitude of concepts

related to internet threats, but here are the most

common forms identified by McAfee Corporation.


Common Internet Security Threats
Malwares - this is the shortened form of malicious
software.
Computer Worms - these are programs that can replicate
themselves from one computer to another in great
volume.
Spam - generally, spam and unwanted messages are
harmless.
Phishing - these scams are created by cybercriminals who
intend to ask for private or elicit information from their
victims.
Internet Security Strategies
There is no one way to secure any network or

computer connected to the internet. It is best,

therefore, that internet security must require product

and technology combinations to give utmost security

the network and the users. These strategies may come

in the following forms:


Internet Security Strategies
Browser Selection
Email Security
Multifactor Authentication (MFA)
Firewalls
Online Ethics
Generally, ethics deals with

what is good and bad.

It is a set of moral principles

that can be taken as a guiding

philosophy in life.
Online Etiquette
This acceptable conduct

that adheres to polite

behaviors and respectful

manners is called online

etiquette.
Some ways to behave and present yourself when
you are online.

be always courteous.

do not use foul language and incite anger by writing

in uppercase and overusing the exclamation mark.

appropriate your humor and avoid sarcasm.

do not share or post offensive materials.


Some ways to behave and present yourself when
you are online.

always acknowledge owners of ideas and materials


used.
try to be understanding to a maximum tolerance. Be
kind.
respect others’ opinions. Deal with everyone with a
humanitarian approach.
Thank You
Do you have any question?

Prepared by: Ms. Maricel M. Prongo

You might also like