L e s s o n 1 .
ETHICS
ON THE
INTERNET
Prepared by: Ms. Maricel M. Prongo
Lesson Objectives
In this lesson, you will able to:
1. demonstrate understanding of concepts
in internet security and ethics;
2. utilize online security and safety
measures;
3. apply ethical standards and practices in
online transactions;
4. assess instances that breach online
safety, security, and ethical standards;
and
5. value the essence of security and ethics in
the use of internet technology.
WHAT IS
ONLINE SAFETY?
Online Safety
refers to the maximization of internet
user's knowledge and awareness of
safety protocols, online crimes, and
security risk in the private property and
information in which are connected to
the use of the internet.
Online Security
refers to the "rules that are followed
and actions that are taken to make
sure that online users and data
privacy aren't compromised by
cybercriminals," (Mocan, 2019).
ONLINE
C R I M E S
Republic Act 10627 or The Cyberbullying
Anti - Bullying Act of 2013
defines bullying as "any 01
severe or repeated use
by one or more students
of a written, verbal or
electronic expression, or
a physical act or
gesture.
CYBERBULLYING
it comes in different forms.
it can be flaming, harassment,
denigration, impersonation,
outing, trickery, exclusion and
cyberstalking.
CYBERBULLYING
FLAMING
is an online fight using
electronic messages with
angry and vulgar languages.
CYBERBULLYING
HARASSMENT
is the act of repeatedly
sending nasty, mean and
insulting messages.
CYBERBULLYING
DENIGRATION
is sending or posting gossip
or rumors about a person to
damage his or her reputation
or friendship.
CYBERBULLYING
IMPERSONATION
is when someone is pretending to be
someone else and sending or
posting material to get that person
in trouble or danger or to damage
that person's reputation or frienship.
CYBERBULLYING
OUTING
is the act of sharing
someone's secrets or
embarrassing information
or images online.
CYBERBULLYING
TRICKERY
is when someone is talking to a
person to let him or her reveal his or
her secrets or embarassing
information and then shares the
sensitive information online.
CYBERBULLYING
EXCLUSION
is when one is intentionally
or cruelly excluded from
an online group.
CYBERBULLYING
CYBERSTALKING
is the act of repeated, intense
harrassment and denigration
that includes threats or
creates significant fear.
When
cyberbullying is
observed, it is
best to do the
following:
When cyberbullying is observed, it is best to do
the following:
Inform a trusted person.
Try not to instigate.
Block connection with the bully.
Always be aware.
Logout from online accounts.
Be not a cyberbully. (The Golden Rule)
"Do not do to others
what you would not
want others to do to
you"
US Department of Justice Identity Theft
02
defines "identity theft" and
"identity fraud" as "all types
of crimes in which someone
wrongfully obtains and
uses another person's
personal data in some way
that involves fraud or
deception, typically for
economic gain".
The US Department of Justice further
explain that identity theft and fraud may
Identity Theft
commonly happen in this situation:
When “shoulder surfing” is done by
02
criminals, as you use online
communication in public places.
When you receive pre-approved credit
cards but discard them improperly.
When you respond to spam mails or
unsolicited emails which require you to
input personal data.
Use Good Password
Report Identity Theft
Practical Tips
stopping credit companies from
letting you pay fraudulent
transactions at your name.
removing false accounts
extending fraud alert on your
account
examining your report to find out
the thief.
Oxford Lexico defines Phishing
03
phishing as, "the fraudulent
practice of sending emails
purporting to be from
reputable companies in
order to induce individuals
to reveal personal
information such as
passwords and credit card
numbers".
be scrutinizing of website Ways to be
that you are logged in. Secured
be cautious on giving
information online.
be alert with links sent via
messages and emails.
The University of Oxford
Plagiarism and
Copyright Infringement
in the UK states that
"plagiarism is presenting
someone else's work or
04
ideas as your own, with
or without their consent,
by incorporating it in
your work without full
acknowledgement.
Common Internet Security Threats
Many threats are present on the internet. Internet
security threats are dangers that are associated with
using the internet. There are multitude of concepts
related to internet threats, but here are the most
common forms identified by McAfee Corporation.
Common Internet Security Threats
Malwares - this is the shortened form of malicious
software.
Computer Worms - these are programs that can replicate
themselves from one computer to another in great
volume.
Spam - generally, spam and unwanted messages are
harmless.
Phishing - these scams are created by cybercriminals who
intend to ask for private or elicit information from their
victims.
Internet Security Strategies
There is no one way to secure any network or
computer connected to the internet. It is best,
therefore, that internet security must require product
and technology combinations to give utmost security
the network and the users. These strategies may come
in the following forms:
Internet Security Strategies
Browser Selection
Email Security
Multifactor Authentication (MFA)
Firewalls
Online Ethics
Generally, ethics deals with
what is good and bad.
It is a set of moral principles
that can be taken as a guiding
philosophy in life.
Online Etiquette
This acceptable conduct
that adheres to polite
behaviors and respectful
manners is called online
etiquette.
Some ways to behave and present yourself when
you are online.
be always courteous.
do not use foul language and incite anger by writing
in uppercase and overusing the exclamation mark.
appropriate your humor and avoid sarcasm.
do not share or post offensive materials.
Some ways to behave and present yourself when
you are online.
always acknowledge owners of ideas and materials
used.
try to be understanding to a maximum tolerance. Be
kind.
respect others’ opinions. Deal with everyone with a
humanitarian approach.
Thank You
Do you have any question?
Prepared by: Ms. Maricel M. Prongo