EMPOWERMENT
TECHNOLOGIES
ONLINE SAFETY
-refers to the maximization of internet
user’s knowledge and awareness of
safety protocols, online crimes, and
security risks in the private property.
ONLINE SECURITY
• refers to the rules that are followed and
the actions that are taken to make sure
that online users and data privacy
aren’t compromised by cybercriminals.
ONLINE CRIMES
1.Cyberbullying
- Republic Act 10627 or The Anti-Bullying
Act of 2013
-defines as any severe or repeated use
by one or more students of a written,
verbal or electronic expression, or a
physical act or gesture.
Cyberbullying comes in
different forms. It can be
flaming, harassment,
denigration,
impersonation, outing,
trickery, exclusion, and
cyberstalking.
a. Flaming
•Is an online fight using
electronic messages with angry
and vulgar languages.
b. Harassment
-It is an act of repeatedly sending
nasty, mean, and insulting
messages.
c. Denigration
- it is sending or posting gossip or
rumors about a person to damage
his or her reputation or friendship.
d. Impersonation
• When someone is pretending to be
someone else and sending or posting
material to get that person in trouble or
danger or to damage that person’s
reputation or friendship.
e. Outing
- it is an act of sharing someone’s
secrets or embarrassing
information or images online.
f. Trickery
- when someone is talking to a person to
let him or her reveal his or her secrets or
embarrassing information and then,
shares the sensitive information online.
g. Exclusion
-when someone is intentionally or
cruelly excluded from an online
group.
h. Cyberstalking
-is the act of repeated , intense
harassment and denigration that
includes threats or creates
significant fear.
Be cautious when surfing online
as cyberbullying may occur in
different online spaces such as in
the emails, chat rooms, social
media, blogs, video games, and
even cellular phones.
Everyone must be vigilant and
careful, as cyberbullying can affect
the victim in many ways. This may
include depression, severe sadness,
lowered self-worth and confidence,
stress, absences in school, and
even thoughts of self harm.
What are the best
things when
cyberbullying is
observed?
1. Inform a trusted person.
2. Try not to instigate.
3. Block connection with the bully.
4. Always be aware.
5. Logout from an online
accounts.
6. Be not a cyberbully.
IDENTITY THEFT
-US Department of Justice defines “identity
theft” and “identity fraud” as all types of
crimes in which someone wrongfully obtains
and use another person’s personal data in
some way that involves fraud or deception.
The US Department of Justice
further explained that identity
theft and fraud may commonly
happen in these situations:
• When “shoulder surfing is done by criminals, as
you use online communication in public places.
• When you receive pre-approved credit card but discard them
improperly. From here, criminals may be able to activate the
trashed cards at your expense.
• When you respond to spam mails or unsolicited
emails which require you to input personal data.
There are some practical tips that should
be observed to be protected from online
identity theft and fraud.
a.Use Good Password- Ensure that your
account password is strong.
b. Report Identity Theft. Violations can be
reported to the right authorities that are
responsible for dealing with crimes.
1.Stopping credit companies from letting you
pay fraudulent transactions at your name.
2.Removing false accounts
3.Extending fraud alert on your accounts
4.Examining your report out of the theft.
3. Phishing
• Oxford Lexico defines phishing as, “the
fraudulent practice of sending emails
purporting to be from reputable companies
in order to induce individuals to reveal
personal information such as passwords and
credit card number.”
Ways to be secured from phishing
attacks.
a.B e scrutinizing of the website that you
are logged in.
b.Be cautious of giving information online.
c.Be alert with links sent via messages
and emails.
4. Plagiarism and Copyright
Infringement
The university of Oxford in the UK
stated “plagiarism is presenting
someone else’s work or ideas a your
own, with or without their consent, by
incorporating it in your work without full
acknowledgement.
4. Plagiarism and Copyright
Infringement
All published and unpublished
material whether in manuscript , printed
or electronic form, is covered under this
definition. Plagiarism may be
intentional, or reckless, or untentional.
Plagiarism
1. Verbatim quotation without clear
acknowledgement,
2. Cutting and pasting ideas from the internet
without proper citation,
3. Paraphrasing without due acknowledgement
of the source, collusion, and failure to
attribute assistance made.
Plagiarism
4. Auto plagiarism or resubmission of
works already submitted.
Common Internet Security Threats
Many threats are present on the
internet. Internet security threats are dangers
that are associated with using the internet.
There are multitude of concepts related to the
internet threats, but here are the most common
forms identified by McAfee Corporation.
1. Malwares
This is the shortened form of malicious
software. Some examples of malwares are
computer viruses, worms, and dishonest
spyware.
2. Computer Worms
These are programs that can replicate
themselves from one computer to another in
great volume and can spread themselves
rapidly without human intervention.
3. Spam
Spam or unwanted messages are
harmless. They usually junk mails sent in
your email, but there are times that they
contain links that put you at risk.
4.Phishing
These scam are created by
cybercriminals who intend to ask for
private or elicit information from their
victim.
Internet Security Strategies
1. Browser Selection
2. Email Security
3. Multifactor Authentication (MFA)
4. Firewalls
Online Ethics and Etiquette
The crimes, threats, and violations previously
discussed are so rampant that many internet users
have been victimized.
Generally, ethics deals what is good and bad. It is a
set of moral principles that can be taken as a guiding
philosophy in life. In the contest of internet use, the
Maekkula Center for Applied Ethics of Santa Clara
University defines ethics as “the analysis of the role
that the internet plays in what philosophers call the
developing of good life– the king of life that we want
for ourselves, for society overall, the kinds of people
we want to be.”
Internet ethics may deal issues on privacy,
big data, net neutrality, and access to the
internet.
1. Privacy
2. Big Data
3. Net Neutrality
4. Access to the internet
Online Etiquette
Having considered internet ethics as
guiding principles in using the internet, specific
and acceptable conduct must be observed by
the internet users. This acceptable conduct
that adheres to polite behaviors and respectful
manners is called online etiquette.
Here are the ways on how
to behave and present
yourself when you are
online.
1. Be always courteous.
2. Do not use foul language and incite anger by writing in
uppercase and overusing the exclamation mark.
3. Appropriate your humor and avoid sarcasm.
4. Do not share or post offensive materials.
5. Always acknowledge owners of ideas and materials used.
6. Try to be understanding to a maximum tolerance. Be
kind.
7. Respect others’ opinions. Deal with everyone with a
humanitarian approach.
To sum it up, always be humanitarian to
your fellow netizens. Show love, respect, kindness,
compassion, and acceptance, but do not forget
what is just. Approach everyone in the best
possible ways available. Try to put your feet in
their shoes and act accordingly. It always pays off
to think before you act.