Ge 10a Chapter 4
Ge 10a Chapter 4
IT ERA
CELESTER L. SAYCON, LPT
COMPUTER SCIENCE AND INFORMATION TECHNOLOGY DEPT
INTRODUCTION TO DIGITAL
01
INFORMATION AND
05
TECHNOLOGY AND
COMMUNICATION SOCIAL CHANGE
TECHNOLOGY
06
HISTORY OF IT CULTURE AND THE
COMPUTER: BASIC
COMPUTING PERIODS
02 SOCIETY
TABLE OF
07
IMAGIN AND DESIGN
03
FOR SOCIAL IMPACT
THE WEB AND THE
INTERNET CONTENTS
PHOTO IMAGING AND
08
THE NETIQUETTE
04
AND THE COMPUTER POST PROCESSING
ETHICS
CREATING
09
INFOGRAPHICS FOR
SOCIAL CAMPAIGNS
04
THE NETIQUTTE AND THE
COMPUTER ETHICS
NETIQUETTE
What is Netiquette?
- What is Netiquette? Simple stated, it’s network etiquette – that is the
etiquette of cyberspace and “etiquette” means the forms of required by
good breeding or prescribed by authority to be required in social or official
life. In other words, netiquette is a set of rules for behaving properly online.
- When you use e-mail, instant messenger, video calls, or discussion boards to
communicate with others online, please be sure to follow the rules of
professional online communications known as netiquette. These rules will
help you communicate with instructors, classmates, and potential employers
more effectively and will help prevent misunderstandings
GOLDEN RULE
Even though you may be interacting with a computer screen, you are
communicating with a real person who will react to your message. Make a
good impression - treat others with the same respect that you would like to
receive and avoid confrontational or offensive language
AVOID SLANG, ACRONYMS, AND TEXT TALK
Communicating effectively in college and business environments requires the use of correct terminology,
spelling, and grammar that can easily be understood. For example, use “your” instead of “ur”.
• When sharing a viewpoint that differs from someone else’s, it is a best practice to first acknowledge the
other person by briefly restating what he or she said, but in your own words. This lets the person know
that you are listening and trying to understand them.
• When presenting an opinion or criticism, it is helpful to use phrases that identify to whose point of view
you are referring. If the opinion is yours, you can begin with the phrase “In my experience” or “In my
opinion”. If it is a viewpoint of someone else, make sure you identify that in your message (Example:
“According to Eric Ericson,” or “The president believes”
10 Commandment of Computer Ethics
RULES
1. Remember the Human When communicating electronically, whether through email, instant message,
discussion post, text, or some other method, practice the Golden Rule: Do unto others as you would
have others do unto you.
2. Adhere to the same standards of behavior online that you follow in real life
3. Know where you are in cyberspace "Netiquette varies from domain to domain."
- CYBERCRIME - is defined as a crime in which a computer is the object of the crime (hacking,
phishing, spamming and child pornography) is used as a tool to commit an offense.
LAWS
-
- Republic Act No. 10175 Cybercrime Prevention Act of 2012 is a law in the Philippines approved
on September 12,2012 which aims to address legal issues concerning online interactions and
internet.
- Republic Act No. 10173 Data Privacy Act of 2012 is an act protecting individual personal
information.
COMMON FORMS OF CYBERCRIMES
A. COPYRIGHT
- -The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or
record literary, artistic, or musical material, and to authorize others to do the same
- Copyright infringement is the violation, piracy or theft of a copyright holder's exclusive rights through
the unauthorized use of a copyrighted material or work
B. PLAGIARISM
- An act or instance of using or closely imitating the language and thoughts of another author without
authorization.
C. COMPUTER ADDICTION
- OFFLINE - : generally used when speaking about excessive gaming behavior, which can be practiced
both offline and online.
- Online: Also known as “Internet Addiction”, gets more attention in general from scientific research
than offline computer addiction, mainly because most cases of computer addiction are related to the
excessive use of the Internet.
- *Virtual Self -The persona you create about yourself virtually.
CRIMINAL ACTIVITIES
1. HACKING –
- Unauthorized access of or interference with computer systems, servers, or other information
and communication systems
- • Unauthorized access to corrupt, alter, steal, or destroy electronic data using computers or
other information and communication systems without the computer or system owner’s
knowledge and consent
- • The introduction of computer viruses resulting in the corruption, alteration, theft, or loss of
such data
- • Illegal Access
- • Illegal Interception
- • Data Interference
- • System Interference
- • Misuse of Devices
- • Infection of IT Systems with Malware – if the act is committed against critical infrastructure
of the Philippines the, penalty is between 12-20 years reclusion temporal
- • Six years up to twelve years of imprisonment also known as prison mayor
2. COMPUTER RELATED FORGERY, FRAUD AND/OR IDENTITY THEFT
-an attempt to obtain sensitive information such as usernames, passwords, and credit
card details and (indirectly money), often for malicious reasons.
• Phishing
• Pharming
• Spam
• Maximum of Php 200,000 fine or prison mayor
3. ELECTRONIC THEFT
-• Illegal Downloading
• Obtaining files that you do not have the right to use from the internet.
• Digital Piracy
• Practice of illegally copying and selling digital music, video, computer software, etc. •
Copyright Infringement
• Penalty of Php 50,000 – 500, 000 and or prison mayor
4. CYBERBULLYING
-The use of electronic communication to bully a person, typically by sending a
message of an intimidating or threatening nature.
• The Anti-Bullying Act of 2013 (RA 10627)
5. CYBERSEX
Willful engagement, maintenance, control, or operation, directly or indirectly of any
lascivious exhibition of sexual organs or sexual activity with the aid of a computer
system for favor or consideration.
• There is a discussion on this matter if it involves “couples” or “people in
relationship” who engage in cybersex.
• Penalty at least Php 200,000 and or prison mayor
6. CHILD PORNOGRAPHY
-is a form of child sexual exploitation.
• Unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or
the Anti-Child Pornography Act of 2009, committed through a computer system.
• Penalty of 12-20 years of imprisonment or reclusion temporal
7. CYBER DEFAMATION
• Is an unprivileged false statement of fact which tends to harm the reputation of a
person or company.
• Penalty of 6-12 years of imprisonment or prison mayor.
INTERNET THREATS
HACKING
Hacking is a term used to describe actions taken by someone to gain
unauthorized access to a computer. The availability of information online on the
tools, techniques, and malware makes it easier for even non-technical people to
undertake malicious activities. The process by which cyber criminals gain access
to your computer