0% found this document useful (0 votes)
8 views6 pages

Etech Session 1-4 (Modular)

The document covers various aspects of online platforms, including definitions and examples of online systems, search engines, communication services, payment systems, advertising platforms, and social media. It also discusses internet security, cybercrime, malicious threats, and the importance of netiquette. Additionally, it addresses research skills and copyright infringement, emphasizing the need for responsible online behavior and awareness of potential risks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views6 pages

Etech Session 1-4 (Modular)

The document covers various aspects of online platforms, including definitions and examples of online systems, search engines, communication services, payment systems, advertising platforms, and social media. It also discusses internet security, cybercrime, malicious threats, and the importance of netiquette. Additionally, it addresses research skills and copyright infringement, emphasizing the need for responsible online behavior and awareness of potential risks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

EMPOWERMENT TECHNOLOGIES

SESSION 1: ONLINE PLATFORMS, SITES AND CONTENTS


Online system is a set of principles or procedures according to which something is done, an
organized scheme or method.
Ex. Online Shopping System
A platform is a group of technologies that are used as a base upon which other applications,
processes or technologies are developed.
• SEARCH ENGINES
It is a software system that is designed to search for information on the World Wide Web
(WWW). The search results are generally presented in a line of results referred to as Search
Engine Results Page (SERPs). The information may be a mix of webpages, images, and other
types of files
• COMMUNICATION SERVICES
• These are outsourced enterprise communications solutions that can be leased from a
single vendor or provider.
• A Communications Service Provider (CSP) is a provider that transports information
electronically and can encompass public and private companies in telecom, internet,
cable, satellite, and managed services business.
• PAYMENT SYSTEM
It is any system used to settle financial transactions through transfer of monetary value, and
includes the institutions, instruments, people, rules, procedures, standards, and technologies.
• ADVERTISING PLATFORMS
It allows users to create and manage advertising campaigns, generate reports, and retrieve
information about the ads, campaigns, and organizations that are associated with an account
• SOCIAL MEDIA
Social Media are forms of electronic communication (as Websites for social networking and
microblogging) through which users create online communities to share information, ideas,
personal messages, and other content (as videos).
SESSION 2 &3: ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTE

INTERNET SECURITY. With the growth of global e-commerce, an ever-increasing number of


people are becoming more comfortable with making monetary transaction online. This has
naturally led to the expansion of online criminal activity or cybercrime.

Cybercrime is defined as a crime in which a computer is the object of the crime (hacking,
phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes).

MALICIOUS THREATS PRESENT ON THE INTERNET:


While the internet is a fantastic place for communication and information, there are many
malicious threats you need to avoid:

SPAM – the fact that most of our email accounts come with a “Spam” or “Junk” folder insinuates
that spam emails is a huge issue. Aside from being an annoyance, spam emails are not a direct
threat. However, many can contain malware.
• Unwanted email mostly from bots or advertisers. An internet bot, also known as web robot or
simply bot, is a software application that runs automated tasks (scripts) over the internet.
ADWARE – it is a type of malware software that displays unwanted ads when a user is surfing
the internet.
TROJAN - Trojans leave your computer completely unprotected which can mean that hackers
can steal any data from your system. Trojans often present themselves as harmless computer
programs so that hackers can penetrate your computer without being detected.
VIRUS – viruses usually attach themselves covertly to downloads as they are designed to
spread at an alarming rate virus are often attached to files for download, shared via CDs, DVDs,
and USB sticks or loaded on to computers by opening infected email attachments.
PHISHING – in its simplest terms, phishing is a form of fraudulent activity. Often, official looking
emails are sent impersonating a well-known provider, such as a bank.
• The attempt to obtain personal information.
SPYWARE – it is usually attached to pop-ups of downloadable files. Whoever is controlling the
spyware has access to your personal details without you even knowing.
KEYLOGGER – like a part of spyware, keyloggers record a user’s keyboard action.
PHARMING – Pharmers often create web pages mimicking that of a trustworthy business, such
as an online banking log-in page. Users will then enter their details, thinking they are logging
into their usual service, and their details will be stolen by the pharmer.
ROGUE SECURITY SOFTWARE – if you are ever downloading antivirus or anti-spyware
programs, make sure you have purchased it from a legitimate source. Rogue Security Software
will often ask you to pay for extra protection, which is huge. The security software is completely
useless, and criminals have robbed you of your money.
TEN CORE RULES OF NETIQUTTE
1. Remember the human. Remember the quotation from Confucious, “do not do unto others,
what you don’t want to do unto you”. While you’re interacting online, always be mindful to be
vigilant and to be cautious of who you interact with.
2. Adhere to the same standards of behavior online that you follow in real life. How you
talk in real life, should also be how you do it online. Don’t pretend to be somebody you are not
just because you are behind your computer desks. Be professional.
3. Know where you are in cyberspace. Always bear in mind that there are many threats online
so you must know where to go and always check your activities to make sure that what you are
doing is still safe and will not endanger your life or your work.
4. Respect other people’s time and bandwidth. Not because you’re online, you can do
anything anytime you want. Respect your clients time and privacy. Contact during reasonable
hours and never use their information and disclose it to someone unauthorized, even for your
own sake
5. Make yourself look good online. Try to be formal and as presentable as you can online. It
won’t harm you to get a nice and good first impression from possible clients.
6. Share expert knowledge. Don’t spread unreliable news. Never be part of fake news
perpetrators and to the rampant mis and disinformation of netizens.
7. Help keep flame wars under control. Don’t engage in online wars. As long as you can don’t
involve your work with your personal agendas.
8. Respect other people’s privacy. Don’t take your client’s information for granted. They
trusted you enough to give it to you, and so you must hold and keep that trust to create a good
customer - service provider relationship.
9. Don’t abuse your power. Just like how the Spiderman movie states, “with great power,
comes great responsibility.” Use your authority wisely.
10. Be forgiving of other people’s mistakes. Nobody’s perfect. Learn how to manage
whenever a colleague creates a mistake. Teach them, don’t flaunt their flaws.

SESSION 4: CONTEXTUALIZED ONLINE SEARCH AND RESEARCH SKILLS

It is the practice of using Internet information, especially free information on the World Wide
Web, in research.
 focused and purposeful (so not recreational browsing)
 uses Internet information or Internet-based resources (like Internet discussion
forum)
 tends towards the immediate (drawing answers from information you can access
without delay)
 tends to access information without a purchase price.
 Research

• The Research Process


• Searching the Web
There are billions of pages of information on the World Wide Web and finding relevant and
reliable information can be a challenge.
When entering a keyword into a search engine, you will receive a list with the number of hits or
results and links to the related sites.
• COMMON COMMANDS
FOR SEARCH ENGINES
• Quotation Marks (“) Using quotation marks will help to find specific phrases
involving more than one word.
• Addition Sign (+) Adding a + sign before a word means that it MUST be
included in each site listed.
• Subtraction Sign (-) Adding a - sign before a word means that it will NOT
appear in the sites listed.
• Asterisks (*) Asterisks can be used for wild cards in some search engines.

• Search Engines for Children


Search engines designed for younger students are useful tools for the classroom.
They screen for inappropriate material and provide appropriate sites for students on topics
related to educational and entertainment purposes.

• Setting Bookmarks on the Web
• Browsers such as Safari, Firefox, and Internet Explorer provide a way to create a list of
your favorite sites that you can access with a click of the mouse, this is thru bookmarks.
• COPYRIGHT INFRINGEMENT
• It is the illegal use of someone else’s copyrighted work.
• Registering your copyrighted work can help you succeed in a lawsuit against someone
who is infringing on your copyright.
• If you create something – an idea, an invention, a form of literary work, or a research,
you have the right as to how it should be used by others. This is called Intellectual
Property.
• COPYRIGHT INFRINGEMENT – KNOW THE LAW
• There are some limitations to copyright laws.
• For instance, in the Philippines, copyrights only last a last a lifetime (of the author) plus
50 years.
• There are also provisions for “Fair Use” which mean that an intellectual property may
be used without a consent as long as it used for commentaries, criticisms, search
engines, parodies, news reports, library archiving, teaching, and education.
Answer the following:

1. Make a comparison of two online platforms and which do you prefer to use?
Example: Facebooks Versus Instagram: I prefer to use Facebook because I can browse
more pictures, videos and even chat my friends everyday.

2. Directions: Using the Internet, look for the online platforms and applications listed below.
Evaluate whether they are Social Media, Search Engines, Communication Services,
Payment Systems and Advertising Platforms.
 Yahoo-
 Facebook -
 Google-
 Instagram-
 Tiktok-
 Paymaya-
 Gcash-
 Smart-
 Globe-
 Twitter-
3. What is Cybercrime?

4. What is Netiquette?

5. What are the Malicious Threats present on the Interne

6. What do you think is the biggest obstacle that researchers are facing when using Internet?

7. Give a sample scenario where in the violation of copyright infringement law was violated.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy