0% found this document useful (0 votes)
66 views

Empowering Technology Lesson2

Uploaded by

Reymart de Vera
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views

Empowering Technology Lesson2

Uploaded by

Reymart de Vera
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 54

INTERNET

AS A TOOL FOR
EFFECTIVE RESEARCH ! Lesson II

1
LESSON 2 Use the Internet as a
tool for credible
research and
information gathering
TARGET
By the end of this lesson,
you will be able to
Gain AWARENES on
cybercrimes
S
Practice computer
, online
ETHICS , and
SAFETY SECURITY
2
“The INTERNET is becoming the
TOWN SQUARE for the global
village of TOMORROW.”
—WILLIAM “BILL” GATES

3
CONTEXTUALIZED
To place something or
ONLINE someone in a particular
SEARCH context – Advance
English Dictionary, Windows App

A SKILLED OR The activity of looking


OPTIMIZED WAY OF thoroughly in order to
SEARCHING THE find something or
INTERNET BASED
ON THE “CONTEXT” someone – Advance
English Dictionary, Windows App
PROVIDED. –
Feldman, 2012
4
WHAT IS
Systematic investigation
to establish facts
RESEARCH?
A search for knowledge
– Advance English Dictionary, Windows App A SYSTEMATIC INQUIRY
THAT ATTEMPTS TO
PERSONAL PROVIDE SOLUTIONS
RESEARCH TO EXISTING PROBLEMS
AND QUESTIONS USING
PROFESSIONAL FACTS AND DATA
RESEARCH – E-TECH, 2017
5
!
WHY IS IT IMPORTANT?
ORIGINA SCIENTIFI HUMANITI ARTISTIC
L TO DISCOVER
C ESNEW RESEARC
RESEAR INFORMATION
RESEARC RESEARCH H
CH H
TO INTERPRET EXISTING FACTS
? WHAT ARE THE RESEARCH SKILLS
I NEED TO DEVELOP?

1 2 3
CHECK ASK GOOD GO
YOUR QUESTIONS BEYOND
SOURCES THE
SURFACE 7
? WHAT ARE THE RESEARCH SKILLS
I NEED TO DEVELOP?

4 5 6
BE RESPECT USE YOUR
PATIENT OWNERSHIP NETWORKS

8
ICT TOOLS MUSIXMATCH
USEFUL IN PINTEREST
RESEARCH SIRI, CORTANA AND
GOOGLE NOW

GOOGLE ACADEMIC
SCHOLAR WEBSITES
GOOGLE ONLINE
SEARCH JOURNALS 9
ICT TOOLS
USEFUL IN
GOOGLE
RESEARCH SEARCH
The most popular and powerful
Search Engine in the 21 Century
st

10
ICT TOOLS
USEFUL IN
GOOGLE
RESEARCH SCHOLAR
Gives users a simpler way to search
for scholarly literature on the
Internet.
11
ICT TOOLS ONLINE
USEFUL IN JOURNALS
RESEARCH

Are scholarly publication released in


a format accessible via Internet.

12
ICT TOOLS
USEFUL IN ACADEMIC
RESEARCH WEBSITES
It is a website that provides
electronic copies of papers, journals,
books, video and audio recordings
that may aid you in the research
process.
13
ICT SAFETY,
SECURITY,
AND
NETIQUETTE

14
!
VERIFICATION OF ONLINE
SOURCE MATERIALS
CURREN SCOPE
CY
SECURIT AUTHORI
!
VERIFICATION OF ONLINE
SOURCE MATERIALS
CURREN
CY
-Is the information up-to-date?
!
VERIFICATION OF ONLINE
SOURCE MATERIALS
SECURIT
Y-Does the site ask too much
personal information?
!
VERIFICATION OF ONLINE
SOURCE MATERIALS
SCOPE
-is the information in-depth?
!
VERIFICATION OF ONLINE
SOURCE MATERIALS
AUTHORIT
Y
-Does the information come
from a trusted expert?
!
COMPUTER ETHICS AND
NETIQUETTE
!
COMPUTER ETHICS INSTITUTE
TEN COMMANDMENTS OF COMPUTER
By RAMONETHICS
C. BARQUIN, 1992
1 THE TEN COMMANDMENTS OF
COMPUTER ETHICS

Thou shalt not use


a computer to
harm other people
in any way
2 THE TEN COMMANDMENTS OF
COMPUTER ETHICS

Thou shalt not


interfere with
other people’s
computer work
3 THE TEN COMMANDMENTS OF
COMPUTER ETHICS

Thou shalt not


sneak around in
the other people’s
files
4 THE TEN COMMANDMENTS OF
COMPUTER ETHICS

Thou shalt not use


a computer to
steal
5 THE TEN COMMANDMENTS OF
COMPUTER ETHICS

Thou shalt not use


a computer to bear
a false witness
6 THE TEN COMMANDMENTS OF
COMPUTER ETHICS

Thou shalt not


copy or use
proprietary
software for which
you have not paid
7 THE TEN COMMANDMENTS OF
COMPUTER ETHICS
Thou shalt not use other
people’s computer
resources without
authorization or proper
compensation
8 THE TEN COMMANDMENTS OF
COMPUTER ETHICS

Thou shalt not


appropriate
other’s intellectual
property
9 THE TEN COMMANDMENTS OF
COMPUTER ETHICS
Thou shalt think about
the social consequences
of the program you are
writing or the system
you are designing
10 THE TEN COMMANDMENTS OF
COMPUTER ETHICS
Thou shalt always use a
computer in ways that
ensure consideration
and respect for your
fellow humans
6. Thou shalt not copy or use
THE TEN proprietary software for which
COMMANDMENTS OF you have not paid.
7. Thou shalt not use other
COMPUTER ETHICS people’s computer resources
1. Thou shalt not use a computer without authorization or proper
to harm other people in any compensation.
way. 8. Thou shalt not appropriate
2. Thou shalt not interfere with other’s intellectual property.
other people’s computer work. 9. Thou shalt think about the social
3. Thou shalt not sneak around consequences of the program you
in the other people’s files. are writing or the system you are
4. Thou shalt not use a computer designing.
to steal. 10. Thou shalt always use a
computer in ways that ensure
5. Thou shalt not use a computer consideration and respect for
to bear a false witness. your fellow humans.
!
INTERNET
NETIQUETTE
ETHICS
1 NETIQUETTE
Always keep your
software or
application updated
and uninstall the ones
that you do not use
2 NETIQUETTE
Do not divulge
sensitive information
online, especially on
unsafe websites
3 NETIQUETTE
Be careful when
dealing with e-mails
from unknown sources
or spam
4 NETIQUETTE
Run your antivirus
software before
going online
5 NETIQUETTE

Think Before
You Click
!
INTELLECTUAL
PROPERTY RIGHT
!
AVOID PLAGIARISM
!
WriteCheck’s 6 Ways to
Avoid Plagiarism in
Research Papers
1 6 Ways to Avoid
Plagiarism

Paraphrase
1
Paraphrase
Read the materials you wish to use
and rephrase it in your own words
2 6 Ways to Avoid
Plagiarism

CITE
2
CITE
Proper citation must
be observe when
referencing existing
materials.
3 6 Ways to Avoid
Plagiarism

QUOTING
3
QUOTING
Direct quoting the source
material is recommended in
order to avoid misquotation
or misunderstanding
4 6 Ways to Avoid
Plagiarism

CITING
QUOTES
4 CITING
QUOTES
The method of citing
quotes and citing the
paraphrase material
generally
5 6 Ways to Avoid
Plagiarism
CITING YOUR
OWN
MATERIAL
5 CITING YOUR
OWN MATERIAL
It is still necessary to cite
yourself as you would
the work of another
person.
6 6 Ways to Avoid
Plagiarism

REFERENCING
6
REFERENCING
It is also important to
provide a page for
references and the
materials used at the end
of your work.
THANK YOU !
Neal Creative © Neal Creative | click & Learn more

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy