0% found this document useful (0 votes)
12 views32 pages

Week 2 Online Systems, Functions, and Platforms

The document outlines the concept of online systems, highlighting their integration of software, hardware, and the internet to deliver services efficiently. It discusses the importance of online research skills, the risks associated with internet use, including cyberbullying and identity theft, and emphasizes the need for online safety and security measures. Additionally, it covers internet ethics and etiquette, stressing the importance of respectful online behavior and the protection of personal data.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views32 pages

Week 2 Online Systems, Functions, and Platforms

The document outlines the concept of online systems, highlighting their integration of software, hardware, and the internet to deliver services efficiently. It discusses the importance of online research skills, the risks associated with internet use, including cyberbullying and identity theft, and emphasizes the need for online safety and security measures. Additionally, it covers internet ethics and etiquette, stressing the importance of respectful online behavior and the protection of personal data.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 32

ONLINE SYSTEMS, FUNCTIONS, AND

PLATFORMS
What is Online System?

• it refers to the integrated and collaborative use of software,


hardware, and the internet to deliver their intended functions through
an identified platform
• using the internet, online systems deliver information and services to
their users
• It helps process the system in a simpler, faster, and more convenient
for the users
• It refers to the range of services and tools available on the internet
that will be used to provide the indicated functions earlier (ex. Google,
Yahoo)
ONLINE SYSTEM FUNCTIONS MAY INCLUDE BUT
NOT LIMITED TO THE FOLLOWING:
a.They may be used as a tool for searching and researching
vital information.
b.They may be used to speed up transactions that may take
more time when done manually.
c.They may be used organize records that are generated in
single or multiple transactions.
d.They may be used to manage the data involved in online
transactions
CONTEXTUALIZED
ONLINE SEARCH
AND VITAL
RESEARCH
SKILLS
ONLINE SEARCH

• Using several search engines like Yahoo,


Google, a multitude of information can be
accessed from various online websites and
databases

• Searching can be done for personal, academic,


and professional purposes
RESEARCH SKILL
• The world wide web offers a lot of journals and other information databanks
that a user can access and use to enrich his or her knowledge of a particular
subject he or she delves into.

• He or she may also visit websites of the government, renowned private


organizations, and academic institutions to collect and secure credible data.

• When writing an academic or scholarly text such as a research report, a


student must have the skills necessary in the process of conducting a particular
study, as a research report, a student must have the skills necessary in the
process of conducting a particular study, as research skills are fundamental in
learning any discipline or field.
RESEARCH SKILLS THAT EVERY STUDENT-
RESEARCHER MUST POSSESS:
a. Be familiar of search engines that you can use in your online search.
b. Keep a record of websites, web pages, and online database that you
can access for specific information that you need. (Example: you may
access the website of the United Nation at www.un.org for information
catered within the parameters of the organization.
c. Know the keywords or key phrases of the topic you are searching
online.
d. Organize your searched data by keeping them in well-labelled folders
of documents in your external or internal storage devices.
e. Create a backup of the files you researched and saved.
f. Give credit to your sources.
ETHICS ON THE
INTERNET
However beneficial the use of internet technology is,
people who use it are also exposed to risks and danger.
In fact, crimes done through the internet and many
devices are prevalent. Hacking, cracking, identity theft,
sexual exploitation, defamation, and bullying are just
some of the examples of the crimes that prove the
downside of the internet technology.
ONLINE SAFETY
AND
SECURITY
ONLINE SAFETY
• Sometimes regarded as e-safety or cyber safety, refers to the maximization
of internet user’s knowledge and awareness of safety protocols, online
crimes, and security risks in the private property and information which are
connected to the use of the internet.

• It is a user’s precautionary measures that he or she applies to ensure that his


or her experience online does not harm him or her in any way
ONLINE SECURITY

• It refers to the “rules that are followed and the actions


that are taken to make sure that online users and data
privacy aren’t compromised by cybercriminals.

• It is designed by websites and other internet pages to


ensure that the people accessing their sites and pages
are protected from different online risks and danger.
ONLINE CRIMES
1. CYBERBULLYING

• Republic act 10627 or the Anti-Bullying Act of 2013


defines bullying as “any severe or repeated use by one
or more students of a written, verbal or electronic
expression, or a physical act or gesture, or any
combination thereof, directed at another student that
has the effect of actually causing or placing the latter in
reasonable fear of physical or emotional harm or
damage to his property
CYBERBULLYING COMES IN A DIFFERENT FORMS:
a. FLAMING
- it is an online fight using electronic messages with angry and vulgar languages.
b. HARASSMENT
- is the act of repeatedly sending nasty, mean, and insulting messages.
c. DENIGRATION
- sending or posting gossip or rumors about a person to damage hir or her
reputation or friendships.
d. IMPERSONATION
- when someone is pretending to be someone else and sending or posting material
to get that person in trouble or danger or to damage that person’s reputation or
friendships.
e. OUTING
- is the act of sharing someone’s secrets or embarrassing information or images
online.
f. TRICKERY
- when someone is talking to a person to let him or her reveal his or her secrets or
embarrassing information and then, shares the sensitive information online
g. EXCLUSION
- when one is intentionally or cruelly excluded from an online group.
h. CYBERSTALKING
- is the act of repeated, intense harassment and denigration that includes threats
or creates significant fear.
2. IDENTITY THEFT

• It is a type of crime which someone wrongfully obtains


and uses another person’s personal data in some way
that involves fraud or deception, typically for economic
gain. (identified by US Department of Justice)
Identity theft commonly happens in the following
situations:
a. When “shoulder surfing” is done by criminals, as you use online
communication in public places.
- this may come in events the criminal is watching over you as you dial phone
numbers, or when listening over conversations where they get private information
like credit card number, birthday, or home address.
b. When you receive pre-approved credit cards but discard them improperly.
- criminals may be able to activate the trashed cards at your expense
c. When you respond to spam mails or unsolicited emails which require you to
input personal data.
- the collected data will later be used to steal other information or to hack your
online accounts
3.PHISHING

• Oxford lexico defines phishing as, “the fraudulent


practice of sending emails purporting to be from
reputable companies in order to induce individuals to
reveal personal information such as passwords and
credit card numbers”.
4.PLAGIARISM AND COPYRIGHT INFRINGEMENT
• The University of Oxford in the UK States that “ plagiarism is
presenting someone else’s work or ideas as your own, with or
without their consent, by incorporating it in your work without full
acknowledgment.

• COPYRIGHT INFRINGEMENT
- “occurs when copyrighted work is reproduced, distributed,
performed, publicly displayed, or made into a derivative work without
the permission of the copyright owner”.
COMMON INTERNET SECURITY THREATS
1. MALWARE
- shortened term for malicious software. Some of the examples of malwares are
computer viruses, worms, and dishonest spyware.
2. COMPUTER WORMS
- these are programs that can replicate themselves from one computer to another in the
great volume and can spread themselves rapidly without human intervention.
3. SPAM
- spam or unwanted messages. They are usually junk mails sent in your email, but there
are times that they contain links that put you at risk. These links may be connected to
malwares that intend to steal your data
4. PHISHING
- these scams are created by cybercriminals who intend to ask for private or
elicitinformation from their victims
INTERNET
SECURITY
STRATEGIES
STRATEGIES MAY COME IN THE FOLLOWING FORMS:

1. BROWSER SELECTION
- be sure that the browser you are using is secured. The browsers employs
different control settings that protects its users.
2. EMAIL SECURITY
- try to establish a multilayered and comprehensive email security because this will
significantly increase protection from threats associated with email use.
3. MULTIFACTOR AUTHENTICATION(MFA)
- this is a process by which computer access is controlled by requiring several
authentication mechanism. (for instance: before one can transfer funds online from
one bank account to another, he or she is required to login to an online account
that requires a password, afterwards, an OTP is sent to the registered cell phone
number of the account owner, and require to encode it in the system )
ONLINE ETHICS
AND
ETIQUTTE
INTERNET ETHICS may deal with the following:

a.PRIVACY
b.BIG DATA
c.NET NEUTRALITY
d.ACCESS TO THE INTERNET
a. PRIVACY

• the level of privacy protection an individual has


while connected to the Internet. It covers the
amount of online security available for personal
and financial data, communications, and
preferences.
b. BIG DATA
• These data are important in making thoughtful
decisions. Inquiries on how data are collected, from
whom they are collected, for what purpose these
will be used, or what exclusions are made.
c. NET NEUTRALITY

• These means that all internet providers


should give equal treatment to all contents
that flow in their network.
d. ACCESS TO THE INTERNET

• If internet is right, then, how do we view


the large portion of humanity that does
not have or have limited access to it?
ONLINE ETIQUITTE
Ways on how to behave and present yourself when
online:
1. Be always courteous.
2. Do not use foul language and incite anger by writing in uppercase
and overusing the exclamation mark.
3. Appropriate your humor and avoid sarcasm.
4. Do not share or post offensive materials.
5. Always acknowledge owners of ideas and materials used.
6. Try to be understanding to a maximum tolerance. Be kind.
7. Respect others’ opinions. Deal with everyone with a humanitarian
approach.
QUIZ #1
Using the internet, it is indispensable whether you are a student in a university, a professional, or
an ordinary person in the society. With this, it is imperative that you must always conduct
yourself as a good internet citizen or netizen.

Contextualize according to the roles given. Show your answer to promote ethical conduct when
surfing online.
What are the three most important safety guidelines that you remind yourself of when transacting
online as a global citizen?

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy