Empowerment Technologies Information and Communication Technologies ACTIVITY 1 How is your digital media life like?
Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) 1. 82% of teens say that they own which of the following? a) cell phone b) smartphone c) iPod Touch or similar device d) iPad or similar device
Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) 2. What percent of teens describe themselves as “addicted” to their cell phones? a) 11% b) 27% c) 41% d) 63%
Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) 3. 68% of teens say they do which of the following at least once a day? a) text b) visit a social network c) instant message (IM) d) use email
Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) 4. How many characters (letters, punctuation marks, symbols, and spaces) can you send in a regular text message? a) 110 b) 140 c) 200 d) 250
Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) 5. How often do 34% of teens visit social networking sites? a) at least once a day b) several times a day c) once a week or less d) never
Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) 6. What percent of teens say that they don’t understand their social networking site’s privacy policies? a) 24% b) 35% c) 46% d) 61%
Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) 7. What percent of teens still prefer face-to-face communication with their friends over communication online or via texting? a) 22% b) 36% c) 49% d) 61%
Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) 8. What percent of teens say they have said something bad about someone online that they wouldn’t have said in person? a) 33% b) 67% c) 49% d) 25%
Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) 9. What percent of teens say that social networking helps them connect with people who share a common interest? a) 35% b) 42% c) 57% d) 66%
Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) 10. What percent of teens agreed they wish they could “unplug” for a while? a) 13% b) 27% c) 29% d) 43%
Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) Filipinos use Social Media to express emotions (IOITP, 2013) # whogoat # walangforever # tbt # tamaanbukol # marcelosantosIII # nofilter #BTS #OOTD
Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) Post it!
Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) Post it!
Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) Post it!
Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) Post it!
Empowerment Technologies Information and Communication Technologies DIGITAL LIFE 101 (https://www.commonsense.org) Post it!
LOG-IN…WHO AM I?
…YES! CONNECTED
ONLINE SAFETY, SECURITY, ETHICS AND ETIQUETTE
Empowerment Technologies Online Safety, Security, Ethics and Etiquette NETIQUETTE It is a combination of the words network and etiquette , and is defined as a set of rules for acceptable online behavior . Similarly, online ethics focuses on acceptable use of online social environment.
Empowerment Technologies Online Safety, Security, Ethics and Etiquette NETIQUETTE Rule 1: Remember the Human
Empowerment Technologies Online Safety, Security, Ethics and Etiquette NETIQUETTE Rule 2: Adhere to the same standards of behavior online that you follow in real life
Empowerment Technologies Online Safety, Security, Ethics and Etiquette NETIQUETTE Rule 3: Know where you are in cyberspace
Empowerment Technologies Online Safety, Security, Ethics and Etiquette NETIQUETTE Rule 4: Respect other people's time and bandwidth
Empowerment Technologies Online Safety, Security, Ethics and Etiquette NETIQUETTE Rule 5: Make yourself look good online
Empowerment Technologies Online Safety, Security, Ethics and Etiquette NETIQUETTE Rule 7: Help keep flame wars under control
Empowerment Technologies Online Safety, Security, Ethics and Etiquette NETIQUETTE Rule 8: Respect other people's privacy
Empowerment Technologies Online Safety, Security, Ethics and Etiquette NETIQUETTE Rule 9: Don't abuse your power
Empowerment Technologies Online Safety, Security, Ethics and Etiquette NETIQUETTE Rule 10: Be forgiving of other people's mistakes
Empowerment Technologies Online Safety, Security, Ethics and Etiquette Web’s GOLDEN RULE Remember the web ’ s golden rule: “ Remember, there is a person there. ” Emails, comments in chat rooms, and instant messages are read by real people with real feelings . Golden Rule
Empowerment Technologies Online Safety, Security, Ethics and Etiquette RULES OF NETIQUETTE • Online security, safety, and ethics • Internet threats • Protecting reputations online • Copyright • Contextualized online search and research skills
Empowerment Technologies Online Safety, Security, Ethics and Etiquette Online Safety and Security The Internet is one of the most dangerous places! The Internet is a powerful tool . Promote business Gain new friends
Empowerment Technologies Online Safety, Security, Ethics and Etiquette Online Safety and Security The Internet is defined as information superhighway Internet
Empowerment Technologies Online Safety, Security, Ethics and Etiquette Online Safety and Security Internet The Internet is a public place and it is up to you to protect yourself
Empowerment Technologies Do YOU agree? “Instead of promoting social behavior, social media promotes disengagement , self-absorption , loneliness and sadness .” Online Safety, Security, Ethics and Etiquette
Empowerment Technologies DIGITAL LIFE 101 (https://www.commonsensemedia.org/ video/modal/2078096) Online Safety, Security, Ethics and Etiquette
Empowerment Technologies How Safe are You? Type of Information Shared Not Shared First name Last name Middle name Current and previous school (s) Your cellphone number Name of father and mother Name of your siblings Your address Your home phone number Your birthday Online Safety, Security, Ethics and Etiquette
Empowerment Technologies Online Safety, Security, Ethics and Etiquette How Safe are You?
Empowerment Technologies Online Safety, Security, Ethics and Etiquette How Safe are You?
Empowerment Technologies Online Safety, Security, Ethics and Etiquette How Safe are You?
Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS MALWARE SPAM PHISHING
Malware – stands for Mal icious Soft ware . Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS
MALWARE Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS
MALWARE a malicious program designed to replicate itself and transfer from one computer to another. Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS
MALWARE Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS
MALWARE a malicious program that transfers from one computer to another by any type of means. Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS
MALWARE I LOVE YOU WORM I LOVE YOU WORM Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS
a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hacker to get you information MALWARE Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS
MALWARE a form of malicious software and Internet fraud that misleads users into believing there is a virus on their computer, and manipulates them into paying money for a fake malware removal ROGUE SECURITY SOFTWARE Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS
ROGUE SECURITY SOFTWARE Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS
a program designed to send you advertisements, mostly as pop-ups. MALWARE CERTIFIED ADWARE!!! Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS
MALWARE a program designed to send you advertisements, mostly as pop-ups. Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS
MALWARE a program that runs in the background without you knowing it. Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS
MALWARE a program that runs in the background without you knowing it. Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS
SPAM unwanted email mostly from bots or advertisers. Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS
SPAM An Internet bot , also known as web robot, WWW robot or simply bot , is a software application that runs automated tasks (scripts) over the Internet. Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS
PHISHING Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS -the attempt to obtain sensitive information such as usernames, passwords, and credit card details, often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.
PHISHING Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS
PHISHING CERTIFIED PHISHING!!! Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS
Empowerment Technologies Online Safety, Security, Ethics and Etiquette INTERNET THREATS
Empowerment Technologies Online Safety, Security, Ethics and Etiquette COPYRIGHT INFRINGEMENT If you create something—an idea, an invention, a form of literary work, or a research, you have the right of how it should be used by others. This is called intellectual property.
Empowerment Technologies Online Safety, Security, Ethics and Etiquette “BORROWING” Is it ever right to “ borrow ” or copy someone else ’ s pictures or writing without giving them credit?
Empowerment Technologies Online Safety, Security, Ethics and Etiquette Cutting and Pasting Others ’ Work Is Okay as Long as You… Points to Remember…
Empowerment Technologies Online Safety, Security, Ethics and Etiquette Points to Remember… Give Credit Where Credit Is Due…Cite Your Sources!
Empowerment Technologies Online Safety, Security, Ethics and Etiquette THINK BEFORE YOU CLICK 1. Before you post something on the web, ask these questions to yourself: Would you want your parents or grandparents to see it? Would you want your future boss to see it? Once you post something on the web, you have no control of who sees your posts.
Empowerment Technologies Online Safety, Security, Ethics and Etiquette THINK BEFORE YOU CLICK 2. Your friends depend on you to protect their reputation online. Talk to your friends about this serious responsibility . 3. Set your post to “private.” In this way, search engines will not be able to scan that post.
Empowerment Technologies Online Safety, Security, Ethics and Etiquette THINK BEFORE YOU CLICK 4. Avoid using names . Names are easy for search engines to scan. 5. If you feel that a post can affect you or other’s reputation , ask the one who posted it to pull it down or report it as inappropriate .
your HEART # TagAnOPPORTUNITY the future GOOD VIBES!