1/41
i miss my wife, tails
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Online Crimes
Violations that inflict harm to other people by internet users.
What is the Republic Act that defines bullying?
RA 10627
Flaming
an online fight using electronic messages with angry and vulgar languages.
Harassment
the act of repeatedly sending nasty, mean, and insulting messages.
Denigration
sending or posting gossip or rumors about a person to damage his or her reputation or friendships.
Impersonation
when someone is pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person’s reputation or friendships.
Outing
the act of sharing someone’s secrets or embarrassing information or images online.
Trickery
when someone is talking to a person to let him or her reveal his or her secrets or embarrassing information and then, shares the sensitive information online.
Exclusion
when one is intentionally or cruelly excluded from an online group.
Cyberstalking
the act of repeated, intense harassment and denigration that includes threats or creates significant fear.
Types of Cyberbullying
Flaming
Harassment
Denigration
Impersonation
Outing
Trickery
Exclusion
Cyberstalking
Identity Theft
crimes in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception.
Shoulder Surfing
Criminals watching over you in public places in an attempt to acquire personally sensitive information.
Causes of Identity Theft
Shoulder Surfing
Improperly Discarding Credit Cards
Responding to Spam/Unsolicited Emails
Phishing
the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information.
Phishing vs Identity Theft
Phishing is pretending to be a reputable company, while Identity Theft is pretending to be an individual
Plagiarism
presenting someone else's work or ideas as your own, with or without their consent, by incorporating it in your work without full acknowledgment.
Copyright Infringement
occurs when a copyrighted work is reproduced, distributed, performed, publicly displayed, or made into a derivative work without the permission of the copyright owner.
Copyright
legal right that gives creators control and ownership over their original works.
Fair Use
a copyrighting method where citation is not necessary/obligated.
Standards of Fair Use
Strictly for general/educational use
Only an excerpt/segment of the work
Does not affect sales of the work
Materials Under Fair Use
Works that lack originality
Public domains/copyrights have expired/unregistered
Freeware
General facts
Online Security
It refers to the rules that are followed and the actions that are taken to make sure online users and data privacy are not compromised by individuals.
Internet Security Threats
dangers associated with using the internet.
Malwares
short for malicious software like viruses, worms, and dishonest spyware.
Computer Worms
programs that can replicate from one computer to another without human intervention.
Spam
unwanted messages, usually harmless yet contain links that may compromise your security.
Phishing (IST)
scams created by criminals who intend to ask for private or elicit information from their victims.
Types of Internet Security Strategies
Browser Selection
Email Security
Multifactor Authorzation
Firewalls
Browser Selection
Ensuring the browser you are using is secured, controlled, and protected.
Email Security
Establishing a multi-layered and comprehensive security for emails.
Multifactor Authetication (MFA)
Requiring several verification mechanisms in order to control access to a system.
Firewalls
first line of defense among networks, embedded with unwanted data, and it protects the data in the network from being stolen.
Online Ethics
the guidelines that govern users’ behavior on the internet. It encompasses the rights, responsibilities, and acceptable behavior for individuals while engaging in online activities.
Ethical Questions
Privacy
Big Data
Net Neutrality
Access to the Internet
Privacy
How secure are these sites? Will our information be used against us? Can the government monitor our online activity?
Big Data
Is collecting tons of data ethical? Who collects it? Why are they collected? What exclusions will be made?
Net Neutrality
The principle that internet service providers should treat all data that flows within them equally.
Access to the Internet
If the internet is a right, how do we see those in parts of the world who don’t have access to the Internet?
Online Etiquette
accepted and expected behavior when interacting with others on the internet.
Guidelines on Online Etiquette
Be Always Courteous
Do Not Use Foul Language And Incite Anger
Appropriate Your Humor And Avoid Sarcasm
Do Not Share Or Post Offensive Materials
Always Acknowledge Owners Of Original Ideas
Try To Be Understanding and Maximize Tolerance
Respect Others’ Opinions
Effects of Violating Online Ethics/Etiquette
Loss of Trust
Legal Consequences
Psychological Impact
Reputation Damage