E-Tech (Online Crimes)

5.0(2)
Studied by 12 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/41

flashcard set

Earn XP

Description and Tags

i miss my wife, tails

Last updated 1:45 PM on 9/20/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

42 Terms

1
New cards

Online Crimes

Violations that inflict harm to other people by internet users. 

2
New cards

What is the Republic Act that defines bullying?

RA 10627

3
New cards

Flaming 

an online fight using electronic messages with angry and vulgar languages. 

4
New cards

Harassment 

the act of repeatedly sending nasty, mean, and insulting messages. 

5
New cards

Denigration

sending or posting gossip or rumors about a person to damage his or her reputation or friendships. 

6
New cards

Impersonation 

when someone is pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person’s reputation or friendships.

7
New cards

Outing 

the act of sharing someone’s secrets or embarrassing information or images online.

8
New cards

Trickery

when someone is talking to a person to let him or her reveal his or her secrets or embarrassing information and then, shares the sensitive information online.

9
New cards

Exclusion

when one is intentionally or cruelly excluded from an online group.

10
New cards

Cyberstalking 

the act of repeated, intense harassment and denigration that includes threats or creates significant fear.

11
New cards

Types of Cyberbullying

Flaming
Harassment
Denigration
Impersonation
Outing
Trickery
Exclusion
Cyberstalking

12
New cards

Identity Theft

crimes in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception.

13
New cards

Shoulder Surfing

Criminals watching over you in public places in an attempt to acquire personally sensitive information.

14
New cards

Causes of Identity Theft

Shoulder Surfing
Improperly Discarding Credit Cards
Responding to Spam/Unsolicited Emails

15
New cards

Phishing

the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information.

16
New cards

Phishing vs Identity Theft

Phishing is pretending to be a reputable company, while Identity Theft is pretending to be an individual

17
New cards

Plagiarism

presenting someone else's work or ideas as your own, with or without their consent, by incorporating it in your work without full acknowledgment. 

18
New cards

Copyright Infringement 

occurs when a copyrighted work is reproduced, distributed, performed, publicly displayed, or made into a derivative work without the permission of the copyright owner. 

19
New cards

Copyright

legal right that gives creators control and ownership over their original works.

20
New cards

Fair Use

a copyrighting method where citation is not necessary/obligated.

21
New cards

Standards of Fair Use

Strictly for general/educational use
Only an excerpt/segment of the work
Does not affect sales of the work

22
New cards

Materials Under Fair Use

Works that lack originality
Public domains/copyrights have expired/unregistered
Freeware
General facts 

23
New cards

Online Security

It refers to the rules that are followed and the actions that are taken to make sure online users and data privacy are not compromised by individuals.

24
New cards

Internet Security Threats

dangers associated with using the internet.

25
New cards

Malwares

short for malicious software like viruses, worms, and dishonest spyware.

26
New cards

Computer Worms

programs that can replicate from one computer to another without human intervention.

27
New cards

Spam

unwanted messages, usually harmless yet contain links that may compromise your security.

28
New cards

Phishing (IST)

scams created by criminals who intend to ask for private or elicit information from their victims.

29
New cards

Types of Internet Security Strategies

Browser Selection
Email Security
Multifactor Authorzation
Firewalls

30
New cards

Browser Selection

Ensuring the browser you are using is secured, controlled, and protected.

31
New cards

Email Security

Establishing a multi-layered and comprehensive security for emails.

32
New cards

Multifactor Authetication (MFA)

Requiring several verification mechanisms in order to control access to a system.

33
New cards

Firewalls

first line of defense among networks, embedded with unwanted data, and it protects the data in the network from being stolen.

34
New cards

Online Ethics

the guidelines that govern users’ behavior on the internet. It encompasses the rights, responsibilities, and acceptable behavior for individuals while engaging in online activities.

35
New cards

Ethical Questions

Privacy
Big Data
Net Neutrality
Access to the Internet

36
New cards

Privacy

How secure are these sites? Will our information be used against us? Can the government monitor our online activity?

37
New cards

Big Data

Is collecting tons of data ethical? Who collects it? Why are they collected? What exclusions will be made?

38
New cards

Net Neutrality

The principle that internet service providers should treat all data that flows within them equally.

39
New cards

Access to the Internet 

If the internet is a right, how do we see those in parts of the world who don’t have access to the Internet? 

40
New cards

Online Etiquette

accepted and expected behavior when interacting with others on the internet.

41
New cards

Guidelines on Online Etiquette

Be Always Courteous

Do Not Use Foul Language And Incite Anger

Appropriate Your Humor And Avoid Sarcasm

Do Not Share Or Post Offensive Materials

Always Acknowledge Owners Of Original Ideas

Try To Be Understanding and Maximize Tolerance

Respect Others’ Opinions

42
New cards

Effects of Violating Online Ethics/Etiquette

Loss of Trust
Legal Consequences
Psychological Impact
Reputation Damage

Explore top notes

note
Term 3
Updated 1019d ago
0.0(0)
note
Psychology SAC Unit 2 AOS1
Updated 552d ago
0.0(0)
note
Micro-Organismes
Updated 1191d ago
0.0(0)
note
Unit 4 - Chapter 16
Updated 900d ago
0.0(0)
note
The Odyssey Books 10-13 Notes
Updated 1202d ago
0.0(0)
note
Chapter 6: Learning
Updated 1075d ago
0.0(0)
note
Basic Chem/Ph/Water practice
Updated 905d ago
0.0(0)
note
Term 3
Updated 1019d ago
0.0(0)
note
Psychology SAC Unit 2 AOS1
Updated 552d ago
0.0(0)
note
Micro-Organismes
Updated 1191d ago
0.0(0)
note
Unit 4 - Chapter 16
Updated 900d ago
0.0(0)
note
The Odyssey Books 10-13 Notes
Updated 1202d ago
0.0(0)
note
Chapter 6: Learning
Updated 1075d ago
0.0(0)
note
Basic Chem/Ph/Water practice
Updated 905d ago
0.0(0)

Explore top flashcards

flashcards
Climate Variation and Drought
24
Updated 1070d ago
0.0(0)
flashcards
polgov lesson 3
38
Updated 1057d ago
0.0(0)
flashcards
Bio 1
47
Updated 1155d ago
0.0(0)
flashcards
Dom - niemiecki //5* pls thx
58
Updated 537d ago
0.0(0)
flashcards
SPANISH VERBS
63
Updated 1192d ago
0.0(0)
flashcards
AP Psychology Unit 7
85
Updated 1125d ago
0.0(0)
flashcards
Climate Variation and Drought
24
Updated 1070d ago
0.0(0)
flashcards
polgov lesson 3
38
Updated 1057d ago
0.0(0)
flashcards
Bio 1
47
Updated 1155d ago
0.0(0)
flashcards
Dom - niemiecki //5* pls thx
58
Updated 537d ago
0.0(0)
flashcards
SPANISH VERBS
63
Updated 1192d ago
0.0(0)
flashcards
AP Psychology Unit 7
85
Updated 1125d ago
0.0(0)