LESSON 3: Ethics on the Internet

0.0(0)
Studied by 57 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/27

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:57 PM on 4/11/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

28 Terms

1
New cards

Online Safety

sometimes regarded as e-safety or cyber safety, refers to the maximization of internet users’ knowledge and awareness of safety protocols, online crimes, and security risks in the private property and information which are connected to the use of the internet

2
New cards

Online Security

refers to the rules that are followed and the actions that are taken to make sure that online users and data privacy aren’t compromised by cyber-criminals

3
New cards

Online Crimes

are illegal activities that use the internet, computers, smartphones, or other electronic devices to commit a crime

4
New cards

Cyberbullying

the use of technology to harass, threaten, embarrass, or target another person

5
New cards

Republic Act 10627

also known as the Anti Bullying Act of 2013 ; defines bullying as the repeated use of words, actions, or online messages by one or more students that cause physical or emotional harm, damage property, create an unsafe school environment, violate rights, or disrupt learning

6
New cards

Flaming

is an online fight using electronic messages with angry and vulgar languages

7
New cards

Harassment

is the act of repeatedly sending nasty, mean, and insulting messages

8
New cards

Denigration

is sending or posting gossip or rumors about a person to damage his or her reputation or friendship

9
New cards

Impersonation

is when someone is pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person’s reputation or friendships

10
New cards

Outing

is the act of sharing someone’s secrets or embarrassing information or images online

11
New cards

Trickery

is when someone is talking to a person to let him or her reveal his or her secrets or embarrassing information and then, shares the sensitive information online

12
New cards

Exclusion

is when one is intentionally or cruelly excluded from an online group

13
New cards

Cyberstalking

is the act of repeated, intense harassment and denigration that includes threats or significant fear

14
New cards

Identity Theft

also known as identity fraud ; all types of crimes in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain

15
New cards

Phishing

the fraudulent practice of sending emails purporitng to be from reputable companies in order to induce individuals to reveal personal information such as passwords and credit card numbers

16
New cards

Plaigarism

is presenting someone else’s work or ideas as your own, with or without their consent, by incorporating it in your own work without full acknowledgement

17
New cards

Copyright Infringement

occurs when a copyrighted work is reproduced, distributed, performed, publicly displayed, or made into a derivative work without the permission of the copyright owner

18
New cards

Fair Use

permits a party to use a copyrighted work without the copyright owner's permission for purposes such as criticism, comment, news reporting, teaching, scholarship, or research

19
New cards

Malwares

this is the shortened form of malicious software ; some examples are computer viruses, worms, and dishonest spyware

20
New cards

Computer Worms

these are programs that can replicate themselves from one computer to another in great volume and can spread themselves rapidly without human intervention

21
New cards

Spam

generally are harmless ; they are usually junk mail sent in your email, but there are times that they can contain links that put you at risk ; these links may be connected to malwares that intend to steal your data

22
New cards
23
New cards

Browser Selection

be sure that the browser you are using is secured

24
New cards

Email Security

try to establish a multilayered and comprehensive email security because this will significantly increase protection from threats associated with email use

25
New cards

Multifactor Authentication

this is a process by which computer access is controlled by requiring several authentication mechanisms

26
New cards

Firewalls

are the first line of defense among networks ; these are security tools that prevent unauthorized access to a network

27
New cards

Ethics

the analysis of the role that the internet plays in what philosophers call the development of good life–the kind of life that we want for ourselves, for society overall, the kinds of people we want to be

28
New cards

Internet Ethics

may deal with issues on privacy, big data, net neutrality, and access to the internet