Ict Safety, Security, and Netiquette

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 13

MADE BY: IRISH S.

DE LA CRUZ
ONLINE SAFETY
➤ THE MORE INFORMATION YOU PUT OR
USE ONLINE, THE HIGHER THE RISK PLACED
ICT SAFETY/ ON YOUR ONLINE SAFETY.
➤ RISKS SUCH AS: IDENTITY THEFT,
ONLINE SAFETY PHISHING, AND MALWARE INFECTIONS
➤ IT IS YOUR RESPONSIBILITY TO SECURE
YOUR INFORMA-TION ONLINE AS WELL AS
MAINTAIN GOOD ETIQUETTE WHEN
USING THESE SERVICES.
ICT SECURITY VERIFICATION OF
ONLINE SOURCE MATERIALS
C R I T ERI A F O R E V A L U A TIO N:
CURRENCY — IS THE INFORMATION UP- TO-DATE?
SECURITY — DOES THE SITE ASK TOO MUCH INFORMATION?
SCOPE — IS THE INFORMATION IN- DEPTH?
AUTHORITY —DOES THE INFOR-MATION COME FROM A TRUSTED
EXPERT?
ICT NETIQUETTE
COMPUTER ETHICS
COMPUTER ETHICS
➤ A NEW BRANCH OF ETHICS THAT IS CONCERNED WITH
STANDARDS OF CONDUCT IN THE USE OF COMPUTERS.
➤ DEALS WITH HOW COM- PUTING PROFESSIONALS
SHOULD MAKE DECISIONS REGARDING PROFES- SIONAL
AND SOCIAL CONDUCT.
THE TEN
COMMANDMENTS OF
COMPUTER ETHICS
1. THOU SHALT NOT USE A
COMPUTER TO HARM IN ANY WAY.
2. THOU SHALT NOT INTERFERE
WITH OTHER PEOPLE’S COMPUTER
WORK.
3. THOU SHALT NOT SNEAK
AROUND OTHER PEOPLE’S FILES.
4. THOU SHALT NOT USE A
COMPUTER TO STEAL.
5. THOU SHALT NOT USE A
COMPUTER TO BEAR FALSE
WITNESS.
6. THOU SHALT NOT COPY OR USE
PROPRIETARY SOFTWARE FOR
WHICH YOU HAVE NOT PAID.
7 . T H O U S H A LT N O T U SE O T H E R
P E O P L E’ S C O MP UTER R E SOURC ES
W I T H OUT A U TH OR ISATIO N O F P R O PE R
C O MPE N SATION .
8. TH O U SH A L T N O T A P P R O PR IATE
O TH E R P E O P L E’S IN TE L L ECTUA L
O U TP U T.
9 . TH O U SH A L T TH IN K A BO U T TH E
SO C IA L C O N SE Q UEN C ES O F TH E
P R O G R AM YO U A R E W R ITIN G O R TH E
SYSTE M YO U A R E DE SIG N IN G .
1 0. TH O U SH A L T A L W A YS U SE A
C O MP U TE R IN W A YS TH A T E N SU R E
C O N SIDE R ATION A N D R E SP E C T F O R
YO U R F E L L OW H U MA N S.
ICT NETIQUETTE
INTERNET ETHICS
INTERNET ETHICS
➤ OR NETIQUETTE
➤ IS A SET OF RULES THAT
DETERMINES HOW TO
PROPERLY COMMUNICATE
AND BROWSE THE WEB.
GOOD 1 . A L WAYS K E E P Y OU R S O FT WARE
PRACTICES O R A P PLICATION U P DATED A ND
U N IN ST ALL T H E O N ES T H A T Y OU
IN USING THE DO NOT USE.
INTERNET 2 . D O N O T D IVU LGE S E N S IT IVE
I N F ORMAT ION O N LIN E, E S PECIALLY
O N U N S AF E W E BSIT ES.
3 . B E C A RE F U L W H E N D EA LING
W I T H E M A ILS F R OM U N KNOWN
S O U RCE S O R S PA M.
4 . R U N Y OU R A N T IVIRUS S O FT WARE
B E FORE G O ING O N LINE.
5 . T H IN K B E F ORE Y OU C L ICK.
ICT SECURITY INTELLECTUAL PROPERTY
➤ T HE BIGGEST ISSUE SURROUNDING IC T
CONCERNS T HE VIO LAT IO N O F IN T ELLEC T UA L
P ROPERT Y RIGHTS (IP R), W HIC H IS T HE AC T O F
ST EALING OT HER P EO P LE'S WO RKS A N D IDEA S,
WHET HER KN OW IN GLY O R UN KN OW IN GLY.
➤ I NT E L LE C TUAL P R O P E R TY LAWS ( I P L) P R O T E CT
T H E R I G H TS O F P E O P L E T O M AI NT AI N LE G AL
O WNE RS HIP O F T H E I R WO R K S AND I D E AS . B U T
I P R I S N O T G I V E N R I G H T: T H E Y H AVE T O B E
AP P LI E D F O R AN D G R AN T E D T O T H E AP P LI CANT
B Y T H E P R O P E R AU T H ORIT IES.
➤ GRAN T IN G O WN ERSHIP O F AN
ID EA T O A P ERSO N IS N O T AN EAS Y
T H IN G T O DO .
➤ ART WO RKS, N OVELS, SHO RT
STO RIES, PO EMS, MUSIC AN D M OV IES
ARE THE O N LY SO ME O F TH E
CO PYRIGHT THIN GS THAT ARE
AVAILABLE O N THE IN TE RN E T.
SIX WAYS TO AVOID PLAGIARISM IN
ICT SAFETY RESEARCH PAPERS

AVOIDING 1. PARAPHRASE
PLAGIARISM 2. CITE
3. QUOTING

4. CITING QUOTES

5. CITE YOUR OWN MATERIAL

6.REFERENCING

You might also like