Ict Safety, Security, and Netiquette
Ict Safety, Security, and Netiquette
Ict Safety, Security, and Netiquette
DE LA CRUZ
ONLINE SAFETY
➤ THE MORE INFORMATION YOU PUT OR
USE ONLINE, THE HIGHER THE RISK PLACED
ICT SAFETY/ ON YOUR ONLINE SAFETY.
➤ RISKS SUCH AS: IDENTITY THEFT,
ONLINE SAFETY PHISHING, AND MALWARE INFECTIONS
➤ IT IS YOUR RESPONSIBILITY TO SECURE
YOUR INFORMA-TION ONLINE AS WELL AS
MAINTAIN GOOD ETIQUETTE WHEN
USING THESE SERVICES.
ICT SECURITY VERIFICATION OF
ONLINE SOURCE MATERIALS
C R I T ERI A F O R E V A L U A TIO N:
CURRENCY — IS THE INFORMATION UP- TO-DATE?
SECURITY — DOES THE SITE ASK TOO MUCH INFORMATION?
SCOPE — IS THE INFORMATION IN- DEPTH?
AUTHORITY —DOES THE INFOR-MATION COME FROM A TRUSTED
EXPERT?
ICT NETIQUETTE
COMPUTER ETHICS
COMPUTER ETHICS
➤ A NEW BRANCH OF ETHICS THAT IS CONCERNED WITH
STANDARDS OF CONDUCT IN THE USE OF COMPUTERS.
➤ DEALS WITH HOW COM- PUTING PROFESSIONALS
SHOULD MAKE DECISIONS REGARDING PROFES- SIONAL
AND SOCIAL CONDUCT.
THE TEN
COMMANDMENTS OF
COMPUTER ETHICS
1. THOU SHALT NOT USE A
COMPUTER TO HARM IN ANY WAY.
2. THOU SHALT NOT INTERFERE
WITH OTHER PEOPLE’S COMPUTER
WORK.
3. THOU SHALT NOT SNEAK
AROUND OTHER PEOPLE’S FILES.
4. THOU SHALT NOT USE A
COMPUTER TO STEAL.
5. THOU SHALT NOT USE A
COMPUTER TO BEAR FALSE
WITNESS.
6. THOU SHALT NOT COPY OR USE
PROPRIETARY SOFTWARE FOR
WHICH YOU HAVE NOT PAID.
7 . T H O U S H A LT N O T U SE O T H E R
P E O P L E’ S C O MP UTER R E SOURC ES
W I T H OUT A U TH OR ISATIO N O F P R O PE R
C O MPE N SATION .
8. TH O U SH A L T N O T A P P R O PR IATE
O TH E R P E O P L E’S IN TE L L ECTUA L
O U TP U T.
9 . TH O U SH A L T TH IN K A BO U T TH E
SO C IA L C O N SE Q UEN C ES O F TH E
P R O G R AM YO U A R E W R ITIN G O R TH E
SYSTE M YO U A R E DE SIG N IN G .
1 0. TH O U SH A L T A L W A YS U SE A
C O MP U TE R IN W A YS TH A T E N SU R E
C O N SIDE R ATION A N D R E SP E C T F O R
YO U R F E L L OW H U MA N S.
ICT NETIQUETTE
INTERNET ETHICS
INTERNET ETHICS
➤ OR NETIQUETTE
➤ IS A SET OF RULES THAT
DETERMINES HOW TO
PROPERLY COMMUNICATE
AND BROWSE THE WEB.
GOOD 1 . A L WAYS K E E P Y OU R S O FT WARE
PRACTICES O R A P PLICATION U P DATED A ND
U N IN ST ALL T H E O N ES T H A T Y OU
IN USING THE DO NOT USE.
INTERNET 2 . D O N O T D IVU LGE S E N S IT IVE
I N F ORMAT ION O N LIN E, E S PECIALLY
O N U N S AF E W E BSIT ES.
3 . B E C A RE F U L W H E N D EA LING
W I T H E M A ILS F R OM U N KNOWN
S O U RCE S O R S PA M.
4 . R U N Y OU R A N T IVIRUS S O FT WARE
B E FORE G O ING O N LINE.
5 . T H IN K B E F ORE Y OU C L ICK.
ICT SECURITY INTELLECTUAL PROPERTY
➤ T HE BIGGEST ISSUE SURROUNDING IC T
CONCERNS T HE VIO LAT IO N O F IN T ELLEC T UA L
P ROPERT Y RIGHTS (IP R), W HIC H IS T HE AC T O F
ST EALING OT HER P EO P LE'S WO RKS A N D IDEA S,
WHET HER KN OW IN GLY O R UN KN OW IN GLY.
➤ I NT E L LE C TUAL P R O P E R TY LAWS ( I P L) P R O T E CT
T H E R I G H TS O F P E O P L E T O M AI NT AI N LE G AL
O WNE RS HIP O F T H E I R WO R K S AND I D E AS . B U T
I P R I S N O T G I V E N R I G H T: T H E Y H AVE T O B E
AP P LI E D F O R AN D G R AN T E D T O T H E AP P LI CANT
B Y T H E P R O P E R AU T H ORIT IES.
➤ GRAN T IN G O WN ERSHIP O F AN
ID EA T O A P ERSO N IS N O T AN EAS Y
T H IN G T O DO .
➤ ART WO RKS, N OVELS, SHO RT
STO RIES, PO EMS, MUSIC AN D M OV IES
ARE THE O N LY SO ME O F TH E
CO PYRIGHT THIN GS THAT ARE
AVAILABLE O N THE IN TE RN E T.
SIX WAYS TO AVOID PLAGIARISM IN
ICT SAFETY RESEARCH PAPERS
AVOIDING 1. PARAPHRASE
PLAGIARISM 2. CITE
3. QUOTING
4. CITING QUOTES
6.REFERENCING