Self-Learning Home Tasks (SLHTs)

Q3Week2 MELC DLP SLHT

MELC 2: Apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would relate to their specific professional tracks.

Objectives:

Identify the online safety, security, ethics, and etiquette standards and practice in the use of ICTs,

Share the online safety, security, ethics, and etiquette standards and practice in the use of ICTs,

Explain and apply the online safety, security, ethics, and etiquette standards and practice in the use of ICTs,

Appreciate the users when applying the online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would relate to their specific professional tracks.

Introductory Activity

Disclaimer: The statements and a picture stated above are borrowed from online sources. The Department of Education does not claim or own the presented statements and a picture. Links for the sources are found in the reference part of the Self-Learning Home Task.

What I Know-Activity (10 minutes only)

In simple terms, online safety refers to the act of staying safe online. It is also commonly known as internet safety, e-safety and cyber safety. It encompasses all technological devices which have access to the internet from PCs and laptops to smartphones and tablets. (source)

What's In Activity (3 minutes only)

Being safe online means individuals are protecting themselves and others from online harms and risks which may jeopardize their personal information, lead to unsafe communications, or even affect their mental health and wellbeing.


Task: Identify credible and safe websites. Cite examples.

Review (5 minutes only)

Task: In utilizing a piece of paper, share examples on online safety and security of end users.

Activity

The World Wide Web (WWW), commonly known as the Web, is an information system where documents and other web resources are identified by Uniform Resource Locators (URLs, such as https://example.com/), which may be interlinked by hypertext, and are accessible over the Internet. Time Berners-Lee is the father of the web.

The Web gives users access to a vast array of documents that are connected to each other by means of hypertext or hypermedia links—i.e., hyperlinks, and electronic connections that link related pieces of information in order to allow a user easy access to them. Hypertext allows the user to select a word or phrase from text and thereby access other documents that contain additional information pertaining to that word or phrase. Hypermedia documents feature links to images, sounds, animations, and movies. The Web operates within the Internet’s basic client-server format; servers are computer programs that store and transmit documents to other computers on the network when asked to, while clients are programs that request documents from a server as the user asks for them. Browser software allows users to view the retrieved documents.

WEB 1.0 SEARCH – It starts with what was defined as Web 1.0. The web as most people experienced in perhaps the 90s would have been more than likely a Web 1.0 site. It would have been static mainly based on search. It may have had some useful information but it would rarely if ever be updated. You could imagine it as a single page of a book placed up on the web and then left there for people to read. It was also unresponsive in the sense it was purely a one-way feed of information. There was no interactivity between the person who was visiting the site. No comments, no collaboration, no community.

Web 2.0 is the current state of online technology as it compares to the early days of the Web, characterized by greater user interactivity and collaboration, more pervasive network connectivity, and enhanced communication channels.

One of the most significant differences between Web 2.0 and the traditional World Wide Web (WWW, retroactively referred to as Web 1.0) is greater collaboration among Internet users, content providers, and enterprises.

Originally, data was posted on Web sites, and users simply viewed or downloaded the content. Increasingly, users have more input into the nature and scope of Web content and in some cases exert real-time control over it.

The social nature of Web 2.0 is another major difference between it and the original, static Web. Increasingly, websites enable community-based input, interaction, content-sharing, and collaboration. Types of social media sites and applications include forums, microblogging, social networking, social bookmarking, social curation, and wikis.

Web 3.0 is slated to be the new paradigm in web interaction and will mark a fundamental change in how developers create websites, but more importantly, how people interact with those websites. Computer scientists and Internet experts believe that this new paradigm in web interaction will further make people’s online lives easier and more intuitive as smarter applications such as better search functions give users exactly what they are looking for since it will be akin to artificial intelligence which understands context rather than simply comparing keywords, as is currently the case.

Web 3.0 can be rightly said as an intelligent web! It is all about the evolution of third-generation internet services that are a blend of Semantic web, Microformats, Artificial Intelligence, Data Mining, Natural Language Search, and Machine Learning technologies.

Experts say that Web 3.0 is a data-driven and semantic web. The user will type a query on the web; the web will understand the context and essentially will meet the needs of the user.

What's New Activity (10 minutes only)

l property rights

The ever-increasing speed of the internet and the emergence of compression technology, such as mp3 opened the doors to Peer-to-peer file sharing, a technology that allowed users to anonymously transfer files to each other, previously seen on programs such as Napster or now seen through communications protocol such as BitTorrent. Much of this, however, was copyrighted music and illegal to transfer to other users. Whether it is ethical to transfer copyrighted media is another question.

Proponents of unrestricted file sharing point out how file sharing has given people broader and faster access to media, has increased exposure to new artists, and has reduced the costs of transferring media (including less environmental damage). Supporters of restrictions on file sharing argue that we must protect the income of our artists and other people who work to create our media. This argument is partially answered by pointing to the small proportion of money artists receive from the legitimate sale of media.

Digital rights management (DRM)

With the introduction of digital rights management software, new issues are raised over whether the subverting of DRM is ethical. Some champion the hackers of DRM as defenders of users' rights, allowing the blind to make audio books of PDFs they receive, allowing people to burn music they have legitimately bought to CD or to transfer it to a new computer. Others see this as nothing but simply a violation of the rights of the intellectual property holders, opening the door to uncompensated use of copyrighted media. Another ethical issue concerning DRMs involves the way these systems could undermine the fair use provisions of the copyright laws. The reason is that these allow content providers to choose who can view or listen to their materials making the discrimination against certain groups possible.[8] In addition, the level of control given to content providers could lead to the invasion of user privacy since the system is able to keep tabs on the personal information and activities of users who access their materials.[9] In the United States, the Digital Millennium Copyright Act (DMCA) reinforces this aspect of DRM technology, particularly in the way the flow of information is controlled by content providers. Programs or any technologies that attempt to circumvent DRM controls are in violation of one of its provisions (Section 1201).[10]

Accessibility, censorship, and filtering

Accessibility, censorship, and filtering bring up many ethical issues that have several branches in cyberethics. Many questions have arisen which continue to challenge our understanding of privacy, security, and our participation in society. Throughout the centuries mechanisms have been constructed in the name of protection and security. Today the applications are in the form of software that filters domains and content so that they may not be easily accessed or obtained without elaborate circumvention or on a personal and business level through free or content-control software.[11] Internet censorship and filtering are used to control or suppress the publishing or accessing of information. The legal issues are similar to offline censorship and filtering. The same arguments that apply to offline censorship and filtering apply to online censorship and filtering; whether people are better off with free access to information or should be protected from what is considered by a governing body as harmful, indecent or illicit. The fear of access by minors drives much of the concern and many online advocate groups have sprung up to raise awareness and of controlling the accessibility of minors to the internet. (https://en.wikipedia.org/wiki/Cyberethics)

Social Etiquette in real life is ingrained into our social life, although etiquette in technology, commonly referred to as netiquette, is a fairly recent concept. The rules of etiquette that apply when communicating over the Internet are different from those applied when communicating in person or by audio (such as telephone) or videophone. It is a social code that is used in all places where one can interact with other human beings via the Internet, including text messaging, email, online games, Internet forums, chat rooms, and many more.(https://en.wikipedia.org/wiki/Etiquette_in_technology)

Disclaimer: The statements stated above are borrowed from online sources. The Department of Education does not claim or own the presented statements. Links for the sources are found in the reference part of the Self-Learning Home Task.

Question

Explain and apply the online safety procedures.

Analysis

How do users share the online safety procedures in utilizing the internet-connected devices?

What Is It (10 minutes only)

Essay. Directions. Write down an essay entitled “Online Safety First before Pressing or Clicking”. Using an intermediate paper, write down your Performance Task” and don’t forget to cite your reference.

The essay writing process consists of three main stages:

1. Preparation: Decide on your topic or please refer to the given title above, do your research, and create an essay outline.

2. Writing: Set out your argument in the introduction, develop it with evidence in the main body, and wrap it up with a conclusion.

3. Revision: Check the content, organization, grammar, spelling, and formatting of your essay.


Abstraction

What’s More-Activity (10 minutes)

Appreciate the users when applying the online safety, security, ethics, and etiquette standards and practice.

Application

What I Have Learned-Activity (10 minutes)

Performance Task: Directions.

In browsing the websites, choose the two websites you have appreciated the most when it comes to the security and safety of the end-users.

Assessment

In your own words, explain the reasons why security and safety in utilizing the websites are so important.

Assignment: Optional

Concluding Activity

“My teaching is not limited to the classroom; this can be a shortcut icon to everybody on the web; acquiring new ideas, the students might learn and experience in the application of knowledge, appreciation, and skills”. (George P. Lumayag)

References: