don’ts of online communication. Different kinds of Malware How to avoid these threats?
•A very effective way of avoiding these
threats is verifying the authenticity and credibility of the WEB source. COPYRIGHT INFRINGEMENT • Intellectual Property. • Copyright Law.(Intellectual Property Code of the Philippines, officially known as Republic Act No. 8293.) • Copyright Page “No part of this book may be copied, reproduced.” Tips to help you avoid copyright infringement: • Understand- Copyright protect literary works, photographs paintings, drawing, films, music choreography and sculptures. • BeResponsible- even if a material does not say that it is copyrighted, it is not a valid defense against copyright. • BeCreative- ask yourself whether what you are making is something that came from you or something made from somebody else creativity. • Know the Law- there are some limitations to copyright laws. Online Research • Have a question in mind- Focus on a question you want answered. • Narrow it down- Search engines like Google, Bing, or Yahoo use several filters to determine the most appropriate result for you. • Advanced Search- The best way to filter information you get from search engines is by using the advanced search. • Look for a credible sources- Some wikis, filled with updated information, are not a credible source. When using wikis, check out the link of the cited texts. • Give credit- Give credit to the original author of the page or information. To properly site a reference, you may use the format below. • Keyword searching Search Strategies: • Enter terms to search • Use quotation marks to search as a phrase and keep the words linked together. Common words are ignored (That, to, which, a, the ...) + and – can be used to include or exclude a word • Boolean • AND - enter words connect with AND- it will include sites where both words and found Uses: joining different topics (i.e. global warming AND California) • OR - requires at least one of the terms is found. Uses: join similar or synonymous topics (i.e. global warming OR greenhouse effect) • NOT - searches for the first term and excludes sites that have the second term. (i.e. Washington NOT school) 10 COMMANDMENTS OF COMPUTER ETHICS ETHICS
• Deals with placing a “value” on acts
according to whether they are “good” or “bad”. THOU SHALT NOT USE A COMPUTER TO HARM OTHER PEOPLE.
• It is wrong to use computer and
steal/access/destroy their personal information. THOU SHALT NOT INTERFERE WITH OTHER PEOPLE'S COMPUTER WORK
• Generating and consciously spreading
computer viruses is unethical. THOU SHALT NOT SNOOP AROUND IN OTHER PEOPLE'S FILES
• Reading other people’s e-mail messages is as
bad as opening and reading their letters: This is invading their privacy. THOU SHALT NOT USE A COMPUTER TO STEAL
• Using a computer to break into the accounts
of a company or a bank and transferring money should be judged the same way as robbery. THOU SHALT NOT USE A COMPUTER TO BEAR FALSE WITNESS
• The Internet can spread untruth as fast as it
can spread truth. Putting out false "information" to the world is bad. THOU SHALT NOT USE OR COPY SOFTWARE FOR WHICH YOU HAVE NOT PAID
• Software is an intellectual product. In that
way, it is like a book: Obtaining illegal copies of copyrighted software is as bad as photocopying a copyrighted book. THOU SHALT NOT USE OTHER PEOPLE'S COMPUTER RESOURCES WITHOUT AUTHORIZATION
• Hacking a system to break and bypass the
authorization is unethical. THOU SHALT NOT APPROPRIATE OTHER PEOPLE'S INTELLECTUAL OUTPUT
• Copying somebody else’s program without
proper authorization is software piracy and is unethical. THOU SHALT THINK ABOUT THE SOCIAL CONSEQUENCES OF THE PROGRAM YOU WRITE
• You have to think about computer issues in a
more general social framework: Can the program you write be used in a way that is harmful to society? THOU SHALT USE A COMPUTER IN WAYS THAT SHOW CONSIDERATION AND RESPECT
• The fact that you cannot see the people you
are interacting with does not mean that you can be rude to them. REFERENCES:
• http://www.ccsr.cms.dmu.ac.uk/resources/professionalism/codes /cei_command_com.html • Empowerment Technology by Rex bookstore.
Kenneth Dean Austin v. Howard Ray, Warden, Jackie Brannon Correctional Center and Attorney General of The State of Oklahoma, 124 F.3d 216, 10th Cir. (1997)