Empower technologies 2 Flashcards
It is an interactive process to collect
and gather data and information
through online.
Ease and speed
ONLINE SEARCH
Ability to use online library catalogue, online library databases
(e.g., FirstSearch) and their Boolean operators.
Online research skills
Ability to identify and use best scholarly resources,
knowledge of terminology (e.g., abstract and bibliography)
and citation rules.
Knowledge of information resources
Ability to identify plagiarism and copyright violations.
Understanding of plagiarism and copyright issues
Measures the extent to which a student relies on the Internet
and search engines (e.g., Yahoo and Google) to obtain
scholarly resources for class research projects (e.g., papers,
research assignments).
Attitudes toward internet research
Ability to evaluate the quality of full-text articles from scholarly
Journals.
Evaluation of information
Motivation to supplement instructor-assigned readings with
additional materials.
Motivation to supplement readings
Contacts with librarians, access to OCLS Web site, use of
document delivery services, and general use of libraries.
Frequency of library use
Likelihood of contacting a reference librarian.
Likelihood of contacting a librarian
Writing papers, citing sources, using bibliographies,
encyciopedias, periodical indexes and subject headings,
summarizing ideas and other research behaviors.
Research experience
refer to software created to
cause a broad range of risks or damage to
websites, files, or networks dependent on
the Internet.
Web threats
A malicious software that is needed to
damage or disable computer systems which
has codes to collect information without
one’s knowledge.
Malware
An e-mail or instant message scam which looks like an official message from a legitimate organization that asks about one’s personal information such as password and details.
PHISHING
An irrelevant, inappropriate, unwanted e-mail that comes from legitimate companies which, in the long run may be used for phishing, scams, and malware.
SPAM
A technique which directs legitimate website’s traffic to an illegitimate website to gain access to a user’s personal information.
PHARMING
The use of technologies to display behavior that harms another. Hurtful messages are posted and/or shared through email, instant messaging, and social networking sites.
CYBERBULLYING
It is a term used to
describe inappropriate
photos or text sent via
cellphone or mobile
phone.
SEXTING
It is also called cyber safety or digital safety
which refers to practices and precautions
one should observe when using the Internet.
ONLINE SAFETY
It encompasses the security of data entered through a web
form, browser security, and overall authentication and
protection of data sent via Internet protocol.
INTERNET SECURITY
Consent of the data subject refers to any freely
given, specific, informed indication of will, whereby
the data subject agrees to the collection and
processing of personal information about and/or
relating to him or her. Consent shall be evidenced
by written, electronic or recorded means. It may
also be given on behalf of the data subject by an
agent specifically authorized by the data subject to
do so.
DATA PRIVACY ACT
Republic Act No. 10173 – “Data Privacy Act of 2012”
Acceptable rules for online behavior.
The word “netiquette” is formed from the words
“net” and “etiquette”.
NETIQUETTE
The word “netiquette” is formed from the words
“net” and “etiquette”
Stealing one’s idea.
Proper citation should be observed.
PLAGIARISM