Empowerment Technologies Flashcards
restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed. The two most common means of infection appear to be phishing emails that contain malicious attachments and website pop-up advertisements.
Ransomware
a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information
Trojan
Its goal is to acquire personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a
website and be asked to update his/her username, passwords, credit card, or personal information.
Phishing
a malicious program designed to replicate itself and transfer from one computer to another either through the Internet and local networks or date storage like flash drives and CDs
Virus
stands for malicious software
Malware
a program designed to send you advertisements, mostly as pop-ups
Adware
If you create something – an idea, an invention, a form of literary work, or a research, you have the right as to how it should be used by others.
Intellectual Property
the copyright law includes your rights over your work, and anyone who uses it without your consent is punishable by law.
Copyright Infringement
the synergy of the technological advancements to work on a similar goal or task.
Technical convergence
a term coined by Darcy DiNucci on January 1999. In her article titled, “Fragmented Future”
Web 2.0
These are sites that focus on short updates from the users. Those subscribed to the user will be able to receive these updates. Examples: Twitter and Plurk
Microblogging
These are sites that allow you to connect with other people with the same interests or background. Once a user creates his/her account, he/she can set up a profile, add people, create groups, and share content. Examples: Facebook and Google+
Social Networks
– a program that runs in the background without you knowing it). It has the ability to monitor what are you currently doing and typing through keylogging.
*Keyloggers – used to record the keystroke done by the users. This is done to steal their password or any other sensitive information. It can record email, messages, or any information you type using your keyboard.
Spyware
unwanted email mostly from bots or advertisers. It can be used to send malware
spam
concerned with the “proper” way to communicate in an online environment.
Netiquette
Core Rules of Netiquette
When communicating electronically, whether through email, instant message, discussion post, text, or some other method, practice the Golden Rule: Do unto others as you would have others do unto you. Remember, your written words are read by real people, all deserving of respectful communication. Before you press “send” or “submit,” ask yourself, “Would I be okay with this if someone else had written it?”
Remember the Human
Rules of Netiquette
While it can be argued that standards of behavior may be different in the virtual world, they certainly should not be lower. You should do your best to act within the laws and ethical manners of society whenever you inhabit “cyberspace.” Would you behave rudely to someone face-to-face? On most occasions, no. Neither should you behave this way in the virtual world.
Adhere to the same standards of behavior online that you follow in real life
Rules of netiquette
“Netiquette varies from domain to domain.” (Shea, 1994) Depending on where you are in the virtual world, the same written communication can be acceptable in one area, where it might be considered inappropriate in another. What you text to a friend may not be appropriate in an email to a classmate or colleague. Can you think of another example?
Know where you are in cyberspace
Rules of netiquette
Electronic communication takes time: time to read and time in which to respond. Most people today lead busy lives, just like you do, and don’t have time to read or respond to frivolous emails or discussion posts. As a virtual world communicator, it is your responsibility to make sure that the time spent reading your words isn’t wasted. Make your written communication meaningful and to the point, without extraneous text or superfluous graphics or attachments that may take forever to download.
Respect other people’s time and bandwidth
Rules of netiquette
One of the best things about the virtual world is the lack of judgment associated with your physical appearance, the sound of your voice, or the clothes you wear (unless you post a video of yourself singing Karaoke in a clown outfit.) You will, however, be judged by the quality of your writing, so keep the following tips in mind:
Always check for spelling and grammar errors Know what you’re talking about and state it clearly Be pleasant and polite
Make yourself look good online
Rules of netiquette
The Internet offers its users many benefits; one is the ease in which information can be shared or accessed and in fact, this “information sharing” capability is one of the reasons the Internet was founded. So in the spirit of the Internet’s “founding fathers,” share what you know! When you post a question and receive intelligent answers, share the results with others. Are you an expert at something? Post resources and references about your subject matter. Recently expanded your knowledge about a subject that might be of interest to others? Share that as well.
Share expert knowledge
Rules of netiquette
What is meant by “flaming” and “flame wars?” “Flaming is what people do when they express a strongly held opinion without holding back any emotion.” (Shea, 1994). As an example, think of the kinds of passionate comments you might read on a sports blog. While “flaming” is not necessarily forbidden in virtual communication, “flame wars,” when two or three people exchange angry posts between one another, must be controlled or the camaraderie of the group could be compromised. Don’t feed the flames; extinguish them by guiding the discussion back to a more productive direction.
Help keep flame wars under control
Rules of netiquette
Depending on what you are reading in the virtual world, be it an online class discussion forum, Facebook page, or an email, you may be exposed to some private or personal information that needs to be handled with care. Perhaps someone is sharing some medical news about a loved one or discussing a situation at work. What do you think would happen if this information “got into the wrong hands?” Embarrassment? Hurt feelings? Loss of a job? Just as you expect others to respect your privacy, so should you respect the privacy of others. Be sure to err on the side of caution when deciding to discuss or not to discuss virtual communication.
Respect other people’s privacy
Rules of netiquette
Just like in face-to-face situations, there are people in cyberspace who have more “power” than others. They have more expertise in technology or they have years of experience in a particular skill or subject matter. Maybe it’s you who possesses all of this knowledge and power! Just remember: knowing more than others do or having more power than others may have does not give you the right to take advantage of anyone. Think of Rule 1: Remember the human.
Don’t abuse power
Rules of netiquette
Not everyone has the same amount of experience working in the virtual world. And not everyone knows the rules of netiquette. At some point, you will see a stupid question, read an unnecessarily long response, or encounter misspelled words; when this happens, practice kindness and forgiveness as you would hope someone would do if you had committed the same offense. If it’s a minor “offense,” you might want to let it slide. If you feel compelled to respond to a mistake, do so in a private email rather than a public forum.
Be forgiving of other people’s mistakes