LESSON 6 Flashcards
Ability to find, access, use, and create information effectively; engage with other users and with content in an active, critical, sensitive and ethical manner; and navigate the online and ICT environment safely and responsibly, being aware of one’s own rights (UNESCO, 2016)
Digital Citizenship
refers to the “creations of the mind such as inventions, literary and artistic works, designs, symbols, names, and images used in commerce” (World Intellectual Property Organization, 2016)
Intellectual Property
types of intellectual property
- copyright
- patent
- trademark
- industrial design
- geographical indications and appelations of origin
A legal term used to describe the rights that creators have over their literary and artistic works and gives the creator the sole right to publish and sell that work.
copyright
Protects the form of material expression and is only available for works that are fixed intangible form. Not mandatory but recommended.
copyright
An act or instance of using or closely imitating the language and thoughts of another author without authorization; the representation of that author’s work as one’s own, as by not crediting the original author.
plagiarism
a legal principle stating that one can use a copyrighted work without a license for the following purposes: commentary, criticism, reporting, research, and teaching.
fair use
exclusive right granted for an invention, which is a product or a process that provides, in general, a new way of doing something, or offers a new technical solution to a problem.
patent
provides the right to consent on the invention or a way for others to use it (functional use).
patent
give atleast three famous patents
- The Lightbulb by Thomas Edison
- “Omni-directional, vertical-lift, helicopter drone” by Edward G. Vanderlip
- “Electronic Device” by Apple
Distinguished sign of goods or services that identifies and differentiates from one enterprise to another; a signature mark
trademark
trademark symbols
R – registered trademark
TM – unregistered trademark
SM – unregistered service trademark
examples of valuable trademarks
- mcdonalds
- apple
symbol for unregistered service trademark
SM
symbol for registered trademark
R
symbol for unregistered trademark
TM
Protects only the appearance or aesthetic features of a product such as shape, surface, patterns, lines, or color.
industrial design
Signs used on products possessing qualities, a status, or characteristics that are essentially attributable to that location of origin.
geographical indications and appellations of origin
TRUE or FALSE
The validity of a literary work is the lifetime of the author plus 25 years after death.
FALSE
The validity of a literary work is the lifetime of the author plus 50 years after death.
What is RA 8293?
Intellectual Property Code of the Philippines (RA 8293)
the three common issues on data privacy
- hacking
- phishing
- identity theft
involves activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks
hacking
an attempt to exploit a computer system or a private network system or a private network inside a computer
hacking
unauthorized access to or control over computer network security systems for some illicit purpose
hacking
the person who hacked BDO while clients were sleeping
mark nagoyo
a type of social engineering attack often used to steal user data, including login credentials and credit card numbers
phishing
re-use requires permission from the copyright owner
Copyright (All Rights Reserved)
re-use is permitted without permission under the specifications shared in the license.
Creative Commons (Some Rights Reserved)
may be used without permission
Public Domain (No Rights Reserved)
also known as the data privacy act of 2012
RA 10173
the cybercrime prevention act of 2012
RA 10175
Also called computer crime; any criminal activity that involves the use of a computer, networked device, or a network as an instrument to further illegal ends.
cybercrime
other forms of cybercrime
- Piracy and Illegal Downloads
- Cybersquatting
- Online Drug Trafficking
- Cyber Libel or Cyber Defamation
- Online Harassment (Cyberstalking, Internet Trolls, etc.)
- Internet Pornography
The use of digital means of communication that could hurt or harass a person such as intentionally sending hurtful texts or SNS messages, posting embarrassing photos or videos, and spreading malicious rumors online.
cyberbullying
News, stories, or hoaxes created to deliberately misinform or deceive readers and created to either influence people’s views, push a political agenda, or cause confusion and can often be a profitable business for online publishers.
fake information
types of false information
- clickbait
- propaganda
- satire
- false context
- manipulated content
- misleading headlines
- biased/slanted news
An overdependence or a damaging need to do something on computer or internet; excessive use of computers to the extent that it interferes with daily life.
computer addiction
these trigger computer addiction
these trigger computer addiction
* computer games
* online shopping
* social media
effects of computer addiction
effects of computer addiction
* sleep deprivation
* anxiety
* depression
* relationship problems
The digital inequality or gap between groups in terms of knowledge, usage, and access to ICT due to circumstances like location, income, and age
digital divide
Defined as a set of rules for proper and acceptable online behavior; denotes the proper attitude that one should have and observed when communicating online.
netiquette