EMPOWERMENT TECHNOLOGY Core Rules of Netiquette Netiquette, or network etiquette, is concerned with the "proper" manner of communication in the online environment. Whenever you communicate in the virtual world, consider the following "rules," adapted from Virginia Shea's Core Rules of Netiquette. Rule 1: Remember the Human When communicating electronically, whether through email, instant message, discussion post, text, or another method, practice the Golden Rule: Do unto others as you would have others do unto you. Remember, your written words are read by real people, all deserving of respectful communication. Before you press "send" or "submit," ask yourself, "Would I be okay with this if someone else had written it?" Rule 2: Adhere to the same standards of behavior online that you follow in real life While it can be argued that standards of behavior may be different in the virtual world, they certainly should not be lower. You should do your best to act within the laws and ethical manners of society whenever you inhabit "cyberspace." Would you behave rudely to someone face-to-face? On most occasions, no. Neither should you behave this way in the virtual world. Rule 3: Know where you are in cyberspace "Netiquette varies from domain to domain." (Shea, 1994) Depending on where you are in the virtual world, the same written communication can be acceptable in one area, where it might be considered inappropriate in another. What you text to a friend may not be appropriate in an email to a classmate or colleague. Can you think of another example? Rule 4: Respect other people's time and bandwidth Electronic communication takes time: time to read and time in which to respond. Most people today lead busy lives, just like you do, and don't have time to read or respond to frivolous emails or discussion posts. As a virtual world communicator, it is your responsibility to make sure that the time spent reading your words isn't wasted. Make your written communication meaningful and to the point, without extraneous text or superfluous graphics or attachments that may take forever to download. Rule 5: Make yourself look good online One of the virtual world's best things is the lack of judgment associated with your physical appearance, the sound of your voice, or the clothes you wear (unless you post a video of yourself singing Karaoke in a clown outfit.) The quality of your writing will judge you, so keep the following tips in mind: 1. Always check for spelling and grammar errors. 2. Know what you're talking about and state it clearly. 3. Be pleasant and polite Rule 6: Share expert knowledge The Internet offers its users many benefits; one is the ease in which information can be shared or accessed, and in fact, this "information sharing" capability is one of the reasons the Internet was founded. So in the spirit of the Internet's "founding fathers," share what you know! When you post a question and receive intelligent answers, share the results with others. Are you an expert at something? Post resources and references for your subject matter. You have recently expanded your knowledge about a subject that might be of interest to others? Share that as well. Rule 7: Help keep flame wars under control What is meant by "flaming" and "flame wars?" "Flaming is what people do when they express a strongly held opinion without holding back any emotion." (Shea, 1994). As an example, think of the kinds of passionate comments you might read on a sports blog. While "flaming" is not necessarily forbidden in virtual communication, "flame wars," when two or three people exchange angry posts between one another, must be controlled, or the camaraderie of the group could be compromised. Don't feed the flames; extinguish them by guiding the discussion back to a more productive direction. Rule 8: Respect other people's privacy Depending on what you are reading in the virtual world, be it an online class discussion forum, Facebook page, or an email, you may be exposed to some private or personal information that needs to be handled with care. Perhaps someone is sharing some medical news about a loved one or discussing a situation at work. What do you think would happen if this information "got into the wrong hands?" Embarrassment? Hurt feelings? Loss of a job? Just as you expect others to respect your privacy, so should you respect the privacy of others. Be sure to err on the side of caution when deciding to discuss or not to discuss virtual communication. Rule 9: Don't abuse your power Like in face-to-face situations, there are people in cyberspace who have more "power" than others. They have more expertise in technology or have years of experience in a particular skill or subject matter. Maybe it is you who possesses all of this knowledge and power! Just remember: knowing more than others do or having more power than others may have does not give you the right to take advantage of anyone. Think of Rule 1: Remember the human. Rule 10: Be forgiving of other people's mistakes Not everyone has the same amount of experience working in the virtual world. And not everyone knows the rules of Netiquette. At some point, you will see a stupid question, read an unnecessarily long response, or encounter misspelled words; when this happens, practice kindness and forgiveness as you would hope someone would do if you had committed the same offense. If it's a minor "offense," you might want to let it slide. If you feel compelled to respond to a mistake, do so in a private email rather than a public forum. Understanding Graphic Design and Layout What makes a good and effective website? How do users interact with the websites they visit? A good website must know its target audience, determine its needs, and communicate effectively using the basic principles of graphics and layout. Users or visitors may have different interests and needs like browsing, researching, streaming, online shopping, dating, and many others. They even behave differently depending on what they perceive on the website. Web design matters in every user, whether they can decide to stay or just leave. Usability is important for the users as it satisfies their experience on the website, but a good design will drag the audience’s attention to stay on the page. Always remember that first impressions last and web design has an impact on the users on how they perceive the brand or message. Graphic design is an artistic way of communicating ideas and messages through visual expressions using texts, images, and symbols. Graphic designers work on the quality of the output they serve for the audience or clients like websites, advertisements, posters, flyers, logos, videos, and any other multimedia form. A practical graphic layout and design can easily catch the attention of the viewers and allow them to understand the message conveniently. Graphic Design vs. Layout Design is a plan of creating an idea through a combination of texts, images, and other elements that are placed together artistically, whereas, the layout is a term used as the process of organizing and arranging these elements in a design as you plot it in a paper. Basic Principles of Design and Layout 1. Balance It refers to the proper arrangement of the elements, which gives a visual weight for the design. There are two types of balance, Symmetrical or Asymmetrical. Symmetrical balance is where the elements are equally distributed on both sides of your design, technically a mirror-based design. In contrast, Asymmetrical balance is a free layout where the elements can be placed in any order or the opposite of symmetrical. 2. Emphasis It refers to something that needs to stand-out or emphasize. When working on emphasis, you can change the color, size, or even the element itself to lead the eye to the focal interest. 3. Pattern, Repetition and Rhythm 4. Alignment It refers to the proper placement of an element to your design, just like invisibly placing or aligning your texts or images diagonally, vertically, and horizontally. The standard texts or paragraph alignment we apply are center, right, left, and justified. 5. Changing its character size, thickness, spaces, or even font type to stand out is its most critical features. By applying this principle, it can help the viewer to recognize and navigate the highlight of the event smoothly. 6. Contrast It refers to the use of different or opposite elements such as sizes (large or small), shapes (geometric or organic), spaces (negative or positive), form (real or abstract), colors (monochromatic, complementary, triadic, tetradic), texture (smooth or rough), and values (light or dark). The contrast gives visual weight to an object or design. You must consider and limit the use of different elements, color, style, and typography to avoid cluttered design. When creating contrast in color and text, it is advised to choose a color from the background to create consistency of your design. Always remember that the details must be readable by having a dark-light value of either text and background or vice-versa. 7. Unity and Harmony It refers to the relationship of the elements or the contents when you place them together. The elements of the design must work together and agree to its meaning, theme, feeling, or mood. WORLD WIDE WEB It is also known as WWW or W3 introduce by Tim Berners-Lee. It consists of different pages that are formatted in a markup language called HTML (Hypertext Markup Language) and linked to each other that contain text, graphics, multimedia files, hyperlinks and etc. Web 1.0 The first development of World Wide Web where web pages are static. It also known as flat or stationary page and it cannot be manipulated by users. Web 2.0 It is a dynamic web page where user can interact with page like creating a user account, posting comments, uploading files and images, and others. Example: Blog sites, Facebook, Twitter, Instagram, YouTube Features of Web 2.0 1. Folksonomy – users can classify and arrange information by adding tag or label. Pound sign (#) is used in Facebook, Twitter, Instagram and other social networking sites. Example in tagging on Facebook: #TeamKawayan, #Single 2. Rich User Experience – user can have high interaction with the content of the page and can achieve level of expertise. 3. User Participation – user can put content on their own in web page like comment, evaluation, and etc. 4. Long Tail – A site that offers services and brings individual and businesses into selling different goods and commodities such as shopping site like OLX, Lazada, Shopee, Zalora and others. 5. Software as a service – users can subscribe to a software when they need it instead of purchasing them. 6. Mass Participation – sharing of diverse information through universal web access. Web 3.0 The Semantic Web A new paradigm in web interaction extension of led by World Wide Web Consortium (W3C) where it provides framework that allows data to be shared and reuse. TRENDS IN ICT 1. Convergence – it refers to fusing of technological advancement to work on a similar task. Example. Using smartphone as camera in taking pictures instead of DSLR camera. 2. Social Media – an application and website where user can communicate, create and share content, and participate in online communities. Type of Social Media A. Social Network – A website where people with the same come together to share information. Examples: Twitter, Instagram, Facebook B. Social News – A website where user can post stories and are ranked based on the popularity through voting. Examples: Digg, Reddit, Propeller, Slashdot, Fark C. Bookmarking Sites – A website that allows you to share and store internet bookmarks, articles, posts, blogs, images and others. Examples: Pinterest, StumbleUpon, Dribble D. Media Sharing – A website that allows you to share and store multimedia files such as video, photos and music. Examples: Instagram, YouTube, Flickr E. Microblogging – a website that allows you to broadcast short message. Examples: Twitter, Tumblr, Meetme F. Blogs and Forums – a discussion website that allows user to ask questions and comments on a journal posted by an individual or group. Examples: Wordpress, Blogger 3. Mobile Technologies – a technology used in cellular and other devices such netbook, laptop, tablet, smartphones and etc. 4. Assistive Media - A platform that assist people with disability. It will guide the individual like a blind person by using an audio recording. Online Safety The importance of internet plays a crucial part in human development. Life becomes easy and comfortable because of this technology. Most of us are connected to the internet via laptop, mobile phone, tablet, personal computer and other electronic gadgets. Behind this technology there is a risk that everyone should be aware of. You could be at risk on scam, bullying, and illegal activities if you will not take precautions in using internet. We need to keep ourselves safe and secure whenever we use the internet. That is why it is very important to know and learn the ways on how to be safe and secured online. Tips on how to be safe online Do not share your password with anyone. Add friends you know in real life. Do not visit untrusted websites. Add password to your WIFI at home to make it private. Install and update antivirus in your computer. Do not give your personal information to anyone Think before you click. Never post about your future vacation. INTERNET RISK 1. Cyberbullying It happens when someone intentionally abused, harass, and mistreated by other person using electronic communication. 2. Identity Theft It is a crime of stealing personal information for the purpose of assuming that person’s name or identity to make any form of transactions. 3. Cyber Stalking A criminal practice where electronic communication is used to stalk or harass individual or group. 4. Sexting The act of sending sexually explicit text messages, images, and videos. INTERNET THREATS A. Malware – also known as Malicious Software. Types of Malware 1. Virus – a malicious program that replicate itself by copying itself to another program. 2. Trojan Horse – a malicious program that disguised as legitimate program that user will accept and use but take control of your computer. 3. Worm – malicious program that copy’s itself and spreads to other computers. 4. Spyware – A malicious program that gathers information from victim’s computer and send it back to the hacker. 5. Adware – An unwanted advertisement that will pop-up several times on victim’s computer then behave abnormally and tedious to close them. 6. Keylogger – A program that runs in the background and steals user credentials and confidential information and send back to hack by recording every keystroke that a user makes on their computer or device. 7. Botnet – A collection of infected internet–connected devices such as PC and mobile phone that are controlled by a common type of malware. 8. Rootkit – A software tools used by hackers to gain control over a computer on a network without being exposed. 9. Ransomware – A ransom virus that block the user from accessing the programs or files and demands to pay the ransom through online method for the removal of the virus. B. Spam – also known as junk email or unwanted email send by advertiser or bot. It can be used to send malware. C. Phishing – a cyberattack method using deceptive emails and websites to acquiring sensitive personal information. D. Cybercrime – a crime in which computer is used as object and tool in committing a crime such hacking, phishing, spamming, child pornography, libel, hate crimes, identity thief and others. E. Cybercrime Law – a law that deals with all forms of cybercrime Internet Research is a research method in collecting and gathering information via internet by using search engine such as google. Search Engine is a program that allows users to search for content on internet. Examples of Search Engine Google Web Crawler Bing Ask Aol Search Yahoo! Search Info Infospace Wow Baidu MyWebSearch Wolframalpha Dogpile DuckDuckGo Contenko Internet Archive Searching the Web Getting the correct and reliable information is our goal in internet research. We may rely on the capability of search engine but sometimes it may not give us the correct information because of the keywords we entered into a search engine. There are techniques in searching information that can be applied in search engine in order to get a better result. Some search engines allow combination of words and logic connectors of AND, OR, and NOT. Tips for Effective Internet Research by George Mathews 1. Know what kind of research you want to do. 2. Make a list of keywords you will use in your search. 3. Enclose keywords in quotation marks. 4. Use the minus sign (-). 5. Try specialized search engines. 6. Skim through search results web pages. 7. Bookmark 8. Review your bookmarks. Online Research Skills by Hannah Trierweiler Hudson 1. Check Your Sources 2. Ask Good Questions 3. Go Beyond the Surface 4. Be Patient 5. Respect Ownership 6. Use Your Networks Copyright Issues - There are millions of information that we can et from the internet. Some of this information are free but others are not. They are protected by a copyright law. What is Copyright? - Copyright is a protection given to the owner of the rights in an original work such as books, musical works, films, paintings, and other works, and computer programs. This original work is called intellectual property which is protected under Republic Act 8293 known as the “Intellectual Property Code of the Philippines”. Copyright Infringement - This happens when the copyrighted work is use by other person without permission of the author or copyright holder. Any person who is infringing the right protected work would be liable under the law. Fair Use - Research is important to the students and other people. Most of them rely on the information that they can get online. Although this information is protected by a copyright law but we can still use this information without permission in a limited way under certain condition and purpose. Fair use is the use of copyrighted material for comment, teaching, criticism, news reporting, research, scholarship, and other similar purpose is not an infringement of copyright. Example of this is when you post a quote from a person in your Facebook wall. Include the name of person who owns the quote in your post. Another example is when you copy image from internet, give credit to the creator of image. The copied image should be use for educational purpose not for commercial use. In fair use, 5% of the content of reference can only be copied. If 20% or less of reference copied, there must be a secondary use agreement and fee. And if 20% or more of reference copied, it requires purchasing of creative work. Guidelines for Fair Use 1. Majority of the contents created must be yours. 2. Give credit to the owner. 3. Don’t make profit of the copyrighted work.