This document discusses responsible use of information and communication technologies (ICTs). It outlines responsibilities to oneself, peers/family/friends, and others when using ICTs. Specific responsibilities include not using abusive language, respecting personal information, controlling internet usage, and not accessing inappropriate content without permission. The document also discusses dangers of internet addiction like poor health and confusing reality. It provides tips for preventing addiction like controlling usage time and engaging in offline activities. Overall, the document provides guidance for proper and responsible use of the internet.
2. What constitutes a Responsible
Use of ICTs?
Responsibility to self
Responsibility to peers/family/friends
Responsibility to others
2
3. 2. Do not use abusive language when chatting or leaving comments.
4. Respect other’s personal information.
1.Act appropriately in cyber space.
3. Do not access pornographic or profane content.
6. Cultivate a habit of controlling your Internet usage.
5. Do not copy or distribute another person’s creative works without
permission.
4. [Video clip] ‘Verbal Violence & Provision of[Video clip] ‘Verbal Violence & Provision of
False Information’False Information’
All about the Internet
5.
6. Dangerousness of Internet Addiction
Unlike physical addiction such as alcohol addiction and drug
addiction, Internet addiction is one kind of behavioral addiction; That
is a conduct disorder to lose one’s control to stop misbehaviors that
could harm others ,even oneself.
Dangerousness of Internet Addiction
Unlike physical addiction such as alcohol addiction and drug
addiction, Internet addiction is one kind of behavioral addiction; That
is a conduct disorder to lose one’s control to stop misbehaviors that
could harm others ,even oneself.
poor self-control; Skipping meals and Staying up all night
, which could lead to health problems
Confusion between real world and virtual world
,which could make one’s personality violent.
Internet addicts are highly likely to get involved in cyber crime.
Failure to continue daily activities; Addicts avoid school
attendance and neglect previous interpersonal experience
7. Prevention of Internet Addiction
For the proper use of the Internet, it is important to examine our Internet
behavior and to nip Internet addiction in the bud. If you are already in the
stage of addiction, it is highly recommended to strive to kick the bad habits
with helps of experts like professional counselor .
Prevention of Internet Addiction
For the proper use of the Internet, it is important to examine our Internet
behavior and to nip Internet addiction in the bud. If you are already in the
stage of addiction, it is highly recommended to strive to kick the bad habits
with helps of experts like professional counselor .
1. Control the time you spend on using computer.
2. Reduce the time you spend on using computer alone
3. More involvement in offline activities rather than
Internet game or surfing for free time
4. More engagement in exercise
5. Use software designed to prevent Internet addiction.
6. If you suspect yourself to be addictive to the Internet,
you had better receive professional counseling .
10. You have to make sure that the information provided and the ideas we read
on the Web are true and impartial before you accept them.
You have to make sure that the information provided and the ideas we read
on the Web are true and impartial before you accept them.
In an Internet environment, everyone is permitted to voice
his or her opinion and to hear others’ ideas. Internet users
now have the capability to send and receive information.
- Good effect: Users can share their own opinion and
information
with others freely.
-Side effect: Anybody can upload any kind of information on
the
Internet whether they are false and indecent or not.
The Role of the Internet
11. Personal information is confidential one that identify ourselves on the
Internet, so we should be careful to prevent the leak of personal
information. If it is made public, we will get into a big trouble not only in
cyberspace but also in real life.
Personal information is confidential one that identify ourselves on the
Internet, so we should be careful to prevent the leak of personal
information. If it is made public, we will get into a big trouble not only in
cyberspace but also in real life.
When using computers for public use, be more
careful in term of our personal information.
Pay attention to managing password and
change its combination often.
If unidentifiable sites such as premium events ask you
to give them personal information, dont give it them easily
When signing up for websites or shopping online, read
Personal information protection policy in any case.
How toHow to
protectprotect
ourour
PersonalPersonal
informationinformation
How toHow to
protectprotect
ourour
PersonalPersonal
informationinformation
13. Guide to proper use of Internet
Copyright
Copyright gives the author of an original work exclusive right for a certain
time period in relation to that work, including its publication, distribution and
adaptation, after which time the work is said to enter the public domain.
Copyright must be protect to promote legitimate use of copyrighted
materials for improving our entertainment and culture business.
Copyright
Copyright gives the author of an original work exclusive right for a certain
time period in relation to that work, including its publication, distribution and
adaptation, after which time the work is said to enter the public domain.
Copyright must be protect to promote legitimate use of copyrighted
materials for improving our entertainment and culture business.
Social
damages
Failure to
continue
production
of new
materials
Profits far
below what
copyright
holders
should have
earned
Rampant
Piracy
We must pay for using copyrighted materials.
14.
15. There are a lot of pornographies that could undermine
adolescences’ concept about sex on the Internet. Frequent and
consistent exposure to obscene contents could lead
youngsters to sadism and misconception in terms of sex
There are a lot of pornographies that could undermine
adolescences’ concept about sex on the Internet. Frequent and
consistent exposure to obscene contents could lead
youngsters to sadism and misconception in terms of sex
When you receive porn- related spam mail, delete it before open it
Avoid downloading pornographies in P2P(Peer to Peer) site.
Parents should help children forge right concept of
sex through communication
Parents should take a close look at their children’s Internet
use habits and check weather they watch indecent contents
frequently or not.
How toHow to
deal withdeal with
obsceneobscene
materialsmaterials
How toHow to
deal withdeal with
obsceneobscene
materialsmaterials
17. Type of obscene materials on the Internet
- Pornography
- Video clips of excessively violent scenes
- Verbal violence and abusive language
- Bizarre websites that offer materials related to brutal and
unusual scenes like Cruelties to Animals, or human’s death
- Evil websites that offer dangerous resources related to
suicide, drugs or bombs
Prevention of exposure to malicious materials
- Don’t search those unwholesome data.
- If you are exposed to obscene materials, you should try to prevent
future exposure
18.
19. Make your own rules to be a responsible ICT user.Make your own rules to be a responsible ICT user.
Supplement
20. Discuss good effects of the InternetDiscuss good effects of the Internet
Supplement