SlideShare ist ein Scribd-Unternehmen logo
1 von 21
January 20, 2010
eSkwela-Telof, Quezon City
Responsible Use of ICT – End
User Training 1
What constitutes a Responsible
Use of ICTs?
Responsibility to self
Responsibility to peers/family/friends
Responsibility to others
2
2. Do not use abusive language when chatting or leaving comments.
4. Respect other’s personal information.
1.Act appropriately in cyber space.
3. Do not access pornographic or profane content.
6. Cultivate a habit of controlling your Internet usage.
5. Do not copy or distribute another person’s creative works without
permission.
[Video clip] ‘Verbal Violence & Provision of[Video clip] ‘Verbal Violence & Provision of
False Information’False Information’
All about the Internet
Dangerousness of Internet Addiction
Unlike physical addiction such as alcohol addiction and drug
addiction, Internet addiction is one kind of behavioral addiction; That
is a conduct disorder to lose one’s control to stop misbehaviors that
could harm others ,even oneself.
Dangerousness of Internet Addiction
Unlike physical addiction such as alcohol addiction and drug
addiction, Internet addiction is one kind of behavioral addiction; That
is a conduct disorder to lose one’s control to stop misbehaviors that
could harm others ,even oneself.
poor self-control; Skipping meals and Staying up all night
, which could lead to health problems
Confusion between real world and virtual world
,which could make one’s personality violent.
Internet addicts are highly likely to get involved in cyber crime.
Failure to continue daily activities; Addicts avoid school
attendance and neglect previous interpersonal experience
Prevention of Internet Addiction
For the proper use of the Internet, it is important to examine our Internet
behavior and to nip Internet addiction in the bud. If you are already in the
stage of addiction, it is highly recommended to strive to kick the bad habits
with helps of experts like professional counselor .
Prevention of Internet Addiction
For the proper use of the Internet, it is important to examine our Internet
behavior and to nip Internet addiction in the bud. If you are already in the
stage of addiction, it is highly recommended to strive to kick the bad habits
with helps of experts like professional counselor .
1. Control the time you spend on using computer.
2. Reduce the time you spend on using computer alone
3. More involvement in offline activities rather than
Internet game or surfing for free time
4. More engagement in exercise
5. Use software designed to prevent Internet addiction.
6. If you suspect yourself to be addictive to the Internet,
you had better receive professional counseling .
How to cope with Internet addiction
You have to make sure that the information provided and the ideas we read
on the Web are true and impartial before you accept them.
You have to make sure that the information provided and the ideas we read
on the Web are true and impartial before you accept them.
In an Internet environment, everyone is permitted to voice
his or her opinion and to hear others’ ideas. Internet users
now have the capability to send and receive information.
- Good effect: Users can share their own opinion and
information
with others freely.
-Side effect: Anybody can upload any kind of information on
the
Internet whether they are false and indecent or not.
The Role of the Internet
Personal information is confidential one that identify ourselves on the
Internet, so we should be careful to prevent the leak of personal
information. If it is made public, we will get into a big trouble not only in
cyberspace but also in real life.
Personal information is confidential one that identify ourselves on the
Internet, so we should be careful to prevent the leak of personal
information. If it is made public, we will get into a big trouble not only in
cyberspace but also in real life.
When using computers for public use, be more
careful in term of our personal information.
Pay attention to managing password and
change its combination often.
If unidentifiable sites such as premium events ask you
to give them personal information, dont give it them easily
When signing up for websites or shopping online, read
Personal information protection policy in any case.
How toHow to
protectprotect
ourour
PersonalPersonal
informationinformation
How toHow to
protectprotect
ourour
PersonalPersonal
informationinformation
Guide to proper use of Internet
Guide to proper use of Internet
Copyright
Copyright gives the author of an original work exclusive right for a certain
time period in relation to that work, including its publication, distribution and
adaptation, after which time the work is said to enter the public domain.
Copyright must be protect to promote legitimate use of copyrighted
materials for improving our entertainment and culture business.
Copyright
Copyright gives the author of an original work exclusive right for a certain
time period in relation to that work, including its publication, distribution and
adaptation, after which time the work is said to enter the public domain.
Copyright must be protect to promote legitimate use of copyrighted
materials for improving our entertainment and culture business.
Social
damages
Failure to
continue
production
of new
materials
Profits far
below what
copyright
holders
should have
earned
Rampant
Piracy
We must pay for using copyrighted materials.
There are a lot of pornographies that could undermine
adolescences’ concept about sex on the Internet. Frequent and
consistent exposure to obscene contents could lead
youngsters to sadism and misconception in terms of sex
There are a lot of pornographies that could undermine
adolescences’ concept about sex on the Internet. Frequent and
consistent exposure to obscene contents could lead
youngsters to sadism and misconception in terms of sex
When you receive porn- related spam mail, delete it before open it
Avoid downloading pornographies in P2P(Peer to Peer) site.
Parents should help children forge right concept of
sex through communication
Parents should take a close look at their children’s Internet
use habits and check weather they watch indecent contents
frequently or not.
How toHow to
deal withdeal with
obsceneobscene
materialsmaterials
How toHow to
deal withdeal with
obsceneobscene
materialsmaterials
Guide to proper use of Internet
Type of obscene materials on the Internet
- Pornography
- Video clips of excessively violent scenes
- Verbal violence and abusive language
- Bizarre websites that offer materials related to brutal and
unusual scenes like Cruelties to Animals, or human’s death
- Evil websites that offer dangerous resources related to
suicide, drugs or bombs
Prevention of exposure to malicious materials
- Don’t search those unwholesome data.
- If you are exposed to obscene materials, you should try to prevent
future exposure
Make your own rules to be a responsible ICT user.Make your own rules to be a responsible ICT user.
Supplement
Discuss good effects of the InternetDiscuss good effects of the Internet
Supplement
The Internet opens a window of hope.
Thanks for your attention

Weitere ähnliche Inhalte

Was ist angesagt?

Keeping kids safe in the digital era
Keeping kids safe in the digital eraKeeping kids safe in the digital era
Keeping kids safe in the digital era
bns_library
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
Lawrence Fine
 

Was ist angesagt? (20)

Keeping kids safe in the digital era
Keeping kids safe in the digital eraKeeping kids safe in the digital era
Keeping kids safe in the digital era
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Raising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldRaising A Christian Child In A Digital World
Raising A Christian Child In A Digital World
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
 
Danger Of The Internet
Danger Of The InternetDanger Of The Internet
Danger Of The Internet
 
Internet and Social Media Safety for Kids and Teens April 2014
Internet and Social Media Safety for Kids and Teens April 2014Internet and Social Media Safety for Kids and Teens April 2014
Internet and Social Media Safety for Kids and Teens April 2014
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017
 
Internet Safety Keypoints Handout
Internet Safety Keypoints HandoutInternet Safety Keypoints Handout
Internet Safety Keypoints Handout
 
Glow Internet Safety Talk
Glow Internet Safety TalkGlow Internet Safety Talk
Glow Internet Safety Talk
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 

Andere mochten auch

Ikalawang digmaang pandaigdig-II-Dalton mnhs
Ikalawang digmaang pandaigdig-II-Dalton mnhsIkalawang digmaang pandaigdig-II-Dalton mnhs
Ikalawang digmaang pandaigdig-II-Dalton mnhs
Jaypee Abelinde
 
Multimedia presentation
Multimedia presentationMultimedia presentation
Multimedia presentation
09_09
 
Q3 m3l3 ang bagong republika 1946
Q3 m3l3 ang bagong republika 1946Q3 m3l3 ang bagong republika 1946
Q3 m3l3 ang bagong republika 1946
Elsa Orani
 
Ikalawang Digmaang Pandaigdig
Ikalawang Digmaang PandaigdigIkalawang Digmaang Pandaigdig
Ikalawang Digmaang Pandaigdig
Arnel Rivera
 
Plant propagation methodologies
Plant propagation methodologiesPlant propagation methodologies
Plant propagation methodologies
Debbie-Ann Hall
 
Mga patakarang pangkabuhayan sa panahon ng amerikano
Mga patakarang pangkabuhayan sa panahon ng amerikanoMga patakarang pangkabuhayan sa panahon ng amerikano
Mga patakarang pangkabuhayan sa panahon ng amerikano
doris Ravara
 

Andere mochten auch (19)

Kasunduan sa Kasarinlan DBS 7JK AP PT
Kasunduan sa Kasarinlan DBS 7JK AP PTKasunduan sa Kasarinlan DBS 7JK AP PT
Kasunduan sa Kasarinlan DBS 7JK AP PT
 
Work ethics workshop 4
Work ethics workshop 4Work ethics workshop 4
Work ethics workshop 4
 
House hold electrical gadgets/appliances
House hold electrical gadgets/appliancesHouse hold electrical gadgets/appliances
House hold electrical gadgets/appliances
 
Ikalawang digmaang pandaigdig-II-Dalton mnhs
Ikalawang digmaang pandaigdig-II-Dalton mnhsIkalawang digmaang pandaigdig-II-Dalton mnhs
Ikalawang digmaang pandaigdig-II-Dalton mnhs
 
Multimedia presentation
Multimedia presentationMultimedia presentation
Multimedia presentation
 
Hangganan at lawak ng teritoryo ng pilipinas
Hangganan at lawak ng teritoryo ng pilipinasHangganan at lawak ng teritoryo ng pilipinas
Hangganan at lawak ng teritoryo ng pilipinas
 
Q3 m3l3 ang bagong republika 1946
Q3 m3l3 ang bagong republika 1946Q3 m3l3 ang bagong republika 1946
Q3 m3l3 ang bagong republika 1946
 
raising animals
raising animalsraising animals
raising animals
 
Elements and Principles:Emphasis
Elements and Principles:EmphasisElements and Principles:Emphasis
Elements and Principles:Emphasis
 
Ikalawang Digmaang Pandaigdig
Ikalawang Digmaang PandaigdigIkalawang Digmaang Pandaigdig
Ikalawang Digmaang Pandaigdig
 
Plant propagation methodologies
Plant propagation methodologiesPlant propagation methodologies
Plant propagation methodologies
 
Mga patakarang pangkabuhayan sa panahon ng amerikano
Mga patakarang pangkabuhayan sa panahon ng amerikanoMga patakarang pangkabuhayan sa panahon ng amerikano
Mga patakarang pangkabuhayan sa panahon ng amerikano
 
Mga Bahagi Ng Pananalita
Mga Bahagi Ng PananalitaMga Bahagi Ng Pananalita
Mga Bahagi Ng Pananalita
 
Pang abay vi
Pang abay viPang abay vi
Pang abay vi
 
Basic Photography Lesson
Basic Photography LessonBasic Photography Lesson
Basic Photography Lesson
 
Food Preservation Methods and Food Processing
Food Preservation Methods and Food Processing Food Preservation Methods and Food Processing
Food Preservation Methods and Food Processing
 
Food preservation
Food preservationFood preservation
Food preservation
 
Paggawa ng mabuti sa kapwa
Paggawa ng mabuti sa kapwaPaggawa ng mabuti sa kapwa
Paggawa ng mabuti sa kapwa
 
Elements And Principles of Art
Elements And Principles of ArtElements And Principles of Art
Elements And Principles of Art
 

Ähnlich wie Eskwela module 3_responsible use of ict

Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
Mazni Salleh
 
Digital citizenship project
Digital citizenship projectDigital citizenship project
Digital citizenship project
fig2381
 
Hannah dc keynote
Hannah dc keynoteHannah dc keynote
Hannah dc keynote
takahe2
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
ayerssaa
 
Moral presentation
Moral presentationMoral presentation
Moral presentation
KhailingWong
 
Moral presentation
Moral presentationMoral presentation
Moral presentation
KhailingWong
 
Moral presentation
Moral presentationMoral presentation
Moral presentation
KhailingWong
 
Moral presentation
Moral presentationMoral presentation
Moral presentation
KhailingWong
 
Moral presentation
Moral presentationMoral presentation
Moral presentation
KhailingWong
 

Ähnlich wie Eskwela module 3_responsible use of ict (20)

Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
Digital citizenship project
Digital citizenship projectDigital citizenship project
Digital citizenship project
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Hannah dc keynote
Hannah dc keynoteHannah dc keynote
Hannah dc keynote
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Hannah dc keynote
Hannah dc keynoteHannah dc keynote
Hannah dc keynote
 
Digital Citizenship
Digital Citizenship Digital Citizenship
Digital Citizenship
 
The use of internet web 120
The use of internet web 120The use of internet web 120
The use of internet web 120
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
 
Moral presentation
Moral presentationMoral presentation
Moral presentation
 
Moral presentation
Moral presentationMoral presentation
Moral presentation
 
Moral presentation
Moral presentationMoral presentation
Moral presentation
 
Moral presentation
Moral presentationMoral presentation
Moral presentation
 
Moral presentation
Moral presentationMoral presentation
Moral presentation
 
Cyber bullying by National Republican Guard
Cyber bullying by National Republican GuardCyber bullying by National Republican Guard
Cyber bullying by National Republican Guard
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdf
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Eskwela module 3_responsible use of ict

  • 1. January 20, 2010 eSkwela-Telof, Quezon City Responsible Use of ICT – End User Training 1
  • 2. What constitutes a Responsible Use of ICTs? Responsibility to self Responsibility to peers/family/friends Responsibility to others 2
  • 3. 2. Do not use abusive language when chatting or leaving comments. 4. Respect other’s personal information. 1.Act appropriately in cyber space. 3. Do not access pornographic or profane content. 6. Cultivate a habit of controlling your Internet usage. 5. Do not copy or distribute another person’s creative works without permission.
  • 4. [Video clip] ‘Verbal Violence & Provision of[Video clip] ‘Verbal Violence & Provision of False Information’False Information’ All about the Internet
  • 5.
  • 6. Dangerousness of Internet Addiction Unlike physical addiction such as alcohol addiction and drug addiction, Internet addiction is one kind of behavioral addiction; That is a conduct disorder to lose one’s control to stop misbehaviors that could harm others ,even oneself. Dangerousness of Internet Addiction Unlike physical addiction such as alcohol addiction and drug addiction, Internet addiction is one kind of behavioral addiction; That is a conduct disorder to lose one’s control to stop misbehaviors that could harm others ,even oneself. poor self-control; Skipping meals and Staying up all night , which could lead to health problems Confusion between real world and virtual world ,which could make one’s personality violent. Internet addicts are highly likely to get involved in cyber crime. Failure to continue daily activities; Addicts avoid school attendance and neglect previous interpersonal experience
  • 7. Prevention of Internet Addiction For the proper use of the Internet, it is important to examine our Internet behavior and to nip Internet addiction in the bud. If you are already in the stage of addiction, it is highly recommended to strive to kick the bad habits with helps of experts like professional counselor . Prevention of Internet Addiction For the proper use of the Internet, it is important to examine our Internet behavior and to nip Internet addiction in the bud. If you are already in the stage of addiction, it is highly recommended to strive to kick the bad habits with helps of experts like professional counselor . 1. Control the time you spend on using computer. 2. Reduce the time you spend on using computer alone 3. More involvement in offline activities rather than Internet game or surfing for free time 4. More engagement in exercise 5. Use software designed to prevent Internet addiction. 6. If you suspect yourself to be addictive to the Internet, you had better receive professional counseling .
  • 8. How to cope with Internet addiction
  • 9.
  • 10. You have to make sure that the information provided and the ideas we read on the Web are true and impartial before you accept them. You have to make sure that the information provided and the ideas we read on the Web are true and impartial before you accept them. In an Internet environment, everyone is permitted to voice his or her opinion and to hear others’ ideas. Internet users now have the capability to send and receive information. - Good effect: Users can share their own opinion and information with others freely. -Side effect: Anybody can upload any kind of information on the Internet whether they are false and indecent or not. The Role of the Internet
  • 11. Personal information is confidential one that identify ourselves on the Internet, so we should be careful to prevent the leak of personal information. If it is made public, we will get into a big trouble not only in cyberspace but also in real life. Personal information is confidential one that identify ourselves on the Internet, so we should be careful to prevent the leak of personal information. If it is made public, we will get into a big trouble not only in cyberspace but also in real life. When using computers for public use, be more careful in term of our personal information. Pay attention to managing password and change its combination often. If unidentifiable sites such as premium events ask you to give them personal information, dont give it them easily When signing up for websites or shopping online, read Personal information protection policy in any case. How toHow to protectprotect ourour PersonalPersonal informationinformation How toHow to protectprotect ourour PersonalPersonal informationinformation
  • 12. Guide to proper use of Internet
  • 13. Guide to proper use of Internet Copyright Copyright gives the author of an original work exclusive right for a certain time period in relation to that work, including its publication, distribution and adaptation, after which time the work is said to enter the public domain. Copyright must be protect to promote legitimate use of copyrighted materials for improving our entertainment and culture business. Copyright Copyright gives the author of an original work exclusive right for a certain time period in relation to that work, including its publication, distribution and adaptation, after which time the work is said to enter the public domain. Copyright must be protect to promote legitimate use of copyrighted materials for improving our entertainment and culture business. Social damages Failure to continue production of new materials Profits far below what copyright holders should have earned Rampant Piracy We must pay for using copyrighted materials.
  • 14.
  • 15. There are a lot of pornographies that could undermine adolescences’ concept about sex on the Internet. Frequent and consistent exposure to obscene contents could lead youngsters to sadism and misconception in terms of sex There are a lot of pornographies that could undermine adolescences’ concept about sex on the Internet. Frequent and consistent exposure to obscene contents could lead youngsters to sadism and misconception in terms of sex When you receive porn- related spam mail, delete it before open it Avoid downloading pornographies in P2P(Peer to Peer) site. Parents should help children forge right concept of sex through communication Parents should take a close look at their children’s Internet use habits and check weather they watch indecent contents frequently or not. How toHow to deal withdeal with obsceneobscene materialsmaterials How toHow to deal withdeal with obsceneobscene materialsmaterials
  • 16. Guide to proper use of Internet
  • 17. Type of obscene materials on the Internet - Pornography - Video clips of excessively violent scenes - Verbal violence and abusive language - Bizarre websites that offer materials related to brutal and unusual scenes like Cruelties to Animals, or human’s death - Evil websites that offer dangerous resources related to suicide, drugs or bombs Prevention of exposure to malicious materials - Don’t search those unwholesome data. - If you are exposed to obscene materials, you should try to prevent future exposure
  • 18.
  • 19. Make your own rules to be a responsible ICT user.Make your own rules to be a responsible ICT user. Supplement
  • 20. Discuss good effects of the InternetDiscuss good effects of the Internet Supplement
  • 21. The Internet opens a window of hope. Thanks for your attention

Hinweis der Redaktion

  1. Diagram all answers to the question in a mindmap.