0% found this document useful (0 votes)
58 views

Research and Information Seeking

The document discusses various topics related to online research and information seeking, authenticity verification of information found online, netiquette and safety when online. It provides examples of popular web search engines, research indexing sites, MOOCs and employment websites. It also outlines some signs that information is credible such as published author names, reputable websites, ratings and references. Netiquette and concepts like avatars, spam, phishing and malware are defined. Relevant Philippine laws regarding cyberbullying, cybercrime and data privacy are also mentioned.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views

Research and Information Seeking

The document discusses various topics related to online research and information seeking, authenticity verification of information found online, netiquette and safety when online. It provides examples of popular web search engines, research indexing sites, MOOCs and employment websites. It also outlines some signs that information is credible such as published author names, reputable websites, ratings and references. Netiquette and concepts like avatars, spam, phishing and malware are defined. Relevant Philippine laws regarding cyberbullying, cybercrime and data privacy are also mentioned.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

RESEARCH AND INFORMATION SEEKING

Web Search Engines – program designed to search or mine the world wide web on
keywords provided by the user (ex: bing, duckduckgo, google, yahoo)

Research Indexing sites – web sites dedicated to compile and index researches
done by academic researchers (ex: IEEE Xplore, google scholar)

Massive Online Open Course(MOOC) – web sites dedicated to teach and inform
users focused on different areas (ex: coursera, edX, Udemy)

Employment Web Sites – web sites that enable companies to post job vacancies
also accommodate job seekers by providing a resume-submission facility. (ex:
JobStreet, Bestjobs)

Electronic Commerce (E-commerce) – a technology that uses electronic means to


trade products and currencies.

AUTHENTICITY VERIFICATION OF INFORMATION


1. Published Author’s Name – publishing the name of the one who wrote the
article or information is one of sign that the information is valid, credible and
legitimate.
2. Credible Web Sites – error-free articles are more likely published by web
sites of this big international or local companies
3. Rating, number of viewers and number of shares – credible articles is
more likely to receive a high rating or a normally high number of stars from
viewers
4. Reference and related articles - most of credible articles include a list of
references or articles related to the published one.

Netiquette – coined from the term of network and etiquette,


– set of ideal rules and conduct that a netizen should observe in
communicating and/or publishing information and materials over the WWW and in
ICT
Netizen – refers to the person who is a member or a part of the online community
Avatar – online representation

ONLINE SAFETY AND SECURITY


Spam – refers to the transmission of unsolicited messages from various origin using
electronic messaging systems (Unsolicited Bulk Email – email spam in common
form)
Phishing – software or a program used by attacker to obtain personal info
(attackers commonly targets users password)
Malware – short term for malicious software, computer software sent by an attacker
to inflict chaos on a computer’s operation and processes.

 RA 10627 or Anti-Bullying Act of 2013 – protection of individuals from bullying


through electronic means
 RA 10175 or Cybercrime Prevention Act of 2012 – protects an individual from
various online and cyber acts that may harm or evade one’s privacy and
integrity.
 Data Privacy Act of 2012 – protects personal information and data from
being divulges without consent

Bullying – severe or repeated use by one or more students of a written, verbal, or


electronic expression, or physical gesture, or any combination

You might also like