0% found this document useful (0 votes)
44 views2 pages

Research and Information Seeking

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 2

RESEARCH AND INFORMATION SEEKING

Web Search Engines – program designed to search or mine the world wide web on
keywords provided by the user (ex: bing, duckduckgo, google, yahoo)

Research Indexing sites – web sites dedicated to compile and index researches
done by academic researchers (ex: IEEE Xplore, google scholar)

Massive Online Open Course(MOOC) – web sites dedicated to teach and inform
users focused on different areas (ex: coursera, edX, Udemy)

Employment Web Sites – web sites that enable companies to post job vacancies
also accommodate job seekers by providing a resume-submission facility. (ex:
JobStreet, Bestjobs)

Electronic Commerce (E-commerce) – a technology that uses electronic means to


trade products and currencies.

AUTHENTICITY VERIFICATION OF INFORMATION


1. Published Author’s Name – publishing the name of the one who wrote the
article or information is one of sign that the information is valid, credible and
legitimate.
2. Credible Web Sites – error-free articles are more likely published by web
sites of this big international or local companies
3. Rating, number of viewers and number of shares – credible articles is
more likely to receive a high rating or a normally high number of stars from
viewers
4. Reference and related articles - most of credible articles include a list of
references or articles related to the published one.

Netiquette – coined from the term of network and etiquette,


– set of ideal rules and conduct that a netizen should observe in
communicating and/or publishing information and materials over the WWW and in
ICT
Netizen – refers to the person who is a member or a part of the online community
Avatar – online representation

ONLINE SAFETY AND SECURITY


Spam – refers to the transmission of unsolicited messages from various origin using
electronic messaging systems (Unsolicited Bulk Email – email spam in common
form)
Phishing – software or a program used by attacker to obtain personal info
(attackers commonly targets users password)
Malware – short term for malicious software, computer software sent by an attacker
to inflict chaos on a computer’s operation and processes.

 RA 10627 or Anti-Bullying Act of 2013 – protection of individuals from bullying


through electronic means
 RA 10175 or Cybercrime Prevention Act of 2012 – protects an individual from
various online and cyber acts that may harm or evade one’s privacy and
integrity.
 Data Privacy Act of 2012 – protects personal information and data from
being divulges without consent

Bullying – severe or repeated use by one or more students of a written, verbal, or


electronic expression, or physical gesture, or any combination

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy