0% found this document useful (0 votes)
36 views37 pages

04 (The Netiquette and The Computer Ethics)

Uploaded by

Ruwel Batocabe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views37 pages

04 (The Netiquette and The Computer Ethics)

Uploaded by

Ruwel Batocabe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

Living in IT Era

By: CCIT Faculty


THE NETIQUETTE AND
THE COMPUTER
ETHICS
2
3
Netiquette
▸ Network etiquette - etiquette of cyberspace
▸ “etiquette” means the forms of required by good
breeding or prescribed by authority to be required
in social or official life.
▸ netiquette is a set of rules for behaving
properly online.
▸ is concerned with the "proper" way to
communicate in an online environment
4
Netiquette
▸ Remember the Golden Rule
 Make a good impression - treat others with the same
respect that you would like to receive and avoid
confrontational or offensive language.
▸ Avoid Slang, Acronyms, and Text Talk
 Communicating effectively in college and business
environments requires the use of correct terminology,
spelling, and grammar that can easily be understood
▸ Avoid “SCREAMING” in Typed Messages
 Typing an entire message using all capital letters is known as
“screaming”.
5
Netiquette
▸ Proofread Your Messages Before Sending
 Proofreading your messages before you send them is a best
practice for effective and efficient communication.
▸ Exercise Good Judgment when sharing
Information with Others
 E-mail and chat messages that you send or receive are
considered private and should not be forwarded or copied
to others without gaining the consent of all involved
participants.
6
Netiquette
▸ X -Do not share
• Your home address or phone number
• - Personal conversations
• - Social plans, such as vacations
• - Financial information

• - Usernames, passwords, or hints /anything personal you do not want to share

Respect Diversity in viewpoints


 Be constructive and respectful when sharing opinions,
beliefs, and criticisms, or responding to those of others in
the conversation
7
Core Rules of Netiquette
Rule 1- Remember the Human (Practice the Golden Rule)
Rule 2- Adhere to the same standards (Online/Real life)
Rule 3- Know where you are in cyberspace (Acceptable in
this area not in other)
Rule 4- Respect other people's time and bandwidth (make
sure that the time spent reading your words isn't wasted.)
Rule 5- Make yourself look good online writing (Always
check for spelling and grammar errors Know what you're
talking)
8
Core Rules of Netiquette
Rule 6-Share Expert Knowledge
Rule 7- Help keep flame wars under control
Rule 8- Respect other people's privacy
Rule 9- Don't abuse your power (Remember
Rule 1)
Rule 10- Be forgiving of other people's mistakes
9
THINK BEFORE YOU CLICK
Before you post something on the Web,
ask these questions to yourself: Would
you want your parents or grandparents to
see it? Would you want your future boss
to see it? Once you post something on
the Web, you have no control over who
sees your posts.
10
THINK BEFORE YOU CLICK
• Your friends depend on you to
protect their reputation online. Talk
to your friends about this serious
responsibility
• Set your post to “private.” In this
way, search engines will not be
able to scan that post.
11
THINK BEFORE YOU CLICK
• Avoid using names. Names are
easy for search engines to scan.
• If you feel that a post can affect you
or others’ reputation, ask the one
who posted it to pull it down or
report it as inappropriate.
12
THINK BEFORE YOU CLICK
• Do not share your password with
anyone.
• Never post anything about a future
vacation. It is similar to posting,
“Rob my house at this date.”
• Add friends you know in real life.
• Avoid visiting untrusted websites.
13
THINK BEFORE YOU CLICK
• Avoid downloading anything from
untrusted websites.
• Do not reply or click links from
suspicious emails.
• There are hackers who can find a
backdoor even your profile is
already set to private
14
THINK BEFORE YOU CLICK
• You have no control over
people getting access to
friend’s accounts and seeing
your private stuff
• Stay Lowkey Online
TEN
COMMANDMENTS
OF COMPUTER
ETHICS
15
16
Computer Ethics
▸ These rules have been established as a result of
consensus in society and are often written into laws.
▸ Ethics deals with placing a “value” on acts according
to whether they are “good” or “bad”.
▸ These rules have been established as a result of
consensus in society and are often written into laws.
17 Ten Commandments of
Computer Ethics
1) Thou shalt not use a computer to harm other
people.
2) Thou shalt not interfere with other people's
computer work.
3) Thou shalt not snoop around in other people's files.
4) Thou shalt not use a computer to steal:
5) Thou shalt not use a computer to bear false witness:
18 Ten Commandments of
Computer Ethics
6) Thou shalt not use or copy software for which you
have not paid:
7) Thou shalt not use other people's computer
resources without authorization.
8) Thou shalt not appropriate other people's
intellectual output.
9) Thou shalt think about the social consequences of
the program you write.
10) Thou shalt use a computer in ways that show
consideration and respect.
CYBERCRIMES

19
20
What is Cyber?
▸ It is the Characteristics of the culture of
computers, information, technology and
virtual reality.
▸ Relating to, or involving computers or
computer network .
21
Cybercrime
▸ is defined as a crime in which a computer is
the object of the crime
▸ is used as a tool to commit an offense.
22
Cybercriminals
▸ may use computer technology to access
personal information, business trade secrets
or use the internet for exploitative or
malicious purposes.
23
Laws
• Republic Act No. 10175 Cybercrime
Prevention Act of 2012 is a law in the
Philippines approved on September 12,2012
which aims to address legal issues concerning
online interactions and internet.
• Republic Act No. 10173 Data Privacy Act of
2012 is an act protecting individual personal
information.
24
Common Forms of
Cybercrimes
▸ Copyright
 The exclusive legal right, given to an originator or an
assignee to print, publish, perform, film, or record literary,
artistic, or musical material, and to authorize others to do
the same.
• Copyright infringement is the violation, piracy or theft of a
copyright holder's exclusive rights through the unauthorized use of
a copyrighted material or work.
▸ Plagiarism
 An act or instance of using or closely imitating the
language and thoughts of another author without
25
Common Forms of
Cybercrimes
▸ Computer Addiction
 Offline:
 generally used when speaking about excessive gaming
behavior, which can be practiced both offline and online.
 Online:
 Also known as “Internet Addiction”, gets more attention
in general from scientific research than offline computer
addiction, mainly because most cases of computer
addiction are related to the excessive use of the Internet.
 *Virtual Self -The persona you create about yourself
virtually.
26
Criminal Activities
▸ Hacking
 Unauthorized access of or interference with computer
systems, servers, or other information and communication
systems
▸ Computer-related forgery, fraud and/or identity
theft
 An attempt to obtain sensitive information such as
usernames, passwords, and credit card details and (indirectly
money), often for malicious reasons.
27
Criminal Activities
▸ Electronic theft
 Obtaining files that you do not have the right to use from
the internet.
▸ Cyberbullying
 The use of electronic communication to bully a person,
typically by sending a message of an intimidating or
threatening nature
28
Criminal Activities
▸ Cybersex
 sexual arousal using computer technology, especially by
wearing virtual reality equipment or by exchanging
messages with another person via the internet.
▸ Child Pornography
 Is a form of child sexual exploitation.
▸ Cyber Defamation
 Is an unprivileged false statement of fact which tends to
harm the reputation of a person or company.
INTERNET THREATS

29
30
Internet Threats
▸ Hacking
 is a term used to describe actions taken by someone to gain
unauthorized access to a computer.
 The availability of information online on the tools,
techniques, and malware makes it easier for even non-
technical people to undertake malicious activities
▸ Malware
 is one of the more common ways to infiltrate or damage
your computer.
31
Internet Threats
▸ Malware
- Malicious software that infects your computer, such as
computer
 Viruses
- A malicious program designed to replicate itself and
transfer from one computer to another either through
the Internet and local networks
 Worms
- A malicious program that transfers from one
computer to another by any type of means.
32
Internet Threats
▸ Trojan horses
 A malicious program that is disguised as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hackers
to get you information
▸ Spyware
 A program that runs in the background without you knowing it
▸ Adware
 A program designed to send you advertisement, mostly as pop-ups
33
Internet Threats
▸ Pharming
 is a common type of online fraud
 is a scamming practice in which malicious code is installed
on a personal computer or server
 A means to point you to a malicious and illegitimate website
by redirecting the legitimate URL. Even if the URL is entered
correctly, it can still be redirected to a fake website.
34
Internet Threats
▸ Phishing
 is used most often by cyber criminals because it's easy to
execute and can produce the results they're looking for with
very little effort.
 acquiring personal information like passwords and credit
card details
▸ Ransomware
 is a type of malware that restricts access to your computer or
your files and displays a message that demands payment in
order for the restriction to be removed.
35
Internet Threats
▸ Spam
 is one of the more common methods of both sending
information out and collecting it from unsuspecting people.
 The mass distribution of unsolicited messages, advertising or
pornography to addresses which can be easily found on the
Internet through things like social networking sites, company
websites and personal blogs
36
Internet Threats
▸ Spyware
 Software that collects personal information about you
without you knowing. They often come in the form of a ‘free'
download and are installed automatically with or without
your consent. These are difficult to remove and can infect
your computer
37

THANKS!
Any questions?

You might also like