What Is Netiquette
What Is Netiquette
Simple stated, it’s network etiquette – that is the etiquette of cyberspace and
“etiquette” means the forms of required by good breeding or prescribed by authority to
be required in social or official life. In other words, netiquette is a set of rules for
behaving properly online.
When you use e-mail, instant messenger, video calls, or discussion boards to
communicate with others online, please be sure to follow the rules of professional online
communications known as netiquette. These rules will help you communicate with
instructors, classmates, and potential employers more effectively and will help prevent
misunderstandings.
REMEMBER THE GOLDEN RULE – Even though you may be interacting with a
computer screen, you are communicating with a real person who will react to your
message.
Make a good impression - treat others with the same respect that you would like to
receive and avoid confrontational or offensive language.
ONLINE – E-mail and chat messages that you send or receive are considered private
and should not be forwarded or copied to others without gaining the consent of all
involved participants. In general, messages posted to discussion boards and social
media sites can be read by the public. You may never know who might read or share
what you post. It is a good practice to always ask a post’s author for permission before
sharing a post with other parties.
• To protect your privacy and safety, do not share online any sensitive personal
information such as:
- Your home address or phone number
- Personal conversations
- Social plans, such as vacations
- Financial information
- Usernames, passwords, or hints
- Anything personal that you would not want shared by others over the Internet
• If the material you share with others online came from another source, make
every effort to gain permission from the original author or copyright holder. Copying
someone else's work and passing it off as your own is plagiarism. It damages your
reputation and could subject you to serious academic and legal consequences.
• When sharing a viewpoint that differs from someone else’s, it is a best practice to
first acknowledge the other person by briefly restating what he or she said, but in your
own words. This lets the person know that you are listening and trying to understand
them.
Rule 3: Know where you are in cyberspace "Netiquette varies from domain to domain."
(Shea, 1994) Depending on where you are in the virtual world, the same written
communication can be acceptable in one area, where it might be considered
inappropriate in another. What you text to a friend may not be appropriate in an email to
a classmate or colleague. Can you think of another example?
Rule 4: Respect other people's time and bandwidth Electronic communication takes
time: time to read and time in which to respond. Most people today lead busy lives, just
like you do, and don't have time to read or respond to frivolous emails or discussion
posts. As a virtual world communicator, it is your responsibility to make sure that the
time spent reading your words isn't wasted. Make your written communication
meaningful and to the point, without extraneous text or superfluous graphics or
attachments that may take forever to download. Can you think of another example?
Rule 5: Make yourself look good online writing.colostate.edu One of the best things
about the virtual world is the lack of judgment associated with your physical
appearance, sound of your voice, or the clothes you wear (unless you post a video of
yourself singing Karaoke in a clown outfit.) You will, however, be judged by the quality
of your writing, so keep the following tips in mind: Always check for spelling and
grammar errors Know what you're talking about and state it clearly Be pleasant and
polite. Can you think of another example?
Rule 6: Share expert knowledge The Internet offers its users many benefits; one is the
ease in which information can be shared or accessed and in fact, this "information
sharing" capability is one of the reasons the Internet was founded. So, in the spirit of the
Internet's "founding fathers," share what you know! When you post a question and
receive intelligent answers, share the results with others. Are you an expert at
something? Post resources and references about your subject matter. Recently
expanded your knowledge about a subject that might be of interest to others? Share
that as well. Can you think of another example?
Rule 7: Help keep flame wars under control What is meant by "flaming" and "flame
wars?" "Flaming is what people do when they express a strongly held opinion without
holding back any emotion." (Shea, 1994). As an example, think of the kinds of
passionate comments you might read on a sports blog. While "flaming" is not
necessarily forbidden in virtual communication, "flame wars," when two or three people
exchange angry posts between one another, must be controlled or the camaraderie of
the group could be compromised. Don't feed the flames; extinguish them by guiding the
discussion back to a more productive direction. Can you think of another example?
Rule 8: Respect other people's privacy Depending on what you are reading in the
virtual world, be it an online class discussion forum, Facebook page, or an email, you
may be exposed to some private or personal information that needs to be handled with
care. Perhaps someone is sharing some medical news about a loved one or discussing
a situation at work. What do you think would happen if this information "got into the
wrong hands?" Embarrassment? Hurt feelings? Loss of a job? Just as you expect
others to respect your privacy, so should you respect the privacy of others. Be sure to
err on the side of caution when deciding to discuss or not to discuss virtual
communication. Can you think of another example?
Rule 9: Don't abuse your power Just like in face-to-face situations, there are people in
cyberspace who have more "power" than others. They have more expertise in
technology or they have years of experience in a particular skill or subject matter.
Maybe it's you who possesses all of this knowledge and power! Just remember:
knowing more than others do or having more power than others may have does not give
you the right to take advantage of anyone. Think of Rule 1: Remember the human. Can
you think of another example?
Rule 10: Be forgiving of other people's mistakes Not everyone has the same amount of
experience working in the virtual world. And not everyone knows the rules of netiquette.
At some point, you will see a stupid question, read an unnecessarily long response, or
encounter misspelled words; when this happens, practice kindness and forgiveness as
you would hope someone would do if you had committed the same offense. If it's a
minor "offense," you might want to let it slide. If you feel compelled to respond to a
mistake, do so in a private email rather than a public forum. Can you think of another
example?
I. Cybercrimes
What is Cyber?
It is the Characteristics of the culture of computers, information, technology and
virtual reality.
Republic Act No. 10175 Cybercrime Prevention Act of 2012 is a law in the
Philippines approved on September 12,2012 which aims to address legal issues
concerning online interactions and internet.
Republic Act No. 10173 Data Privacy Act of 2012 is an act protecting individual
personal information.
COMMON FORMS OF CRIMES:
Copyright
The exclusive legal right, given to an originator or an assignee to print, publish,
perform, film, or record literary, artistic, or musical material, and to authorize others to
do the same.
a.Copyright infringement is the violation, piracy or theft of a copyright holder's
exclusive rights through the unauthorized use of a copyrighted material or work.
b. Plagiarism
An act or instance of using or closely imitating the language and thoughts of another
author without authorization.
c. Computer Addiction
• Offline: generally used when speaking about excessive gaming behavior, which
can be practiced both offline and online.
• Online: Also known as “Internet Addiction”, gets more attention in general from
scientific research than offline computer addiction, mainly because most cases of
computer addiction are related to the excessive use of the Internet. *Virtual Self -The
persona you create about yourself virtually.
CRIMINAL ACTIVITIES
a. Hacking
• Unauthorized access of or interference with computer systems, servers, or other
information and communication systems
• Unauthorized access to corrupt, alter, steal, or destroy electronic data using
computers or other information and communication systems without the computer or
system owner’s knowledge and consent
• The introduction of computer viruses resulting in the corruption, alteration, theft,
or loss of such data
• Illegal Access
• Illegal Interception
• Data Interference
• System Interference
• Misuse of Devices
• Infection of IT Systems with Malware – if the act is committed against critical
infrastructure of the Philippines the, penalty is between 12-20 years reclusion
temporal
• Six years up to twelve years of imprisonment also known as prison mayor.
c. Electronic theft
• Illegal Downloading
• Obtaining files that you do not have the right to use from the internet.
• Digital Piracy
• Practice of illegally copying and selling digital music, video, computer software,
etc.
• Copyright Infringement
• Penalty of Php 50,000 – 500, 000 and or prison mayor
d. Cyberbullying
• The use of electronic communication to bully a person, typically by sending a
message of an intimidating or threatening nature.
• The Anti-Bullying Act of 2013 (RA 10627)
e. Cybersex
• Willful engagement, maintenance, control, or operation, directly or indirectly of
any lascivious exhibition of sexual organs or sexual activity with the aid of a
computer system for favor or consideration.
• There is a discussion on this matter if it involves “couples” or “people in
relationship” who engage in cybersex.
• Penalty at least Php 200,000 and or prison mayor
F. Child Pornography
• Is a form of child sexual exploitation.
• Unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or
the AntiChild Pornography Act of 2009, committed through a computer system.
• Penalty of 12-20 years of imprisonment or reclusion temporal
g. Cyber Defamation
• Is an unprivileged false statement of fact which tends to harm the reputation of a
person or company.
• Penalty of 6-12 years of imprisonment or prison mayor.
II. Internet Threats
Hacking
Hacking is a term used to describe actions taken by
someone to gain unauthorized access to a computer. The
availability of information online on the tools, techniques,
and malware makes it easier for even non-technical
people to undertake malicious activities.
The process by which cyber criminals gain access to your
computer.
13.Malware
Malware is one of the more common ways to
infiltrate or damage your computer. Malicious
software that infects your computer, such as
computer viruses, worms, Trojan horses, spyware,
and adware.
39.Pharming
Pharming is a common type of online fraud.
• Convince you that the site is real and legitimate by spoofing or looking almost identical
to the actual site down to the smallest details. You may enter your personal information
and unknowingly give it to someone with malicious intent.
14.Phishing
Phishing is used most often by cyber criminals
because it's easy to execute and can produce
the results they're looking for with very little
effort.
What it does:
• Trick you into giving them information by asking you to update, validate or
confirm your account. It is often presented in a manner than seems official and
intimidating, to encourage you to take action.
• Provides cyber criminals with your username and passwords so that they can
access your accounts (your online bank account, shopping accounts, etc.) and
steal your credit card numbers.
40.Ransomware
Ransomware is a type of malware that restricts
access to your computer or your files and displays a
message that demands payment in order for the
restriction to be removed. The two most common
means of infection appear to be phishing emails
that contain malicious attachments and website
pop-up advertisements.
Spam
15.Spam is one of the more common methods
of both sending information out and collecting it
from unsuspecting people.
Trojan Horses
A Trojan horse may not be a term you're
familiar with, but there's a good chance you or
someone you know has been affected by one.
Viruses
Most people have heard of computer viruses,
but not many know exactly what they are or
what they do.
Wi-Fi Eavesdropping
WiFi eavesdropping is another method used
by cyber criminals to capture personal
information.
Worms
Worms are a common threat to computers
and the Internet as a whole.