0% found this document useful (0 votes)
10 views17 pages

Rosalejos Alexisshyne

The document outlines the importance of netiquette and computer ethics, emphasizing respectful online communication and the distinction between privacy and security. It details the Ten Commandments of Computer Ethics and various forms of cybercrime, including hacking and cyberbullying, along with relevant laws in the Philippines. Additionally, it highlights the risks to internet privacy and the need for responsible online behavior.

Uploaded by

janpaulcagubcub
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views17 pages

Rosalejos Alexisshyne

The document outlines the importance of netiquette and computer ethics, emphasizing respectful online communication and the distinction between privacy and security. It details the Ten Commandments of Computer Ethics and various forms of cybercrime, including hacking and cyberbullying, along with relevant laws in the Philippines. Additionally, it highlights the risks to internet privacy and the need for responsible online behavior.

Uploaded by

janpaulcagubcub
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

The Netiquette and

Computer Ethics
Member’s:
Kyla Manangkila
Maja Jean Libanda
Alexis Shyne Rosalejos
Gene Rachel Repuela
Christian Dave Layahon
Aira Trazona
Objectives:

• At the end of the lesson, the student’s will able to;

a. Discuss the importance of being a responsible netizen by following


the rules
of common courtesy online and the “rules of the road” of
cyberspace.

b. Discuss the difference between privacy and security.

c. Explain the various risks to Internet privacy.


WHAT IS
NETIQUETTE?
What does netiquette mean?

• Netiquette is a made-up word from the words


“net” and “etiquette”. Netiquette thus
describes the rules of conduct for respectful
and appropriate communication on the
internet.

• Netiquette is often referred to as etiquette for


the Internet.
REMEMBER THE GOLDEN RULE

- Even though you may be interacting with a computer screen, you


are communicating with a real person who will react to your
message. Make a goods impression- treat others with the same
respect that you would like to receive and avoid confrontational or
offensive language.

• AVOID SLANG, ACRONYMS AND TEXT TALK- Communicating


Effectively in college and business environments requires the use
of correct terminology, spelling, and grammar that can easily be
understood.
For Example: use “your” instead of “ur”.
AVOID “SCREAMING” IN TYPED
MESSAGES

- Typing an entire message using all capital letters is known


as “screaming”. It distracting and generally frowned upon in
professional environments. It is better to draw emphasis to
selected words or phrases.

• PROOFREAD YOUR MESSAGES BEFORE SENDING


THEM- Proofreading your messages before you send them
is a best practice for effective and efficient communication.
EXERCISE GOOD JUDGEMENT WHEN
SHARING INFORMATION WITH OTHERS
ONLINE
- Email and chat messages that you send or receive are considered private
and should not be forwarded or copied to others without gaining the
consent of all involved participants.

• To protect your privacy and safety, do not share online any sensitive
personal information such as;
- Your home address or phone number
- Personal conversations
- Social plans, such as vacations
- Financial information
- Usernames, passwords, or hints
RESPEPECT DIVERSITY IN VIEWPOINTS

- Be constructive and respectful when sharing opinions,


beliefs, and criticism, or responding to those of others in
the conversation.

- When sharing a viewpoint that differs from someone


else’s, it is the best practice to first acknowledge the
other person by briefly restating what he or she said, but
in your own words. This let’s the person know that you
are listening and trying to understand them.
TEN COMMANDMENTS OF COMPUTER
ETHICS
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people’s computer work.
3. Thou shalt not snoop around in other people’s computer files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy of use pro prietary software for which you have not paid
(without permission).
7. Thou shalt not use other’s people’s computer resources without authorization or
proper compensation.
8. Thou shalt not appropriate other people’s intellectual output.
9. Thou shalt think about the social consequences of the program you are writing
on the system you are designing.
10. Thou shalt always use a computer in ways that ensure consideration and
respect for other humans.
WHAT IS CYBERCRIME?
THE CYBERCRIMES

What is cyber?
- it is the characteristics of the culture of computers, information,
technology and virtual reality.

• Cybercrime- is defined as a crime in which computer is the object of the


crime
( hacking , phishing, spamming and child pornography ) is used as a tool to
commit an offense.

• Cybercriminals- may use computer technology to access personal


information, business trade secrets or use the internet for exploitative or
malicious purposes.
REPUBLIC ACT NO.10175 CYBERCRIME
PREVENTION ACT OF 2012

• Is a law in the Philippines approved on September


12, 2012 which aims to address legal issues
concerning online interactions and internet.

• REPUBLIC ACT NO. 10173 DATA PRIVACY ACT


OF 2012
- is an act protecting individual person information.
COMMON FORMS OF CYBERCRIMES

• Copyright- the exclusive legal right, given to an originator or an


assignee to print, publish, perform, film, or record literary, artistic,
or musical material, and to authorize others to do the same.

• Copyright infringement- is the violation, privacy or theft of a


copyright holders exclusive rights through the unauthorize use of
copyrighted material or work.

• Plagiarism- an act or instants of using or closely imitating the


language and thoughts of another author without authorization.
CRIMINAL ACTIVITES
• HACKING- unauthorized access of or interference with computer systems, servers,
or other information and communication systems.
• COMPUTER-RELATED FOR GER, FRAUD AND/OR IDENTITY THEFT- an attempt
to obtain sensitive information such usernames ,password, and credit card details
( indirectly money ), often for malicious and reasons.
- Maximum of Php 200,000 fine or prison mayor
• ELECTRONIC THEFT- illegal downloading, Practice of illegal copying and selling
digital music, video, etc.
- Penalty of Php 50,000- 500,000 and or prison mayor
• CYBERBULLYING- the use of electronic communication to bully a person, typically
by sending a message of an intimidating or threatening nature.
- The Anti- Bullying Act of 2013( RA 10627 ).
CRIMINAL ACTIVITIES

• CYBERSEX- Willful engagement, maintenance, control, or operation,


directly of any lascivious exhibition of sexual organs or sexual activity with
the aid of computer systems for favor or consideration.
- Penalty at least Php 200,000 and or prison mayor
• CHILD PORNOGRAPHY- is a form of child sexual exploitation. REPBLIC ACT
NO.9775 or the Anti-Child Pornography ACT OF 2009, committed through a
computer system.
- Penalty of 12-20years of imprisonment or reclusion temporal.
• CYBER DEFAMATION- is an unprivileged false statement of fact which
tends to harm the reputation of a person or company.
- Penalty of 6-12years of imprisonment or prison mayor
THE INTERNET THREATS

• HACKING- is a term used to described actions taken by someone to gain


unauthorized access to a computer.
• MALWARE- is one of the most common ways to infiltrate or damage your
computer.
• PHARMING- is a common type of online fraud. A means to point you to a
malicious and illegitimate website by redirecting the legitimate URL.
• PHISHING- is used most often by cybercriminals because it’s easy to execute
and can produce the results they’re looking for with very little effort.
• SPAM- is one of the more common methods of both sending information out
and collecting it from unsuspecting people.
• VIRUSES- a malicious computer programs that are often sent as an email
attachment or a download with the internet of affecting your computer.
THANK YOU FOR
LISTENING!

You might also like