0% found this document useful (0 votes)
14 views7 pages

The Netiquette

The document outlines the importance of netiquette, online security, and ethics, emphasizing the risks associated with sharing personal information on the internet. It provides guidelines for safe online practices, including recognizing phishing attempts and using secure passwords, while also discussing the ethical responsibilities of internet users. Additionally, it highlights legal frameworks like the Cybercrime Prevention Act of 2012 aimed at protecting users and ensuring the integrity of online communications.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views7 pages

The Netiquette

The document outlines the importance of netiquette, online security, and ethics, emphasizing the risks associated with sharing personal information on the internet. It provides guidelines for safe online practices, including recognizing phishing attempts and using secure passwords, while also discussing the ethical responsibilities of internet users. Additionally, it highlights legal frameworks like the Cybercrime Prevention Act of 2012 aimed at protecting users and ensuring the integrity of online communications.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

THE NETIQUETTE

Topics:
● Online Security, Safety and Ethics
● Internet Threats
● Protecting Reputations Online
● Internet Protection

INTRODUCTION

Through this lesson, the students will be aware of numerous risks and dangers in the
internet world. It deals with ethics inside the Internet. This also addresses the resolve
and prevention of risks.
It discusses the protection of the reputation and privacy of yourself, family, and
friends in the online setting. It will also discuss the dangers and problems that are
encountered on the Internet. Through this module, the online community will be well
known to students.
The students will be able to encourage and share their knowledge acquired through
this lesson through the creativity of various applications such as Canva, Google
Draw etc. Also, this part stresses the sharing of accurate information and knowledge.

ANALYSIS

Let's go back to the “How Safe Are You?” test from Innovative Training Works,
Inc., 2016. Let us visit each item and see how risky it is to share them.

Type of Risks
Information

1. First Name There is a risk of sharing your first name. Chances are, the
hacker may already know plenty of information about you
even if you only give out your first name. You do not know
whom you can come across with.

2. Last Name If sharing the first name is a small risk, having both is
riskier.

3. Middle Name Sharing your middle name alone is not dangerous, but
sharing your full name would be.

4. Birthday Having this in your profile makes you vulnerable to identity


theft.

5. Address Sharing this on the Internet would be much easier for


criminals to find you.

6. Personal Phone Posting this on your profile, you would not want random
Number strangers to text or call you, or worse, pretend that they are
someone else.

7. Residential Phone Criminals use this information to deceive you, one of which
Number is when a stranger pretends to know your parents or
pretends to be you.

8. Name of your This is risky; sometimes, in retrieving your account on the


mother and father Internet when you forgot your password, this information is
needed. If the criminals know this, they may get your
account.

9. Future vacation Criminals may make evil plans during your trip if you post
plans your future vacation plans.

10. Current and Identity thieves usually get this information. They can use
previous schools this stuff for verification purposes.

What have you realized after answering the table?


Therefore, I conclude
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

ABSTRACTION

Network Etiquette (Netiquette)


Netiquette refers to the do’s and don’ts of online communication. It covers both
common courtesy and the informal “rules of the road” of cyberspace. Netiquette is
short for "Internet etiquette." Just like etiquette is a code of polite behavior in society,
netiquette is a code of good behavior on the Internet. This includes several aspects
of the Internet, such as email, social media, online chat, web forums, website
comments, multiplayer gaming, and other types of online communication.
Ethics
Ethics deals with placing a value on acts according to whether they are good or bad.
It is also called moral philosophy, the discipline concerned with what is morally good
and bad and morally right and wrong. The term is also applied to any system or
theory of moral values or principles.
Tips to Stay Safe Online

1. Check the URL: the URL might look okay in a message


or email but might take you to a page setup to extract
personal information. It is best to type a URL into a webpage
instead of clicking the link.
2. Outsmart “Phishing” Attempts: Never provide your personal
and financial information to an unsolicited email, SMS,
phone call or website even if they appear to be legitimate.

3. Always Check the Sender’s Email Address: Misspellings and


other typos that could indicate that they are not the real senders.

4. Learn to Spot Tell - Tale Signs of a Secure Site: Secure


sites have URLs that start with https:// and it should have
a padlock icon in the browser frame.

5. Shop Safely with Reputable Online Retailers and Marketplace:


Online shoppers should feel empowered to do their research about
products and sellers before making a purchase.

6. Use a safe and trusted payment method when shopping online: For additional
security, choose to pay with a payment service that has programs to protect you.

7. Use Privacy Setting and Sharing Controls: Social media platforms


offer privacy settings and controls that help you decide who can
access your content.

8. Protecting your devices: Protect your devices by locking


devices and your screens.

9. Use a Long and Unique Password: Choose a password that is


hard to guess, made up of numbers, letters and symbols.

10. Think Before you reveal: Think more before you post
something that could damage your reputation and that
someone could use to embarrass or hurt you.
Ten Commandments of Computer Ethics by the Computer Ethics Institute:
Composing a Message (New/ Reply/ Forward). Check your mail regularly; ignoring a
mail message is discourteous and confusing to the sender. Conversely, never
assume that simply because you have sent a message, it has been read. Treat the
security of email messages about the same as a message on a postcard. If you have
sensitive messages to send, use some form of encrypting, or use another more
secure medium. Encourage others to communicate with you by email. Ensure you
give them your correct email address.
Writing Styles. Be very careful how you express yourself, especially if you feel
heated about the subject. Try to keep the message fairly brief. Keep paragraphs and
messages short and to the point. Make your message “concise”, not cryptic. Make
sure that the “subject” field of your message is meaningful.
Use Descriptive Titles. The subject line of an email enables a person with a limited
amount of time to decide whether to read your message or article. As a courtesy,
indicate what the message is about before they take the time to read it.
Be Careful with Humour and Sarcasm. When communicating face-to-face, your body
language and voice tones can be seen and heard, but with email, it is easy for a remark
meant to be funny to be misinterpreted as you aren’t being seen or heard in person.
Be Careful with Expressions of Anger. Again, because communicating with email has
the informal properties of conversation without the corresponding benefits of voice
and body language, messages are often misconstrued and generate unexpected
angry responses.
Be Careful What You Say About Others. Think more before you post personal
information about yourself or others.
Spelling Flames Considered Harmful. Remember that we all make mistakes, and
that there are many users on the network who use English as a second language.
If you feel that you must make a comment on the quality of a posting, please do so
by personal mail, not on the network (public post).

General Moral Imperatives from the Code of Ethics and Professional Code of
Association for Computing Machinery
1. Contribute to society and human well-being - This principle concerning the
quality of life of all people affirms an obligation to protect fundamental human
rights and to respect the diversity of all cultures.
2. Avoid harm to others - This principle use of computing technology in ways
that result in harm to any of the following: users, the general public,
employees and employers. Harmful actions include intentional destruction or
modification of files and programs leading to serious loss of resources or
unnecessary expenditure of human resources such as the time and effort
required to purge systems of “computer viruses.”
3. Be honest and trustworthy - Honesty is an essential component of trust. An
internet user has a duty to be honest about his or her own qualifications, posts
and messages.
4. Be fair and take action not to discriminate - The values of equality, tolerance,
respect for others and the principles of equal justice that govern this imperative.
5. Honor property rights including copyrights and patents - Violation of
copyrights, patents, trade secrets and the terms of license agreements is
prohibited by the law.
105
6. Give proper credit for intellectual property - One must not take credit for
other’s ideas or work, even in cases where the work has not been explicitly
protected by copyright, patent, etc.
7. Respect the privacy of others - It is the responsibility of everyone to
maintain the privacy and integrity of data describing individuals.
8. Honor confidentiality - The ethical concern is to respect all obligations of
confidentiality to employers, clients and the users unless discharged from
such obligations by requirements of the law or other principles of this Code.

Internet Protection

To protect users from people eavesdropping on private information, computer


developers have proposed intrusion-detection systems that can detect any
illegitimate use of an information site or system. Both the national communities and
the international community have also given attention to comprehensive protection
laws, an example of which is the Cybercrime Prevention Act of 2012, officially
recorded as Republic Act No. 10175 introduced by Senator Edgardo Angara in the
Philippine Senate. RA 10175 Section 2 states the declaration of policy, “ The State
recognizes the vital role of information and communications industries such as
content production, telecommunications, broadcasting electronic commerce, and
data processing, in the nation’s overall social and economic development. The
State also recognizes the importance of providing an environment conducive to the
development, acceleration, and rational application and exploitation of information
and communications technology (ICT) to attain free, easy, and intelligible access to
exchange and/or delivery of information; and the need to protect and safeguard the
integrity of computer, computer and communications systems, networks, and
databases, and the confidentiality, integrity, and availability of information and data
stored therein, from all forms of misuse, abuse, and illegal access by making
punishable under the law such conduct or conducts. In this light, the State shall
adopt sufficient powers to effectively prevent and combat such offenses by
facilitating their detection, investigation, and prosecution at both the domestic and
international levels, and by providing arrangements for fast and reliable
international cooperation.”
(See full at: https://www.officialgazette.gov.ph/2012/09/12/republic-act-no-10175/)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy