The Netiquette
The Netiquette
Topics:
● Online Security, Safety and Ethics
● Internet Threats
● Protecting Reputations Online
● Internet Protection
INTRODUCTION
Through this lesson, the students will be aware of numerous risks and dangers in the
internet world. It deals with ethics inside the Internet. This also addresses the resolve
and prevention of risks.
It discusses the protection of the reputation and privacy of yourself, family, and
friends in the online setting. It will also discuss the dangers and problems that are
encountered on the Internet. Through this module, the online community will be well
known to students.
The students will be able to encourage and share their knowledge acquired through
this lesson through the creativity of various applications such as Canva, Google
Draw etc. Also, this part stresses the sharing of accurate information and knowledge.
ANALYSIS
Let's go back to the “How Safe Are You?” test from Innovative Training Works,
Inc., 2016. Let us visit each item and see how risky it is to share them.
Type of Risks
Information
1. First Name There is a risk of sharing your first name. Chances are, the
hacker may already know plenty of information about you
even if you only give out your first name. You do not know
whom you can come across with.
2. Last Name If sharing the first name is a small risk, having both is
riskier.
3. Middle Name Sharing your middle name alone is not dangerous, but
sharing your full name would be.
6. Personal Phone Posting this on your profile, you would not want random
Number strangers to text or call you, or worse, pretend that they are
someone else.
7. Residential Phone Criminals use this information to deceive you, one of which
Number is when a stranger pretends to know your parents or
pretends to be you.
9. Future vacation Criminals may make evil plans during your trip if you post
plans your future vacation plans.
10. Current and Identity thieves usually get this information. They can use
previous schools this stuff for verification purposes.
ABSTRACTION
6. Use a safe and trusted payment method when shopping online: For additional
security, choose to pay with a payment service that has programs to protect you.
10. Think Before you reveal: Think more before you post
something that could damage your reputation and that
someone could use to embarrass or hurt you.
Ten Commandments of Computer Ethics by the Computer Ethics Institute:
Composing a Message (New/ Reply/ Forward). Check your mail regularly; ignoring a
mail message is discourteous and confusing to the sender. Conversely, never
assume that simply because you have sent a message, it has been read. Treat the
security of email messages about the same as a message on a postcard. If you have
sensitive messages to send, use some form of encrypting, or use another more
secure medium. Encourage others to communicate with you by email. Ensure you
give them your correct email address.
Writing Styles. Be very careful how you express yourself, especially if you feel
heated about the subject. Try to keep the message fairly brief. Keep paragraphs and
messages short and to the point. Make your message “concise”, not cryptic. Make
sure that the “subject” field of your message is meaningful.
Use Descriptive Titles. The subject line of an email enables a person with a limited
amount of time to decide whether to read your message or article. As a courtesy,
indicate what the message is about before they take the time to read it.
Be Careful with Humour and Sarcasm. When communicating face-to-face, your body
language and voice tones can be seen and heard, but with email, it is easy for a remark
meant to be funny to be misinterpreted as you aren’t being seen or heard in person.
Be Careful with Expressions of Anger. Again, because communicating with email has
the informal properties of conversation without the corresponding benefits of voice
and body language, messages are often misconstrued and generate unexpected
angry responses.
Be Careful What You Say About Others. Think more before you post personal
information about yourself or others.
Spelling Flames Considered Harmful. Remember that we all make mistakes, and
that there are many users on the network who use English as a second language.
If you feel that you must make a comment on the quality of a posting, please do so
by personal mail, not on the network (public post).
General Moral Imperatives from the Code of Ethics and Professional Code of
Association for Computing Machinery
1. Contribute to society and human well-being - This principle concerning the
quality of life of all people affirms an obligation to protect fundamental human
rights and to respect the diversity of all cultures.
2. Avoid harm to others - This principle use of computing technology in ways
that result in harm to any of the following: users, the general public,
employees and employers. Harmful actions include intentional destruction or
modification of files and programs leading to serious loss of resources or
unnecessary expenditure of human resources such as the time and effort
required to purge systems of “computer viruses.”
3. Be honest and trustworthy - Honesty is an essential component of trust. An
internet user has a duty to be honest about his or her own qualifications, posts
and messages.
4. Be fair and take action not to discriminate - The values of equality, tolerance,
respect for others and the principles of equal justice that govern this imperative.
5. Honor property rights including copyrights and patents - Violation of
copyrights, patents, trade secrets and the terms of license agreements is
prohibited by the law.
105
6. Give proper credit for intellectual property - One must not take credit for
other’s ideas or work, even in cases where the work has not been explicitly
protected by copyright, patent, etc.
7. Respect the privacy of others - It is the responsibility of everyone to
maintain the privacy and integrity of data describing individuals.
8. Honor confidentiality - The ethical concern is to respect all obligations of
confidentiality to employers, clients and the users unless discharged from
such obligations by requirements of the law or other principles of this Code.
Internet Protection