Netiquite & Computer Ethics Module 4

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 23

THE NETIQUETTE

AND THE COMPUTER


ETHICS
WHAT IS NETIQUETTE?
SIMPLE STATED
● IT’S NETWORK ETIQUETTE – THAT IS THE
ETIQUETTE OF CYBERSPACE AND “ETIQUETTE”
MEANS THE FORMS OF REQUIRED BY GOOD
BREEDING OR PRESCRIBED BY AUTHORITY TO BE
REQUIRED IN SOCIAL OR OFFICIAL LIFE.
● IN OTHER WORDS, NETIQUETTE IS A SET OF RULES
FOR BEHAVING PROPERLY ONLINE.
● NETIQUETTE, OR NETWORK ETIQUETTE, IS
CONCERNED WITH THE "PROPER" WAY TO
COMMUNICATE IN AN ONLINE ENVIRONMENT.
● WHEN YOU USE E-MAIL, INSTANT MESSENGER,
VIDEO CALLS, OR DISCUSSION BOARDS TO
COMMUNICATE WITH OTHERS ONLINE, PLEASE BE
SURE TO FOLLOW THE RULES OF PROFESSIONAL
ONLINE COMMUNICATIONS KNOWN AS
NETIQUETTE.
NETIQUETTE
THE GOLDEN RULE

• MAKE A GOOD IMPRESSION - TREAT OTHERS WITH THE SAME RESPECT


THAT YOU WOULD LIKE TO RECEIVE AND AVOID CONFRONTATIONAL OR
OFFENSIVE LANGUAGE.

• AVOID SLANG, ACRONYMS, AND TEXT TALK – COMMUNICATING


EFFECTIVELY IN COLLEGE AND BUSINESS ENVIRONMENTS REQUIRES THE
USE OF CORRECT TERMINOLOGY, SPELLING, AND GRAMMAR THAT CAN
EASILY BE UNDERSTOOD. FOR EXAMPLE, USE “YOUR” INSTEAD OF “UR”.

• AVOID “SCREAMING” IN TYPED MESSAGES – TYPING AN ENTIRE


MESSAGE USING ALL CAPITAL LETTERS IS KNOWN AS “SCREAMING”. IT IS
DISTRACTING AND GENERALLY FROWNED UPON IN PROFESSIONAL
• PROOFREAD YOUR MESSAGES BEFORE SENDING THEM –
PROOFREADING YOUR MESSAGES BEFORE YOU SEND THEM IS A BEST
PRACTICE FOR EFFECTIVE AND EFFICIENT COMMUNICATION. STRIVE TO
MAKE YOUR COMMUNICATIONS CONCISE AND FREE OF ANY:
• SPELLING AND GRAMMAR ERRORS
• CONFUSING TERMS OR PHRASES THAT COULD BE MISUNDERSTOOD
• ERRORS OF OMISSION, SUCH AS MISSING CONTENT OR RECIPIENTS
• ERRORS IN ACCURACY OF INFORMATION

• EXERCISE GOOD JUDGMENT WHEN SHARING INFORMATION WITH


OTHERS ONLINE – E-MAIL AND CHAT MESSAGES THAT YOU SEND OR
RECEIVE ARE CONSIDERED PRIVATE AND SHOULD NOT BE FORWARDED
OR COPIED TO OTHERS WITHOUT GAINING THE CONSENT OF ALL
INVOLVED PARTICIPANTS.
○ TO PROTECT YOUR PRIVACY AND SAFETY, DO NOT SHARE ONLINE ANY
SENSITIVE PERSONAL INFORMATION SUCH AS:
- YOUR HOME ADDRESS OR PHONE NUMBER
- PERSONAL CONVERSATIONS
- SOCIAL PLANS, SUCH AS VACATIONS
- FINANCIAL INFORMATION
- USERNAMES, PASSWORDS, OR HINTS
- ANYTHING PERSONAL THAT YOU WOULD NOT WANT SHARED BY OTHERS
OVER THE INTERNET
○ IF THE MATERIAL YOU SHARE WITH OTHERS ONLINE CAME FROM
ANOTHER SOURCE, MAKE EVERY EFFORT TO GAIN PERMISSION FROM THE
ORIGINAL AUTHOR OR COPYRIGHT HOLDER.
○ COPYING SOMEONE ELSE'S WORK AND PASSING IT OFF AS YOUR OWN IS
PLAGIARISM.

 RESPECT DIVERSITY IN VIEWPOINTS - BE CONSTRUCTIVE


AND RESPECTFUL WHEN SHARING OPINIONS, BELIEFS, AND
CRITICISMS, OR RESPONDING TO THOSE OF OTHERS IN THE
• WHEN SHARING A VIEWPOINT THAT DIFFERS FROM SOMEONE ELSE’S, IT IS
A BEST PRACTICE TO FIRST ACKNOWLEDGE THE OTHER PERSON BY BRIEFLY
RESTATING WHAT HE OR SHE SAID, BUT IN YOUR OWN WORDS.
• WHEN PRESENTING AN OPINION OR CRITICISM, IT IS HELPFUL TO USE
PHRASES THAT IDENTIFY TO WHOSE POINT OF VIEW YOU ARE REFERRING. IF
THE OPINION IS YOURS, YOU CAN BEGIN WITH THE PHRASE “IN MY
EXPERIENCE” OR “IN MY OPINION”. IF IT IS A VIEWPOINT OF SOMEONE ELSE,
MAKE SURE YOU IDENTIFY THAT IN YOUR MESSAGE (EXAMPLE: “ACCORDING
TO ERIC ERICSON,” OR “THE PRESIDENT BELIEVES”)
10 C0MMANDMENTS OF COMPUTER
ETHICS
A) RULE 1: REMEMBER THE HUMAN WHEN COMMUNICATING
ELECTRONICALLY, WHETHER THROUGH EMAIL, INSTANT MESSAGE,
DISCUSSION POST, TEXT, OR SOME OTHER METHOD, PRACTICE THE
GOLDEN RULE:
● DO UNTO OTHERS AS YOU WOULD HAVE OTHERS DO UNTO YOU.
● REMEMBER, YOUR WRITTEN WORDS ARE READ BY REAL PEOPLE, ALL
DESERVING OF RESPECTFUL COMMUNICATION. BEFORE YOU PRESS
"SEND" OR "SUBMIT," ASK YOURSELF, "WOULD I BE OKAY WITH THIS
IF SOMEONE ELSE HAD WRITTEN IT?"

B) RULE 2: ADHERE TO THE SAME STANDARDS OF BEHAVIOR ONLINE


THAT YOU FOLLOW IN REAL LIFE. WHILE IT CAN BE ARGUED THAT7
STANDARDS OF BEHAVIOR MAY BE DIFFERENT IN THE VIRTUAL WORLD,
THEY CERTAINLY SHOULD NOT BE LOWER.
C) RULE 3: KNOW WHERE YOU ARE IN CYBERSPACE "NETIQUETTE VARIES
FROM DOMAIN TO DOMAIN." (SHEA, 1994) DEPENDING ON WHERE YOU ARE IN
THE VIRTUAL WORLD, THE SAME WRITTEN COMMUNICATION CAN BE
ACCEPTABLE IN ONE AREA, WHERE IT MIGHT BE CONSIDERED INAPPROPRIATE
IN ANOTHER.

D) RULE 4: RESPECT OTHER PEOPLE'S TIME AND BANDWIDTH ELECTRONIC


COMMUNICATION TAKES TIME: TIME TO READ AND TIME IN WHICH TO
RESPOND.
○ MOST PEOPLE TODAY LEAD BUSY LIVES, JUST LIKE YOU DO, AND
DON'T HAVE TIME TO READ OR RESPOND TO FRIVOLOUS EMAILS OR
DISCUSSION POSTS. AS A VIRTUAL WORLD COMMUNICATOR, IT IS
YOUR RESPONSIBILITY TO MAKE SURE THAT THE TIME SPENT
READING YOUR WORDS ISN'T WASTED. MAKE YOUR WRITTEN
COMMUNICATION MEANINGFUL AND TO THE POINT, WITHOUT
EXTRANEOUS TEXT OR SUPERFLUOUS GRAPHICS OR ATTACHMENTS
THAT MAY TAKE FOREVER TO DOWNLOAD.
• E) RULE 5: MAKE YOURSELF LOOK GOOD ONLINE
WRITING.COLOSTATE.EDU ONE OF THE BEST THINGS ABOUT THE
VIRTUAL WORLD IS THE LACK OF JUDGMENT ASSOCIATED WITH YOUR
PHYSICAL APPEARANCE, SOUND OF YOUR VOICE, OR THE CLOTHES YOU
WEAR (UNLESS YOU POST A VIDEO OF YOURSELF SINGING KARAOKE IN A
CLOWN OUTFIT.) ALWAYS CHECK FOR SPELLING AND GRAMMAR ERRORS
KNOW WHAT YOU'RE TALKING ABOUT AND STATE IT CLEARLY. BE
PLEASANT AND POLITE.

• F) RULE 6: SHARE EXPERT KNOWLEDGE THE INTERNET OFFERS ITS


USERS MANY BENEFITS;
● ONE IS THE EASE IN WHICH INFORMATION CAN BE SHARED OR
ACCESSED AND IN FACT, THIS "INFORMATION SHARING"9
CAPABILITY IS ONE OF THE REASONS THE INTERNET WAS
G) RULE 7: HELP KEEP FLAME WARS UNDER CONTROL WHAT IS MEANT BY "FLAMING"
AND "FLAME WARS?"
● "FLAMING IS WHAT PEOPLE DO WHEN THEY EXPRESS A STRONGLY HELD OPINION
WITHOUT HOLDING BACK ANY EMOTION." (SHEA, 1994). AS AN EXAMPLE, THINK
OF THE KINDS OF PASSIONATE COMMENTS YOU MIGHT READ ON A SPORTS BLOG.
WHILE "FLAMING" IS NOT NECESSARILY FORBIDDEN IN VIRTUAL COMMUNICATION,
"FLAME WARS," WHEN TWO OR THREE PEOPLE EXCHANGE ANGRY POSTS
BETWEEN ONE ANOTHER, MUST BE CONTROLLED OR THE CAMARADERIE OF THE
GROUP COULD BE COMPROMISED. DON'T FEED THE FLAMES; EXTINGUISH THEM
BY GUIDING THE DISCUSSION BACK TO A MORE PRODUCTIVE DIRECTION.

H) RULE 8: RESPECT OTHER PEOPLE'S PRIVACY DEPENDING ON WHAT YOU ARE


READING IN THE VIRTUAL WORLD, BE IT AN ONLINE CLASS DISCUSSION FORUM,
FACEBOOK PAGE, OR AN EMAIL, YOU MAY BE EXPOSED TO SOME PRIVATE OR
PERSONAL INFORMATION THAT NEEDS TO BE HANDLED WITH CARE.
•I.) RULE 9: DON'T ABUSE YOUR POWER JUST LIKE IN FACE-TO-FACE SITUATIONS,
THERE ARE PEOPLE IN CYBERSPACE WHO HAVE MORE "POWER" THAN OTHERS.
THEY HAVE MORE EXPERTISE IN TECHNOLOGY OR THEY HAVE YEARS OF
EXPERIENCE IN A PARTICULAR SKILL OR SUBJECT MATTER. JUST REMEMBER:
KNOWING MORE THAN OTHERS DO OR HAVING MORE POWER THAN OTHERS MAY
HAVE DOES NOT GIVE YOU THE RIGHT TO TAKE ADVANTAGE OF ANYONE. THINK OF
RULE 1: REMEMBER THE HUMAN.

J) RULE 10: BE FORGIVING OF OTHER PEOPLE'S MISTAKES NOT EVERYONE HAS


THE SAME AMOUNT OF EXPERIENCE WORKING IN THE VIRTUAL WORLD. AND NOT
EVERYONE KNOWS THE RULES OF NETIQUETTE.
CYBERCRIMES
WHAT IS CYBER?
IT IS THE CHARACTERISTICS OF THE CULTURE OF COMPUTERS,
INFORMATION, TECHNOLOGY AND VIRTUAL REALITY.

CYBERCRIME IS DEFINED AS A CRIME IN WHICH A COMPUTER IS THE


OBJECT OF THE CRIME (HACKING, PHISHING, SPAMMING AND CHILD
PORNOGRAPHY) IS USED AS A TOOL TO COMMIT AN OFFENSE.

CYBERCRIMINALS MAY USE COMPUTER TECHNOLOGY TO ACCESS


PERSONAL INFORMATION, BUSINESS TRADE SECRETS OR USE THE
INTERNET FOR EXPLOITATIVE OR MALICIOUS PURPOSES.

REPUBLIC ACT NO. 10175 CYBERCRIME PREVENTION ACT OF 2012 IS A LAW


IN THE PHILIPPINES APPROVED ON SEPTEMBER 12,2012 WHICH AIMS TO
ADDRESS LEGAL ISSUES CONCERNING ONLINE INTERACTIONS AND
INTERNET.

REPUBLIC ACT NO. 10173 DATA PRIVACY ACT OF 2012 IS AN ACT


PROTECTING INDIVIDUAL PERSONAL INFORMATION.
CYBERCRIMES
COMMON FORMS OF CYBERCRIMES:
A. COPYRIGHT
THE EXCLUSIVE LEGAL RIGHT, GIVEN TO AN ORIGINATOR OR AN
ASSIGNEE TO PRINT, PUBLISH, PERFORM, FILM, OR RECORD LITERARY,
ARTISTIC, OR MUSICAL MATERIAL, AND TO AUTHORIZE OTHERS TO DO
THE SAME.

COPYRIGHT INFRINGEMENT IS THE VIOLATION, PIRACY OR THEFT OF A


COPYRIGHT HOLDER'S EXCLUSIVE RIGHTS THROUGH THE
UNAUTHORIZED USE OF A COPYRIGHTED MATERIAL OR WORK.

B. PLAGIARISM
AN ACT OR INSTANCE OF USING OR CLOSELY IMITATING THE
LANGUAGE AND THOUGHTS OF ANOTHER AUTHOR WITHOUT
AUTHORIZATION.
C. COMPUTER ADDICTION
• OFFLINE: GENERALLY USED WHEN SPEAKING ABOUT EXCESSIVE GAMING
BEHAVIOR, WHICH CAN BE PRACTICED BOTH OFFLINE AND ONLINE.
• ONLINE: ALSO KNOWN AS “INTERNET ADDICTION”, GETS MORE ATTENTION IN
GENERAL FROM SCIENTIFIC RESEARCH THAN OFFLINE COMPUTER ADDICTION,
MAINLY BECAUSE MOST CASES OF COMPUTER ADDICTION ARE RELATED TO THE
EXCESSIVE USE OF THE INTERNET. *VIRTUAL SELF -THE PERSONA YOU CREATE
ABOUT YOURSELF VIRTUALLY.

CRIMINAL ACTIVITIES
A. HACKING
• UNAUTHORIZED ACCESS OF OR INTERFERENCE WITH COMPUTER SYSTEMS,
SERVERS, OR OTHER INFORMATION AND COMMUNICATION SYSTEMS
• UNAUTHORIZED ACCESS TO CORRUPT, ALTER, STEAL, OR DESTROY ELECTRONIC
DATA USING COMPUTERS OR OTHER INFORMATION AND COMMUNICATION SYSTEMS
WITHOUT THE COMPUTER OR SYSTEM OWNER’S KNOWLEDGE AND CONSENT
• THE INTRODUCTION OF COMPUTER VIRUSES RESULTING IN THE CORRUPTION,
ALTERATION, THEFT, OR LOSS OF SUCH DATA
CYBERCRIMES
B. COMPUTER-RELATED FORGERY, FRAUD AND/OR IDENTITY THEFT
• AN ATTEMPT TO OBTAIN SENSITIVE INFORMATION SUCH AS
USERNAMES, PASSWORDS, AND CREDIT CARD DETAILS AND
(INDIRECTLY MONEY), OFTEN FOR MALICIOUS REASONS.
• PHISHING
• PHARMING
• SPAM
• MAXIMUM OF PHP 200,000 FINE OR PRISON MAYOR
C. ELECTRONIC THEFT
• ILLEGAL DOWNLOADING
• OBTAINING FILES THAT YOU DO NOT HAVE THE RIGHT TO USE
FROM THE INTERNET.
• DIGITAL PIRACY
• PRACTICE OF ILLEGALLY COPYING AND SELLING DIGITAL MUSIC,
VIDEO, COMPUTER SOFTWARE, ETC.
• COPYRIGHT INFRINGEMENT
• PENALTY OF PHP 50,000 – 500, 000 AND OR PRISON MAYOR
D. CYBERBULLYING
• THE USE OF ELECTRONIC COMMUNICATION TO BULLY A
PERSON, TYPICALLY BY SENDING A MESSAGE OF AN
INTIMIDATING OR THREATENING NATURE.
• THE ANTI-BULLYING ACT OF 2013 (RA 10627)
E. CYBERSEX
• WILLFUL ENGAGEMENT, MAINTENANCE, CONTROL, OR
OPERATION, DIRECTLY OR INDIRECTLY OF ANY LASCIVIOUS
EXHIBITION OF SEXUAL ORGANS OR SEXUAL ACTIVITY WITH THE
AID OF A COMPUTER SYSTEM FOR FAVOR OR CONSIDERATION.
• THERE IS A DISCUSSION ON THIS MATTER IF IT INVOLVES
“COUPLES” OR “PEOPLE IN RELATIONSHIP” WHO ENGAGE IN
CYBERSEX.
• PENALTY AT LEAST PHP 200,000 AND OR PRISON MAYOR
CYBERCRIMES

F. CHILD PORNOGRAPHY
• IS A FORM OF CHILD SEXUAL EXPLOITATION.
• UNLAWFUL OR PROHIBITED ACTS DEFINED AND PUNISHABLE
BY REPUBLIC ACT NO. 9775 OR THE ANTICHILD PORNOGRAPHY
ACT OF 2009, COMMITTED THROUGH A COMPUTER SYSTEM.
• PENALTY OF 12-20 YEARS OF IMPRISONMENT OR RECLUSION
TEMPORAL

G. CYBER DEFAMATION
• IS AN UNPRIVILEGED FALSE STATEMENT OF FACT WHICH TENDS
TO HARM THE REPUTATION OF A PERSON OR COMPANY.
• PENALTY OF 6-12 YEARS OF IMPRISONMENT OR PRISON MAYOR.
INTERNET THREATS
● HACKING
HACKING IS A TERM USED TO DESCRIBE ACTIONS TAKEN BY
SOMEONE TO GAIN UNAUTHORIZED ACCESS TO A COMPUTER. THE
AVAILABILITY OF INFORMATION ONLINE ON THE TOOLS,
TECHNIQUES, AND MALWARE MAKES IT EASIER FOR EVEN NON-
TECHNICAL PEOPLE TO UNDERTAKE MALICIOUS ACTIVITIES. THE
PROCESS BY WHICH CYBER CRIMINALS GAIN ACCESS TO YOUR
COMPUTER.
● MALWARE
MALWARE IS ONE OF THE MORE COMMON WAYS TO INFILTRATE OR
DAMAGE YOUR COMPUTER. MALICIOUS SOFTWARE THAT INFECTS
YOUR COMPUTER, SUCH AS COMPUTER VIRUSES, WORMS, TROJAN
HORSES, SPYWARE, AND ADWARE.

● PHARMING
PHARMING IS A COMMON TYPE OF ONLINE FRAUD. A MEANS TO
● PHISHING
PHISHING IS USED MOST OFTEN BY CYBER CRIMINALS BECAUSE IT'S EASY TO
EXECUTE AND CAN PRODUCE THE RESULTS THEY'RE LOOKING FOR WITH VERY
LITTLE EFFORT. FAKE EMAILS, TEXT MESSAGES AND WEBSITES CREATED TO LOOK
LIKE THEY'RE FROM AUTHENTIC COMPANIES. THEY'RE SENT BY CRIMINALS TO STEAL
PERSONAL AND FINANCIAL INFORMATION FROM YOU. THIS IS ALSO KNOWN AS
“SPOOFING”.
● RANSOMWARE
RANSOMWARE IS A TYPE OF MALWARE THAT RESTRICTS ACCESS TO YOUR
COMPUTER OR YOUR FILES AND DISPLAYS A MESSAGE THAT DEMANDS PAYMENT IN
ORDER FOR THE RESTRICTION TO BE REMOVED. THE TWO MOST COMMON MEANS
OF INFECTION APPEAR TO BE PHISHING EMAILS THAT CONTAIN MALICIOUS
ATTACHMENTS AND WEBSITE POP-UP ADVERTISEMENTS.
● SPAM
SPAM IS ONE OF THE MORE COMMON METHODS OF BOTH SENDING INFORMATION
OUT AND COLLECTING IT FROM UNSUSPECTING PEOPLE. THE MASS DISTRIBUTION
OF UNSOLICITED MESSAGES, ADVERTISING OR PORNOGRAPHY TO ADDRESSES
WHICH CAN BE EASILY FOUND ON THE INTERNET THROUGH THINGS LIKE SOCIAL
NETWORKING SITES, COMPANY WEBSITES AND PERSONAL BLOGS.
INTERNET

THREATS
SPYWARE (SPYWARE & ADWARE)
SPYWARE AND ADWARE ARE OFTEN USED BY THIRD PARTIES TO
INFILTRATE YOUR COMPUTER.
WHAT IT IS:
SOFTWARE THAT COLLECTS PERSONAL INFORMATION ABOUT
YOU WITHOUT YOU KNOWING. THEY OFTEN COME IN THE
FORM OF A ‘FREE' DOWNLOAD AND ARE INSTALLED
AUTOMATICALLY WITH OR WITHOUT YOUR CONSENT. THESE
ARE DIFFICULT TO REMOVE AND CAN INFECT YOUR
COMPUTER WITH VIRUSES.
● TROJAN HORSES
A TROJAN HORSE MAY NOT BE A TERM YOU'RE FAMILIAR WITH, BUT
THERE'S A GOOD CHANCE YOU OR SOMEONE YOU KNOW HAS
BEEN AFFECTED BY ONE. A MALICIOUS PROGRAM THAT IS
DISGUISED AS, OR EMBEDDED WITHIN, LEGITIMATE SOFTWARE. IT
IS AN EXECUTABLE FILE THAT WILL INSTALL ITSELF AND RUN
INTERNET
● VIRUSES
THREATS
MOST PEOPLE HAVE HEARD OF COMPUTER VIRUSES, BUT
NOT MANY KNOW EXACTLY WHAT THEY ARE OR WHAT THEY
DO. MALICIOUS COMPUTER PROGRAMS THAT ARE OFTEN
SENT AS AN EMAIL ATTACHMENT OR A DOWNLOAD WITH
THE INTENT OF INFECTING YOUR COMPUTER, AS WELL AS
THE COMPUTERS OF EVERYONE IN YOUR CONTACT LIST. JUST
VISITING A SITE CAN START AN AUTOMATIC DOWNLOAD OF A
VIRUS.

● WI-FI EAVESDROPPING
WIFI EAVESDROPPING IS ANOTHER METHOD USED BY CYBER
CRIMINALS TO CAPTURE PERSONAL INFORMATION. VIRTUAL
“LISTENING IN” ON INFORMATION THAT'S SHARED OVER AN
● WORMS
WORMS ARE A COMMON THREAT TO COMPUTERS AND THE
INTERNET AS A WHOLE. A WORM, UNLIKE A VIRUS, GOES TO
WORK ON ITS OWN WITHOUT ATTACHING ITSELF TO FILES OR
PROGRAMS. IT LIVES IN YOUR COMPUTER MEMORY, DOESN'T
DAMAGE OR ALTER THE HARD DRIVE AND PROPAGATES BY
SENDING ITSELF TO OTHER COMPUTERS IN A NETWORK –
WHETHER WITHIN A COMPANY OR THE INTERNET OTSELF.
THANKS!

You might also like