0% found this document useful (0 votes)
92 views23 pages

2 Rules of Netiquette-Edited

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
92 views23 pages

2 Rules of Netiquette-Edited

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 23

Identify the Following Images

LESSON 2
Rules of Netiquette
• Online security, safety, and ethics
• Internet threats
• Protecting reputations online
• Copyright
At the end of this lesson, the students should be able to:

1. consider one’s and others’ safety when sharing


information using the Internet;

2. consider one’s and others’ reputation when using the


Internet;

3. determine and avoid the dangers of the Internet;

4. be responsible in the use of social networking sites; and

5. browse the Internet efficiently and properly through


proper referencing.
What Is Netiquette ?
It is a word that came from the two words “net” and
“etiquette”. It is an etiquette applied online that
shows proper manner and behavior. If you are a
member of an online society through social media
you are called netizen.
And in interacting with other netizen online, we
need to maintain good behavior which is acceptable
to others in online community.
The Core Rules of Netiquette by Seth T. Ross
1. Remember the human.
You need to remember that you are talking to a real person when you are online.
The internet brings people together who would otherwise never meet.
Remember this saying when sending an email: Would I say this to the person’s face.

2. Adhere to the same standards of behavior online that you follow in real
life.
You need to behave the same way online that you do in real life.
You need to remember that you can get caught doing things you should not be doing online just like you can in real
life.
You are still talking to a real person with feelings even though you can’t see them.

3. Know where you are in cyberspace.


Always take a look around when you enter a new domain when surfing the web.
Get a sense of what the discussion group is about before you join it.

4. Respect other people's time and bandwidth.


Remember people have other things to do besides read your email. You are not the center of their world.
Keep your post and emails to minimum by saying what you want to say.
Remember everyone won’t answer your questions.

5. Make yourself look good online.


Be polite and pleasant to everyone.
Always check your spelling and grammar before posting.
Know what you are talking about and make sense saying it.
6. Share expert knowledge.
Ask questions online
Share what you know online.
Post the answers to your questions online because someone may have the same question you do.

7. Help keep flame wars under control.


Netiquette does not forgive flaming.
Netiquette does however forbid people who are flaming to hurt discussion groups by putting the group down.

8. Respect other people's privacy.


Do not read other people’s mail without their permission.
Going through other people’s things could cost you, your job or you could even go to jail.
Not respecting other people’s privacy is a bad netiquette.

9. Don't abuse your power.


Do not take advantage of other people just because you have more knowledge or power than them.
Treat others as you would want them to treat you if the roles were reversed.
10. Be forgiving of other people's mistakes.
Do not point out mistakes to people online.
Remember that you were once the new kid on the block.
You still need to have a good manners even though you are online and cannot see the person face to
face.
Online Safety and Security
The Internet, truly, is a powerful tool. It
can be used to promote your business,
gain new friends, and stay in touch with
the old ones. It is also a source of
entertainment. But like most things in this
world, there is always “another side of
the coin.” The Internet is one of the most
dangerous places, especially if you do
not know what you are doing.
Tips to Stay Safe Online
1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how the website
handles the information you share.
4. Know the security features of the social networking site you use. By keeping
your profile private, search engines will not be able to scan your profile.
5. Do not share your password with anyone.
6. Avoid logging in to public network/Wi-Fi. Browsing in “incognito (or private)
mode,” a feature of the browser, will not protect you from hackers.
7. Do not talk to strangers whether online or face-to-face.
Tips to Stay Safe Online
8. Never post anything about a future vacation. It is similar to posting, “Rob
my house at this date.”
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your computer. Use only an
Internet Risk:
Cyber Bullying - It happens when someone intentionally abused, harass, and
mistreated by other person using electronic communication

Identity Theft - It is a crime of stealing personal information for the purpose


of assuming that person’s name or identity to
make any form of transactions.

Cyber Stalking - A criminal practice where electronic communication is used


to stalk or harass individual or group.

Sexting - The act of sending sexually explicit text messages, images, and
videos.

Online threat is deemed any malicious act that attempts to gain


access to a computer network without authorization or permission from
the owners. These are usually done by computer hackers who use the
World Wide Web to facilitate cybercrime.
The following are the top kinds of online threats that you should be
aware of:
Phishing - Phishing is a cybercrime in which a target or targets are
contacted by email, telephone or text message by someone posing as a
legitimate institution to lure individuals into providing sensitive data such
as personally identifiable information, banking and credit card details,
and passwords.
Pharming - Pharming is a type of cyberattack involving the redirection
of web traffic from a legitimate site to a fake site for the purpose of
stealing usernames, passwords, financial data, and other personal
information.
Online Scam - Internet scams are different methodologies of Fraud, facilitated by cybercriminals
on the Internet. Scams can happen in a myriad of ways- via phishing emails, social media, SMS
messages on your mobile phone, fake tech support phone calls, scareware and more. The main
purpose of these types of scams can range from credit card theft, capturing user login and password
credentials and even identity theft.
Internet Robots- are also known as spiders, crawlers, and web
bots. It is a software application that is programmed to do certain
tasks. Bots are automated, which means they run according to their
instructions without a human user.
Malware or malicious software, is any program or file that is harmful to a
computer user.
Adware (advertising supported software) is unwanted software designed to
throw advertisements up on your screen. Example, pop-up ads and banner ads.
Spyware is malware that secretly observes the computer user’s activities
without permission and reports it to the software’s author. Example is a
keylogger.
Virus and Worms are malwares that attach to another program and, when
executed—unintentionally by the user—replicates itself by modifying other
computer programs and infecting them with its own bits of code
Trojan, or Trojan horse, is one of the most dangerous malware types. It usually
represents itself as something useful in order to trick you. Once it’s on your system,
the attackers behind the Trojan gain unauthorized access to the affected computer

Top 5 Actions of Trojan Horse Virus


These actions can include:

• Blocking data
• Deleting data
• Copying data
• Modifying data
• Disrupting the performance of computer networks or computers
.
Ransomware is a form of malware that locks you out of your device and/or
encrypts your files, then forces you to pay a ransom to get them back.
Think Before You Click
1. Before you post something on the web, ask these questions
to yourself: Would you want your parents or grandparents to see
it? Would you want your future boss to see it? Once you post
something on the web, you have no control of who sees your
posts.
2. Your friends depend on you to protect their reputation online.
Talk to your friends about this serious responsibility.
3. Set your post to “private.” In this way, search engines will
not be able to scan that post.
4. Avoid using names. Names are easy for search engines to
scan.
5. If you feel that a post can affect you or other’s reputation, ask
the one who posted it to pull it down or report it as
inappropriate.
COPYRIGHT INFRINGEMENT

If you create something—an


idea, an invention, a form of
literary work, or a research, you
have the right of how it should
be used by others. This is called
intellectual property.

You might also like