0% found this document useful (0 votes)
695 views

Rules of Netiquette

The document discusses rules of netiquette including online safety, security, protecting one's reputation, copyright infringement, and contextualized online search and research skills. It provides tips for staying safe online, common internet threats, and how to avoid copyright infringement.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
695 views

Rules of Netiquette

The document discusses rules of netiquette including online safety, security, protecting one's reputation, copyright infringement, and contextualized online search and research skills. It provides tips for staying safe online, common internet threats, and how to avoid copyright infringement.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

RULES OF NETIQUETTE

"Netiquette" is network etiquette, the


do's and don'ts of online
communication.
Netiquette covers both common
courtesy online and the informal "rules
of the road" of cyberspace.
RULES OF NETIQUETTE

Online security, safety, and ethics


Internet threats
Protecting reputations online
Copyright
Contextualized online search and research
skills
 Online Safety and Security
The Internet, truly, is a powerful tool. It can be used to
promote your business, gain new friends, and stay in touch
with the old ones. It is also a source of entertainment
through games, online communities, and everything in
between. But like most things in this world, there is always
the “other side of the coin.” The Internet is one of the most
dangerous places, especially if you do not know what you
are doing with it. But there is no need to worry; it is never
that late. Hopefully, by the end of this lesson, you are able
to consider how you go about your use of the Internet.
Online Safety and Security

The Internet is defined as the Information


superhighway. This means that anyone has access to this
highway, can place information, and grab that information.
Any information, even things that you have set privately,
can be accessed one way or another. The threat of
cybercrime is very real. While you may not experience the
threat now, whatever information we share today could
affect our future.
Tips to Stay Safe Online
The Internet is a public place and it is up to you to protect
yourself. Here are some tips to help you stay safe when using the
Internet.
1. Be mindful of what you share online and what site you share it
to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how the
website handles the information you share.
4. Know the security features of the social networking site you
use. By keeping your profile private, search engines will not be
able to scan your profile.
5. Do not share your password with anyone.
6. Avoid logging in to public networks/WiFi. Browsing in “incognito (or
private) mode”, a feature of the browser, will not protect you from
hackers.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about a future vacation. It is similar to posting, “Rob
my house at this date.”
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update anti-virus software on your computer. Use only one
antivirus software to avoid conflicts.
12. If you have a Wi-Fi at home, make it a private network by adding a
password.
13. Avoid downloading anything from untrusted websites. You are most
vulnerable in peer-to-peer downloads (torrents) as the download is most
likely not monitored by the site owner.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails.
 Internet Threats
Here are some of the threats you should be aware of
when using the Internet:
1.Malware- stands for malicious software
a. Virus – a malicious program designed to replicate itself
and transfer from one computer to another either
through the Internet and local networks or data storage
like flash drives and CDs.
b. Worm – a malicious program that transfers from one
computer to another by type of means. Often, it uses a
computer network to spread itself. For example, the
ILOVEYOU worm (Love Bug Worm) created by a Filipino.
c. Trojan – a malicious program that is disguised as a useful program
but once downloaded or installed, leaves your PC unprotected and
allows hackers to get your information.
*Rogue Security Software – tricks the user into posing that it is a
security software. It asks the user to pay to improve his/her
security but in reality, they are not protected at all.
d. Spyware – a program that runs in the background without you
knowing it (thus called “spy”). It has the ability to monitor what
you are currently doing and typing through keylogging.
*Keyloggers – used to record the keystroke done by the users. This
is done to steal their password or any other sensitive information.
It can record email, messages, or any information you type using
your keyboard.
e. Adware – a program designed to send you advertisements,
mostly as pop-ups.
2. Spam – unwanted email mostly from bots or advertisers. It
can be used to send malware.
3. Phishing – its goal is to acquire sensitive personal information like passwords and credit card
details. This is done by sending you an email that will direct the user to a visit a website and be
asked to update his/her username, password, credit card, or personal information.
a. *Pharming – a more complicated way of phishing where it exploits the DNS (Domain Name
Service) system.
 Protecting Reputations Online

In the past, doing something embarrassing was not much


of a big deal. It happened; people would laugh at it, and they
would move on. Nowadays, embarrassing moments are captured
using any device you could imagine. What is worse is that people
can easily upload it to the internet, where it can be stored
forever. This could impact not only your reputation but also the
people around you. What is worse is that people tend to ignore
this fact, and suffer from it later in their life.
Protecting Reputations Online
Once you post something over the Internet, search
engines keep them in their archives for search results. This
makes anything you post to last forever even if you delete it in
your page. Something you and your friends find funny today may
be something that could harm someone’s reputation later.
Before hiring, companies do a background check on the
applicant, and the easiest way to check your background is to
visit pages that are related to you. Thus, if they find disreputable
information about you, it may harm your reputation even if this
information has been discarded.
Think Before You Click
Here are things you might want to consider before posting
something over the Internet:

1.Before you post something on the web, ask these questions


to yourself:
a. Would you want your parents or grandparents to see it?
b. Would you want your future boss to see it?
c. Once you post something on the web, you have no
control of who sees your posts.
Think Before You Click

2. Your friends depend on you to protect their reputation


online. Talk to your friends about this serious responsibility.
3. Set your post to “private”. In this way, search engines will not
be able to scan that post.
4. Avoid using names. Names are easy for search engines to
scan.
5. If you feel that a post can affect you or other’s reputation,
ask the one who posted it to pull it down or report it as
inappropriate.
 Copyright Infringement

If you create something – an idea, an invention, a form of


literary work, or a research, you have the right as to how it
should be used by others. This is called intellectual property. In
other words, the copyright law includes your rights over your
work, and anyone who uses it without your consent is
punishable by law. Try grabbing any book then browse its first
few pages and you will find a page with a disclaimer with the
words: “No part of this book may be copied, reproduced…” That
is a copyright page.
Copyright Infringement

As a responsible user of the Internet, you have to


consider that not everything out there is free for you to use. Just
like your own, contents that you see from websites have their
respective copyrights. There are several instances where
employees or business owners face copyright infringement and
are sentenced to a huge fine due to reckless copying of
materials.
Copyright Infringement
Here are some tips that could help you avoid copyright
infringement:
1.Understand. Copyright protects literary works, photographs,
paintings, drawings, films, music (lyrics), choreography, and
sculptures, but it generally does NOT protect underlying ideas
and facts. This means that you can express something using your
own words, but you should give credit to the source.
2.Be responsible. Even if a material does not say that it is
copyrighted, it is not a valid defense against copyright. Be
responsible enough to know if something has a copyright.
3. Be creative. Ask yourself whether what you are making is
something that came from you or something made from
somebody else’s creativity. It is important to add your own
creative genius in everything that will be credited to you.
4. Know the Law. There are some limitations to copyright laws.
For instance in the Philippines, copyrights only last a lifetime
(of the author) plus 50 years. There are also provisions for
“fair use” which means that an intellectual property may be
used without consent as long as it is used in commentaries,
criticisms, search engines, parodies, news reports, research,
library archiving, teaching, and education. If you have doubts
that what you are doing does not fall under the policy of fair
use, seek permission first.
 Online Research
Have you ever searched the internet for certain
information where the search engine returned a different result?
For example, if you were to search for “The Madonna” as the
representation of Mary in the form of an art, you would probably
use the keyword “Madonna” to search for it on the net. But if
you use the same keyword nowadays, you are more likely to
stumble upon “Madonna” the music artist instead. And if you
used “The Madonna” to search for “The Madonna” in the first
place, you will directed in the right place.
Online Research
The information that we need is more likely already in
the internet. It is just a matter of how to look for it and how to
use information from the most credible source. Here are some
tips in conducting online research:
1.Have a question in mind. Focus on a question you want
answered.
2. Narrow it down. Search engines like Google, Bing, or Yahoo
use several filters to determine the most appropriate result for
you. These search engines use your previous search history and
your geographical location, and send you the result which is the
most related to you.
3. Advances Search. The best way to filter information you get
from search engines is by using the advanced search. This
will allow you to filter out information you do not need.
4. Look for a credible source. Some wikis, though filled with
updated information, are not credible source. This is due to
fact that anyone can edit its content. When using wikis,
check out the link of the cited text to be navigated to the
footnote where the list of source is located.
5. Give credit. If you are going to use the information from a
source for educational purposes give credit to the original
author of the page or information. To properly cite a
reference, you may use the format below:

Name of the person or organization (the author of the information).


Title of the home page in italics (title is shown in title bar but is
sometimes missing or unrelated). URL. Date last seen.

Example:

Lapis, Adrian Harold L. “Oleander’s Fun Facts about Bananas.”


http://oleander.penz.com/random/bananalove.htm. Viewed on April
13, 2015

You might also like