0% found this document useful (0 votes)
66 views

Chapter 2 Rules of Netiquette

The document provides 10 rules of netiquette for safely and responsibly using the internet and social media: 1. Consider others' safety and reputation when sharing information online. 2. Adhere to the same standards online as in real life and remember you are talking to real people. 3. Know where you are in cyber space and get a sense of online discussion groups before joining. 4. Respect others' time and bandwidth by keeping posts and emails concise. 5. Make a good impression by being polite, checking spelling and grammar, and knowing your topic. 6. Share expert knowledge by asking questions and posting answers that may help others. 7. Help control flame wars by not

Uploaded by

Jerelyn Dumaual
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views

Chapter 2 Rules of Netiquette

The document provides 10 rules of netiquette for safely and responsibly using the internet and social media: 1. Consider others' safety and reputation when sharing information online. 2. Adhere to the same standards online as in real life and remember you are talking to real people. 3. Know where you are in cyber space and get a sense of online discussion groups before joining. 4. Respect others' time and bandwidth by keeping posts and emails concise. 5. Make a good impression by being polite, checking spelling and grammar, and knowing your topic. 6. Share expert knowledge by asking questions and posting answers that may help others. 7. Help control flame wars by not

Uploaded by

Jerelyn Dumaual
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

MODULE EMPOWERMENT

TECHNOLOGY
CHAPTER2:
RULESOFNETI
QUETTE

OBJECTI
VES:

A.Consi
derone’sandothers’saf
etywhenshar i
nginf
ormationusingtheInt
ernet
.
B.Consi
derone’sandotherreputat
ionwhenusi ngtheinter
net.
C.Deter
mineandav oidt
hedanger softheInternet
.
D.Beresponsi
blei
nt heuseofsocialnetworkingsit
es.
E.Br
owset hei
nternetef
fi
cientl
yandproperlythroughproperref
erencing

I
NTERNETSAFETY-itr
efer
stotheonl
inesecur
it
yorsaf
etyofpeopl
eandthei
rinf
ormat
ionwhen
usi
nginter
net
.
NETIQUETTE-i
snet
worketi
quet
te,
thedo’
sanddon’t
sofonli
necommunicati
on.

TENRULESOFNETI
QUETTERul
e

No.1:
Remembert
hehuman
MODULE EMPOWERMENT
TECHNOLOGY
Youneedtoremembert hatyouaretal
ki
ngt
oar ealper
sonwheny ouareonli
ne.
Thei
nter
netbringspeopletoget
herwhowoul
dot her
wisenevermeet.
Rememberthissayi
ngwhensendi nganemai
l:
Woul dIsaythi
stotheperson’
sface.

Rul
eNo.2:
Adher
etot
hesamest
andar
dsonl
i
net
haty
ouf
oll
owi
nreal
li
fe.

Youneedtobehavet
hesamewayonl i
nethatyoudoinr
eall
if
e.
Youneedtoremembert
haty oucangetcaughtdoi
ngthi
ngsyoushoul
dnotbedoi
ng
onl
inej
ustli
keyoucani
nrealli
fe.
Youaresti
l
ltal
ki
ngt
oar ealpersonwit
hfeeli
ngsevent
houghyoucan’
tseet
hem.

Rul
eno.3:
Knowwher
eyouar
eincy
ber
space.

Al
waystakealookar
oundwheny ouenteranewdomai nwhensurf
ingt
heweb.
Getasenseofwhatt
hediscussi
ongroupisaboutbef
oreyoujoi
nit
.

Rul
eno.4:
Respectot
herpeopl
e’
sti
meandbandwi
dth.

Rememberpeoplehaveotherthi
ngstodobesidesr
eadyouremail
.Youar
enott
he
cent
eroft
heirworld.
Keepyourpostandemail
st ominimum bysayi
ngwhatyouwanttosay.
Rememberev ery
onewon’tansweryourquest
ions.

Rul
eno.5:
Makey
our
sel
flookgoodonl
i
ne.

Bepoli
teandpl
easantt
oevery
one.
Alway
scheckyourspel
li
ngandgrammarbef
orepost
ing.
· Knowwhatyouaretal
ki
ngaboutandmakesensesay
ingit
.

Rul
eno.6:
Shar
eexper
tknowl
edge

Askquesti
onsonli
ne
Shar
ewhaty ouknowonl
ine.
Posttheanswerst
oyourquest
ionsonl
i
nebecausesomeonemayhav
ethesame
quest
ion youdo.

Rul
eno.7:
Hel
pkeepf
lamewar
sundercont
rol

Neti
quett
edoesnotf or
givef
lami
ng.
Neti
quettedoeshoweverf
orbi
dpeopl
ewhoar
efl
ami
ngt
ohur
tdi
scussi
ongr
oupsby
put
ti
ngt hegroupdown.

Rul
eno.8:
Respectot
herpeopl
e’
spr
ivacy
.

Donotr
eadot
herpeopl
e’
smai
lwi
thoutt
hei
rper
missi
on.
1|Pag
e
MODULE EMPOWERMENT
TECHNOLOGY
Goi
ngthr
oughotherpeopl
e’
sthi
ngscouldcosty
ou, yourj
obory
oucoul
dev
engot
ojai
l
.
Notr
espect
ingot
herpeopl
e’spr
ivacyi
sabadnetiquette.

Rul
eno.9:
Don’
tabusey
ourpower
.

Donottakeadv
ant
ageofot
herpeopl
ejustbecauseyouhav
emoreknowledgeorpower
t
hanthem.
Treatot
her
sasyouwoul
dwantthem t
otreatyouift
herol
eswer
erev
ersed.

Rul
eno.10:
Bef
orgi
vi
ngofot
herpeopl
e’
smi
stake.

Donotpointoutmistakest
opeopl
eonli
ne.
Remembert hatyouwereoncet
henewkidonthebl
ock.
Yousti
ll
needt ohaveagoodmannersevent
houghyouar
eonl
i
neandcannotseet
he
personf
acetof ace.

TI
PTOSTAYSAFEONLI
NE

Thei
nterneti
sapubli
cplaceanditi
supt
oyout
opr
otecty
our
sel
f.Her
ear
esomet
ipst
ohel
pyou
st
aysafewhenusingtheInt
ernet
.

1.Bemi ndful ofwhaty oushar eonl ineandwhatsi tey oushareitto.


2.Donotj ustacceptt er msandcondi t
ions; readit.
3.Checkoutt hepr i
vacypol i
cypageofawebsi tet olearnhow t hewebsitehandlest he
i
nformat iony oushar e.
4.Knowt hesecur i
tyf eat uresoft hesoci alnetwor kingsi t
ey ouuse.Bykeepingyourprof
il
epr i
vate,
searchengi neswi llnotbeabl etoscany ourprof il
e.
5.Donotshar ey ourpasswor dwi thany one.
6.Av oidloggingi nt opubl icnetwor ks/Wi -Fi.Browsi ngi n“i
ncogni t
o(orpri
vat
e)mode,”afeature
ofthebr owser ,wi l
l notpr otecty ouf rom hacker s.
7.Donott alkt ost ranger swhet heronl ineorf ace-to-face.
8.Nev erpostany thingaboutaf utur ev acation.Itissi milartoposting,
“Robmyhouseatt hisdate.”
9.Addf r
iendsy ouknowi nr eallif
e.
10.Av oi
dv i
sit
ingunt r
ust edwebsi tes.
11.Instal
l andupdat eanant i
virussof twar eony ourcomput er.Useonlyoneanti
-vi
russoft
war eto
avoidconf li
ct .
12.Ifyouhav eaWi -Fiathome, makei tapr ivatenet wor kbyaddi ngapassword.
13.Av oi
ddownl oadi ngany thingf rom unt rustedwebsi tes.
14.Buyt hesof t war e;donotusepi rat edones.
15.Donotr eplyorcl ickl inksf r
om suspi ciousemai ls.

2|Pag
e
MODULE EMPOWERMENT
TECHNOLOGY
Mostpeoplewoulddisputethattherei
snosucht hi
ngasprivateovertheinter
netandtheymaybe
ri
ght.Ther
earehackerswhocanf i
ndabackdoorev eri
fyourpr
of i
leisal
readysettoprivat
e.Youhave
nocontrolofwhoeverislookingaty ourf
ri
end’
sscreenwhenev ertheyopeny ourprof
il
eorchatwi t
h
you.Youhavenocont r
olov erpeopl
eget t
ingaccesstoyourfr
iend’saccountandseeingy ourpr
ivat
e
stuf
f.

I
NTERNETTHREATS

Her
ear
esomeoft
het
hreat
syoushoul
dbeawar
eofwhenusi
ngt
heI
nter
net
:

1.Mal
war
e-st andsf ormal i
ci oussof t
war e.
a.Virus -amal ici
ouspr ogram desi gnedt orepl i
cateitselfandt r
ansferf r
om one
comput ert o anot herei thert hrough t heint ernetand l ocalnet worksordat e
storagel ikeflashdr i
vesandCDs.
b.Wor m –amal i
ciouspr ogram thatt ransferfrom onecomput ertoanot herbyany
typeofmeans.Of ten,itusesacomput ernet wor ktospr eaditsel
f.Forex ample,
theI LOVEYOUwor m( Lov eBugWor m)cr eat
edbyaFi li
pino.
c.Trojan– amal i
ciouspr ogram t hatdi sgui
sedasausef ulpr ogram butonce
downl oadedori nst al
led,leavesy ourPCunpr otectedandal l
ow hacker stoget
youri nformat i
on.
d.Spy war e–apr ogram t hanr unsi nt hebackgr oundwi thoutyouknowi ngit(t
hus
called“ spy”).Itasksusert opayt oi mprovedhi s/hersecurit
ybuti nrealit
y,t
hey
arenotpr otectedatal l
.

*Keyl
ogger
s– usedt orecorddonebyt heuser
s.Thisisdonetostealthei
r
passwordoranyothersensi
ti
veinf
ormation.I
tcanrecor
demail
,messages,or
anyinf
ormati
onyoutypeusi
ngyourkeyboard.

2.Spam –unwant
edemai
lmost
lyf
orm bot
soradv
ert
iser
s.I
tcanusedt
osendmal
war
e.

3.Phi
shing–itsgoali
stoacqui
resensi
ti
vepersonali
nfor
mationli
kepasswordsandcr
edi
t
car
ddetai
ls.Thi
sisdonebysendi
ngyouanemai l
t hatwi
l
ldir
ectusertovi
sitawesit
e.

PROTECI
NGREPUTATI
ONSONLI
NE

Int
hepast,doingsomethi
ngembar rassi
ngwasnotmuchofabi gdeal
.Ithappened;people
wouldl
aughati
t,andtheywouldmoveon.Nowaday s,embarrassingmoment sarecaptur
edusingany
devi
ceyoucoul
di magine.Whati
swor seisthatpeoplecaneasi lyupl
oadittotheinter
net,whereit
canbestoredfor
ever.Thiscoul
dimpactnotonl yyourreputati
onbutal sothepeoplearoundy ou.
Whatisworsei
sthatpeoplet
endtoignor
ethisfact,
andsufferfrom itl
ateri
nthei
rli
fe.

Oncey oupostsomet hingoverthei nt


ernet
,Searchengineskeepthem inthei
rar
chivesfor
searchr esul
ts.Thi
smakesany thi
ngy oupostt olastforev
erev enofyoudeleteitinyourpage.
Somet hing,youandy ourfri
endsf i
ndf unnytodaymaybesomet hi
ngthatcouldharm someone
reputati
onlat
er.Bef
orehir
ing,companiesdoabackgr oundcheckontheappli
cat
ion,
andtheeasiest

3|Pag
e
MODULE EMPOWERMENT
TECHNOLOGY
waytocheckyourbackgroundi
stov
isi
tpagesthatar
erelatedt
oy ou.Thus,
ift
heyfi
nddisreput
abl
e
i
nfor
mationaboutyou,i
tmayharmyourreput
ati
onevenifthisi
nformati
onhasbeendiscar
ded.

THI
NKBEFOREYOUCLI
CK

Her
ear
ethi
ngsy
oumi
ghtwantt
oconsi
derbef
orepost
ingsomet
hingov
ert
heI
nter
net
:

1.Beforeyoupostsomet hingont heweb, askthesequest ionstoyoursel


f:Wouldy ouwant
yourparentsorgrandpar entstoseei t
?Woul dy ouwanty ourfut
urebosstoseei t?Once
youpostsomet hingont heweb, youhav enocont rolofwhoseesy ourposts.
2.Yourfri
endsdependony outoprot ectthei
rreput ati
ononl i
ne.Tal
ktoy ourfr
iendsabout
thi
sseriousresponsibil
ity.
3.Setyoupostt o“Pri
vate.”Inthi
sway ,searchengineswi l
lnotbeabletoscanthatpost.
4.Ifyoufeelthatapostcanaf fecty ouorot her’
sr eputati
on,asktheonewhopost edi
fto
pulli
tdownorr eportisasi nappropr i
ate.
5.Avoidusingnames.Namesar eeasyt osearchengi nestoscan.

COPYRI
GHTI
NFRI
NGEMENT

I
fyoucreatesomet hingani dea,aninvent
ion,aform ofl i
teracywork,oraresear ch,y
ouhav e
theri
ghtastohowi tshouldbeusedbyot hers.Thisiscaledi
l ntel
lectualpropert
y.Inotherwor ds,the
copyr
ightlaw i
ncludesy ourright
sov eryourwor k,andany onewhousesi twit
houty ourconsenti s
puni
shablebylaw.Tr ygrabbinganybookt henbrowsei t
sfirstf
ewpagesandy ouwillf
indapagewi th
adisclai
merwi t
ht hewor ds:“ Nopartoft hi
sbookmaybecopi ed,repr
oduced…”Thati scopy r
ight
page.

Asaresponsibl
euseroftheInter
net,youhavetoconsi
derthatnoteveryt
hingoutthereisfree
foryoutouse.Justl i
key ourown,contentsthatyouseef r
om thewebsiteshav etheirr
espective
copyri
ghts.There are sever
alinst
ances where employees orbusiness ownersf ace copyr
ight
i
nfri
ngementandar esentencedt
oahugef ineduetoreckl
esscopyi
ngofmat eri
als.

Her
ear
esomet
ipst
hatcoul
dhel
pyouav
oidcopy
righti
nfr
ingement
:

1.Understand.Copy ri
ghtpr otect sl i
terar
ywor ks,phot ographs,painti
ng,dr awi ngs,f i
lms,musi c
(andlyr
ics),butgener allydoesNOTpr otectunder ly
ingi deasandf act s.Thi smeanst haty ou
canexpresssomet hingusi ngy ourownwor ds,butyoushoul dgiv ecredittot hesour ce.
2.BeResponsi ble.Ev enifamat eri
aldoesnotsayt hatiscopy ri
ghted,i tisnotav ali
ddef ense
agai
nstcopy ri
ght .Beresponsi bleenought oknowi fsomet hinghasacopy r
ight.
3.BeCreati
ve.Asky ourselfwhet herwhatar ey ouaremaki ngissomet hingt hatcamef rom y ouor
somethingmadef rom somebodyel se’scr eati
vi
ty.Itisi mportantt oaddy ourowncr eativ
e
geni
usinev erythingthatwi llbecr edit
edt oy ou.
4.Know thelaw.Ther earesomel i
mi t
ationst ocopy ri
ghtl aws.Forinst ancesi nt hePhi l
i
ppi nes,
copyr
ightsonlyl astal i
fetime( oft heaut hor)plus50y ears.Therear ealsopr ovisi
onsf or“ f
air
use”whichmeanst hatani ntellectualproper t
ymaybeusedwi thoutaconsentasl ongasi ti
s
usedincomment ari
es,crit
icisms, searchengi nes,parodies,newr eports,resear ch,l
ibrar
y

4|Pag
e
MODULE EMPOWERMENT
TECHNOLOGY
archi
vi
ng,t
eachi
ng,andeducat
ion.Ify
ouhavedoubt
sthatwhaty
ouar
edoi
ngdoesnotf
all
underpol
i
cyoffai
ruse,seekpermissi
onf
ir
st.

Anot
hermi sconcept
ionisthatfan-
fict
ioni
snotcopy
righti
nfr
ingement
.Inr
eal
i
ty,
iti
sandsome
copy
rightholder
signorethem buttheycanoptt
ouset hei
rri
ghts.

ONLI
NERESEARCH

Hav eyoueversear
cht heint
ernetforcert
aininformati
onwherethesearchengi neret
urneda
di
ffer
entresul
t?Forexample,i
fyouwer etosearchfor“ TheMadonna”astherepr
esent at
ionofMar y
i
nt hefor
m ofanar t
,youwoul dprobabl
yuset hekey word“Madonna”,t
hearti
stinstead.Andify ou
used“TheMadonna”t osearchfor“TheMadonna”i nt hefir
stpl
ace,youwil
lbedirectedinther i
ght
pl
ace.

Her
ear
esomet
ipsi
nconduct
ingonl
i
ner
esear
ch:

1. Hav eaquest ioni nmi nd.Focusonaquest iony ouwantt oanswer ed.I fitisaser iesof
quest i
ons, startwi t
hone.Nev ersear chev erythingononego.
2.Nar rowi tdown.Sear chengi nesl i
keGoogl e,Bing, orYahoousesev eralfil
terstodet er minet he
mostappr opr iater esul tf ory ou.Thesesear chengi nesusey ourpr evioussear chhi st oryand
yourgeogr aphi call ocat i
on,andsendy out her esultwhi chist hemostr elatedtoy ou.Tr yt o
sear ch“ Weat her”andmostsear chengi neswoul dr eturntheweat hercondi ti
onsofwher ey ou
are.Buti fal loft hesef iltersf ail
,youshoul dr emembert onarrowdownwhaty ouar esear ching
for.
3.Adv anceSear ch.Thebestwayt of i
lt
eri nfor mationy ougetf r
om sear chengi nes.Isbyusi ngt he
adv ancedsear ch.Thi swi ll al
lowy out of ilt
erouti nformat i
ony oudonotneed.
4. Lookf oracr edi blesour ce.Somewi kis,t houghf i
ll
edwi thupdat edi nformation,ar enota
credi bl
esour ce.Thi sisduet ot hef actt hatany onecanedi ti t
scont ent.Whenusi ngwi kis,
checkoutt hel inkoft heci t
edt ext( i
ndi cat edbysuper scri
ptnumber )tobenav i
gat edt ot he
foot notewher et hel istofsour cesisl ocat ed.Cl i
ckt hesour ceoft hei nformat i
onandseei fi t
credi bl
e.Themor ecr edi blesour cear esci entifi
c,j ournal
s,est ablishednewsandmagazi ne
websi t
es,onl i
ne ency clopedi a,and schol arl
y dat abases.Anot hert i
pt ov ali
dat ei ft he
informat ion i scor recti st o hav emul tiplessour cesofi nf or
mat i
on.Hav ing two ormor e
websi t
eswi ll
y ouwhet hert heinformat i
oni sr el
iableornot .
5.Givecr edit.Ify ouar egoi ngt ouset hei nf ormat i
onf rom asour cef oreducat ionalpurposes, give
credi ttotheor iginal authoroft hepageofi nformat ion.

Pl
easecli
ckthelinkbelowfortheCour
seOv
erv
iew:
Over
view:htt
ps:
//yout
u.be/80uRE972uQ0
KhanAcademy :
https:
//youtu.
be/5k24We8pED8
5|Pag
e
MODULE EMPOWERMENT
TECHNOLOGY

ht
tps:
//i
ctcom444251764.
wordpress.
com/ 2018/
03/
31/
empower
ment
-
t
echnol
ogies-l
essons-1-
15/

6|
Page

You might also like