0% found this document useful (0 votes)
7 views

Rules of Netiquette

Uploaded by

orangeshibuya99
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Rules of Netiquette

Uploaded by

orangeshibuya99
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

RULES of

Netiquette
At the end of this lesson, the students should be able
to:
1. Consider one’s and other’s safety when sharing
information using the Internet;
2. Consider one’s and other’s reputation when using
the internet;
3. Determine and avoid the dangers of the Internet;
4. Be responsible in the use of social networking
sites; and
5. Browse the internet efficiently and properly
through proper referencing.

2
REPUBLIC ACT NO. 10175
Cybercrime Prevention Act of
2012

- is a law in the Philippines approved


on September 12, 2012, which aims
to address legal issues concerning
online interactions and the Internet.
Abbreviation of Internet etiquette or network
etiquette, guidelines for courteous
communication in the online environment. It
includes proper manners for sending e-mail,
conversing online, and so on. Much like
traditional etiquette, which provides rules of
conduct in social situations, the purpose of
netiquette is to help construct and maintain a
pleasant, comfortable, and efficient
environment for online communication, as well
as to avoid placing strain on the system and
generating conflict among users.
A legal device that gives the creator of a
literary, artistic, musical, or other creative
work the sole right to publish and sell that
work. Copyright owners have the right to
control the reproduction of their work,
including the right to receive payment for that
reproduction. An author may grant or sell
those rights to others, including publishers or
recording companies. Violation of a copyright
is called infringement.
An act or instance of using or closely
imitating the language and thoughts of
another author without authorization; the
representation of that author’s work as
one’s own, as by not crediting the
original.
If you are going to use the information from a source for
educational purposes, give credit to the original author of the
page or information. To properly cite a reference, you may use
the format below:

Name of the person or organization (the author of the information). Title of


the home page in italics (title is shown in title bar but is sometimes missing
or unrelated).URL.Date last seen.

Example:

Lapiz, Adrian Harold L. “Oleander’s Fun Facts about Bananas.”


http://oleander.penz.com/random/bananalove.htm. Viewed on September
7,2015.
It is a social issue referring to the
differing amount of information
between those who have access
to the Internet (specially
broadband access) and those
who do not have access.
The excessive use of computers to
the extent that it interferes with daily
life. This excessive use may, for
example, interfere with work or
sleep, result in problems with social
interaction, or affect mood,
relationships, and thought
processes.
Cyberbullying is bullying that takes place
over digital devices like cell phones,
computers, and tablets. Cyberbullying can
occur through SMS, Text, and apps, or
online in social media, forums, or gaming
where people can view, participate in, or
share content. Cyberbullying includes
sending, posting, or sharing negative,
harmful, false, or mean content about
someone else.
Identity theft is the crime of
obtaining the personal or financial
information of another person for the
sole purpose of assuming that
person's name or identity to make
transactions or purchases. Identity
theft is committed in many different
ways.
1. Malware
2. Spam
3. Phishing
1. Malware - stands for malicious software.
a. Virus- a malicious program designed to
replicate itself and transfer from one computer to
another.
b. Worm- a malicious program that transfers from
one computer to another by any type of means.
c. Trojan- a malicious program that is disguised as
a useful program but once downloaded or installed,
leaves your PC unprotected and allows hackers to get
your information
1. Malware - stands for malicious software.
*Rogue security software- it asks the user to
pay to improve his/her security but in reality,
they are not protected at all.
d. Spyware- It has the ability to monitor what you are
currently doing and typing through keylogging.
*Keyloggers- used to record the keystroke
done by the users.
e. Adware- a program designed to send you
advertisements.
2. Spam- unwanted email and it can be used to send
malware
3. Phishing- Its goal is to acquire sensitive personal
information.
*pharming- it is a more complicated way of
phishing where it exploit the DNS (Domain
Name Service) system.
2. Online Safety and Security
Type of Information Risks
A hacker may already know a plenty
1. First Name stuff about you, even if you only give
out your first name.

You will be vulnerable to being


2. Last Name searched for using search engines,
which include image search.

Sharing your middle name only might


3. Middle Name not be too risky, but sharing your whole
name would be.

They can use this information for


4. Current and Previous School/s
verification purposes.
2. Online Safety and Security
Type of Information Risks

Your cellphone number should


5. Your Cellphone Number
NEVER be posted over the internet.

6. The Name of your Mother and Risky, but not as risky posting their
Father full names.

Strangers may pretend or use their


7. The Name of your Siblings
identity to dupe you.

It would be easier for criminals to find


8. Your Address
you.
2. Online Safety and Security

Type of Information Risks


Scams will use this to deceive
9. Your Home Phone Number you, pretending to be your
parents or you.
Posting your birthday will make
10. Your Birthday
you vulnerable to identity theft.
to stay safe online

WHAT ARE THESE?


“ 1.

2.
Be mindful of what you share online and what
site you share it to.
Do not just accept terms and condition; read
it.
3. Check out the privacy policy page of a
website to learn how the website handles the
information you share.
4. Know the security features of the social
networking site you use.
5. Do not share your password with anyone.
“ 6. Avoid logging in to public networks/Wi-Fi.
7. Do not talk to strangers whether online or
face-to-face.

8. Never post anything about a future vacation.


9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
“ 11. Install and update an antivirus software on your
computer.
12. If you have a Wi-Fi at home, make it a private
network by adding a password.
13. Avoid downloading anything from untrusted
websites.
14. Buy the software; do not use the pirated ones.
15. Do not reply or click links from suspicious emails.
3. Protecting Reputations Online

•When you
•Events that are
post, they are
embarrassing
kept in the
can now be
•Victims tend to archives. This •Disreputable
easily recorded
ignore these makes it last information posted
on any device.
incidents but forever. on the internet
regret it later in may affect future
their life. opportunities.
Think before you click!
1. Once you post something on the web, you have no control of
who sees your post. Before posting, think of the people who
would see your posts.
2. Protecting the reputation of acquaintances is a serious
responsibility.
3. Setting posts to “private” will not allow the search engines to
scan them.
4. Avoid using names. They are easy for search engines to scan.
5. Report any inappropriate post that affect you or ask the one
who posted it to put it down.
4. Copyright
Infringement
1. Understand
2. Be responsible.
3. Be creative.
4. Know the law.
5. Online
Research
1. Have a question in mind
2. Narrow it down
3. Advanced Research
4. Look for a credible source
27

You might also like