Lesson 1.1 - Safety and Etiquette Online
Lesson 1.1 - Safety and Etiquette Online
In the same way you learn about safety when you leave the house, it is important to
learn how to stay safe online. These are skills that will stay with you for life.
Don't give out personal information such as your address or phone number.
Don’t send pictures of yourself to anyone, especially indecent pictures.
Don't open emails or attachments from people you don't know.
Don't become online ‘friends’ with people you don't know.
Never arrange to meet someone in person who you've met online.
If anything you see or read online worries you, tell someone about it.
Social networking
Social networking websites and apps, such as Facebook, MySpace, Instagram, Viber,
Tumblr, SnapChat, Ask.fm and Twitter have become incredibly popular in recent
years.
Most users are genuine, but because it is so easy to hide your real identity, it is
possible to come into contact with people you would normally avoid.
The internet offers you a lot of freedom and this can lead some people to behave in
ways they would not behave in public.
They might:
say things on a status update / post / tweet they would never say face to face
give out personal information about themselves or others (including photos) that
they would normally keep private
Cyber bullying
Cyber bullying can work in the same way as bullying in the playground; the victim
feels frightened and alone, while the bully tries to hide from being caught.
Comments, images and videos about a person can be posted online causing the
victim to feel frightened and upset.
It is even possible for cyber bullies to hack into the victim's personal accounts and
harass them from within their own user profile.
Often cyber bullies feel braver because they can't be seen, but it can be the most
traceable form of bullying because there's evidence that it's happened.
But because bullies think they can cover up their identity online sometimes people
who wouldn't normally bully might do so online.
Sexting
Sexting usually refers to sending and receiving rude messages or videos of:
naked pictures
'underwear shots'
any sexual texts, images or videos
The term spam can also be used to describe any "unwanted" email from a company
or website -- typically at some point a user would have agreed to receive the email
via subscription list opt-in -- a newer term called graymail is used to describe this
particular type of spam.
In addition to wasting people's time with unwanted email, spam also eats up a lot of
network bandwidth. Consequently, there are many organizations, as well as
individuals, who have taken it upon themselves to fight spam with a variety of
techniques. But because the Internet is public, there is really little that can be done
to prevent spam, just as it is impossible to prevent junk mail. However, some online
services have instituted policies to prevent spammers from spamming their
subscribers.
Phishing
BDO updates
https://www.youtube.com/watch?v=QhdFjBp-jGs
Netiquette Tips
Regardless of the type of communication used, you should always keep in mind the
following:
Be respectful: Treat others the way you want to be treated. Use polite
language and avoid using offensive words or phrases that could be hurtful to
others.
Use proper grammar and spelling: Avoid using excessive abbreviations or
slang, and use proper punctuation and spelling to ensure clear
communication.
Be mindful of tone: Online communication can be misinterpreted easily, so
make sure your tone is clear and appropriate. Avoid using all caps, which can
come across as shouting.
Keep it professional: Remember that online communication is still a form of
professional communication, especially when communicating with professors,
instructors, and administrators.
Use appropriate channels: Use the appropriate communication channels
for the situation. For example, use email for longer, more formal messages,
and instant messaging or texting for quick, informal messages.
Use appropriate subject lines: Use clear and specific subject lines in your
emails, so that the recipient knows what the message is about.
Avoid spamming: Avoid sending unsolicited messages or spamming others
with unnecessary messages.
Don't overshare personal information: Be mindful of the information you
share online, as it can be accessible to anyone. Avoid sharing sensitive or
personal information in public online spaces.
Respect others' time: Be considerate of others' time and avoid sending
messages outside of regular business hours, unless it's urgent.
Remember, good netiquette is about being respectful, professional, and considerate
in your online communication. By following these guidelines, you can build positive
relationships with your peers and professors while avoiding misunderstandings and
conflicts.
Computer Ethics
ETHICS IN GENERAL
A guideline is needed to stop the current technology products from being exploited
for example replicating original CDs and selling them as pirated software, this
unethical behavior can be controlled by the code of conducts.
Unethical refers to any code of conducts that are not conforming to approved
standards of social or professional behavior. Computer ethics is a system of moral
standards or values used as a guideline for computer users.
RESPECTING OWNERSHIP
Property here means ownership. Since an individual data and information are
considered as property, therefore, an act of tampering and changing electronic
information is considered as vandalism and disrespect for other people’s property.
The United States Institute of Computer Ethics has come out with the Ten
Commandments of Computer Ethics. These principles consider the effective code of
conducts for the proper use of information technology.
With the advancement of ICT, it is easy for anyone to retrieve your information from
the Internet. You may not realize that when you fill a form on the Internet, your
information may be exposed and stolen.
Examples of unethical computer code of conducts include:
• modifying certain information on the Internet, affecting the accuracy of the
information
• selling information to other parties without the owner’s permission
• using information without authorization
• involvement in stealing software
• invasion of privacy
Intellectual property refers to any product of human intellect that is unique and has
value in the market place. This covers ideas, inventions, unique name, computer
program codes and many more.
ETHICAL COMPUTER CODE OF CONDUCTS