Rules of Netiquette

Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

Rules of Netiquette

• Online security, safety, and ethics


• Internet threats
• Online Crimes
• Protecting reputations online
At the end of this lesson, the students should be able to:

1. consider one’s and others’ safety when sharing


information using the Internet;

2. consider one’s and others’ reputation when using the


Internet;

3. determine and avoid the dangers of the Internet;

4. assess instances that breach online safety, security, and


ethical standards; and

5. value the essence of security and ethics in the use of


internet technology.
The Internet, truly, is a powerful tool. It
can be used to promote your business,
gain new friends, and stay in touch with
the old ones. It is also a source of
entertainment. But like most things in this
world, there is always “another side of
the coin.” The Internet is one of the most
dangerous places, especially if you do
not know what you are doing.
Online Safety

- refers to the maximization of internet users’


knowledge and awareness of safety protocols,
online crimes, and security risks in the private
property and information which are connected
to the use of the internet.
Online Security

- refers to the “rules that are followed and the


actions that are taken to make sure that online
users and data privacy aren’t compromised by
cybercriminals” (Mocan, 2019).
Internet Threats:
1. Malware – stands for malicious software
Types: Virus, Worm, Trojan, Spyware, Adware

2. Spam – unwanted email mostly from bots


or advertisers. It can be used to send
malware.

3. Phishing – Its goal is to acquire sensitive


personal information like passwords and
credit card details.
Online Crimes:
1. Cyberbullying – is bullying that takes place over
digital devices; includes sending, posting, or
sharing negative, harmful, false, or mean content
about someone else.

Forms of Cyberbullying:
• Flaming
• Harassment
• Impersonation
• Outing and Trickery
• Exclusion
• Cyberstalking
Online Crimes:
2. Identity Theft – all types of crimes in which
someone wrongfully obtains and uses another
person’s personal data in some way that
involves fraud or deception, typically for
economic gain.

3. Phishing – fraudulent practice of sending emails


purporting to be from reputable companies in
order to induce individuals to reveal personal
information.
Online Crimes:
4. Plagiarism and Copyright Infringement –
plagiarism is presenting someone else’s work or
ideas as your own, with or without their consent,
by incorporating it in your work without full
acknowledgement. Copyright infringement occurs
when a copyrighted work is reproduced,
distributed, performed, or publicly displayed
without the permission of the copyright owner.
Internet Safety Strategies:

1. Browser Selection

2. Email Security

3. Multifactor Authentication (MFA)

4. Firewalls
1. Be always courteous.
2. Do not use foul language and incite anger by
writing in uppercase and overusing the
exclamation mark.
3. Appropriate your humor and avoid sarcasm.
4. Do not share or post offensive materials.
5. Always acknowledge owners of ideas and
materials used.
6. Try to be understanding to a maximum tolerance.
Be kind.
7. Respect others’ opinions. Deal with everyone with
a humanitarian approach.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy