Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
9 views

Module Netiquette and Computer Ethics

Uploaded by

Renjie Ere-er
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Module Netiquette and Computer Ethics

Uploaded by

Renjie Ere-er
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

NETIQUETTE AND COMPUTER ETHICS

Overview
Your overview introduces the topic well, but a slight revision for clarity could improve it:
Netiquette and Computer Ethics explore the ethical considerations in the field of
computing, both in online spaces and professional practice.

Objectives
● Discuss the importance of responsible online behavior by following rules of
courtesy and “cyberspace road rules.”
● Differentiate between privacy and security.
● Identify various risks to internet privacy.

Lesson 1: Netiquette

What is Netiquette?
Netiquette, simply stated, is network etiquette — that is, the etiquette of cyberspace.
"Etiquette" refers to the forms required by good breeding or prescribed by authority in
social or official life. In other words, netiquette is a set of rules for proper online
behavior.

● Golden Rule: Treat others with respect, just as you would in real life.
● Professional Communication: Use polite, clear, and concise language. Avoid
confrontational or offensive remarks.
● Emoticons: While informal symbols like :) can help convey meaning, they should
be avoided in professional contexts.

Avoid Slang, Acronyms, and Text Talk


In professional and academic environments, it’s crucial to use proper terminology,
spelling, and grammar. This ensures clarity and professionalism in communication. For
example, use "your" instead of "ur."

Avoid “Screaming” in Typed Messages


Typing in ALL CAPS is perceived as shouting and can be distracting. Instead, use bold
or italic text to emphasize certain words or phrases. You can also use special characters
(e.g., Important) or change the text color for emphasis, but avoid overusing these
methods in professional settings.

Proofread Your Messages Before Sending


To communicate effectively:

● Ensure your message is free of spelling and grammar mistakes.


● Avoid confusing terms or phrases.
● Check that no important information is missing.
● Make sure all the information is accurate.
Exercise Good Judgment When Sharing Information Online
Always protect the privacy of yourself and others:

● Do not forward private emails or messages without the consent of the original
participants.
● Be cautious when sharing sensitive information (e.g., home address, phone
number, financial details, or passwords).
● When sharing content that isn't yours, always credit the original author to avoid
plagiarism.

Respect Diversity in Viewpoints


When participating in online discussions, show respect for differing opinions:

● Restate what the other person has said in your own words to show you're
listening.
● Use polite phrases such as “In my experience” or “In my opinion” when sharing
your thoughts, or credit others when referencing their views (e.g., "According to
Eric Ericson...").

Ten Commandments of Computer Ethics

Rule 1: Remember the Human


Treat others online as you would in person. Before sending a message, ask yourself if
you'd be okay receiving that same message.

Rule 2: Adhere to Real-Life Standards of Behavior


Behave online as you would in real life. While online environments might feel different,
your behavior should still reflect respect and consideration.

Rule 3: Know Where You Are in Cyberspace


Different online environments have different norms. For example, what is acceptable in
a casual text message may not be appropriate in an email to a professor or colleague.

Rule 4: Respect Others' Time and Bandwidth


Ensure that your messages are meaningful, concise, and to the point. Avoid sending
unnecessary emails or attachments that take a long time to download.

Rule 5: Make Yourself Look Good Online


In online environments, people judge you by the quality of your writing. Always check for
spelling and grammar mistakes and ensure your points are clear.

Rule 6: Share Expert Knowledge


The internet thrives on information sharing. If you have expertise, share it with others,
and when you learn something new, spread the knowledge.

Rule 7: Help Keep Flame Wars Under Control


"Flaming" refers to expressing a strongly held opinion without restraint. If disagreements
escalate into a "flame war," step in to help guide the conversation back to a constructive
place.
Rule 8: Respect Privacy
When you encounter personal or sensitive information online, handle it carefully. Always
respect others' privacy as you would expect them to respect yours.

Rule 9: Don’t Abuse Your Power


If you have more knowledge or expertise than others, don’t misuse it. Treat everyone
with fairness and integrity.

Rule 10: Be Forgiving of Others’ Mistakes


Everyone makes mistakes online, whether it's a misspelled word or a long-winded
response. Be kind and understanding, and when correcting someone, do so privately.

Lesson 2: Cybercrimes

What is "Cyber"?
Cyber refers to the culture and characteristics of computers, information technology,
and virtual reality.

Cybercrime is any illegal activity in which a computer is the target or the tool used to
commit an offense. This includes activities such as hacking, phishing, spamming, and
child pornography. Cybercriminals may exploit technology to access personal
information, and trade secrets, or commit malicious acts online.

Relevant Philippine Laws:

● Republic Act No. 10175 (Cybercrime Prevention Act of 2012)


Enacted on September 12, 2012, this law addresses legal issues related to
online activities and internet use in the Philippines.
● Republic Act No. 10173 (Data Privacy Act of 2012)
This law protects personal information and ensures privacy for individuals in the
Philippines.

Common Forms of Cybercrimes

1. Copyright Infringement
○ Definition: The unauthorized use of copyrighted material (e.g., literary,
artistic, musical works) without permission.
○ Plagiarism: Copying or closely imitating another author's work without
consent or proper credit.
2. Computer Addiction
○ Offline Addiction: Excessive use of video games or offline computer
activities.
○ Online Addiction (Internet Addiction): Overuse of the Internet, including
gaming, browsing, or social media.
3. Virtual Self: The online persona you create and maintain in the virtual world.
Types of Criminal Activities

1. Hacking
○ Unauthorized access or interference with computer systems to steal, alter,
or corrupt data.
○ Involves illegal access, interception, data interference, and malware
introduction.
2. Penalties:
○ For hacking critical infrastructure: 12-20 years imprisonment (reclusion
temporal).
○ For other hacking offenses: 6-12 years imprisonment (prisión mayor).
3. Computer-Related Forgery, Fraud, and Identity Theft
○ Activities like phishing, pharming, and spamming, are aimed at stealing
sensitive information.
○ Maximum fine of Php 200,000 or imprisonment.
4. Electronic Theft
○ Illegal downloading, digital piracy, and copyright infringement.
5. Cyberbullying
○ Using electronic communication to intimidate or harass individuals.
6. Cybersex
○ Engaging in or facilitating lascivious exhibitions or sexual activity online for
compensation.
○ A fine of Php 200,000 or imprisonment (prisión mayor).
7. Child Pornography
○ A form of child sexual exploitation punishable under Republic Act No.
9775 (Anti-Child Pornography Act of 2009).
○ 12-20 years imprisonment (reclusion temporal).
8. Cyber Defamation
○ The act of making false statements online that harm another person's or
company’s reputation.
○ 6-12 years imprisonment (prisión mayor).
Lesson 3: Internet Threats

1. Hacking
Hacking refers to unauthorized access to computers or networks. The growing
availability of online tools and information has made hacking easier, even for those with
little technical knowledge.

What it can do:

● Exploit security vulnerabilities to access sensitive information.


● Install Trojan horses, providing backdoor access for further exploitation.

2. Malware
Malware is malicious software designed to infiltrate, damage, or disable computers.

Common types of malware:

● Viruses
● Worms
● Trojan horses
● Spyware
● Adware

What it can do:

● Alter or delete files.


● Steal sensitive data.
● Reformat hard drives, leading to data loss.
● Take control of your computer.
● Intimidate you with scareware (false security warnings).

3. Pharming
Pharming involves redirecting legitimate URLs to fake websites, even if the correct URL
is entered.

What it can do:

● Convince users they are on a legitimate site by mimicking the original


site’s appearance.
● Trick users into entering personal information that can be stolen.
4. Phishing
Phishing uses fake emails, texts, and websites to steal personal and financial
information.

What it does:

● Tricks users into providing sensitive data (e.g., usernames, passwords,


credit card info) under the guise of confirming or updating account details.

5. Ransomware
Ransomware locks you out of your computer or encrypts your files, demanding payment
to restore access.

Types of ransomware:

● Lockscreen ransomware: Prevents access to your computer.


● Encryption ransomware: Encrypts files and demands payment for
decryption.

What to do:

● Do not pay the ransom.


● Contact a technician to retrieve your files.
● Regularly back up your data to external storage.

6. Spam
Spam is the mass distribution of unsolicited messages, often containing scams or
malware.

What it can do:

● Annoy you with junk emails.


● Serve as a vehicle for malware.
● Phish for personal information.

7. Spyware and Adware


Spyware collects information without your consent, often installed through free
downloads.

What it can do:

● Collect personal data and share it with third parties.


● Alter the performance of your computer without your knowledge.
8. Trojan Horses
A Trojan horse disguises itself as legitimate software but performs malicious actions
when installed.

What it can do:

● Delete files.
● Send sensitive information to third parties.
● Log keystrokes, capturing usernames, passwords, and credit card
numbers.
● Watch you through your webcam.

9. Viruses
A computer virus is a malicious program that spreads by attaching itself to files or
programs.

What it can do:

● Send spam emails.


● Hijack your web browser.
● Disable security settings.
● Infect other computers via shared files or USB drives.

Signs your computer might be infected:

● Slower startup and program launch times.


● Disappearing files.
● Frequent crashes.
● Distorted computer screen.

10. Wi-Fi Eavesdropping


This method involves intercepting data transmitted over an unsecured Wi-Fi network.

What it can do:

● Capture sensitive information, including logins and passwords.


● Potentially access your computer remotely.

You might also like