Module Netiquette and Computer Ethics
Module Netiquette and Computer Ethics
Overview
Your overview introduces the topic well, but a slight revision for clarity could improve it:
Netiquette and Computer Ethics explore the ethical considerations in the field of
computing, both in online spaces and professional practice.
Objectives
● Discuss the importance of responsible online behavior by following rules of
courtesy and “cyberspace road rules.”
● Differentiate between privacy and security.
● Identify various risks to internet privacy.
Lesson 1: Netiquette
What is Netiquette?
Netiquette, simply stated, is network etiquette — that is, the etiquette of cyberspace.
"Etiquette" refers to the forms required by good breeding or prescribed by authority in
social or official life. In other words, netiquette is a set of rules for proper online
behavior.
● Golden Rule: Treat others with respect, just as you would in real life.
● Professional Communication: Use polite, clear, and concise language. Avoid
confrontational or offensive remarks.
● Emoticons: While informal symbols like :) can help convey meaning, they should
be avoided in professional contexts.
● Do not forward private emails or messages without the consent of the original
participants.
● Be cautious when sharing sensitive information (e.g., home address, phone
number, financial details, or passwords).
● When sharing content that isn't yours, always credit the original author to avoid
plagiarism.
● Restate what the other person has said in your own words to show you're
listening.
● Use polite phrases such as “In my experience” or “In my opinion” when sharing
your thoughts, or credit others when referencing their views (e.g., "According to
Eric Ericson...").
Lesson 2: Cybercrimes
What is "Cyber"?
Cyber refers to the culture and characteristics of computers, information technology,
and virtual reality.
Cybercrime is any illegal activity in which a computer is the target or the tool used to
commit an offense. This includes activities such as hacking, phishing, spamming, and
child pornography. Cybercriminals may exploit technology to access personal
information, and trade secrets, or commit malicious acts online.
1. Copyright Infringement
○ Definition: The unauthorized use of copyrighted material (e.g., literary,
artistic, musical works) without permission.
○ Plagiarism: Copying or closely imitating another author's work without
consent or proper credit.
2. Computer Addiction
○ Offline Addiction: Excessive use of video games or offline computer
activities.
○ Online Addiction (Internet Addiction): Overuse of the Internet, including
gaming, browsing, or social media.
3. Virtual Self: The online persona you create and maintain in the virtual world.
Types of Criminal Activities
1. Hacking
○ Unauthorized access or interference with computer systems to steal, alter,
or corrupt data.
○ Involves illegal access, interception, data interference, and malware
introduction.
2. Penalties:
○ For hacking critical infrastructure: 12-20 years imprisonment (reclusion
temporal).
○ For other hacking offenses: 6-12 years imprisonment (prisión mayor).
3. Computer-Related Forgery, Fraud, and Identity Theft
○ Activities like phishing, pharming, and spamming, are aimed at stealing
sensitive information.
○ Maximum fine of Php 200,000 or imprisonment.
4. Electronic Theft
○ Illegal downloading, digital piracy, and copyright infringement.
5. Cyberbullying
○ Using electronic communication to intimidate or harass individuals.
6. Cybersex
○ Engaging in or facilitating lascivious exhibitions or sexual activity online for
compensation.
○ A fine of Php 200,000 or imprisonment (prisión mayor).
7. Child Pornography
○ A form of child sexual exploitation punishable under Republic Act No.
9775 (Anti-Child Pornography Act of 2009).
○ 12-20 years imprisonment (reclusion temporal).
8. Cyber Defamation
○ The act of making false statements online that harm another person's or
company’s reputation.
○ 6-12 years imprisonment (prisión mayor).
Lesson 3: Internet Threats
1. Hacking
Hacking refers to unauthorized access to computers or networks. The growing
availability of online tools and information has made hacking easier, even for those with
little technical knowledge.
2. Malware
Malware is malicious software designed to infiltrate, damage, or disable computers.
● Viruses
● Worms
● Trojan horses
● Spyware
● Adware
3. Pharming
Pharming involves redirecting legitimate URLs to fake websites, even if the correct URL
is entered.
What it does:
5. Ransomware
Ransomware locks you out of your computer or encrypts your files, demanding payment
to restore access.
Types of ransomware:
What to do:
6. Spam
Spam is the mass distribution of unsolicited messages, often containing scams or
malware.
● Delete files.
● Send sensitive information to third parties.
● Log keystrokes, capturing usernames, passwords, and credit card
numbers.
● Watch you through your webcam.
9. Viruses
A computer virus is a malicious program that spreads by attaching itself to files or
programs.