Network etiquette - the etiquette of cyberspace and the set of norms of good breeding or prescribed by authority to be required in social or official life
Netiquette
Concerned with the "proper" way to communicate in an online environment
When using e-mail, instant messenger, video calls, or discussion boards to communicate with others online, please be sure to follow the rules of professional online communications known as netiquette
Golden Rule
Even though you may be interacting with a computer screen, you are communicating with a real person who will react to your message. Make a good impression - treat others with the same respect that you would like to receive and avoid confrontational or offensive language.
Emoticons
Appropriate to include in informal communications, but inappropriate for professional communications
Communicating effectively in college and business environments requires the use of correct terminology, spelling, and grammar that can easily be understood
Typing an entire message using all capital letters is known as "screaming". It is distracting and generally frowned upon in professional environments.
Proofreading messages before sending them is a best practice for effective and efficient communication
mail and chat messages sent or received are considered private and should not be forwarded or copied to others without gaining the consent of all involved participants
Messages posted to discussion boards and social media sites can be read by the public
Do not share online any sensitive personal information such as home address, phonenumber, personalconversations, socialplans, financialinformation, usernames, passwords, or anythingpersonal that is not to be shared by others over the Internet
Copying someone else's work and passing it off as your own is plagiarism. It damages reputation and could be subjected to serious academic and legal consequences
Respect diversity in viewpoints
Be constructive and respectful when sharing opinions, beliefs, and criticisms, or responding to those of others in the conversation
When sharing a viewpoint that differs from someone else's
Briefly restate what the other person said in your own words to let them know you are listening and trying to understand them
When presenting an opinion or criticism
Use phrases that identify whose point of view is being referred to, e.g. "In my experience", "In my opinion", "According to [name]", "The president believes"
Ten Commandments of Computer Ethics
RemembertheHuman
Adheretothesamestandardsofbehavioronlinethatyoufollowinreal life
Knowwhereyouareincyberspace
Respectotherpeople's time and bandwidth
Makeyourselflookgoodonline
Shareexpertknowledge
Helpkeepflamewars under control
Respectotherpeople'sprivacy
Don'tabuseyourpower
Beforgivingofotherpeople'smistakes
The Netiquette and The Computer ethics discusses about the ethical issues in the field of computer, may it be in online or practicing in professional
Cyber
The characteristics of the culture of computers, information, technology and virtual reality
Cybercrime
A crime in which a computer is the object of the crime (e.g. hacking, phishing, spamming, and child pornography) is used as a tool to commit an offense
Cybercriminal
A person who uses computer technology to access personal information, business trade secret or use the internet for exploitative or malicious purposes
Laws in the Philippines that protects against cybercrimes
RA No. 10175 (Cybercrime Prevention Act of 2012)
RA No. 10173 (Data Privacy Act of 2012)
RA No. 10627 (The Anti-Bullying Act of 2013)
RA No. 9775 (Anti-Child Pornography Act of 2009)
Copyright
Exclusive legal right given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same
Copyright Infringement
Violation, piracy or theft of a copyright holder's exclusive rights through the unauthorized use of a copyrighted material or work
Plagiarism
An act or instance of using or closely imitating the language and thoughts of another author without authorization
Types of Computer Addiction
Offline (excessive gaming behavior)
Online (also known as "Internet Addiction", excessive use of internet)
Unauthorized access of or interference with computer systems, servers, or other information and communication systems
Phishing
Practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging with a goal to steal money, gain access to sensitive data and login information
Pharming
A two-step process that begins with an attacker installing malicious code on a victim's computer or server that sends the victim to a spoofed website, where they may be tricked into offering their personal data or login credentials
Spam
Any kind of unwanted, unsolicited digital communication that gets sent out in bulk often sent via email, or via text messages, phone calls or social media
Cyberbullying
The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature
Cybersex
Willful engagement, maintenance, control, operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration
Child Pornography
Form of child sexual exploitation, erotic material that depicts persons under the age of 18, unlawful or prohibited acts against the child committed through a computer system
Cyber Defamation
Unprivileged false statement of fact which tends to harm the reputation of a person or company, the act of distributing false or harmful statements about a person or an organization on the Internet commonly occurring on social media platforms or websites
Libel
False statement in written form could be blog, comment, article, post, online review
Slander
False statement spoken orally could be an interview, podcast, speech on TV
Digital age
Also known as Information age, a period when the computer and internet were introduced
Digital age
Caused by rapid shift from traditional industry to computerization all the way to artificial intelligence which brought by Industrial Revolution
Enabled people to communicate information easily and rapidly
Digital Technology became prevalent and widely used around the world
Information can be accessed easily specially with the use of the internet
Information Communications Technology (ICT)
A group of interrelated technologies (electronic devices) for accessing, processing, and disseminating information