Ethics on the Internet

Cards (27)

  • This refers to the maximization of internet users' knowledge and awareness of safety protocols, online crimes, and security risks in the private property and information which are connected to the use of the internet
    Online Safety
  • Online safety, sometimes regarded as e-safety or cyber safety
  • This refers to the "rules that are followed and the actions that are taken to make sure that online users and data privacy aren't compromised by cybercriminals," (Mocan, 2019)
    Online Security
  • These violations that inflict harm to other people by internet users are called online crimes
  • Cyberbullying. Republic Act 10627 or The Anti-Bullying Act of 2013
  • Enumerate the different forms of cyberbullying:
    Flaming
    Harassment
    Denigration
    Impersonation
    Outing
    Trickery
    Exclusion
    Cyberstalking
  • An online fight using electronic messages with angry and vulgar languages
    Flaming
  • The act of repeatedly sending nasty, mean, and insulting messages
    Harassment
  • The sending or posting gossip or rumors about a person to damage his or her reputation or friendships
    Denigration
  • When someone is pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person's reputation or friendships
    Impersonation
  • The act of sharing someone's secrets or embarrassing information or images online
    Outing
  • When someone is talking to a person to let him or her reveal his or her secrets or embarrassing information and then, shares the sensitive information online
    Trickery
  • when one is intentionally or cruelly excluded from an online group
    Exclusion
  • The act of repeated, intense harassment and denigration that includes threats or creates significant fear
    Cyberstalking
  • Online Crimes come in the following forms:
    Cyberbullying
    Identity Theft
    Phishing
    Plagiarism
    Copyright Infringement
  • US Department of Justice defines this crime as "all type of crimes in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain."
    Identity theft
  • “The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information such as passwords and credit card numbers."
    Phishing
  • "Plagiarism is presenting someone else's work or ideas as your own, with or without their consent, by incorporating it in your work without full acknowledgment.
  • "Occurs when a copyrighted work is reproduced, distributed, performed, publicly displayed, or made into a derivative work without the permission of the copyright owner."
    Copyright infringement
  • Common internet security threats:
    Malwares
    Computer worms
    Spam
    Phishing
  • Malware is the shortened form of malicious software
  • These are programs that can replicate themselves from one computer to another in great volume and can spread themselves rapidly without human intervention
    Computer worms
  • They are usually junk mails sent in your email, but there are times that they contain links that put you at risk.
    Spam
  • These scams are created by cybercriminals who intend to ask for private or elicit information from their
    Phishing
  • Internet ethics may deal with issues on privacy, big data, net neutrality, and access to the internet.
  • This means that all internet providers should give equal treatment to all contents that flow in their network
    Net neutrality
  • Having considered internet ethics as guiding principles in using the internet, specific and acceptable must be observed by the internet users. This acceptable conduct that adheres to polite behaviors and respectful manners is called online etiquette