This refers to the maximization of internet users' knowledge and awareness of safety protocols, online crimes, and security risks in the private property and information which are connected to the use of the internet
OnlineSafety
Online safety, sometimes regarded as e-safety or cybersafety
This refers to the "rules that are followed and the actions that are taken to make sure that online users and data privacy aren't compromised by cybercriminals," (Mocan, 2019)
OnlineSecurity
These violations that inflict harm to other people by internet users are called onlinecrimes
Cyberbullying. RepublicAct10627 or The Anti-Bullying Act of 2013
Enumerate the different forms of cyberbullying:
Flaming
Harassment
Denigration
Impersonation
Outing
Trickery
Exclusion
Cyberstalking
An online fight using electronic messages with angry and vulgar languages
Flaming
The act of repeatedly sending nasty, mean, and insulting messages
Harassment
The sending or posting gossip or rumors about a person to damage his or her reputation or friendships
Denigration
When someone is pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person's reputation or friendships
Impersonation
The act of sharing someone's secrets or embarrassing information or images online
Outing
When someone is talking to a person to let him or her reveal his or her secrets or embarrassing information and then, shares the sensitive information online
Trickery
when one is intentionally or cruelly excluded from an online group
Exclusion
The act of repeated, intense harassment and denigration that includes threats or creates significant fear
Cyberstalking
Online Crimes come in the following forms:
Cyberbullying
IdentityTheft
Phishing
Plagiarism
CopyrightInfringement
US Department of Justice defines this crime as "all type of crimes in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain."
Identitytheft
“The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information such as passwords and credit card numbers."
Phishing
"Plagiarism is presenting someone else's work or ideas as your own, with or without their consent, by incorporating it in your work without full acknowledgment.
"Occurs when a copyrighted work is reproduced, distributed, performed, publicly displayed, or made into a derivative work without the permission of the copyright owner."
Copyrightinfringement
Common internet security threats:
Malwares
Computerworms
Spam
Phishing
Malware is the shortened form of malicioussoftware
These are programs that can replicate themselves from one computer to another in great volume and can spread themselves rapidly without human intervention
Computerworms
They are usually junk mails sent in your email, but there are times that they contain links that put you at risk.
Spam
These scams are created by cybercriminals who intend to ask for private or elicit information from their
Phishing
Internetethics may deal with issues on privacy, big data, net neutrality, and access to the internet.
This means that all internet providers should give equal treatment to all contents that flow in their network
Netneutrality
Having considered internet ethics as guiding principles in using the internet, specific and acceptable must be observed by the internet users. This acceptable conduct that adheres to polite behaviors and respectful manners is called onlineetiquette