Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 8

BERNARDO, JAMIL C.

BSENTREP 2-1

IT-ERA

NETIQUETTE

Netiquette is short for "Internet etiquette." Just like etiquette is a code of polite behavior in
society, netiquette is a code of good behavior on the Internet. This includes several aspects of
the Internet, such as email, social media, online chat, web forums, website comments,
multiplayer gaming, and other types of online communication.

While there is no official list of netiquette rules or guidelines, the general idea is to respect
others online. Below are ten examples of rules to follow for good netiquette:

 Avoid posting inflammatory or offensive comments online (a.k.a flaming).


 Respect others' privacy by not sharing personal information, photos, or videos that
another person may not want published online.
 Never spam others by sending large amounts of unsolicited email.
 Show good sportsmanship when playing online games, whether you win or lose.
 Don't troll people in web forums or website comments by repeatedly nagging or
annoying them.
 Stick to the topic when posting in online forums or when commenting on photos or
videos, such as YouTube or Facebook comments.
 Don't swear or use offensive language.
 Avoid replying to negative comments with more negative comments. Instead, break the
cycle with a positive post.
 If someone asks a question and you know the answer, offer to help.
 Thank others who help you online.

CYBERCRIME

Cybercrime is criminal activity done using computers and the Internet. This includes anything
from downloading illegal music files to stealing millions of dollars from online bank accounts.
Cybercrime also includes non-monetary offenses, such as creating and distributing viruses on
other computers or posting confidential business information on the Internet.

Example of Cybercrime
Here, are some most commonly occurring Cybercrimes:

 The fraud did by manipulating computer network


 Unauthorized access to or modification of data or application
 Intellectual property theft that includes software piracy
 Industrial spying and access to or theft of computer materials
 Writing or spreading computer viruses or malware
 Digitally distributing child pornography

Cybercrime Attack Types

Cybercrime can attack in various ways. Here, is some most common cybercrime attack mode:

Hacking:

It is an act of gaining unauthorized access to a computer system or network.

Denial Of Service Attack:

In this cyberattack, the cyber-criminal uses the bandwidth of the victim's network or fills their e-
mail box with spammy mail. Here, the intention is to disrupt their regular services.

Software Piracy:

Theft of software by illegally copying genuine programs or counterfeiting. It also includes the
distribution of products intended to pass for the original.

Phishing:

Pishing is a technique of extracting confidential information from the bank/financial institutional


account holders by illegal ways.

Spoofing:

It is an act of getting one computer system or a network to pretend to have the identity of
another computer. It is mostly used to get access to exclusive privileges enjoyed by that network
or computer.

CYBERCRIME RELATED LAWS


LOCAL

Cybercrime Prevention Act of 2012

The Cybercrime Prevention Act of 2012, officially recorded as Republic Act No. 10175, is a law in
the Philippines approved on September 12, 2012. It aims to address legal issues concerning
online interactions and the Internet in the Philippines. Among the cybercrime offenses included
in the bill are cybersquatting, cybersex, child pornography, identity theft, illegal access to data
and libel.

INTERNATIONAL

 Cybercrimes Bill – South Africa (South Africa signed the Budapest Convention in 2001)
 Cybersecurity Information Sharing Act (CISA) – United States of America
 EU Network and Information Security Directive
 Criminal Code Act 1995 Australia
 Cybercrime Act 2001 Australia
 Chapter 08:06 (Cybercrime and Computer- related Crimes) Botswana
 Computer Misuse Act, 2007 Brunei Darussalam
 Criminal Code of Canada Canada
 Cybersecurity Law China
 Criminal Code France
 Computer Crimes Act Malaysia
 Crimes Act,1961 New Zealand
 Act on Computer Crimes Thailand
 Cybercrimes Act, 2015 Tanzania
 UK – Computer Misuse Act, 2013
 United States Code USA

REAL-LIFE CASES OF NETIQUETTE

LOCAL

1) On an election year, social media hailed some as heroes, but cast doubt on others.

Digital marketers in conferences have spoken about the phenomenon of a “social media veto.”
But a “social media vote” was untested – possibly until this year’s elections, when people said
social media changed the game.
Media analysts and political anthropologists said social media was a key player in the 2016
elections, in the Philippines as well as in the United States. Professor Chester Cabalza, a senior
lecturer from the Department of Anthropology of the University of the Philippines-Diliman, said
that social media “can make or break the chances of politicians because people react” – an
apparent reference to how a post can spread quickly like fire, depending on how citizens
respond to it.

There seems to be a ring of truth to this.

One month before Philippine elections, Facebook hailed then-presidential candidate Rodrigo
Duterte as the “undisputed king of Facebook conversations” after 64% of conversations and
discussions on the social media site related to the elections featured the then-Davao City mayor.

2) Did hyper-partisan Facebook accounts and pages 'filter bubble' us?

Hyper-partisan Facebook pages have cropped up in the Philippines largely as a product of a


volatile election season that saw candidates heavily relying on social media for support and
exposure.

Arguably the most popular of these pages, with a following of almost 4.6 million Facebook
users, is the Mocha Uson Blog, run by singer-dancer-turned-blogger and broadsheet columnist
Mocha Uson.

Another popular hyper-partisan page is Silent No More, which began as an unaffiliated


Facebook page campaigning for former senator Mar Roxas and then-congresswoman Leni
Robredo during the presidential and vice presidential elections.

Post-elections, Silent No More posts mostly protested the burial of former dictator Ferdinand
Marcos in the Libingan ng mga Bayani. It also criticized the present administration, and accused
Duterte supporters of twisting facts.

Hyper-partisan pages, their fans, supporters, and critics appear to be constantly engaged in an
endless debate. At best, discussions cite historical bases: the issue of the Marcos burial, for
instance, ignited a big debate online as to whether or not he was as terrible a president history
books say, or whether those history books spoke enough at all about the atrocities committed
during martial law. At worst, these debates lead to threats and name-calling.

There have been fears that the rise of hyper-partisan pages and groups prevented users from
seeing both sides of a story or a debate because Facebook builds on a users’ preference based
on what one clicks or comments on, showing more of these in one’s feed, while filtering out
others in the process.
The algorithm, technology reports have said, resulted in the so-called “filter bubble,” which
showed content that aligned with a user’s views, and preferences, and hid posts and topics that
may contradict these.

The result is an “echo chamber” where a user’s opinions and reactions are mirrored by posts
they see and the content they read. Like-minded peers will tell each other what they already
know, their thoughts will bounce back and forth, and they will echo one another while
restricting contradictory opinions from reaching their feeds.

3) Unsubstantiated/ Uninvestigated claims that wittingly/ Unwittingly promoted an agenda

A post published before the 2016 Philippine elections on how Singapore Prime Minister Lee
Hsien-Loong supposedly endorsed then-presidential candidate Rodrigo Duterte went viral
around April. A photo of Lee, with a caption saying, “Mayor Rodrigo Duterte is the only
presidential candidate that could make Philippines like Singapore” spread online.

Similarly, the Catholic Bishops Conference of the Philippines, in the Papal Visit-Philippines 2015
Facebook page, had denied that Pope Francis declared support for Duterte’s bid for the
presidency. The subject of the denial was text overlain on a poster-like square art that usually
gets passed around as a meme, and which supposedly tells how the Pope admires Duterte for
his honesty.

Peter Tiu Laviña, campaign spokesperson of President Rodrigo Duterte who was recently
appointed head of the National Irrigation Administration, shared a photo of a nine-year-old girl
who was raped and murdered, in what was an apparent effort to highlight purported misguided
lack of support for the government’s war on drugs on the part of the Church, media, and human
rights activists.

On his post on Facebook last August, Laviña expressed misgiving on people being more
concerned with the country’s image abroad than expressing support for the government’s
crusade to end the drug menace.

Turned out Laviña was wrong. The photo was taken in Brazil in December 2014, long before
President Duterte’s campaign against illegal drugs started. Another Duterte ally and former
Cabinet Secretary Rafael Alunan III called out Laviña on this Facebook post, saying it was
“selective reasoning [and] cognitive dissonance at work.”

However, the damage has been done. Some supporters of the administration believed the post,
and directed their anger at the Commission on Human Rights and the church for allegedly
protecting criminals instead of the victims. In the comments section of the post, netizens tagged
Lavinia and asked him to “be responsible” and to “check [his] sources” before posting. The post
is still available online, with more than 5,000 shares as of this piece’s publication.

Pro-Duterte-blogger Mocha Uson had erroneously posted a photo praising the Department of
Social Welfare and Development under the Sec. Judy Taguiwalo for their quick response to the
onslaught of Typhoon Lawin.

She also commended the “new” modernized repacking system, where the relief goods are
placed in boxes instead of the previous ones which were packed in plastic bags.

In her post on Facebook last October 21, now taken down, she indirectly hit the Aquino
administration by comparing it to Duterte’s, and by citing the lack of help for the victims of
Supertyphoon Yolanda which struck the country in 2013.

But netizen Jit Sohal answered back, saying the mechanization of relief goods repacking started
in 2015, in preparation for Typhoon Lando’s destruction in October.

The United Nations’ World Food Programme, in their Facebook account, also shared photos
with then DSWD Sec. Dinky Soliman with the boxed relief goods.

The National Aeronautics and Space Administration was not spared from being mentioned in a
fabricated news. A post on social media immediately went viral this August, a couple of months
after President Duterte took office, when NASA allegedly called the Philippines’ president “the
best president in the solar system.”

A video uploaded in YouTube by “PRRD realworld” said that NASA declared Duterte the best
president after garnering a 91% rating. US President Barack Obama, Russian President Vladimir
Putin, China’s Prime Minister Xi Jinping and Japan’s Prime Minister Shinzo Abe supposedly rated
below the Philippine leader. The hoax also appeared in various fake news sites.

Earlier this year, at the height of the search for Senator Leila de Lima's security aide and alleged
bagman and lover, Ronnie Dayan, photos allegedly of Dayan were circulated online. One such
photo is that of showbiz reporter and LGBT community member Roldan Castro. He had to
endure bad words from the mob as a result of the mistake.

At a time when media and journalism professionals have to deal with massive accusations of
bias, prejudice, even ill-will, it is not only journalists and their profession that take a hit because
of the damaged ability of practitioners to verify claims, disprove myths, or uphold the truth. The
biggest casualty is the public who become either too uninformed or misinformed to decide on
matters concerning their citizenship and to participate in democratic processes.
INTERNATIONAL

1) Online Tracking Evolves Past the "Creepy Line"

Google CEO Eric Schmidt once was quoted saying, "There is what I call the creepy line. The
Google policy on a lot of things is to get right up to the creepy line and not cross it."

This begs some questions: What is on the other side of the creepy line, and why does Google
get to decide where it is?

Right now, companies that collect data about what users do online claim that they do so only in
very broad categories that help them determine what ad they should serve. This is probably
true in the case of most advertisers. But data companies like Rapleaf — whose habit of selling
Facebook IDs was only recently exposed — are clearly starting to cross the line.

In the worst case scenario, a lack of regulation would lead companies to push the envelope
when it comes to what they track. "If the data is there, it is potentially something that could be
obtained by government law enforcement authorities without you knowing about it," explains
John Simpson, a privacy advocate with the non-profit Consumer Watchdog advocacy group. "It
could potentially be subpoenaed in civil trials again… The issue is that people don't realize the
tracks that they leave when they do these routine things."

2) Personalization on Websites Disappears

In response to the negative press that Rapleaf received from, in the company's words,
"inadvertently passing Facebook and MySpace IDs to ad networks in a small minority of cases,"
CEO Auren Hoffman wrote in a blog post:

"We believe that a more personalized world is a more helpful, efficient, and respectful world.
Today, Rapleaf customers help people receive useful product recommendations, enjoy higher
levels of customer service, engage directly with candidates running for office, see better ads,
receive less spam, and view relevant content."

It's true that cookies enable the personalized "hello" and book recommendations that greet you
when you log into Amazon's site. And heck, if you're shopping for a car, you might want to see
car ads on every site you visit. Banning online tracking altogether would do away with much of
the personalized goodness on the Internet.

Simpson agrees that people might want to be tracked in some cases. But he says that the best
way to decide that they want to be tracked is to have them opt in.

3) Privacy Solutions Require You to Opt Out — Not In — And Nobody Notices
Advertisers say they have made an effort to stop tracking people who don't want to be tracked.
In response to the FTC's call to improve self-regulation, leading advertising trade organizations
introduced a self-regulation program that urged advertisers to include an "Advertising Option
Icon" on targeted advertisements that would allow consumers to opt out of online tracking. The
advertiser would still collect information about the user, but the company would agree not to
leverage it when choosing which ads to display.

Because most people aren't aware that they're being tracked and advertisers would still collect
information, Soghoian finds this to be an unsatisfying solution. "If consumers are to effectively
evaluate the pros and cons of this process, they need to know that it's happening, know at least
to some extent how it's happening and who [is] conducting it." he says. "And I think those three
bits of information are missing right now."

If customers are hardly aware that they're being tracked, how will they know to opt out?
Previously, sites like the Network Advertising Initiative and Firefox plug-in TACO (Targeted
Advertising Cookie Opt-Out) have provided opt-out cookie solutions for Internet users who
don't want to be tracked. None of the participants in McDonald's study had ever heard of them.

Soghoian and other privacy advocates would much prefer an opt-in solution.

REFERENCES:

Christensson, P. (2017, December 30). Netiquette Definition. Retrieved 2020, Feb 25, from
https://techterms.com

Christensson, P. (2006). Cybercrime Definition. Retrieved 2020, Feb 25, from


https://techterms.com

Abscbn.com

Abcnews.com

You might also like