Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Chapter II - Methodology

The chapter presents the approaches and methods, possibly mentioned by the researchers through
conduct and comprehension of the research as we study the impact of applying netiquette for
students, by thought and information given.

Appliance of Computer Ethics


Computer ethics is a plethora of ethics that discerns the standards of conduct in the usage of
computers, titularly in that case. This can appertain the students’ issues that involve being
victimized for cyberbullying, identify theft, and gathering information personally from the
internet. On the brighter side, it aids students to practice and understand the concept of
internet with consensus, following its standards when it comes to applying internet ethics,
or netiquette as a set of rules that clarifies proper communication when browsing the
internet for different purposes, be it research or information. The following are a few
important reminders and some examples that picture quandaries or situations revolving
around the use and interaction of the internet, just to add clarification as these pieces of
advice may find relationships to students while applying netiquette, and how these apply to
the framework given as we take consideration to approach.
1. Be careful when dealing with emails from unknown sources or spam. Managing
mails from Gmail from unknown or unverified sources that either spamming the same
draft of mail, carrying a dangerous formula that brings either malfunction or scamming to
your device. This common form of cyberattack is called phishing. This can impersonate
social media, organization, or your workplace as a form of mail or text. Nonetheless, this
form of attack is predictable. Aside from that, this helps students how to handle spam
mails, and find resolve against them easily.
2. Run your antivirus software before going online. Running antivirus software before
accessing the internet is important, and makes everything malicious look harmless. It
prevents the computer from running slowly, deleting files in an instant, CPU crashes, data
loss, and digital inability from malware. This introduces and encourages students to
download this kind of software as a measure of security during online class beforehand,
with instructions on how to use antivirus software and knowing its strong advantages
against cyberattacks and malware whenever we interact and simultaneously apply
netiquette when we access the internet.
3. Think before you click. What you post on the Internet may stay online forever. This
is overall important because if we are foolish enough to access the internet without any
form of security, we can only be sitting ducks whenever we gather information, giving
opportunities to introduce malware or become prone to cyberattacks against us users.
This importance encourages students to use their minds, interact and communicate with
the internet as a daily instruction whenever we access it. The text or post you made
without even thinking, for instance, could be viral and cause some outrage.
Online Learning
For 2 years since the COVID-19 spread throughout the world, online learning has been
commonplace for many countries that are still affected, even vaccines are distributed
globally. Zoom and Google Meet are possible instruments for education, giving more
opportunities to distribute the principles and policies of netiquette, bringing either success
when instructing students with courtesy and politeness as basic examples. For instance,
when a teacher/host had found someone unmuted and constantly bad-mouthing some
classmate, she can mute that individual or warn the individual for committing bad conduct.
Another case can be using sarcasm, which is the source of multitudinous arguments online
albeit with learning, not offering the commenter/individual’s jestering and intent. As a
backfiring response to it, It’s preferable and advisable to just avoid it, because saying that
sort of intoning discontent will only get the benefit of doubt. As an outcome, online
learning has increased the students’ competence digitally. For advice, Ala-Mutka et al.
(2008) preferred that tutoring institutions should not only devise segregated programs that
rely and depend on the students’ digital brinkmanship, but rather embedding these in
teaching and learning process of general subjects temporarily, while Omotayo and Haliru
(2020) prepended that learners should muster the courage to acquire digital competency for
ethical and educational relevancy in the modern world spick and span. Thus, this approach
gives more positive feedback when acquiring education digitally, even when digital
discontent takes place in online classes often, this gives more importance and anonymity
from the voices of students. The production of gathering the data from this method is easier
because the researcher has the volition to interact with the students when applying
netiquette, wisely. Online learning is the new education norm, especially in the Philippines,
although some schools go and muster the courage to establish face-to-face classes strictly
through the prevention of spreading the pandemic. The procedure of gathering data
through this method can skyrocket fast because most schools like the LCCP Community,
for instance, have plenty of students and as well as they also take the usage of social media
as a form of online learning. They also use Zoom for class discussions or any educational
form that can help those students in order for them to apply netiquette.

References:
Brooks, A. (2019, January 28). 10 netiquette guidelines online students need to know. Rasmussen
University. Retrieved October 4, 2022, from
https://www.rasmussen.edu/student-experience/college-life/netiquette-guidelines-every-onl
ine-student-needs-to-know/
Catapang, C. G. (n.d.). Amidst the pandemic: The impact of online learning on the academic
performance of grade 10 students at Nagpayong High School A.Y 2021-2022.docx.
Google. Retrieved October 4, 2022, from
https://docs.google.com/document/u/0/d/1FmcMAF5Mxg8RuznBSdH6cqFlI_Qs2kz3/mob
ilebasic
Google. (n.d.). Avoid and report phishing emails - Gmail Help. Google. Retrieved October 3,
2022, from
https://support.google.com/mail/answer/8253?hl=en#:~:text=What%20phishing%20is,info
rmation%20about%20your%20bank%20account.
Gupta, H. (2022, February 16). 11 advantages of using an antivirus software - importance of
online security. Geekflare. Retrieved October 4, 2022, from
https://geekflare.com/advantages-using-antivirus/
Juanillo, M. P., & Tan, E. J. M. (2020). E-Tech technology empowerment in a connected, digital
world (J. D. L. Caro, Ed.) (2nd ed.). TechFactors Inc.

You might also like