Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

LESSON 2

Rules of Netiquette
• Online security, safety, and ethics
• Internet threats
• Protecting reputations online
• Copyright
• Contextualized online search and
research skills
At the end of this lesson, the students should be able to:

1. consider one’s and others’ safety when sharing


information using the Internet;

2. consider one’s and others’ reputation when using the


Internet;

3. determine and avoid the dangers of the Internet;

4. be responsible in the use of social networking sites; and

5. browse the Internet efficiently and properly through


proper referencing.
Type of Information Shared Not Shared

a. Last name
b. First name
c. Middle name
d. Current and previous
school
e. Cellphone number
f. Name of parents
g. Name of siblings
h. Your address
i. Your birthdate
Netiquette
• Network etiquette, is concerned with the
"proper" manner of communication in the
online environment.
Core Rules of Netiquette
1. Rule 1: Remember the Human
Practice the Golden Rule: Do unto others as you would have
others do unto you.
2. Rule 2: Adhere to the same standards of behavior online that
you follow in real life
You should do your best to act within the laws and ethical
manners of society whenever you inhabit "cyberspace.“
3. Know where you are in cyberspace
What you text to a friend may not be appropriate in an email to
a classmate or colleague.
Core Rules of Netiquette
Rule 1: Remember the Human
Practice the Golden Rule: Do unto others as you would have
others do unto you.
Rule 2: Adhere to the same standards of behavior online that
you follow in real life
You should do your best to act within the laws and ethical
manners of society whenever you inhabit "cyberspace.“
Rule 3. Know where you are in cyberspace
What you text to a friend may not be appropriate in an email to
a classmate or colleague.
Core Rules of Netiquette
Rule 4 Respect other people's time and bandwidth
Make your written communication meaningful and to the point,
without extraneous text or superfluous graphics or attachments
that may take forever to download.
Rule 5: Make yourself look good online
Always check for spelling and grammar errors
Know what you're talking about and state it clearly
Be pleasant and polite
Rule 6: Share expert knowledge
Core Rules of Netiquette
Rule 7: Help keep flame wars under control
Don’t feed the flames; extinguish them by guiding the discussion
back to a more productive direction.
Rule 8: Respect other people's privacy
Just as you expect others to respect your privacy, so should you
respect the privacy of others.
Rule 9: Don't abuse your power
Remember knowing more than others do or having more power
than others may have does not give you the right to take
advantage of anyone. Think of Rule 1: Remember the human.
Rule 10: Be forgiving of other people's mistakes
Online Safety and Security
The Internet, truly, is a powerful tool. It
can be used to promote your business,
gain new friends, and stay in touch with
the old ones. It is also a source of
entertainment. But like most things in this
world, there is always “another side of
the coin.” The Internet is one of the most
dangerous places, especially if you do
not know what you are doing.
Internet Threats:
1. Malware – stands for malicious software
Types: Virus, Worm, Trojan, Spyware, Adware

Virus – designed to replicate itself and


transfer from one computer to another
(internet, local networks, FDs, CDs, etc)

Worm – transfer from one computer to


another by any types of means.
Ex. ILOVEYOU Worm
Internet Threats:
Trojan – disguises as a useful program but
once downloaded or installed, leaves your PC
unprotected and allows hackers to get your
information.

Spyware – runs in the background without


you knowing it (thus called “spy”). Ability to
monitor what you are currently doing and
typing through keylogging.
Internet Threats:
Adware – designed to send you
advertisements, mostly as pop-ups.

Spyware – runs in the background without


you knowing it (thus called “spy”). Ability to
monitor what you are currently doing and
typing through keylogging.
Internet Threats:
2. Spam – unwanted email mostly from bots
or advertisers. It can be used to send
malware.

3. Phishing – Its goal is to acquire sensitive


personal information like passwords and
credit card details.

4. Bootnet – networks of hijacked computer


devices used to carry out various scams and
cyberattacks
Think Before You Click
1. Before you post something on the web, ask these questions
to yourself: Would you want your parents or grandparents to see
it? Would you want your future boss to see it? Once you post
something on the web, you have no control of who sees your
posts.
2. Your friends depend on you to protect their reputation online.
Talk to your friends about this serious responsibility.
3. Set your post to “private.” In this way, search engines will
not be able to scan that post.
4. Avoid using names. Names are easy for search engines to
scan.
5. If you feel that a post can affect you or other’s reputation, ask
the one who posted it to pull it down or report it as
inappropriate.
COPYRIGHT INFRINGEMENT

If you create something—an


idea, an invention, a form of
literary work, or a research, you
have the right of how it should
be used by others. This is called
intellectual property.
Infographics
Create a infographics showing the Netiquette
rules with examples of how you can use them in
your daily life, primarily online. The infographics
should use an interactive online tool like Canva,
Glogster, Piktochart, etc.

You might also like