Professional Documents
Culture Documents
Unit 8 - Computer and Internet Etiquette
Unit 8 - Computer and Internet Etiquette
Page | 1
emotion. All caps will make you look like you’re shouting. Don’t overuse
smileys and emoticons because they make you look unprofessional.
Constructing your sentences carefully and editing what you write before
hitting send is often enough.
12. Remember that your posts and account can be easily traced back to you
even if you write under an alias or a made-up handle. You leave data
footprints whenever you’re online. These are stored and can be retrieved.
Even when using incognito. Always be a decent and responsible netizen.
2. Thou shalt not interfere with other people’s computer work – Computer
viruses are small programs that disrupt other people’s computer work by
destroying their files, taking huge amounts of computer time or memory,
or by simply displaying annoying messages.
Generating and consciously spreading computer viruses is unethical.
3. Thou shalt not snoop around in other people’s computer files – Reading
other people’s email messages is as bad as opening and reading their
letters: This is invading their privacy. Obtaining other people’s non-public
files should be judged the same way as breaking into their rooms and
stealing their documents.
4. Thou shalt not use a computer to steal – Using a computer to break into
the accounts of a company or a bank and transferring money should be
judged the same way as robbery. It is illegal and there are strict laws
against it.
5. Thou shalt not use a computer to bear false witness – The Internet can
spread untruth as fast as it can spread truth. Putting out false
"information" to the world is bad. For instance, spreading false rumors
about a person or false propaganda about historical events is wrong.
Page | 2
6. Thou shalt not copy or use proprietary software for which you have not
paid – Software is an intellectual product. In that way, it is like a book:
Obtaining illegal copies of copyrighted software is as bad as
photocopying a copyrighted book. There are laws against both.
Information about the copyright owner can be embedded by a process
called watermarking into pictures in the digital format.
9. Thou shalt think about the social consequences of the program you are
writing or the system you are designing – You have to think about
computer issues in a more general social framework: Can the program
you write be used in a way that is harmful to society? For example, if you
are working for an animation house, and are producing animated films
for children, you are responsible for their contents. Do the animations
include scenes that can be harmful to children? In the United States, the
Communications Decency Act was an attempt by lawmakers to ban
certain types of content from Internet websites to protect young children
from harmful material. That law was struck down because it violated the
free speech principles in that country's constitution. The discussion, of
course, is going on.
10. Thou shalt always use a computer in ways that ensure consideration and
respect for your fellow humans – Just like public buses or banks, people
using computer communications systems may find themselves in
situations where there is some form of queuing and you have to wait for
Page | 3
your turn and generally be nice to other people in the environment. The
fact that you cannot see the people you are interacting with does not
mean that you can be rude to them.
References
● https://explorable.com/hawthorne-effect
● https://methods.sagepub.com/book/key-concepts-in-social-
research/n22.xml
● https://online.visual-paradigm.com/diagrams/tutorials/use-case-
diagram-tutorial/
● https://sites.google.com/site/2012itcs371devsec3fuzzysystem3/3
● https://www.investopedia.com/terms/c/click_and_mortar.asp
● https://www.mbaskool.com/business-concepts/marketing-and-strategy-
terms/2587click-only-companies.html
● https://www.sciencedirect.com/topics/computer-science/sequence-
diagram
● https://www.slideshare.net/fajarbaskoro/systems-request
● https://www.tutorialspoint.com/software_engineering/case_tools_overvi
ew.htm
● https://www.visualparadigm.com/support/documents/vpuserguide/2821/
286/7114_drawingbusin.html
● https://www.youtube.com/watch?v=DMPxxijmG7M&fbclid=IwAR0hx6Uo
4PSlgqmMmAO eX4e_R6mq0s4nMw-iwcXUOiixRkvkHeWxK8UTQj8
● https://www.youtube.com/watch?v=rAR5sbaphwU&fbclid=IwAR3EXVa8
Rag6iV8zFswXcF hRFOB_FaiEa7QD6QMukGoyaiQ6cRLH30xiCtY
● McCombes, S. (2020, January 13). How to Do a Case Study: Examples
and Methods.
Retrieved June 7, 2020, from
https://www.scribbr.com/methodology/case-study/
● NewLeaf. (2012). ROI or Payback Period? Retrieved June 7, 2020, from
https://newleafllc.com/2012/08/roi-or-payback-period/
● Requirements Modeling. Part 1
https://www.youtube.com/watch?v=2t0ichoFHG8 Part 2
https://www.youtube.com/watch?v=1u5KQh_B1_U
● ROSENBLATT, H. (2014) Systems Analysis and Design, 10th edition.
Shelly Cashman Series. Cengage Learning
● Top five causes of scope creep ... and what to do about them. A Guide to
the Project Management Body of Knowledge (PMBOK® Guide)—Fourth
edition https://www.pmi.org/learning/library/top-five-causes-scope-
creep-6675
Page | 4
● Feronika, N. (2018, January 15). Systems Analysis Activities. School of
Information Systems. https://sis.binus.ac.id/2018/01/15/systems-
analysis-activities/
● System Development Lifecycle (SDLC) | Michigan Tech Information
Technology. (n.d.). Michigan Technological University.
https://www.mtu.edu/it/security/policies-
proceduresguidelines/information-security-program/system-
development-lifecycle/
● Thakur, D. (2013, January 30). What is system maintenance? What are
its different types. Computer Notes.
https://ecomputernotes.com/mis/implementation-andevaluation/what-is-
system-maintenance-what-are-its-different-types
Page | 5