MODULE 4: THE NETIQUETTE AND THE COMPUTER ETHICS (Module Version)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Avoid Slang, Acronyms, and Text Talk

Communicating effectively in college and business environments requires the use of correct terminology, spelling, and grammar that can easily be understood. For example, use "your" instead of "ur".

1. Do not pay the ransom. These threats are meant to scare and intimidate you, and they do not come from a law enforcement agency. Even if you submit payment, there is no guarantee that you will regain access to your system. 2. If your computer has been infected (i.e., you are unable to access your computer or your files have been encrypted), contact a reputable computer technician or specialist to find out whether your computer can be repaired and your data retrieved. 3. In order to lessen the impact of a ransomware infection, be sure to regularly back-up your data with a removable external storage drive. It's possible that your files might be irretrievable; having an up-to-date backup could be invaluable.

What you can do if you encounter a ransomware?

Child Pornography

•Is a form of child sexual exploitation. • Unlawful or prohibited acts defined and punishable by Republic Act No. 9775 (Anti-Child Pornography Act of 2009), committed through a computer system. • Penalty of 12-20 years of imprisonment or reclusion temporal

Trojan Horses

A malicious program that is disguised as, or embedded within, legitimate software. It is an executable file that will install itself and run automatically once it's downloaded. What it can do: 1. Delete your files. 2. Use your computer to hack other computers. 3. Watch you through your webcam. 4. Log your keystrokes (such as a credit card number you entered in an online purchase). 5. Record usernames, passwords, and other personal information.

RULE 2

Adhere to the same standards of behavior online that you follow in real life. While standards of behavior may be different in the virtual world, they certainly should not be lower. You should do your best to act within society's laws and ethical manners whenever you inhabit "cyberspace." Would you behave rudely to someone face-to-face? On most occasions, no. Neither should you behave this way in the virtual world.

Online Computer Addiction

Also known as "Internet Addiction", gets more attention in general from scientific research than offline computer addiction, mainly because most cases of computer addiction are related to the excessive use of the Internet.

Plagiarism

An act or instance of using or closely imitating the language and thoughts of another author without authorization.

Computer-Related Forgery, Fraud and/or Identity Theft

An attempt to obtain sensitive information such as usernames, passwords, and credit card details and (indirectly money), often for malicious reasons. •Phishing •Pharming •Spam •Maximum of P200,000 fine or prison mayor

Worms

Are a common threat to computers and the Internet as a whole. Unlike a virus, it goes to work on its own without attaching itself to files or programs. It lives in your computer memory, doesn't damage or alter the hard drive, and propagates by sending itself to other computers in a network - whether within a company or the Internet itself. What they can do: 1. Spread to everyone in your contact list. 2. Cause a tremendous amount of damage by shutting down parts of the Internet, wreaking havoc on an internal network, and costing companies enormous amounts of lost revenue.

Spyware (Spyware & Adware)

Are often used by third parties to infiltrate your computer. It is a form of software that collects personal information about you without you knowing. They often come in the form of a 'free' download and are installed automatically with or without your consent. These are difficult to remove and can infect your computer. What it can do: 1. Collect information about you without you knowing about it and give it to third parties. 2. Send your usernames, passwords, surfing habits, list of applications you've downloaded, settings, and even the version of your operating system to third parties. 3. Change the way your computer runs without your knowledge. 4. Take you to unwanted sites or inundate you with uncontrollable pop-up ads.

RESPECT DIVERSITY IN VIEWPOINTS

Be constructive and respectful when sharing opinions, beliefs, and criticisms, or responding to those of others in the conversation. (1) When sharing a viewpoint that differs from someone else's, it is a best practice to first acknowledge the other person by briefly restating what he or she said, but in your own words. This lets the person know that you are listening and trying to understand them. (2) When presenting an opinion or criticism, it is helpful to use phrases that identify to whose point of view you are referring. If the opinion is yours, you can begin with the phrase "In my experience" or "In my opinion". If it is a viewpoint of someone else, make sure you identify that in your message (Example: "According to Eric Ericson," or "The president believes").

RULE 10

Be forgiving of other people's mistakes. Not everyone has the same amount of experience working in the virtual world. And not everyone knows the rules of netiquette. At some point, you will see a stupid question, read an unnecessarily long response, or encounter misspelled words; when this happens, practice kindness and forgiveness as you would hope someone would do if you had committed the same offense. If it's a minor "offense," you might want to let it slide. If you feel compelled to respond to a mistake, do so in a private email rather than a public forum.

RULE 9

Don't abuse your power. Just like in face-to-face situations, there are people in cyberspace who have more "power" than others. They have more expertise in technology or they have years of experience in a particular skill or subject matter. Maybe it's you who possesses all of this knowledge and power! Just remember: knowing more than others do or having more power than others may have does not give you the right to take advantage of anyone. Think of Rule 1: Remember the human

EXERCISE GOOD JUDGMENT WHEN SHARING INFORMATION WITH OTHERS ONLINE

E-mail and chat messages that you send or receive are considered private and should not be forwarded or copied to others without gaining the consent of all involved participants. In general, messages posted to discussion boards and social media sites can be read by the public. You may never know who might read or share what you post. It is a good practice to always ask a post's author for permission before sharing a post with other parties

Remember the Golden Rule

Even though you may be interacting with a computer screen, you are communicating with a real person who will react to your message. Make a good impression - treat others with the same respect that you would like to receive and avoid confrontational or offensive language.

Offline Computer Addiction

Generally used when speaking about excessive gaming behavior, which can be practiced both offline and online.

RULE 7

Help keep flame wars under control. What is meant by "flaming" and "flame wars?" "Flaming is what people do when they express a strongly held opinion without holding back any emotion." (Shea, 1994). For example, consider the kinds of passionate comments you might read on a sports blog. While "flaming" is not necessarily forbidden in virtual communication, "flame wars," when two or three people exchange angry posts with one another, must be controlled or the camaraderie of the group could be compromised. Please don't feed the flames; extinguish them by guiding the discussion back to a more productive direction.

Infection of IT Systems with Malware

If the act is committed against critical infrastructure of the Philippines the, penalty is between 12-20 years reclusion temporal • Six years up to twelve years of imprisonment also known as prison mayor.

Pharming

Is a common type of online fraud. A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website. What it can do: 1. Convince you that the site is real and legitimate by spoofing or looking almost identical to the actual site down to the smallest details. You may enter your personal information and unknowingly give it to someone with malicious intent.

Republic Act No. 10175 (Cybercrime Prevention Act of 2012)

Is a law in the Philippines approved on September 12,2012 which aims to address legal issues concerning online interactions and internet.

Hacking

Is a term used to describe actions taken by someone to gain unauthorized access to a computer? The availability of information online on tools, techniques, and malware makes it easier for even non-technical people to undertake malicious activities. The process by which cyber criminals gain access to your computer. What it can do: 1. Find weaknesses (or pre-existing bugs) in your security settings and exploit them in order to access your information. 2. Install a Trojan horse, providing a back door for hackers to enter and search for your information.

Ransomware

Is a type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed. The two most common means of infection appear to be phishing emails that contain malicious attachments and website pop-up advertisements. Will display a notification stating that your computer or data has been locked and demanding a payment be made for you to regain access. Sometimes the notification states that authorities have detected illegal activity on your computer and that the payment is fine to avoid prosecution.

Republic Act No. 10173 (Data Privacy Act of 2012)

Is an act protecting individual personal information.

Cyber Defamation

Is an unprivileged false statement of fact which tends to harm the reputation of a person or company. • Penalty of 6-12 years of imprisonment or prison mayor.

Netiquette

Is concerned with the "proper" way to communicate in an online environment. Consider the following "rules," adapted from Virginia Shea's the Core Rules of Netiquette, whenever you communicate in the virtual world.

Lockscreen Ransomware

It displays an image that prevents you from accessing your computer.

Encryption Ransomware

It encrypts files on your system's hard drive and sometimes on shared network drives, USB drives, external hard drives, and even some cloud storage drives, preventing you from opening them.

Electronic Theft

It includes illegal downloading, obtaining files that you do not have the right to use from the internet, digital piracy, and the practice of illegally copying and selling digital music, video, computer software, etc. •Copyright Infringement •Penalty of Php 50,000 - 500, 000 and or prison mayor

Wi-Fi Eavesdropping

It is another method used by cyber criminals to capture personal information. Virtual "listening in" on information shared over an unsecured (not encrypted) Wi-Fi network. What it can do: 1. Potentially access your computer with the right equipment. 2. Steal your personal information including logins and passwords.

CYBER

It is characteristic of the culture of computers, information, technology, and virtual reality.

CYBERCRIME

It is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming, and child pornography) and is used as a tool to commit an offense.

Spam

It is one of the more common methods of both sending information out and collecting it from unsuspecting people. The mass distribution of unsolicited messages, advertising, or pornography to addresses that can be easily found on the Internet through things like social networking sites, company websites, and personal blogs. What it can do: 1. It annoys you with unwanted junk mail. 2. Create a burden for communications service providers and businesses to filter electronic messages. 3. Phish for your information by tricking you into following links or entering details with too-good-to-be-true offers and promotions. 4. Provide a vehicle for malware, scams, fraud, and threats to your privacy.

Malware

It is one of the more common ways to infiltrate or damage your computer. Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware. What it can do: 1. Intimidate you with scareware, which is usually a pop-up message that tells you your computer has a security problem or other false information. 2. Reformat the hard drive of your computer causing you to lose all your information. 3. Alter or delete files. 4. Steal sensitive information. 5. Send emails on your behalf. 6. Take control of your computer and all the software running on it.

FLAMING

It is what people do when they express a strongly held opinion without holding back any emotion." (Shea, 1994). For example, consider the kinds of passionate comments you might read on a sports blog.

RULE 3

Know where you are in cyberspace "Netiquette varies from domain to domain." (Shea, 1994) Depending on where you are in the virtual world, the same written communication can be acceptable in one area, whereas it might be considered inappropriate in another. What you text to a friend may not be appropriate in an email to a classmate or colleague. Can you think of another example?

Viruses

Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting your computer, as well as the computers of everyone in your contact list. Just visiting a site can start an automatic download of a virus.

RULE 5

Make yourself look good in online writing. One of the best things about the virtual world is the lack of judgment associated with your physical appearance, the sound of your voice, or the clothes you wear (unless you post a video of yourself singing Karaoke in a clown outfit.) You will, however, be judged by the quality of your writing, so keep the following tips in mind: Always check for spelling and grammar errors Know what you are talking about and state it clearly Be pleasant and polite

PROOFREAD YOUR MESSAGES BEFORE SENDING THEM

Proofreading your messages before you send them is a best practice for effective and efficient communication. Strive to make your communications concise and free of any: •Spelling and grammar errors •Confusing terms or phrases that could be misunderstood •Errors of omission, such as missing content or recipients •Errors in accuracy of information

RULE 1

Remember the Human. When communicating electronically, whether through email, instant message, discussion post, text, or some other method, practice the Golden Rule: Do unto others as you would have others do unto you. Remember, your written words are read by real people, all deserving of respectful communication. Before you press "send" or "submit," ask yourself, "Would I be okay with this if someone else had written it?"

RULE 8

Respect other people's privacy. Depending on what you are reading in the virtual world, be it an online class discussion forum, Facebook page, or email, you may be exposed to some private or personal information that needs to be handled carefully. Perhaps someone is sharing medical news about a loved one or discussing a situation at work. What would happen if this information "got into the wrong hands?" Embarrassment? Hurt feelings? Loss of a job? Just as you expect others to respect your privacy, so should you respect the privacy of others. Be sure to err on the side of caution when deciding to discuss or not to discuss virtual communication.

RULE 4

Respect other people's time and bandwidth electronic communication takes time: time to read and time in which to respond. Most people today lead busy lives as you do and do not have time to read or respond to frivolous emails or discussion posts. As a virtual world communicator, it is your responsibility to make sure that the time spent reading your words is well-spent. Make your written communication meaningful and to the point, without extraneous text or superfluous graphics, or attachments that may take forever to download.

RULE 6

Share expert knowledge. The Internet offers its users many benefits; one is the ease with which information can be shared or accessed. In fact, this "information sharing" capability is one of the reasons the Internet was founded. So, in the spirit of the Internet's "founding fathers," share what you know! When you post a question and receive intelligent answers, share the results with others. Are you an expert at something? Could you post resources and references about your subject matter? Recently expanded your knowledge about a subject that might interest others? Share that as well.

Prison Mayor

Six years up to twelve years of imprisonment also known as?

COPYRIGHT

The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.

Virtual Self

The persona you create about yourself virtually.

Cyberbullying

The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature. • The Anti-Bullying Act of 2013 (RA 10627)

Copyright Infringement

The violation, piracy or theft of a copyright holder's exclusive rights through the unauthorized use of a copyrighted material or work.

CYBERCRIMINALS

They may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes.

Phishing

This is also known as "spoofing". It is used most often by cybercriminals because it's easy to execute and can produce the results they're looking for with very little effort. Fake emails, text messages, and websites are created to look like they're from authentic companies. They're sent by criminals to steal personal and financial information from you. What it does: 1. Trick you into giving them information by asking you to update, validate or confirm your account. It is often presented in a manner that seems official and intimidating, to encourage you to take action. 2. Provides cyber criminals with your username and password so that they can access your accounts (your online bank account, shopping accounts, etc.) and steal your credit card numbers.

➢ Your home address or phone number ➢ Personal conversations ➢ Social plans, such as vacations ➢ Financial information ➢ Usernames, passwords, or hints ➢ Anything personal that you would not want to be shared by others over the Internet

To protect your privacy and safety, do not share online any sensitive personal information such as:

AVOID "SCREAMING" IN TYPED MESSAGES

Typing an entire message using all capital letters is known as "screaming". It is distracting and generally frowned upon in professional environments. It is better to draw emphasis to selected words or phrases by: using italic or bold text; using a different color for text or background color; or denoting emphasis using special characters (Example: **Important**).

SCREAMING

Typing an entire message using all capital letters is known as?

Hacking

Unauthorized access of or interference with computer systems, servers, or other information and communication systems. Unauthorized access to corrupt, alter, steal, or destroy electronic data using computers or other information and communication systems without the computer or system owner's knowledge and consent. The introduction of computer viruses resulting in the corruption, alteration, theft, or loss of such data • Illegal Access • Illegal Interception • Data Interference • System Interference • Misuse of Devices

FLAME WARS

When two or three people exchange angry posts with one another, must be controlled or the camaraderie of the group could be compromised.

Cybersex

Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration. There is a discussion on this matter if it involves "couples" or "people in relationship" who engage in cybersex. • Penalty at least Php 200,000 and or prison mayor


Set pelajaran terkait

Effects of HIV infection on the immune system

View Set

Business & Personal Law Chapter 1: The Law and the Courts

View Set

chemistry ch 12 Introduction to Organic

View Set

Jarvis Health Assessment Adaptive Quizzing CH 1-11

View Set