Lesson 6
Lesson 6
Lesson 6
LESSON 6
NETIQUETTE: ONLINE MANNER MATTERS
I. Module Overview
This module will give students the insights on the network etiquettes. Specifically,
this module will discuss the following topics:
1. Netiquettes and Its Types
2. Online Security, Safety and Ethics
3. Internet Threats
4. Protecting Reputations Online
Read and analyze carefully the following scenarios. What is your opinion of the
behaviors involved? What equitable solutions can you give?
1. David is an Internet expert. He reads a question from a newcomer
in an online discussion group. For him the answer is easy but the
"newbie" is having trouble. Alan responds, "Hey newbie! Can't you read a
book? Don't ask such a dumb question!"
_______________________________________________________________
________________________________________________________________
________________________________________________________________
___________________________________________________________
2. Josh is really upset about his classmate, M.D. He is so angry that
he decides to post a mean comment about M.D. anonymously in an
online discussion group.
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
3. Marcie is in the middle of an email she is writing to a friend. The
phone rings and Marcie leaves her computer with the email still on the
screen. You decide to check it out.
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
Retrieved from:
https://sites.google.com/site/group5timesavers/home/netiquette-
moduleassessment/case-studies
When you are communicating with others on the internet, good manners and
proper behaviors must always be taken into consideration. These manners and
behaviors must be observed whether you are writing an email message,
participating in the chat session, or posting a message in any social media
platforms.
E L T 1 : L I V I N G I N T H E I T E R A P a g e | 29
What is Netiquette?
• Internet etiquette
• Etiquette of cyberspace
• Concerned with the “proper” way to communicate in an online
environment (https://techterms.com)
• Netiquette (net + etiquette) can be defined as the informal guidelines
developed by the users of the Internet for acceptable online behavior.
These are developed over time in a variety of virtual environments
and internet applications. (Joseph Kayany)
- Netiquette is a made-up word from the words net and etiquette. Netiquette
thus describes the rules of conduct for respectful and appropriate
communication on the internet. Netiquette is often referred to as etiquette
for the internet. ... Netiquette is mostly used for dealing with unknown people
on the internet.
- Netiquette thus describes the rules of conduct for respectful and
appropriate communication on the internet.
Types of Netiquette
1. Netiquette Basics
a. Help the newbies
b. Research before asking
c. Remember emotion
2. Netiquette of Sending
a. Be brief
b. Use whitespaces
c. Use descriptive subject lines
d. Stay on-topic
e. Be careful sending attachment
f. Copy the minimum number of people
3. Netiquette of Replying
a. Acknowledge important communications
b. Check the current information before replying
c. Reference past communications
E L T 1 : L I V I N G I N T H E I T E R A P a g e | 30
One of the fastest and easiest ways that we are relying on when
accessing and retrieving information is through the use of the internet.
Since time immemorial, internet has been considered as the library of all
libraries where we can get lots of information all over the world from
different people, events, and places. Moreover, because of its rapid
change and diverse needs of users, IT experts enhanced and improved
the internet that made it became more powerful. Along with this are the
possible threats and dangers that may be harmful for the people living in
the virtual world. Listed below are the possible threats that netizens must
be aware of when using the internet:
1. Phishing
Defined as a software or program used by an attacker to obtain
personal information
Commonly target user passwords to hack and take control of a
user account.
2. Pharming
A malicious website that resembles a legitimate website, used to
gather usernames and passwords.
3. Malware
Short term for malicious software and is the generic term for
spyware and adware.
A computer software sent by attackers to inflict chaos on a
computer’s operation and processes.
4. Internet scam
A type of scam that misleads the user in many ways attempting to
make lead of them. The purpose is to cheat the target of their
personal property directly rather than private information through
fabricated promises, confidence tricks and many more.
5. Virus and worms
Virus is a program designed to replicate by attaching itself into
other computer programs, data files or boot sector of the hard
drive.
Worm is can be injected into a network by any types of means,
like a USB stick or an email attachment.
Trojan Horse – commonly known as a “Trojan”, is a type of
malware that disguises itself as a normal file or program to trick
users into downloading and installing malware.
Iloveyou Virus – also known a love bug or love letter. A
computer worm attached on email that have infected 10 million
of windows personal computer that cause computer shutdown
and deletion of files on the year 2000. Created by Filipino
students Onel De Guzman and reonel Ramones.
6. Computer Bug
A malfunction of computer system through its runtime.
The term “bug” originated to the Moth found on the Mark II by
Grace Hopper that cause a system malfunction.
7. Cyber Stalking
The use of the internet or other electronic device to harass or stalk
individual, group or organization.
8. Cyber Bullying
The act of tormenting, threatening, harassing or embarrassing
another person using the internet or other technologies.
E L T 1 : L I V I N G I N T H E I T E R A P a g e | 31
9. Spam
An unsolicited email, instant messages, or social media
messages. These messages are fairly easy to spot and can be
damaging if you open it.
10. Spoofing
Describes a criminal who impersonates another individual or
organization, with the intent to gather personal or business
information.
Ten Core Roles of Netiquette
4 Rule No.2: Adhere to the same standards online that you follow in real life
You need to behave the same way online that you do in real life. You need to remember
that you can get caught doing things you should not be doing online just like you can in
real life. You are still talking to a real person with feelings even though you can’t see
them.
13 Etiquette There are etiquette rules for messages also. They are as follows: Check
your daily Delete unwanted messages. Keep messages in your box to a minimum Mail
messages can be downloaded and save for future references. Never assume that you
can be read by no one but yourself. Remember there are always people lurking around
online
Thou shalt think about the social consequences of the program you write.
Thou shalt use a computer in ways that show consideration and respect.
REFERENCE