Podcast
Questions and Answers
What does the term 'netiquette' primarily address?
What does the term 'netiquette' primarily address?
- The technical standards of internet protocols.
- The legal aspects of online communication.
- The methods for securing network infrastructure.
- The proper way to communicate in an online environment. (correct)
Why aren't emoticons appropriate for professional communication?
Why aren't emoticons appropriate for professional communication?
- They are generally considered unprofessional in formal contexts. (correct)
- They are difficult to render across different platforms.
- They may not accurately translate the sender's emotional state.
- They are not universally understood across cultures.
What is the main reason for proofreading messages before sending them?
What is the main reason for proofreading messages before sending them?
- To ensure compatibility with older devices.
- To apply advanced formatting.
- To utilize the latest encryption technologies.
- To ensure the message is concise, effective and free of errors. (correct)
Why is it important to seek permission before sharing material from another source online?
Why is it important to seek permission before sharing material from another source online?
Which rule of netiquette is most closely related to empathy and understanding in online communication?
Which rule of netiquette is most closely related to empathy and understanding in online communication?
What is a key aspect of respecting diversity in viewpoints when communicating online?
What is a key aspect of respecting diversity in viewpoints when communicating online?
Which of the following most accurately reflects the meaning of 'cybercrime'?
Which of the following most accurately reflects the meaning of 'cybercrime'?
Republic Act No. 10175, also known as the Cybercrime Prevention Act of 2012, primarily focuses on:
Republic Act No. 10175, also known as the Cybercrime Prevention Act of 2012, primarily focuses on:
What constitutes copyright infringement?
What constitutes copyright infringement?
How does plagiarism violate ethical standards in digital environments?
How does plagiarism violate ethical standards in digital environments?
What is the key difference between 'offline' and 'online' computer addiction?
What is the key difference between 'offline' and 'online' computer addiction?
According to the discussion, what is the penalty for hacking into critical infrastructure systems in the Philippines, involving the use of malware?
According to the discussion, what is the penalty for hacking into critical infrastructure systems in the Philippines, involving the use of malware?
Which activity is classified as computer-related identity theft?
Which activity is classified as computer-related identity theft?
What distinguishes digital piracy from other forms of cybercrime?
What distinguishes digital piracy from other forms of cybercrime?
What is the primary focus of the Anti-Bullying Act of 2013 (RA 10627)?
What is the primary focus of the Anti-Bullying Act of 2013 (RA 10627)?
In the context of cyber law, what does the term 'cybersex' refer to?
In the context of cyber law, what does the term 'cybersex' refer to?
Under Republic Act No. 9775, also known as the Anti-Child Pornography Act of 2009, what activities are considered illegal?
Under Republic Act No. 9775, also known as the Anti-Child Pornography Act of 2009, what activities are considered illegal?
How is 'cyber defamation' defined?
How is 'cyber defamation' defined?
What is the general definition of 'hacking' in the context of internet threats?
What is the general definition of 'hacking' in the context of internet threats?
Malware is short for:
Malware is short for:
How does a computer virus typically spread?
How does a computer virus typically spread?
What distinguishes a worm from a virus?
What distinguishes a worm from a virus?
What is the primary characteristic of a Trojan horse?
What is the primary characteristic of a Trojan horse?
If a program is running in the background of your computer without your knowledge and is monitoring your activity, what type of malware is most likely present?
If a program is running in the background of your computer without your knowledge and is monitoring your activity, what type of malware is most likely present?
How does 'pharming' typically operate?
How does 'pharming' typically operate?
What is a key characteristic of ransomware?
What is a key characteristic of ransomware?
What is the primary purpose of 'spam'?
What is the primary purpose of 'spam'?
Your colleague consistently uses ALL CAPS in their emails. According to netiquette, what is the best way to address this?
Your colleague consistently uses ALL CAPS in their emails. According to netiquette, what is the best way to address this?
You receive an email from an unknown sender asking for your bank account details to verify a transaction. What should you do?
You receive an email from an unknown sender asking for your bank account details to verify a transaction. What should you do?
You notice a colleague frequently shares confidential company documents on their personal social media account. What is the most appropriate course of action?
You notice a colleague frequently shares confidential company documents on their personal social media account. What is the most appropriate course of action?
You are in a group chat and a disagreement arises. Several participants begin using insults and personal attacks. What is the most effective way to de-escalate the situation, adhering to the principles of netiquette?
You are in a group chat and a disagreement arises. Several participants begin using insults and personal attacks. What is the most effective way to de-escalate the situation, adhering to the principles of netiquette?
Your company's IT system has been infected with ransomware. What immediate steps should be taken to minimize the damage?
Your company's IT system has been infected with ransomware. What immediate steps should be taken to minimize the damage?
A website you frequently visit suddenly redirects to a different page that looks similar but asks for your login credentials. This is most likely an example of which type of internet threat?
A website you frequently visit suddenly redirects to a different page that looks similar but asks for your login credentials. This is most likely an example of which type of internet threat?
Flashcards
Netiquette
Netiquette
A set of rules for behaving properly online, concerned with the proper way to communicate in an online enviroment.
Golden Rule of Netiquette
Golden Rule of Netiquette
Treat others with the same respect that you would like to receive. Avoid confrontational or offensive language.
Clarity in Communication
Clarity in Communication
Using correct terminology, spelling, and grammar that can easily be understood, avoid texting shortcuts.
Screaming
Screaming
Signup and view all the flashcards
Proofread Messages
Proofread Messages
Signup and view all the flashcards
Exercise Good Judgement
Exercise Good Judgement
Signup and view all the flashcards
Protect Personal Information
Protect Personal Information
Signup and view all the flashcards
Avoid Plagiarism
Avoid Plagiarism
Signup and view all the flashcards
Respect Diversity in Viewpoints
Respect Diversity in Viewpoints
Signup and view all the flashcards
Computer Ethics
Computer Ethics
Signup and view all the flashcards
Rule 1 of Computer Ethics
Rule 1 of Computer Ethics
Signup and view all the flashcards
Rule 2 of Computer Ethics
Rule 2 of Computer Ethics
Signup and view all the flashcards
Cybercrime
Cybercrime
Signup and view all the flashcards
Republic Act No. 10175
Republic Act No. 10175
Signup and view all the flashcards
Republic Act No. 10173
Republic Act No. 10173
Signup and view all the flashcards
Copyright
Copyright
Signup and view all the flashcards
Copyright Infringement
Copyright Infringement
Signup and view all the flashcards
Plagiarism
Plagiarism
Signup and view all the flashcards
Computer Addiction
Computer Addiction
Signup and view all the flashcards
Hacking
Hacking
Signup and view all the flashcards
Reclusion Temporal
Reclusion Temporal
Signup and view all the flashcards
Computer-Related Forgery
Computer-Related Forgery
Signup and view all the flashcards
Illegal Downloading
Illegal Downloading
Signup and view all the flashcards
Digital Piracy
Digital Piracy
Signup and view all the flashcards
Cyberbullying
Cyberbullying
Signup and view all the flashcards
Cybersex
Cybersex
Signup and view all the flashcards
Hacking
Hacking
Signup and view all the flashcards
Malware
Malware
Signup and view all the flashcards
Virus
Virus
Signup and view all the flashcards
Worms
Worms
Signup and view all the flashcards
Trojan Horses
Trojan Horses
Signup and view all the flashcards
Spyware
Spyware
Signup and view all the flashcards
Pharming
Pharming
Signup and view all the flashcards
Ransomware
Ransomware
Signup and view all the flashcards
Spam
Spam
Signup and view all the flashcards
Study Notes
Chapter 4: Netiquette and Computer Ethics
Lesson 1: Netiquette
- Netiquette is a combination of "net" (internet) and "etiquette" (manners).
- It defines the proper way to communicate in an online environment.
- It is the set of rules for behaving properly online.
- The Golden Rule applies: treat others with the same respect you expect to receive, avoiding confrontational or offensive language.
- It's sometimes acceptable to use appropriate emoticons to convey meaning, but emoticons are inappropriate in professional communications.
- Avoid using slang, acronyms, and text abbreviations to ensure clear communication in college and business settings, using "your" instead of "ur".
- Avoid "screaming" by typing entire messages in capital letters.
- Emphasize words or phrases using italics, bold text, different colors, or special characters.
- Proofread messages before sending to ensure effective communication and correct spelling, grammar, accuracy, and appropriate content and recipients.
- Exercise good judgment when sharing information online
Sharing Information Online
- Email and chat messages are considered private and shouldn't be forwarded or copied without consent.
- To protect privacy and safety, sensitive personal information should never be shared online, to include:
- Home address and phone number
- Personal conversations
- Social plans
- Financial data (usernames, passwords, hints)
- Anything personal that should not be shared
- Always get permission from the original author or copyright holder to avoid plagiarism.
Respecting Diversity in Viewpoints
- Be constructive and respectful when sharing opinions, beliefs, or criticisms.
Top 10 Commandments of Computer Ethics
- Remember the Human.
- Adhere to the same standards of behavior online as in real life.
- Know where you are in cyberspace.
- Respect other people's time and bandwidth.
- Make yourself look good online.
- Share expert knowledge.
- Help keep flame wars under control.
- Respect other people's privacy.
- Don't abuse your power.
- Be forgiving of other people's mistakes.
Lesson 2: Cybercrimes
- Cyber is characteristic of computer, information, technology, and virtual reality culture.
- Cybercrime is when a computer is the object of the crime or is used as a tool to commit an offense, like hacking, phishing, spamming, and child pornography.
- Cybercriminals use computer technology to access personal data, business secrets, or exploit the internet.
- Republic Act No. 10175, the Cybercrime Prevention Act of 2012, addresses legal issues related to online activity and the internet in the Philippines.
- Republic Act No. 10173, the Data Privacy Act of 2012, protects individual personal information.
Common Forms of Cybercrimes
- Copyright: exclusive legal right to print, publish, perform, film, or record literary, artistic, or musical material
- Copyright infringement defined as the violation, piracy, or theft of a copyright holder's rights.
- Plagiarism: closely imitating another author's language and thoughts without authorization.
- Computer Addiction
- Offline: excessive gaming behavior.
- Online: "Internet Addiction"; related to excessive Internet use.
- Virtual Self: the persona that is created in the virtual space.
Criminal Activities
- Hacking
- Illegal Access; Illegal Interception; Data Interference; System Interference; Misuse of Devices.
- Infection of IT Systems with Malware against critical infrastructure of the Philippines can result in 12-20 years reclusion temporal.
- Six to twelve years of imprisonment: prison mayor.
- Computer-related forgery, fraud, and/or identity theft involve stealing sensitive information like usernames, passwords, and card details.
- Includes phishing, pharming and spam.
- The maximum penalty is Php 200,000 fine or prison mayor.
- Electronic Theft
- Illegal Downloading: obtaining files from the internet without the right to use them.
- Digital Piracy: illegally copying & selling digital music, video, computer software.
- Copyright Infringement is punishable by a fine of Php 50,000 – 500,000 and or prison mayor.
- Cyberbullying: bullying via electronic communication, is covered by The Anti-Bullying Act of 2013 (RA 10627).
- Cybersex includes any lascivious exhibition of sexual organs/activity with the aid of a computer system.
- The penalty is at least Php 200,000 and or prison mayor.
- Child Pornography: a form of child sexual exploitation.
- This is punishable by Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed via a computer system.
- The penalty is 12-20 years of imprisonment or reclusion temporal.
- Cyber Defamation: an unprivileged false statement that harms someone's reputation with a penalty of 6-12 years imprisonment or prison mayor.
Lesson 3: Internet Threats
- Hacking
- Gaining unauthorized access to a computer, facilitated by online availability of tools, techniques, and malware.
Types of Threats
- Malware stands for malicious software
- A common ways to infiltrate or damage your computer.
Types of Malware
- Virus
- A malicious program that infects via email attachments, downloads, can automatically download from a site.
- Worms
- Common threat that goes to work without attaching to program files
- Trojan Horses
- Malicious program disguised as useful to trick user to download leaving a PC unprotected.
- Spyware
- A program runs in the background logging activity and keystrokes.
- For example: Keyloggers monitor activity.
- Pharming
- Online fraud that redirects users to a malicious website.
- Even when the correct URL is entered, can still redirect to a fake website.
- Ransomware
- Is a malware that restricts access to files demanding payment for removal of restriction.
- Infection commonly distributed through phishing emails.
- Spam
- Common method of sending unsolicited messages and pornography.
- Mass distribution via social media sites, company websites, and blogs.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.