Netiquette and Computer Ethics

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What does the term 'netiquette' primarily address?

  • The technical standards of internet protocols.
  • The legal aspects of online communication.
  • The methods for securing network infrastructure.
  • The proper way to communicate in an online environment. (correct)

Why aren't emoticons appropriate for professional communication?

  • They are generally considered unprofessional in formal contexts. (correct)
  • They are difficult to render across different platforms.
  • They may not accurately translate the sender's emotional state.
  • They are not universally understood across cultures.

What is the main reason for proofreading messages before sending them?

  • To ensure compatibility with older devices.
  • To apply advanced formatting.
  • To utilize the latest encryption technologies.
  • To ensure the message is concise, effective and free of errors. (correct)

Why is it important to seek permission before sharing material from another source online?

<p>To respect copyright laws and avoid plagiarism. (A)</p> Signup and view all the answers

Which rule of netiquette is most closely related to empathy and understanding in online communication?

<p>Remembering the human on the other side. (A)</p> Signup and view all the answers

What is a key aspect of respecting diversity in viewpoints when communicating online?

<p>Acknowledging others' viewpoints before expressing your own. (C)</p> Signup and view all the answers

Which of the following most accurately reflects the meaning of 'cybercrime'?

<p>Crime in which a computer is used as a tool to commit an offense. (A)</p> Signup and view all the answers

Republic Act No. 10175, also known as the Cybercrime Prevention Act of 2012, primarily focuses on:

<p>Addressing legal issues concerning online interactions and the internet. (B)</p> Signup and view all the answers

What constitutes copyright infringement?

<p>The unauthorized use of a copyright holder's exclusive rights. (A)</p> Signup and view all the answers

How does plagiarism violate ethical standards in digital environments?

<p>By misrepresenting someone else's work as one's own. (B)</p> Signup and view all the answers

What is the key difference between 'offline' and 'online' computer addiction?

<p>Online addiction receives more scientific attention due to the broad impact of internet use. (D)</p> Signup and view all the answers

According to the discussion, what is the penalty for hacking into critical infrastructure systems in the Philippines, involving the use of malware?

<p>Imprisonment of 12-20 years (reclusion temporal). (D)</p> Signup and view all the answers

Which activity is classified as computer-related identity theft?

<p>Attempting to obtain sensitive information such as passwords and credit card details for malicious reasons. (D)</p> Signup and view all the answers

What distinguishes digital piracy from other forms of cybercrime?

<p>Digital Piracy involves illegally copying and selling digital goods (A)</p> Signup and view all the answers

What is the primary focus of the Anti-Bullying Act of 2013 (RA 10627)?

<p>Addressing and preventing bullying through electronic communication. (B)</p> Signup and view all the answers

In the context of cyber law, what does the term 'cybersex' refer to?

<p>Willful engagement of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system. (B)</p> Signup and view all the answers

Under Republic Act No. 9775, also known as the Anti-Child Pornography Act of 2009, what activities are considered illegal?

<p>Child sexual exploitation committed through a computer system. (A)</p> Signup and view all the answers

How is 'cyber defamation' defined?

<p>An non-privileged false statement of fact which tends to harm the reputation of a person or company. (D)</p> Signup and view all the answers

What is the general definition of 'hacking' in the context of internet threats?

<p>The act of gaining unauthorized access to a computer system or network. (B)</p> Signup and view all the answers

Malware is short for:

<p>Malicious software. (D)</p> Signup and view all the answers

How does a computer virus typically spread?

<p>Through email attachments, downloads, or visiting infected websites. (B)</p> Signup and view all the answers

What distinguishes a worm from a virus?

<p>A worm goes to work on its own without attaching itself to files or programs, while a virus requires a host file. (A)</p> Signup and view all the answers

What is the primary characteristic of a Trojan horse?

<p>It disguises itself as a useful program to gain access to a system. (B)</p> Signup and view all the answers

If a program is running in the background of your computer without your knowledge and is monitoring your activity, what type of malware is most likely present?

<p>Spyware. (C)</p> Signup and view all the answers

How does 'pharming' typically operate?

<p>By redirecting users to malicious websites, even if the correct URL is entered. (B)</p> Signup and view all the answers

What is a key characteristic of ransomware?

<p>It restricts access to a computer or files and demands payment for the restriction to be removed. (D)</p> Signup and view all the answers

What is the primary purpose of 'spam'?

<p>To send out unsolicited information or collect information from unsuspecting people. (B)</p> Signup and view all the answers

Your colleague consistently uses ALL CAPS in their emails. According to netiquette, what is the best way to address this?

<p>Politely inform them that using all caps can be perceived as shouting. (D)</p> Signup and view all the answers

You receive an email from an unknown sender asking for your bank account details to verify a transaction. What should you do?

<p>Delete the email immediately without clicking on any links. (B)</p> Signup and view all the answers

You notice a colleague frequently shares confidential company documents on their personal social media account. What is the most appropriate course of action?

<p>Report the behavior to your supervisor or HR department, as it violates company policy and could have legal implications. (C)</p> Signup and view all the answers

You are in a group chat and a disagreement arises. Several participants begin using insults and personal attacks. What is the most effective way to de-escalate the situation, adhering to the principles of netiquette?

<p>Acknowledge the emotional tone while staying polite while trying to understand others' viewpoints (C)</p> Signup and view all the answers

Your company's IT system has been infected with ransomware. What immediate steps should be taken to minimize the damage?

<p>Disconnect affected systems from the network to prevent further spread, and contact the IT department or a cybersecurity expert. (C)</p> Signup and view all the answers

A website you frequently visit suddenly redirects to a different page that looks similar but asks for your login credentials. This is most likely an example of which type of internet threat?

<p>Pharming. (A)</p> Signup and view all the answers

Flashcards

Netiquette

A set of rules for behaving properly online, concerned with the proper way to communicate in an online enviroment.

Golden Rule of Netiquette

Treat others with the same respect that you would like to receive. Avoid confrontational or offensive language.

Clarity in Communication

Using correct terminology, spelling, and grammar that can easily be understood, avoid texting shortcuts.

Screaming

Typing an entire message using all capital letters.

Signup and view all the flashcards

Proofread Messages

Proofreading messages before sending is a best practice for effective and efficient communication.

Signup and view all the flashcards

Exercise Good Judgement

E-mail and chat messages that you send or receive are considered private and should not be forwarded or copied to others without gaining the consent of all involved participants.

Signup and view all the flashcards

Protect Personal Information

Do not share online any sensitive personal information, such as address and phone number, personal conversations, social plans, financial information, usernames, passwords, or hints.

Signup and view all the flashcards

Avoid Plagiarism

If the material you share with others online came from another source, make every effort to gain permission from the original author or copyright holder.

Signup and view all the flashcards

Respect Diversity in Viewpoints

Be constructive and respectful when sharing opinions, beliefs, and criticisms, or responding to those of others in the conversation.

Signup and view all the flashcards

Computer Ethics

A set of moral principles that regulate the use of computers. They outline how users should behave online and offline, and they offer guidelines for creating new forms of technology.

Signup and view all the flashcards

Rule 1 of Computer Ethics

Remember the Human.

Signup and view all the flashcards

Rule 2 of Computer Ethics

Adhere to the same standards of behavior online that you follow in real life.

Signup and view all the flashcards

Cybercrime

A crime in which a computer is the object of the crime or is used as a tool to commit an offense.

Signup and view all the flashcards

Republic Act No. 10175

A law in the Philippines approved on September 12, 2012, which aims to address legal issues concerning online interactions and internet.

Signup and view all the flashcards

Republic Act No. 10173

An act protecting individual personal information.

Signup and view all the flashcards

Copyright

The exclusive legal right given to an originator to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.

Signup and view all the flashcards

Copyright Infringement

Violation, piracy, or theft of a copyright holder's exclusive rights through unauthorized use.

Signup and view all the flashcards

Plagiarism

The act of using or closely imitating the language and thoughts of another author without authorization.

Signup and view all the flashcards

Computer Addiction

Excessive gaming behavior that can be practiced both offline and online.

Signup and view all the flashcards

Hacking

Illegal Access.

Signup and view all the flashcards

Reclusion Temporal

A penalty between 12-20 years.

Signup and view all the flashcards

Computer-Related Forgery

An attempt to obtain sensitive information such as usernames, passwords, and card details for malicious reasons.

Signup and view all the flashcards

Illegal Downloading

Obtaining files that you do not have the right to use from the internet.

Signup and view all the flashcards

Digital Piracy

The practice of illegally copying and selling digital music, video, computer software, etc.

Signup and view all the flashcards

Cyberbullying

The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature.

Signup and view all the flashcards

Cybersex

Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration.

Signup and view all the flashcards

Hacking

A term used to describe actions taken by someone to gain unauthorized access to a computer.

Signup and view all the flashcards

Malware

Stands for malicious software is one of the more common ways to infiltrate or damage your computer.

Signup and view all the flashcards

Virus

Malicious computer programs, often sent as an email attachment or a download, with the intent of infecting your computer.

Signup and view all the flashcards

Worms

Malicious code that replicates by independently exploiting vulnerabilities and spreads without needing a host file.

Signup and view all the flashcards

Trojan Horses

A malicious program that is disguised as a useful program, but once downloaded or installed, leaves your PC unprotected.

Signup and view all the flashcards

Spyware

A program that runs in the background and monitors what you are currently doing and typing through key logging.

Signup and view all the flashcards

Pharming

A means to point you to a malicious and illegitimate website by redirecting the legitimate URL.

Signup and view all the flashcards

Ransomware

A type of malware that restricts access to your computer or your files and demands payment in order for the restriction to be removed.

Signup and view all the flashcards

Spam

The mass distribution of unsolicited messages, advertising, or pornography to addresses which can be easily found on the Internet.

Signup and view all the flashcards

Study Notes

Chapter 4: Netiquette and Computer Ethics

Lesson 1: Netiquette

  • Netiquette is a combination of "net" (internet) and "etiquette" (manners).
  • It defines the proper way to communicate in an online environment.
  • It is the set of rules for behaving properly online.
  • The Golden Rule applies: treat others with the same respect you expect to receive, avoiding confrontational or offensive language.
  • It's sometimes acceptable to use appropriate emoticons to convey meaning, but emoticons are inappropriate in professional communications.
  • Avoid using slang, acronyms, and text abbreviations to ensure clear communication in college and business settings, using "your" instead of "ur".
  • Avoid "screaming" by typing entire messages in capital letters.
  • Emphasize words or phrases using italics, bold text, different colors, or special characters.
  • Proofread messages before sending to ensure effective communication and correct spelling, grammar, accuracy, and appropriate content and recipients.
  • Exercise good judgment when sharing information online

Sharing Information Online

  • Email and chat messages are considered private and shouldn't be forwarded or copied without consent.
  • To protect privacy and safety, sensitive personal information should never be shared online, to include:
    • Home address and phone number
    • Personal conversations
    • Social plans
    • Financial data (usernames, passwords, hints)
    • Anything personal that should not be shared
  • Always get permission from the original author or copyright holder to avoid plagiarism.

Respecting Diversity in Viewpoints

  • Be constructive and respectful when sharing opinions, beliefs, or criticisms.

Top 10 Commandments of Computer Ethics

  • Remember the Human.
  • Adhere to the same standards of behavior online as in real life.
  • Know where you are in cyberspace.
  • Respect other people's time and bandwidth.
  • Make yourself look good online.
  • Share expert knowledge.
  • Help keep flame wars under control.
  • Respect other people's privacy.
  • Don't abuse your power.
  • Be forgiving of other people's mistakes.

Lesson 2: Cybercrimes

  • Cyber is characteristic of computer, information, technology, and virtual reality culture.
  • Cybercrime is when a computer is the object of the crime or is used as a tool to commit an offense, like hacking, phishing, spamming, and child pornography.
  • Cybercriminals use computer technology to access personal data, business secrets, or exploit the internet.
  • Republic Act No. 10175, the Cybercrime Prevention Act of 2012, addresses legal issues related to online activity and the internet in the Philippines.
  • Republic Act No. 10173, the Data Privacy Act of 2012, protects individual personal information.

Common Forms of Cybercrimes

  • Copyright: exclusive legal right to print, publish, perform, film, or record literary, artistic, or musical material
    • Copyright infringement defined as the violation, piracy, or theft of a copyright holder's rights.
  • Plagiarism: closely imitating another author's language and thoughts without authorization.
  • Computer Addiction
    • Offline: excessive gaming behavior.
    • Online: "Internet Addiction"; related to excessive Internet use.
  • Virtual Self: the persona that is created in the virtual space.

Criminal Activities

  • Hacking
    • Illegal Access; Illegal Interception; Data Interference; System Interference; Misuse of Devices.
    • Infection of IT Systems with Malware against critical infrastructure of the Philippines can result in 12-20 years reclusion temporal.
    • Six to twelve years of imprisonment: prison mayor.
  • Computer-related forgery, fraud, and/or identity theft involve stealing sensitive information like usernames, passwords, and card details.
    • Includes phishing, pharming and spam.
    • The maximum penalty is Php 200,000 fine or prison mayor.
  • Electronic Theft
    • Illegal Downloading: obtaining files from the internet without the right to use them.
    • Digital Piracy: illegally copying & selling digital music, video, computer software.
  • Copyright Infringement is punishable by a fine of Php 50,000 – 500,000 and or prison mayor.
  • Cyberbullying: bullying via electronic communication, is covered by The Anti-Bullying Act of 2013 (RA 10627).
  • Cybersex includes any lascivious exhibition of sexual organs/activity with the aid of a computer system.
    • The penalty is at least Php 200,000 and or prison mayor.
  • Child Pornography: a form of child sexual exploitation.
    • This is punishable by Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed via a computer system.
    • The penalty is 12-20 years of imprisonment or reclusion temporal.
  • Cyber Defamation: an unprivileged false statement that harms someone's reputation with a penalty of 6-12 years imprisonment or prison mayor.

Lesson 3: Internet Threats

  • Hacking
    • Gaining unauthorized access to a computer, facilitated by online availability of tools, techniques, and malware.

Types of Threats

  • Malware stands for malicious software
    • A common ways to infiltrate or damage your computer.

Types of Malware

  • Virus
    • A malicious program that infects via email attachments, downloads, can automatically download from a site.
  • Worms
    • Common threat that goes to work without attaching to program files
  • Trojan Horses
    • Malicious program disguised as useful to trick user to download leaving a PC unprotected.
  • Spyware
    • A program runs in the background logging activity and keystrokes.
    • For example: Keyloggers monitor activity.
  • Pharming
    • Online fraud that redirects users to a malicious website.
    • Even when the correct URL is entered, can still redirect to a fake website.
  • Ransomware
    • Is a malware that restricts access to files demanding payment for removal of restriction.
    • Infection commonly distributed through phishing emails.
  • Spam
    • Common method of sending unsolicited messages and pornography.
    • Mass distribution via social media sites, company websites, and blogs.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Netiquette and Computer Ethics Quiz
30 questions
Netiquette and Computer Ethics Quiz
12 questions
Internet Ethics and Netiquette Quiz
5 questions
Online Ethics and Netiquette Quiz
47 questions

Online Ethics and Netiquette Quiz

InsightfulCopernicium1362 avatar
InsightfulCopernicium1362
Use Quizgecko on...
Browser
Browser