Netiquette and Computer Ethics Module 4 PDF

Summary

This document presents a module on netiquette and computer ethics, covering topics such as online etiquette, avoiding slang and acronyms, proofreading, sharing information wisely, respecting diversity in viewpoints, and different forms of cybercrimes by analyzing examples and the possible causes and resolutions of conflicts to be made.

Full Transcript

MODULE 4: THE NETIQUETTE AND v THE COMPUTER ETHICS At the end of this module, you should be able to: Discuss the importance of being a responsible netizen by following the rules of common courtesy online and the informal “rules of the road” of cyberspace. Di...

MODULE 4: THE NETIQUETTE AND v THE COMPUTER ETHICS At the end of this module, you should be able to: Discuss the importance of being a responsible netizen by following the rules of common courtesy online and the informal “rules of the road” of cyberspace. Discuss the difference between privacy and security. Explain various risks to internet Lesson 1: Netiquette that is the etiquette of cyberspace and “etiquette” means the forms of required by good breeding or prescribed by authority to be required in social b or official life. Remember the Golden Rule “Do not do or say online what you would not do or say offline” Lesson 1: Netiquette AVOID SLANG, ACRONYMS, AND TEXT TALK Communicating effectively in college and business environments requires the use of correct terminology, spelling, and grammar that can easily be understood. AVOID “SCREAMING” IN TYPED MESSAGES Typing an entire message using all capital letters is known as “screaming”. Lesson 1: Netiquette PROOFREAD YOUR MESSAGES BEFORE SENDING THEM Spelling and grammar errors Confusing terms or phrases that could be misunderstood Errors of omission, such as missing content or recipients Errors in accuracy of information Lesson 1: Netiquette EXERCISE GOOD JUDGMENT WHEN SHARING INFORMATION WITH OTHERS Your home address or phone number Personal conversations Social plans, such as vacations Financial information Usernames, passwords, or hints Anything personal that you would not want shared by others over the Internet Lesson 1: Netiquette RESPECT DIVERSITY IN VIEWPOINTS Your home address or phone number Personal conversations Social plans, such as vacations Financial information Usernames, passwords, or hints Anything personal that you would not want shared by others over the Internet Lesson 1: Netiquette Ten Commandments of Computer Ethics 1. Thou shalt not use a computer to harm other people 2. Thou shalt not interfere with other people’s computer work 3. Thou shalt not access other people’s computer files 4. Thou shalt not use a computer to steal 5. Thou shalt not use a computer to bear false witness 6. Thou shalt not copy or use proprietary software for which you have not paid (without permission) 7. Thou shalt not use other people’s computer resources without authorization or proper compensation 8. Thou shalt not appropriate other people’s intellectual output 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing 10. Thou shalt always use computers in ways that ensure consideration and respect for other humans Lesson 2: Cybercrimes Cyber is the Characteristics of the culture of computers, information, technology and virtual reality. Cybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming and child pornography) is used as a tool to commit an offense. Cybercriminals may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes Lesson 2: Cybercrimes Republic Act No. 10175 Cybercrime Prevention Act of 2012 is a law in the Philippines approved on September 12,2012 which aims to address legal issues concerning online interactions and internet. Republic Act No. 10173 Data Privacy Act of 2012 is an act protecting individual personal information. Lesson 2: Cybercrimes COMMON FORMS OF CYBERCRIMES: a. Copyright The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same. Copyright infringement is the violation, piracy or theft of a copyright holder's exclusive rights through the unauthorized use of a copyrighted material or work. b. Plagiarism An act or instance of using or closely imitating the language and thoughts of another author without authorization. c. Computer Addiction Offline: generally used when speaking about excessive gaming behavior, which can be practiced both offline and online. Online: Also known as “Internet Addiction”, gets more attention in general from scientific research than offline computer addiction, mainly because most cases of computer addiction are related to the excessive use of the Internet. *Virtual Self -The persona you create about yourself virtually. Lesson 2: Cybercrimes CRIMINAL ACTIVITIES A. Hacking Unauthorized access of or interference with computer systems, servers, or other information and communication systems Unauthorized access to corrupt, alter, steal, or destroy electronic data using computers or other information and communication systems without the computer or system owner’s knowledge and consent The introduction of computer viruses resulting in the corruption, alteration, theft, or loss of such data Illegal Access- Unauthorized entry into computer systems. Illegal Interception- Unauthorized interception or monitoring of communication. Lesson 2: Cybercrimes Data Interference-Altering or corrupting data. System Interference-Disrupting or damaging systems. Misuse of Devices- Improper use of devices for illegal activities. Infection of IT Systems with Malware – if the act is committed against critical infrastructure of the Philippines the, penalty is between 12-20 years reclusion temporal Six years up to twelve years of imprisonment also known as prison mayor. Lesson 2: Cybercrimes CRIMINAL ACTIVITIES b. Computer-related forgery, fraud and/or identity theft An attempt to obtain sensitive information such as usernames, passwords, and credit card details and (indirectly money), often for malicious reasons. Phishing- is a type of cyber attack where attackers attempt to deceive individuals into providing sensitive information, such as usernames, passwords, or financial details, by masquerading as a trustworthy entity in electronic communications. Pharming- is a cyber attack where malicious actors redirect users from legitimate websites to fraudulent ones without their knowledge, often to steal sensitive information or install malware. Spam- refers to unsolicited, often irrelevant or inappropriate messages sent over the internet, typically to a large number of users, usually for advertising purposes. Maximum of Php 200,000 fine or prison mayor Lesson 2: Cybercrimes CRIMINAL ACTIVITIES c. Electronic theft Illegal Downloading Obtaining files that you do not have the right to use from the internet. Digital Piracy Practice of illegally copying and selling digital music, video, computer software, etc. Copyright Infringement- is the unauthorized use of copyrighted material in a way that violates the exclusive rights granted to the copyright holder. Penalty of PHP 50,000 – 500, 000 and or prison mayor Lesson 2: Cybercrimes CRIMINAL ACTIVITIES d. Cyberbullying The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature. The Anti-Bullying Act of 2013 (RA 10627) e. Cybersex Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration. There is a discussion on this matter if it involves “couples” or “people in relationship” who engage in cybersex. Penalty at least Php 200,000 and or prison mayor Lesson 2: Cybercrimes f. Child Pornography Is a form of child sexual exploitation. Unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti- Child Pornography Act of 2009, committed through a computer system. Penalty of 12-20 years of imprisonment or reclusion temporal g. Cyber Defamation Is an unprivileged false statement of fact which tends to harm the reputation of a person or company. Penalty of 6-12 years of imprisonment or prison mayor. Thank You

Use Quizgecko on...
Browser
Browser