IMD164 Chapter 8: Social Media Literacy - Issues and Ethics
Document Details
Uploaded by TriumphalStatueOfLiberty
Tags
Related
- Media Information Literacy Lesson Plan PDF
- Lesson 3 - Media Literacy as Twenty-First Century Literacy PDF
- Media Literacy as Twenty-First Century Literacy PDF
- TikTok Ban Debate: Poor Media Literacy in the Social Media Age (Apr 2024)
- TikTok Ban Debate: Poor Media Literacy in the Social Media Age PDF
- Power of Social Media PDF
Summary
This chapter explores issues and ethics related to social media, focusing on topics like copyright, intellectual property, privacy, confidentiality, and social media risks for businesses. It discusses different types of content subject to copyright and what one needs to consider before using it.
Full Transcript
imd221 T SOCIAL MEDIA LITERACY Chapter 8: Issues and Ethics in Social Media CHAPTER OUTLINES: 8.1 Copyright, Intellectual ; Property and License 8.2 Privacy and Confidentiality 8.3 Public Access to Information 8.4 Offensive or defamatory content 8.5 Social Media Addict...
imd221 T SOCIAL MEDIA LITERACY Chapter 8: Issues and Ethics in Social Media CHAPTER OUTLINES: 8.1 Copyright, Intellectual ; Property and License 8.2 Privacy and Confidentiality 8.3 Public Access to Information 8.4 Offensive or defamatory content 8.5 Social Media Addiction 8.6 Social Media Crimes 8.7 Understanding Netiquette Copyright, Intellectual ; Property and License Copyright, intellectual property and licensing Copyright, the exclusive, legally secured right to reproduce, distribute, and perform a literary, musical, dramatic, or artistic work. Now commonly subsumed under the broader category of legal regulations known as intellectual-property law, copyright is designed primarily to protect an artist, a publisher, or another owner against specific unauthorized uses of his/her work. Such acts are reproducing the work in any material form, publishing it, performing it in public, filming it, broadcasting it, or making an adaptation of it). https://www.britannica.com/topic/copyright continue Anything that is published, posted or re-posted, whether by an individual or through an account and is not produced by individual could be subject to licence or control. This needs to be verified and appropriately managed through, if necessary, obtaining permission for use from the rights holder. A more likely issue is ownership of your own material and how you control the re-use of this particularly material must be protected by local copyright law to prevent unauthorized duplication. image credit: google continue Many types of works are eligible for copyright protection, for example: Audiovisual works, such as TV shows, movies, and online videos Sound recordings and musical compositions Written works, such as lectures, articles, books, and musical compositions Visual works, such as paintings, posters, and advertisements Video games and computer software Dramatic works, such as plays and musicals image credit: google https://support.google.com/legal/answer/3463239?hl=en Copyrightable Work; https://libguides.drew.edu/c.php?g=797757&p=5705118 https://medium.com/@sunbrio123/important-sections-of-copyright-in-india-747a0a2963da Is it possible to use a copyright-protected work without infringing? In some circumstances, yes. It is possible to use a copyright-protected work without infringing the owner’s copyright but one need to read about the terms & conditions in fair use section. continue It is important to note that your content can be removed in response to a claim of copyright infringement, even if you have; Given credit to the copyright owner Refrained from monetizing the infringing content Charged for a copy of the content in question Noticed similar content that appear elsewhere on the internet Purchased the content including a hard or digital copy Recorded the content yourself from TV, a movie theater, or the radio Copied the content yourself from a textbook, a movie poster or photograph Stated that “no copyright infringement is intended” Some content creators choose to make their work available for reuse with certain requirements. image credit: google https://support.google.com/legal/answer/3463239?hl=en Privacy and Confidentiality Privacy and Confidentiality Privacy and confidentiality are two concepts often mistaken to be the same thing. In terms of information, privacy is the right of an individual to have some control over how his or her personal information is collected, used, and/or disclosed. Confidentiality, on the other hand, is the duty to ensure information is kept secret only to the extent possible. It is important to distinguish between these two concepts. image credit: google https://oipc.sk.ca/privacy-versus-confidentiality/ privacy vs confidentiality The main difference between privacy and confidentiality is the type of information it can protect. Privacy will protect personal information according to what the Privacy Act says, however the protection provided by confidentiality depends on how it is defined in the contract. So, generally speaking, they differ in the extent to which they protect different kinds of information. Since they are defined differently, they may also be enforced differently. image credit: google https://sprintlaw.com.au/difference-between-privacy-and-confidentiality/ COPYRIGHT VS PRIVACY Just because you appear in a video, image or audio recording does not mean you own the copyright to it. For example, if your friend took a picture of you, she would own the copyright to the image that she took. If your friend, or someone else, uploaded a video, image or recording of you without your permission, and you feel it violates your privacy or safety, you may wish to file a privacy complaint. image credit: google https://support.google.com/legal/answer/3463239?hl=en COPYRIGHT VS trademark Copyright is just one form of intellectual property. It is not the same as trademark, which protects brand names, mottos, logos, and other source identifiers from being used by others for certain purposes. It is also different from patent law, which protects inventions. image credit: google https://support.google.com/legal/answer/3463239?hl=en Social Media Copyright, Privacy & Confidentiality Issues Third-party materials posted to a social media site may infringe copyright or trademarks, or disclose confidential information, posting photographs and video without proper releases may violate the privacy or publicity rights of individuals. Often unknowingly, confidential information, such as trade secrets, can be disclosed through other party with knowledge on popular social media websites. Confidential information may also be disclosed via blogs, chat rooms, and anonymous blog comments. Widespread disclosure of trade secrets, in particular, can result in the loss of intellectual property rights in the confidential materials. image credit: google Social Media risks for businesses and organizations: Loss of IP and Compliance Effect on Human Sensitive Data Violations Resources Reputation Financial Competitor Loss Disclosure Risk Inability to Manage the Brand Generational Divide Safety Hijacking https://www.corporatecomplianceinsights.com/social-business-means-risk-profile/ Loss of IP and Sensitive Data Social media has become a powerful tool for businesses to use in connecting with their customers. The medium has certainly made major corporations more accessible to the consumer. But with this ease of accessibility comes risk in many forms. Board members and executives who have concerns about security-related risks arising from deploying social media in the business should understand how their organizations are addressing the information risk. These risk including the inappropriate release, leakage or theft of information strategic to the company, and exposure of company networks and systems to viruses and malware due to human error, phishing scams, sophisticated attackers and identity thieves. https://www.corporatecomplianceinsights.com/social-business-means-risk-profile/ Compliance Violations In social media, there are risks of communicating data and information that violates applicable laws and regulations. These including infringement of trademarks and copyrights, data security issues, employment issues, violations of privacy rights and mismanagement of electronic communications. There also are potential risks in these areas based on the organization’s retention regulations or e-discovery requirements. https://www.corporatecomplianceinsights.com/social-business-means-risk-profile/ Reputation Loss Since consumer opinions spread quickly through social media, companies need effective response plans when a crisis occurs. Self-inflicted reputation damage may result from inappropriate employee behavior, setting unrealistic product or customer service expectations, rogue tweets of inappropriate messages intended for internal or personal use or inability to measure up to the openness, straight talk and transparency expected by customers and prospects seeking to engage. Customers or other parties can use social media to say negative things about the company. If the company does not engage or is not paying attention, it won’t be able to manage the potential fallout and necessary improvements to products, and processes may be overlooked. https://www.corporatecomplianceinsights.com/social-business-means-risk-profile/ Financial Disclosure Employees involved in implementing social business enhancements must be mindful of avoiding commentary on company performance that could impact the stock price or violate insider trading, “quiet period” and other rules under applicable securities laws. Effect on Human Resources Social media presents opportunities as well as threats, as it provides a channel both for recruiting employees or having the company’s employees recruited by competitors. https://www.corporatecomplianceinsights.com/social-business-means-risk-profile/ Inability to Manage the Generational Divide Many companies are challenged in understanding how younger generations are using new technologies, making it difficult to create effective marketing campaigns that tailor specific content to effectively reach targeted customers. Safety Release of confidential information about the activities of someone within the company or sharing information related to these activities can create the risk of outsiders using that information to the detriment of employees’ personal safety. https://www.corporatecomplianceinsights.com/social-business-means-risk-profile/ Competitor Risk Choosing to rely primarily on traditional marketing practices and other forms of customer communications and collaboration may risk loss of market share to competitors exploiting the insights social media generates. Smaller startups and certain high-tech companies have found social media to be indispensable to their evolution and are leveraging the technology to reach customers and markets despite having very few employees. This could present a disruptive threat to larger, more established competitors if they ignore the implications of social media in focused market niches that can be exploited by new entrants and more nimble peers. Social technologies extend the disintermediating power of the internet to lower entry barriers and disrupt established business models. https://www.corporatecomplianceinsights.com/social-business-means-risk-profile/ Brand Hijacking On the internet, there is always risk of a fraudulent third party hijacking the company’s brand without the company’s knowledge to obtain access to customers and prospects, including personal information. Such fraud includes the unauthorized use of company names and logos, as well as product counterfeiting and other misrepresentations. Some companies have engaged third parties to report all uses of and references to their organization’s names on social media/internet sites with the intent of using this information to align various aspects of their business to address complaints, as well as customer and employee satisfaction issues. https://www.corporatecomplianceinsights.com/social-business-means-risk-profile/ Public Access to Information Public Access to Information Information access is the freedom or ability to identify, obtain and make use of database or information effectively. Public access means access where community-based, noncommercial organizations, groups or individual members of the general public, on a nondiscriminatory basis, are the primary users. Today one can access almost anything on the internet, from entertainment, credit and financial services to products from every corner of the world. While the internet affords a certain level of anonymity, there are increasing ways in which users' personal information can be at risk. https://www.lawinsider.com/dictionary/public-access https://en.wikipedia.org/wiki/Information_access Protecting Personal Information Personal data is defined as information that relates directly or indirectly to a data subject, who is identified or identifiable from that information or from that and other information in the possession of a data user, and includes any sensitive personal data and expressions of opinion about the data subject. https://www.linklaters.com/en/insights/data-protected/data-protected---malaysia Personal Information that should be protected: Full name and mother’s name Personal ID numbers: Identification Card Number, driver’s license number, passport number, bank details and credit cards information Date of Birth Usernames and passwords Addresses: home address and email address Biometrics: Retina scans, fingerprints, facial geometry, or voice signatures Phone numbers Technology asset information: Media Access Control (MAC) or Internet Protocol (IP) addresses that are tied to a certain individual https://www.reputationdefender.com/blog/privacy/top-ten-reasons-keep-your-personal-information-private https://ecu.au.libguides.com/digital-essentials/protect-personal-information https://ecu.au.libguides.com/digital-essentials/protect-personal-information STAY SAFE ONLINE Do NOT reply to emails, text ONLY disclose messages, or personal pop-ups that ask information to for personal trusted or secure Change passwords information. websites regularly. https://schools.au.reachout.com/articles/disclosing-personal-information Offensive or Defamatory Content Offensive Content Offensive content means, but would not be limited to, content of email messages or Web pages containing harassment; violent, threatening, defrauding or obscene material; accessing or publishing pornographic, sexual comments or images, racial slurs, gender-specific comments; any comments that could reasonably offend someone on the basis of their age, sexual orientation, religious or political beliefs, marital or parental status, physical features, national origin, or disability. https://www.lawinsider.com/dictionary/offensive-content Tips to avoid Offensive Content on Social Media: Filter, Block, and Report Harmful Content Social media privacy and safety tools update constantly and while this is a good place to start for ideas, the best place to learn about how to enact features is on each social media platform. Here are some tips for filtering, reporting, and blocking harmful content or users on social media platforms. Instagram: block comments from specific individuals, hide generally offensive comments, filter specific words or phrases, restrict an account, filter feed (mute/block individual) and send/report offensive content to Instagram Team for their review and further actions Twitter: filter sensitive content, filter specific content and triggers, filter individuals (mute/block) and send/report offensive content to Twitter Team for their review and further actions Facebook: filter individuals(unfriend/unfollow), block or restrict individual, and send/report offensive content to Facebook Team for their review and further actions https://www.rainn.org/articles/how-filter-block-and-report-harmful-content-social-media https://www.emarketer.com/content/does-bad-content-affect-consumer-perceptions-of-brand-safety Offensive or Defamatory Content Defamation is a false statement presented as a fact that causes injury or damage to the character of the person it is about. Defamation of character happens when something untrue and damaging is presented as a fact to someone else. In order for a statement to be defamatory, it must have been made to a third party. A person can't be defamed by a statement that is said or written only to him or herself. https://www.nolo.com/legal-encyclopedia/defamation-libel-slander-key-elements-claim.html https://www.legalzoom.com/articles/differences-between-defamation-slander-and-libel Defamation is a False Statement of Fact, Not Opinion The most important aspect of a potentially defamatory statement is that it purports to be a statement of fact. Opinions are not defamatory. People have the right to express whatever opinions they like about other people. Example: "I think that Mark is a bad guy," is an opinion. It's not a polite opinion, but it is an opinion nonetheless. But "Mark stole RM 10,000 from his employer" is a statement of fact. If that statement is not true, it is defamatory. That is a false statement that clearly can cause injury to Mark. It could get him fired. https://www.nolo.com/legal-encyclopedia/defamation-libel-slander-key-elements-claim.html Social Media Defamation These days, everyone is on some form of social media, be it Facebook, WhatsApp, Instagram, Twitter, etc and this increase in access has made it easy for people to share their statements, whether true or untrue, with the world at large. As such, cases involving defamatory statements made on social media platforms are on the rise and this is not constrained to cases involving politicians, public figures or celebrities but also the general public at large. Social media defamation is a term used to describe content that is published to a social media platform that defames a person or business. This type of defamation is also commonly referred to as libel, cyber defamation, disparagement, character assassination, cyberbullying, and cyber harassment. https://www.minclaw.com/review-social-media-defamation-libel/ https://www.mondaq.com/libel-defamation/969060/the-law-on-defamation-relating-to-social-media- Social Media Defamation Examples; Some of the most common ways in which someone can be defamed on social media include: A post published on an individual’s Facebook profile, A post published in a Facebook group, A tweet published on an individual’s Twitter profile, Fake reviews on Facebook business pages, Comments on a post, video, or tweet, A video on Tiktok, A photo and/or caption on Instagram, or A video posted to Youtube. https://www.minclaw.com/review-social-media-defamation-libel/#examples-of-social-media-defamation Social Media Addiction Social Media Addiction Social media addiction is a behavioral addiction that is defined by being overly concerned about social media, driven by an uncontrollable urge to log on to or use social media, and devoting so much time and effort to social media that it impairs other important life areas. https://www.addictioncenter.com/drugs/social-media-addiction/ image: https://theparadise.ng/10-tips-to-avoid-social-media-addiction-as-a-child-of-god-in-the-last-days/ Recognizing A Social Media Addiction To determine if someone is at risk of developing an addiction to social media, ask these 6questions: Do they spend a lot of time thinking about social media or planning to use social media? Do they feel urges to use social media more and more? Do they use social media to forget about personal problems? Do they often try to reduce use of social media without success? Do they become restless or troubled if unable to use social media? Do they use social media so much that it has had a negative impact on their job or studies? A “yes” to more than 3 of these questions may indicate the presence of a social media addiction. https://www.addictioncenter.com/drugs/social-media-addiction/ Limit Find a new Yourself hobby Turn Off Notifications Overcoming Check In With Social Media Addiction Friends And Family Delete Unused Do a Make it reality check/ Apps a treat Go Cold Turkey https://www.bustle.com/life/144893-7-ways-to-stop-your-social-media-addiction Overcoming Social Media Addiction Whether a momentary break is needed or a longer-term ways to combat social media addiction, here are the 7 ways one can start to disconnect; Turn Off Notifications; notifications are a constant reminder that something is happening in the online world and might trigger/worsen FOMO (Fear of Missing Out), turn off notifications from disturbing normal routine and one might find it easier to concentrate on daily tasks and not get distracted so easily. Limit Yourself; set a timer on your watch or phone, to limit the amount of time spent on social media. Choose a limit depending on the severity of your addiction like an hour a day, which equates to seven hours per week and whenever you check your accounts, start your timer going. When you reach your limit, be strong and do not be tempted to add on extra time. This will be a strong test of your willpower, but it will be worth it in the end. https://www.bustle.com/life/144893-7-ways-to-stop-your-social-media-addiction Overcoming Social Media Addiction continue Find a new hobby; it is a good option to pick up a new hobby and learn a new skill or do something you have always wanted to do but never had the time. One would be surprised to find how much free time you have when you stop mindlessly scrolling through your newsfeed. Plus your new hobby will keep your mind and hands preoccupied when you're craving social media. Check In With Friends And Family; instead of keeping up-to-date with friends' and family members' lives through their social posts, shoot them a text or give them a call. Even if you cannot go out with them in person safely, you can stay connected without tapping through Instagram Stories. https://www.bustle.com/life/144893-7-ways-to-stop-your-social-media-addiction Overcoming Social Media Addiction continue Delete Unused Apps; remove unused applications/social media apps, if you have not login to Twitter for months, remove it from phone and it will remove the temptation, the notifications, and the temptation to scroll mindlessly. If you really need to check it, there is always the laptop. Make it a treat; look at social media as a treat, only allow yourself screen time when you have achieved something or you have done something productive first. This way you might change the way you think about social media. https://www.bustle.com/life/144893-7-ways-to-stop-your-social-media-addiction Overcoming Social Media Addiction continue Do a reality check/ Go Cold Turkey; Depending on how bad things have gotten, it might be time to do a serious reality check or go cold turkey. If you are spending more time on social media than you are interacting with people in real life, give yourself a reality check by having a holiday from social media. Decide how long it is going to be, inform your friends online how long you will be away and how they can reach you if they need you in person, and delete your apps. If you normally spend a minimum of two hours on social media per day, you will have an extra fourteen hours per week which are totally free to do whatever you want with. https://www.bustle.com/life/144893-7-ways-to-stop-your-social-media-addiction "Less scrolling, more living" image credit: google “We live in a society where looking cool in pictures on social media has become more important than being a genuine person.” "Never before has a generation so diligently recorded themselves accomplishing so little" https://minequotes.com/quotes-about-social-media/ Social Media Crimes Social Media Crimes Social Media Crimes are various harmful acts committed using social media such as online threats (malicious communications), cyberstalking & harassing, cyberbullying, hacking and fraud, selling and buying illegal things, social engineering scams, fake online profile that host offensive contents, revenge porn, relationship/fake romance scam, etc. http://www.cybercelldelhi.in/socialmediacrimes.html https://www.leathesprior.co.uk/news/social-media-new-and-emerging-crimes-that-are-being-committed-online Online/ Internet Cyberbullying Cyber Fraud Stalking/ Revenge Harassment Porn Social Media Crimes Online Romance Malicious Social Scams Communications Black Market/ Engineering Shadow Market (phishing, spear phishing, etc) https://www.bustle.com/life/144893-7-ways-to-stop-your-social-media-addiction Social media crimes: Cyber Stalking refers to stalking or harassment carried out over the internet. It might target individuals, groups, or even organizations and can take different forms including slander, defamation and threats. Motives may be to control or intimidate the victim or to gather information for use in other crimes, like identity theft or offline stalking. Malicious Communications is where someone sends a letter or any other form of online communication that is indecent or grossly offensive, threatening, or contains information which is false or believed to be false. The purpose for sending it is to cause distress or anxiety to the person it is sent to. https://www.tripwire.com/state-of-security/security-awareness/what-cyberstalking-prevent/ https://west-midlands.police.uk/your-options/malicious-communications Social media crimes continue Online/Internet Fraud involves using online services and software with access to the internet to defraud or take advantage of victims. The term "internet fraud" generally covers cybercrime activity that takes place over the internet or on email, including crimes like identity theft, phishing, and other hacking activities designed to scam people out of money. Online Black Markets/ Shadow Markets is an online transaction platform, where goods or services are exchanged illegally. What makes the market "black" can either be the illegal nature of the goods and services themselves, the illegal nature of the transaction or both. https://www.fortinet.com/resources/cyberglossary/internet-fraud https://www.investopedia.com/articles/economics/12/mechanics-black-market.asp https://www.nst.com.my/news/crime-courts/2021/07/708911/malaysians-suffered-rm223-billion-losses-cyber-crime-frauds Social media crimes continue Cyberbullying is a bullying (sending, posting, or sharing negative, harmful, false, or mean content about someone else) that takes place over digital devices like cell phones, computers, and tablets and can also occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content. https://www.stopbullying.gov/cyberbullying/what-is-it image credit: google https://www.ipsos.com/en-my/malaysian-and-global-views-cyberbullying https://theaseanpost.com/article/does-malaysia-have-cyberbullying-problem Social media crimes continue Social Engineering is the art of manipulating people so they give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted the criminals are usually trying to trick you into giving them your personal information such as passwords or bank information, or access your computer to secretly install malicious software. Social engineering happens because of the human instinct of trust. Cybercriminals have learned that a carefully worded email, voicemail, or text message can convince people to transfer money, provide confidential information, or download a file that installs malware on the company network. Most common forms are phishing, spear phishing, malware, pretexting, baiting, vishing etc. https://www.webroot.com/ca/en/resources/tips-articles/what-is-social-engineering https://terranovasecurity.com/examples-of-social-engineering-attacks/ Social media crimes continue Revenge Porn; this ordinarily follows the break-up of a couple and involves the electronic publication or distribution of sexually explicit material of one or both of the couple, the material having originally been provided consensually for private use. Romance Scams; where a fake account is used to groom a victim, eventually tricking them into handing over money. Romance scammers are experts in social manipulation and can sound very convincing. Many of the signs of a romance scammer are subtle and insidious because the scammer is trying to build trust before they exploit a victim. https://www.tripwire.com/state-of-security/security-awareness/what-cyberstalking-prevent/ image credit: https://www.snbonline.com/about/news/how-to-detect-an-online-romance-scam https://www.astroawani.com/topic/love-scam https://www.bharian.com.my/berita/kes/2021/05/813776/penipuan-menerusi-love-scam-meningkat Understanding Netiquette What is Netiquette? Netiquette is a combination of the words network and etiquette and is defined as a set of rules for acceptable online behavior. Similarly, online ethics focuses on the acceptable use of online resources in an online social environment. Both phrases are frequently interchanged and are often combined with the concept of a ’netizen’ which itself is a contraction of the words internet and citizen and refers to both a person who uses the internet to participate in society. https://www.webroot.com/us/en/resources/tips-articles/netiquette-and-online-ethics-what-are-they Is Netiquette important? The rules of etiquette are just as important in cyberspace as they are in the real world. The evidence of poor netiquette can stick around to haunt a person for much longer than expected. Following these basic rules of netiquette can avoid damaging both online and offline relationships/collaborations. Netiquette is applicable to whom? TEACHER/ STUDENT EDUCATOR EVERYONE PARENTS/ in ONLINE GUARDIAN COMMUNITY https://us.norton.com/internetsecurity-kids-safety-what-is-netiquette.html 10 Basic Rules of Netiquette or Internet Etiquette Apply the same standards of Make Real People a Here are some basics behavior online that we follow Priority/remember the (but not limited to) set in offline/real life human of netiquette that applicable for everyone in the online Respect People's Share With Discretion Privacy/Time/Bandwidth community. Make yourself look good online Adapted/edited from: https://coursedesign.colostate.edu/obj/corerulesnet.html https://www.verywellmind.com/ten-rules-of-netiquette-22285 https://us.norton.com/internetsecurity-kids-safety-what-is-netiquette.html 10 Basic Rules of Netiquette or Internet Etiquette Use Respectful Choose your circle Language wisely Prompt Respond (online Fact Check Before postings, Emails, etc) Reposting Share positive/beneficial Knowledge & Expertise Adapted/edited from: https://coursedesign.colostate.edu/obj/corerulesnet.html https://www.verywellmind.com/ten-rules-of-netiquette-22285 https://us.norton.com/internetsecurity-kids-safety-what-is-netiquette.html Netiquette, continue Apply the same Netizen should do their best to act within the laws and ethical standards of manners of society whenever they go online. Values around behavior online that courtesy, kindness, openness, and treating others with the we follow in same respect we wish to receive should also be adhered to. offline/real life When communicating electronically in whatever method, practice the Golden Rule: Do unto others as you would have others do unto you. Remember, your written words are read by real people, Make Real People a all deserving of respectful communication. Before you press Priority/remember "send" or "submit," ask yourself, "Would I be okay with this if the human someone else had written it?". On the other hand, when we are meeting people face to face, it is rude to be more focus on our phone rather than making real eye contact and communication with that person right in front of us. Netiquette, continue Avoid sending explicit content like naked pictures, drunk pictures, drug use pictures or unedited/embarrassing home Share With video/pictures. If you would have a problem with anyone else Discretion seeing it now, or at any point in the future, do not post it online. Do not simply post or share someone's else picture or content without their concern/permission. Some more, electronic communication takes time: time to read and time in which to Respect People's respond. Most people today lead busy lives and do not have time to Privacy/Time/ read or respond to frivolous emails or discussion posts. Make our Bandwidth written communication meaningful and to the point, without extraneous text or unnecessary graphics or attachments that may take forever to download. Netiquette, continue Spelling and grammar are meaningful in online communication. One will be judged by the quality of writing, Make yourself look so keep the following tips in mind: good online Always check for spelling and grammar errors Know what you are talking about and state it clearly Be pleasant and polite Avoid name calling, cursing, expressing deliberately offensive opinions,if you would not do it to the face of anyone who Use respectful might conceivably see what you write, do not write it. Avoid language writing in all caps as this action is generally perceived as yelling. Remember to say please and thank you as appropriate Netiquette, continue Avoid from randomly accepting people friend request in your online circle. It can be one of the most dangerous things you can Choose your circle do on Facebook. Strangers as friends is simply not a good idea for wisely many reasons because we never know who they are in real life or what they are actually up to (we definitely want to avoid hackers, social engineering culprit, online predator, etc). If you are in a position where people could reasonably be expected to contact you by email and your email address is Prompt Respond public, have the courtesy to reply to their message within an (online postings, acceptable time frame. If it is going to take longer to reply, Emails, etc) email them and tell them that. Same goes with important postings that comes with questions or requests. Netiquette, continue To avoid misinformation or ended up spreading false Do a Fact Check news/rumours which could backfire in the end, doing a fact check Before Reposting is always worth it. Fact checking actually emphasises that we should remain skeptical for our own good. One of the true benefits of expanded online communication Share is the ability to share and retrieve expert knowledge quickly. positive/beneficial If you are an expert and have research or news to share, this Knowledge & is one of the best uses of the internet. If you are not an Expertise expert but you want to share something positive and beneficial to others , then do so and remember to quote/cite sources where necessary. Bad Netiquette Examples Using all capital letters Not respecting when posting/responding people’s privacy Catfishing Not doing proof reading before Did not Fact Check Spamming others posting/commenting/replying Before Reposting Oversharing Inappropriate/slow Unnecessary Inappropriate jokes Respond Information Adapted/edited from: https://www.verywellmind.com/ten-rules-of-netiquette-22285 https://us.norton.com/internetsecurity-kids-safety-what-is-netiquette.html END WORDS Thank you. You may proceed to complete exercise/learning activity for Chapter 8