Summary

This document contains information on various aspects of online ethics, such as etiquette, netiquette, and the principles that guide users on the internet. It discusses different types of online communication and the social media phenomenon. There are also sections on issues like altruism, hedonism and connectionism.

Full Transcript

ONLINE ETHICS  Thank others who help you online. Ethics  is the rational reflection on what is right, Instant Message Etiquette Rules Every what is wrong, what is just, what is Professional Needs To Know unjust, what is good & what i...

ONLINE ETHICS  Thank others who help you online. Ethics  is the rational reflection on what is right, Instant Message Etiquette Rules Every what is wrong, what is just, what is Professional Needs To Know unjust, what is good & what is bad in  Start with a greeting terms of human behavior.  Be mindful of the receiver’s preferred style  comes from the Greek ethos which of communication. means customs or habits.  Keep the conversation short.  often called moral philosophy. Thus,  Be careful with abbreviations. ethics means the science of customs or  Never send bad news via IM habits of society.  Don’t change meeting times or venues in an  can also mean the science of rightness IM and wrongness of character and conduct. Types Of Netiquette One-to-one communication Online ethics - refers to patterns of behavior  Emails, Private Messages, Voice Call, Video used when on the Internet, guided both by law Chat and personal philosophy. One-to-many communication Major concerns in the field of online ethics  Mailing lists, public chats, forums, pin include the protection of private information, boards, WWW boards, social networks, the limits of a presumed freedom of communities, websites, and microblogging expression, and issues of libel. services. Internet ethics SOCIAL NETWORKING THEORY - is the study  is the moral principles that guide the use of how people, organizations or groups of internet. interact with others inside their network.  the do’s and don’ts.  as rules and regulations that internet BRAGGADOCIAN BEHAVIOUR - It has become users must abide with. a competition of who’s doing the coolest thing on social networks. Etiquette  is defined as the formal manners and rules Altruism that are followed in social or professional  defined as the unselfish devotion to the settings. welfare of others.  The rules for writing a thank you note are an  Altruistic people always consider the example of etiquette. wellbeing of others so that they try to help them in any way they can. Netiquette  is short for “Internet etiquette”. Hedonism  This includes several aspects of the  is the belief that pleasure is the main goal Internet, such as email, social media, online in people’s life. chat, web forums, website comments,  people have found pleasure in different multiplayer gaming, and other types of things depending on the lifestyles of online communication. various ages and eras.  the general idea is to respect others online.  It appears that since the beginning of the 21st century social media experiences have Rules To Follow For Good Netiquette been a source of pleasure for people all  Avoid posting inflammatory or offensive around the world comments online (a.ka. Flaming)  Respect others’ privacy by not sharing Connectionism personal information that another  refers to the desire to stay in touch with person may not want published online. others through social networks.  Never spam others by sending large  People want to constantly communicate amounts of unsolicited email. with their relatives, friends, colleagues,  Show good sportsmanship when playing buddies, pals etc. anywhere and anytime. online games, whether you win or lose.  Don’t troll people in web forums or website Homophily comments by repeatedly nagging or  refers to the tendency of human beings to annoying them. associate with others similar to them.  Don’t swear or use offensive language.  People are usually more comfortable with  Avoid replying to negative comments with the more negative comments. company of others who are similar in age,  If someone asks a question and you know gender, social class, status, interests etc. the answer, offer to help. Narcissism Lies And Deceit  is about one’s excessive fascination with Honesty plays a crucial role in any situation himself/herself. where organisms exchange information or  Narcissistic people like themselves too resources. much, in many instances on the expense of others. Dishonesty can thus be expected to have  They are heavily loaded with themselves so damaging effects on social coherence if that they take advantage of every agents cannot trust the information or goods opportunity for self-promotion. they receive.  They feel extremely good about their traits, qualifications, values, and behaviors etc. so A distinction is often drawn between prosocial that they want other people know and lies (‘white’ lies) and antisocial lying (i.e. respect their credentials. deception for personal gain), with the former being considered much less destructive than Multiple Identities the latter  People have at least two identities as given- identity coming on birth and made-identity Jeff Hancock, a professor of communication created in social environments. studies social media behavior and the  Given identity includes components such psychology of online interaction. In an email as ethnicity, religion, gender etc. interview, Hancock discussed deception in the digital age, the different ways we lie, and  Made- identity includes elements such as whether this new era is fostering or hindering education, status, occupation etc. trust within our communities — both online and offline. Memetics  The concept of memetics is related to the Sense Of Confirmation replication of ideas, feelings, habits, beliefs,  News Around The Clock. One of the ways and attitudes across individuals. that social media has transformed politics  It is commonly known as “meme” and is the sheer speed at which news, poll works like copying one’s memory to results and rumors are shared. another.  The Impact Of Polls. Not only do social media sites report the results of polls, you Tribalism can actually participate in Facebook polls.  Defined as a person’s strong feeling of  Direct Interaction With Politicians. Social identity and loyalty toward a specific social Media gives an opportunity for voters to group or community. interact more easily with candidates and  The individual assigns a high value to being elected officials. associated with that group or community.  Social media users participate in certain Wielded Power – to have or use power, networking groups and keep constant authority, or influence, or to hold and use a communication with members of the weapon: e.g. Under the new city charter, the desired mayor wields most of the power.  groups to strengthen their own membership. Targeting is used throughout the advertising SOCIAL MEDIA AS A POLITICAL PLATFORM industry to make sure that ads and messages Social Media use in politics refers to the use of reach the right audience. In the age of social online social media platforms in political media, politicians and people running for office processes and activities. Social media are able to target their campaigns. platforms encompass websites such as Facebook, YouTube, WeChat, Instagram, Quora, Maintenance Coordination includes the setup QQ, Qzone, Weibo, Twitter, Tumblr, Tiktok, of a fully integrated maintenance system that Reddit, Baidu Tieba, LinkedIn, LINE, Snapchat, records work orders, processes work orders, Pinterest, Viber, and VK. generated purchase orders for vendors and sends work orders to person/company for The Internet has created channels of completion. communication that play a key role in circulating news, and social media has the Social Media Maintenance power to change not just the message, but the Setup dynamics of political corruption, values, and  Creating their own personal identity by the dynamics of conflict in politics. setting up the branding and its image  Connect with people similar to your Through the use of social media in election interests or own political beliefs processes, global conflict, and extreme politics,  Creating rapport and relationships within diplomacy around the world has become less the group. private and susceptive to the public perception. Strategize  Creating snappy, quality content by  Yet, it wasn’t until the mid-1950s that including relevant and timely posts catered technology was able to allow the idea to to your specific audience. become a reality.  Sharing your page using the tools provided by the platform It was Martin Cooper, a Motorola researcher  Ask questions and spark discussions and executive, who made the first cell phone call on April 4, 1973 to Dr. Joel S. Engel at Bell Schedule Labs.  Choosing how often you’ll post to each social network, and using the scheduling 1G (First Generation – 1983) tools in their respective platforms.  The first analog cellular system is widely  Periodically promoting your page by calling deployed in the United States. them to use the tools provided by the  The first analog cellular system is called 1G respective platforms. (1st Generation). Social Media And Elections 2G (Second Generation – 1990) In times of political elections, the stakes are  The first digital cellular phone system high, and advocates may try to support their emerges. cause by active manipulation of social media.  Digital 2G quickly displaces analog 1G networks. Instead of using varying sound Users are able to connect directly to politicians frequencies, this new digital system and campaign managers and engage in translates everything into a string of data political activities in new ways. Each social points – Os and 1s. media platform is programmed in code by developers, creating a unique digital 2G (Second Generation – 1990) architecture that influences how politicians and  2G makes it possible to transmit citizens can use the platform for political ends. information significantly faster than the analog system, and is able to support “COMELEAK,” is the incident which involved photos, music, and texting (Short Message the illegal copying of the database of the Service or “SMS”), while protecting our Commission on Elections (COMELEC) by the privacy more effectively. hacker group, LulSecPilipinas 3G (Third Generation – 2000) Personal voter’s information included names,  The launch of 3G networks represents a birthdays, home and email addresses and turning point for the potential of what voters’ biometrics (photo, fingerprint markers, cellular data systems can support. and signature) data, passport details of  Due to the vastly improved speeds and overseas Filipino workers, and other sensitive much stronger capacity to carry information, data. a phone might be able to do more than just talk and text. Another group had provided an application on a website “Wehaveyourdata’’ that made it easier 4G (Fourth Generation – Recent 2000s) for curious internet users to check data in the  4G represents an even more pronounced illegally copied database. development in terms of speed and volume of data for a cellular network. The exfiltration of several databases of the  While carriers transition to 4G, devices are Comelec via its website six years ago remains still not utilizing the full capacity a 4G as the biggest data breach in Philippine history. network can provide. The incident involved at least 340 GB worth of stolen data, pertaining to around 77 million 5G Filipinos.  It’s still not known exactly when the 5G network will be available, but we do know Mobile Technology that when it happens it will represent  technology that goes where the user goes. another transformation in the landscape of  It consists of portable two-way personal technology. communications devices, computing devices and the networking technology that Smartphone is a handheld electronic device connects them. that provides a connection to a cellular network.  Communications networks that connect It allow people to make phone calls, send text these devices are loosely termed wireless messages, and access the Internet. technologies. While cellular phone functionality had improved EVOLUTION OF MOBILE TECHNOLOGY in the years after 2000, it wasn’t until Apple Inc. THROUGH SERVICE released the iPhone in 2007 that the way  The concept of cellular phones has been people interacted with their phones drastically around since the late 1940s. changed. the real-world applications of this vital skill.  Create an Online Resource. Formal online Impact Of Technology In Our Everyday Life training in digital literacy can help online o Communication learners differentiate between fact and o Entertainment fiction, especially in regards to online o Daily Utilities resources that may contain accurate o Organization information or opinion-based content.  Set Some Ground Rules Online learners Digital Citizenship - is defined by the quality of need to be aware of how to use the online habits, actions, and consumption patterns tools effectively. This also involves Internet that impact the ecology of digital content and netiquette. communities.  Evaluate Your Current e-Learning Strategies. Review the e-Learning Examples of Digital Citizenship: strategies that are already in place and  Communicating with respect determine how you can interject learning  Respecting others’ privacy technologies.  Seeing things from another perspective  Encourage Learner-Generated e-Learning  Adding helpful information/context to a Content. Ask online learners to create their discussion or relevant pages own e-Learning blogs or virtual  Supporting others by offering useful presentations based on the subject matter feedback to enhance online learners' performance,  Encouraging them support and motivation.  Sharing work they’re proud of  Include Digital Literacy Simulations. e- Online learners are able to test out new DIGITAL LITERACY technologies and familiarize themselves  refers to an individual’s ability to find, with the LMS platform. evaluate, and clearly communicate  Host a Live Event. Live events give online information through typing and other media learners the opportunity to use a variety of on various digital platforms. online tools, such as web browsers, video  It is evaluated by an individual’s grammar, conferencing software, and social media composition, typing skills, and ability to sites. produce text, images, audio, and designs using technology. DIGITAL FOOTPRINTS (Digital Shadow)  Is about being able to make sense of digital  refers to one’s unique set of of traceable media. digital activities, actions, contributions, and  To analyze, prioritize, and act upon the  communications manifested on the Internet countless digital media 21st century citizens or digital devices. encounter on a daily basis.  Is a trail of data or “electronic breadcrumbs” you create while using the Internet. Principles Of Digital Literacy  It includes the websites you visit, emails Comprehension - is basically the ability to you send, and information you submit to extract implicit and explicit ideas from a media. online services. Interdependence - is how one media form Benefits Of Digital Footprint connects with another, whether potentially,  Fraud or legal issues can more easily be metaphorically, ideally, or literally. detected  Personalization (like suggested products or Sharing is no longer just a method of personal related advertising) serves to add value to identity or distribution, but rather can create our use of the Internet messages of its own. Who shares what to  Companies can more easily offer incentives whom through what channels can not only based on interests and needs, sometimes determine the long-term success of the media, resulting in cost savings but can create organic ecosystems of sourcing,  Personal data can be used to generate sharing, storing, and ultimately repackaging revenue without our knowledge it can media.  be annoying and distracting to be constantly inundated with advertisements Curation should resist data overload and other and information signs of “digital hoarding,” while also providing  Purchase behavior data may be used as a the potential for social curation–working basis to reduce credit limits or increase together to find, collect, and organize great interest rates information. Passive Footprint Promoting Digital Literacy  This type is where a user has been online  Encourage Self-Exploration. Online learners and information has been stored on an should be able to explore the digital online database. resources on their own, which emphasizes  This can include where they came from, when the footprint was created and a user’s IP address.  A footprint can also be analyzed offline and can be stored in files which an administrator can access.  These would include information on what that machine might have been used for, but not who had performed the actions. Active Footprint  is created when you post online by sending an email, publishing a blog post or a tweet, or uploading a photo on social media.  Where a user might have logged into a site when editing or making comments such as on an online forum or a social media site.  The registered name or profile can be linked to the posts that have been made and it is surprisingly easy to find out a lot about a person from the trails you leave behind. Tips To Keep Your Digital Footprints Under Control  Perform Regular Social Audits. At least once a year, search the social sites where you have accounts. Check your profiles, both to analyze what you’ve posted and to see what others have shared.  Search Yourself Online. Find out what the web knows or says about you. Is the information accurate, and is this something you want everyone to see? Conducting an online reputation audit is easy using search engines like Google, Bing, and Yahoo. Simply type in your name to see what comes up. Many people are surprised by the results when they’ve searched their name online.  Take Control Of Your Profiles And Posts. o Control which persons can tag you. o Limit who can actually see your posts o Control who follows you and becomes your friend.  Delete all tracking cookies and browsing history  Review security settings on social networks and stay updated on new features and settings.  Use the latest version of your Internet browser.  Choose safe and secure passwords that are unique and be sure to change them regularly.  Use cash instead of credit cards.  Opt out of providing personally identifiable information (e.g. you may not be required by law to provide your telephone number when making a purchase).  Remember that anything posted is public (even if your social network settings are private) as the information is stored on a server network.

Use Quizgecko on...
Browser
Browser