Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Rules of Netiquette

Lesson 3

Related Books

Free with a 30 day trial from Scribd

See all
  • Be the first to comment

Rules of Netiquette

  1. 1. Lesson 3
  2. 2. Netiquette: Rules of Behavior on the Internet. The etiquette guidelines that govern behavior when communicating on the Internet have become known as netiquette. Netiquette covers not only only rules of behavior during discussions but also guidelines that reflect the unique electronic nature of the medium. Jul 24, 2013
  3. 3. Rules of Netiquette 1. Online Security, Safety and Ethics 2. Internet Threats 3. Protecting Reputations Online 4. Copyright 5. Contextualized Online Search and Research Skill
  4. 4. Remember the human You need to remember that you are talking to a real person when you are online. The internet brings people together who would otherwise never meet. Remember this saying when sending an email: Would I say email: Would I say this to the person’s face.
  5. 5. Adhere to the same standards online that you followin real life You need to behave the same way online that you do in real life. You need to remember that you can get caught doing things you should not be doing online just like you can in real life. You are still talking to a real person with feelings even though you can’t see them.
  6. 6. Know where you are in cyberspace Always take a look around when you enter a new domain when surfing the web. Get a sense of what the discussion group is about before you join it.
  7. 7. Respect other people’s time and bandwidth Remember people have other things to do besides read your email. You are not the center of their world. Keep your post and emails to a minimum by saying what you want to say. Remember everyone won’t answer your questions.
  8. 8. Make yourself look good online Remember to always check your spelling and grammar before posting. Always know what you are talking about and make saying it. Be polite and pleasant to everyone.
  9. 9. Share expert knowledge Ask questions online Share what you know online. Post the answers to your questions online because someone may have the same question you do.
  10. 10. Help keep flame wars under control Netiquette does not forbid flaming. Netiquette does however forbid people who are flaming to hurt discussion groups by putting the group down.
  11. 11. Respect other people’s privacy Do not read other people’s mail without their permission. Going through other people’s things could cost you, your job or things or you could even go to jail. Not respecting other people’s privacy is bad Netiquette.
  12. 12. Don’t abuse your power Do not take advantage of other people just because you have more knowledge or power than them. Treat others as you would want them to treat you if the roles were reversed.
  13. 13. Be forgiving of other people’s mistakes Do not point out mistakes to people online. Remember that you were once the new kid on the block. You still need to have good manners even though you are online and can not see the person face to face.
  14. 14. The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with the old ones. It is also a source of entertainment through games, online communities, and everything in between. But like most things in this world, there is always the “other side of the coin”. The internet is one of the most dangerous places, especially if you do not know what are you doing with it. But there is no need to worry; it is never that late. 
  15. 15. Type of Information Risks 1. First Name There is a risk in sharing your first name. Chances are, a hacker may already know plenty of stuff about you even if you only give out your first name. Likewise, you cannot just walk in a room and start introducing yourself to everyone. You do not know whom you can come across with.
  16. 16. Type of Information Risks 2. Last Name If sharing your first name is a small risk, having both your first and last is more risky. You will be vulnerable to being searched for using search engines, which include image search. Matching a name with a face is a modus to several cybercrimes like identity theft.
  17. 17. Type of Information Risks 3. Middle Name Sharing your middle name alone is probably not the most risky of these shared information, but sharing your full name would be.
  18. 18. Type of Information Risks 4. Current and previous school(s) Most people who steal identities study their subject. They can use this information for verification purposes.
  19. 19. Type of Information Risks 5. Your cellphone number Your cellphone number should not be posted over the Internet. The Internet is a public place. It is the same as posting your number on a billboard. You would not want random strangers to text or call you, or worse, pretend that they are someone else.
  20. 20. Type of Information Risks 6. The name of your mother and father Risky, yet not as risky as posting their full names, especially your mother’s maiden name. In fact, you may have already encountered many websites that require your mother’s maiden name as an answer to a secret question whenever you lose your password.
  21. 21. Type of Information Risks 7. The name of your siblings Disclosing this is a huge risk. Strangers may pretend or use their identity to dupe you.
  22. 22. Type of Information Risks 8. Your address Hopefully, you answered “no” to this one. Giving the Internet your number is one thing; giving them your address is a whole other level. It would be much easier for criminals to find you.
  23. 23. Type of Information Risks 9. Your home phone number This shared information is more risky than sharing your personal phone number. Scams usually use this information to deceive you, one of which is when a stranger pretends to know your parents or pretends to be you.
  24. 24. Type of Information Risks 10. Your birthday Letting people know your birthday is probably a must if you want to get as many gifts as possible. But having it in your profile makes you vulnerable to identity theft.
  25. 25. The Internet is defined as the information superhighway. This means that anyone has access to his highway, can place information, and can grab that information. Any information, even things that you have set privately, can be accessed one way or another. This is why social networking sites like Facebook continue to improve their security features. The threat of cybercrimes is very real. While you may not experience the threat now, whatever information we share today could affect our future.
  26. 26. 1. Be mindful of what you share online and what site you share it to.
  27. 27. 2. Do not just accept terms and conditions; read it.
  28. 28. 3. Check out the privacy policy page of a website to learn how the website handles the information you share.
  29. 29. 4. Know the security features of the social networking site you use. By keeping your profile private, search engines will not be able to scan your profile.
  30. 30. 5. Do not share your password with anyone.
  31. 31. 6. Avoid logging in to public, networks/Wi-Fi. Browsing in “incognito (or private) mode”, a feature of the browser , will not protect you from hackers.
  32. 32. 7. Do not talk to strangers whether online or face-to-face.
  33. 33. 8. Never post anything about a future vacation. It is similar to posting, “Rob my house at this date”.
  34. 34. 9. Add friends you know in real life.
  35. 35. 10. Avoid visiting untrusted websites.
  36. 36. 11. Install and update an antivirus software on your computer. Use only one antivirus software to avoid conflicts.
  37. 37. 12. If you have a Wi-Fi at home, make it a private network by adding a password.
  38. 38. 13. Avoid downloading anything from untrusted websites. You are most vulnerable in peer-to-peer downloads (torrents) as the download is most likely not monitored by the site owner.
  39. 39. 14. Buy the software; do not use pirated ones.
  40. 40. 15. Do not reply or click links from suspicious emails.
  41. 41. Leelet

    Be the first to comment

    Login to see the comments

  • Eboyz

    Jun. 8, 2018
  • JairuzMurillo

    Jul. 31, 2018
  • jamaicapondara

    Nov. 20, 2018
  • Chikinini

    Jan. 16, 2019
  • LorenaPace2

    Aug. 12, 2019
  • KenTerrones

    Feb. 3, 2020
  • KristineCastro8

    Sep. 12, 2020

Lesson 3


Total views


On Slideshare


From embeds


Number of embeds