SlideShare a Scribd company logo
1 of 13
President Ramon Magsaysay State University Computer Engineering Department
Living in the
Information Technology
Era
Lesson 4
The Netiquette and The Computer Ethics
By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era
Netiquette
Simple stated, it's network etiquette - that is the
etiquette of cyberspace and "etiquette" means the
forms of required by good breeding or prescribed by
authority to be required in social or official life. In other
words, netiquette is a set of rules for behaving properly
online.
Netiquette, or network etiquette, is concerned with the
"proper" way to communicate in an online environment.
Consider the following "rules," adapted from Virginia
Shea's the Core Rules of Netiquette, whenever you
communicate in the virtual world.
What is Netiquette?
When you use e-mail, instant messenger, video calls, or
discussion boards to communicate with others online,
please be sure to follow the rules of professional online
communications known as netiquette. These rules will
help you communicate with instructors, classmates, and
potential employers more effectively and will help
prevent misunderstandings.
By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era 4
The Golden Rule
Even though you may be interacting with a computer
screen, you are communicating with a real person who
will react to your message. Make a good impression -
treat others with the same respect that you would like to
receive and avoid confrontational or offensive language.
To help convey meaning when creating messages, it is
sometimes acceptable to include appropriate emoticon
symbols, such as a smiley face :) However, for
professional communications these would be
inappropriate.
Remember the Golden Rule
AVOID SLANG, ACRONYMS, AND TEXT TALK
Communicating effectively in college and business
environments requires the use of correct terminology,
spelling, and grammar that can easily be understood. For
example, use "your" instead of "ur"."
AVOID "SCREAMING" IN TYPED MESSAGES
Typing an entire message using all capital letters is
known as "screaming". It is distracting and generally
frowned upon in professional environments. It is better
to draw emphasis to selected words or phrases by: using
italic or bold text; using a different color for text or
background color; or denoting emphasis using special
characters (Example: **Important**).
By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era 5
The Golden Rule
PROOFREAD YOUR MESSAGES BEFORE SENDING THEM
Proofreading your messages s before you send them is a
best practice for effective and efficient communication.
Strive to make your communications concise and free of
any:
• Spelling and grammar errors
• Confusing terms or phrases that could be
misunderstood
• Errors of omission, such as missing content or
recipients
• Errors in accuracy of information
Remember the Golden Rule
By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era 6
The Golden Rule
EXERCISE GOOD JUDGMENT WHEN SHARING
INFORMATION WITH OTHERS ONLINE
E-mail and chat messages that you send or receive are
considered private and should not be forwarded or
copied to others without gaining the consent of all
involved participants. In general, messages posted to
discussion boards and social media sites can be read by
the public. You may never know who might read or share
what you post. It is a good practice to always ask a post's
author for permission before sharing a post with other
parties.
• To protect your privacy and safety, do not share
online any sensitive personal information such as:
• Your home address or phone number
• Personal conversations
Remember the Golden Rule
• Social plans, such as vacations
• Financial information
• Usernames, passwords, or hints
• Anything personal that you would not want
shared by others over the Internet
• If the material you share with others online came
from another source, make every effort to gain
permission from the original author or copyright
holder. Copying someone else's work and passing it
off as your own is plagiarism. It damages your
reputation and could subject you to serious academic
and legal consequences.
By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era 7
The Golden Rule
RESPECT DIVERSITY IN VIEWPOINTS
Be constructive and respectful when sharing opinions,
beliefs, and criticisms, or responding to those of others
in the conversation.
• When sharing a viewpoint that differs from someone
else's, it is a best practice to first acknowledge the
other person by briefly restating what he or she said,
but in your own words. This lets the person know that
you are listening and trying to understand them.
• When presenting an opinion or criticism, it is helpful
to use phrases that identify to whose point of view
you are referring. If the opinion is yours, you can
begin with the phrase "In my experience
Remember the Golden Rule
By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era
The Ten Commandments of Computer Ethics
Commandment 1: Thou shalt not use a computer to
harm other people.
Simply put: Do not use the computer in ways that may
harm other people.
This commandment says that it is unethical to use a
computer to harm another user. It is not limited to
physical injury. It includes harming or corrupting other
users' data or files. The commandment states that it is
wrong to use a computer to steal someone's personal
information. Manipulating or destroying files of other
users is ethically wrong. It is unethical to write programs,
which on execution lead to stealing, copying or gaining
unauthorized access to other users' data. Being involved
in practices like hacking, spamming, phishing or cyber
bullying does not conform to computer ethics.
Commandment 2: Thou shalt not interfere with other
people's computer work.
Simply put: Do not use computer technology to cause
interference in other users' work.
Computer software can be used in ways that disturb
other users or disrupt their work. Viruses, for example,
are programs meant to harm useful computer programs
or interfere with the normal functioning of a computer.
Malicious software can disrupt the functioning of
computers in more ways than one. It may overload
computer memory through excessive consumption of
computer resources, thus slowing its functioning. It may
cause a computer to function wrongly or even stop
working. Using malicious software to attack a computer
is unethical.
8
By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era
The Ten Commandments of Computer Ethics
Commandment 3: Thou shalt not snoop around in other
people's computer files.
Simply put: Do not spy on another person's computer
data.
We know it is wrong to read someone's personal letters.
On the same lines, it is wrong to read someone else's
email messages or files. Obtaining data from another
person's private files is nothing less than breaking into
someone's room. Snooping around in another person's
files or reading someone else's personal messages is the
invasion of his privacy. There are exceptions to this. For
example, spying is necessary and cannot be called
unethical when it is done against illegitimate use of
computers. For example, intelligence agencies working
on cybercrime cases need to spy on the internet activity
of suspects.
Commandment 4: Thou shalt not use a computer to
steal.
Simply put: Do not use computer technology to steal
information.
Stealing sensitive information or leaking confidential
information is as good as robbery. It is wrong to acquire
personal information of employees from an employee
database or patient history from a hospital database or
other such information that is meant to be confidential.
Similarly, breaking into a bank account to collect
information about the account or account holder is
wrong. Illegal electronic transfer of funds is a type of
fraud. With the use of technology, stealing of
information is much easier. Computers can be used to
store stolen information.
9
By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era
The Ten Commandments of Computer Ethics
Commandment 5: Thou shalt not use a computer to
bear false witness.
Simply put: Do not contribute to the spread of
misinformation using computer technology.
Explanation: Spread of information has become viral
today, because of the Internet. This also means that false
news or rumors can spread speedily through social
networking sites or emails. Being involved in the
circulation of incorrect information is unethical. Mails
and pop-ups are commonly used to spread the wrong
information or give false alerts with the only intent of
selling products. Mails from untrusted sources
advertising certain products or spreading some hard-to-
believe information, are not uncommon. Direct or
indirect involvement in the circulation of false
information is ethically wrong. Giving wrong information
can hurt other parties or organizations that are affected
by that particular theme.
Commandment 6: Thou shalt not copy or use
proprietary software for which you have not paid
(without permission).
Simply put: Refrain from copying software or buying
pirated copies. Pay for software unless it is free.
Explanation: Like any other artistic or literary work,
software is copyrighted. A piece of code is the original
work of the individual who created it. It is copyrighted in
his/her name. In case of a developer writing software for
the organization she works for, the organization holds
the copyright for it. Copyright holds true unless its
creators announce it is not. Obtaining illegal copies of
copyrighted software is unethical and also encourages
others to make copies illegally.
10
By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era
The Ten Commandments of Computer Ethics
Commandment 7: Thou shalt not use other people's
computer resources without authorization or proper
compensation.
Simply put: Do not use someone else's computer
resources unless authorized to.
Multi-user systems have user specific passwords.
Breaking into some other user's password, thus intruding
his/her private space is unethical. It is not ethical to hack
passwords for gaining unauthorized access to a
password-protected computer system. Accessing data
that you are not authorized to access or gaining access
to another user's computer without her permission is
not ethical.
Commandment 8: Thou shalt not appropriate other
people's intellectual output.
Simply put: It is wrong to claim ownership on a work
which is the output of someone else's intellect.
Programs developed by a software developer are her
property. If he is working with an organization, they are
the organization's property. Copying them and
propagating them in one's own name is unethical. This
applies to any creative work, program or design.
Establishing ownership on a work which is not yours is
ethically wrong.
11
By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era
The Ten Commandments of Computer Ethics
Commandment 9: Thou shalt think about the social
consequences of the program you are writing or the
system you are designing.
Simply put: Before developing a software, think about
the social impact it can have.
Looking at the social consequences that a program can
have, describes a broader perspective of looking at
technology. A computer software on release, reaches
millions. Software like video games and animations or
educational software can have a social impact on their
users. When working on animation films or designing
video games. For example, a computer game for kids
should not have content that can influence them
negatively. Similarly, writing malicious software is
ethically wrong. A software developer/development firm
should consider the influence their code can have on the
society at large.
Commandment 10: Thou shalt always use a computer
in ways that ensure consideration and respect for other
humans.
Simply put: In using computers for communication, be
respectful and courteous with the fellow members.
The communication etiquette we follow in the real world
applies to communication over computers as well. While
communicating over the Internet, one should treat
others with respect. One should not intrude others'
private space, use abusive language, make false
statements or pass irresponsible remarks about others.
One should be courteous while communicating over the
web and should respect others' time and resources. Also,
one should be considerate with a novice computer user.
12
End of Lesson 4
13
Any Questions?

More Related Content

What's hot

Living in the IT Era - Lesson 9.pptx
Living in the IT Era - Lesson 9.pptxLiving in the IT Era - Lesson 9.pptx
Living in the IT Era - Lesson 9.pptxFroilan Cantillo
 
LIVING IN THE IT ERA LESSON 2.pptx
LIVING IN THE IT ERA LESSON 2.pptxLIVING IN THE IT ERA LESSON 2.pptx
LIVING IN THE IT ERA LESSON 2.pptxRussel Carilla
 
ICT Presentation
ICT PresentationICT Presentation
ICT PresentationLisa
 
Living in the IT Era L1.pptx
Living in the IT Era L1.pptxLiving in the IT Era L1.pptx
Living in the IT Era L1.pptxRammel1
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Digital rights & responsibilities
Digital rights & responsibilitiesDigital rights & responsibilities
Digital rights & responsibilitiesJASTAL01
 
Living in the IT Era - Lesson 2.2.pptx
Living in the IT Era - Lesson 2.2.pptxLiving in the IT Era - Lesson 2.2.pptx
Living in the IT Era - Lesson 2.2.pptxFroilan Cantillo
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentationMatthew Momney
 
gee-ie-living-in-the-it-era-syllabuspdf.docx
gee-ie-living-in-the-it-era-syllabuspdf.docxgee-ie-living-in-the-it-era-syllabuspdf.docx
gee-ie-living-in-the-it-era-syllabuspdf.docxReygenMaeSubang
 
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxTEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxhenrysales6
 
Lesson 4 - Computerised and non computerised system
Lesson 4 - Computerised and non computerised systemLesson 4 - Computerised and non computerised system
Lesson 4 - Computerised and non computerised systemsalwahanim
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security Arah Louise
 
L15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptxL15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptxBenjieBarlaan
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on societyAMOSOGAGAH
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guidemjtheman
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
Nine elements of digital citizenship
Nine elements of digital citizenshipNine elements of digital citizenship
Nine elements of digital citizenshipmonazarrinkelk
 
Information literacy in a media-saturated world
Information literacy in a media-saturated worldInformation literacy in a media-saturated world
Information literacy in a media-saturated worldPam Wilson
 

What's hot (20)

Living in the IT Era - Lesson 9.pptx
Living in the IT Era - Lesson 9.pptxLiving in the IT Era - Lesson 9.pptx
Living in the IT Era - Lesson 9.pptx
 
LIVING IN THE IT ERA LESSON 2.pptx
LIVING IN THE IT ERA LESSON 2.pptxLIVING IN THE IT ERA LESSON 2.pptx
LIVING IN THE IT ERA LESSON 2.pptx
 
ICT Presentation
ICT PresentationICT Presentation
ICT Presentation
 
Living in the IT Era L1.pptx
Living in the IT Era L1.pptxLiving in the IT Era L1.pptx
Living in the IT Era L1.pptx
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Digital rights & responsibilities
Digital rights & responsibilitiesDigital rights & responsibilities
Digital rights & responsibilities
 
Living in the IT Era - Lesson 2.2.pptx
Living in the IT Era - Lesson 2.2.pptxLiving in the IT Era - Lesson 2.2.pptx
Living in the IT Era - Lesson 2.2.pptx
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
gee-ie-living-in-the-it-era-syllabuspdf.docx
gee-ie-living-in-the-it-era-syllabuspdf.docxgee-ie-living-in-the-it-era-syllabuspdf.docx
gee-ie-living-in-the-it-era-syllabuspdf.docx
 
Netiquette
NetiquetteNetiquette
Netiquette
 
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxTEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
 
Lesson 4 - Computerised and non computerised system
Lesson 4 - Computerised and non computerised systemLesson 4 - Computerised and non computerised system
Lesson 4 - Computerised and non computerised system
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
L15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptxL15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptx
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Nine elements of digital citizenship
Nine elements of digital citizenshipNine elements of digital citizenship
Nine elements of digital citizenship
 
Information literacy in a media-saturated world
Information literacy in a media-saturated worldInformation literacy in a media-saturated world
Information literacy in a media-saturated world
 

Similar to Living in the IT Era - Lesson 4.pptx

The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfMelchorTolentino2
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104Marvin Broñoso
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Chp4:Data and Privacy.pptx
Chp4:Data and Privacy.pptxChp4:Data and Privacy.pptx
Chp4:Data and Privacy.pptxAsmajaved42
 
How good are your internet manners proj.
How good are your internet manners proj.How good are your internet manners proj.
How good are your internet manners proj.XxxCelesteTxxX
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
How good are your internet manners proj. slideshare project this one
How good are your internet manners proj. slideshare project this oneHow good are your internet manners proj. slideshare project this one
How good are your internet manners proj. slideshare project this oneXxxCelesteTxxX
 

Similar to Living in the IT Era - Lesson 4.pptx (20)

The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdf
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
ICT 2.pptx
ICT 2.pptxICT 2.pptx
ICT 2.pptx
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Educational Technology Chapter 8
Educational Technology Chapter 8Educational Technology Chapter 8
Educational Technology Chapter 8
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
COMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptxCOMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptx
 
Chp4:Data and Privacy.pptx
Chp4:Data and Privacy.pptxChp4:Data and Privacy.pptx
Chp4:Data and Privacy.pptx
 
Internet manners
Internet mannersInternet manners
Internet manners
 
How good are your internet manners proj.
How good are your internet manners proj.How good are your internet manners proj.
How good are your internet manners proj.
 
Common ethical issues
Common ethical issuesCommon ethical issues
Common ethical issues
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
How good are your internet manners proj. slideshare project this one
How good are your internet manners proj. slideshare project this oneHow good are your internet manners proj. slideshare project this one
How good are your internet manners proj. slideshare project this one
 

Recently uploaded

Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 

Recently uploaded (20)

Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 

Living in the IT Era - Lesson 4.pptx

  • 1. President Ramon Magsaysay State University Computer Engineering Department Living in the Information Technology Era
  • 2. Lesson 4 The Netiquette and The Computer Ethics
  • 3. By: Engr. Froilan G. Cantillo GEE 4 Living in the IT Era Netiquette Simple stated, it's network etiquette - that is the etiquette of cyberspace and "etiquette" means the forms of required by good breeding or prescribed by authority to be required in social or official life. In other words, netiquette is a set of rules for behaving properly online. Netiquette, or network etiquette, is concerned with the "proper" way to communicate in an online environment. Consider the following "rules," adapted from Virginia Shea's the Core Rules of Netiquette, whenever you communicate in the virtual world. What is Netiquette? When you use e-mail, instant messenger, video calls, or discussion boards to communicate with others online, please be sure to follow the rules of professional online communications known as netiquette. These rules will help you communicate with instructors, classmates, and potential employers more effectively and will help prevent misunderstandings.
  • 4. By: Engr. Froilan G. Cantillo GEE 4 Living in the IT Era 4 The Golden Rule Even though you may be interacting with a computer screen, you are communicating with a real person who will react to your message. Make a good impression - treat others with the same respect that you would like to receive and avoid confrontational or offensive language. To help convey meaning when creating messages, it is sometimes acceptable to include appropriate emoticon symbols, such as a smiley face :) However, for professional communications these would be inappropriate. Remember the Golden Rule AVOID SLANG, ACRONYMS, AND TEXT TALK Communicating effectively in college and business environments requires the use of correct terminology, spelling, and grammar that can easily be understood. For example, use "your" instead of "ur"." AVOID "SCREAMING" IN TYPED MESSAGES Typing an entire message using all capital letters is known as "screaming". It is distracting and generally frowned upon in professional environments. It is better to draw emphasis to selected words or phrases by: using italic or bold text; using a different color for text or background color; or denoting emphasis using special characters (Example: **Important**).
  • 5. By: Engr. Froilan G. Cantillo GEE 4 Living in the IT Era 5 The Golden Rule PROOFREAD YOUR MESSAGES BEFORE SENDING THEM Proofreading your messages s before you send them is a best practice for effective and efficient communication. Strive to make your communications concise and free of any: • Spelling and grammar errors • Confusing terms or phrases that could be misunderstood • Errors of omission, such as missing content or recipients • Errors in accuracy of information Remember the Golden Rule
  • 6. By: Engr. Froilan G. Cantillo GEE 4 Living in the IT Era 6 The Golden Rule EXERCISE GOOD JUDGMENT WHEN SHARING INFORMATION WITH OTHERS ONLINE E-mail and chat messages that you send or receive are considered private and should not be forwarded or copied to others without gaining the consent of all involved participants. In general, messages posted to discussion boards and social media sites can be read by the public. You may never know who might read or share what you post. It is a good practice to always ask a post's author for permission before sharing a post with other parties. • To protect your privacy and safety, do not share online any sensitive personal information such as: • Your home address or phone number • Personal conversations Remember the Golden Rule • Social plans, such as vacations • Financial information • Usernames, passwords, or hints • Anything personal that you would not want shared by others over the Internet • If the material you share with others online came from another source, make every effort to gain permission from the original author or copyright holder. Copying someone else's work and passing it off as your own is plagiarism. It damages your reputation and could subject you to serious academic and legal consequences.
  • 7. By: Engr. Froilan G. Cantillo GEE 4 Living in the IT Era 7 The Golden Rule RESPECT DIVERSITY IN VIEWPOINTS Be constructive and respectful when sharing opinions, beliefs, and criticisms, or responding to those of others in the conversation. • When sharing a viewpoint that differs from someone else's, it is a best practice to first acknowledge the other person by briefly restating what he or she said, but in your own words. This lets the person know that you are listening and trying to understand them. • When presenting an opinion or criticism, it is helpful to use phrases that identify to whose point of view you are referring. If the opinion is yours, you can begin with the phrase "In my experience Remember the Golden Rule
  • 8. By: Engr. Froilan G. Cantillo GEE 4 Living in the IT Era The Ten Commandments of Computer Ethics Commandment 1: Thou shalt not use a computer to harm other people. Simply put: Do not use the computer in ways that may harm other people. This commandment says that it is unethical to use a computer to harm another user. It is not limited to physical injury. It includes harming or corrupting other users' data or files. The commandment states that it is wrong to use a computer to steal someone's personal information. Manipulating or destroying files of other users is ethically wrong. It is unethical to write programs, which on execution lead to stealing, copying or gaining unauthorized access to other users' data. Being involved in practices like hacking, spamming, phishing or cyber bullying does not conform to computer ethics. Commandment 2: Thou shalt not interfere with other people's computer work. Simply put: Do not use computer technology to cause interference in other users' work. Computer software can be used in ways that disturb other users or disrupt their work. Viruses, for example, are programs meant to harm useful computer programs or interfere with the normal functioning of a computer. Malicious software can disrupt the functioning of computers in more ways than one. It may overload computer memory through excessive consumption of computer resources, thus slowing its functioning. It may cause a computer to function wrongly or even stop working. Using malicious software to attack a computer is unethical. 8
  • 9. By: Engr. Froilan G. Cantillo GEE 4 Living in the IT Era The Ten Commandments of Computer Ethics Commandment 3: Thou shalt not snoop around in other people's computer files. Simply put: Do not spy on another person's computer data. We know it is wrong to read someone's personal letters. On the same lines, it is wrong to read someone else's email messages or files. Obtaining data from another person's private files is nothing less than breaking into someone's room. Snooping around in another person's files or reading someone else's personal messages is the invasion of his privacy. There are exceptions to this. For example, spying is necessary and cannot be called unethical when it is done against illegitimate use of computers. For example, intelligence agencies working on cybercrime cases need to spy on the internet activity of suspects. Commandment 4: Thou shalt not use a computer to steal. Simply put: Do not use computer technology to steal information. Stealing sensitive information or leaking confidential information is as good as robbery. It is wrong to acquire personal information of employees from an employee database or patient history from a hospital database or other such information that is meant to be confidential. Similarly, breaking into a bank account to collect information about the account or account holder is wrong. Illegal electronic transfer of funds is a type of fraud. With the use of technology, stealing of information is much easier. Computers can be used to store stolen information. 9
  • 10. By: Engr. Froilan G. Cantillo GEE 4 Living in the IT Era The Ten Commandments of Computer Ethics Commandment 5: Thou shalt not use a computer to bear false witness. Simply put: Do not contribute to the spread of misinformation using computer technology. Explanation: Spread of information has become viral today, because of the Internet. This also means that false news or rumors can spread speedily through social networking sites or emails. Being involved in the circulation of incorrect information is unethical. Mails and pop-ups are commonly used to spread the wrong information or give false alerts with the only intent of selling products. Mails from untrusted sources advertising certain products or spreading some hard-to- believe information, are not uncommon. Direct or indirect involvement in the circulation of false information is ethically wrong. Giving wrong information can hurt other parties or organizations that are affected by that particular theme. Commandment 6: Thou shalt not copy or use proprietary software for which you have not paid (without permission). Simply put: Refrain from copying software or buying pirated copies. Pay for software unless it is free. Explanation: Like any other artistic or literary work, software is copyrighted. A piece of code is the original work of the individual who created it. It is copyrighted in his/her name. In case of a developer writing software for the organization she works for, the organization holds the copyright for it. Copyright holds true unless its creators announce it is not. Obtaining illegal copies of copyrighted software is unethical and also encourages others to make copies illegally. 10
  • 11. By: Engr. Froilan G. Cantillo GEE 4 Living in the IT Era The Ten Commandments of Computer Ethics Commandment 7: Thou shalt not use other people's computer resources without authorization or proper compensation. Simply put: Do not use someone else's computer resources unless authorized to. Multi-user systems have user specific passwords. Breaking into some other user's password, thus intruding his/her private space is unethical. It is not ethical to hack passwords for gaining unauthorized access to a password-protected computer system. Accessing data that you are not authorized to access or gaining access to another user's computer without her permission is not ethical. Commandment 8: Thou shalt not appropriate other people's intellectual output. Simply put: It is wrong to claim ownership on a work which is the output of someone else's intellect. Programs developed by a software developer are her property. If he is working with an organization, they are the organization's property. Copying them and propagating them in one's own name is unethical. This applies to any creative work, program or design. Establishing ownership on a work which is not yours is ethically wrong. 11
  • 12. By: Engr. Froilan G. Cantillo GEE 4 Living in the IT Era The Ten Commandments of Computer Ethics Commandment 9: Thou shalt think about the social consequences of the program you are writing or the system you are designing. Simply put: Before developing a software, think about the social impact it can have. Looking at the social consequences that a program can have, describes a broader perspective of looking at technology. A computer software on release, reaches millions. Software like video games and animations or educational software can have a social impact on their users. When working on animation films or designing video games. For example, a computer game for kids should not have content that can influence them negatively. Similarly, writing malicious software is ethically wrong. A software developer/development firm should consider the influence their code can have on the society at large. Commandment 10: Thou shalt always use a computer in ways that ensure consideration and respect for other humans. Simply put: In using computers for communication, be respectful and courteous with the fellow members. The communication etiquette we follow in the real world applies to communication over computers as well. While communicating over the Internet, one should treat others with respect. One should not intrude others' private space, use abusive language, make false statements or pass irresponsible remarks about others. One should be courteous while communicating over the web and should respect others' time and resources. Also, one should be considerate with a novice computer user. 12
  • 13. End of Lesson 4 13 Any Questions?