GROUP 7
OBJECTIVES
•At the end of the lesson, students are
expected to:
A. Identify proper ways for online safety
B. Discuss the implication of safety
etiquette; and
C. Apply online safety, security, ethics, and
etiquette standards and practice in the
ACTIVITY:
GUESS THE PICTURE WITH WORD/S.
1. ONLINE ETHICS 2. NETIQUETTE
ACTIVITY:
GUESS THE OICTURE WITH WORD/S.
3.
INTERNET
3. CYBER
SECURITY
ONLINE ETHICS AND ETIQUETTE
Netiquette is a combination of the
words network and etiquette and is
defined as asset of rules for acceptable
online behavior. Similarly, online ethics
focuses on the acceptable use of online
resources in an online social
environment.
HOW CAN WE STAY SAFE ONLINE ?
1. Create Complex Passwords.
2. Boost Your Network Security.
3. Use a Firewall.
4. Click Smart
•S for Safe- Keep your personal details away from
strangers.
•M for Meet- Don’t Meet people that you don’t
know online unless you’re with a trusted adult.
•A for Accept- Don’t click any links that your
unsure about. Ask trusted adult.
•R for Reliable- Don’t believe everything people tell
you. Always Check trusted sources to find the
truth.
HOW CAN WE STAY SAFE ONLINE ?
•5. Be a Selective Sharer.
•6. Protect Your Mobile Life
•7. Practice Safe Surfing & Shopping.
•8. Keep up to date.
WHAT IS AN ETIQUETTE ?
Etiquette is defined as the formal manners
and rules that are followed in social or
professional settings.
Example: The rules of writing a thank you
note for a friend or family.
THE 10 ONLINE ETIQUETTE
RULES
•Rule 1: Remember the Human
For this, remember, it is important to
remember the human. You should never say
something to someone online that you would
not say to him or her in person.
•Rule 2: Be Ethical
It can however be easy to let your ethics slip
when online. Illegal streaming of movies, illegal
downloading of music and copyright
infringement is still breaking the law.
•Rule 4: Respect other people's time and data
limits
When you post anything online, write an email
or share a post it will take other people's time to
read. Shea (2011) argues "it's your responsibility
•Rule 3: Know where you are
Netiquette varies from website to website.
What is acceptable in one environment is not
acceptable in another.
•Rule 6: Share expert knowledge
Sharing is one of the principles behind the
majority of internet services. If you are
knowledgeable in an area then you have
something to offer! Share what you know and it
•Rule 5: Make yourself look good online
Make sure you are careful with what you share.
It is always advisable not to share anything
embarrassing, illegal or inappropriate.
•Rule 7: Keep disagreement healthy
•People are always going to disagree and
that is healthy. Never reduce the discussion
to personal issues and avoid inappropriate
language.
•Rule 8: Respect other people’s privacy
When you are networked to someone on a
website like Facebook or LinkedIn, You need to
ensure you do not breach anyone’s wishes by
sharing any of the content they have made
•Rule 9: Don't abuse your power
If you are an administrator or facilitator for
any online environment, make sure you do
not abuse the privilege of access that your
position may give you.
•Rule 10: Be forgiving of other people's
mistakes.
People will make mistakes when they are new
to online environments. Everyone has to start
somewhere, so try and be forgiving of other's
TYPES OF ETHICS
•One to one communication: Information is
exchanged between one source and one
receiver. For example, when you talk or write
something to your friend, it is one-to-one
communication.
•One to many communication: A single
source provides information's to multiple
receivers. Newspaper, television, and
radio are the examples of one to many
communication.
INTERNET ETIQUETTE
It is a set of social conventions that
facilitate interaction over networks, ranging
from Usenet and mailing lists to blogs and
forums.
WHAT EXACTLY IS CYBER
SECURITY ?
•Cyber security refers to the body of
technologies, processes, and practices
designed to protect networks, devices,
programs, and data from attack, damage,
or unauthorized access. Cyber security
may also be referred to as information
technology security.
HOW DO YOU ENSURE CYBER SECURITY
?
•Tip #1 - You are a target to hackers
• Tip #2 - Keep software up-to-date
•Tip #3 - Avoid Phishing scams - beware
of suspicious emails and phone calls
•Tip #4 - Practice good password
management
• Tip #5 - Be careful what you click
HOW DO YOU ENSURE CYBER SECURITY
?
•Tip #6 – Never leave devices unattended
•Tip #7 – Safeguard Protected Data
•Tip #8 – Use mobile devices safely
•Tip #9 – Install antivirus/anti-malware
protection
•Tip #10 – Back up your data
WHAT IS PROPER INTERNET ETIQUETTE ?
• 1. When typing never write in all capital
letters.
•2. Don’t plagiarize.
•3.Use proper quotes and always use the
whole quote.
•4. Don’t gossip and keep personal
information personal.
WHAT ARE THE RULES OF DIGITAL
ETIQUETTE?
•Treat others how you want to be treated.
Almost everyone is familiar with the
golden rule.
•Keep your messages and posts positive
and truthful.
•Double-check your messages before you
hit send.
THE GOLDEN RULE OF
NETIQUETTE:
“ DO NOT DO OR SAY ONLINE
WHAT YOU WOULD NOT DO OR SAY
OFFLINE “
DEFINITIONS OF
TERMS
•Ethics - A moral principles that govern a person's
behavior or the conducting of an activity.
• Phishing- is a type of social engineering attack often
used to steal user data, including login credentials and
credit card numbers.
•UseNet - One of the oldest computer network
communication systems. Meant for sharing messages
and files between two universities, it grew rapidly and
•References:
•https://www.polishedmanners.co.uk/why-
do-we-need-
etiquette/#:~:text=Etiquette%20helps%20us%
20to%20know,relaxed%20atmosphere%20whe
rever%20we%20go.
•https://coursedesign.colostate.edu/obj/corer
ulesnet.html
APPLICATION
I. Instructions: Identify the scenario if it is one
to one communication or one to many
communication.
1. You talking to a friend in a pub about why
you still live at home with your mother.
2. You and your classmates are talking
together.
3. You sending emails to a an old friend from
APPLICATION
4. In Montevista National High School you are
invited as a guests speaker for their program.
5.Your boss talking to you during your break
about your work performance.
II. Give at least 5 on how we can stay safe
online.
1-5
THANK YOU FOR
LISTENING 

NETIQUgggggggggggggggggggggyyyyETTE.pptx

  • 1.
  • 2.
    OBJECTIVES •At the endof the lesson, students are expected to: A. Identify proper ways for online safety B. Discuss the implication of safety etiquette; and C. Apply online safety, security, ethics, and etiquette standards and practice in the
  • 4.
    ACTIVITY: GUESS THE PICTUREWITH WORD/S. 1. ONLINE ETHICS 2. NETIQUETTE
  • 5.
    ACTIVITY: GUESS THE OICTUREWITH WORD/S. 3. INTERNET 3. CYBER SECURITY
  • 6.
    ONLINE ETHICS ANDETIQUETTE Netiquette is a combination of the words network and etiquette and is defined as asset of rules for acceptable online behavior. Similarly, online ethics focuses on the acceptable use of online resources in an online social environment.
  • 7.
    HOW CAN WESTAY SAFE ONLINE ? 1. Create Complex Passwords. 2. Boost Your Network Security. 3. Use a Firewall. 4. Click Smart
  • 8.
    •S for Safe-Keep your personal details away from strangers. •M for Meet- Don’t Meet people that you don’t know online unless you’re with a trusted adult. •A for Accept- Don’t click any links that your unsure about. Ask trusted adult. •R for Reliable- Don’t believe everything people tell you. Always Check trusted sources to find the truth.
  • 9.
    HOW CAN WESTAY SAFE ONLINE ? •5. Be a Selective Sharer. •6. Protect Your Mobile Life •7. Practice Safe Surfing & Shopping. •8. Keep up to date.
  • 10.
    WHAT IS ANETIQUETTE ? Etiquette is defined as the formal manners and rules that are followed in social or professional settings. Example: The rules of writing a thank you note for a friend or family.
  • 11.
    THE 10 ONLINEETIQUETTE RULES •Rule 1: Remember the Human For this, remember, it is important to remember the human. You should never say something to someone online that you would not say to him or her in person. •Rule 2: Be Ethical It can however be easy to let your ethics slip when online. Illegal streaming of movies, illegal downloading of music and copyright infringement is still breaking the law.
  • 12.
    •Rule 4: Respectother people's time and data limits When you post anything online, write an email or share a post it will take other people's time to read. Shea (2011) argues "it's your responsibility •Rule 3: Know where you are Netiquette varies from website to website. What is acceptable in one environment is not acceptable in another.
  • 13.
    •Rule 6: Shareexpert knowledge Sharing is one of the principles behind the majority of internet services. If you are knowledgeable in an area then you have something to offer! Share what you know and it •Rule 5: Make yourself look good online Make sure you are careful with what you share. It is always advisable not to share anything embarrassing, illegal or inappropriate.
  • 14.
    •Rule 7: Keepdisagreement healthy •People are always going to disagree and that is healthy. Never reduce the discussion to personal issues and avoid inappropriate language. •Rule 8: Respect other people’s privacy When you are networked to someone on a website like Facebook or LinkedIn, You need to ensure you do not breach anyone’s wishes by sharing any of the content they have made
  • 15.
    •Rule 9: Don'tabuse your power If you are an administrator or facilitator for any online environment, make sure you do not abuse the privilege of access that your position may give you. •Rule 10: Be forgiving of other people's mistakes. People will make mistakes when they are new to online environments. Everyone has to start somewhere, so try and be forgiving of other's
  • 16.
  • 17.
    •One to onecommunication: Information is exchanged between one source and one receiver. For example, when you talk or write something to your friend, it is one-to-one communication.
  • 18.
    •One to manycommunication: A single source provides information's to multiple receivers. Newspaper, television, and radio are the examples of one to many communication.
  • 19.
    INTERNET ETIQUETTE It isa set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums.
  • 20.
    WHAT EXACTLY ISCYBER SECURITY ? •Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security.
  • 21.
    HOW DO YOUENSURE CYBER SECURITY ? •Tip #1 - You are a target to hackers • Tip #2 - Keep software up-to-date •Tip #3 - Avoid Phishing scams - beware of suspicious emails and phone calls •Tip #4 - Practice good password management • Tip #5 - Be careful what you click
  • 22.
    HOW DO YOUENSURE CYBER SECURITY ? •Tip #6 – Never leave devices unattended •Tip #7 – Safeguard Protected Data •Tip #8 – Use mobile devices safely •Tip #9 – Install antivirus/anti-malware protection •Tip #10 – Back up your data
  • 23.
    WHAT IS PROPERINTERNET ETIQUETTE ? • 1. When typing never write in all capital letters. •2. Don’t plagiarize. •3.Use proper quotes and always use the whole quote. •4. Don’t gossip and keep personal information personal.
  • 24.
    WHAT ARE THERULES OF DIGITAL ETIQUETTE? •Treat others how you want to be treated. Almost everyone is familiar with the golden rule. •Keep your messages and posts positive and truthful. •Double-check your messages before you hit send.
  • 25.
    THE GOLDEN RULEOF NETIQUETTE: “ DO NOT DO OR SAY ONLINE WHAT YOU WOULD NOT DO OR SAY OFFLINE “
  • 26.
    DEFINITIONS OF TERMS •Ethics -A moral principles that govern a person's behavior or the conducting of an activity. • Phishing- is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. •UseNet - One of the oldest computer network communication systems. Meant for sharing messages and files between two universities, it grew rapidly and
  • 27.
  • 28.
    APPLICATION I. Instructions: Identifythe scenario if it is one to one communication or one to many communication. 1. You talking to a friend in a pub about why you still live at home with your mother. 2. You and your classmates are talking together. 3. You sending emails to a an old friend from
  • 29.
    APPLICATION 4. In MontevistaNational High School you are invited as a guests speaker for their program. 5.Your boss talking to you during your break about your work performance. II. Give at least 5 on how we can stay safe online. 1-5
  • 30.