Unit 5: THE NETIQUETTE AND THE COMPUTER ETHICS Flashcards
it’s network etiquette - that is the etiquette of cyberspace and “etiquette” means the forms of required by good breeding or prescribed by authority to be required in social or official life.
NETIQUETTE
Even though you may be interacting with a computer screen, you are communicating with a real person who will react to your message.
REMEMBER THE GOLDEN RULE
treat others with the same respect that you would like to receive and avoid confrontational or offensive language.
Make a good impression
How to make a good impression?
- AVOID SLANG, ACRONYMS, AND TEXT TALK
- AVOID “SCREAMING” IN TYPED MESSAGES
- PROOFREAD YOUR
MESSAGES BEFORE SENDING
THEM - EXERCISE GOOD JUDGMENT WHEN SHARING INFORMATION
WITH OTHERS ONLINE - RESPECT DIVERSITY IN VIEWPOINTS
Ten (10) Commandments of Computer Ethics:
- RULE 1: REMEMBER THE HUMAN
- RULE 2: ADHERE TO THE SAME STANDARDS OF BEHAVIOR ONLINE THAT YOU FOLLOW IN REAL LIFE
- RULE 3: KNOW WHERE YOU ARE IN CYBERSPACE
- RULE 4: RESPECT OTHER PEOPLE’S TIME AND BANDWIDTH
- RULE 5: MAKE YOURSELF LOOK GOOD ONLINE
- RULE 6: SHARE EXPERT
KNOWLEDGE - RULE 7: HELP KEEP FLAME WARS UNDER CONTROL
- RULE 8: RESPECT OTHER PEOPLE’S PRIVACY
- RULE 9: DON’T ABUSE YOUR POWER
- RULE 10: BE FORGIVING OF OTHER PEOPLE’S MISTAKES.
REMEMBER THE HUMAN
RULE 1
ADHERE TO THE SAME STANDARDS OF BEHAVIOR ONLINE THAT YOU FOLLOW IN REAL LIFE
RULE 2
KNOW WHERE YOU ARE IN CYBERSPACE
RULE 3
RESPECT OTHER PEOPLE’S TIME AND BANDWIDTH
RULE 4:
MAKE YOURSELF LOOK GOOD ONLINE
RULE 5
SHARE EXPERT
KNOWLEDGE
RULE 6
HELP KEEP FLAME WARS UNDER CONTROL
RULE 7
RESPECT OTHER PEOPLE’S PRIVACY
RULE 8
DON’T ABUSE YOUR POWER
RULE 9
BE FORGIVING OF OTHER PEOPLE’S MISTAKES.
RULE 10
Risks while using Online Services:
- Cybercrime
- Cybercriminals
is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming and child pornography) is used as a tool to commit an offense.
Cybercrime
use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes.
Cybercriminals
Common forms of Cybercrimes:
- Copyright Infringement
- Plagiarism
- Computer addiction
- Virtual self
the violation, piracy or theft of a copyright holder’s exclusive rights through the unauthorized use of a copyrighted material or work.
Copyright Infringement
an act or instance of using or closely imitating the language and thoughts of another author without authorization.
Plagiarism
Computer addiction:
- Offline addiction
- Online addiction
generally used when speaking about excessive gaming behavior, which can be practiced both offline and online.
Offline Addiction
Also known as “Internet Addiction”, gets more attention in general from scientific research than offline computer addiction, mainly because most cases of computer addiction are related to the excessive use of the Internet.
Online Addiction
The persona virtually.
Virtual Self
Criminal activities:
- Hacking
- Identity Theft
- Electronic theft
- Cyberbullying
- Cyber sex
- Child pornography
- Cyber defamation
Unauthorized access of or interference with computer systems,
servers, or other
information and communication systems.
Hacking
An attempt to obtain sensitive information such as usernames, passwords, and credit card details and (indirectly money), often for malicious reasons.
Identity Theft
Illegal downloading, Obtaining files that you do not have the right to use from the internet.
Electronic Theft
The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature.
Cyberbullying
Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration.
Cybersex
Is a form of child sexual exploitation. Unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti Child Pornography Act of 2009, committed through a computer system.
Child Pornography
Is an unprivileged false statement of fact, which tends to harm the reputation of a person or company.
Cyber Defamation
Internet Threats
- Malware
- Pharming
- Phishing
- Ransom ware
one of the more common ways to infiltrate or damage your computer.
Malware
a common type of online fraud. A means to point you to a malicious and illegitimate website by redirecting the legitimate URL.
Pharming
used most often by cyber criminals because it is easy to execute and can produce the results they are looking for with very little effort.
Phishing
a type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed.
Ransom ware
Two Common Types of Ransom ware:
- Lock Screen Ransom ware
- Encryption Ransom ware
displays an image that prevents you from accessing your computer
Lock Screen Ransom ware
encrypts files on your system’s hard drive and sometimes on shared network drives, USB drives, external hard drives, and even some cloud storage drives, preventing you from opening them
Encryption Ransom ware
one of the more common methods of both sending information out and collecting it from
unsuspecting people.
Spam
Third parties to infiltrate your computer often use
Spyware and adware.
Software that collects
personal information about you without you knowing. They often come in the form of a ‘free’ download and are installed automatically with or without your consent.
Spyware
It may not be a term you are familiar with, but there is a good chance you or someone you know has been affected by one.
A malicious program that is disguised as, or embedded within, legitimate software
Trojan horse
Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting your computer, as well as the computers of everyone in your contact list.
Viruses
is another method used by cyber criminals to capture personal information.
Virtual “listening in”
on information that is shared
over an unsecure (not encrypted) Wi-Fi network.
Wi-Fi eavesdropping
unlike a virus, goes to work on its own without attaching itself to files or Programs. It lives in your computer memory, does not damage or alter the hard drive and propagates by sending itself to other computers in a network - whether within a company or the Internet itself.
Worms