You are on page 1of 7

E L T 1 : L I V I N G I N T H E I T E R A P a g e | 28

LESSON 6
NETIQUETTE: ONLINE MANNER MATTERS
I. Module Overview

This module will give students the insights on the network etiquettes. Specifically,
this module will discuss the following topics:
1. Netiquettes and Its Types
2. Online Security, Safety and Ethics
3. Internet Threats
4. Protecting Reputations Online

II. Desired Learning Outcomes

At the end of this lesson, the students should be able to:

• define and understand netiquette


• list the types of netiquette
• know the online security, safety and ethics
• identify possible internet threats

III. Take Off/Motivation

Read and analyze carefully the following scenarios. What is your opinion of the
behaviors involved? What equitable solutions can you give?
1. David is an Internet expert. He reads a question from a newcomer
in an online discussion group. For him the answer is easy but the
"newbie" is having trouble. Alan responds, "Hey newbie! Can't you read a
book? Don't ask such a dumb question!"
_______________________________________________________________
________________________________________________________________
________________________________________________________________
___________________________________________________________
2. Josh is really upset about his classmate, M.D. He is so angry that
he decides to post a mean comment about M.D. anonymously in an
online discussion group.
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
3. Marcie is in the middle of an email she is writing to a friend. The
phone rings and Marcie leaves her computer with the email still on the
screen. You decide to check it out.
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
Retrieved from:
https://sites.google.com/site/group5timesavers/home/netiquette-
moduleassessment/case-studies

IV. Content Focus

When you are communicating with others on the internet, good manners and
proper behaviors must always be taken into consideration. These manners and
behaviors must be observed whether you are writing an email message,
participating in the chat session, or posting a message in any social media
platforms.
E L T 1 : L I V I N G I N T H E I T E R A P a g e | 29

What is Netiquette?

• Internet etiquette
• Etiquette of cyberspace
• Concerned with the “proper” way to communicate in an online
environment (https://techterms.com)
• Netiquette (net + etiquette) can be defined as the informal guidelines
developed by the users of the Internet for acceptable online behavior.
These are developed over time in a variety of virtual environments
and internet applications. (Joseph Kayany)
- Netiquette is a made-up word from the words net and etiquette. Netiquette
thus describes the rules of conduct for respectful and appropriate
communication on the internet. Netiquette is often referred to as etiquette
for the internet. ... Netiquette is mostly used for dealing with unknown people
on the internet.
- Netiquette thus describes the rules of conduct for respectful and
appropriate communication on the internet.

Types of Netiquette
1. Netiquette Basics
a. Help the newbies
b. Research before asking
c. Remember emotion
2. Netiquette of Sending
a. Be brief
b. Use whitespaces
c. Use descriptive subject lines
d. Stay on-topic
e. Be careful sending attachment
f. Copy the minimum number of people
3. Netiquette of Replying
a. Acknowledge important communications
b. Check the current information before replying
c. Reference past communications
E L T 1 : L I V I N G I N T H E I T E R A P a g e | 30

d. Summarize for the group


4. Netiquette of Confidentiality
a. Don’t publicize other’s email addresses
b. Never send what you don’t read
c. Remember archiving
d. Respect copyright
Online Safety and Security

One of the fastest and easiest ways that we are relying on when
accessing and retrieving information is through the use of the internet.
Since time immemorial, internet has been considered as the library of all
libraries where we can get lots of information all over the world from
different people, events, and places. Moreover, because of its rapid
change and diverse needs of users, IT experts enhanced and improved
the internet that made it became more powerful. Along with this are the
possible threats and dangers that may be harmful for the people living in
the virtual world. Listed below are the possible threats that netizens must
be aware of when using the internet:
1. Phishing
 Defined as a software or program used by an attacker to obtain
personal information
 Commonly target user passwords to hack and take control of a
user account.
2. Pharming
 A malicious website that resembles a legitimate website, used to
gather usernames and passwords.
3. Malware
 Short term for malicious software and is the generic term for
spyware and adware.
 A computer software sent by attackers to inflict chaos on a
computer’s operation and processes.
4. Internet scam
 A type of scam that misleads the user in many ways attempting to
make lead of them. The purpose is to cheat the target of their
personal property directly rather than private information through
fabricated promises, confidence tricks and many more.
5. Virus and worms
 Virus is a program designed to replicate by attaching itself into
other computer programs, data files or boot sector of the hard
drive.
 Worm is can be injected into a network by any types of means,
like a USB stick or an email attachment.
 Trojan Horse – commonly known as a “Trojan”, is a type of
malware that disguises itself as a normal file or program to trick
users into downloading and installing malware.
 Iloveyou Virus – also known a love bug or love letter. A
computer worm attached on email that have infected 10 million
of windows personal computer that cause computer shutdown
and deletion of files on the year 2000. Created by Filipino
students Onel De Guzman and reonel Ramones.
6. Computer Bug
 A malfunction of computer system through its runtime.
 The term “bug” originated to the Moth found on the Mark II by
Grace Hopper that cause a system malfunction.
7. Cyber Stalking
 The use of the internet or other electronic device to harass or stalk
individual, group or organization.
8. Cyber Bullying
 The act of tormenting, threatening, harassing or embarrassing
another person using the internet or other technologies.
E L T 1 : L I V I N G I N T H E I T E R A P a g e | 31

9. Spam
 An unsolicited email, instant messages, or social media
messages. These messages are fairly easy to spot and can be
damaging if you open it.
10. Spoofing
 Describes a criminal who impersonates another individual or
organization, with the intent to gather personal or business
information.
Ten Core Roles of Netiquette

1. Remember the human


2. Adhere at the same standard
of behavior online that you
would follow in real life.
3. Know where you are in the
cyberspace
4. Respect other people’s time
and bandwidth
5. Make yourself look good
6. Share expert knowledge
7. Help keep flame wars under
control
8. Respect other people’s privacy
9. Don’t abuse your power
10. Be forgiving of other people’s
mistakes

Ten Rules Of Netiquette


Netiquette is a set of rules for behaving properly online. There are Ten rules of
Netiquette that everyone who goes online should follow. You should remember them
every time you go online. The ten rules are as follows:

3 Rule No. 1: Remember the Human


You need to remember that you are talking to a real person when you are online. Ask
yourself when sending an or posting: Would I say this to the person’s face? If not, do not
send it or post it or chat about it. Always ask permission before posting anything about
someone on the Web.

4 Rule No.2: Adhere to the same standards online that you follow in real life
You need to behave the same way online that you do in real life. You need to remember
that you can get caught doing things you should not be doing online just like you can in
real life. You are still talking to a real person with feelings even though you can’t see
them.

5 Rule no. 3: Know where you are in cyberspace.


Always take a look around when you enter a new domain when surfing the web. Get a
sense of what the discussion group is about before you join it. Be the better person. If
someone is being rude in cyber space, do not make it worse.

6 Rule no.4: Respect other people’s time and bandwidth.


Remember people have other things to do besides read yours. You are not the center of
their world. Keep your post and s to a minimum by saying what you want to say. Use the
subject line so the recipient knows what the is about. If you want a response or action
put it in the subject line. Double –check the list of people to whom you are forwarding a
message to make sure no one is on it who shouldn’t be.

7 Rule No. 5: Make yourself look good online.


Remember to always check your spelling and grammar before posting. Always know
what you are talking about and make sense saying it. Be polite and pleasant to
everyone.
E L T 1 : L I V I N G I N T H E I T E R A P a g e | 32

8 Rule no. 6: Share expert knowledge


Ask questions online. Share what you know online. Post the answers to your questions
online because someone may have the same question you do.

9 Rule No.7: Help keep flame wars under control


Definition – “Flaming" is what people do when they express a strongly held opinion
without holding back any emotion Netiquette does not forbid flaming. Netiquette does,
however, forbid people who are flaming to hurt discussion groups by putting the group
down.

10 Rule No. 8: Respect other people’s privacy


Do not read other people’s mail without their permission. Going through other people’s
things could cost you your job or you could even go to jail. Not respecting other people’s
privacy is bad Netiquette.

11 Rule No.9: Don’t abuse your power.


Do not take advantage of other people just because you have more knowledge or power
than them. Treat others as you would want them to treat you if the roles were reversed.
For example, system admins should never read private.

12 Rule No. 10: Be forgiving of other people’s mistakes.


Do not point out mistakes to people online. Remember that you were once the new kid
on the block. You still need to have good manners even though you are online and
cannot see the person face to face.

13 Etiquette There are etiquette rules for messages also. They are as follows: Check
your daily Delete unwanted messages. Keep messages in your box to a minimum Mail
messages can be downloaded and save for future references. Never assume that you
can be read by no one but yourself. Remember there are always people lurking around
online

“Ten Commandments” of Computer Ethics


Ten commandments taken from the User Guidelines and Netiquette By Arlene
Rinaldi. Ten commandments are as follows:

Thou shalt not use computer to harm people.

Thou shalt not interfere with other people’s work.

Thou shalt not snoop around other people’s files.

Thou shalt not use a computer to steal

Thou shalt not use a computer to bear false witness

Thou shalt not use or copy software.

Thou shalt not use other people’s computer resources.

Thou shalt not appropriate other people’s intellectual output.

Thou shalt think about the social consequences of the program you write.

Thou shalt use a computer in ways that show consideration and respect.

Protecting Reputations Online

In this new world of communicating and connecting with other people,


one’s safety in the online environment is everybody’s concern and
E L T 1 : L I V I N G I N T H E I T E R A P a g e | 33

accountability. The government itself enacted laws and regulations to


protect the welfare of every online user from possible harm and danger.
Here are some of these laws and regulations:
1. Republic Act 10627 or Anti-Bullying Act of 2013
 This law includes protection of individuals from bullying though
electronic means. Bullying invades an individual’s privacy by
using photos and other information meant to disgrace that
individual.
2. Republic Act o10175 or Cybercrime Prevention Act of 2012
 This law protects an individual from various unwanted online
and cyber acts that may harm or evade one’s privacy and
integrity.
Aside from these, various tips are also recommended to strengthen
your users’ safety and protection in the online world.
Think Before You Click

Here are things you might want to consider


before posting something over the internet.
1. Before you post something on the web, ask
these to yourself:
a. Would you want your parents or
grandparents to see it?
b. Would you want your future boss to see
it?
c. Once you post something on the web,
you have no control of who sees your
post.
2. Your friends depend on you to protect their
reputation online. Talk to your friends about
this serious responsibility.
3. Set your post to “private”. In this way,
search engines will not be able to scan that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the one
who posted it to pull it down or report it as inappropriate.

REFERENCE

Apostol, A. L. (2016, August 23). slideshare. Retrieved from slideshare.net:


https://www.slideshare.net/ArahLouiseApostol19/online-safety-
andsecurity
Quiambao, A. (2018, July 23). Slideshare. Retrieved from slideshare.net:
https://www.slideshare.net/AngelitoQuiambao/online-safety-
securityethics-amp-etiquette
Syazwani101. (2010, October 11). slideshare. Retrieved from slideshare.net:
https://www.slideshare.net/syazwani101/netiquette-5411949
E L T 1 : L I V I N G I N T H E I T E R A P a g e | 34

Innovative Training Works Inc. (2016). Empowerment Technologies. Rex Book


Store.

You might also like