Professional Documents
Culture Documents
By:
Rosario, Maricar C.
Submitted to
Date passed
2
Approval Sheet
1. Rosario, Maricar C.
Acknowledgments
First and foremost, praises and thanks to the God, the almighty, for his
successfully.
We express our deep and sincere gratitude to our research adviser Mr.
John Manuel Padre for the continuous support to our study and research. We
could not have imagined having a better adviser for our research study.
We would like to express our deepest gratitude to our School Director Ms.
To all relatives, friends, and others who in one way or another shared their
Above all, to the Great Mighty, the author of knowledge and wisdom, for
Thank you.
4
Dedication
The researcher aims to develop a study that is worthy to know the Case
Working Environment, the contents of the study should be able to provide data
The researcher finally dedicated this research paper to our families whose
untiring support and assistance have made possible the fruition of our efforts. To
our friends and classmates for their cooperation while conducting the study.
And most of all to our great creator our Almighty God the author of
Abstract
Table of Contents
Page/s
Title Page
Approval Sheet
Acknowledgments
Dedication
Abstract
Table of Contents
d. Hypothesis
f. Theoretical Framework
g. Conceptual Framework
h. Research Paradigm
j. Definition of Terms
7
e. Overall Synthesis
CHAPTER 3: METHODOLOGY
a. Research Design
b. Sampling Technique
c. Research Locale
f. Research Instrument
a. Construction
b. Validation
g. Statistical Treatment
DATA
RECOMMENDATION
8
a. Summary of Findings
b. Conclusion
c. Recommendation
REFERENCES
APPENDICES
9
(all photos/ images/ and content of appendices listed here, with page
numbers)
CHAPTER 1
Netiquette" refers to Internet etiquette. This simply means the use of good
reading something someone else has typed. This type of communication does
not allow each person to see facial expressions, body language, or hear
will help you to maintain and establish positive online relationships as well as
Netiquette is short for "Internet etiquette." Just like etiquette is a code of polite
online communication.
11
Common guidelines include being courteous and precise, and avoiding cyber-
bullying. Netiquette also dictates that users should obey copyright laws and avoid
overusing emoticons
Netiquette.
c. Theoretical Framework
12
Somewhere around the 1970s early users of the Internet laid the basis for a
set of conventions and rules for doing things on the Internet. These rules are
netiquette to mean a body of conventions and manners for using the Internet as
manners and practices. In this broad definition, users include current and future
companies, organizations, and so forth. The uses of the Internet in this definition
include uses such as surfing web pages and creating them, searching,
advertising, offering web or ftp services, participating in web fora, reading and
writing to newsgroups and mailing lists, chatting, sharing files, trading, and so on.
Already the existing conventions of using the Internet differ among countries
amazingly little has been written about the cultural dimensions of netiquette.
There are many studies that concern netiquette as culture, but the question of
different attitudes towards netiquette between cultures has been left largely
etiquette, and so forth, but in computer scientists' discourse, netiquette has been
(2004) notes that there is a diversity of net users, in terms of their culture, age,
enthusiasm, income, and so forth. She also notes that different technologies
require different forms of etiquette; for example, the etiquette of text messaging is
different from the etiquette of email. Furthermore, the netiquettes between web
News”1 that promotes students around the world to refine and promote a more
technologies may be culturally determined. For instance, Lee (2000) found that in
rigid (Preece, 2004) and they should not be understood as such. Yet, the
netiquette (see, e.g., Preece, 2004), but those polls typically do not collect
Internet usage patterns, and they are grounded in “official netiquette.” Although
2006 IADIS 368 in attitudes towards netiquette, the poll would be biased by
14
framework for the study. We believe that the question of a culturally fair, global
d. Conceptual Framework
The paper focuses on a fundamental problem that of developing goal-oriented
Netiquette covers not only rules to maintain civility in discussions (i.e., avoiding flames),
but also special guidelines unique to the electronic nature of forum messages. For
may not appear correctly for all readers. In most cases, netiquette is enforced by fellow
e. Research Paradigm
INTERVIEW
PROCESS
Inform or do some seminars/activities for students so
OUTPUT they can aware and also improve their knowledge
about computer netiquette
15
the research Instrument to be able to know their prior knowledge about computer
students so they can aware and also improve their knowledge about computer
netiquette.
The Importance of our study is to give knowledge about on how the students will
netiquette.
SCHOOL
To let them know the other uses and purposes of computer netiquette.
GOVERMENT
The school government is also using computer to access all the data of the
g. Definition Of Terms
INTERNET ETIQUETTE- Online etiquette is ingrained into culture, although
etiquette in technology is a fairly recent concept. The rules of etiquette that apply
when communicating over the Internet or social networks or devices are different
CHAPTER 2
synthesis.
1994). It has served as a world wide network of computers and databases that
are used for government, research and academia (Donaton, 1994). Currently
there are anywhere from ten million to thirty million users on the internet
(Donaton, 1994). In using the internet several people have developed a sort of
internet etiquette in order to help new and current users keep it a professional
network” (Algeo & Algeo, 1994). The term netiquette is a catch-all for the forms of
politeness and respect seen on Usenet, in mailing lists, in live chat systems, and
on other electronic forums (Netiquette, 2002). It can also be defined as the rules
(Sullivan, 2002). The following are the most common netiquette rules. These
rules are mainly common sense, but should be reviewed often so that users of
the internet can continue to create an environment where people can work and
learn cooperatively.
This means to always remember that you are not talking to just another
computer. There is a person behind the screen who has feelings just like you.
18
Users need to take into account that the people they are communicating with can
not see or hear their gestures, expressions, or tones making your words the only
topics are harder than others to communicate using only words. Some things can
be taken out of context and misunderstood creating a lot more work for the
remember you are talking to someone who has feelings and rights that need to
be respected and treated as if you were dealing with them face to face (2002).
Adhere to the same standards of behavior online that you follow in real life
While some individuals feel that the internet gives them some ambiguity and that
they can get away with more things on the internet, users should always use
caution and ethics in their dealings. Ethics on the internet are referred to as
nethics (2002). One reason for individuals lack of standards or ethics on the
internet may be because they forget they are dealing with real people due to the
Thou shalt not use or copy software for which you have not paid.
Thou shalt not use other people's computer resources without authorization.
19
Thou shalt think about the social consequences of the program you write.
Thou shalt use a computer in ways that show consideration and respect. (2002).
These are very basic and very easy guidelines to follow and if followed users
Knowing where you are on the internet means knowing what kind of a chat room
or web site you are on. Each area of the internet has its own set of rules, values,
on one site may be found offensive or rude on another site (Shea, 1994). Another
similarity to real life would be that each group page has its own acceptable tone
that users are expected to use when operating with those people (2002). A pair
of attorneys I found in one of the articles provided the perfect example for this.
They sent out advertisements all over the internet and did not receive a very
positive response because they sent the ad everywhere (Donaton, 1994). The
pair quickly learned that there are places on the internet to advertise and other
The first question you may have is what is bandwidth? The answer is bandwidth
is “the information carrying capacity of the cables and wires that connect
computers together” (2002). It is how much your computer can process at one
20
time. Some computers have a higher bandwidth than others and therefore can
process faster than others, while some computers get overloaded with
information very quickly. It is important that users do not seed out too much
information to other users because you never know what size their bandwidth is.
One major error is sending out junk mail. The attorneys I mentioned earlier
learned this when they sent out their advertisement because they sent out
unmarked messages to users which on the internet are the same as junk mail
(Donaton, 1994).
Make yourself look good online. This rule ties into the rule about remembering
the human. Users judge other users by how well they write because they cannot
connect with the actual person (Shea, 1994). While your friends probably won’t
consider you uneducated if you send them an email with a few spelling errors
someone else might (2002). Another thing to remember is that the information on
the internet can be found by anyone and if you are working on a school or work
project you are not only representing yourself but also your school, organization,
or business so you want to make sure you do a good job and use the best
A great place to share and find information are forums set up specifically for this,
with the same issues. Asking questions online is effective because may other
internet users are knowledgeable on your topic and can help you as well as
others with the same question (Shea, 1994). If you are going to answer another
21
users question make sure the information you are giving is accurate (2002). If
you do not know the answer for sure either look up an answer from somewhere
you know you will find correct information or do not answer it (2002).
Help keep flame wars under control. When users express their emotions to other
sending a flame message the user may attack your opinion, personality, and any
other personal thing they find about you whether you deserve it or not (2002).
The best thing to do to keep flame wars under control is to not respond when
others send you a flame message and try to refrain from sending any yourself.
Personal attacks will not solve any problems. Keep in mind that other people can
How would you feel if someone opened your mail before you got home? The
same feelings apply to email. While it may be hard to tell if someone has opened
an email before you it can make users feel violated if they do find out (2002).
Think of all of the personal information transferred through email and consider
how you would feel if someone was looking at your emails without your
permission. This rule ties into the ethics users need to have on the internet.
While some individuals are quite computer savvy, there are still some who are
not quite up to par on knowing what is going on in the internet world. Just
because you may know more than others about the internet, giving you power
22
over them, does not give you the right to exploit them (Shea, 1994). A more
productive thing to do would be to help educate them, going back to our rule on
sharing expert knowledge. The more people know about the internet the quicker
The most important thing to remember no matter where you are is that everyone
makes mistakes. Think of a time when you make a mistake. How would you
prefer someone help you correct your mistake? Going back to treating people
like they have feelings and not like they are just another computer, if another
user makes a mistake it should not be your goal to embarrass them about it in
front of other users (Shea, 1994). Would you like someone to do that to you? The
best way to point out another users, mistake is privately, usually through email,
Applying these rules to your internet use will help you be a professional and
productive member of the internet society. Always remember the golden rule and
apply it to everything whether in person or over some sort of media channel, treat
While some individuals are quite computer savvy, there are still some who are
not quite up to par on knowing what is going on in the internet world. Just
because you may know more than others about the internet, giving you power
over them, does not give you the right to exploit them (Shea, 1994). A more
productive thing to do would be to help educate them, going back to our rule on
sharing expert knowledge. The more people know about the internet the quicker
RELATED STUDIES
Somewhere around the 1970s early users of the Internet laid the basis for a set
of conventions and rules for doing things on the Internet. These rules are
netiquette to mean a body of conventions and manners for using the Internet as
manners and practices. In this broad definition, users include current and future
companies, organizations, and so forth. The uses of the Internet in this definition
include uses such as surfing web pages and creating them, searching,
advertising, offering web or ftp services, participating in web fora, reading and
24
writing to newsgroups and mailing lists, chatting, sharing files, trading, and so on.
Already the existing conventions of using the Internet differ among countries
amazingly little has been written about the cultural dimensions of netiquette.
There are many studies that concern netiquette as culture, but the question of
different attitudes towards netiquette between cultures has been left largely
etiquette, and so forth, but in computer scientists' discourse, netiquette has been
(2004) notes that there is a diversity of net users, in terms of their culture, age,
enthusiasm, income, and so forth. She also notes that different technologies
require different forms of etiquette; for example, the etiquette of text messaging is
different from the etiquette of email. Furthermore, the netiquettes between web
communities differ (Shea, 2004). There is a project called “Global Teach Net
News”1 that promotes students around the world to refine and promote a more
technologies may be culturally determined. For instance, Lee (2000) found that
rigid (Preece, 2004) and they should not be understood as such. Yet, the
netiquette (see, e.g., Preece, 2004), but those polls typically do not collect
Internet usage patterns, and they are grounded in “official netiquette.” Although
attitudes towards netiquette, the poll would be biased by default. Namely, giving
a preordained list of netiquette issues sets a fixed framework for the study. We
important one, and that studies of it need to begin with more cultural sensitivity
While some individuals are quite computer savvy, there are still some who are
not quite up to par on knowing what is going on in the internet world. Just
because you may know more than others about the internet, giving you power
over them, does not give you the right to exploit them (Shea, 1994). A more
productive thing to do would be to help educate them, going back to our rule on
sharing expert knowledge. The more people know about the internet the quicker
26
increasingly important one, and that studies of it need to begin with more cultural
OVERALL SYNTHESIS
increasingly important one, and that studies of it need to begin with more cultural
CHAPTER 3
METHODOLOGY
27
Research Design
Sampling Technique
solve this problem. And to give an advice to person who will choose this research
title.
Research Locale
28
The study was conducted at AMA Computer Learning Center during the
2nd semester of the academic year 2019-2020. The interview occurred at Begonia
No. Of
% AGE RANGE
respondents
MALE 1 100% 45
TOTAL 1 100% 45
conduct an interview and gather the data needed on the study. After the
data was collected, the researcher encode and use it to finish the
Research Instrument
1. What Information that you do want anyone to see can you put on social
networking websites?
business practices and those that are considered dishonest. Know right
6. It is perfectly fine to write e-mail in capital letters because it gets your point
across?
whenever possible?
9. It is good etiquette to back up videos online. There are many websites that
10. What can you do to help prevent accidents when using a computer or
laptops?
Data Analysis
or ideas from the responses of the respondents using assigned codes and
CHAPTER 4
DATA
The contents of this chapter it will show the presentation analysis, and
(Interview Question 1): What Information that you do not want anyone to see that
Based from the result, the codes and themes determined from the
directly related to the theme of the 1 st interview question, what information that
you do not want anyone to see that you put on social networking websites.
32
Based from the result, the codes and themes determined from the
feedback of the respondents are violence. These codes are directly related to the
theme of the 2nd interview question, why is it bad netiquette to promote human
information should not be given on request to people or sites you do not have
relationship with?
Based from the result, the codes and themes determined from the feedback
of the respondents are privacy. These codes are directly related to the theme of
the 5th interview question, It is not acceptable to lie online, however, personal
information should not be given on request to people or sites you do not have
relationship with?
(Interview Question 9): It is good netiquette to back up videos online. There are
some overlap, online
backup services shouldn't be
Based from the result, the codes and themes determined from the feedback
of the respondents are online backup services. These codes are directly related
to the theme of the 9th interview question, It is good netiquette to back up videos
online. There are many websites that allows users to store videos?
commonly accepted business practices and those that are considered dishonest.
They will assess how refined Manners How refined you are in
Based from the result, the codes and themes determined from the
feedback of the respondents have manners. These codes are directly related to
the theme of the 4th interview question, It is proper netiquette to know the
difference between commonly accepted business practices and those that are
considered dishonest. Know right from wrong when doing business. Be ethical?
35
(Interview Question 8): Secure sites encrypt internet data transmission. They
might want to
ensure their
personal information
hackers.
Based from the result, the codes and themes determined from the feedback
of the respondents are safety from hackers. These codes are directly related to
the theme of the 8th interview question, Secure sites encrypt internet data
tools. in place.
Based from the result, the codes and themes determined from the
feedback of the respondents have heavily invest on the tools. These codes are
directly related to the theme of the 6 th interview question, which is the I.T.
Specialist heavily invest tools for any things that need to be fixed.
environment is important?
knowledge.
Based from the result, the codes and themes determined from the
feedback of the respondents are don’t get hurt while working. These codes are
directly related to the theme of the 8th interview question, which is the knowledge
(Interview Question 9): Do you think having knowledge on the safety in working
Based from the result, the codes and themes determined from the
feedback of the respondents have optimize production. These codes are directly
related to the theme of the 9th interview question, which is the knowledge on the
(Interview Question 10): What advices that can you give for the incoming I.T.
enough.
Based from the result, the codes and themes determined from the
feedback of the respondents are safety first. These codes are directly related to
the theme of the 10th interview question, what advices for the incoming I.T.
CHAPTER 5
Summary of Findings
make easy communication over networks, ranging from Usenet and messageing
Conclusion
40
make easy communication over networks, ranging from Usenet and messageing
Recommendation
in your research
REFERENCES
(APA format)
APPENDICES
picture
43
Questionnaire Administration