You are on page 1of 15

Lesson 7: Social, Ethical, and Legal Responsibilities in the Use of

Technology Tools and Resources


A. Internet and Education
The Internet, the most helpful technology of modern times, helps us in our daily lives and
professional lives. For educational purposes, it is widely used to gather information and to do
research or add to the knowledge of various subjects.
The Internet plays a very vital role in education. It is no doubt that in this modern era,
everyone prefers Google for their queries, problems, or doubts. Popular search engines like
Google, Yahoo, etc. are the topmost choice of people as they offer an easy and instant reach to a
vast amount of information in just a few seconds. It contains a wealth of knowledge that can be
searched at any time. The internet has introduced improvements in technology, communication,
and online entertainment.
Today, it has become more important as well as a powerful tool in the world which
everyone prefers. Everybody needs the internet for some or other purposes. Students need the
internet to search for information related to exams, curriculum, results, etc. You can also follow
these steps for students to achieve success in student life.
The importance of the internet in education to the students means that it makes it easier for them
to research things, and relearn the content taught in school. People use it according to their needs
and interests.

There are many benefits of the Internet in the field of education. Some of these are:
1. Cost-Effective and Affordable Education
One of the largest barriers to education is high cost. The Internet improves the quality of
education, which is one of the pillars of the sustainable development of a nation. It provides
education through Videos (like youtube tutorial videos) and web tutorials which are affordable to
everyone and cost-effective.
2. Student-Teacher and Peer Interaction
The internet has allowed students to be in constant touch with their teachers or with other
classmates with the help of social media, messaging apps, and chat forums. Parents can interact
as well as communicate with teachers and school authorities about their kid's performance in
school. Interaction with like-minded people on forums can help students to explore new ideas
and enrich their knowledge.
3. Effective Teaching and Learning Tools
The Internet has become a major tool for effective teaching as well as a learning tool. Teachers
can use it as a teaching tool by posting their teaching materials (notes and videos) on the school
website or forum. The learning process becomes interesting and diverse with the use of tutorial
ideas and notes. Teachers can teach with the use of animation, PowerPoint slides, and images to
capture the students’ attention.
4. Easy Access to Quality Education
Students can easily access quality education materials like tutorial videos on you tube for free or
pay fees online for more quality study materials. Teachers can also make use of the internet by
proving the students with extra study material and resources such as interactive lessons,
educational quiz as well as tutorials. Teachers can record their lectures and provide them to the
students for revisions which is better than reading from notes.
5. Interaction with Digital Media
Regular use of digital media is one of the most basic parts of our lives. Digital bulletin boards
save paper and allow displaying of videos and audio to attract the attention of students.
Nowadays, many paid sites provide educational resources that are rich in quality and easily
understandable to the masses.
6. Keeping you updated with Latest Information
Information is the biggest advantage that the internet is offering. There is a huge amount of
information available for every subject. It keeps us up to date with the latest information
regarding the subjects in which we are interested.
7. Learning with Multimedia
It helps the students with the learning process as it helps to simplify the knowledge. Also, it helps
to visualize what is being taught by the teachers in school. If you want to prepare for final exams,
you can access Video Tutorials and other resources online through the Internet.
8. Bridging Communication Gaps
Classroom Internet use can also help teachers say goodbye to communication mishaps such as
lost assignment sheets and misplaced memos home to parents. Internet communication can make
the distribution of information easier, as well as increase class community and motivation. For
example, having a class blog or website can open up dialogue between teachers and students
outside of school rather than confining their interactions to the classroom. Students can
download course materials and readings, chat with other students, and share their work, while
parents can receive reminders about upcoming due dates and events.
The Internet is a boon to people and is used all over the world. Hence, it should be used for good
purposes. It has had a great impact on imparting education to the children. If this is used in
appropriate ways that meet children’s development level, they can benefit and learn from the
Internet.
B. Intellectual Property Rights Applicable to the Educational Setting: Copyright and
Related Rights Copy-right Law
Intellectual property includes literary or artistic works, inventions, business methods,
industrial processes, logos, and product designs. Nearly every activity engaged in by students,
staff, and faculty in schools involves the production or use of intellectual property; examples
include lesson plans, student assignments, speeches and lectures, videos, books, school Web
sites, publications, reports, concerts, and plays. Most items used in education are legally
protected intellectual property, often owned by someone other than the user. All members of
school communities are permitted to use protected intellectual property, but they must engage in
“fair use” or get advance permission from the owners. Users must be careful not to use
intellectual property unlawfully, or they risk having to pay damages, fines, and/or court costs.
Items in the public domain, however, may be used without cost to the user or consent of the
owner.
Legal issues affecting intellectual property in education involve both creation and use of
intellectual works. Intellectual property law balances the rights of individuals to make, own,
distribute, and profit from their creations and the rights of the public to make use of knowledge
and inventions. Illustrations of the law of intellectual property in education include copyright and
patent protection for the products of teaching and scholarship, copyright and patent infringement
for improper use of protected works, and trademark licensing and protection of names, logos,
symbols, and pictures used to identify schools.
By far, the most applicable category of intellectual property law in schools is copyright.
Copyrights are intangible rights granted through the federal Copyright Act to an author or creator
of an original artistic or literary work that can be fixed in a tangible means of expression such as
hard copies, electronic files, videos, or audio recordings. Copyright law protects literary, musical,
dramatic, choreographic, pictorial, sculptural, and architectural works as well as motion pictures
and sound recordings. Each copyrightable work has several “copyrights”—the exclusive rights to
make copies of the work, distribute the work, prepare derivative works, and perform or display
the work publicly.
With some important exceptions, two of which are highlighted here, teachers and
students may not use the copyrighted works of others without permission from the copyright
holders. The first exception, fair use, is the most important and most often cited. The fair use of a
copyrighted work, “for purposes such as criticism, comment, news reporting, teaching (including
multiple copies for classroom use), scholarship, or research, is not an infringement of copyright.”
If the use is fair, then the user need not obtain advance consent from the copyright holder.
Determining whether the use is fair requires the application of four factors: purpose and
character of the use, nature of the copyrighted work, amount and substantiality of the portion
used about the work as a whole, and effect of the use upon the potential market for or value of
the work. The second exception is also fairly common in schools; it is not an infringement for
teachers and students to perform or display copyrighted work in the course of face-to-face or
online/distance education teaching activities. For electronic display or performance, the school
must comply with several additional requirements.
C. Digital Safety Rules
With more users accessing the Internet through mobile devices, a lot of risks are changing
and growing quickly. Even though apps loom larger in most people's daily online interactions
than traditional websites do, that does not mean that the basic Internet safety rules have changed.
Hackers are still on the lookout for personal information they can use to access your credit card
and bank information. Unsafe surfing can also lead to other threats—from embarrassing
personal comments or images that, once online, are nearly impossible to erase, to getting mixed
up with people you'd rather have had nothing to do with.
Here are the Top 10 Internet safety rules to follow to help you avoid getting into trouble online
(and offline).
1. Keep Personal Information Professional and Limited
Potential employers or customers don't need to know your personal relationship status or
your home address. They do need to know about your expertise and professional background,
and how to get in touch with you. You wouldn't hand purely personal information out to
strangers individually—don't hand it out to millions of people online.
2. Keep Your Privacy Settings On
Marketers love to know all about you, and so do hackers. Both can learn a lot from your
browsing and social media usage. But you can take charge of your information. As noted by
Lifehacker, both web browsers and mobile operating systems have settings available to protect
your privacy online. Major websites like Facebook also have privacy-enhancing settings
available. These settings are sometimes (deliberately) hard to find because companies want your
personal information for marketing value. Make sure you have enabled these privacy safeguards
and keep them enabled.
3. Practice Safe Browsing
You wouldn't choose to walk through a dangerous neighborhood—don't visit dangerous
neighborhoods online. Cybercriminals use lurid content as bait. They know people are
sometimes tempted by dubious content and may let their guard down when searching for it. The
Internet's demimonde is filled with hard-to-see pitfalls, where one careless click could expose
personal data or infect your device with malware. By resisting the urge, you don't even give the
hackers a chance.

4. Make Sure Your Internet Connection is Secure.


Use a Secure VPN Connection when you go online in a public place, for example by
using a public Wi-Fi connection, PCMag notes you have no direct control over its security.
Corporate cybersecurity experts worry about "endpoints"—the places where a private network
connects to the outside world. Your vulnerable endpoint is your local Internet connection. Make
sure your device is secure, and when in doubt, wait for a better time (i.e., until you're able to
connect to a secure Wi-Fi network) before providing inforTo further improve your Internet
browsing safety, use a secure VPN connection (virtual private network). VPN enables you to
have a secure connection between your device and an Internet server that no one can monitor or
access the data that you’re exchanging.
5. Be Careful What You Download
A top goal of cybercriminals is to trick you into downloading malware—programs or
apps that carry malware or try to steal information. This malware can be disguised as an app:
anything from a popular game to something that checks traffic or the weather. As PCWorld
advises, don't download apps that look suspicious or come from a site you don't trust.
6. Choose Strong Passwords
Passwords are one of the biggest weak spots in the whole Internet security structure, but
there's currently no way around them. And the problem with passwords is that people tend to
choose easy ones to remember (such as "password" and "123456"), which are also easy for cyber
thieves to guess. Select strong passwords that are harder for cybercriminals to demystify.
Password manager software can help you to manage multiple passwords so that you don't forget
them. A strong password is unique and complex—at least 15 characters long, mixing letters,
numbers, and special characters.
7. Make Online Purchases from Secure Sites
Any time you make a purchase online, you need to provide credit card or bank account
information—just what cybercriminals are most eager to get their hands on. Only supply this
information to sites that provide secure, encrypted connections. As Boston University notes, you
can identify secure sites by looking for an address that starts with https: (the S stands for secure)
rather than simply http: They may also be marked by a padlock icon next to the address bar.
8. Be Careful What You Post
The Internet does not have a delete key, as that young candidate in New Hampshire found
out. Any comment or image you post online may stay online forever because removing the
original (say, from Twitter) does not remove any copies that other people made. There is no way
for you to "take back" a remark you wish you hadn't made, or get rid of that embarrassing selfie
you took at a party. Don't put anything online that you wouldn't want your mom or a prospective
employer to see.
9. Be Careful Whom You Meet Online
People you meet online are not always who they claim to be. Indeed, they may not even
be real. As InfoWorld reports, fake social media profiles are a popular way for hackers to cozy up
to unwary Web users and pick their cyber pockets. Be as cautious and sensible in your online
social life as you are in your in-person social life.
10. Keep Your Antivirus Program Up to Date
Internet security software cannot protect against every threat, but it will detect and remove most
malware—though you should make sure it's to date. Be sure to stay current with your operating
system's updates and updates to the applications you use. They provide a vital layer of security.
D. Cyberbullying
Cyberbullying is bullying that takes place over digital devices like cell phones,
computers, and tablets. Cyberbullying can occur through SMS, Text, and apps, or online in social
media, forums, or gaming where people can view, participate in, or share content. Cyberbullying
includes sending, posting, or sharing negative, harmful, false, or mean content about someone
else. It can include sharing personal or private information about someone else causing
embarrassment or humiliation. Some cyberbullying crosses the line into unlawful or criminal
behavior.
The most common places where cyberbullying occurs are:
1. social media, such as Facebook, Instagram, Snapchat, and Twitter
2. SMS (Short Message Service) also known as Text Messages sent through devices
3. Instant Message (via devices, email provider services, apps, and social media messaging
features)
4. Email
With the prevalence of social media and digital forums, comments, photos, posts, and
content shared by individuals can often be viewed by strangers as well as acquaintances. The
content an individual shares online – both their content as well as any negative, mean, or hurtful
content – creates a kind of permanent public record of their views, activities, and behavior. This
public record can be thought of as an online reputation, which may be accessible to schools,
employers, colleges, clubs, and others who may be researching an individual now or in the
future. Cyberbullying can harm the online reputations of everyone involved – not just the person
being bullied, but those doing the bullying or participating in it. Cyberbullying has unique
concerns in that it can be:
Persistent – Digital devices offer the ability to immediately and continuously
communicate 24 hours a day, so it can be difficult for children experiencing cyberbullying to find
relief.
Permanent – Most information communicated electronically is permanent and public, if
not reported and removed. A negative online reputation, including for those who bully, can
impact college admissions, employment, and other areas of life.
Hard to Notice – Because teachers and parents may not overhear or see cyberbullying
taking place, it is harder to recognize.
According to the consolidated report of the Department of Education (Dep Ed), bullying
cases in elementary and high schools of both private and public schools in 2014 rose by 21% or a
total of 6,363 cases, compared with 5,236 in 2013. Schools, however, to mitigate the effects and
reduce the incidence of bullying, should comply with the Implementing Rules and Regulations of
the Anti-bullying Law of 2013 to address the root causes of bullying. And the important ones,
aside from the reporting requirements, are as follows:
1. Schools are to have a prevention program that is comprehensive, multi-faceted, and shall
involve all education stakeholders and personnel. This may contain:
a. Positive school climate/environment
b. Periodic assessment and monitoring of bullying behaviors.
c. Periodic review of manual of conduct for both students and personnel, about bullying
d. Activities on the issue for students, personnel, and service providers
e. Personnel development
f. Coordination with LGUs and other stakeholders
g. Classroom initiatives
h. Activities involving parents.
2. Schools to have intervention programs to ensure continuity of policies. These may include:
a. Activities
b. Corrective and preventive, rather than punitive, measures
3. Students must intervene to protect the victim unless the same jeopardizes their
safety/security
4. The Child Protection Committee (CPC) established by DepEd Order 40 shall also be
the Anti-Bullying Committee
5. Composition of Committee:
a. School Head/Admin-Chair
b. Guidance Counselor/Teacher-Vice Chair
c. Rep of teachers designated by faculty.
d. Rep of parents as designated by PTA.
e. Rep of students, except in kinder, as designated by student council-optional for private
schools.
f. Rep from the community as designated by Punong Barangay, preferably from the
Barangay Council for the Protection of Children (BCPC)
6. Jurisdiction for complaints of bullying and other acts under the IRR: exclusive: DepEd or
private school and not subject to barangay settlement
7. Procedures must include:
a. Immediate responses-ANYONE who has personal knowledge must immediately call
the attention of ANY school personnel.
b. School personnel once notified is expected to intervene:
• Stop the bullying immediately
• Remove students from harm and provide medical attention if needed
• Bring the bully to the Guidance Office or designated personnel
8. Anonymous reporting to be entertained
9. Person reporting to be afforded protection
10. Fact-finding and documentation:
• Designated school official to:
• Interview parties involved separately Assess threat level, and devise intervention
strategies
• Inform parents of both parties of the steps to be taken
• Make recommendations to CPC
11. CPC to determine the intervention programs for the parties involved.
12. Schools may refer parties to trained professionals outside the school
13. Disciplinary measures must be according to nature, the gravity of the bullying, and attendant
circumstances
14. Due process must be observed
15. Community service may be a form of punishment if the same is in the rules and regulations
of the school
16. CPC supervises the intervention programs
17. On due process:
• Student and his parents to be informed IN WRITING of the complaint
• Students to be allowed to answer with the assistance of parents/guardians
• Decision of the school head shall be IN WRITING, stating the basis thereof
• School head’s decision may be appealed to the Division Office of DepEd
18. False accusations of bullying are also to be sanctioned
19. Bullying incidents are confidential and breach thereof by school personnel is likewise
sanctioned
https://www.stopbullying.gov/cyberbullying
https://www.lawphil.net
E. Netizens in Cyberspace
As defined by the Merriam-Webster dictionary, NETIZEN is an active participant in the
online community of the Internet.
When we plug into the internet or cellular networks, we instantly become full-fledged
members of a worldwide community. We will have instant access to every other person who is
also wandering around in that world. Immediate access, physical distance, and the perceived
anonymity of the cyber world may cause humans no end of trouble.
To be a good cyber citizen, we need to know what that means. Citizenship is the rights,
privileges, and duties conferred on a member of society. It most often includes both protections
(e.g., the Bill of Rights) and duties (e.g., obeying the law, contributing to the community). Cyber
citizenship is the rights, privileges, and responsibilities required of internet and cellular network
users.
A. Cyber Rights
Cyber citizenship is based on the general concept of citizenship but differs in a couple of
ways. First, there are no real “rights” you have as a cyber citizen other than the legal protections
you already have as an actual citizen. Moreover, some of those are not available due to the global
nature of the cyber world. Nevertheless, every citizen of the cyber world should have the right to
respect, privacy, and their own opinion. We have the right to privacy.
While the cyber world does not have a bill of constitutionally protected rights, we should still be
required to respect certain unalienable rights:
• Life: Right for fair and reasonable treatment online. In the cyber world, the right to life is
primarily about being treated civilly and respectfully. This means interacting with people in a
considerate, tolerant, and appropriate way. This right also includes freedom from threats to life or
personhood.
• Liberty: Right to basic freedoms. Respect for online freedom should be similar to those
enshrined by our constitution, especially the Bill of Rights. We should respect and expect
privacy, safety, and equal treatment regardless of sex, religion, or sexual orientation. We should
also honor others’ property.
• Pursuit of Happiness: Right to explore personal interests without undue interference.
B. Cyber Privileges
It is a privilege to have access to the internet. It is a privilege to have the technology that allows
us access to the internet and cellular networks.
C. Cyber Responsibilities
It is a privilege to have access to the internet. It is a privilege to have the technology that allows
us access to the internet and cellular networks.
Responsibility is really at the heart of cyber citizenship. To be responsible, we need to be
informed about the cyber world. We also need to know about how to remain safe and protect
ourselves online. Another area of responsibility is to obey the law and we are responsible for
being considerate and well-mannered citizens.
Cyber citizenship is probably more accurately characterized as civil behavior. There are certain
ways civilized human beings should behave toward others.
D. Laws
The most important area of respect we should demonstrate as cyber citizens is for the law. There
are several legal issues related to online activity. The first is intellectual property rights. This
includes the written word, ideas, and products like music. If you download music without paying
for it, you have violated the property rights of the artist.
E. Cyber Stalking
Another area that has legal protections is cyber harassment and bullying or cyberstalking.
Threatening, harassing, or intimidating someone through electronic means violates that person’s
right to be free from harassment. Pornography also is regulated by law. For the most part that
means ensuring that it is not child pornography. Most other forms of pornography occupy a grey
area that is in part protected as free speech and in part, whether it violates community standards
of decency. This pretty much means it is unregulated. A more recent aspect of pornography is
what has been called revenge porn. For people over 18, a slimy former partner or, as likely,
someone who has hacked your kid’s account, may provide nude images to sites that solicit this
kind of material. It can be done without the consent of the person in the images.
Making creating a false website under another person’s name and otherwise using their
personally identifying information is a state crime.
F. Cyber Crimes
So, here is a summary of things that are against the law:
• Copyright infringement
• Plagiarism
• Downloading songs you didn’t purchase
• Profiting from others’ creative efforts or products
• Bullying and harassment
• Child pornography (including sexting)
• Internet stalking
• Identity theft
G. Cyber Identity
There are a range of ways we can be identified and recognized online. It starts with the online
names we use for various accounts as well as our online addresses (e.g., email, texting number,
social media accounts, etc.). Then, there are the more traditional forms of identity such as name,
hometown, school they attend, home address, or phone number. We may also be identified by
their date of birth and social security number. Each computer or device that accesses the internet
or cellular network has a unique IP address that can be used to identify that device (and
potentially the user of that device). Finally, we can also establish a cyber identity through credit
and debit card numbers used to make online purchases.

H. Cyber Foot-printing
Every time we go online or transmit anything over a cellular network, we leave a trace of
that activity. This is known as a cyber footprint. There are generally two kinds of cyber
footprints. The first is an intentional footprint; things they have knowingly posted or entered
online. Consider this something like putting your shoe prints in wet cement that dries into a
permanent trail. Intentional footprints include things like:
• Photos
• Videos (e.g., Youtube, Vimeo, Vine, Skype, Facetime)
• Texting
• Social media accounts (e.g., Facebook, Twitter, Snapchat, Chatroulette, blogs like
Tumblr)
• Comments posted on other sites
• Emails
• Tagged photos on other user accounts
• Apps (e.g., Pinterest, Snapchat, Instagram, Zoom, Tiktok)
• Purchases and other transactions
Then, there are unintentional footprints we leave in cyberspace. Unintentional footprints
include such things as cookies, search engine metrics, and social media tracking.
I. Cyber Property
Anything that is posted online automatically becomes the copyright-protected product of
the creator. This includes music, photos, videos, and written material.
Example:
The creator of these products doesn’t have to formally register them with the US Office of
Copyrights or with the United States Patent and Trademarks Office. Use of these products,
particularly for monetary gain, requires permission from the copyright owner.

J. Relational Aggression
The internet and cellular networks can be used to express frustration, anger, and cruelty to
other people. The most common form of relational aggression is represented by insensitive
comments, crude and awkward remarks, or attempts at playful humor. The inability to read
the nonverbal social cues when making or receiving playfully insulting or sarcastic remarks
can result in misunderstandings about the real intent of the remarks or the reactions of the
recipient.
H. Cyber Foot-printing
Every time we go online or transmit anything over a cellular network, we leave a trace of
that activity. This is known as a cyber footprint. There are generally two kinds of cyber
footprints. The first is an intentional footprint; things they have knowingly posted or entered
online. Consider this something like putting your shoe prints in wet cement that dries into a
permanent trail. Intentional footprints include things like:
• Photos
• Videos (e.g., Youtube, Vimeo, Vine, Skype, Facetime)
• Texting
• Social media accounts (e.g., Facebook, Twitter, Snapchat, Chatroulette, blogs like
Tumblr)
• Comments posted on other sites
• Emails
• Tagged photos on other user accounts
• Apps (e.g., Pinterest, Snapchat, Instagram, Zoom, Tiktok)
• Purchases and other transactions
Then, there are unintentional footprints we leave in cyberspace. Unintentional footprints
include such things as cookies, search engine metrics, and social media tracking.
I. Cyber Property
Anything that is posted online automatically becomes the copyright-protected product of
the creator. This includes music, photos, videos, and written material.
Example:
The creator of these products doesn’t have to formally register them with the US Office of
Copyrights or with the United States Patent and Trademarks Office. Use of these products,
particularly for monetary gain, requires permission from the copyright owner.

J. Relational Aggression
The internet and cellular networks can be used to express frustration, anger, and cruelty to
other people. The most common form of relational aggression is represented by insensitive
comments, crude and awkward remarks, or attempts at playful humor. The inability to read
the nonverbal social cues when making or receiving playfully insulting or sarcastic remarks
can result in misunderstandings about the real intent of the remarks or the reactions of the
recipient.
H. Cyber Foot-printing
Every time we go online or transmit anything over a cellular network, we leave a trace of that
activity. This is known as a cyber footprint. There are generally two kinds of cyber footprints.
The first is an intentional footprint; things they have knowingly posted or entered online.
Consider this something like putting your shoe prints in wet cement that dries into a permanent
trail. Intentional footprints include things like:
• Photos
• Videos (e.g., YouTube, Vimeo, Vine, Skype, Facetime)
• Texting
• Social media accounts (e.g., Facebook, Twitter, Snapchat, Chatroulette, blogs like Tumblr)
• Comments posted on other sites
• Emails
• Tagged photos on other user accounts
• Apps (e.g., Pinterest, Snapchat, Instagram, Zoom, TikTok)
• Purchases and other transactions
Then, there are unintentional footprints we leave in cyberspace. Unintentional footprints include
such things as cookies, search engine metrics, and social media tracking.
I. Cyber Property
Anything that is posted online automatically becomes the copyright-protected product of the
creator. This includes music, photos, videos, and written material.
Example:
The creator of these products doesn’t have to formally register them with the US Office of
Copyrights or with the United States Patent and Trademarks Office. Use of these products,
particularly for monetary gain, requires permission from the copyright owner.
J. Relational Aggression
The internet and cellular networks can be used to express frustration, anger, and cruelty to other
people. The most common form of relational aggression is represented by insensitive comments,
crude and awkward remarks, or attempts at playful humor. The inability to read the nonverbal
social cues when making or receiving playfully insulting or sarcastic remarks can result in
misunderstandings about the real intent of the remarks or the reactions of the recipient.

Cyber communication can also be used to intentionally bully, intimidate, harass, or


threaten other people. Through speaking directly online to another person or by using social
networks to speak about another person, the internet provides another forum for the age-old
attempts to be mean and cruel to another person. It is also a means through which someone can
act to harm another person by sending malicious programs to damage their hardware or software.
It is possible to steal content from someone’s computer that can be used to try to embarrass or
humiliate them. And, most disturbingly, it is possible to use technology to create false images
and information that is then attributed to the target of the aggression.
F. Netiquette
Netiquette is short for "Internet etiquette." Just like etiquette is a code of polite behavior in
society, netiquette is a code of good behavior on the Internet. This includes several aspects of the
Internet, such as email, social media, online chat, web forums, website comments, multiplayer
gaming, and other types of online communication.
While there is no official list of netiquette rules or guidelines, the general idea is to respect
others online. Below are ten examples of rules to follow for good netiquette:
1. Avoid posting inflammatory or offensive comments online (a.k.a flaming).
2. Respect others' privacy by not sharing personal information, photos, or videos that another
person may not want to be published online.
3. Never spam others by sending large amounts of unsolicited emails.
4. Show good sportsmanship when playing online games, whether you win or lose.
5. Don't troll people in web forums or website comments by repeatedly nagging or annoying
them.
6. Stick to the topic when posting in online forums or when commenting on photos or videos,
such as YouTube or Facebook comments.
7. Don't swear or use offensive language.
8. Avoid replying to negative comments with more negative comments. Instead, break the cycle
with a positive post.
9. If someone asks a question and you know the answer, offer to help.
10. Thank others who help you online.
The Internet provides a sense of anonymity since you often do not see or hear the people with
whom you are communicating online. But that is not an excuse for having poor manners or
posting incendiary comments. While some users may feel like they can hide behind their
keyboard or smartphone when posting online, the fact is they are still the ones publishing the
content. Remember – if you post offensive remarks online and the veil of anonymity is lifted,
you will have to answer for the comments you made. In summary, good netiquette benefits both
you and others on the Internet. Posting a positive comment rather than a negative one just might
make someone's day.

https://techterms.com/definition/netiquette
G. Educational Sites and Portals
Educational websites can include websites that have games, videos, or topic-related resources
that act as tools to enhance learning and supplement classroom teaching. These websites help
make the process of learning entertaining and attractive to the student, especially in today’s age.
While there are many advantages of such websites, we also need to be aware of the negatives.
Students need to be guided properly. Without proper guidance, students may find resources and
content that are not reliable or do not align with the direction of the teaching in class. Some
websites are huge and offer a massive variety of games and resources. Students may be easily
distracted on such websites and end up spending time on activities that are either below their
level or do not complement or add to classroom teaching. Unrestricted access and freedom on the
internet can be dangerous, especially for younger students.
Here are some examples of educational websites:
1. EdX: edx.org. ...
2. Academic Earth: academicearth.org. ...
3. Internet Archive: archive.org. ...
4. Big Think: bigthink.com. ...
5. Coursera: courser.org. ...
6. Bright storm: brightstorm.com. ...
7. Cosmo Learning: cosmolearning.com. ...
8. Futures Channel: thefutureschannel.com.

your operating system's updates and updates to applications you use. They provide a vital layer
of security.

You might also like