NETWORK ETIQUETTE

A thesis submitted in partial fulfillment of the requirements for the Technical Writing (English 3)

By Costales, Klient C. Ferraro Andrei Vonn D. Floresca, Joanna Marie L. Galay, Rafael S. Garcia, Eleazar Floyd A Jandoc, Hazzle B.

2012 Saint Louis College

however. (Virginia Shea.Chapter 1 Introduction and Thesis Statement This chapter begins with an introduction about computer technology. our contribution and overview of entire research are presented. These connections allow information to be quickly and easily exchanged between people and machines anywhere in the world. tended toward certain rules of network conduct. is the list of rules that are generally followed. As we enter the age of computer technology. 2005).1 Introduction The Internet is a relatively new medium--different from any means of communication that humankind has previously known. The network itself. people are having difficulty making rules for its use. This will be followed by the purpose of the research and the main objectives and importance of the study. Website protocol. Finally. over the period of time since the network was born. 2011) Because the Internet is such a new and unique medium. Internet technology has made it possible for people all around the world to communicate with each (Yale University. more and more people are relying on the computer for communication. 1. This code of network ethics has been given many names over the years--the . The main questions which are surveyed within scope of research will be introduced. Among the more common of these are electronic mail and the World Wide Web. better known as netiquette. acts only as a medium for applications designed to utilize it. They are commonly suggested by business professionals dealing with e-mail and the Internet. the users of the Net have. Out of sheer necessity. When using email or social networking sites there are some basic unwritten rules that one should follow.

which argues for their relevance in connection to netiquette. 1. the background leads to the statement of the research purpose.one that has seemed to stick." When you enter any new culture -. something about cyberspace makes it easy to forget that you're interacting with other real people. is "netiquette". To present and discuss topics circulating online that violates the rule of netiquette. according to our research purpose the research perspective is chosen with an argument for the respective research approach.and cyberspace has its own culture -.2 Purpose and Objective of the Research The main objectives of the research are introduced in below:     To present the essentials of network etiquette as a prerequisite for good online communication. To analyze and interpret To prescribe recommendations and tips on how to have a good behaviour online. This in turn leads to the research strategy where the data is collected. You might offend people without meaning to. To make matters worse. Or you might misunderstand what others say and take offense when it's not intended. 1. To explain in . we also present our own experiences and the result that we expect in our research Research Design: In this chapter.3 Organization of the Thesis Introduction: In this chapter.you're liable to commit a few social blunders. a conjunction formed from "network etiquette. analyzed and validated. In this section. however.

In this chapter. Introduction Background Research Design Theoritical Design Relevant Internet Information Questionare Interviews Journal and Books Analysis Conclusion Figure 1 Structure of Research in Diagram . the conclusion for our research purpose will be presented. Results are evaluated to maintain the quality of research and the ideas of continued research are presented at the end of our thesis. Analysis and Result The results of survey are tabulated. The below diagram represents the structure of thesis. A discussion on the implication of the result for informatics is also performed.brief about our research strategy various methods for conducting research are explained and arguments for choosing a particular method are presented.

A highlighted word or picture within a hypertext document that when clicked bring you to another place within the document or to another document altogether.the conduct or procedure required by good breeding or prescribed by authority to be observed in social life.A public post or email message that expresses a strong opinion or criticism. Internet .an electronic communications network that connects computer networks and organizational computer facilities around the world. Link -. Newbie – is a new comer to cyberspace.A form of interactive online communication that enables typed conversations to occur in real-time. Flames can be fun when they allow people to vent their feelings. and then return to the topic at hand. Network .a part of the Internet accessed through a graphical user interface and containing documents often connected by hyperlinks —called also Web.Chapter 2 Theoretical Design 2. Cyberspace . . Others are simply insulting and can lead to flame wars.online world of computer networks and especially the Internet Chat . is a set of rules for behaving properly online.When two computers have established a path through which the exchange of information can occur. Connection . World Wide Web .1 Key Concepts Definition of Terms Netiquette – network etiquette. Etiquette . Flame -.a fabric or structure of cords or wires that cross at regular intervals and are knotted or secured at the crossings.

1994). students from other countries. it only makes sense to make the information as appropriate.2." expresses this idea: "When you communicate electronically. Since the people out in Cyberspace have only a small bit of information by which to judge you. in her article "Core Rules of Netiquette. They are offered here as a set of general guidelines for cyberspace behavior. Virginia Shea. only to a greater degree. assume complete exposure to the rest of the world. You don't have the opportunity to use facial expressions. words--lonely written words--are all you've got. The same rule applies to WWW documents. are excerpted from the book of Netiquette Guidelines (Virginia Shea. your future employers. and informative as possible.1 Assume Publicity Whether you are composing an e-mail message or writing your own WWW document. Anything put up on the Web is openly available for anyone in the world to see. your professors.2. representative. and the explanations that follow.2 Core Rules of Netiquette We come from this list of core rules below. it is wise to assume that everyone in the world will read your words. It is wise to be cautious with what you put on the Web. Unless you have complete trust that the recipient of your mail will keep it confidential. 2. That not only includes your professors and peers. Either way. it is very easy to forward an e-mail message to hundreds or thousands of people. gestures.2. but also the government. 2. Though e-mail is sent to only one person. But they should give you some basic principles to use in solving your own Netiquette dilemmas.2 The Emotion Barrier One of the biggest drawbacks of communicating electronically is the difficulty of communicating emotions through text. and tone of voice to communicate your meaning. etc. They won't answer all your Netiquette questions. all you see is a computer screen. it does no good to pour fuel on the fire of what could potentially .

It is very important to keep in mind that people are busy--not everyone wants to spend his time reading about your life or what is of concern to you. 2.2.2. Just imagine the Dean viewing everything that originates from your computer and judge what is appropriate in that context.2. be forgiving. Conversely. 2. though they are usually considered rude and inappropriate. so are others doing the same. though. completely inoffensive message to a discussion group and still receive a negative response. though you won't receive a ticket from the Internet Police. Since it is without shape or form. is that what we are reading is only one small piece of the person on the . Sometimes it's all-too-tempting to tear someone apart for an obvious grammatical error. it is expected that you will be discriminating in what you say. What we must keep in mind. Just as you are trying to balance your valuable time with a desire to get your point across as respectably as possible. Other people are similarly wrapped up in their own affairs. it can become whatever the user makes it--from an academic research tool to a source of digital pornography. Again. usually as the result of a misinterpreted message or an undiscriminating author. or when sending e-mail to those you don't know." where a few people engage in pointless verbal warfare.3 Freedom of Choice The most unique feature of the Internet is its user dependency.4 Respect Other’s Time and Energy Surprisingly. Profanity and pornography are by no means illegal on the Net. it's possible to post a well written.become a "flame war. here's a little on how to receive others: first and foremost. or blatant display of stupidity.5 Be Forgiving Finally. when posting to a discussion group or when writing anything which is intended for an unknown audience. When posting to discussion groups. try to be as focused as possible. after all this advice on how to project yourself. 2. misspelling. In order to get anywhere on the Web you must choose where you wish to go. you may bring upon yourself unwanted repercussions.

And if you can't suppress a response. allow him another opportunity to confirm your judgment. Regardless. and be kind with criticism. a kind word or two of advice in a helpful tone will leave a much better impression than a verbal barrage will.other end. who is typing away just like we are. . each person is deserving of more than one chance before judgment is passed. Perhaps he was uninformed--or in a hurry--or simply made a mistake. Always give the benefit of the doubt. If someone initially strikes you as inept.

Sign up to vote on this title
UsefulNot useful