You are on page 1of 47

ENTERTAINMENT

&
EDUTAINMENT
NETIQUETTE
 Refers to the do’s and don’ts
of online communication.

 A set of rules for behaving


properly online.

 The etiquette guidelines that


govern behavior when
communicating on the
Internet.
The Email 10 Commandments
Netiquette
I. THOU SHALT include
a clear and Specific
subject line.
II. THOU SHALT edit any
quoted text down to the
minimum thou needest.
III. THOU SHALT read
thine own message thrice
before sending it.
IV. THOU SHALT
ponderest how the recipient(s)
might react to thy message.
V. THOU SHALT check
spelling and grammar.
VI. THOU SHALT not curse,
flame, spam nor USE ALL
CAPS.
VII. THOU SHALT not forward
any chain letter.
VIII. THOU SHALT not use
email for any illegal or
unethical purpose.
And here's the Golden Rule of Emailing…

That which thou findest hateful to


receive, sendest thou not unto others!
Golden Rule of Netiquette
What Is the Golden Rule of Netiquette?

The golden rule states that you


should do unto others as you would
have them do unto you.
In terms of netiquette, this means that you should
not use improper web conduct that you would not
appreciate from others.
How To Observe Netiquette
1.Use Polite Language
Proper Etiquette goes way beyond how
to set a table for a formal dinner and
proper use of utensils. It's even more
than knowing how to shake hands with
someone you've just met. Good
manners should be incorporated into
every aspect of your life, including what
you say during the most informal of
times.
2. Don’t Use Curse Words
Foul language has been around forever,
but it has never been more widely used
than it is now. What's sad is that it shows
a lack of respect for people who don't
speak that way. Many older people find
it offensive, and most parents don't want
their children cursing or using words that
were once considered socially
unacceptable.
3. Don’t use ALL CAPS
Do not use all caps on the internet
because it is akin to shouting. All
caps are considered shouting on the
internet. Shouting is not polite.
Therefore, it is bad netiquette to use all
caps on the internet because shouting is
not polite
4. Be Kind when responding
Let kindness prevail: If you allow a
negative person to elicit an equally
negative response to them, they are
winning, and that just makes a heart hurt.
We want kindness to win! Stay true to
yourself and exercise your higher ability to
remain composed and kind, even in
difficult situations.
Rule 1:
Remember the Human

Remember the golden rule (treat others the


way you would want them to treat you)
Real people behind the computer screens
Real people have real feelings
Communications in cyberspace are forever!
Rule 2:
Adhere to the same standards
of behavior online that you
follow in real life
Be ethical and remember that there
are still laws in cyberspace.

Use your “moral compass”


Rule 3:
Know where you are in cyberspace

Not all areas of the Internet are the same.


Different rules and behaviors are expected
in different domains.
Take a moment to look around and
explore before putting your thoughts out
there.
Rule 4:
Respect other people's time
and bandwidth
 Remember that everyone may not
have the bandwidth speed that you
have. Be sure to not post items
multiple times.
Understand that you are not the
center of attention in all forums. Not
everyone may have the same ideas
and opinions as you. Be considerate.
Rule 5:
Make yourself look good online

Grammar and language are viewed


and judged. Be sure you proofread
what you put out there.

Know what you’re talking about


and make sure it makes sense.
Rule 6:
Share expert knowledge

 People post questions online to


receive answers. If you are
knowledgeable on a subject, share
your information.

 If you have a question, research it


thoroughly
Rule 7:
Help keep flame wars under control

“Flaming” is when people express


their opinions strongly and with
emotion, despite others feelings on
a topic.
Be careful how involved you get
into a flame war. They may be fun
at first, but they get old fast.
Rule 8:
Respect other people's privacy

 The rule says exactly what it


means: respect other’s privacy the
way you would want to have
yours respected.
Rule 9:
Don't abuse your power

 Just because you know more,


have more skills, or have more
power does not give you the right
to take advantage of them.
Rule 10:
Be forgiving of other people's
mistakes

At some point in time, all of us were


new to the digital world. Be polite and
if you feel you need to point out a
mistake, let them know in a nice way.
Cyberspace predators
Perhaps the worst Netiquette violators are
people who use their cyberspace
connections to gain the trust of others and
then take advantage of them in real life.
Some of the most unpleasant stories
involve pedophiles who get to know kids
online, engage in sexual discussions with
them, and in some cases, arrange to meet
them live.
Alternate persona
A false identity/multiple personality disorder
which more than one personality exists in the
same individual. Each personality has
unique memories, characteristic behaviors,
and social relationships that determine the
individual's actions when that
personality is dominant; the various
personalities are usually very different from on
e another and may even seem to be
opposites.
Electronic Forgery
Forgery - an illegal copy of a document,
signature, banknote, or work of art or the crime of
making such copies.
The misuse of computer networks, the internet,
and various avenues within the online community in
order to defraud potential victims of identity theft is
classified as electronic – or online forgery. Electronic
Forgery is quite common within the digital age, which
can include the illegal and unlawful reproduction of
endorsements in the form of electronic signatures in
order to illicitly assume the identity of the victim of
identity theft.
Chain letters
A chain letter is a message that
attempts to convince the recipient to
make a number of copies of the
letter and then pass them on to a
certain number of recipients (either a
predefined number or as many as
possible).
Electronic Hoaxes
 Hoax - a humorous or malicious deception, joke, and prank.
 A hoax is not a virus.
 Hoaxes are false (virus) warnings. At some point a
warning about a “new virus” might arrive in your
mailbox. But it is usually a made-up virus or other chain
email story (such as, for example, money for a good cause
if you forward the email to as many people as possible).
 The messages are usually designed to generate fear or
sympathy, because this is the mechanism by which they
are spread to lots of people.
 The messages urge you immediately send the email on to
everyone else in your address book (something an
unsuspecting, fearful user will probably do right away),
thereby generating an enormous flow of mail (often
worse than a virus).
Rumors
an unofficial interesting story or
piece of news that might be
true or invented, and quickly
spreads from person to person.
Email harassment
Email harassment (cyberbullying) is usually
understood to be a form of stalking in which one or
more people send consistent, unwanted, and often
threatening electronic messages to someone else.
There isn’t always an exact definition of what a
message has to look or sound like in order to be
harassing. It’s usually a matter of circumstance, since
what one person finds offensive or harmful may not
actually come off that way to someone else. This sort
of harassment is frequently fueled by soured
romance, workplace gossip, or school bullying, and is
often only amplified through social media networks
and connections.
Worms and Viruses
An important distinction between
computer viruses and worms is that viruses
require an active host program or an already-
infected and active operating system in order
for viruses to run, cause damage and infect
other executable files or documents, while
worms are stand-alone malicious programs
that can self-replicate and propagate via
computer networks, without human help. For
instance, it’s estimated that the infamous
ILOVEYOU worm infected about 10 percent
of the world’s internet-connected computers
within just 10 days.
Snooping
Snooping, in a security context, is
unauthorized access to another person's or
company's data. The practice is similar to
eavesdropping but is not necessarily limited
to gaining access to data during its
transmission. Snooping can include casual
observance of an e-mail that appears on
another's computer screen or watching what
someone else is typing. More sophisticated
snooping uses software programs to
remotely monitor activity on a computer or
network device.
Mail Bombing
A mail bomb is the sending of a massive
amount of e-mail to a specific person or
system. A huge amount of mail may simply
fill up the recipient's disk space on the server
or, in some cases, may be too much for a
server to handle and may cause the server to
stop functioning. In the past, mail bombs
have been used to "punish" Internet users who
have been egregious violators of
netiquette (for example, people using e-mail
for undesired advertising, or spam).
Education and References
Byzewski, J. (2016). Netiquette Guidelines and Scavenger Hunt. Retrieved from
https://www.slideshare.net/JenniferByzewski/netiquette-guidelines-and-scavenger-hunt

Edutainment vs Entertainment - What's the difference? (n.d.). Retrieved from


https://wikidiff.com/entertainment/edutainment

Listserv (2000). The Email 10 Commandments – Netiquette. Retrieved from


http://www.skally.net/listowner/10.html

Mayne, D. (2018). Polite Words and Phrases. Retrieved from


https://www.thespruce.com/polite-words-
and-phrases-1216714

Riley, M. (2017). Netiquette Tutorial Guidelines You Should Follow Online. Retrieved from
http://slideplayer.com/slide/10912106/
Rosasco, L. (2017). Responding to Negativity With Kindness. Retrieved from
https://www.huffingtonpost.com/lindsay-rosasco/responding-to-negativity-
_b_9128024.html

Rule number 2 - Do not use all caps. (n.d.) Retrieved from


http://netiquette.wikia.com/wiki/Rule_number_2_-_Do_not_use_all_caps

Syazwani101 (2010). Netiquette. Retrieved from


https://www.slideshare.net/syazwani101/netiquette-5411949

Shea, V. (2011). Egregious Violations of Netiquette. Retrieved from


http://www.albion.com/samNetiquette/egregious.html

Shea, V. [PDF]. (n.d.). The Core Rules of Netiquette. Retrieved from


http://www.mccc.edu/~virtcoll/Netiquette

WikiDiff. (2018). What Is the Golden Rule of Netiquette? Retrieved from


https://www.techwalla.com/articles/what-is-the-golden-rule-of-netiquette

You might also like