Professional Documents
Culture Documents
AND
NETIQUETTE
THE INTRODUCTION OF THE WORLD
WIDE WEB (WWW) AND INTERNET HAS
MADE GREAT BREAKTHROUGHS IN THE
FIELD OF INFORMATION SHARING AND
COMMUNICATION.
IT HELPED CONNECT PEOPLE MILES
AWAY FROM EACH OTHER.
HOWEVER, THESE ADVANCES CARRIED
DRAWBACKS WHEREIN THE ISSUE OF
SAFETY, SECURITY, AND ETHICS OF THE
CONSUMERS ARE COMPROMISED.
ETHICS
RULES OF BEHAVIOR BASED ON
IDEAS ABOUT WHAT IS MORALLY
GOOD AND BAD
NETIQUETTE
THE CORRECT OR
ACCEPTABLE WAY OF
COMMUNICATING ON THE
INTERNET.
COMMON ISSUES AND
CRIMES ON THE INTERNET:
• CYBERBULLYING
• HACKING
• IDENTITY THEFT
• PLAGIARISM
• INTELLECTUAL PROPERTY RIGHTS
AND COPYRIGHT ISSUES
CYBERBULLYI
NG
WHAT IS
CYBERBULLYING?
• CYBERBULLYING IS BULLYING THAT TAKES
PLACE OVER DIGITAL DEVICES LIKE CELL
PHONES, COMPUTERS AND TABLETS.
• CYBERBULLYING CAN OCCUR THROUGH
SMS, TEXT AND APPS, OR ONLINE IN SOCIAL
MEDIA, FORUMS, OR GAMING WHERE
PEOPLE CAN VIEW, PARTICIPATE IN, OR
SHARE CONTENT.
WHAT IS
CYBERBULLYING?
CYBERBULLYING INCLUDES:
• SENDING
• POSTING
• SHARING NEGATIVE, HARMFUL, FALSE OR
MEAN CONTENT
• SHARING PERSONAL OR PRIVATE
INFORMATION CAUSING EMBARRASSMENT
OR HUMILIATION.
HACKING
WHAT IS HACKING?
• HACKING IS AN ATTEMPT TO EXPLOIT A
COMPUTER SYSTEM OR A PRIVATE
NETWORK INSIDE A COMPUTER. IT IS
THE UNAUTHORIZED ACCESS TO OR
CONTROL OVER COMPUTER NETWORK
SECURITY SYSTEMS FOR SOME ILLICIT
PURPOSE.
IDENTITY
THEFT
WHAT IS IDENTITY THEFT?
• IDENTITY THEFT IS THE DELIBERATE
USE OF SOMEONE ELSE’S IDENTITY,
USUALLY AS A METHOD TO GAIN A
FINANCIAL ADVANTAGE OR OBTAIN
CREDIT AND OTHER BENEFITS IN THE
OTHER PERSON’S NAME, AND
PERHAPS TO THE OTHER PERSON’S
DISADVANTAGE OR LOSS.
PLAGIARIS
M
WHAT IS PLAGIARISM?
PLAGIARISM IS THE “WRONGFUL
APPROPRIATION” AND “STEALING AND
PUBLICATION” OF ANOTHER AUTHOR’S
“LANGUAGE, THOUGHTS, IDEAS, OR
EXPRESSIONS” AND THE
REPRESENTATION OF THEM AS ONE’S
OWN ORIGINAL WORK.
WHAT IS PLAGIARISM?
ALL OF THE FOLLOWING ARE
CONSIDERED PLAGIARISM:
• TURNING IN SOMEONE ELSE’S WORK AS
YOUR OWN.
• COPYING WORDS OR IDEAS FROM
SOMEONE ELSE WITHOUT GIVING
CREDIT.
• FAILING TO PUT A QUOTATION IN
QUOTATION MARKS.
• GIVING INCORRECT INFORMATION
ABOUT THE SOURCE OF A
QUOTATION
• CHANGING WORDS BUT COPYING
THE SENTENCE STRUCTURE OF A
SOURCE WITHOUT GIVING CREDIT.
TIPS TO STAY SAFE ONLINE
•A PROGRAM DESIGNED
TO SEND YOU
ADVERTISEMENTS,
MOSTLY AS POP-UPS.
2. SPAM - UNWANTED EMAIL
MOSTLY FROM BOTS OR
ADVERTISERS. IT CAN BE
USED TO SEND MALWARE.
2. SPAM - UNWANTED EMAIL
MOSTLY FROM BOTS OR
ADVERTISERS. IT CAN BE
USED TO SEND MALWARE.
3. PHISHING
ITS GOAL IS TO ACQUIRE SENSITIVE PERSONAL
INFORMATION LIKE PASSWORDS AND CREDIT
CARD DETAILS. THIS IS DONE BY SENDING
EMAIL THAT WILL DIRECT THE USER TO VISIT
WEBSITE AND BE ASKED TO UPDATE HIS/HER
USERNAME, PASSWORD, CREDIT CARD, OR
PERSONAL INFORMATION
PHARMING
A MORE COMPLICATED WAY OF
PHISHING WHERE IT EXPLOITS
DNS (DOMAIN NAME SERVICE)
SYSTEM.