You are on page 1of 40

ONLINE ETHICS

AND
NETIQUETTE
THE INTRODUCTION OF THE WORLD
WIDE WEB (WWW) AND INTERNET HAS
MADE GREAT BREAKTHROUGHS IN THE
FIELD OF INFORMATION SHARING AND
COMMUNICATION.
IT HELPED CONNECT PEOPLE MILES
AWAY FROM EACH OTHER.
HOWEVER, THESE ADVANCES CARRIED
DRAWBACKS WHEREIN THE ISSUE OF
SAFETY, SECURITY, AND ETHICS OF THE
CONSUMERS ARE COMPROMISED.
ETHICS
RULES OF BEHAVIOR BASED ON
IDEAS ABOUT WHAT IS MORALLY
GOOD AND BAD
NETIQUETTE
THE CORRECT OR
ACCEPTABLE WAY OF
COMMUNICATING ON THE
INTERNET.
COMMON ISSUES AND
CRIMES ON THE INTERNET:
• CYBERBULLYING
• HACKING
• IDENTITY THEFT
• PLAGIARISM
• INTELLECTUAL PROPERTY RIGHTS
AND COPYRIGHT ISSUES
CYBERBULLYI
NG
WHAT IS
CYBERBULLYING?
• CYBERBULLYING IS BULLYING THAT TAKES
PLACE OVER DIGITAL DEVICES LIKE CELL
PHONES, COMPUTERS AND TABLETS.
• CYBERBULLYING CAN OCCUR THROUGH
SMS, TEXT AND APPS, OR ONLINE IN SOCIAL
MEDIA, FORUMS, OR GAMING WHERE
PEOPLE CAN VIEW, PARTICIPATE IN, OR
SHARE CONTENT.
WHAT IS
CYBERBULLYING?
CYBERBULLYING INCLUDES:
• SENDING
• POSTING
• SHARING NEGATIVE, HARMFUL, FALSE OR
MEAN CONTENT
• SHARING PERSONAL OR PRIVATE
INFORMATION CAUSING EMBARRASSMENT
OR HUMILIATION.
HACKING
WHAT IS HACKING?
• HACKING IS AN ATTEMPT TO EXPLOIT A
COMPUTER SYSTEM OR A PRIVATE
NETWORK INSIDE A COMPUTER. IT IS
THE UNAUTHORIZED ACCESS TO OR
CONTROL OVER COMPUTER NETWORK
SECURITY SYSTEMS FOR SOME ILLICIT
PURPOSE.
IDENTITY
THEFT
WHAT IS IDENTITY THEFT?
• IDENTITY THEFT IS THE DELIBERATE
USE OF SOMEONE ELSE’S IDENTITY,
USUALLY AS A METHOD TO GAIN A
FINANCIAL ADVANTAGE OR OBTAIN
CREDIT AND OTHER BENEFITS IN THE
OTHER PERSON’S NAME, AND
PERHAPS TO THE OTHER PERSON’S
DISADVANTAGE OR LOSS.
PLAGIARIS
M
WHAT IS PLAGIARISM?
PLAGIARISM IS THE “WRONGFUL
APPROPRIATION” AND “STEALING AND
PUBLICATION” OF ANOTHER AUTHOR’S
“LANGUAGE, THOUGHTS, IDEAS, OR
EXPRESSIONS” AND THE
REPRESENTATION OF THEM AS ONE’S
OWN ORIGINAL WORK.
WHAT IS PLAGIARISM?
ALL OF THE FOLLOWING ARE
CONSIDERED PLAGIARISM:
• TURNING IN SOMEONE ELSE’S WORK AS
YOUR OWN.
• COPYING WORDS OR IDEAS FROM
SOMEONE ELSE WITHOUT GIVING
CREDIT.
• FAILING TO PUT A QUOTATION IN
QUOTATION MARKS.
• GIVING INCORRECT INFORMATION
ABOUT THE SOURCE OF A
QUOTATION
• CHANGING WORDS BUT COPYING
THE SENTENCE STRUCTURE OF A
SOURCE WITHOUT GIVING CREDIT.
TIPS TO STAY SAFE ONLINE

• BE MINDFUL OF WHAT YOU SHARE AND WHAT


SITE YOU SHARE IT TO.
• DO NOT JUST ACCEPT TERMS AND CONDITIONS;
READ IT.
• CHECK OUT THE PRIVACY POLICY PAGE OF A
WEBSITE.
• KNOW THE SECURITY FEATURES OF THE
SOCIAL NETWORKING SITE YOU USE.
• DO NOT SHARE PASSWORD WITH ANYONE.
• AVOID LOGGING IN TO PUBLIC NETWORKS/WI-
FI.
• DO NOT TALK TO STRANGERS WHETHER
ONLINE OR FACE-TO-FACE.
• NEVER POST ANYTHING ABOUT FUTURE
VACATION.
• ADD FRIENDS YOU KNOW IN REAL LIFE.
• AVOID VISITING UNTRUSTED WEBSITES.
• INSTALL AND UPDATE AN ANTIVIRUS
SOFTWARE ON YOUR COMPUTER.
• IF YOU HAVE A WI-FI AT HOME, MAKE IT A
PRIVATE NETWORK BY ADDING PASSWORD.
• AVOID DOWNLOADING ANYTHING FROM
UNTRUSTED WEBSITES.
• BUY THE SOFTWARE; DO NOT USE PIRATED
ONES.
• DO NOT REPLY OR CLICK LINKS FROM
SUSPICIOUS EMAILS.
INTERNET
THREATS
1. MALWARE - STANDS FOR
MALICIOUS SOFTWARE
VIRUS

A MALICIOUS PROGRAM DESIGNED TO


REPLICATE ITSELF AND TRANSFER
FROM ONE COMPUTER TO ANOTHER
EITHER THROUGH THE INTERNET AND
LOCAL NETWORKS OR DATA STORAGE
LIKE FLASH DRIVES AND CDS.
WORM

A MALICIOUS PROGRAM THAT TRANSFERS


FROM ONE COMPUTER TO ANOTHER BY ANY
TYPE OF MEANS. OFTEN, IT USES A
COMPUTER NETWORK TO SPREAD ITSELF.
FOR EXAMPLE, THE ILOVEYOU WORM (LOVE
BUG WORM) CREATED BY A FILIPINO.
TROJAN

A MALICIOUS PROGRAM THAT IS


DISGUISED AS A USEFUL PROGRAM
BUT ONCE DOWNLOADED OR
INSTALLED, LEAVES YOUR PC
UNPROTECTED AND ALLOWS HACKERS
TO GET YOUR INFORMATION
ROGUE SECURITY SOFTWARE

TRICKS THE USER INTO POSING THAT


IT IS A SECURITY SOFTWARE. IT ASKS
THE USER TO PAY TO IMPROVE
HIS/HER SECURITY BUT IN REALITY,
THEY ARE NOT PROTECTED AT ALL.
SPYWARE

•A PROGRAM THAT RUNS IN THE


BACKGROUND WITHOUT YOU
KNOWING IT (THUS CALLED “SPY”).
IT HAS THE ABILITY TO MONITOR
WHAT YOU ARE CURRENTLY DOING
AND TYPING THROUGH KEYLOGGING.
ADWARE

•A PROGRAM DESIGNED
TO SEND YOU
ADVERTISEMENTS,
MOSTLY AS POP-UPS.
2. SPAM - UNWANTED EMAIL
MOSTLY FROM BOTS OR
ADVERTISERS. IT CAN BE
USED TO SEND MALWARE.
2. SPAM - UNWANTED EMAIL
MOSTLY FROM BOTS OR
ADVERTISERS. IT CAN BE
USED TO SEND MALWARE.
3. PHISHING
ITS GOAL IS TO ACQUIRE SENSITIVE PERSONAL
INFORMATION LIKE PASSWORDS AND CREDIT
CARD DETAILS. THIS IS DONE BY SENDING
EMAIL THAT WILL DIRECT THE USER TO VISIT
WEBSITE AND BE ASKED TO UPDATE HIS/HER
USERNAME, PASSWORD, CREDIT CARD, OR
PERSONAL INFORMATION
PHARMING
A MORE COMPLICATED WAY OF
PHISHING WHERE IT EXPLOITS
DNS (DOMAIN NAME SERVICE)
SYSTEM.

You might also like