SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Online Ethics
and Etiquette
PREPARED BY: JESSAMEN I. TINO
Netiquette
-term used to describe proper etiquette
and rules for online behavior on the
internet.
-the word netiquette is formed from the
words etiquette and net.
• Etiquette-proper requirements for
social behavior.
• Net- from the word internet
• Netizen- refers to the person who is a
member or a part of the online
community.
Some key points to keep in
mind to maintain good
conduct over the Internet:
 Recognize that your cyber avatar, or
your online representation , is not
another world but an extension of
your personality and an extension of
the existing society that you are part
of.
You should apply the values and
conduct learned since childhood in the
online extension of our society.
 Keep in mind that there are laws
existing in our society and on the Web.
 Keep in mind that there are differences
among the individuals you will interact
with and the individuals who will read
your published contents.
 Everything published on the World
Wide Web should be considered as
copyrighted or owned by another
individual.
Think before you send.
Don’t send messages that could be
misinterpreted as threatening or
hurtful.
Follow the conventions of writing
when sending formal emails.
Respect others right to privacy.
BIG IDEA!
KEEP SAFE ONLINE
AND
THINK BEFORE YOU
CLICK
Don’t forget
your netiquette!
Thank You
And
God Bless!

Weitere ähnliche Inhalte

Was ist angesagt?

Netiquette
NetiquetteNetiquette
Netiquette
pafafo
 
Admshs emp tech_q1_m3-online navigation
Admshs emp tech_q1_m3-online navigationAdmshs emp tech_q1_m3-online navigation
Admshs emp tech_q1_m3-online navigation
Dexter Dizon
 

Was ist angesagt? (20)

Netiquette
NetiquetteNetiquette
Netiquette
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Imaging and Design for Online Environment
Imaging and Design for Online EnvironmentImaging and Design for Online Environment
Imaging and Design for Online Environment
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
 
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT Technologies
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Empowerment Technologies - Principles and Basic Techniques of Image Manipulation
Empowerment Technologies - Principles and Basic Techniques of Image ManipulationEmpowerment Technologies - Principles and Basic Techniques of Image Manipulation
Empowerment Technologies - Principles and Basic Techniques of Image Manipulation
 
8 Collaborative ICT Development
8 Collaborative ICT Development8 Collaborative ICT Development
8 Collaborative ICT Development
 
Lesson 1 Empowerment Technology
Lesson 1 Empowerment TechnologyLesson 1 Empowerment Technology
Lesson 1 Empowerment Technology
 
empowerment technology 12.pptx
empowerment technology 12.pptxempowerment technology 12.pptx
empowerment technology 12.pptx
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Trends, Network and Critical Thinking Unit 7 Neural and Social Networks
Trends, Network and Critical Thinking Unit 7 Neural and Social NetworksTrends, Network and Critical Thinking Unit 7 Neural and Social Networks
Trends, Network and Critical Thinking Unit 7 Neural and Social Networks
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online Netiquette
 
Collaborative ICT Development - Empowerment Technologies
Collaborative ICT Development - Empowerment TechnologiesCollaborative ICT Development - Empowerment Technologies
Collaborative ICT Development - Empowerment Technologies
 
Admshs emp tech_q1_m3-online navigation
Admshs emp tech_q1_m3-online navigationAdmshs emp tech_q1_m3-online navigation
Admshs emp tech_q1_m3-online navigation
 
Software Applications and Platforms.pptx
Software Applications and Platforms.pptxSoftware Applications and Platforms.pptx
Software Applications and Platforms.pptx
 

Andere mochten auch

Usage of ICT in daily life
Usage of ICT in daily lifeUsage of ICT in daily life
Usage of ICT in daily life
panitiaict
 
Netiquette Rules
Netiquette RulesNetiquette Rules
Netiquette Rules
RaquelPG96
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
mjtheman
 

Andere mochten auch (15)

Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and Etiquette
 
Usage Of Ict In Every Day Life
Usage Of Ict In Every Day LifeUsage Of Ict In Every Day Life
Usage Of Ict In Every Day Life
 
Usage of ICT in daily life
Usage of ICT in daily lifeUsage of ICT in daily life
Usage of ICT in daily life
 
bulliying
bulliyingbulliying
bulliying
 
Ethics & Etiquette Online
Ethics & Etiquette OnlineEthics & Etiquette Online
Ethics & Etiquette Online
 
Anti bullying ra 10627 final ping
Anti bullying ra 10627 final pingAnti bullying ra 10627 final ping
Anti bullying ra 10627 final ping
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
Netiquette Rules
Netiquette RulesNetiquette Rules
Netiquette Rules
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
 
Lesson 1: Introduction to Information and Communication Technology
Lesson 1: Introduction to Information and Communication TechnologyLesson 1: Introduction to Information and Communication Technology
Lesson 1: Introduction to Information and Communication Technology
 
Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)
 
Malware
MalwareMalware
Malware
 

Ähnlich wie Online Ethics and Etiquette

NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
CatherineBagaan
 
Ethicsincyberspace (3)
Ethicsincyberspace (3)Ethicsincyberspace (3)
Ethicsincyberspace (3)
Maria Obaidi
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
Mazni Salleh
 
Biz miz io2 content for module 3
Biz miz io2 content for module 3Biz miz io2 content for module 3
Biz miz io2 content for module 3
EmanuelePristera
 
Com 6 u1 L2 Observing netiquette
Com 6 u1 L2  Observing netiquetteCom 6 u1 L2  Observing netiquette
Com 6 u1 L2 Observing netiquette
Jason Ruelo
 
Cyber citizenship
Cyber citizenshipCyber citizenship
Cyber citizenship
kaeschliman
 

Ähnlich wie Online Ethics and Etiquette (20)

Internet and online ethics & etiquette
Internet and online ethics & etiquetteInternet and online ethics & etiquette
Internet and online ethics & etiquette
 
Netizenship and Netiqutte in Online Communities.pptx
Netizenship and Netiqutte in Online Communities.pptxNetizenship and Netiqutte in Online Communities.pptx
Netizenship and Netiqutte in Online Communities.pptx
 
Netizenship and Netiqutte in Online Communities.pptx
Netizenship and Netiqutte in Online Communities.pptxNetizenship and Netiqutte in Online Communities.pptx
Netizenship and Netiqutte in Online Communities.pptx
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
Ethicsincyberspace (3)
Ethicsincyberspace (3)Ethicsincyberspace (3)
Ethicsincyberspace (3)
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional Ethics
 
Lecture 1 introduction to course
Lecture 1 introduction to courseLecture 1 introduction to course
Lecture 1 introduction to course
 
Netizenship and Netiquette in Online Communities.pptx
Netizenship and Netiquette in Online Communities.pptxNetizenship and Netiquette in Online Communities.pptx
Netizenship and Netiquette in Online Communities.pptx
 
Email and Net Etiquette
Email and Net EtiquetteEmail and Net Etiquette
Email and Net Etiquette
 
P.p lect1-
P.p lect1-P.p lect1-
P.p lect1-
 
Biz miz io2 content for module 3
Biz miz io2 content for module 3Biz miz io2 content for module 3
Biz miz io2 content for module 3
 
Com 6 u1 L2 Observing netiquette
Com 6 u1 L2  Observing netiquetteCom 6 u1 L2  Observing netiquette
Com 6 u1 L2 Observing netiquette
 
Lesson 2 Netizenship and Netiquette in Online Communities
Lesson 2 Netizenship and Netiquette in Online CommunitiesLesson 2 Netizenship and Netiquette in Online Communities
Lesson 2 Netizenship and Netiquette in Online Communities
 
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdfW3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
 
Cyber citizenship
Cyber citizenshipCyber citizenship
Cyber citizenship
 
Responsible Digital Citizenship
Responsible Digital CitizenshipResponsible Digital Citizenship
Responsible Digital Citizenship
 
ICT code of ethics
ICT code of ethicsICT code of ethics
ICT code of ethics
 
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Online Ethics and Etiquette

  • 2. Netiquette -term used to describe proper etiquette and rules for online behavior on the internet. -the word netiquette is formed from the words etiquette and net.
  • 3. • Etiquette-proper requirements for social behavior. • Net- from the word internet • Netizen- refers to the person who is a member or a part of the online community.
  • 4. Some key points to keep in mind to maintain good conduct over the Internet:
  • 5.  Recognize that your cyber avatar, or your online representation , is not another world but an extension of your personality and an extension of the existing society that you are part of.
  • 6. You should apply the values and conduct learned since childhood in the online extension of our society.  Keep in mind that there are laws existing in our society and on the Web.
  • 7.  Keep in mind that there are differences among the individuals you will interact with and the individuals who will read your published contents.  Everything published on the World Wide Web should be considered as copyrighted or owned by another individual.
  • 8. Think before you send. Don’t send messages that could be misinterpreted as threatening or hurtful. Follow the conventions of writing when sending formal emails. Respect others right to privacy.
  • 10. KEEP SAFE ONLINE AND THINK BEFORE YOU CLICK