SlideShare ist ein Scribd-Unternehmen logo
1 von 3
NETIQUETTE 
ETHICS - Refers to the rules of behavior known in respect to a particular class of human actions or a particular group, 
culture , etc. 
 Today the community of internet uses include people who are new to the environment. These “Newbies” are unfamiliar 
with the culture and do not need to know about transports and protocols. In order to bring these this to new users 
quickly, this guide offers a minimum set of conduct in which organizations and individuals m consider and adapt for their 
own use. Individuals should be aware, that no matter who supplies their internet access these organizations have 
policies about ownership of mail and files. Be sure to check with the local authorities for specific guidelines 
TOP TEN (10) NETIQUETTE GUIDELINES 
1. USE COMPUTER WITH COURTESY 
 Whether a person is sending an e-mail, chatting in a chat room or speaking in a forum, it is important to be polite and 
respectful of others online. USERS MUST ALWAYS REMEMBER THE GOLDEN RULE. 
2. USE EMOTICONS 
 when communicating online it Is difficult to gauge a writers expression. By using emoticons, the writer’s feelings or 
emotion is properly conveyed. 
3. KEEP IT SHORT AND SIMPLE (KISS) 
 It is important to keep it short especially when writing an email or typing in a chatroom 
4. DON’T SHOUT 
 Writing with capital letters is considered as shouting and is considered very rude 
5. PAY ATTENTION TO LSNGUAGE ISSUES 
 Improper language may get a member kicked out or permanently banned from a forum or group chat. 
6. “THINK BEFORE YOU CLICK” 
 It is important to note that whatever is posted online today may come back and haunt the writer tomorrow 
7. KEEP PERSONAL INFORMATION PRIVATE 
 Posting personal and confidential info. In the wrong location can have serious consequences 
8. OBEY COPYRIGHT LAWS 
 Disobeying copyright laws is a way of stealing. They must avoid using copy and paste and if done they must acknowledge 
the source and reference used 
9. HELP INTERNET NEWBIES 
 Users must be patient and helpful with others. Remember everyone was a newbie once. 
10. BE AWARE OF CYBER BULLYING 
 Cyber bullying is increasing rapidly. If targeted by a cyber bully do not respond if the messages are of a threatening 
nature, contact local law enforcement as soon as possible. 
BY FOLLOWING THE GUIDELINES,ONLINE EXPERIENCE WILL BE ENJOYABLE AND SAFE FOR ALL 
Social Networking Sites 
Social Networking Sites is probably the current unbeaten popular Internet service.Man,by nature is a social 
being.The need to mingle and communicate is inevitable. And with the fast development of technology , social network 
sites were developed.By technical definiton,a social network site is a virtual community for people with similar interest 
or just to be together.Social network provide features adding friends,placing comments and other services mentioned 
above depending its nature and capacity. 
While Frienster and Multiply ruled the early 2000s in the World Wide Web,they were overtaken by Facebook –a 
social network site developed on 2004 by Mark Zuckerberg in Harvard University.It is still at the top until now because 
of the progress of sevices it caters from blogs,multimedia,documents sharing,email,chat and the like.In 2006,micro-blog 
social network site was developed to stand out from other blog sites that allows lengthly posts –it not only allowed up to 
140 characters. 
Aside from the general social networks,there also special-purpose networks like Wikipedia-an online community for 
academic and information topics from the usual printed encyclopedia.This virtual community allows users to add and 
modify information the site-from vocubulary,famous places,figures and others. 
YouTube is also a social network site specifically intended for multi media sharing. 
Thread, forums and video sharing 
THREAD 
 Is a sequence of messages that usually comments regarding a given topic.
Web forum 
 -is a website or a portion of a website wherein random or registered users can converse with each other by posting 
messages. 
 -are not just limited to topics that are in text format or articles. 
Blog 
 -is originally referring to personal journals of an individual on the world wide web. 
Video Sharing 
 Paved way for family owned videos to be semi-permanently saved in the Net for souvenirs and even gave 
opportunities for some people to be popular across the nation and even around the world with just a simple video 
record of their talents. 
File Sharing 
 -several websites are offering file-sharing. This involves sharing of information or files via internet. 
Netiquette for E-mails and Chats 
Netiquette when Sending E-mail 
1.Never send chain letters via electronicmail. Chain letters are forbidden on the internet. The network privilages will be 
revoked. Notify the local system administrator if you ever received one. 
2. Be careful when addressing mail. There are addresses which may go to a group but the address looks like it is just one 
person. Know to whom you are sending. 
3.Use mixed case.ALL UPPER CASE MEANS SHOUTING. 
4.Limit line length fewer than 65 characters and end a line with a carriage return. 
5.Mail should have a subject heading which reflects the content of the message. 
6.Don’t send large amounts of unsolicited information to people. 
7. Be brief without being overly abrupt. When replying to message, include enough original material to be understood. It 
is extremely bad form to simply repky to a message by including the entire previous message. Edit out all the irrelevant 
material. 
Netiquette when Chatting 
1.Use mixed case and proper punctuation, as though you were typing a letter or sending a mail. 
2.Always say goodbye or farewell message, and wait to see a farewell from the other person before ending the session. 
This is especially important when you are communicating with someone from a far place. 
Cybercrime Prevention Act of 2012 
Republic Act No. 10175 is popularly known as Anti -Cybercrime Law of the Philippines intends to turn every Filipino 
citizen towards responsible netizenship. 
Netizen-Citizen that uses Internet actively. 
It recogmnizes the need for free, accessible and quality information and communications technology (ICT) and 
protection of every individual againts threats and crimess that can be done using technology and World Wide Web. 
It was implemented September 12, 2012. While there are good intentions, netizens reacted negatively on some 
provisions of the law specifically with libel because of its thin line with freedom of expression. Due to the qualms, it was 
suspended for 120 days via a temporary restraining order from the Supreme Court. The TRO was then lifted after 120 
days and the law was returned to be implemented on December 2012. 
The Ten commandments of Computer Ethics 
Computer Ethics Institute has issued a set of guidelines too, to reiterate the value of good ethics in Cyberspace. 
1.Thou shall not use a computer to harm other people.-Most attacks in computers are actually done online so every 
“netizen” must be committed for the common good and must be vigilant as well to fight or at least prevent such harms. 
2.Thou shall not interfere with other people’s computer work.-while collaboration of works is now patronize on the web 
with online document processing, it is still important to keep one’s privacy. 
3.Thou shall not snoop around in other people’s computer files.-Spying around is no longer just literally a person looking 
at another computer. There are available software programs that are capable of looking into another computer in the 
network using his/her computer. 
4.Thou shall not use a computer to steal.-Robbers hack credit card accounts and bank information to steal money and 
identity. Security and safety must be top priorities of such. 
5.Thou shall not use a computer to bear false witness.-Being online does not give anyone an excuse to post comments 
and messages that would degrade other individual especially if the accusations are not true.
6.Thou shall not copy or use proprietary software for which you have not paid. -Net users must always see to it that the 
software or other multimedia products that are downloadable from the internet must acquire a valid license. There are 
“open source” software programs available with free licenses should there be budgetary constraints. 
7.Thou shall not use other people’s computer resources without authorization or proper compensation. -Users, while 
inside school or company, must do their subject or work-related tasks and not doing other things that would waste 
money and productivity of the organization. 
8.Thou shall not appropriate other people’s intellectual output.-As students and researchers quoting statements from 
someone else’s material, even it is available online for free, is a must. Indicate the sources on footnotes and 
bibliography. 
9.Thou shall think about the social consequences of the program you are writing or the system you are designing. -As 
the saying goes,”A person can choose any decision he ought too, but he cannot choose its consequences.” It is better to 
promote an encouraging and socially-healthy cyberspace. 
10.Thou shall always use a computer in ways that ensure consideration and respect for your fellow human.-It is a 
common duty for everyone to be socially responsible and promote good-will whether in face-to-face setup or in 
cyberspace.

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquette
NetiquetteNetiquette
Netiquette
 
INTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTEINTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTE
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquette powerpointbooth
Netiquette powerpointboothNetiquette powerpointbooth
Netiquette powerpointbooth
 
Netiquette & Internet Safety
Netiquette & Internet SafetyNetiquette & Internet Safety
Netiquette & Internet Safety
 
Chuaa51: The History of Internet in the Philippines
Chuaa51: The History of Internet in the PhilippinesChuaa51: The History of Internet in the Philippines
Chuaa51: The History of Internet in the Philippines
 
Online Ethics and Etiquette
Online Ethics and Etiquette Online Ethics and Etiquette
Online Ethics and Etiquette
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquette - Basic Guidelines
Netiquette - Basic GuidelinesNetiquette - Basic Guidelines
Netiquette - Basic Guidelines
 
Network Cabling
Network CablingNetwork Cabling
Network Cabling
 
Netiquette and code of conduct in communication
Netiquette and code of conduct in communicationNetiquette and code of conduct in communication
Netiquette and code of conduct in communication
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
What Is Digital Etiquette
What Is Digital EtiquetteWhat Is Digital Etiquette
What Is Digital Etiquette
 
Netiquettes
NetiquettesNetiquettes
Netiquettes
 
LAN Cabling
LAN CablingLAN Cabling
LAN Cabling
 

Ähnlich wie NETIQUETTE GUIDELINES

Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104Marvin Broñoso
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentationlahill16
 
Responsible Digital Citizenship
Responsible Digital CitizenshipResponsible Digital Citizenship
Responsible Digital CitizenshipAlex Noudelman
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxRheamaeLiwan
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxJakeTorio1
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxEhraicaSaquing
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxDineLiwan
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxLiberty Aquino
 
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdfW3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdfCedLinc
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxCatherineBagaan
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfMelchorTolentino2
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2JeffUrgelles
 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfJeth Cuenco
 

Ähnlich wie NETIQUETTE GUIDELINES (20)

Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
Responsible Digital Citizenship
Responsible Digital CitizenshipResponsible Digital Citizenship
Responsible Digital Citizenship
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdfW3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdf
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Power point 2 p
Power point 2 pPower point 2 p
Power point 2 p
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.
 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdf
 
Netiquette
NetiquetteNetiquette
Netiquette
 

Mehr von Glory

Assessing the curriculum
Assessing the curriculumAssessing the curriculum
Assessing the curriculumGlory
 
Pelikula
PelikulaPelikula
PelikulaGlory
 
A detailed lesson plan in mathematicsfinal
A detailed lesson plan in mathematicsfinalA detailed lesson plan in mathematicsfinal
A detailed lesson plan in mathematicsfinalGlory
 
Bloom's taxonomy
Bloom's taxonomyBloom's taxonomy
Bloom's taxonomyGlory
 
Astronomical studies about the earth
Astronomical studies about the earthAstronomical studies about the earth
Astronomical studies about the earthGlory
 
Solving Word Problems Using Two Equations
Solving Word Problems Using Two EquationsSolving Word Problems Using Two Equations
Solving Word Problems Using Two EquationsGlory
 
Religion
ReligionReligion
ReligionGlory
 
THE NATURE, GOALS, AND CONTENT OF THE LANGUAGE SUBJECT AREAS
THE NATURE, GOALS, AND CONTENT OF THE LANGUAGE SUBJECT AREASTHE NATURE, GOALS, AND CONTENT OF THE LANGUAGE SUBJECT AREAS
THE NATURE, GOALS, AND CONTENT OF THE LANGUAGE SUBJECT AREAS Glory
 
Rainforest
RainforestRainforest
RainforestGlory
 
Nutrition
NutritionNutrition
NutritionGlory
 
Rest and Sleep
Rest and SleepRest and Sleep
Rest and SleepGlory
 
Principle of Underlying
Principle of UnderlyingPrinciple of Underlying
Principle of UnderlyingGlory
 
Principle of sequence
Principle of sequencePrinciple of sequence
Principle of sequenceGlory
 
Lesson planning
Lesson planningLesson planning
Lesson planningGlory
 
Word Problem
Word ProblemWord Problem
Word ProblemGlory
 
Action Research
Action ResearchAction Research
Action ResearchGlory
 

Mehr von Glory (16)

Assessing the curriculum
Assessing the curriculumAssessing the curriculum
Assessing the curriculum
 
Pelikula
PelikulaPelikula
Pelikula
 
A detailed lesson plan in mathematicsfinal
A detailed lesson plan in mathematicsfinalA detailed lesson plan in mathematicsfinal
A detailed lesson plan in mathematicsfinal
 
Bloom's taxonomy
Bloom's taxonomyBloom's taxonomy
Bloom's taxonomy
 
Astronomical studies about the earth
Astronomical studies about the earthAstronomical studies about the earth
Astronomical studies about the earth
 
Solving Word Problems Using Two Equations
Solving Word Problems Using Two EquationsSolving Word Problems Using Two Equations
Solving Word Problems Using Two Equations
 
Religion
ReligionReligion
Religion
 
THE NATURE, GOALS, AND CONTENT OF THE LANGUAGE SUBJECT AREAS
THE NATURE, GOALS, AND CONTENT OF THE LANGUAGE SUBJECT AREASTHE NATURE, GOALS, AND CONTENT OF THE LANGUAGE SUBJECT AREAS
THE NATURE, GOALS, AND CONTENT OF THE LANGUAGE SUBJECT AREAS
 
Rainforest
RainforestRainforest
Rainforest
 
Nutrition
NutritionNutrition
Nutrition
 
Rest and Sleep
Rest and SleepRest and Sleep
Rest and Sleep
 
Principle of Underlying
Principle of UnderlyingPrinciple of Underlying
Principle of Underlying
 
Principle of sequence
Principle of sequencePrinciple of sequence
Principle of sequence
 
Lesson planning
Lesson planningLesson planning
Lesson planning
 
Word Problem
Word ProblemWord Problem
Word Problem
 
Action Research
Action ResearchAction Research
Action Research
 

Kürzlich hochgeladen

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Kürzlich hochgeladen (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

NETIQUETTE GUIDELINES

  • 1. NETIQUETTE ETHICS - Refers to the rules of behavior known in respect to a particular class of human actions or a particular group, culture , etc.  Today the community of internet uses include people who are new to the environment. These “Newbies” are unfamiliar with the culture and do not need to know about transports and protocols. In order to bring these this to new users quickly, this guide offers a minimum set of conduct in which organizations and individuals m consider and adapt for their own use. Individuals should be aware, that no matter who supplies their internet access these organizations have policies about ownership of mail and files. Be sure to check with the local authorities for specific guidelines TOP TEN (10) NETIQUETTE GUIDELINES 1. USE COMPUTER WITH COURTESY  Whether a person is sending an e-mail, chatting in a chat room or speaking in a forum, it is important to be polite and respectful of others online. USERS MUST ALWAYS REMEMBER THE GOLDEN RULE. 2. USE EMOTICONS  when communicating online it Is difficult to gauge a writers expression. By using emoticons, the writer’s feelings or emotion is properly conveyed. 3. KEEP IT SHORT AND SIMPLE (KISS)  It is important to keep it short especially when writing an email or typing in a chatroom 4. DON’T SHOUT  Writing with capital letters is considered as shouting and is considered very rude 5. PAY ATTENTION TO LSNGUAGE ISSUES  Improper language may get a member kicked out or permanently banned from a forum or group chat. 6. “THINK BEFORE YOU CLICK”  It is important to note that whatever is posted online today may come back and haunt the writer tomorrow 7. KEEP PERSONAL INFORMATION PRIVATE  Posting personal and confidential info. In the wrong location can have serious consequences 8. OBEY COPYRIGHT LAWS  Disobeying copyright laws is a way of stealing. They must avoid using copy and paste and if done they must acknowledge the source and reference used 9. HELP INTERNET NEWBIES  Users must be patient and helpful with others. Remember everyone was a newbie once. 10. BE AWARE OF CYBER BULLYING  Cyber bullying is increasing rapidly. If targeted by a cyber bully do not respond if the messages are of a threatening nature, contact local law enforcement as soon as possible. BY FOLLOWING THE GUIDELINES,ONLINE EXPERIENCE WILL BE ENJOYABLE AND SAFE FOR ALL Social Networking Sites Social Networking Sites is probably the current unbeaten popular Internet service.Man,by nature is a social being.The need to mingle and communicate is inevitable. And with the fast development of technology , social network sites were developed.By technical definiton,a social network site is a virtual community for people with similar interest or just to be together.Social network provide features adding friends,placing comments and other services mentioned above depending its nature and capacity. While Frienster and Multiply ruled the early 2000s in the World Wide Web,they were overtaken by Facebook –a social network site developed on 2004 by Mark Zuckerberg in Harvard University.It is still at the top until now because of the progress of sevices it caters from blogs,multimedia,documents sharing,email,chat and the like.In 2006,micro-blog social network site was developed to stand out from other blog sites that allows lengthly posts –it not only allowed up to 140 characters. Aside from the general social networks,there also special-purpose networks like Wikipedia-an online community for academic and information topics from the usual printed encyclopedia.This virtual community allows users to add and modify information the site-from vocubulary,famous places,figures and others. YouTube is also a social network site specifically intended for multi media sharing. Thread, forums and video sharing THREAD  Is a sequence of messages that usually comments regarding a given topic.
  • 2. Web forum  -is a website or a portion of a website wherein random or registered users can converse with each other by posting messages.  -are not just limited to topics that are in text format or articles. Blog  -is originally referring to personal journals of an individual on the world wide web. Video Sharing  Paved way for family owned videos to be semi-permanently saved in the Net for souvenirs and even gave opportunities for some people to be popular across the nation and even around the world with just a simple video record of their talents. File Sharing  -several websites are offering file-sharing. This involves sharing of information or files via internet. Netiquette for E-mails and Chats Netiquette when Sending E-mail 1.Never send chain letters via electronicmail. Chain letters are forbidden on the internet. The network privilages will be revoked. Notify the local system administrator if you ever received one. 2. Be careful when addressing mail. There are addresses which may go to a group but the address looks like it is just one person. Know to whom you are sending. 3.Use mixed case.ALL UPPER CASE MEANS SHOUTING. 4.Limit line length fewer than 65 characters and end a line with a carriage return. 5.Mail should have a subject heading which reflects the content of the message. 6.Don’t send large amounts of unsolicited information to people. 7. Be brief without being overly abrupt. When replying to message, include enough original material to be understood. It is extremely bad form to simply repky to a message by including the entire previous message. Edit out all the irrelevant material. Netiquette when Chatting 1.Use mixed case and proper punctuation, as though you were typing a letter or sending a mail. 2.Always say goodbye or farewell message, and wait to see a farewell from the other person before ending the session. This is especially important when you are communicating with someone from a far place. Cybercrime Prevention Act of 2012 Republic Act No. 10175 is popularly known as Anti -Cybercrime Law of the Philippines intends to turn every Filipino citizen towards responsible netizenship. Netizen-Citizen that uses Internet actively. It recogmnizes the need for free, accessible and quality information and communications technology (ICT) and protection of every individual againts threats and crimess that can be done using technology and World Wide Web. It was implemented September 12, 2012. While there are good intentions, netizens reacted negatively on some provisions of the law specifically with libel because of its thin line with freedom of expression. Due to the qualms, it was suspended for 120 days via a temporary restraining order from the Supreme Court. The TRO was then lifted after 120 days and the law was returned to be implemented on December 2012. The Ten commandments of Computer Ethics Computer Ethics Institute has issued a set of guidelines too, to reiterate the value of good ethics in Cyberspace. 1.Thou shall not use a computer to harm other people.-Most attacks in computers are actually done online so every “netizen” must be committed for the common good and must be vigilant as well to fight or at least prevent such harms. 2.Thou shall not interfere with other people’s computer work.-while collaboration of works is now patronize on the web with online document processing, it is still important to keep one’s privacy. 3.Thou shall not snoop around in other people’s computer files.-Spying around is no longer just literally a person looking at another computer. There are available software programs that are capable of looking into another computer in the network using his/her computer. 4.Thou shall not use a computer to steal.-Robbers hack credit card accounts and bank information to steal money and identity. Security and safety must be top priorities of such. 5.Thou shall not use a computer to bear false witness.-Being online does not give anyone an excuse to post comments and messages that would degrade other individual especially if the accusations are not true.
  • 3. 6.Thou shall not copy or use proprietary software for which you have not paid. -Net users must always see to it that the software or other multimedia products that are downloadable from the internet must acquire a valid license. There are “open source” software programs available with free licenses should there be budgetary constraints. 7.Thou shall not use other people’s computer resources without authorization or proper compensation. -Users, while inside school or company, must do their subject or work-related tasks and not doing other things that would waste money and productivity of the organization. 8.Thou shall not appropriate other people’s intellectual output.-As students and researchers quoting statements from someone else’s material, even it is available online for free, is a must. Indicate the sources on footnotes and bibliography. 9.Thou shall think about the social consequences of the program you are writing or the system you are designing. -As the saying goes,”A person can choose any decision he ought too, but he cannot choose its consequences.” It is better to promote an encouraging and socially-healthy cyberspace. 10.Thou shall always use a computer in ways that ensure consideration and respect for your fellow human.-It is a common duty for everyone to be socially responsible and promote good-will whether in face-to-face setup or in cyberspace.