Internet Ethics For Everyone
Internet Ethics For Everyone
Internet Ethics For Everyone
issues
of
computer
ethics
is
violation
of
copyright
issues.
Duplicating copyrighted content without the authors approval, accessing personal information of others are
some of the examples that violate ethical principles.
Acceptance
One has to accept that Internet is not a value free-zone .It means World Wide Web is a place where values are
considered in the broadest sense so we must take care while shaping content and services and we should
recognize that internet is not apart from universal society but it is a primary component of it.
While Downloading
Internet is used to listen and learn about music,It is also used to watch videos and play games we must not use
it to download them or share copyrighted material. We must be aware of the importance of copyrights and
issues of copyright.
Access to Internet
The internet is a time-efficient tool for everyone that enlarges the possibilities for curriculum growth. Learning
depends on the ability to find relevant and reliable information quickly and easily, and to select, understand and
assess that information. Searching for information on the internet can help to develop these skills. Classroom
exercises and take-home assessment tasks, where students are required to compare website content, are ideal
for alerting students to the requirements of writing for different audiences, the purpose of particular content,
identifying and judging accuracy and reliability. Since many sites adopt particular views about issues, the internet
is a useful tool for developing the skills of distinguishing fact from opinion and exploring subjectivity and
objectivity.
Respect the privacy of others, just as you expect the same from others.
Complain about illegal communication and activities, if found, to Internet service Providers and local law
enforcement authorities.
Users are responsible for safeguarding their User Id and Passwords. They should not write them on
paper or anywhere else for remembrance.
Users should not intentionally use the computers to retrieve or modify the information of others, which
may include password information, files, etc..