LESSON 4
LESSON 4
LESSON 4
Objectives
At the end of this module, you should be able to:
• Discuss the importance of being a responsible netizen by following the rules of
common courtesy online and the informal “rules of the road” of cyberspace.
• Discuss the difference between privacy and security.
• Explain various risks to internet privacy.
Lesson 1: Netiquette
What is Netiquette?
What is Netiquette? Simple stated, it’s network etiquette – that is the etiquette of cyberspace and
“etiquette” means the forms of required by good breeding or prescribed by authority to be required
in social or official life. In other words, netiquette is a set of rules for behaving properly online.
Netiquette, or network etiquette, is concerned with the "proper" way to communicate in an online
environment. Consider the following "rules," adapted from Virginia Shea's the Core Rules of
Netiquette, whenever you communicate in the virtual world.
When you use e-mail, instant messenger, video calls, or discussion boards to communicate with
others online, please be sure to follow the rules of professional online communications known as
netiquette. These rules will help you communicate with instructors, classmates, and potential
employers more effectively and will help prevent misunderstandings.
REMEMBER THE GOLDEN RULE – Even though you may be interacting with a
computer screen, you are communicating with a real person who will react to your
message. Make a good impression - treat others with the same respect that you would
like to receive and avoid confrontational or offensive language.
To protect your privacy and safety, do not share online any sensitive personal
information such as:
- Your home address or phone number
- Personal conversations
- Social plans, such as vacations
- Financial information
- Usernames, passwords, or hints
- Anything personal that you would not want shared by others over the Internet
If the material you share with others online came from another source, make every effort
to gain permission from the original author or copyright holder. Copying someone else's
work and passing it off as your own is plagiarism. It damages your reputation and could
subject you to serious academic and legal consequences.
When sharing a viewpoint that differs from someone else’s, it is a best practice to first
acknowledge the other person by briefly restating what he or she said, but in your own
words. This lets the person know that you are listening and trying to understand them.
When presenting an opinion or criticism, it is helpful to use phrases that identify to
whose point of view you are referring. If the opinion is yours, you can begin with the
phrase “In my experience” or “In my opinion”. If it is a viewpoint of someone else, make
sure you identify that in your message (Example: “According to Eric Ericson,” or “The
president believes”).
b) Rule 2: Adhere to the same standards of behavior online that you follow in real life While
it can be argued that standards of behavior may be different in the virtual world, they
certainly should not be lower. You should do your best to act within the laws and ethical
manners of society whenever you inhabit "cyberspace." Would you behave rudely to
someone face-to-face? On most occasions, no. Neither should you behave this way in the
virtual world.
c) Rule 3: Know where you are in cyberspace "Netiquette varies from domain to domain."
(Shea, 1994) Depending on where you are in the virtual world, the same written
communication can be acceptable in one area, where it might be considered
inappropriateq in another. What you text to a friend may not be appropriate in an email to
a classmate or colleague. Can you think of another example?
d) Rule 4: Respect other people's time and bandwidth Electronic communication takes time: time
to read and time in which to respond. Most people today lead busy lives, just like you do, and
don't have time to read or respond to frivolous emails or discussion posts. As a virtual world
communicator, it is your responsibility to make sure that the time spent reading your words
isn't wasted. Make your written communication meaningful and to the point, without extraneous
text or superfluous graphics or attachments that may take forever to download.
e) Rule 5: Make yourself look good online writing.colostate.edu One of the best things about
the virtual world is the lack of judgment associated with your physical appearance, sound
of your voice, or the clothes you wear (unless you post a video of yourself singing Karaoke
in a clown outfit.) You will, however, be judged by the quality of your writing, so keep the
following tips in mind: Always check for spelling and grammar errors Know what you're
talking about and state it clearly Be pleasant and polite
f) Rule 6: Share expert knowledge The Internet offers its users many benefits; one is the
ease in which information can be shared or accessed and in fact, this "information sharing"
capability is one of the reasons the Internet was founded. So, in the spirit of the Internet's
"founding fathers," share what you know! When you post a question and receive intelligent
answers, share the results with others. Are you an expert at something? Post resources
and references about your subject matter. Recently expanded your knowledge about a
subject that might be of interest to others? Share that as well.
g) Rule 7: Help keep flame wars under control What is meant by "flaming" and "flame wars?"
"Flaming is what people do when they express a strongly held opinion without holding
back any emotion." (Shea, 1994). As an example, think of the kinds of passionate
comments you might read on a sports blog. While "flaming" is not necessarily forbidden in
virtual communication, "flame wars," when two or three people exchange angry posts
between one another, must be controlled or the camaraderie of the group could be
compromised. Don't feed the flames; extinguish them by guiding the discussion back to a
more productive direction.
h) Rule 8: Respect other people's privacy Depending on what you are reading in the virtual
world, be it an online class discussion forum, Facebook page, or an email, you may be
exposed to some private or personal information that needs to be handled with care.
Perhaps someone is sharing some medical news about a loved one or discussing a
situation at work. What do you think would happen if this information "got into the wrong
hands?" Embarrassment? Hurt feelings? Loss of a job? Just as you expect others to respect
your privacy, so should you respect the privacy of others. Be sure to err on the side of
caution when deciding to discuss or not to discuss virtual communication.
i) Rule 9: Don't abuse your power Just like in face-to-face situations, there are people in
cyberspace who have more "power" than others. They have more expertise in technology
or they have years of experience in a particular skill or subject matter. Maybe it's you who
possesses all of this knowledge and power! Just remember: knowing more than others do
or having more power than others may have does not give you the right to take advantage
of anyone. Think of Rule 1: Remember the human.
j) Rule 10: Be forgiving of other people's mistakes Not everyone has the same amount of
experience working in the virtual world. And not everyone knows the rules of netiquette. At
some point, you will see a stupid question, read an unnecessarily long response, or
encounter misspelled words; when this happens, practice kindness and forgiveness as you
would hope someone would do if you had committed the same offense. If it's a minor
"offense," you might want to let it slide. If you feel compelled to respond to a mistake, do so
in a private email rather than a public forum.
Lesson 2: Cybercrimes
What is Cyber?
It is the Characteristics of the culture of computers, information, technology and virtual reality.
Republic Act No. 10175 Cybercrime Prevention Act of 2012 is a law in the Philippines
approved on September 12,2012 which aims to address legal issues concerning online
interactions and internet.
Republic Act No. 10173 Data Privacy Act of 2012 is an act protecting individual personal
information.
a. Copyright
The exclusive legal right, given to an originator or an assignee to print, publish, perform,
film, or record literary, artistic, or musical material, and to authorize others to do the same.
b. Plagiarism
An act or instance of using or closely imitating the language and thoughts of another author
without authorization.
c. Computer Addiction
• Offline: generally used when speaking about excessive gaming behavior, which can
be practiced both offline and online.
• Online: Also known as “Internet Addiction”, gets more attention in general from scientific
research than offline computer addiction, mainly because most cases of computer
addiction are related to the excessive use of the Internet.
*Virtual Self -The persona you create about yourself virtually.
CRIMINAL ACTIVITIES
a. Hacking
• Unauthorized access of or interference with computer systems, servers, or other
information and communication systems
• Unauthorized access to corrupt, alter, steal, or destroy electronic data using
computers or other information and communication systems without the computer or
system owner’s knowledge and consent
• The introduction of computer viruses resulting in the corruption, alteration, theft, or
loss of such data
• Illegal Access
• Illegal Interception
• Data Interference
• System Interference
• Misuse of Devices
• Infection of IT Systems with Malware – if the act is committed against critical
infrastructure of the Philippines the, penalty is between 12-20 years reclusion temporal
• Six years up to twelve years of imprisonment also known as prison mayor.
c. Electronic theft
• Illegal Downloading
• Obtaining files that you do not have the right to use from the internet.
• Digital Piracy
• Practice of illegally copying and selling digital music, video, computer software, etc.
• Copyright Infringement
• Penalty of Php 50,000 – 500, 000 and or prison mayor
d. Cyberbullying
• The use of electronic communication to bully a person, typically by sending a
message of an intimidating or threatening nature.
• The Anti-Bullying Act of 2013 (RA 10627)
e. Cybersex
• Willful engagement, maintenance, control, or operation, directly or indirectly of any
lascivious exhibition of sexual organs or sexual activity with the aid of a computer
system for favor or consideration.
• There is a discussion on this matter if it involves “couples” or “people in relationship”
who engage in cybersex.
• Penalty at least Php 200,000 and or prison mayor
f. Child Pornography
• Is a form of child sexual exploitation.
• Unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the
Anti-Child Pornography Act of 2009, committed through a computer system.
• Penalty of 12-20 years of imprisonment or reclusion
Hacking
Hacking is a term used to describe actions taken by someone to gain
unauthorized access to a computer. The availability of information online on the
tools, techniques, and malware makes it easier for even non-technical people to
undertake malicious activities.
The process by which cyber criminals gain access to your computer.
• Find weaknesses (or pre-existing bugs) in your security settings and exploit them in
order to access your information.
• Install a Trojan horse, providing a back door for hackers to enter and search for your
information.
Malware
Malware is one of the more common ways to infiltrate or damage your
computer.
Malicious software that infects your computer, such as computer viruses,
worms,
Trojan horses, spyware, and adware.
Pharming
Pharming is a common type of online fraud.
A means to point you to a malicious and illegitimate website by redirecting the
legitimate URL. Even if the URL is entered correctly, it can still be redirected to
a fake website.
• Convince you that the site is real and legitimate by spoofing or looking almost identical to
the actual site down to the smallest details. You may enter your personal information and
unknowingly give it to someone with malicious intent.
Phishing
Phishing is used most often by cyber criminals because it's easy to execute and
can produce the results they're looking for with very little effort.
Fake emails, text messages and websites created to look like they're from
authentic companies. They're sent by criminals to steal personal and financial
information from you. This is also known as “spoofing”.
What it does:
• Trick you into giving them information by asking you to update, validate or confirm your
account. It is often presented in a manner than seems official and intimidating, to
encourage you to take action.
• Provides cyber criminals with your username and passwords so that they can access your
accounts (your online bank account, shopping accounts, etc.) and steal your credit card
numbers.
Ransomware
Ransomware is a type of malware that restricts access to your computer or your
files and displays a message that demands payment in order for the restriction
to be removed. The two most common means of infection appear to be phishing
emails that contain malicious attachments and website pop-up advertisements.
Spam
Spam is one of the more common methods of both sending information out and
collecting it from unsuspecting people.
The mass distribution of unsolicited messages, advertising or pornography to
addresses which can be easily found on the Internet through things like social
networking sites, company websites and personal blogs.
Trojan Horses
A Trojan horse may not be a term you're familiar with, but there's a good chance
you or someone you know has been affected by one.
A malicious program that is disguised as, or embedded within, legitimate
software. It is an executable file that will install itself and run automatically once
it's downloaded.
Viruses
Most people have heard of computer viruses, but not many know exactly what
they are or what they do.
Malicious computer programs that are often sent as an email attachment or a
download with the intent of infecting your computer, as well as the computers of
everyone in your contact list. Just visiting a site can start an automatic download of
a virus.
Wi-Fi Eavesdropping
WiFi eavesdropping is another method used by cyber criminals to capture
personal information.
Virtual “listening in” on information that's shared over an unsecure (not
encrypted) WiFi network.
Worms
Worms are a common threat to computers and the Internet as a whole.
A worm, unlike a virus, goes to work on its own without attaching itself to files or programs. It lives in
your computer memory, doesn't damage or alter the hard drive and propagates by sending itself to
other computers in a network – whether within a company or the Internet itself.