Sei sulla pagina 1di 38

NETIQUETTE

What is Netiquette?

•is network etiquette, the do’s and


don’ts of online communication.
Different kinds of Malware
How to avoid these threats?

•A very effective way of avoiding these


threats is verifying the authenticity
and credibility of the WEB source.
COPYRIGHT INFRINGEMENT
• Intellectual Property.
• Copyright Law.(Intellectual Property Code of the
Philippines, officially known as Republic Act No.
8293.)
• Copyright Page “No part of this book may be copied,
reproduced.”
Tips to help you avoid copyright infringement:
• Understand- Copyright protect literary works, photographs
paintings, drawing, films, music choreography and sculptures.
• BeResponsible- even if a material does not say that it is
copyrighted, it is not a valid defense against copyright.
• BeCreative- ask yourself whether what you are making is
something that came from you or something made from
somebody else creativity.
• Know the Law- there are some limitations to copyright laws.
Online Research
• Have a question in mind- Focus on a question you want
answered.
• Narrow it down- Search engines like Google, Bing, or Yahoo use
several filters to determine the most appropriate result for you.
• Advanced Search- The best way to filter information you get
from search engines is by using the advanced search.
• Look for a credible sources- Some wikis, filled with updated
information, are not a credible source. When using wikis, check
out the link of the cited texts.
• Give credit- Give credit to the original author of the page or
information. To properly site a reference, you may use the format
below.
• Keyword searching
Search Strategies:
• Enter terms to search
• Use quotation marks to search as a phrase and keep the words linked
together. Common words are ignored (That, to, which, a, the ...) + and –
can be used to include or exclude a word
• Boolean
• AND - enter words connect with AND- it will include sites where both words
and found
Uses: joining different topics (i.e. global warming AND California)
• OR - requires at least one of the terms is found.
Uses: join similar or synonymous topics (i.e. global warming OR
greenhouse effect)
• NOT - searches for the first term and excludes sites that have the second term.
(i.e. Washington NOT school)
10 COMMANDMENTS OF
COMPUTER ETHICS
ETHICS

• Deals with placing a “value” on acts


according to whether they are “good” or
“bad”.
THOU SHALT NOT USE A COMPUTER TO
HARM OTHER PEOPLE.

• It is wrong to use computer and


steal/access/destroy their personal
information.
THOU SHALT NOT INTERFERE WITH OTHER
PEOPLE'S COMPUTER WORK

• Generating and consciously spreading


computer viruses is unethical.
THOU SHALT NOT SNOOP AROUND IN
OTHER PEOPLE'S FILES

• Reading other people’s e-mail messages is as


bad as opening and reading their letters: This
is invading their privacy.
THOU SHALT NOT USE A COMPUTER TO
STEAL

• Using a computer to break into the accounts


of a company or a bank and transferring
money should be judged the same way as
robbery.
THOU SHALT NOT USE A COMPUTER TO
BEAR FALSE WITNESS

• The Internet can spread untruth as fast as it


can spread truth. Putting out false
"information" to the world is bad.
THOU SHALT NOT USE OR COPY SOFTWARE
FOR WHICH YOU HAVE NOT PAID

• Software is an intellectual product. In that


way, it is like a book: Obtaining illegal copies
of copyrighted software is as bad as
photocopying a copyrighted book.
THOU SHALT NOT USE OTHER PEOPLE'S
COMPUTER RESOURCES WITHOUT
AUTHORIZATION

• Hacking a system to break and bypass the


authorization is unethical.
THOU SHALT NOT APPROPRIATE OTHER
PEOPLE'S INTELLECTUAL OUTPUT

• Copying somebody else’s program without


proper authorization is software piracy and is
unethical.
THOU SHALT THINK ABOUT THE SOCIAL
CONSEQUENCES OF THE PROGRAM YOU WRITE

• You have to think about computer issues in a


more general social framework: Can the
program you write be used in a way that is
harmful to society?
THOU SHALT USE A COMPUTER IN WAYS THAT
SHOW CONSIDERATION AND RESPECT

• The fact that you cannot see the people you


are interacting with does not mean that you
can be rude to them.
REFERENCES:

• http://www.ccsr.cms.dmu.ac.uk/resources/professionalism/codes
/cei_command_com.html
• Empowerment Technology by Rex bookstore.

Potrebbero piacerti anche