Skip to main content

Rules of Netiquette and Areas of Computer ethics

RULES OF NETTIQUETE

what is nettiquete ?


  •            Netiquette is a combination of the words network and etiquette, and is defined as a set of rules for acceptable online behavior. Similarly, online ethics focuses on the acceptable use of online resources in an online social environment.
  •           Both phrases are frequently interchanged and are often combined with the concept of a ’netizen’ which itself is a contraction of the words internet and citizen and refers to both a person who uses the internet to participate in society, and an individual who has accepted the responsibility of using the internet in productive and socially responsible ways.
  •            Underlying this overall concept of socially responsible internet use are a few core pillars, though the details underneath each pillar are still subject to debate.
  •                  At a high level using netiquette, applying online ethics, or being a good netizen means:
  • Recognizing that the internet is not some new world in which anything goes, but rather a new dimension or extension of our existing society.
  • Applying the same standards and values online as we are accustomed to applying in the rest of our lives. In simple terms this means that the values society has in place against such things as hate speech and bigotry, copyright violations and other forms of theft, child exploitation and child pornography, remain intact. As do the values around courtesy, kindness, openness, and treating others with the same respect we wish to receive.
  • Accepting that the laws which are currently in place to protect the rights and dignity of citizens apply online, and that where needed, laws are updated to reflect these rights in the extended environment. Theft online is still theft, stalking, bullying, harassing, tormenting online is still abusive, and so on.
  • Acknowledging that cultural differences remain, even when national boundaries no longer apply. This requires finding a way to accept that the social values and norms of some netizens will not be the social values and norms of all netizens.
  • For companies, being a good netizen, applying online ethics, or using netiquette also includes
    • Respecting the rights to privacy assumed and possessed by citizens in their offline interactions.
    • Maintaining transparency in their policies and actions so that consumers can easily and quickly understand how that company is using their information, protecting them from harm, and giving users a clear means of ownership and self-determination as to what is, and isn’t shared about them.
  • Most internet users automatically apply the same responsible respectful behavior online as they do in every other environment and by nature apply netiquette an online ethics, and are good netizens. The minority that fail to apply societal values in some or any environment - including the internet - are quickly identified as exceptions to be dealt with on a social, or criminal level.


AREAS OF COMPUTER ETHICS

what is computer ethics ?

The moral guidelines that govern the use of computers, mobile devices and information systems.

Six areas of computer ethics
  • Unauthorized use of computers and networks
  • Software theft (piracy)
    • Piracy is the illegal copy of software, music, and movies
  • Information accuracy
  • Do not assume that because it is on the web it is correct
  • There are also questions about the ethics of using computers to alter output, primarily graphical output such as retouching photographs
  • The rights to which creators are entitled for their work.  This work consists of ideas, inventions, art, writings, processes, company and product names and logos
  • Copyright gives authors and artists exclusive rights to duplicate, publish, and sell their materials
  •  If non-copyrighted material is published on a website, you are still prohibited from copying it and representing it as your own
  • A written guideline that helps determine whether a specific computer action is ethical or unethical
    • Computer Ethics and Privacy
    • Employees may not interfere with others’ computer work
    • Employers may not meddle in others’ computer files
    • Computers may not be used to steal
    • Computers may not be used to bear false witness
    • Employees may not copy or use software illegally
    • Employees may not use others’ computer resources without authorization
    • Employees may not use others’ intellectual property as their own
    • Employees shall consider the social impact of programs and systems they design
    • Employees always should use computers in a way that demonstrates consideration and respect for fellow humans
  • This refers to the right of individuals and companies to deny or restrict the collection and use of information about them.
  • Easier to control in the past because it was kept in separate locations
  • How to safeguard personal information
    • Supply only necessary information on rebate, warranty, and registration forms
    • Do not pre-print your telephone number or social security number on personal checks
    • Have an unlisted or unpublished telephone number
    • Have the number blocked from displaying on the receiver’s system
    • Omit your telephone number on charge and credit cards
    • Ask merchants not to write credit card numbers, telephone numbers, social security numbers and driver license number on back of personal check
    • Use cash to purchase items
    • Avoid shopping club and buyer cards
    • Find out why merchants want certain information
    • Tell merchants that you do not want them to distribute your personal information
    • Request to me removed from mailing lists
    • Get your credit report once a year and correct errors
    • Request a free copy of your medical records
    • Limit the amount of information you provide to web sites
    • Install a cookie manager to filter cookies
    • Clear your history file when you are finished browsing
    • Set up a free e-mail account and use it for merchant forms
    • Turn off file and printer sharing on your Internet connection
    • Install a personal firewall
    • Sign up for e-mail filtering through the service provider or use an anti-spam program
    • Do not reply for spam
    • Surf the web anonymously 
  • Intellectual property rights
  • IT Code of conduct
  • Information privacy
Computer Safety
  • In order to avoid losing your work, you should incorporate a regular and systematic save procedure

Comments

Popular posts from this blog

INTERNET TECHNOLOGY

 INTERNET TECHNOLOGY WHAT IS NETWORK ?           A network is a collection of computers and devices connected together via communications devices and transmission media. COMMUNICATION DEVICE AND TRANSMISSION MEDIA    What is communication media ? Communications device is any type of hardware capable of transmitting data, instructions, and information between a sending device and a receiving device. Types of communication devices Dial up modem   Wireless modem Network card Digital modem(SDN,DSL and cable modem) Wireless access point Router Switch Hub what is transmission media ? Materials or substances capable of carrying one or more signals in a communications channel. Two types of transmission media: 1.Physical transmission media/Guided media/Wired •Twisted-Pair Cable, Coaxial Cable, Fiber-Optic Cable. 2.Wireless

NETWORK ARCHITECTURE

What is Network Architecture ? ⇒Network architecture is the configuration of computers, devices and media on a network.   Also known as the design of a communication  network . It is a framework for the            specification of a  network's  physical components and their functional organization and    configuration, its operational principles and procedures, as well as data formats use. Categories of Network Architecture Peer-To-Peer network Client/Server network Different between Client-Server and Peer to Peer Network Architecture Category Client/Server Peer-to-peer Definition One or more computers act as a server, and the other computers on the network request services from the server. Each computer, called a peer, has equal responsibilities and capabilities, sharing haedware (such as printer), data, or information with other compu