SlideShare une entreprise Scribd logo
1  sur  12
Online Ethics
and Etiquette
PREPARED BY: JESSAMEN I. TINO
Netiquette
-term used to describe proper etiquette
and rules for online behavior on the
internet.
-the word netiquette is formed from the
words etiquette and net.
• Etiquette-proper requirements for
social behavior.
• Net- from the word internet
• Netizen- refers to the person who is a
member or a part of the online
community.
Some key points to keep in
mind to maintain good
conduct over the Internet:
 Recognize that your cyber avatar, or
your online representation , is not
another world but an extension of
your personality and an extension of
the existing society that you are part
of.
You should apply the values and
conduct learned since childhood in the
online extension of our society.
 Keep in mind that there are laws
existing in our society and on the Web.
 Keep in mind that there are differences
among the individuals you will interact
with and the individuals who will read
your published contents.
 Everything published on the World
Wide Web should be considered as
copyrighted or owned by another
individual.
Think before you send.
Don’t send messages that could be
misinterpreted as threatening or
hurtful.
Follow the conventions of writing
when sending formal emails.
Respect others right to privacy.
BIG IDEA!
KEEP SAFE ONLINE
AND
THINK BEFORE YOU
CLICK
Don’t forget
your netiquette!
Thank You
And
God Bless!

Contenu connexe

Tendances

Empowerment Technology - Basic Web Design Principles and Elements
Empowerment Technology - Basic Web Design Principles and ElementsEmpowerment Technology - Basic Web Design Principles and Elements
Empowerment Technology - Basic Web Design Principles and ElementsLany Lyn Magdaraog
 
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEAlminaVelasco
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SJuvywen
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Jesus Rances
 
Contextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsContextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsAngelito Quiambao
 
Online Systems, Functions, and Platforms
Online Systems, Functions, and PlatformsOnline Systems, Functions, and Platforms
Online Systems, Functions, and PlatformsMaria Eloisa Blanza
 
Imaging and Design for Online Environment
Imaging and Design for Online EnvironmentImaging and Design for Online Environment
Imaging and Design for Online EnvironmentAngelito Quiambao
 
Advanced Presentation Skills - Empowerment Technologies
Advanced Presentation Skills - Empowerment TechnologiesAdvanced Presentation Skills - Empowerment Technologies
Advanced Presentation Skills - Empowerment TechnologiesMark Jhon Oxillo
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security Arah Louise
 
Empowerment Technologies - Introduction and the Nature of ICT
Empowerment Technologies - Introduction and the Nature of ICTEmpowerment Technologies - Introduction and the Nature of ICT
Empowerment Technologies - Introduction and the Nature of ICTJuan Miguel Palero
 
Lesson 4- Developing ict content for specific purposes
Lesson 4- Developing ict content for specific purposesLesson 4- Developing ict content for specific purposes
Lesson 4- Developing ict content for specific purposesJuvywen
 
Managing and sustaining ict projects
Managing and sustaining ict projectsManaging and sustaining ict projects
Managing and sustaining ict projectsAubrey Mae Antonio
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfBryanSmile
 
Media and Information Languages - Media and Information Literacy (MIL)
Media and Information Languages - Media and Information Literacy (MIL)Media and Information Languages - Media and Information Literacy (MIL)
Media and Information Languages - Media and Information Literacy (MIL)Mark Jhon Oxillo
 

Tendances (20)

9 Interactive Multimedia
9 Interactive Multimedia9 Interactive Multimedia
9 Interactive Multimedia
 
Empowerment Technology - Basic Web Design Principles and Elements
Empowerment Technology - Basic Web Design Principles and ElementsEmpowerment Technology - Basic Web Design Principles and Elements
Empowerment Technology - Basic Web Design Principles and Elements
 
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1S
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3
 
Contextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsContextualized Online Search and Research Skills
Contextualized Online Search and Research Skills
 
Online Systems, Functions, and Platforms
Online Systems, Functions, and PlatformsOnline Systems, Functions, and Platforms
Online Systems, Functions, and Platforms
 
Imaging and Design for Online Environment
Imaging and Design for Online EnvironmentImaging and Design for Online Environment
Imaging and Design for Online Environment
 
Empowerment Technology - Learning Content
Empowerment Technology -  Learning ContentEmpowerment Technology -  Learning Content
Empowerment Technology - Learning Content
 
Advanced Presentation Skills - Empowerment Technologies
Advanced Presentation Skills - Empowerment TechnologiesAdvanced Presentation Skills - Empowerment Technologies
Advanced Presentation Skills - Empowerment Technologies
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Empowerment Technologies - Introduction and the Nature of ICT
Empowerment Technologies - Introduction and the Nature of ICTEmpowerment Technologies - Introduction and the Nature of ICT
Empowerment Technologies - Introduction and the Nature of ICT
 
Pagbasa Week 1.pptx
Pagbasa Week 1.pptxPagbasa Week 1.pptx
Pagbasa Week 1.pptx
 
Lesson 4- Developing ict content for specific purposes
Lesson 4- Developing ict content for specific purposesLesson 4- Developing ict content for specific purposes
Lesson 4- Developing ict content for specific purposes
 
Managing and sustaining ict projects
Managing and sustaining ict projectsManaging and sustaining ict projects
Managing and sustaining ict projects
 
Empowerment Technology
Empowerment TechnologyEmpowerment Technology
Empowerment Technology
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
 
Media and Information Languages - Media and Information Literacy (MIL)
Media and Information Languages - Media and Information Literacy (MIL)Media and Information Languages - Media and Information Literacy (MIL)
Media and Information Languages - Media and Information Literacy (MIL)
 

En vedette

Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and EtiquetteLea Rodriguez
 
Usage of ICT in daily life
Usage of ICT in daily lifeUsage of ICT in daily life
Usage of ICT in daily lifepanitiaict
 
Anti bullying ra 10627 final ping
Anti bullying ra 10627 final pingAnti bullying ra 10627 final ping
Anti bullying ra 10627 final pingXFactor Umitz
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson
 
Netiquette Rules
Netiquette RulesNetiquette Rules
Netiquette RulesRaquelPG96
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guidemjtheman
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethicsJohnlery Guzman
 
Lesson 1: Introduction to Information and Communication Technology
Lesson 1: Introduction to Information and Communication TechnologyLesson 1: Introduction to Information and Communication Technology
Lesson 1: Introduction to Information and Communication TechnologyLea Rodriguez
 
Netiquette
NetiquetteNetiquette
Netiquettepafafo
 
Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Maria Eloisa Blanza
 

En vedette (15)

Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and Etiquette
 
Usage Of Ict In Every Day Life
Usage Of Ict In Every Day LifeUsage Of Ict In Every Day Life
Usage Of Ict In Every Day Life
 
Usage of ICT in daily life
Usage of ICT in daily lifeUsage of ICT in daily life
Usage of ICT in daily life
 
bulliying
bulliyingbulliying
bulliying
 
Ethics & Etiquette Online
Ethics & Etiquette OnlineEthics & Etiquette Online
Ethics & Etiquette Online
 
Anti bullying ra 10627 final ping
Anti bullying ra 10627 final pingAnti bullying ra 10627 final ping
Anti bullying ra 10627 final ping
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
Netiquette Rules
Netiquette RulesNetiquette Rules
Netiquette Rules
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
 
Lesson 1: Introduction to Information and Communication Technology
Lesson 1: Introduction to Information and Communication TechnologyLesson 1: Introduction to Information and Communication Technology
Lesson 1: Introduction to Information and Communication Technology
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)
 
Malware
MalwareMalware
Malware
 

Similaire à Online Ethics and Etiquette

Internet and online ethics & etiquette
Internet and online ethics & etiquetteInternet and online ethics & etiquette
Internet and online ethics & etiquetteEILLEN IVY PORTUGUEZ
 
Netizenship and Netiqutte in Online Communities.pptx
Netizenship and Netiqutte in Online Communities.pptxNetizenship and Netiqutte in Online Communities.pptx
Netizenship and Netiqutte in Online Communities.pptxinspirolorainnenicol
 
Netizenship and Netiqutte in Online Communities.pptx
Netizenship and Netiqutte in Online Communities.pptxNetizenship and Netiqutte in Online Communities.pptx
Netizenship and Netiqutte in Online Communities.pptxinspirolorainnenicol
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxCatherineBagaan
 
Ethicsincyberspace (3)
Ethicsincyberspace (3)Ethicsincyberspace (3)
Ethicsincyberspace (3)Maria Obaidi
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rulesMazni Salleh
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional EthicsFaraz Ahmed
 
Netizenship and Netiquette in Online Communities.pptx
Netizenship and Netiquette in Online Communities.pptxNetizenship and Netiquette in Online Communities.pptx
Netizenship and Netiquette in Online Communities.pptxGabrielDeLeonNuez
 
Email and Net Etiquette
Email and Net EtiquetteEmail and Net Etiquette
Email and Net EtiquetteSanu Subham
 
Biz miz io2 content for module 3
Biz miz io2 content for module 3Biz miz io2 content for module 3
Biz miz io2 content for module 3EmanuelePristera
 
Com 6 u1 L2 Observing netiquette
Com 6 u1 L2  Observing netiquetteCom 6 u1 L2  Observing netiquette
Com 6 u1 L2 Observing netiquetteJason Ruelo
 
Lesson 2 Netizenship and Netiquette in Online Communities
Lesson 2 Netizenship and Netiquette in Online CommunitiesLesson 2 Netizenship and Netiquette in Online Communities
Lesson 2 Netizenship and Netiquette in Online CommunitiesBadayosKarenJoyD
 
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdfW3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdfCedLinc
 
Cyber citizenship
Cyber citizenshipCyber citizenship
Cyber citizenshipkaeschliman
 
Netiquette
NetiquetteNetiquette
NetiquetteGlory
 
Responsible Digital Citizenship
Responsible Digital CitizenshipResponsible Digital Citizenship
Responsible Digital CitizenshipAlex Noudelman
 
ICT code of ethics
ICT code of ethicsICT code of ethics
ICT code of ethicsJunaid Qadir
 
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...ijtsrd
 

Similaire à Online Ethics and Etiquette (20)

Internet and online ethics & etiquette
Internet and online ethics & etiquetteInternet and online ethics & etiquette
Internet and online ethics & etiquette
 
Netizenship and Netiqutte in Online Communities.pptx
Netizenship and Netiqutte in Online Communities.pptxNetizenship and Netiqutte in Online Communities.pptx
Netizenship and Netiqutte in Online Communities.pptx
 
Netizenship and Netiqutte in Online Communities.pptx
Netizenship and Netiqutte in Online Communities.pptxNetizenship and Netiqutte in Online Communities.pptx
Netizenship and Netiqutte in Online Communities.pptx
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
Ethicsincyberspace (3)
Ethicsincyberspace (3)Ethicsincyberspace (3)
Ethicsincyberspace (3)
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional Ethics
 
Netizenship and Netiquette in Online Communities.pptx
Netizenship and Netiquette in Online Communities.pptxNetizenship and Netiquette in Online Communities.pptx
Netizenship and Netiquette in Online Communities.pptx
 
Email and Net Etiquette
Email and Net EtiquetteEmail and Net Etiquette
Email and Net Etiquette
 
P.p lect1-
P.p lect1-P.p lect1-
P.p lect1-
 
Biz miz io2 content for module 3
Biz miz io2 content for module 3Biz miz io2 content for module 3
Biz miz io2 content for module 3
 
Com 6 u1 L2 Observing netiquette
Com 6 u1 L2  Observing netiquetteCom 6 u1 L2  Observing netiquette
Com 6 u1 L2 Observing netiquette
 
Lesson 2 Netizenship and Netiquette in Online Communities
Lesson 2 Netizenship and Netiquette in Online CommunitiesLesson 2 Netizenship and Netiquette in Online Communities
Lesson 2 Netizenship and Netiquette in Online Communities
 
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdfW3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
 
Cyber citizenship
Cyber citizenshipCyber citizenship
Cyber citizenship
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Responsible Digital Citizenship
Responsible Digital CitizenshipResponsible Digital Citizenship
Responsible Digital Citizenship
 
ICT code of ethics
ICT code of ethicsICT code of ethics
ICT code of ethics
 
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
 

Dernier

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Dernier (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

Online Ethics and Etiquette

  • 2. Netiquette -term used to describe proper etiquette and rules for online behavior on the internet. -the word netiquette is formed from the words etiquette and net.
  • 3. • Etiquette-proper requirements for social behavior. • Net- from the word internet • Netizen- refers to the person who is a member or a part of the online community.
  • 4. Some key points to keep in mind to maintain good conduct over the Internet:
  • 5.  Recognize that your cyber avatar, or your online representation , is not another world but an extension of your personality and an extension of the existing society that you are part of.
  • 6. You should apply the values and conduct learned since childhood in the online extension of our society.  Keep in mind that there are laws existing in our society and on the Web.
  • 7.  Keep in mind that there are differences among the individuals you will interact with and the individuals who will read your published contents.  Everything published on the World Wide Web should be considered as copyrighted or owned by another individual.
  • 8. Think before you send. Don’t send messages that could be misinterpreted as threatening or hurtful. Follow the conventions of writing when sending formal emails. Respect others right to privacy.
  • 10. KEEP SAFE ONLINE AND THINK BEFORE YOU CLICK