Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
10 views54 pages

Ethics On Internet

The document discusses the ethical implications and safety concerns associated with internet usage, highlighting various online crimes such as cyberbullying, identity theft, and phishing. It emphasizes the importance of online safety protocols and ethical behavior to mitigate risks and protect users' data. Additionally, it outlines strategies for internet security and promotes respectful online etiquette.

Uploaded by

marklodor99
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views54 pages

Ethics On Internet

The document discusses the ethical implications and safety concerns associated with internet usage, highlighting various online crimes such as cyberbullying, identity theft, and phishing. It emphasizes the importance of online safety protocols and ethical behavior to mitigate risks and protect users' data. Additionally, it outlines strategies for internet security and promotes respectful online etiquette.

Uploaded by

marklodor99
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 54

Ethics on

Internet
Introduction

No matter how beneficial the use of internet


technology is, people who use it are still
exposed to risk and danger. As a matter of fact,
Crimes trough internet and many devices are
prevalent.
Introduction

This crimes involve Hacking, Cracking, Identity


theft, Sexual exploitation, defamation, and
bullying. This is the downside of internet that
can be attributed to the lack of knowledge and
unethical and unsafe process of using Internet
technology.
Introduction

But, if given enough information and proper


orientation, issues on safety and ethics can be
minimized or avoided.
Online Safety and Security
Online Safety
• Sometimes regarded as e-Safety or cyber safety.
• It refers to the maximization of internet users
knowledge and awareness of safety protocols, online
crimes, and security risks in the private property and
information which are connected to the use of
internet.
Online Safety and Security
Online Security
On the other hand, refers to as the rules that are
followed and the action that are taken to make sure
that online users and data privacy are not compromised
by cybercriminals.
Online Safety and Security
Online safety is a precautionary
measure that is set by the user
to ensure that his or her experience
does not harm him or her, an example
of this is a strong password.
Online Safety and Security
Online Security is designed by a
website and other internet
pages to ensure the safety
of people who uses or enters
their site.
Online Crimes
Online Crimes
• Online Crimes are violations that inflict harm
to people by Internet.
Online Crimes
• Online crimes come in many form:
Cyberbullying, Identity theft, phishing,
Plagiarism and Copy write Infringement.
• Under these crime’s, caution will be needed.
• Many website and pages already provides
information about how internet crimes work
and what are the circumstances for these
actions.
1.Cyberbullying

This case goes under Republic Act 10627 or the Anti-Bullying


Act of 2013, which defines bullying as any severe or repeated
act of a student that causes reasonable fear of physical harm
or emotional harm or damage to another students property,
which creates a hostile environment at school and materially
and substantially disrupting education process.
Cyberbullying

The section 3 of the implementing rule of RA 10627


states that cyberbullying covers social bullying aiming
to belittle another individual or group of individuals
mucking gender based matters and orientations, or
their identity.
Forms of Cyberbullying

Flaming- is an online fight using electronic


messages with angry and vulgar languages.
Forms of Cyberbullying

Harassment-is the act of repeatedly sending nasty,


mean, and insulting messages.
Forms of Cyberbullying

Denigration- is sending or posting gossip or rumor


about a person to damage his or her reputation and
friendship.
Forms of Cyberbullying

Impersonation- is when someone is pretending to be


someone and is selling products to get the person his
impersonating into trouble and ruin his or her reputation.
Forms of Cyberbullying

Outing- is the act of sharing someone's secret or


embarrassing information or images.
Forms of Cyberbullying

Trickery-is when someone is talking to a person to let him


reveal the persons secret or embarrassing information and
then shares the information online.
Forms of Cyberbullying

Exclusion-is when one is intentionally or cruelly


excluded from an online group.
Forms of Cyberbullying

Cyberstalking- is the act of repeated, intense


harassment and denigration that includes threats or
creates significant fear.
What to do
when Cyberbullying is observed

A. Inform a trusted person- it can either be your


parents, guardian, or your teacher.
B. Try not top instigate- when there are mean or cruel
actions against you, try not to fight back with your
emotions.
C. Block connections with the bully- cut all online
connections with the bully.
What to do
when Cyberbullying is observed

D. Always be aware- it is important that you are aware


of how people treat you online as doing so will help identify
weather these bullying perpetrators are starting to victimize
you.
E. Logout from online accounts- forgetting to logout
especially from online computers will give the bully the
opportunity to instigate the crime.
What to do
when Cyberbullying is observed

F. Be not a cyberbully- The golden rule “ do not do to


others what you do not want others to do to you” must
always be observed even in online world.

Dirty deeds done dirt cheep.


2.Identity theft

US Department of Justice defines “identity theft”


and “identity fraud” as “ all types of crime in
which someone wrongfully obtains and uses
other peoples personal data in some ways that
involves fraud or deception, typically for
economic gain.
Identity theft

These are situations where identity theft and


fraud may happen according to the US
Department of Justice:
A. When “ shoulder shuffling” is done by the criminal, as
you use online communication on public. This may be
because the criminal is watching you dial your number
or, he or she is trying to collect your information.
Identity theft

These are situations where identity theft and


fraud may happen according to the US
Department of Justice:
B. When you receive pre-approved credit cards
but discard them properly. Criminals may be able
to activate the trashed card at your expense
Identity theft

These are situations where identity theft and


fraud may happen according to the US
Department of Justice:
C. When you respond to spammed mails or
unsolicited emails which require you to input
personal data.
Tips on how to avoid
Identity theft and Fraud

A. Use a good password- a strong password


should be long, contains numbers and mixed
type of characters, and should either be
relevant or irrelevant.
B. Report identity theft- violation can be
reported to the right authorities that deals
with crime.
3.Phishing
Oxford Lexico defines phishing as, “ the
fraudulent practice of sending emails purporting
to be from reputable companies in order to
induce individuals to reveal personal
information's such as password or credit card
number.
Ways to be secured from Phishing
attacks

A. Be scrutinizing of the website your log in to.


B. Be cautious on giving information online.
C. Be alert with links sent from messages or
emails.
4.Plagiarism and Copyright
Infringement

According to the University of Oxford in UK,


Plagiarism is a means of presenting someone's
work or ideas as your own, with or without their
consent by incorporating it in your own work
without full acknowledgement.
Plagiarism and Copyright
Infringement

All published and Unpublished materials,


whether in manuscript, printed or in electronic
form, is covered under this definition.
Common Internet Security Threats

Many threats are


present in the
internet. Internet
security threats are
danger associated
with using internet.
Common Internet Security Threats

There are multitude of concept related to internet


threats, but here are the most common forms
identified by McAfee Corporation.

1. Malware- this is the shortened form of malicious


software. Some of the example of malware are
computer virus, worms, and dishonest spyware
Common Internet Security Threats

2. Computer Worms- These are programs that can


replicate themselves from one computer to another in
great volume and can spread themselves rapidly
without human intervention.
Common Internet Security Threats

3. Spam- Generally spam’s or unwanted messages


are harmless. They are usually junk mail’s sent in
your email, but there are times where they contain
links that puts you at risk.
Common Internet Security Threats

4. Phishing- These are scams that are created by


cyber criminal who intend to ask for private or elicit
information from their victims.
Internet Security Strategies

There is no one way to secure any


network or computer connected to
internet. Therefore, internet security must
require the combination of products and
technologies to give the outmost security
for the network and users.
Internet Security Strategies
1. Browser selection- Be sure that the
browser you are using is secured. The
browser employs different control settings as
well as security architecture to protect it and
the users from various cyber attack. Among
this trusted browsers are Mozilla Firefox,
Iridium, Microsoft Edge, Opera, Apple Safari,
Google Chrome, Brave, and Tor
Internet Security Strategies
2. Email Security- Try to establish a
multilayered security and comprehensive
email as this will significantly increase
protection against threats associated with
email usage. Being exposed to hacking,
worms, viruses, and unwarranted programs
through email may put you at risk.
Internet Security Strategies
3. Multifactor Authentication (MFA)- This is
a process in which access to
computer requires several
authentications. For instance,
before a person can transfer his or
her online fund from one bank
account to another, he or she is
required to login to an online
account that requires a password.
Internet Security Strategies
4. Firewalls- The first line of defense
among networks. These are security
tools that prevents unauthorized
access to a network. Thus, it has the
capacity to allow or deny access to a
system.
Online Ethics and Etiquettes

The previously discussed crimes, threats,


and violations caused many problems to the
one’s that got victimize. This can be linked
to the disrespecting and neglecting of
ethical principles which is expected from
internet users
Online Ethics and Etiquettes

Generally, ethics deals with what is good or


bad. It is a set of moral principle that can be
taken as a guiding of philosophy. According
to Markula Center for Applied Ethics of Santa
Clara University-
Online Ethics and Etiquettes

ethics is the analysis of the role that the


internet plays in what philosopher's call the
development of good life- the kind of life
that we want ourselves, for society overall,
the kind of people we want to be.
Ethical Questions and Issues about Internet
Ethics

1. Privacy- While internet users are required


to provide data for online transactions,
how secure would these data be that these
cannot be use against them?
Ethical Questions and Issues about Internet
Ethics

2. Big Data- Due to the big number of group


of individuals be it organizational,
governmental, or corporate, massive
amount of data are being collected,
managed, and maintained. These data’s are
important in making thoughtful decisions.
Ethical Questions and Issues about Internet
Ethics

3. Net Neutrality- This means that all


internet providers should give equal
treatment to all content that flow in their
network.
Ethical Questions and Issues about Internet
Ethics

4. Access to the Internet- If the use of


internet is a right, then, how do we view the
large portion of humanity with limited or no
access to it?
Online Etiquette’s

Considering Internet ethics as the guiding


principle in using the internet, specific
conduct must be observed.
1. Be always courteous.
Online Etiquette’s

2. Do not use foul Languages and incite


anger by writing in uppercase and overusing
the exclamation mark.
3. Appropriate your humor and avoid
sarcasm.
4. Do not share or post offensive materials.
Online Etiquette’s

5. Always acknowledge owners of ideas and


material used.
6. Try to be understanding to a maximum
tolerance. Be kind.
7. Respect others opinions. Deal with
everyone with humanitarian approach
Online Etiquette’s
To sum it all up, always be humanitarian to your
fellow netizens. Show love, respect, kindness,
compassion, and acceptance, but do not forget
what is just. Approach everyone in the best way’s
possible. Try first to put your feet in their shoes and
act accordingly. It always pays off to think before
you act.

You might also like