Ethics on
Internet
Introduction
No matter how beneficial the use of internet
technology is, people who use it are still
exposed to risk and danger. As a matter of fact,
Crimes trough internet and many devices are
prevalent.
Introduction
This crimes involve Hacking, Cracking, Identity
theft, Sexual exploitation, defamation, and
bullying. This is the downside of internet that
can be attributed to the lack of knowledge and
unethical and unsafe process of using Internet
technology.
Introduction
But, if given enough information and proper
orientation, issues on safety and ethics can be
minimized or avoided.
Online Safety and Security
Online Safety
• Sometimes regarded as e-Safety or cyber safety.
• It refers to the maximization of internet users
knowledge and awareness of safety protocols, online
crimes, and security risks in the private property and
information which are connected to the use of
internet.
Online Safety and Security
Online Security
On the other hand, refers to as the rules that are
followed and the action that are taken to make sure
that online users and data privacy are not compromised
by cybercriminals.
Online Safety and Security
Online safety is a precautionary
measure that is set by the user
to ensure that his or her experience
does not harm him or her, an example
of this is a strong password.
Online Safety and Security
Online Security is designed by a
website and other internet
pages to ensure the safety
of people who uses or enters
their site.
Online Crimes
Online Crimes
• Online Crimes are violations that inflict harm
to people by Internet.
Online Crimes
• Online crimes come in many form:
Cyberbullying, Identity theft, phishing,
Plagiarism and Copy write Infringement.
• Under these crime’s, caution will be needed.
• Many website and pages already provides
information about how internet crimes work
and what are the circumstances for these
actions.
1.Cyberbullying
This case goes under Republic Act 10627 or the Anti-Bullying
Act of 2013, which defines bullying as any severe or repeated
act of a student that causes reasonable fear of physical harm
or emotional harm or damage to another students property,
which creates a hostile environment at school and materially
and substantially disrupting education process.
Cyberbullying
The section 3 of the implementing rule of RA 10627
states that cyberbullying covers social bullying aiming
to belittle another individual or group of individuals
mucking gender based matters and orientations, or
their identity.
Forms of Cyberbullying
Flaming- is an online fight using electronic
messages with angry and vulgar languages.
Forms of Cyberbullying
Harassment-is the act of repeatedly sending nasty,
mean, and insulting messages.
Forms of Cyberbullying
Denigration- is sending or posting gossip or rumor
about a person to damage his or her reputation and
friendship.
Forms of Cyberbullying
Impersonation- is when someone is pretending to be
someone and is selling products to get the person his
impersonating into trouble and ruin his or her reputation.
Forms of Cyberbullying
Outing- is the act of sharing someone's secret or
embarrassing information or images.
Forms of Cyberbullying
Trickery-is when someone is talking to a person to let him
reveal the persons secret or embarrassing information and
then shares the information online.
Forms of Cyberbullying
Exclusion-is when one is intentionally or cruelly
excluded from an online group.
Forms of Cyberbullying
Cyberstalking- is the act of repeated, intense
harassment and denigration that includes threats or
creates significant fear.
What to do
when Cyberbullying is observed
A. Inform a trusted person- it can either be your
parents, guardian, or your teacher.
B. Try not top instigate- when there are mean or cruel
actions against you, try not to fight back with your
emotions.
C. Block connections with the bully- cut all online
connections with the bully.
What to do
when Cyberbullying is observed
D. Always be aware- it is important that you are aware
of how people treat you online as doing so will help identify
weather these bullying perpetrators are starting to victimize
you.
E. Logout from online accounts- forgetting to logout
especially from online computers will give the bully the
opportunity to instigate the crime.
What to do
when Cyberbullying is observed
F. Be not a cyberbully- The golden rule “ do not do to
others what you do not want others to do to you” must
always be observed even in online world.
Dirty deeds done dirt cheep.
2.Identity theft
US Department of Justice defines “identity theft”
and “identity fraud” as “ all types of crime in
which someone wrongfully obtains and uses
other peoples personal data in some ways that
involves fraud or deception, typically for
economic gain.
Identity theft
These are situations where identity theft and
fraud may happen according to the US
Department of Justice:
A. When “ shoulder shuffling” is done by the criminal, as
you use online communication on public. This may be
because the criminal is watching you dial your number
or, he or she is trying to collect your information.
Identity theft
These are situations where identity theft and
fraud may happen according to the US
Department of Justice:
B. When you receive pre-approved credit cards
but discard them properly. Criminals may be able
to activate the trashed card at your expense
Identity theft
These are situations where identity theft and
fraud may happen according to the US
Department of Justice:
C. When you respond to spammed mails or
unsolicited emails which require you to input
personal data.
Tips on how to avoid
Identity theft and Fraud
A. Use a good password- a strong password
should be long, contains numbers and mixed
type of characters, and should either be
relevant or irrelevant.
B. Report identity theft- violation can be
reported to the right authorities that deals
with crime.
3.Phishing
Oxford Lexico defines phishing as, “ the
fraudulent practice of sending emails purporting
to be from reputable companies in order to
induce individuals to reveal personal
information's such as password or credit card
number.
Ways to be secured from Phishing
attacks
A. Be scrutinizing of the website your log in to.
B. Be cautious on giving information online.
C. Be alert with links sent from messages or
emails.
4.Plagiarism and Copyright
Infringement
According to the University of Oxford in UK,
Plagiarism is a means of presenting someone's
work or ideas as your own, with or without their
consent by incorporating it in your own work
without full acknowledgement.
Plagiarism and Copyright
Infringement
All published and Unpublished materials,
whether in manuscript, printed or in electronic
form, is covered under this definition.
Common Internet Security Threats
Many threats are
present in the
internet. Internet
security threats are
danger associated
with using internet.
Common Internet Security Threats
There are multitude of concept related to internet
threats, but here are the most common forms
identified by McAfee Corporation.
1. Malware- this is the shortened form of malicious
software. Some of the example of malware are
computer virus, worms, and dishonest spyware
Common Internet Security Threats
2. Computer Worms- These are programs that can
replicate themselves from one computer to another in
great volume and can spread themselves rapidly
without human intervention.
Common Internet Security Threats
3. Spam- Generally spam’s or unwanted messages
are harmless. They are usually junk mail’s sent in
your email, but there are times where they contain
links that puts you at risk.
Common Internet Security Threats
4. Phishing- These are scams that are created by
cyber criminal who intend to ask for private or elicit
information from their victims.
Internet Security Strategies
There is no one way to secure any
network or computer connected to
internet. Therefore, internet security must
require the combination of products and
technologies to give the outmost security
for the network and users.
Internet Security Strategies
1. Browser selection- Be sure that the
browser you are using is secured. The
browser employs different control settings as
well as security architecture to protect it and
the users from various cyber attack. Among
this trusted browsers are Mozilla Firefox,
Iridium, Microsoft Edge, Opera, Apple Safari,
Google Chrome, Brave, and Tor
Internet Security Strategies
2. Email Security- Try to establish a
multilayered security and comprehensive
email as this will significantly increase
protection against threats associated with
email usage. Being exposed to hacking,
worms, viruses, and unwarranted programs
through email may put you at risk.
Internet Security Strategies
3. Multifactor Authentication (MFA)- This is
a process in which access to
computer requires several
authentications. For instance,
before a person can transfer his or
her online fund from one bank
account to another, he or she is
required to login to an online
account that requires a password.
Internet Security Strategies
4. Firewalls- The first line of defense
among networks. These are security
tools that prevents unauthorized
access to a network. Thus, it has the
capacity to allow or deny access to a
system.
Online Ethics and Etiquettes
The previously discussed crimes, threats,
and violations caused many problems to the
one’s that got victimize. This can be linked
to the disrespecting and neglecting of
ethical principles which is expected from
internet users
Online Ethics and Etiquettes
Generally, ethics deals with what is good or
bad. It is a set of moral principle that can be
taken as a guiding of philosophy. According
to Markula Center for Applied Ethics of Santa
Clara University-
Online Ethics and Etiquettes
ethics is the analysis of the role that the
internet plays in what philosopher's call the
development of good life- the kind of life
that we want ourselves, for society overall,
the kind of people we want to be.
Ethical Questions and Issues about Internet
Ethics
1. Privacy- While internet users are required
to provide data for online transactions,
how secure would these data be that these
cannot be use against them?
Ethical Questions and Issues about Internet
Ethics
2. Big Data- Due to the big number of group
of individuals be it organizational,
governmental, or corporate, massive
amount of data are being collected,
managed, and maintained. These data’s are
important in making thoughtful decisions.
Ethical Questions and Issues about Internet
Ethics
3. Net Neutrality- This means that all
internet providers should give equal
treatment to all content that flow in their
network.
Ethical Questions and Issues about Internet
Ethics
4. Access to the Internet- If the use of
internet is a right, then, how do we view the
large portion of humanity with limited or no
access to it?
Online Etiquette’s
Considering Internet ethics as the guiding
principle in using the internet, specific
conduct must be observed.
1. Be always courteous.
Online Etiquette’s
2. Do not use foul Languages and incite
anger by writing in uppercase and overusing
the exclamation mark.
3. Appropriate your humor and avoid
sarcasm.
4. Do not share or post offensive materials.
Online Etiquette’s
5. Always acknowledge owners of ideas and
material used.
6. Try to be understanding to a maximum
tolerance. Be kind.
7. Respect others opinions. Deal with
everyone with humanitarian approach
Online Etiquette’s
To sum it all up, always be humanitarian to your
fellow netizens. Show love, respect, kindness,
compassion, and acceptance, but do not forget
what is just. Approach everyone in the best way’s
possible. Try first to put your feet in their shoes and
act accordingly. It always pays off to think before
you act.