SlideShare une entreprise Scribd logo
1  sur  3
Internet Ethics and Rules
Last Updated on: Jan 04, 2016 08:38 PM
Ethics are a setof moral principles thatgovern an individual or a group on what is acceptable behaviour while using a
computer.Computer ethics is a setofmoral principles thatgovern the usage ofcomputers.One ofthe common issues
of computer ethics is violation of copyright issues.
Duplicating copyrighted content without the author’s approval, accessing personal information of others are some of
the examples that violate ethical principles.
Internet Ethics for everyone
Internet ethics means acceptable behaviour for using internet. We should be honest,respectthe rights and property
of others on the internet.
Acceptance
One has to accept that Internet is not a value free-zone .It means World Wide Web is a place where values are
considered in the broadestsense so we musttake care while shaping contentand services and we should recognize
that internet is not apart from universal society but it is a primary component of it.
Sensitivity to National and Local cultures
It belongs to all and there is no barrier of national and local cultures.It cannotbe subjectto one set of values like the
local TV channel or the local newspaper We have to accommodate multiplicity of usage.
While using e-Mail and chatting
Internet mustbe used for communication with familyand friends.Avoid chatting with strangers and forwarding e-mails
from unknown people /strangers.And we mustteach children about risks involved in chatting and forwarding e-mails
to strangers.
Pretending to be someone else
We mustnot use internetto fool others by pretending to be someone else.Hiding our own identityto fool others in the
Internet world is a crime and may also be a risk to others. It’s our responsibility to teach children the same.
Avoid Bad language
We mustnotuse rude or bad language while usinge-Mail,chatting,bloggingand socialnetworking,We need to respect
their views and should not criticize anyone on the internet and the same should be taught to children.
Hide personal information
We should teach children not to give personal details like home address, phone numbers, interests, passwords. No
photographs should be sentto strangers and theyshould be askedto hide their personal details from strangers because
it might be misused and shared with others without their knowledge.
While Downloading
Internet is used to listen and learn about music,Itis also used to watch videos and play games We mustnot use it to
download them or share copyrighted material.The same should be taughtto children,and they mustbe aware of the
importance of copyrights and issues of copyright.
Supervision
You should know whatchildren are doing on the internetand the sites they visit on the internet and should check with
whom they are communicating. Restrict them browsing inappropriate sites. Parental involvement is essential when a
child is using the internet in order to make him follow the rules.
Encourage children to use Internet
We mustencourage children,students and others to gain the knowledge from the internetand use itwisely. Internetis
a great tool where we can gather information which can be used for learning.
Access to Internet
The internetis a time-efficienttool for everyone that enlarges the possibilities for curriculum growth.Learning depends
on the ability to find relevant and reliable information quickly and easily, and to select, understand and assess that
information.Searching for information on the internet can help to develop these skills.Classroom exercises and take-
home assessmenttasks,where students are required to compare website content,are ideal for alerting students to the
requirements ofwriting for different audiences,the purpose ofparticular content, identifying and judging accuracyand
reliability.Since many sites adoptparticular views aboutissues,the internetis a useful tool for developing the skills of
distinguishing fact from opinion and exploring subjectivity and objectivity.
Ethical rules for computer users
Some of the rules that individuals should follow while using a computer are listed below:
 Do not use computers to harm other users.
 Do not use computers to steal others information.
 Do not access files without the permission of the owner.
 Do not copy copyrighted software without the author’s permission.
 Always respect copyright laws and policies.
 Respect the privacy of others, just as you expect the same from others.
 Do not use other user's computer resources without their permission.
 Use Internet ethically.
 Complain about illegal communication and activities, if found, to Internet service Providers and local law
enforcement authorities.
 Users are responsible for safeguarding their User Id and Passwords.They should notwrite them on paper or
anywhere else for remembrance.
 Users should not intentionally use the computers to retrieve or modify the information of others, which may
include password information, files, etc..
Scenarios
Scene 1
Ravi asked kishore if he could look atthe essaywritten by him.He said sure and didn’tthink much aboutit.After some
days their essays were verified by the class teacher who asked kishore to stay after class.The teacher pointed out
that their essays were similar and asked for an explanation.
So always teach and guide children not to copy content or information from internet or from classmates.
Scene 2
Vicky has steppedoutfrom the computer lab withoutloggingoff. Bob sits on Vicky’s computer, logins as Vicky, sends
false e-mail messages to a number of students and posts similar messages on the class newsgroup.
So teach children that they must never misuse others computers and e-mail IDs to harm others and defame them.

Contenu connexe

Tendances

Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sitesner1eje
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For EducatorsMaria Petropulos
 
Social Media Etiquette Presentation
Social Media Etiquette PresentationSocial Media Etiquette Presentation
Social Media Etiquette Presentationtkay1017
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety PresentationLJ Henshell
 
Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthDababrata Mondal
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime AwarenessSibesh Singh
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Moumita Chatterjee
 
Digital Etiquette
Digital Etiquette Digital Etiquette
Digital Etiquette EMCox02
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
 
Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 
Netiquette by Ankush Agrawal
Netiquette by Ankush AgrawalNetiquette by Ankush Agrawal
Netiquette by Ankush AgrawalAnkush Agrawal
 
Social Media and Teenagers
Social Media and TeenagersSocial Media and Teenagers
Social Media and TeenagersJennifer Holena
 
Netiquette
NetiquetteNetiquette
Netiquetteannekish
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber securitydivyanigarg2
 

Tendances (20)

Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sites
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
 
Social Media Etiquette Presentation
Social Media Etiquette PresentationSocial Media Etiquette Presentation
Social Media Etiquette Presentation
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
Erasmus+ group 2
Erasmus+ group 2Erasmus+ group 2
Erasmus+ group 2
 
Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on Youth
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Digital Etiquette
Digital Etiquette Digital Etiquette
Digital Etiquette
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Netiquette by Ankush Agrawal
Netiquette by Ankush AgrawalNetiquette by Ankush Agrawal
Netiquette by Ankush Agrawal
 
Social Media and Teenagers
Social Media and TeenagersSocial Media and Teenagers
Social Media and Teenagers
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
 

En vedette

Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesMichael Zimmer
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 

En vedette (6)

Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United States
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 

Similaire à Internet ethics and rules

ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Eskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ictEskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ictAnwar Jesus Esperida
 
Code of conduct alina mirela popa converted word
Code of conduct  alina mirela popa converted wordCode of conduct  alina mirela popa converted word
Code of conduct alina mirela popa converted wordAlis Popa
 
Internet safety and acceptable use policies
Internet safety and acceptable use policiesInternet safety and acceptable use policies
Internet safety and acceptable use policiesjac2015
 
Hannah dc keynote
Hannah dc keynoteHannah dc keynote
Hannah dc keynotetakahe2
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshiptakahe2
 
Hannah dc keynote
Hannah dc keynoteHannah dc keynote
Hannah dc keynotetakahe2
 
Digital Citizenship
Digital Citizenship Digital Citizenship
Digital Citizenship takahe2
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber pathProfsdetchana Murthy
 
Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethicallyLinda Long
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethicallyLinda Long
 
Tec207 -final presentation
Tec207 -final presentationTec207 -final presentation
Tec207 -final presentationSarah Sell
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07E Robertson
 

Similaire à Internet ethics and rules (20)

ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Lesson 3 ethical issues
Lesson 3   ethical issuesLesson 3   ethical issues
Lesson 3 ethical issues
 
Eskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ictEskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ict
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Code of conduct alina mirela popa converted word
Code of conduct  alina mirela popa converted wordCode of conduct  alina mirela popa converted word
Code of conduct alina mirela popa converted word
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Internet safety and acceptable use policies
Internet safety and acceptable use policiesInternet safety and acceptable use policies
Internet safety and acceptable use policies
 
Hannah dc keynote
Hannah dc keynoteHannah dc keynote
Hannah dc keynote
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Hannah dc keynote
Hannah dc keynoteHannah dc keynote
Hannah dc keynote
 
Digital Citizenship
Digital Citizenship Digital Citizenship
Digital Citizenship
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber path
 
Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethically
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethically
 
Tec207 -final presentation
Tec207 -final presentationTec207 -final presentation
Tec207 -final presentation
 
Cyber citizenship imen tekaya
Cyber citizenship imen tekayaCyber citizenship imen tekaya
Cyber citizenship imen tekaya
 
SOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptxSOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptx
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 

Dernier

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Dernier (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

Internet ethics and rules

  • 1. Internet Ethics and Rules Last Updated on: Jan 04, 2016 08:38 PM Ethics are a setof moral principles thatgovern an individual or a group on what is acceptable behaviour while using a computer.Computer ethics is a setofmoral principles thatgovern the usage ofcomputers.One ofthe common issues of computer ethics is violation of copyright issues. Duplicating copyrighted content without the author’s approval, accessing personal information of others are some of the examples that violate ethical principles. Internet Ethics for everyone Internet ethics means acceptable behaviour for using internet. We should be honest,respectthe rights and property of others on the internet. Acceptance One has to accept that Internet is not a value free-zone .It means World Wide Web is a place where values are considered in the broadestsense so we musttake care while shaping contentand services and we should recognize that internet is not apart from universal society but it is a primary component of it. Sensitivity to National and Local cultures It belongs to all and there is no barrier of national and local cultures.It cannotbe subjectto one set of values like the local TV channel or the local newspaper We have to accommodate multiplicity of usage. While using e-Mail and chatting Internet mustbe used for communication with familyand friends.Avoid chatting with strangers and forwarding e-mails from unknown people /strangers.And we mustteach children about risks involved in chatting and forwarding e-mails to strangers. Pretending to be someone else We mustnot use internetto fool others by pretending to be someone else.Hiding our own identityto fool others in the Internet world is a crime and may also be a risk to others. It’s our responsibility to teach children the same. Avoid Bad language
  • 2. We mustnotuse rude or bad language while usinge-Mail,chatting,bloggingand socialnetworking,We need to respect their views and should not criticize anyone on the internet and the same should be taught to children. Hide personal information We should teach children not to give personal details like home address, phone numbers, interests, passwords. No photographs should be sentto strangers and theyshould be askedto hide their personal details from strangers because it might be misused and shared with others without their knowledge. While Downloading Internet is used to listen and learn about music,Itis also used to watch videos and play games We mustnot use it to download them or share copyrighted material.The same should be taughtto children,and they mustbe aware of the importance of copyrights and issues of copyright. Supervision You should know whatchildren are doing on the internetand the sites they visit on the internet and should check with whom they are communicating. Restrict them browsing inappropriate sites. Parental involvement is essential when a child is using the internet in order to make him follow the rules. Encourage children to use Internet We mustencourage children,students and others to gain the knowledge from the internetand use itwisely. Internetis a great tool where we can gather information which can be used for learning. Access to Internet The internetis a time-efficienttool for everyone that enlarges the possibilities for curriculum growth.Learning depends on the ability to find relevant and reliable information quickly and easily, and to select, understand and assess that information.Searching for information on the internet can help to develop these skills.Classroom exercises and take- home assessmenttasks,where students are required to compare website content,are ideal for alerting students to the requirements ofwriting for different audiences,the purpose ofparticular content, identifying and judging accuracyand reliability.Since many sites adoptparticular views aboutissues,the internetis a useful tool for developing the skills of distinguishing fact from opinion and exploring subjectivity and objectivity. Ethical rules for computer users Some of the rules that individuals should follow while using a computer are listed below:
  • 3.  Do not use computers to harm other users.  Do not use computers to steal others information.  Do not access files without the permission of the owner.  Do not copy copyrighted software without the author’s permission.  Always respect copyright laws and policies.  Respect the privacy of others, just as you expect the same from others.  Do not use other user's computer resources without their permission.  Use Internet ethically.  Complain about illegal communication and activities, if found, to Internet service Providers and local law enforcement authorities.  Users are responsible for safeguarding their User Id and Passwords.They should notwrite them on paper or anywhere else for remembrance.  Users should not intentionally use the computers to retrieve or modify the information of others, which may include password information, files, etc.. Scenarios Scene 1 Ravi asked kishore if he could look atthe essaywritten by him.He said sure and didn’tthink much aboutit.After some days their essays were verified by the class teacher who asked kishore to stay after class.The teacher pointed out that their essays were similar and asked for an explanation. So always teach and guide children not to copy content or information from internet or from classmates. Scene 2 Vicky has steppedoutfrom the computer lab withoutloggingoff. Bob sits on Vicky’s computer, logins as Vicky, sends false e-mail messages to a number of students and posts similar messages on the class newsgroup. So teach children that they must never misuse others computers and e-mail IDs to harm others and defame them.