Ethics on the Internet

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/22

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

23 Terms

1
New cards

ONLINE SAFETY

it refers to the maximization of internet user’s

knowledge and awareness of safety protocols,

online crimes and security risks.

2
New cards

ONLINE SECURITY

“Rules that are followed and the actions that

are taken to make sure that online users and

data privacy aren’t compromised by

cybercriminals”

3
New cards

Cyberbullying

“The Anti-Bullying Act of 2013”

✰ R.A. 10627

- any severe or repeated use by one or more

students of a written, verbal or electronic

expression

4
New cards

Flaming

Online fights using vulgar and aggressive language. Example: A heated argument erupts in a group chat, with one person hurling insults.

5
New cards

Harassment

Repeatedly sending mean and insulting messages. Example: A student keeps calling another names and making fun of their appearance.

-andrei

6
New cards

Denigration

Spreading false rumors or gossip to damage someone’s reputation. Example: A bully posts online that a classmate cheated on a test to ruin their credibility.

7
New cards

Impersonation

Pretending to be someone else to cause trouble. Example: A person creates a fake account of a classmate and posts rude comments.

8
New cards

Outing

Sharing someone’s private secrets, messages, or embarrassing images. Example: Posting a screenshot of a private chat without the person's consent.

9
New cards

Trickery

Manipulating someone into revealing secrets and then exposing them. Example: A person gains someone’s trust, then leaks their private information online.

10
New cards

Exclusion 

Intentionally leaving someone out of an online group or activity. Example: A group excludes a classmate from a game and mocks them for wanting to join.

11
New cards

Cyberstalking 

Repeated harassment that includes threats or instills fear. Example: A bully follows every online activity of their victim and sends threats daily.

12
New cards

How to avoid CYBERBULLYING

1. Inform a trusted person

2. Try not to instigate

3. Block connection with the bully

4. Always be aware

5. Logout from online accounts

6. Be not a cyberbully

13
New cards

What is identity theft?

involves crimes where someone wrongfully obtains and uses another person's personal data for fraud or deception, typically for financial gain.


14
New cards

Shoulder Surfing

criminal spies on you in public while you enter sensitive data like your phone PIN or credit card number. They may also listen to private conversations to gather personal details.


15
New cards

Improper Disposal of Pre-Approved Credit Cards

Criminals retrieve and activate improperly discarded pre-approved credit cards, using them fraudulently.

16
New cards

Responding to Spam Emails

Scammers trick you into providing personal information through fake emails, which they later use to steal your identity or hack your accounts.

17
New cards

Use a Good Password (Follow the SURP Test)

Strong: Long with random characters

Unique: Different from other passwords

Recent: Regularly updated

Practical: Easy for you to remember

18
New cards

What is phishing?


the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information such as passwords and credit card numbers.


19
New cards

What is Plagiarism?

is the act of using someone else’s ideas or work without proper acknowledgment. It can be intentional, reckless, or unintentional and applies to all published and unpublished materials, whether printed or electronic. Intentional or reckless plagiarism is considered a disciplinary offense.

20
New cards

What is Copyright Infringement?

occurs when a copyrighted work is used without permission, including reproduction, distribution, or performance.

21
New cards

Internet Security Strategies

to secure any network or computer you must

follow these steps...

● Browser Selection

● Email Security

● Multi Factor Authentication

● Firewalls

22
New cards

What is Internet Ethics?

Ethics involves moral principles guiding behavior. The Markkula Center for Applied Ethics describes internet ethics as the pursuit of a digital space that respects the rights and humanity of all users.

23
New cards

Key Ethical Issues on the Internet:

Privacy

How secure is the data users provide online?

Should governments or companies conduct surveillance without user consent?

Big Data

How is data collected, and from whom?

What are the ethical boundaries of data usage?

Net Neutrality

Should internet providers treat all content equally, or should they be allowed to prioritize certain content?

Access to the Internet

If internet access is a fundamental right, how do we address the digital divide?