This project has been funded with support from the European Commission. This web site and its contents reflects the views only of the authors, and the Commission cannot be held responsible for any use which may be made of the information contained therein.
Interacting through Digital Technologies
Netiquette is used to refer to the set of rules of general behavior on the Internet. The netiquette is nothing more than an adaptation of the rules of etiquette from the real world to the virtual world. The ethics you need to keep on the internet to make your life better. Although this label has evolved to become part of the rules of certain systems, it is quite common for rules of etiquette to be based on an "honor“ based system; that is, that the offender does not even receive a reprimand.
The term netiquette describes a protocol that should be used when making electronic "contact". This protocol has been driven by Internet users to provide greater security and humanity to the communication and thus fight network problems such as fraud, spam or rumors.
In Netiquette there are 10 basics rules and some recommendations, that are:
Rule No. 1: Politeness and common courtesy
Treat people with whom you communicate with respect, measure the words you say, because what you write can be filed and then used against you, generally speaking you shall treat others how we would like to be treated .
Rule No. 2: Behave like in real life
Be respectful and behave according to the laws of society and cyberspace. Even if in cyberspace possibilities of being discovered seem remote, this should not make us forget that there is a human being on the other side of the computer.
Rule No. 3: Know where you are in cyberspace
Before participating in an activity on the Internet, you should respect behaviors, customs and rules of the site.
Rule No. 4: Respect time and bandwidth of others
Before sending an information to a certain person, make sure that what you send is important, be brief and concise since time is precious, and it stops people from doing other activities.
Rule No. 5: Respect writing styles
Use good writing and pay attention to grammar when writing emails, be clear and consistent with the information transmitted so that it is not distorted. Be simple, nice, polite and avoid using offensive language because it can annoy someone.
Rule No. 6: Share the knowledge
Share your knowledge with other people in the network and cyberspace. Put yourself in the place of others and remember when you did not know anything that particular topic, that they are now asking you.
Rule No. 7: Keep disputes under control
When you want to be part of a conversation like in a forum, do it if you are sure of what you are going to write. Stay out of discussions that you do not master, be cautious when entering a discussion group.
Rule No. 8: Respect everybody’s privacy
If you share the computer with other members or users, respect their data. Do not read other people's emails, do not look at their files, etc. This is applicable both to users who use your computer, and to those who do not.
Rule No. 9: Do not abuse of the Know-how that you may have
Do not take advantage of the expertise you may have to access other people devices. Knowledge does not give you the right to take advantage of others.
Rule No. 10: Forgive others for their mistakes
Remember that we are all human and therefore, we can make mistakes. You should never judge someone for their failures. Help or make suggestions when you find an error and never show arrogance or laugh at it.
Recommendations For groups and mailing lists:
Recommendations For interactive services (IRC, instant messengers, chat rooms, discussion forums on websites
Recommendations for electronic correspondence [e-mail]:
Examples of behaviors contrary to the netiquette
If your device is important to you, then you must protect it, especially its data. Don’t forget that personal data such as passwords, email addresses, etc. are stored in your device.
The protection of your device depends only on us and there are some risk areas and recommendations that we are going to explore in this unit.
Risk areas:
Internet connection
Online activity
User level
Tips for protecting devices:
Tips for browsing on the net:
Surfing the Internet is an integral part of our lives, so we must avoid data robbing on the web. Here are some ways to avoid
Be anonymous
Strong password
Encrypted connection
Use programs for blocking unsolicited items on the page
Use Private mode
Log out
Recommendations for transactions:
Making transactions via the internet is fast and convenient, but it is not always a secure form of exchange, pay attention to the following:
Dos
Don'ts
Sharing is good and with digital technology, sharing is easy.
Richard Stallman
You will always find sharing useful. Imagine that you discovered a fantastic recipe and you want to send it to your child or friend. Maybe you went on holidays and you want to show photos to others.
Network gives you the chance to connect with other people. Chat and share information with them. There are many ways of sharing data through the Internet.
Let’s have a look at some interesting sharing options…
Sharing offline
CDs and DVDs
Flash memory
Sharing online
Via Social Media
Facebook – very popular around the world. Various types of content.
Twitter – Used for giving short information or present opinions.
Instagram – mainly intended to share photos and videos.
Snapchat – Used to share photos and videos. Unique feature is that this content disappears after some time
Via Email
Via Youtube
Via Google Drive
Via Cloud storages
Apart from Google Drive that we have already seen, other cloud based services are listed in the following slides.
Via Dropbox
Via WeTransfer
Via OneDrive
Via Mega
Other sharing solutions
There are also specific sharing platforms
Fixing key concepts...
Unit 1: Netiquette
Netiquette
Netiquette is used to refer to the set of rules of general behavior on the Internet. The netiquette is nothing more than an adaptation of the rules of etiquette from the real world to the virtual world. The ethics you need to keep on the internet to make your life better. Although this label has evolved to become part of the rules of certain systems, it is quite common for rules of etiquette to be based on an "honor“ based system; that is, that the offender does not even receive a reprimand.
The term netiquette describes a protocol that should be used when making electronic "contact". This protocol has been driven by Internet users to provide greater security and humanity to the communication and thus fight network problems such as fraud, spam or rumors.
In Netiquette there are 10 basics rules and some recommendations, that are:
Rule No. 1: Politeness and common courtesy
Treat people with whom you communicate with respect, measure the words you say, because what you write can be filed and then used against you, generally speaking you shall treat others how we would like to be treated .
Rule No. 2: Behave like in real life
Be respectful and behave according to the laws of society and cyberspace. Even if in cyberspace possibilities of being discovered seem remote, this should not make us forget that there is a human being on the other side of the computer.
Rule No. 3: Know where you are in cyberspace
Before participating in an activity on the Internet, you should respect behaviors, customs and rules of the site.
Rule No. 4: Respect time and bandwidth of others
Before sending an information to a certain person, make sure that what you send is important, be brief and concise since time is precious, and it stops people from doing other activities.
Rule No. 5: Respect writing styles
Use good writing and pay attention to grammar when writing emails, be clear and consistent with the information transmitted so that it is not distorted. Be simple, nice, polite and avoid using offensive language because it can annoy someone.
Rule No. 6: Share the knowledge
Share your knowledge with other people in the network and cyberspace. Put yourself in the place of others and remember when you did not know anything that particular topic, that they are now asking you.
Rule No. 7: Keep disputes under control
When you want to be part of a conversation like in a forum, do it if you are sure of what you are going to write. Stay out of discussions that you do not master, be cautious when entering a discussion group.
Rule No. 8: Respect everybody’s privacy
If you share the computer with other members or users, respect their data. Do not read other people's emails, do not look at their files, etc. This is applicable both to users who use your computer, and to those who do not.
Rule No. 9: Do not abuse of the Know-how that you may have
Do not take advantage of the expertise you may have to access other people devices. Knowledge does not give you the right to take advantage of others.
Rule No. 10: Forgive others for their mistakes
Remember that we are all human and therefore, we can make mistakes. You should never judge someone for their failures. Help or make suggestions when you find an error and never show arrogance or laugh at it.
Recommendations For groups and mailing lists:
Recommendations For interactive services (IRC, instant messengers, chat rooms, discussion forums on websites
Recommendations for electronic correspondence [e-mail]:
Examples of behaviors contrary to the netiquette
Unit 2: Safety on the net and tips for protecting devices
Safety on the net and tips for protecting devices
If your device is important to you, then you must protect it, especially its data. Don’t forget that personal data such as passwords, email addresses, etc. are stored in your device.
The protection of your device depends only on us and there are some risk areas and recommendations that we are going to explore in this unit.
Risk areas:
Internet connection
Online activity
User level
Tips for protecting devices:
Tips for browsing on the net:
Surfing the Internet is an integral part of our lives, so we must avoid data robbing on the web. Here are some ways to avoid
Be anonymous
Strong password
Encrypted connection
Use programs for blocking unsolicited items on the page
Use Private mode
Log out
Recommendations for transactions:
Making transactions via the internet is fast and convenient, but it is not always a secure form of exchange, pay attention to the following:
Dos
Don'ts
Unit 3: Sharing through digital technologies
Sharing through digital technologies
Sharing is good and with digital technology, sharing is easy.
Richard Stallman
You will always find sharing useful. Imagine that you discovered a fantastic recipe and you want to send it to your child or friend. Maybe you went on holidays and you want to show photos to others.
Network gives you the chance to connect with other people. Chat and share information with them. There are many ways of sharing data through the Internet.
Let’s have a look at some interesting sharing options…
Sharing offline
CDs and DVDs
Flash memory
Sharing online
Via Social Media
Facebook – very popular around the world. Various types of content.
Twitter – Used for giving short information or present opinions.
Instagram – mainly intended to share photos and videos.
Snapchat – Used to share photos and videos. Unique feature is that this content disappears after some time
Via Email
Via Youtube
Via Google Drive
Via Cloud storages
Apart from Google Drive that we have already seen, other cloud based services are listed in the following slides.
Via Dropbox
Via WeTransfer
Via OneDrive
Via Mega
Other sharing solutions
There are also specific sharing platforms