Updated:

Hunting Netiquette Violations Case Study

Exclusively available on Available only on IvyPanda® Made by Human No AI

Definition

Internet Netiquette is core values that must be observed by internet users in order to ensure that respect is enhanced among everyone. This involves respecting one’s privacy and ensuring that everyone makes use of polite language which does not harm others (Belani 115).

Internet netiquette should be observed to protect users from sites that can be harmful to their computers.

Flaming

An example of flaming is flame war which was considered from a roadmap carried out by Patrick Crispen in his daily workshop in internet.

This is where people use abusive language against others. In the road map various clear evidence of use of abusive words could be shown (“ROADMAP: FLAME WAR” par. 2).

Spamming

An example of spam message is- IT TRAINING TUITION SCHOLARSHIPS FOR COLLEGE FACULTY, STUDENTS AND STAFF.

This is a message attached to people’s mails without their consent. It carries misleading information which may lead people to making wrong decisions.

This happened where people received this article in their email addresses. This might have mislead many people in applying for the scholarship which never existed (“IT TRAINING TUITION SCHOLARSHIPS FOR COLLEGE FACULTY, STUDENTS AND STAFF” par. 1).

Plagiarism

An example of this violation is a word-for-word plagiarism. This is where one copies and pastes everything from the internet and presents as their original work.

Plagiarism is where people tend to copy other peoples ideas word after word. It denies original owners their rights to originality of their contents (“Examples of Plagiarism” par. 1).

Impersonation

An example of impersonation is where a man enters into a banking all posing to be a customer and on reaching into the banking all he turns to be a thug.

This means that a person carries themselves posing to be a completely different person.

This is dangerous because one can welcome evil people into their premises thinking that they are welcoming genuine customers (Belani 125).

Spidering

An example of this is where information is transformed by a system to mean something completely different.

Spidering is done by programmers with ill intent to confuse or tamper with information being communicated. This is harmful since people do not get the intended message in the right manner (“Simple Web Indexing System for Humans – Enhanced” par.3).

Security Violations

An example of this is where people hack into sites. For instance, people can hack into government sites and edit or obtain information without consent of government officials.

This violation can be harmful since people can use such information against the government (“INFOSGA INFOPAC Reference Guide, February 1997 Security Violations – Examples ” par. 1).

Works Cited

INFOSGA INFOPAC Reference Guide, February 1997 Security Violations – Examples 1997.Web.

Simple Web Indexing System for Humans – Enhanced 2008. Web.

Belani,Rohyt. “Basic Web Session Impersonation” Symantec. 26.2 (2010): 124-126. Web.

. 2010.

ROADMAP: FLAME WAR. 2006. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, July 19). Hunting Netiquette Violations. https://ivypanda.com/essays/hunting-netiquette-violations/

Work Cited

"Hunting Netiquette Violations." IvyPanda, 19 July 2022, ivypanda.com/essays/hunting-netiquette-violations/.

References

IvyPanda. (2022) 'Hunting Netiquette Violations'. 19 July.

References

IvyPanda. 2022. "Hunting Netiquette Violations." July 19, 2022. https://ivypanda.com/essays/hunting-netiquette-violations/.

1. IvyPanda. "Hunting Netiquette Violations." July 19, 2022. https://ivypanda.com/essays/hunting-netiquette-violations/.


Bibliography


IvyPanda. "Hunting Netiquette Violations." July 19, 2022. https://ivypanda.com/essays/hunting-netiquette-violations/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1