The Concept of Internet Etiquette (Netiquette) Presentation

Exclusively available on Available only on IvyPanda®
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

Internet etiquette (Netiquette)

Internet etiquette (Netiquette) are established practices whose main purpose is to make the internet experience pleasant and suitable to all people. It is mainly concerned with issues to do with courtesy in communication over the internet (Miller 3).

Internet etiquette (Netiquette)

Netiquette Violation

Netiquette violation involves misbehavior or fraudulent behavior among people in the cyber space. It is the unacceptable behavior concerning internet communication and usage (McLaughlin and & Smith 90-11).

There are six main netiquette violation. These include flaming,spamming,plagiarism,impersonation,spidering and security violation.

Netiquette Violation

Flaming

A flame is a message intended to abuse another person through rude ,insulting or offensive language. Flaming is found to all kind of electronic communication. It may be found in social networks such as facebook, instant messaging, emails etc.

Example of flaming includes the conversation between Judd Apatow and Mark Brazil (Harper’s Magazine par. 10)

These emails contain flames because Mark brazil sends angry messages to Apatow accusing him of stealing his ideas in the past. The email messages are very unfriendly and insulting in some instances.

Flaming

Spamming

Spamming involves sending an email meant for a single recipient to many other individuals.

It may involve a junk email send to individuals advertising something.

Example of spamming include the one sent in December 2000 about ‘IT training. tuition scholarships for college faculty, students and staff” (MIT par. 2)

This is a spam because it is addressed to many individuals, who were not meant to receive the email.

Spamming

Plagiarism

This mainly deals with purchasing papers or already done assignments and essays from online sources.

Plagiarism is a wide concept that involve borrowing an idea of another person or making another person’s ideas look like your own.

It may be as a result of incorrectly acknowledging the paper obtained from the online sources.

Examples of plagiarism can be seen in the following site (K-State Honor & Integrity System par. 9 )

In this site there are various form of plagiarism including, word for word plagiarism and improper paraphrasing.

Plagiarism

Impersonation

This is when people present themselves in the internet in a way that doesn’t really reflect them properly.

It happens when a person uses an identity of another person and involves in communication using real names of another person.

For example a student may present him/herself as a lecturer.

An example of impersonation is demonstrated by (Krawetz par.1). This is impersonation because people used resumes of others to get employment. However, it was later found that they don’t have the experience indicated in the resume.

Impersonation

Spidering

This occurs when the key search engines ‘spider’ to dig around all websites in the process of creating their databases.

It is also referred to as web crawling.

A spider becomes spidering when the search engine aims at downloading pages and keeping them temporarily.

An example of spidering includes that of perl program to spider web servers. (Swish-e par. 2). This program is an example of spidering because it aims at crawling into various web servers.

Spidering

Security Violations

This involve engaging in activities that may compromise the security of the system you are using. Such activities may include hacking websites, sending viruses etc.

It involves breaching security regulation and procedures.

Security violation is demonstrate in (HowtoNetwork.net par. 4).

This is a security violation because it aims at restricting port security. This may compromise with the system security.

Security Violations

The potential harms of these violations

  • Spam emails may infringe trademarks.
  • Some spam emails contain pornographic contents which are harmful.
  • Spam emails are always deceptive.
  • Plagiarism may harm the plagiarist’s reputation.
  • Legal actions may be taken against plagiarists.
  • Students may be expelled from school due to plagiarism.
  • Spidering is harmful since it breaches the privacy of websites.
  • Impersonation can make one to be jailed or to pay a fine of up to $ 1000.
  • Impersonation makes individuals to loose their reputation.
  • It also shames the individuals who have been impersonated.
  • Impersonation may cause losses to educational and businesses opportunities.

The potential harms of these violations

Works cited

Harper’s Magazine. Harper’s Magazine. 2002. Web.

HowtoNetwork.net. switchport port-security violation. 2012. Web.

Krawetz, Nael. Online Impersonations: No Validation Required. 2007. Web.

K-State Honor & Integrity System . K-State Honor & Integrity System . 2006. Web.

McLaughlin, Osborne and Smith, Bernard. Standards of conduct . Thousand Oaks, CA: Sage, Usenet. In Cyber society, ed. S. Jones, 90-111. 1995. Print.

Miller, Sum. E-Mail Etiquette: Do’s, don’ts, and disaster tales from People magazine’s internet manners expert. New York: Warner Books, 2001.Print.

MIT. Recent examples of spam that’s been sent to addresses at MIT. 2001. Web.

Swish-e. Swish-e. 2009. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, June 27). The Concept of Internet Etiquette (Netiquette). https://ivypanda.com/essays/the-concept-of-internet-etiquette-netiquette/

Work Cited

"The Concept of Internet Etiquette (Netiquette)." IvyPanda, 27 June 2022, ivypanda.com/essays/the-concept-of-internet-etiquette-netiquette/.

References

IvyPanda. (2022) 'The Concept of Internet Etiquette (Netiquette)'. 27 June.

References

IvyPanda. 2022. "The Concept of Internet Etiquette (Netiquette)." June 27, 2022. https://ivypanda.com/essays/the-concept-of-internet-etiquette-netiquette/.

1. IvyPanda. "The Concept of Internet Etiquette (Netiquette)." June 27, 2022. https://ivypanda.com/essays/the-concept-of-internet-etiquette-netiquette/.


Bibliography


IvyPanda. "The Concept of Internet Etiquette (Netiquette)." June 27, 2022. https://ivypanda.com/essays/the-concept-of-internet-etiquette-netiquette/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
1 / 1