The Concept of Internet Etiquette (Netiquette) Presentation

Exclusively available on IvyPanda Available only on IvyPanda

Internet etiquette (Netiquette)

Internet etiquette (Netiquette) are established practices whose main purpose is to make the internet experience pleasant and suitable to all people. It is mainly concerned with issues to do with courtesy in communication over the internet (Miller 3).

We will write a custom essay on your topic a custom Presentation on The Concept of Internet Etiquette (Netiquette)
808 writers online

Internet etiquette (Netiquette)

Netiquette Violation

Netiquette violation involves misbehavior or fraudulent behavior among people in the cyber space. It is the unacceptable behavior concerning internet communication and usage (McLaughlin and & Smith 90-11).

There are six main netiquette violation. These include flaming,spamming,plagiarism,impersonation,spidering and security violation.

Netiquette Violation

Flaming

A flame is a message intended to abuse another person through rude ,insulting or offensive language. Flaming is found to all kind of electronic communication. It may be found in social networks such as facebook, instant messaging, emails etc.

Example of flaming includes the conversation between Judd Apatow and Mark Brazil (Harper’s Magazine par. 10)

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

These emails contain flames because Mark brazil sends angry messages to Apatow accusing him of stealing his ideas in the past. The email messages are very unfriendly and insulting in some instances.

Flaming

Spamming

Spamming involves sending an email meant for a single recipient to many other individuals.

It may involve a junk email send to individuals advertising something.

Example of spamming include the one sent in December 2000 about ‘IT training. tuition scholarships for college faculty, students and staff” (MIT par. 2)

This is a spam because it is addressed to many individuals, who were not meant to receive the email.

Spamming

Remember! This is just a sample
You can get your custom paper by one of our expert writers

Plagiarism

This mainly deals with purchasing papers or already done assignments and essays from online sources.

Plagiarism is a wide concept that involve borrowing an idea of another person or making another person’s ideas look like your own.

It may be as a result of incorrectly acknowledging the paper obtained from the online sources.

Examples of plagiarism can be seen in the following site (K-State Honor & Integrity System par. 9 )

In this site there are various form of plagiarism including, word for word plagiarism and improper paraphrasing.

Plagiarism

Impersonation

This is when people present themselves in the internet in a way that doesn’t really reflect them properly.

It happens when a person uses an identity of another person and involves in communication using real names of another person.

We will write
a custom essay
specifically for you
Get your first paper with
15% OFF

For example a student may present him/herself as a lecturer.

An example of impersonation is demonstrated by (Krawetz par.1). This is impersonation because people used resumes of others to get employment. However, it was later found that they don’t have the experience indicated in the resume.

Impersonation

Spidering

This occurs when the key search engines ‘spider’ to dig around all websites in the process of creating their databases.

It is also referred to as web crawling.

A spider becomes spidering when the search engine aims at downloading pages and keeping them temporarily.

An example of spidering includes that of perl program to spider web servers. (Swish-e par. 2). This program is an example of spidering because it aims at crawling into various web servers.

Spidering

Security Violations

This involve engaging in activities that may compromise the security of the system you are using. Such activities may include hacking websites, sending viruses etc.

It involves breaching security regulation and procedures.

Security violation is demonstrate in (HowtoNetwork.net par. 4).

This is a security violation because it aims at restricting port security. This may compromise with the system security.

Security Violations

The potential harms of these violations

  • Spam emails may infringe trademarks.
  • Some spam emails contain pornographic contents which are harmful.
  • Spam emails are always deceptive.
  • Plagiarism may harm the plagiarist’s reputation.
  • Legal actions may be taken against plagiarists.
  • Students may be expelled from school due to plagiarism.
  • Spidering is harmful since it breaches the privacy of websites.
  • Impersonation can make one to be jailed or to pay a fine of up to $ 1000.
  • Impersonation makes individuals to loose their reputation.
  • It also shames the individuals who have been impersonated.
  • Impersonation may cause losses to educational and businesses opportunities.

The potential harms of these violations

Works cited

Harper’s Magazine. Harper’s Magazine. 2002. Web.

HowtoNetwork.net. switchport port-security violation. 2012. Web.

Krawetz, Nael. Online Impersonations: No Validation Required. 2007. Web.

K-State Honor & Integrity System . K-State Honor & Integrity System . 2006. Web.

McLaughlin, Osborne and Smith, Bernard. Standards of conduct . Thousand Oaks, CA: Sage, Usenet. In Cyber society, ed. S. Jones, 90-111. 1995. Print.

Miller, Sum. E-Mail Etiquette: Do’s, don’ts, and disaster tales from People magazine’s internet manners expert. New York: Warner Books, 2001.Print.

MIT. Recent examples of spam that’s been sent to addresses at MIT. 2001. Web.

Swish-e. Swish-e. 2009. Web.

Print
Need an custom research paper on The Concept of Internet Etiquette (Netiquette) written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2022, June 27). The Concept of Internet Etiquette (Netiquette). https://ivypanda.com/essays/the-concept-of-internet-etiquette-netiquette/

Work Cited

"The Concept of Internet Etiquette (Netiquette)." IvyPanda, 27 June 2022, ivypanda.com/essays/the-concept-of-internet-etiquette-netiquette/.

References

IvyPanda. (2022) 'The Concept of Internet Etiquette (Netiquette)'. 27 June.

References

IvyPanda. 2022. "The Concept of Internet Etiquette (Netiquette)." June 27, 2022. https://ivypanda.com/essays/the-concept-of-internet-etiquette-netiquette/.

1. IvyPanda. "The Concept of Internet Etiquette (Netiquette)." June 27, 2022. https://ivypanda.com/essays/the-concept-of-internet-etiquette-netiquette/.


Bibliography


IvyPanda. "The Concept of Internet Etiquette (Netiquette)." June 27, 2022. https://ivypanda.com/essays/the-concept-of-internet-etiquette-netiquette/.

Powered by CiteTotal, free essay citation creator
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1