Digital Citizenship

Wednesday 11 November 2015

Digital Etiquette

10 Points of Netiquette

1.  When typing never write in all capital letters. People will assume you are shouting.
2. Never Plagiarize, stealing other peoples work is considered a crime if you use other peoples
      work, credit them on your reference page.
3.  Use proper quotes and always use the whole quote. Never quote out of context, or do selective
     quoting.
4.  Keep Personal information personal, do not gossip. Get facts first before telling stories.
5.  Be careful of copy write laws, do not still photos on the internet for your projects.
6.  Watch your language. No potty mouths.
7.  Be patient with internet newbies. Know that they are just learning like you did once upon a
     time.
8.  No spamming. Remember that spam is unwanted electronic messages or sending the same
     electronic message over and over. This can get you in a lot of trouble on some sites and as a
     general rule it just irritates everyone else.
9.  If you are using a header (such as in an email) make sure your content really pertains to the
     header. You must admit it would really stink if the header said something about football, for
     example, and the email was really about your newest and greatest business idea. Just stay on
     topic and the problem is solved.
10.  Avoid overuse of emoticons. You know… those cute little smiley faces. They really lose their
       cuteness when overused and tend to irritate people.

Penalties that apply for failing to meet this netiquettes 

Since the inception of the internet there were no consequences on what people do while they are online, but finally new legislation's are helping to correct this problem of bad behavior and or bullying while on the internet. People now may face  criminal prosecutions over the things they do while they are on the cyber space, or you may be even expelled from joining and participating in some online groups or websites.

How to enforce and manage etiquette in business

When running an organisation the first step would be to implement proper computer and internet usage policies where each user needs to sign off to indicate that they understand the implication of the policies. Another effective method would be to use firewall to restrict access to certain website which may be in contravention to the organizations IT policies. http://www.uticaod.com/article/20120907/blogs/309079938

No comments:

Post a Comment