SlideShare uma empresa Scribd logo
1 de 13
Netiquette

  "Netiquette" is network etiquette, the do's and
don'ts of online communication. Netiquette covers
 both common courtesy online and the informal
         "rules of the road" of cyberspace.
Introduction
What is Netiquette?

Simply stated, it's network etiquette --
that is, the etiquette of cyberspace.

“Etiquette” means “the forms required by good breeding or
prescribed by authority to be required in social or official
life.”

In other words, Netiquette is a set of rules for
behaving properly online.
Rule 1: Remember the Human
The golden rule: Do unto others as you'd have others do unto you. Imagine how
you'd feel if you were in the other person's shoes. Stand up for yourself, but try not
to hurt people's feelings.

Electronic communication lacks the facial expression, gestures and tone of voice to
convey your meaning. It’s easy to misinterpret meaning of words.

Would you say it to the person's face?
If the answer is no, rewrite and reread. Repeat the process till you feel sure that
you'd feel as comfortable saying these words to the live person as you do sending
them through cyberspace.

Remember, when you communicate through cyberspace your words are written.
Chances are they're stored somewhere. They can come back and haunt you. You
don't have to be engaged in criminal activity to want to be careful. Any message you
send could be saved or forwarded by its recipient. You have no control over where it
goes.
Rule 2: Adhere to real-life standards of
              behavior
 Standards of behavior may be different in some areas of cyberspace, but
 they are not lower than in real life.
 Be ethical.
 If you encounter an ethical dilemma in cyberspace, consult the code you
 follow in real life.
 If you use shareware, pay for it.
 Paying for shareware encourages more people to write shareware. The few
 dollars probably won't mean much to you, but they benefit all of
 cyberspace in the long run.
 Breaking the law is bad Netiquette.
 If you're tempted to do something that's illegal, chances are it's also bad
 Netiquette.
Rule 3: Know where you are in
                 cyberspace
Netiquette varies from domain to domain. What's perfectly
acceptable in one area may be dreadfully rude in another.

Netiquette is different in different places, so it's important
to know where you are.

Lurk before you leap
When you enter a domain of cyberspace that's new to you, take a look around.
Spend a while listening to the chat or reading the archives. Get a sense of how
the people who are already there act. Then go ahead and participate.
Rule 4: Respect other people's time and
               bandwidth
Bandwidth is the information-carrying capacity of the wires and channels that connect
everyone in cyberspace. It also refers to the storage capacity of a host system.

If you accidentally post the same note to the same newsgroup five times, you are
wasting both time (of the people who check each copy) and bandwidth (by sending
repetitive information over the wires and requiring it to be stored somewhere).

You are not the center of cyberspace. Don’t expect instant responses to all your
questions, and don't assume that all readers will agree with -- or care about -- your
passionate arguments.

Ensure your message is worth the time it takes to open it.

Before you copy people on your messages, ask yourself whether
they really need to know. If the answer is no, don't waste their time. If the answer is
maybe, think twice before you hit the send key.
Rule 5: Make yourself look good online

Take advantage of your anonymity. You won't be judged by
color, weight, age or dress sense. You will, however, be judged
by the quality of your writing. So spelling and grammar do
count.
Know what you're talking about and make sense. Pay
attention to the content of your writing. Ensure your notes are
clear and logical.
Be pleasant and polite. Avoid offensive language, and don't be
confrontational for the sake of confrontation.
If you must swear, think up creative alternatives.
Rule 6: Share expert knowledge
The strength of cyberspace is in its numbers. The Internet itself was
founded and grew because academics wanted to share information.
Don't be afraid to share what you know.

If you ask a question and anticipate a lot of answers, it’s customary
to request replies by email instead of to the group. Share the results
of your questions with others, so everyone benefits from the experts
who took the time to write to you.

If you’re an expert, or you've researched a topic that you think
would be of interest to others, write it up and post it. Sharing your
knowledge is fun. And it makes the world a better place.
Rule 7: Help keep flame wars under
              control
"Flaming" is what people do when they express a strongly held
opinion without holding back any emotion.

Netiquette does not forbid flaming. Flaming is a long-standing
network tradition (and Netiquette never messes with tradition).

Netiquette does forbid the perpetuation of flame wars that can
dominate the tone and destroy the camaraderie of a discussion
group.

While flame wars can initially be amusing, they’re an unfair
monopolization of bandwidth.
Rule 8: Respect other people's privacy

You’d never snoop through your colleagues' desk
drawers, so naturally you wouldn't read their email
either.


Failing to respect other people's privacy is not just bad
Netiquette. It could also cost you your job.
Rule 9: Don't abuse your power

Some people in cyberspace have more power than
others. There are wizards in MUDs (multi-user
dungeons), experts in every office, and system
administrators in every system.

Knowing more than others, or having more power than
they do, does not give you the right to take advantage of
them. For example, sysadmins should never read private
email.
Rule 10: Be forgiving of other people’s
               mistakes
Everyone was a newbie once.

When someone makes a mistake -- be kind about it. If it's a minor error,
you may not need to say anything. Even if you feel strongly about it,
think twice before reacting.

Having good manners yourself doesn't give you license to correct
everyone else.

If you inform someone of a mistake, point it out politely, and preferably
by private email rather than in public.

Give people the benefit of the doubt.
Resources

• http://www.networketiquette.net/
• http://www.albion.com/netiquette/
• http://www.livinginternet.com/i/ia_nq.
  htm
• http://www.netmanners.com/
• http://www.ietf.org/rfc/rfc1855.txt
• http://www.albury.net.au/new-
  users/netiquet.htm

Mais conteúdo relacionado

Mais procurados

Etiquette and manners of behavior
Etiquette and manners of behaviorEtiquette and manners of behavior
Etiquette and manners of behaviorGohar Sokhakyan
 
Netiquette
NetiquetteNetiquette
Netiquetteannekish
 
Assertiveness PowerPoint PPT Content Modern Sample
Assertiveness PowerPoint PPT Content Modern SampleAssertiveness PowerPoint PPT Content Modern Sample
Assertiveness PowerPoint PPT Content Modern SampleAndrew Schwartz
 
Basics of Etiquette
Basics of EtiquetteBasics of Etiquette
Basics of Etiquettefancyhue
 
Democratization of Technology: The New Normal - Asia Highlights
Democratization of Technology: The New Normal - Asia HighlightsDemocratization of Technology: The New Normal - Asia Highlights
Democratization of Technology: The New Normal - Asia HighlightsGwendolyn Regina
 
26 Disruptive & Technology Trends 2016 - 2018
26 Disruptive & Technology Trends 2016 - 201826 Disruptive & Technology Trends 2016 - 2018
26 Disruptive & Technology Trends 2016 - 2018Brian Solis
 
How to Improve Your Emotional intelligence
How to Improve Your Emotional intelligenceHow to Improve Your Emotional intelligence
How to Improve Your Emotional intelligenceRos (Boucher) Cardinal
 
Digital privacy
Digital privacyDigital privacy
Digital privacyAnna Adel
 
Netiquette by Ankush Agrawal
Netiquette by Ankush AgrawalNetiquette by Ankush Agrawal
Netiquette by Ankush AgrawalAnkush Agrawal
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Digital Etiquette
Digital Etiquette Digital Etiquette
Digital Etiquette EMCox02
 
Web Dictionary
Web DictionaryWeb Dictionary
Web DictionaryG.C Reddy
 

Mais procurados (20)

Etiquette and manners of behavior
Etiquette and manners of behaviorEtiquette and manners of behavior
Etiquette and manners of behavior
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Trade secret litigation
Trade secret litigationTrade secret litigation
Trade secret litigation
 
The 5 Secrets of Networking
The 5 Secrets of NetworkingThe 5 Secrets of Networking
The 5 Secrets of Networking
 
Assertiveness PowerPoint PPT Content Modern Sample
Assertiveness PowerPoint PPT Content Modern SampleAssertiveness PowerPoint PPT Content Modern Sample
Assertiveness PowerPoint PPT Content Modern Sample
 
Basics of Etiquette
Basics of EtiquetteBasics of Etiquette
Basics of Etiquette
 
Democratization of Technology: The New Normal - Asia Highlights
Democratization of Technology: The New Normal - Asia HighlightsDemocratization of Technology: The New Normal - Asia Highlights
Democratization of Technology: The New Normal - Asia Highlights
 
26 Disruptive & Technology Trends 2016 - 2018
26 Disruptive & Technology Trends 2016 - 201826 Disruptive & Technology Trends 2016 - 2018
26 Disruptive & Technology Trends 2016 - 2018
 
Essentials of Leadership and Meeting Etiquette
Essentials of Leadership and Meeting EtiquetteEssentials of Leadership and Meeting Etiquette
Essentials of Leadership and Meeting Etiquette
 
How to Improve Your Emotional intelligence
How to Improve Your Emotional intelligenceHow to Improve Your Emotional intelligence
How to Improve Your Emotional intelligence
 
Digital privacy
Digital privacyDigital privacy
Digital privacy
 
Netiquette by Ankush Agrawal
Netiquette by Ankush AgrawalNetiquette by Ankush Agrawal
Netiquette by Ankush Agrawal
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Digital Etiquette
Digital Etiquette Digital Etiquette
Digital Etiquette
 
Web Dictionary
Web DictionaryWeb Dictionary
Web Dictionary
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 

Semelhante a Netiquette mine

Presentation (2).pptx e-tech
Presentation (2).pptx e-techPresentation (2).pptx e-tech
Presentation (2).pptx e-techTrexie9
 
The 10 commandments of the common computer (1)
The 10 commandments of the common computer (1)The 10 commandments of the common computer (1)
The 10 commandments of the common computer (1)MudgeoTorso1091
 
CAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internetCAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internetHendrixAntonniAmante
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104Marvin Broñoso
 
Netiquette
NetiquetteNetiquette
Netiquettejcdmce
 
Media and Information Literacy Netiquette
Media and Information Literacy NetiquetteMedia and Information Literacy Netiquette
Media and Information Literacy NetiquetteJPAballe
 
Netiquette stassie
Netiquette stassieNetiquette stassie
Netiquette stassieJill Stassie
 
The essential rules of netiquette by Halina
The essential rules of netiquette by HalinaThe essential rules of netiquette by Halina
The essential rules of netiquette by HalinaSelf-employed
 
Netiquette Rules
Netiquette RulesNetiquette Rules
Netiquette RulesRaquelPG96
 
The 10 core rules of netiqutte
The 10 core rules of netiqutteThe 10 core rules of netiqutte
The 10 core rules of netiqutteMudgeoTorso1091
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of NetiquetteLeelet1121
 
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdfW3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdfCedLinc
 

Semelhante a Netiquette mine (20)

Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquettes.pptx
Netiquettes.pptxNetiquettes.pptx
Netiquettes.pptx
 
Presentation (2).pptx e-tech
Presentation (2).pptx e-techPresentation (2).pptx e-tech
Presentation (2).pptx e-tech
 
The 10 commandments of the common computer (1)
The 10 commandments of the common computer (1)The 10 commandments of the common computer (1)
The 10 commandments of the common computer (1)
 
CAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internetCAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internet
 
Netiquette.ppt
Netiquette.pptNetiquette.ppt
Netiquette.ppt
 
ETECH Q1 Wk2.pptx
ETECH Q1 Wk2.pptxETECH Q1 Wk2.pptx
ETECH Q1 Wk2.pptx
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104
 
INTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTEINTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTE
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Media and Information Literacy Netiquette
Media and Information Literacy NetiquetteMedia and Information Literacy Netiquette
Media and Information Literacy Netiquette
 
Netiquette stassie
Netiquette stassieNetiquette stassie
Netiquette stassie
 
Netiquettes
NetiquettesNetiquettes
Netiquettes
 
Net project
Net projectNet project
Net project
 
The essential rules of netiquette by Halina
The essential rules of netiquette by HalinaThe essential rules of netiquette by Halina
The essential rules of netiquette by Halina
 
Netiquette Rules
Netiquette RulesNetiquette Rules
Netiquette Rules
 
Teens on the net
Teens on the netTeens on the net
Teens on the net
 
The 10 core rules of netiqutte
The 10 core rules of netiqutteThe 10 core rules of netiqutte
The 10 core rules of netiqutte
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdfW3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
 

Mais de Ady Setiawan

Presentasi Usulan Maskot dan Slogan UNTAN
Presentasi Usulan Maskot dan Slogan UNTANPresentasi Usulan Maskot dan Slogan UNTAN
Presentasi Usulan Maskot dan Slogan UNTANAdy Setiawan
 
Konsep Sistem Desentralisasi Dalam Pendidikan
Konsep Sistem Desentralisasi Dalam PendidikanKonsep Sistem Desentralisasi Dalam Pendidikan
Konsep Sistem Desentralisasi Dalam PendidikanAdy Setiawan
 
Kepemimpinan Pendidikan
Kepemimpinan PendidikanKepemimpinan Pendidikan
Kepemimpinan PendidikanAdy Setiawan
 
Pelaksanaan Kurikulum Modifikasi di Sekolah Inklusif
Pelaksanaan Kurikulum Modifikasi di Sekolah InklusifPelaksanaan Kurikulum Modifikasi di Sekolah Inklusif
Pelaksanaan Kurikulum Modifikasi di Sekolah InklusifAdy Setiawan
 
Fiqih Penguatan Penyandang Disabilitas
Fiqih Penguatan Penyandang DisabilitasFiqih Penguatan Penyandang Disabilitas
Fiqih Penguatan Penyandang DisabilitasAdy Setiawan
 
Buku KH. Hasyim Asy'ari (Pendiri Nahdlatul Ulama)
Buku KH. Hasyim Asy'ari (Pendiri Nahdlatul Ulama)Buku KH. Hasyim Asy'ari (Pendiri Nahdlatul Ulama)
Buku KH. Hasyim Asy'ari (Pendiri Nahdlatul Ulama)Ady Setiawan
 
Pedoman Diklat Berjenjang Bagi Guru PAUD di Daerah 3T
Pedoman Diklat Berjenjang Bagi Guru PAUD di Daerah 3TPedoman Diklat Berjenjang Bagi Guru PAUD di Daerah 3T
Pedoman Diklat Berjenjang Bagi Guru PAUD di Daerah 3TAdy Setiawan
 
Kebijakan Pendidikan Kesetaraan Tahun 2018
Kebijakan Pendidikan Kesetaraan Tahun 2018Kebijakan Pendidikan Kesetaraan Tahun 2018
Kebijakan Pendidikan Kesetaraan Tahun 2018Ady Setiawan
 
Analisis Biaya Pendidikan
Analisis Biaya PendidikanAnalisis Biaya Pendidikan
Analisis Biaya PendidikanAdy Setiawan
 
Konsep Belajar dan Kinerja
Konsep Belajar dan KinerjaKonsep Belajar dan Kinerja
Konsep Belajar dan KinerjaAdy Setiawan
 
Kebijakan Pendidikan yang Unggul
Kebijakan Pendidikan yang UnggulKebijakan Pendidikan yang Unggul
Kebijakan Pendidikan yang UnggulAdy Setiawan
 
Wawancara sebagai Teknik Pengumpulan Data dalam Penelitian Kualitatif
Wawancara sebagai Teknik Pengumpulan Data dalam Penelitian KualitatifWawancara sebagai Teknik Pengumpulan Data dalam Penelitian Kualitatif
Wawancara sebagai Teknik Pengumpulan Data dalam Penelitian KualitatifAdy Setiawan
 
Promosi, Perpindahan, Demosi, dan PHK dalam Manajemen Sumber Daya Manusia Pen...
Promosi, Perpindahan, Demosi, dan PHK dalam Manajemen Sumber Daya Manusia Pen...Promosi, Perpindahan, Demosi, dan PHK dalam Manajemen Sumber Daya Manusia Pen...
Promosi, Perpindahan, Demosi, dan PHK dalam Manajemen Sumber Daya Manusia Pen...Ady Setiawan
 
Teori dan Fungsi Manajemen
Teori dan Fungsi ManajemenTeori dan Fungsi Manajemen
Teori dan Fungsi ManajemenAdy Setiawan
 
Menyusun Instrumen Penelitian Kuantitatif
Menyusun Instrumen Penelitian KuantitatifMenyusun Instrumen Penelitian Kuantitatif
Menyusun Instrumen Penelitian KuantitatifAdy Setiawan
 
e-Book Senarai Kearifan Gontory Karya Ust. Ahmad Suharto
e-Book Senarai Kearifan Gontory Karya Ust. Ahmad Suhartoe-Book Senarai Kearifan Gontory Karya Ust. Ahmad Suharto
e-Book Senarai Kearifan Gontory Karya Ust. Ahmad SuhartoAdy Setiawan
 
Pendekatan Cost Benefit, Cost Effectiveness, dan Sarpras dalam Perencanaan Pe...
Pendekatan Cost Benefit, Cost Effectiveness, dan Sarpras dalam Perencanaan Pe...Pendekatan Cost Benefit, Cost Effectiveness, dan Sarpras dalam Perencanaan Pe...
Pendekatan Cost Benefit, Cost Effectiveness, dan Sarpras dalam Perencanaan Pe...Ady Setiawan
 
Pedoman Umum Ejaan Bahasa Indonesia (PUEBI)
Pedoman Umum Ejaan Bahasa Indonesia (PUEBI)Pedoman Umum Ejaan Bahasa Indonesia (PUEBI)
Pedoman Umum Ejaan Bahasa Indonesia (PUEBI)Ady Setiawan
 
Analisis Biaya dan Pengeluaran dalam Perencanaan Pendidikan
Analisis Biaya dan Pengeluaran dalam Perencanaan PendidikanAnalisis Biaya dan Pengeluaran dalam Perencanaan Pendidikan
Analisis Biaya dan Pengeluaran dalam Perencanaan PendidikanAdy Setiawan
 
Menentukan Sumber Data Penelitian (Populasi dan Sampel)
Menentukan Sumber Data Penelitian (Populasi dan Sampel)Menentukan Sumber Data Penelitian (Populasi dan Sampel)
Menentukan Sumber Data Penelitian (Populasi dan Sampel)Ady Setiawan
 

Mais de Ady Setiawan (20)

Presentasi Usulan Maskot dan Slogan UNTAN
Presentasi Usulan Maskot dan Slogan UNTANPresentasi Usulan Maskot dan Slogan UNTAN
Presentasi Usulan Maskot dan Slogan UNTAN
 
Konsep Sistem Desentralisasi Dalam Pendidikan
Konsep Sistem Desentralisasi Dalam PendidikanKonsep Sistem Desentralisasi Dalam Pendidikan
Konsep Sistem Desentralisasi Dalam Pendidikan
 
Kepemimpinan Pendidikan
Kepemimpinan PendidikanKepemimpinan Pendidikan
Kepemimpinan Pendidikan
 
Pelaksanaan Kurikulum Modifikasi di Sekolah Inklusif
Pelaksanaan Kurikulum Modifikasi di Sekolah InklusifPelaksanaan Kurikulum Modifikasi di Sekolah Inklusif
Pelaksanaan Kurikulum Modifikasi di Sekolah Inklusif
 
Fiqih Penguatan Penyandang Disabilitas
Fiqih Penguatan Penyandang DisabilitasFiqih Penguatan Penyandang Disabilitas
Fiqih Penguatan Penyandang Disabilitas
 
Buku KH. Hasyim Asy'ari (Pendiri Nahdlatul Ulama)
Buku KH. Hasyim Asy'ari (Pendiri Nahdlatul Ulama)Buku KH. Hasyim Asy'ari (Pendiri Nahdlatul Ulama)
Buku KH. Hasyim Asy'ari (Pendiri Nahdlatul Ulama)
 
Pedoman Diklat Berjenjang Bagi Guru PAUD di Daerah 3T
Pedoman Diklat Berjenjang Bagi Guru PAUD di Daerah 3TPedoman Diklat Berjenjang Bagi Guru PAUD di Daerah 3T
Pedoman Diklat Berjenjang Bagi Guru PAUD di Daerah 3T
 
Kebijakan Pendidikan Kesetaraan Tahun 2018
Kebijakan Pendidikan Kesetaraan Tahun 2018Kebijakan Pendidikan Kesetaraan Tahun 2018
Kebijakan Pendidikan Kesetaraan Tahun 2018
 
Analisis Biaya Pendidikan
Analisis Biaya PendidikanAnalisis Biaya Pendidikan
Analisis Biaya Pendidikan
 
Konsep Belajar dan Kinerja
Konsep Belajar dan KinerjaKonsep Belajar dan Kinerja
Konsep Belajar dan Kinerja
 
Kebijakan Pendidikan yang Unggul
Kebijakan Pendidikan yang UnggulKebijakan Pendidikan yang Unggul
Kebijakan Pendidikan yang Unggul
 
Wawancara sebagai Teknik Pengumpulan Data dalam Penelitian Kualitatif
Wawancara sebagai Teknik Pengumpulan Data dalam Penelitian KualitatifWawancara sebagai Teknik Pengumpulan Data dalam Penelitian Kualitatif
Wawancara sebagai Teknik Pengumpulan Data dalam Penelitian Kualitatif
 
Promosi, Perpindahan, Demosi, dan PHK dalam Manajemen Sumber Daya Manusia Pen...
Promosi, Perpindahan, Demosi, dan PHK dalam Manajemen Sumber Daya Manusia Pen...Promosi, Perpindahan, Demosi, dan PHK dalam Manajemen Sumber Daya Manusia Pen...
Promosi, Perpindahan, Demosi, dan PHK dalam Manajemen Sumber Daya Manusia Pen...
 
Teori dan Fungsi Manajemen
Teori dan Fungsi ManajemenTeori dan Fungsi Manajemen
Teori dan Fungsi Manajemen
 
Menyusun Instrumen Penelitian Kuantitatif
Menyusun Instrumen Penelitian KuantitatifMenyusun Instrumen Penelitian Kuantitatif
Menyusun Instrumen Penelitian Kuantitatif
 
e-Book Senarai Kearifan Gontory Karya Ust. Ahmad Suharto
e-Book Senarai Kearifan Gontory Karya Ust. Ahmad Suhartoe-Book Senarai Kearifan Gontory Karya Ust. Ahmad Suharto
e-Book Senarai Kearifan Gontory Karya Ust. Ahmad Suharto
 
Pendekatan Cost Benefit, Cost Effectiveness, dan Sarpras dalam Perencanaan Pe...
Pendekatan Cost Benefit, Cost Effectiveness, dan Sarpras dalam Perencanaan Pe...Pendekatan Cost Benefit, Cost Effectiveness, dan Sarpras dalam Perencanaan Pe...
Pendekatan Cost Benefit, Cost Effectiveness, dan Sarpras dalam Perencanaan Pe...
 
Pedoman Umum Ejaan Bahasa Indonesia (PUEBI)
Pedoman Umum Ejaan Bahasa Indonesia (PUEBI)Pedoman Umum Ejaan Bahasa Indonesia (PUEBI)
Pedoman Umum Ejaan Bahasa Indonesia (PUEBI)
 
Analisis Biaya dan Pengeluaran dalam Perencanaan Pendidikan
Analisis Biaya dan Pengeluaran dalam Perencanaan PendidikanAnalisis Biaya dan Pengeluaran dalam Perencanaan Pendidikan
Analisis Biaya dan Pengeluaran dalam Perencanaan Pendidikan
 
Menentukan Sumber Data Penelitian (Populasi dan Sampel)
Menentukan Sumber Data Penelitian (Populasi dan Sampel)Menentukan Sumber Data Penelitian (Populasi dan Sampel)
Menentukan Sumber Data Penelitian (Populasi dan Sampel)
 

Último

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Netiquette mine

  • 1. Netiquette "Netiquette" is network etiquette, the do's and don'ts of online communication. Netiquette covers both common courtesy online and the informal "rules of the road" of cyberspace.
  • 2. Introduction What is Netiquette? Simply stated, it's network etiquette -- that is, the etiquette of cyberspace. “Etiquette” means “the forms required by good breeding or prescribed by authority to be required in social or official life.” In other words, Netiquette is a set of rules for behaving properly online.
  • 3. Rule 1: Remember the Human The golden rule: Do unto others as you'd have others do unto you. Imagine how you'd feel if you were in the other person's shoes. Stand up for yourself, but try not to hurt people's feelings. Electronic communication lacks the facial expression, gestures and tone of voice to convey your meaning. It’s easy to misinterpret meaning of words. Would you say it to the person's face? If the answer is no, rewrite and reread. Repeat the process till you feel sure that you'd feel as comfortable saying these words to the live person as you do sending them through cyberspace. Remember, when you communicate through cyberspace your words are written. Chances are they're stored somewhere. They can come back and haunt you. You don't have to be engaged in criminal activity to want to be careful. Any message you send could be saved or forwarded by its recipient. You have no control over where it goes.
  • 4. Rule 2: Adhere to real-life standards of behavior Standards of behavior may be different in some areas of cyberspace, but they are not lower than in real life. Be ethical. If you encounter an ethical dilemma in cyberspace, consult the code you follow in real life. If you use shareware, pay for it. Paying for shareware encourages more people to write shareware. The few dollars probably won't mean much to you, but they benefit all of cyberspace in the long run. Breaking the law is bad Netiquette. If you're tempted to do something that's illegal, chances are it's also bad Netiquette.
  • 5. Rule 3: Know where you are in cyberspace Netiquette varies from domain to domain. What's perfectly acceptable in one area may be dreadfully rude in another. Netiquette is different in different places, so it's important to know where you are. Lurk before you leap When you enter a domain of cyberspace that's new to you, take a look around. Spend a while listening to the chat or reading the archives. Get a sense of how the people who are already there act. Then go ahead and participate.
  • 6. Rule 4: Respect other people's time and bandwidth Bandwidth is the information-carrying capacity of the wires and channels that connect everyone in cyberspace. It also refers to the storage capacity of a host system. If you accidentally post the same note to the same newsgroup five times, you are wasting both time (of the people who check each copy) and bandwidth (by sending repetitive information over the wires and requiring it to be stored somewhere). You are not the center of cyberspace. Don’t expect instant responses to all your questions, and don't assume that all readers will agree with -- or care about -- your passionate arguments. Ensure your message is worth the time it takes to open it. Before you copy people on your messages, ask yourself whether they really need to know. If the answer is no, don't waste their time. If the answer is maybe, think twice before you hit the send key.
  • 7. Rule 5: Make yourself look good online Take advantage of your anonymity. You won't be judged by color, weight, age or dress sense. You will, however, be judged by the quality of your writing. So spelling and grammar do count. Know what you're talking about and make sense. Pay attention to the content of your writing. Ensure your notes are clear and logical. Be pleasant and polite. Avoid offensive language, and don't be confrontational for the sake of confrontation. If you must swear, think up creative alternatives.
  • 8. Rule 6: Share expert knowledge The strength of cyberspace is in its numbers. The Internet itself was founded and grew because academics wanted to share information. Don't be afraid to share what you know. If you ask a question and anticipate a lot of answers, it’s customary to request replies by email instead of to the group. Share the results of your questions with others, so everyone benefits from the experts who took the time to write to you. If you’re an expert, or you've researched a topic that you think would be of interest to others, write it up and post it. Sharing your knowledge is fun. And it makes the world a better place.
  • 9. Rule 7: Help keep flame wars under control "Flaming" is what people do when they express a strongly held opinion without holding back any emotion. Netiquette does not forbid flaming. Flaming is a long-standing network tradition (and Netiquette never messes with tradition). Netiquette does forbid the perpetuation of flame wars that can dominate the tone and destroy the camaraderie of a discussion group. While flame wars can initially be amusing, they’re an unfair monopolization of bandwidth.
  • 10. Rule 8: Respect other people's privacy You’d never snoop through your colleagues' desk drawers, so naturally you wouldn't read their email either. Failing to respect other people's privacy is not just bad Netiquette. It could also cost you your job.
  • 11. Rule 9: Don't abuse your power Some people in cyberspace have more power than others. There are wizards in MUDs (multi-user dungeons), experts in every office, and system administrators in every system. Knowing more than others, or having more power than they do, does not give you the right to take advantage of them. For example, sysadmins should never read private email.
  • 12. Rule 10: Be forgiving of other people’s mistakes Everyone was a newbie once. When someone makes a mistake -- be kind about it. If it's a minor error, you may not need to say anything. Even if you feel strongly about it, think twice before reacting. Having good manners yourself doesn't give you license to correct everyone else. If you inform someone of a mistake, point it out politely, and preferably by private email rather than in public. Give people the benefit of the doubt.
  • 13. Resources • http://www.networketiquette.net/ • http://www.albion.com/netiquette/ • http://www.livinginternet.com/i/ia_nq. htm • http://www.netmanners.com/ • http://www.ietf.org/rfc/rfc1855.txt • http://www.albury.net.au/new- users/netiquet.htm