FOLLOW US     
           
    + 34 951 16 49 00    
Spanish Italian English
ERASMUS+

Acquisition of Key Competences for Economic and Social Sustainability

Interacting through digital technologies
Descargar    Play Audio
Unit 1: Netiquette

Netiquette

Netiquette is used to refer to the set of rules of general behavior on the Internet. The netiquette is nothing more than an adaptation of the rules of etiquette from the real world to the virtual world. The ethics you need to keep on the internet to make your life better. Although this label has evolved to become part of the rules of certain systems, it is quite common for rules of etiquette to be based on an "honor“ based system; that is, that the offender does not even receive a reprimand.

The term netiquette describes a protocol that should be used when making electronic "contact". This protocol has been driven by Internet users to provide greater security and humanity to the communication and thus fight network problems such as fraud, spam or rumors.

In Netiquette there are 10 basics rules and some recommendations, that are:

Rule No. 1: Politeness and common courtesy

Treat people with whom you communicate with respect, measure the words you say, because what you write can be filed and then used against you, generally speaking you shall treat others how we would like to be treated .

Rule No. 2: Behave like in real life

Be respectful and behave according to the laws of society and cyberspace. Even if in cyberspace possibilities of being discovered seem remote, this should not make us forget that there is a human being on the other side of the computer.

Rule No. 3: Know where you are in cyberspace

Before participating in an activity on the Internet, you should respect behaviors, customs and rules of the site.

Rule No. 4: Respect time and bandwidth of others

Before sending an information to a certain person, make sure that what you send is important, be brief and concise since time is precious, and it stops people from doing other activities.   

Rule No. 5: Respect writing styles

Use good writing and pay attention to grammar when writing emails, be clear and consistent with the information transmitted so that it is not distorted. Be simple, nice, polite and avoid using offensive language because it can annoy someone.

Rule No. 6: Share the knowledge

Share your knowledge with other people in the network and cyberspace. Put yourself in the place of others and remember when you did not know anything that particular topic, that they are now asking you.

Rule No. 7: Keep disputes under control

When you want to be part of a conversation like in a forum, do it if you are sure of what you are going to write. Stay out of discussions that you do not master, be cautious when entering a discussion group.

Rule No. 8: Respect everybody’s privacy

If you share the computer with other members or users, respect their data. Do not read other people's emails, do not look at their files, etc. This is applicable both to users who use your computer, and to those who do not.

Rule No. 9: Do not abuse of the Know-how that you may have

Do not take advantage of the expertise you may have to access other people devices. Knowledge does not give you the right to take advantage of others.

Rule No. 10: Forgive others for their mistakes

Remember that we are all human and therefore, we can make mistakes. You should never judge someone for their failures. Help or make suggestions when you find an error and never show arrogance or laugh at it.

Recommendations For groups and mailing lists:

Don’t write profanity;
Don’t do spamming (including sending unwanted links to websites);
Don’t send the so-called chains of happiness;
Read the FAQ list before asking the question;
Avoid provoking discussions or arguments;

Recommendations For interactive services (IRC, instant messengers, chat rooms, discussion forums on websites

Use the "Search" function in forums, before creating a new thread (on the subject / problem discussed above);
Read the FAQ of a given channel / forum / chat and comply with the detailed rules contained therein;
Avoid contacting people who do not want to be contacted.

Recommendations for electronic correspondence [e-mail]:

Stick to a thread in electronic correspondence or to cite an e-mail (in the absence of such an option in the mailbox);
Add a thread of correspondence underneath (mainly regarding e-mail);
Signature should not have more than four lines (no line dedicated to the delimiter is included in its length);
Always use meaningful and targeted subjects in your emailing correspondence.

Examples of behaviors contrary to the netiquette

Trolling: Antisocial behavior characteristic of forums and not only. Trolling people are called trolls. Trolling is about ridiculing or insulting other users by sending messages or making posts public.
Flooding: Repeatedly sending the same message, or many different, empty or intentionally garbled packets in a short time. Flooding can occur in messengers or at network protocols
Spamming: Sending unwanted or unnecessary e-mails. The best known form of spam is e-mail spam. Some people also experienced spam on messengers and via SMS.
Unit 2: Safety on the net and tips for protecting devices

Safety on the net and tips for protecting devices

If your device is important to you, then you must protect it, especially its data. Don’t forget that personal data such as passwords, email addresses, etc. are stored in your device.

The protection of your device depends only on us and there are some risk areas and recommendations that we are going to explore in this unit.

Risk areas:

Internet connection

Our Wifi connection is one of the risky areas that we will have to face. To improve the security of our network, it is important to change the default username and password.

Online activity

Threats can reach us in two ways: through malicious programs or files that we download and install on our computer, or through computer attacks lead by hackers trying to enter our computer and steal our passwords, in this case computer viruses, worms, Trojans and phishing attacks are used.

User level

If your computer does not have a password or any tool to monitor the activity that is being carried out, it is very easy for hackers to steal data.

Tips for protecting devices:

Do not open any email from untrusted sources: They can contain phishing content or malware.
Lock your laptop: When you are away from workstation
Purchase anti-virus software and turn on the firewall. It won’t secure you in 100%, but can save you from some threats. And keep it updated!
Back up your system: It is essential to back up your system and important data in case of hacker attack.
Set a safe password:  Its length is a minimum 12 characters, including lowercase and uppercase characters, symbols and numbers.
Don’t use personal related data as a password: That would make hackers their job easier. Date of birth or date of the wedding is not a good password. And do not use the same password for everything!
Read Privacy Policy: It’s a document on a website which informs users about data that is gathered and how they would be used
Don’t give personal information to strangers and encrypt sensitive data
Don’t send important data on a public wireless network: It might be insecure.
Update your software: It’s important to keep your system up to date. There might be some useful stuff that can help secure your data. Make sure it’s a reliable source
Always read cautiously: Sometimes some things can pop up on your screen and there are few options: agree or disagree. Read everything first and then decide. Do not click on suspicious links and do not download suspicious files. If you are interested in a program, try to download it from the official provider
Be careful with sites where you upload your files, always keep a backup
Turn on the position tracking of your device and do not leave your device unattended

Tips for browsing on the net:

Surfing the Internet is an integral part of our lives, so we must avoid data robbing on the web. Here are some ways to avoid

Be anonymous

The less information about you circulates on the internet, the safer you are

Strong password

Set a strong password. The more characters the better. Change passwords often to prevent guessing

Encrypted connection

Typically, the HTTPS protocol is secure and it is visible in the upper left part of the address bar. If you get a warning about a problem with HTTPS then do not enter that page

Use programs for blocking unsolicited items on the page

Install AdBlock, NoScript, Flashblock, Cookie Monster. These programs prevent unwanted items from loading on the page

Use Private mode

By enabling private mode in the browser, when we close it, all cookies and browsing history will be deleted

Log out

Logging out of the workplace is very important. Do not forget!

Recommendations for transactions:

Making transactions via the internet is fast and convenient, but it is not always a secure form of exchange, pay attention to the following:

Dos

Always check if the connection is secure with a https protocol and use a separate email for online purchases.
Check the opinion about seller. Choose stores with certificates of trust, search for reviews of the seller.
Check the seller's contact and identification details.
Check the selection of payment methods. Pay preferably via PayPal, as you can recover the money if a problem arises
Log out.

Don'ts

Do not buy before you check the reliability of the auction. Do not click links in e-mails - you may fall victim to a scam.
Do not give your data if there is no need and do not give your login and password.
Unit 3: Sharing through digital technologies

Sharing through digital technologies

Sharing is good and with digital technology, sharing is easy.

Richard Stallman

You will always find sharing useful. Imagine that you discovered a fantastic recipe and you want to send it to your child or friend. Maybe you went on holidays and you want to show photos to others.

Network gives you the chance to connect with other people. Chat and share information with them. There are many ways of sharing data through the Internet.

Let’s have a look at some interesting sharing options…

Sharing offline

CDs and DVDs

This is the basic method of sharing data. Recording data on CD or DVD disks is called burning. You can burn any type of data, photos, videos, music, documents. There are few types of CDs and DVDs.
CD-ROM – it’s a Read Only Memory CD disk. This means that they are non-writable.
CD-R  - CD disk that is writable. This means that you can burn data once or more than once.
CD-RW - you can add data and erase whole data on disk.

Flash memory

More modern way to transport files is use of flash memories. USB sticks and memory cards in various sizes.
Flash cards are used in cameras and phones to store data. You can pop the card out of device and insert to memory reader in PC and give it to someone.

Sharing online

Via Social Media

Facebook – very popular around the world. Various types of content.

Twitter – Used for giving short information or present opinions.

Instagram – mainly intended to share photos and videos.

Snapchat – Used to share photos and videos. Unique feature is that this content disappears after some time

Via Email

The most commonly used way of sharing data is by Email. You can send a message which apart from text consists of attachments. They can be photos, videos or documents. Don’t expect too much. Attachment size has its limit. But now it isn’t that small. Some of email services allow you to send files with size up to 100MB.
Via Skype
Skype is a telecommunications application software product that specializes in providing video chat and voice calls between computers, tablets, mobile devices, the Xbox One console, and smartwatches via the Internet and to regular telephones. Skype additionally provides instant messaging services. Users may transmit both text and video messages, and may exchange digital documents such as images, text, and video. Skype allows video conference calls. HTTPS://WWW.SKYPE.COM

Via  Youtube

YouTube is an American video-sharing website headquartered in San Bruno, California. YouTube allows users to upload, view, rate, share, add to favorites, report, comment on videos, and subscribe to other users. It offers a wide variety of user-generated and corporate media videos. Available content includes video clips, TV show clips, music videos, short and documentary films, audio recordings, movie trailers, live streams, and other content such as video blogging, short original videos, and educational videos. HTTPS://WWW.YOUTUBE.COM

Via Google Drive

Google Drive is a simple and intuitive tool. It is also connected to Google Docs which allows you to create Word documents, Excel spreadsheets, PowerPoint presentation and much more. The biggest advantage of this service is 15 GB of free space. HTTPS://DRIVE.GOOGLE.COM

Via Cloud storages

Cloud storage is a model of computer data storage in which the digital data is stored in logical pools. The physical storage spans multiple servers (sometimes in multiple locations), and the physical environment is typically owned and managed by a hosting company. It is a comfortable service to store data. It’s also useful in terms of sharing information with others. You can send link to folder with photos, videos, document, etc. You can also use it as a common workplace for a group of people. Create a folder and give others access to create and edit files within it. It’s very helpful if you work on a group project and it’s important to store and share any amount of data. ​

Apart from Google Drive that we have already seen, other cloud based services are listed in the following slides.

Via  Dropbox

Dropbox is a multiplatform file hosting service in the cloud, operated by the Dropbox company. The service allows users to store and synchronize files online and between computers and share files and folders with other users and tablets and smartphones. There are free and paid versions, each of which has a variety of options. The mobile version is available for Android, Windows Phone, Blackberry and iOS (Apple). It currently has more than 500 million registered users. HTTPS://WWW.DROPBOX.COM

Via WeTransfer

It is a cloud-based service that allows transferring files simply indicating the recipient's email address. It offers unlimited uploads as well as the possibility of sharing files of up to 2 GB in size. The bad part is that files are kept on the server for up to 7 days and they do not use encryption or password protection. HTTPS://WETRANSFER.COM​

Via  OneDrive

OneDrive by Microsoft lets you easily backup, store and share photos, videos, documents, and more – anywhere, on any device. You need to have a valid Microsoft license to use safely this service. HTTPS://ACCOUNT.MICROSOFT.COM/ACCOUNT/ONEDRIVE

Via Mega

MEGA is a cloud storage and file hosting service offered by Mega Limited, a New Zealand-based company. The service is offered primarily through web-based apps. Mega mobile apps are also available for Windows Phone, Android and iOS. HTTPS://MEGA.NZ/​

Other sharing solutions

Telegram and WhatsApp channels
Conventional applications like Mediafire and Zippyshare
Torrent
There are many pages to share online temporarily, one of the most used and simple is https://reep.io/

There are also specific sharing platforms

To share images, drawings or photography, the most famous is https://www.deviantart.com/
To share graphic files and ppts Imgur and ImageShack
There are also pages to share plain text, or share the application code: https://pastebin.com/ or https://github.com


Keywords

Digital technologies, netiquette, security, sharing, cloud storage

Description

In this course, we will introduce the concept of netiquette on the net and its rules. In the second unit, we will present some tips and recommendations to protect your devices, and finally in the last unit we will explore some interesting sharing options based on digital solutions.

Bibliography

  • http://blog.continental.edu.pe/uc-virtual/la-netiqueta-y-sus-10-reglas-basicas/
  • http://www.gadae.com/blog/cuales-son-las-claves-para-proteger-la-seguridad-de-tu-ordenador/
  • http://www.gadae.com/blog/mantener-seguridad-ordenador/
  • https://www.adslzone.net/2016/06/02/las-15-mejores-herramientas-compartir-archivos-directamente-sin-subirlos-la-nube/
  • https://forum.interia.pl/
  • https://www.prawo.ws/
  • http://prawo.sejm.gov.pl/
  • https://ist.mit.edu/security/devices
  • https://en.wikipedia.org/wiki/Malware
  • https://en.wikipedia.org/wiki/Social_engineering_(security)
  • https://europa.eu/youreurope/citizens/consumers/internet-telecoms/data-protection-privacy/index_en.htm
  • https://www.tripwire.com/state-of-security/security-awareness/5-social-engineering-attacks-to-watch-out-for/
  • https://econsultancy.com
  • https://cdburnerxp.se/help/appendices/disctypes
  • https://petapixel.com/2012/10/10/why-hard-drives-and-memory-cards-have-less-space-than-advertised/
  • http://www.dw.com/en/using-digital-technologies-for-freedom-of-expression/a-19116226