What rules should guide your Behaviour when you interact with friends and coworkers on social media?

The Core Rules of Netiquette by Virginia Shea

The following 10 rules and reminders for online communication and behaviour have been summarized from Virginia Shea's book, Netiquette.

Rule 1: Remember the human 

Remember that behind every screen is a human being with independent thoughts and feelings. It is easy to misunderstand or be rude to others when you are not interacting with them in person. Before clicking send or post, ask yourself: Would you say it to the person's face?

Rule 2: Adhere to the same standards of behavior as in "real life"

This rule is a reminder that the ethical standards and laws that govern our society extend to cyberspace as well. This includes harrassment and bullying, copyright regulations, and privacy.

Rule 3: Know where you are in cyberspace

Different environments require different behaviour. The way we interact with our friends, for example, may not be acceptable in a school or work situation. This principle extends to online environments as well. Comments that are acceptable on Facebook, for instance, may be considered inappropriate on a professional networking site such as LinkedIn.

Rule 4: Respect other people's time and bandwidth

In this rule, "bandwidth" is synonymous with "time." When you send and email or post on a discussion board, keep your comments brief and relevant to the environment or situation.

Rule 5: Make yourself look good online

There are many positive aspects about the Internet, including the ability to remain anonymous. This rule is a reminder not to allow this aspect of the Internet influence how you communicate. Pay attention to your grammar, spelling and word choices as well as the overall content and truthfulness of your writing, as this is what others are using to judge you.

Rule 6: Share expert knowledge

The Internet is a great platform for sharing good information. However, it can also be used to spread misinformation and distortions. If you hold a lot of knowledge about a certain topic or subject, don't be afraid to share it online in a manner that is helpful and accurate.

Rule 7: Help keep flame wars under control

"Flaming" refers to verbal disagreements that occur between users in contexts such as message boards. They are often a result of strongly held opinions and emotions. As in rule 4, do not monopolize online discussion with long or offensive commentary.  

Rule 8: Respect other people's privacy

The Internet is an open forum. Remember not to share information about others that could get them -- or yourself -- into trouble, both personally and professionally.

Rule 9: Don't abuse your power

This rule is intended for those who carry more power on the Internet as experts, designers, system administrators or even hackers. Power should always be used responsibly and not to harm or take advantage of those who are less powerful or knowledgeable.

Rule 10: Be forgiving of other people's mistakes

Give other users the benefit of the doubt and consider that they may come from a different background or have less experience on the Internet. Do not be rude when you encounter someone's mistake -- always respond with courteousy and respect.

What rules should guide your behavior when you interact with friends and co workers on social media?

The following 10 rules and reminders for online communication and behaviour have been summarized from Virginia Shea's book, Netiquette..
Rule 1: Remember the human. ... .
Rule 2: Adhere to the same standards of behavior as in "real life" ... .
Rule 3: Know where you are in cyberspace. ... .
Rule 4: Respect other people's time and bandwidth..

How can you protect personal information gathered by legitimate organization?

How can you protect personal information gathered by legitimate organizations? Create a separate email account for receiving information from websites.

How do you prevent a laptop from being stolen you can use a surge protector?

To prevent a laptop from being stolen, you can use a surge protector. False; To prevent laptops from being stolen, you can use a cable lock. What is a digital certificate?

What type of cyberattack is used to trick a user into giving valuable information to an attacker quizlet?

Phishing is a type of cyberattack that uses disguised email to trick the recipient into giving up information, downloading malware, or taking some other desired action.