top of page

Digital Etiquette

Online is more like real life than we realize. In real life people act inappropriately and the same occurs online. Online it happens differently, here people are more likely to commit acts such as cyber bullying, hacking, identity theft or someone could just corrupt your computer for the fun of it. Cyber Bullying can be defined as "bullying that takes place using electronic technology. Electronic technology includes devices and equipment such as cell phones, computers, and tablets as well as communication tools including social media sites, text messages, chat, and websites." by www.stopbullying.gov. Cyber bullying has been a major issue ever since the internet was invented. People feel because they are committing these acts online that it has no repercussion in real life but this is not true. The victims of cyber bullying are always negatively affected in real life and sometimes become suicidal. The repercussions of cyber bullying is that you as the cyber bully could cause your victims to find you and take action against you. Worst case scenario is that your victims actually find you in real life and take action. Another common problem online is Identity Theft. Identity Theft can be defined as" a crime in which an imposter obtains key pieces of personally identifiable information, such as Social Security or driver's license numbers, in order to impersonate someone else." by searchsecurity.techtarget.com. A common example of Identity theft online especially on social media is a phenomenon known as "Catfishing". Catfishing is a great example of identity theft and for more info on it here is a link www.mtv.ca/shows/catfish. For identity theft the punishment could be jail time depending on how serious the allegations are. Another prominent issue online that could or probably has affected us all online is Hacking.

Hacking can be defined as" to gain unauthorized access to data in a system or computer" by google. Recently (when i wrote this article) there was a major hacking out break all across the world that affected lots of people. here is a link for more information on the subject https://www.vox.com/new-money/2017/5/12/15632482/ransomware-explained. This is just another great example of how vulnerable we are top a hacking out break. The punishments for hacking are listed here

https://www.cga.ct.gov/2012/rpt/2012-R-0254.htm.

bottom of page