2-4 COMFORTABLE USE OF THE INTERNET

To use the network comfortably

Netiquette (network + etiquette)

gNetiquetteh means etiquette on the Internet. Even on the network, there is a code of conduct acceptable for everyone just as in the real world. We will go into detail later.

Literal expressions

As mentioned earlier, online communication is mostly exchange of written words, so you need to pay full attention to your expressions, avoiding emotional or negative wording.

Confirmation of the recipient

When you send e-mail messages, make sure that you are sending them to the right person. You also need to take care of the addresses on the mailing list. If you are negligent, you might disturb someone else with an unsolicited message. Also, you should refrain from sending messages to an unspecified large number of people or those who are not related.

Netiquette

Netiquette is a code of polite behavior acceptable on the Internet. Just as in the real world, rules of etiquette and courtesy must be respected on the network as well, for good relations among people. It is even more so because online communication mostly relies on written words and doesnft convey gestures and tones of voice, easily inviting misunderstanding.

In other words, when you exchange information using the network, you need to recognize your social and legal responsibilities and the risks involved as a member of the network society, not to mention that you have to abide by the regulations required by MIND and Internet service providers. Also, in order to enjoy network life, you are obliged to learn the basic rules and good manners, respect others and cooperate for comfortable operation of the network.

The following cases are described, indicated by right (Good)or wrong (WG).

1. What is netiquette?

2. Literal communication

¨People have different values. Therefore, wording should be simple and universal. You should refrain from using nonstandard expressions, slang and buzzwords. If you want, try to add notes or follow-up messages.

3. Sending messages to many unspecified people

¨You must not use the network for gdirect-mail advertisingh. You should also make proper use of the network so that it wonft get overloaded.

4. Forwarding and disclosure of e-mail

¨E-mail requesting unspecified others to send copies is called gchain e-mailh. This is inadmissible behavior whatever the reason. If youfve received e-mails of this kind, report them to the system operator immediately. The last example is tantamount to the pyramid scheme, which is illegal in the first place. It is strictly prohibited.

¨E-mail is considered original work. Forwarding one without the senderfs consent could constitute an infringement of the copyright. It could also divulge or invade privacy (e-mail address, home address, name, etc.), so you should keep that in mind.

5. Subjects

¨Subjects should be gsuccincth yet comprehensible.

6. Machine-dependent characters (= Original characters added by each maker to the JIS Kanji codes)

¨Enclosed numbers and other special codes are called gmachine-dependent charactersh. These characters could become garbled under certain circumstances because some machines are not compatible with others. Avoid using them on the Net.

7. Single-byte katakana

¨Single-byte katakana is not included in the characters defined by e-mail program standards, so many e-mail-read programs do not display single-byte katakana. It could also cause malfunctioning of other online computers. Try to refrain from using it.

8. File size

¨Video, sound and graphics files all come in a larger size, so they put more load on the network. You should take care when not only disclosing data but also browsing.

9. E-mail signatures

¨Some mailers (e-mail software) cut off information in the header including the senderfs e-mail address, so it is a good idea to put a simple signature at the end of a message. Generally, simple ones with three to five lines are considered desirable.

10. Urging a reply to e-mail

¨The recipient is not always in a situation that he/she can read e-mail off hand, so you should allow for plenty of time. You should also keep it in mind that e-mail, since it goes through many computers to reach the other party, might go missing on the way on rare occasions.

11. Reference (When you have questions)

¨Refer to a set of user manuals first. Some contain a list of frequently asked questions (FAQ) for better understanding. If you still have trouble, consult an assistant in each Systems Office or call the manufacturerfs technical support line for help.

12. Manners for communal use

¨There are people waiting for a computer to be available. If you leave your seat for lunch or something, give it up for a person who needs it. It is also not appropriate for security reasons to leave your seat with the screen open, with an e-mail or document you are drafting on view.