||This article may require cleanup to meet Wikipedia's quality standards. The specific problem is: the article does not meet standards of objectivity and encyclopedic style. (March 2013)|
Netiquette (short for "network etiquette" or "Internet etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community. The points most strongly emphasized about USENET netiquette often include using simple electronic signatures, and avoiding multiposting, cross-posting, off-topic posting, hijacking a discussion thread, and other techniques used to minimize the effort required to read a post or a thread. Similarly, some Usenet guidelines call for use of unabbreviated English while users of instant messaging protocols like SMS occasionally encourage just the opposite, bolstering use of SMS language. However, many online communities frown upon this practice.
Common rules for e-mail and USENET such as avoiding flamewars and spam are constant across most mediums and communities. Another rule is to avoid typing in ALL CAPS or grossly enlarging script for emphasis, which is considered to be the equivalent of shouting or yelling. Other commonly shared points, such as remembering that one's posts are (or can easily be made) public, are generally intuitively understood by publishers of Web pages and posters to USENET, although this rule is somewhat flexible depending on the environment. On more private protocols, however, such as e-mail and SMS, some users take the privacy of their posts for granted. One-on-one communications, such as private messages on chat forums and direct SMSs, may be considered more private than other such protocols, but infamous breaches surround even these relatively private media. For example, Paris Hilton's Sidekick PDA was cracked in 2005, resulting in the publication of her private photos, SMS history, address book, etc.
More substantially, a group e-mail sent by Cerner CEO Neal Patterson to managers of a facility in Kansas City concerning "Cerner's declining work ethic" read, in part, "The parking lot is sparsely used at 8 A.M.; likewise at 5 P.M. As managers—you either do not know what your EMPLOYEES are doing; or YOU do not CARE ... In either case, you have a problem and you will fix it or I will replace you." After the e-mail was forwarded to hundreds of other employees, it quickly leaked to the public. On the day that the e-mail was posted to Yahoo!, Cerner's stock price fell by over 22% from a high market capitalization of US$1.5 billion.
Beyond matters of basic courtesy and privacy, e-mail syntax (defined by RFC 2822) allows for different types of recipients. The primary recipient, defined by the To: line, can reasonably be expected to respond, but recipients of carbon copies cannot be, although they still might. Likewise, misuse of the CC: functions in lieu of traditional mailing lists can result in serious technical issues. In late 2007, employees of the United States Department of Homeland Security used large CC: lists in place of a mailing list to broadcast messages to several hundred users. Misuse of the "reply to all" caused the number of responses to that message to quickly expand to some two million messages, bringing down their mail server. In cases like this, rules of netiquette have to do with efficient sharing of resources and ensuring that the associated technology continues to function rather than more basic etiquette.
"When someone makes a mistake – whether it's a spelling error or a spelling flame, a stupid question or an unnecessarily long answer – be kind about it. If it's a minor error, you may not need to say anything. Even if you feel strongly about it, think twice before reacting. Having good manners yourself doesn't give you license to correct everyone else. If you do decide to inform someone of a mistake, point it out politely, and preferably by private email rather than in public. Give people the benefit of the doubt; assume they just don't know any better. And never be arrogant or self-righteous about it. Just as it's a law of nature that spelling flames always contain spelling errors, notes pointing out Netiquette violations are often examples of poor Netiquette."
Due to the large variation between what is considered acceptable behavior in various professional environments and between professional and social networks, codified internal manuals of style can help clarify acceptable limits and boundaries for user behavior. For instance, failure to publish such a guide for e-mail style was cited among the reasons for a NZ$17,000 wrongful dismissal finding against a firm that fired a woman for misuse of all caps in company-wide e-mail traffic.
Cell Phone Etiquette 
The issue of mobile communication and etiquette has also become an issue of academic interest. The rapid adoption of the device has resulted in the intrusion of telephony into situations where it was previously not used. This has exposed the implicit rules of courtesy and opened them to reevaluation.
Communicating with others via Internet without creating misunderstandings can be challenging, mainly because facial expressions, body language cannot be interpreted on cyberspace. Therefore, additional Netiquette guidelines should be considered when having exchanges online ("Study guides and Strategies").
When sending an email, it is helpful to keep your email messages brief, if possible. This increases the chances of the message being read by the recipient. Furthermore, words and content expressed in electronic format are a reflection of the sender. Therefore, the content of the message should be carefully reviewed/edited prior to posting/sending. Information on the Internet is very public; it can be seen by anyone in the world---including criminals, future employers, and governmental bodies. Statements written in an email or on a website can be traced back to the author ("Study guides and Strategies").
Other things to consider are forwarding email and copyright compliance. Emails should be forwarded with the permission of the sender. It is equally important to receive permission to post or send images, content, and the like, and cite others’ works when used ("Study guides and Strategies").
Study guides and strategies: Netiquette. (n.d.). Retrieved from http://www.studygs.net/netiquette.htm
Cell Phone Etiquette in the Education System 
Most schools in the United States and Europe and Canada have prohibited mobile phones in the classroom, citing class disruptions and the potential for cheating via text messaging. In the UK, possession of a mobile phone in an examination can result in immediate disqualification from that subject or from all that student's subjects. This still applies even if the mobile phone was not turned on at the time. In New York City, students are banned from taking cell phones to school. This has been a debate for several years, but finally passed legislature in 2008.
“Most schools allow students to have cell phones for safety purposes” -- a reaction to the Littleton, Colorado, high school shooting incident of 1999 (Lipscomb 2007: 50). Apart from emergency situations, most schools don’t officially allow students to use cell phones during class time.
Cell Phone Etiquette in the Public Sphere 
Talking or texting on a cell phone in public may seem a distraction for many individuals. When in public there are two times when one uses a phone. The first is when someone is alone and the other is when he/she is in a group. The main issue for most people is when they are in a group, and the cell phone becomes a distraction or a barrier for successful socialization among family and friends. In the past few years, society has become less tolerant in terms of accepting the use of cell phones in public areas for example, public transportation, restaurants and much more. “Some have suggested that mobile phones ‘affect every aspect of our personal and professional lives either directly or indirectly’” (Humphrey). Every culture varies in terms of tolerance for cell phone usage, for instance in Western society cell phones are permissible during free time at schools, whereas in the eastern countries, cell phones are strictly prohibited on school property.
Mobile phone use can be an important matter of social discourtesy: phones ringing during funerals or weddings; in toilets, cinemas and theatres. Some book shops, libraries, bathrooms, cinemas, doctors' offices and places of worship prohibit their use, so that other patrons will not be disturbed by conversations. Some facilities install signal-jamming equipment to prevent their use, although in many countries, including the US, such equipment is illegal. Some new auditoriums have installed wire mesh in the walls to make a Faraday cage, which prevents signal penetration without violating signal jamming laws.
A working group made up of Finnish telephone companies, public transport operators and communications authorities has launched a campaign to remind mobile phone users of courtesy, especially when using mass transit—what to talk about on the phone, and how to. In particular, the campaign wants to impact loud mobile phone usage as well as calls regarding sensitive matters.
Trains, particularly those involving long-distance services, often offer a "quiet carriage" where phone use is prohibited, much like the designated non-smoking carriage of the past. In the UK however many users tend to ignore this as it is rarely enforced, especially if the other carriages are crowded and they have no choice but to go in the "quiet carriage". In Japan, it is generally considered impolite to talk using a phone on any train—e-mailing is generally the mode of mobile communication. Mobile phone usage on local public transport is also increasingly seen as a nuisance; the city of Graz, for instance, has mandated a total ban of mobile phones on its tram and bus network in 2008 (though texting and emailing is still allowed).
Cellphone Etiquette Within Social Relationships 
When critically assessing the family structure, it is important to examine the parent/child negotiations which occur in the household, in relation to the increased use of cell phones. Teenagers use their cell phones as a way to negotiate spatial boundaries with their parents (Williams 2005:316). This includes extending curfews in the public space and allowing more freedom for the teenagers when they are outside of the home (Williams 2005:318). More importantly, cell phone etiquette relates to kinship groups and the family as an institution. This is because cell phones act as a threat due to the rapid disconnect within families. Children are often so closely affiliated with their technological gadgets, and they tend to interact with their friends constantly and this has a negative impact on their relationship with their parents (Williams 2005:326). Teenagers see themselves as gaining a sense of empowerment from the mobile phone. Cell phone etiquette in the household from an anthropological perspective has show an evolution in the institution of family. The mobile phone has now been integrated into family practices and perpetuated a wider concern which is the fracture between parent and child relationships. We are able to see the traditional values disappearing however, reflexive monitoring is occurring (Williams 2005:320). Through this, parents are becoming friendlier like with their children and critics emphasize that this change is problematic because children should be subjected to social control. One way of social control is limiting the time spent interacting with friends, which is difficult to do in today’s society because of the rapid use of cell phones.
Netiquette Vs. Cellphone Etiquette 
Cell phone Etiquette is largely dependent on the cultural context and what is deemed to be socially acceptable. For instance, in certain cultures using your hand held devices while interacting in a group environment is considered bad manners, whereas, in other cultures around the world it may be viewed differently. In addition, cell phone etiquette also encompasses the various types of activities which are occurring and the nature of the messages which are being sent. More importantly, messages of an inappropriate nature can be sent to an individual and this could potentially orchestrate problems such as verbal/ cyber abuse.
See Also 
- "Zen and the Art of the Internet – Usenet News". Retrieved 2007-08-18.
- "Links to Prof. Timo Salmi's FAQ material". Retrieved 2007-08-18.
- The Complete Idiot's Guide to... Writing Well By Laurie Rozakis, http://books.google.com/books?id=YFIEfqL48AMC&pg=PA348&dq=netiquette&ie=ISO-8859-1&sig=t9ZuKcbWOymIy9oNrRAy9ZfAikI#PPA348,M1
- Paris Hilton's hacked Sidekick releases unedited tell-all – Engadget
- "Zero to billion". CNN. 2006-04-26. Retrieved 2010-05-20.
- ITworld.com – Unix security: Proprietary e-mail
- E-Mail Rules: A Business Guide to Managing Policies, Security, and Legal Issues for E-Mail and Digital Communications By Randolph Kahn & Nancy Flynn http://books.google.com/books?id=Q9CbhiflZh0C&pg=PA45&dq=netiquette&ie=ISO-8859-1&sig=5jsrxx0u3qWX1_d4KXCl-_4Tc_4#PPA47,M1
- http://articles.techrepublic.com.com/5100-10878_11-1043085.html Electronic office etiquette
- DHS flunks e-mail administration 101, causes mini-DDoS
- Shea. V, Netiquette. (1997) http://www.albion.com/netiquette/book/index.html
- Lewis, Rebecca (August 30, 2009). "Emails spark woman's sacking". The New Zealand Herald. Retrieved October 30, 2011.
- Moore, Matthew. "Office worker sacked for writing emails in block capitals". Daily Telegraph, Sep 1, 2009. Accessed May 20, 2010.
- Ling, Richard, "One Can Talk About Common Manners", 2007.
- , Medina, Jennifer
- campaign to promote cell phone manners (in finish)
- "In Grazer "Öffis" sind Handys ab heute verboten". Kleine Zeitung (in German) (Klagenfurt: Styria Medien AG). 2008-04-16. p. 18.
- ""Rücksichtsvoll" oder "völlig sinnlos"". Der Standard Online vesion (in German) (Vienna). 2008-04-18. p. 18.
- , Post, Emily, "Four Essential Cell Phone Rules"
- Post, Emily. "News Flash: You Don’t Always Have to Answer that Phone". Archived from the original on November 23, 2010.
- This article is based on material taken from the Free On-line Dictionary of Computing prior to 1 November 2008 and incorporated under the "relicensing" terms of the GFDL, version 1.3 or later.
Further reading 
- Pręgowsk, Michał Piotr, “Rediscovering the netiquette: the role of propagated values and personal patterns in defining self-identity of the Internet user." Observatorio 2009: 354-6. Google Scholar. Web. 15 Dec. 2010. <http://obs.obercom.pt/index.php/obs/article/view/241/2488>.
- Null, Christopher “Text Messaging Etiquette: To Text or Not to Text" PCWorld.com. 2010. Web. 15 Dec. 2010. <>.