Shermaine L. Mahan. Social media netiquette is the social code for using social media. Social media is user generated content while netiquette is the.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Cyberbullying Old Problem, New Playground. Bullies are no longer restricted to the school yard. They are often online, out of the sight and earshot of.
SECURITY CHECK Protecting Your System and Yourself Source:
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Digital Citizenship Project
A Guide to Digital Citizenship
D IGITAL C ITIZENSHIP. Definition: The informal rules of behavior to be followed when using the Internet N ETIQUETTE.
Digital Citizenship By: Miranda Scorver.
 Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your.
Ashley Chambliss ED 505 Fall 2. “Digital Citizenship is a way for teachers to prepare you for a world full of technology.” (Ribble, ) “A means.
Digital Citizenship Jessica L. Webb ED 505. Netiquette Netiquette Social Media- interactive dissemination of information through the internet. Netiquette-
Digital Citizenship Project By: Wanda Hicks Technology and Education Dr. Hocutt.
Joseph Pettaway ED505. What is Digital Citizenship? Concepts that aids individuals in learning and understanding how to use technology appropriately.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
DIGITAL CITIZENSHIP DIGITAL CITIZENSHIP By: Erica Lewis ED 505.
By: Catherine Tingle. What is it?  Netiquette refers to appropriate and safe interactions online.
Donette Mullinix ED 505 UWA Clipart:
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
DIGITAL CITIZENSHIP ED 505 Created By: Danielle McDaniel.
Submitted by: Donna Rembert Instructor: Dr. Laurie Fowler ED508 Technology Portfolio.
Digital Citizen Project Katie Goodall Educational Technology 505.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
What is Digital Citizenship?. Digital Citizenship Digital Citizenship is knowing and understanding the proper use of technology. The following are some.
A guide to netiquette, copyright & fair use, plagiarism, internet and computer safety By Briana Horton.
Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered.
Digital Citizenship Project By: Tierra Collins EDU 505.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
By: Tina Hill.  This is the unwritten rules of the different media sites on the internet.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Digital Citizenship Project Jared Smith ED 505. Netiquette on Social Media Sites  Netiquette on Social Media Sites is “the social code of using social.
According to netiquette simply refers to our behavior the internet.
Digital Citizenship Project Amanda Friscia University of West Alabama ED 505--Fall 2011 Online.
Digital Citizenship Project By Allen Naylor Ed 505.
Digital Citizenship. Topics  Netiquette  Copyright and Fair Use  Plagiarism  Safety on the Internet  Safety on your Computer.
Digital Citizenship By: Amanda Thurber. Netiquette on Social Media Sites According to networketiquette.net, netiquette is the social code of the internet.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
Types of Electronic Infection
Digital Citizenship Project. Netiquette Do’s -Read before you post messages. -Try to keep your postings brief and easy to read. -Be kind when others make.
BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.
BRADLEY BARNES DIGITAL CITIZENSHIP. NETIQUETTE ON SOCIAL MEDIA SITES Netiquette is the etiquette guidelines that govern behavior when communicating on.
By: Elizabeth Scruggs Digital Citizenship Project.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
Technology Competency Computer Infestations Mr. Locke.
ED 505: Magen Anthony. Netiquette on Social Media site is the etiquette or guideline for posting on social media or other online sites. This helps individuals.
Digital Citizen Project Xiomara Hernandez. Topics Defined Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety.
Cassidy Culligan Digital Citizenship Project ED 505.
Digital Citizenship By Lori Gray.
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
Digital Citizenship. What is Netiquette? Netiquette is known as the “social code of the internet.” Netiquette comes from the words “network” and “etiquette.”
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Digital Citizenship Jacinta Little ED 505. Table of Contents Definition of Digital Citizenship………………………… Slides 3-4 Social networking…………………………………………
Digital Citizenship. What is a Digital Citizen? Digital Citizens are people who use technology often and appropriately. Digital Citizens are people who.
Digital Citizen Project By: Frances Murphey Technology and Education.
By: Mallory Thornton.  Social code of website  Cyber term  Derived from network and etiquette.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Digital Citizenship ED 505 Jayme Hall Netiquette Derived from the words network and etiquette, it is the social code of network communication. The social.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Things Every Computer User Should Know… Jessica Johnsey ED 505- Technology and Education.
Digital Media Safety Issues Physical Safety Issues Safety issues pertinent to digital media professionals fall under two categories: Physical.
Technology Safety By: Stefanie Weston. Netiquette Dos and Don’ts for Children  Do  Respect the topic that is being discussed.  Be polite and make friends.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
Created by: Jessica Crook. What is Social Media Netiquette? = the social code for using social media sites; the code we have among friends we interact.
DIGITAL CITIZENSHIP What You Should Know!.
Digital Citizenship by Jeremy Head.
Digital Citizenship By: John Beverly.
Presentation transcript:

Shermaine L. Mahan

Social media netiquette is the social code for using social media. Social media is user generated content while netiquette is the social code of the internet. Therefore, social media netiquette is the way users conduct themselves while online with others.

Dos Be generous Share accurate information Correct mistakes Show love Respect privacy Don’t lie Don’t hate No cursing No disrespect Avoid sarcasm and facetious remarks Don’ts

Copyright is a legal device that provides the creator of a work of art or literature, or a work that conveys information or ideas, the right to control how the work is used. Fair use is the most significant limitation on the copyright holder’s exclusive rights.

Rules for using Fair Use: (Education) If a teacher is using a copyrighted work for the purpose of educating and is using only a segment of the copyrighted work, it usually will fall under fair use laws. The opening screen in multimedia presentations needs to say that the usage of the copyrighted material falls under fair use laws with no intended copyright violation. Proper credits and citations must always be included. If the copyrighted work is placed on the internet, is copied more than nine times in a semester, or if the entire work is being used, fair use no longer exists. (Lengths Limits) Only small segments of multimedia can be used under fair use, and if the usage exceeds that amount, copyright has been breached. Motion media, such as television and film, can be used for only three minutes or 10 percent of the work. Music can be played for 30 seconds or 10 percent of the piece. Text can be used for 1,000 words or 10 percent of the work. Most importantly, alterations to the work are not permitted in any format.

Plagiarism means to steal and pass off (the ideas or words of another) as one’s own to use (another’s production) without crediting the source to commit literary theft to present as new and original an idea or product derived from an existing source.

Ways to avoid plagiarism: Brainstorm before working on the paper so you will have an idea of what you want to discuss. Use multiple sources. Use paraphrasing. Give credit to the author(s) for everything copied word for word. Use citations in text, footnotes and bibliography.

Ways teachers can recognize plagiarism:

Identity theft occurs when your personal information is stolen and used without your knowledge to commit fraud or other crimes. Ways to avoid identity theft: Keep your social security card in a safe place. Check your credit report twice a year. Use a paper shredder to destroy any documents that contain your personal information. Do not save website passwords on the Internet browser. Do not give credit card numbers or social security numbers over the phone unless you initiated the call.

Ways to maintain reputation management: Show respect to others. Refrain from spreading rumors about others. Report any rumors spreading about you.

Everyone uses passwords while online, but it is very important to keep those passwords safe. It is highly recommended to remember your passwords as you browse online, but if it is not possible to remember your passwords, you should keep them in a SAFE place. Do not save passwords on the Internet browser because they are in danger of being stolen by hackers.

Cyberbullying is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones. It has to have a minor on both sides, or at least have been instigated by a minor against another minor. Once adults become involved, it is called cyber-harassment or cyberstalking. Adult cyber-harassment or cyberstalking is never considered as cyberbullying. Cyberstalking is a technologically-based “attack” on one person who has been targeted specifically for that attack for reasons of anger, revenge or control. Cyberstalking includes: harassment, embarrassment and humiliation of the victim emptying bank accounts or other economic control such as ruining the victim's credit score harassing family, friends and employers to isolate the victim scare tactics to instill fear and more.

A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs). An virus travels as an attachment to messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's address book. Phishing is a method of online identity theft. In addition to stealing personal and financial data, phishers can infect computers with viruses and convince people to participate unwittingly in money laundering. A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically. A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.

How to keep your computer safe? Use a firewall. Scan for viruses. Scan for spyware. Keep your virus software up-to-date. Make sure your mobile connection is secure. Make sure you browse on sites that you trust. Be careful with attachments if you don’t know the sender.

Copyright and Fair Use Cyberbullying Deter. Detect. Defeat. Avoid ID Theft Fair Use How To Avoid Identity Theft Official Social Netiquette Plagiarism: How To Avoid It Plagiarism.org STOP cyberbullying The Rules of Netiquette