Kelley Hopkins ED 505.  Digital citizenship includes rules and guidelines to help technology users understand how to use technology appropriately  Categories.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Shermaine L. Mahan. Social media netiquette is the social code for using social media. Social media is user generated content while netiquette is the.
Digital Citizenship Project
A Guide to Digital Citizenship
D IGITAL C ITIZENSHIP. Definition: The informal rules of behavior to be followed when using the Internet N ETIQUETTE.
Digital Citizenship By: Miranda Scorver.
 Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your.
Digital Citizenship Donna Watson ED505. Definition of NETIQUETTE Etiquette governing communication on the Internet. Etiquette governing communication.
Ashley Chambliss ED 505 Fall 2. “Digital Citizenship is a way for teachers to prepare you for a world full of technology.” (Ribble, ) “A means.
Digital Citizenship Jessica L. Webb ED 505. Netiquette Netiquette Social Media- interactive dissemination of information through the internet. Netiquette-
Digital Citizenship Project By: Wanda Hicks Technology and Education Dr. Hocutt.
Joseph Pettaway ED505. What is Digital Citizenship? Concepts that aids individuals in learning and understanding how to use technology appropriately.
DIGITAL CITIZENSHIP DIGITAL CITIZENSHIP By: Erica Lewis ED 505.
By: Catherine Tingle. What is it?  Netiquette refers to appropriate and safe interactions online.
Digital Citizenship Project Elle Wagner ED 505. Netiquette on Social Media Sites DoDon’t Be professionalPost illegal activity Share accurate informationBully.
Donette Mullinix ED 505 UWA Clipart:
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
DIGITAL CITIZENSHIP ED 505 Created By: Danielle McDaniel.
Lindsey Cunningham Education and Technology. What is Digital Citizenship? Digital Citizenship is the principle of teaching appropriate and responsible.
Digital Citizen Project Katie Goodall Educational Technology 505.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
What is Digital Citizenship?. Digital Citizenship Digital Citizenship is knowing and understanding the proper use of technology. The following are some.
A guide to netiquette, copyright & fair use, plagiarism, internet and computer safety By Briana Horton.
Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered.
Digital Citizenship Project By: Tierra Collins EDU 505.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
By: Tina Hill.  This is the unwritten rules of the different media sites on the internet.
Digital Citizenship Created By: Kelli Stinson June 2011.
Digital Citizenship Project Jared Smith ED 505. Netiquette on Social Media Sites  Netiquette on Social Media Sites is “the social code of using social.
According to netiquette simply refers to our behavior the internet.
Digital Citizenship Project Amanda Friscia University of West Alabama ED 505--Fall 2011 Online.
Digital Citizenship Project By Allen Naylor Ed 505.
Digital Citizenship Project By Lacy Brown. Netiquette Netiquette is etiquette for the internet. Netiquette is etiquette for the internet. You should be.
Digital Citizenship. Topics  Netiquette  Copyright and Fair Use  Plagiarism  Safety on the Internet  Safety on your Computer.
Digital Citizenship By: Amanda Thurber. Netiquette on Social Media Sites According to networketiquette.net, netiquette is the social code of the internet.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
ED 505.   Netiquette  Copyright and Fair Use  Plagiarism  Safety on the Internet  Safety on your Computer Digital Citizenship Project.
Digital Citizenship Project. Netiquette Do’s -Read before you post messages. -Try to keep your postings brief and easy to read. -Be kind when others make.
BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.
BRADLEY BARNES DIGITAL CITIZENSHIP. NETIQUETTE ON SOCIAL MEDIA SITES Netiquette is the etiquette guidelines that govern behavior when communicating on.
Digital Citizenship Project Lori Jones Franks University of West Alabama ED 505.
ED 505: Magen Anthony. Netiquette on Social Media site is the etiquette or guideline for posting on social media or other online sites. This helps individuals.
Digital Citizen Project Xiomara Hernandez. Topics Defined Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety.
Digital Citizenship By: Michael Morgan. Netiquette on Social Media Sites  The rules of etiquette that apply when communicating over computer networks,
Cassidy Culligan Digital Citizenship Project ED 505.
Digital Citizenship By Lori Gray.
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
Digital Citizenship. What is Netiquette? Netiquette is known as the “social code of the internet.” Netiquette comes from the words “network” and “etiquette.”
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Digital Citizenship Project
Digital Citizenship. What is a Digital Citizen? Digital Citizens are people who use technology often and appropriately. Digital Citizens are people who.
Digital Citizen Project By: Frances Murphey Technology and Education.
By: Mallory Thornton.  Social code of website  Cyber term  Derived from network and etiquette.
I want you to be a good Digital Citizen By: Brandi S. Howard.
Digital Citizenship ED 505 Jayme Hall Netiquette Derived from the words network and etiquette, it is the social code of network communication. The social.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
+ Digital Citizenship Amanda Smith ED Netiquette on Social Media Netiquette refers to the etiquette that is used on the internet and communicating.
Things Every Computer User Should Know… Jessica Johnsey ED 505- Technology and Education.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Responsible Citizenship Digital Things We All Should Know!! Cordia Coleman Lee.
Technology Safety By: Stefanie Weston. Netiquette Dos and Don’ts for Children  Do  Respect the topic that is being discussed.  Be polite and make friends.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
DIGITAL CITIZENSHIP ED 505 TECHNOLOGY AND EDUCATION (REVISION)
Created by: Jessica Crook. What is Social Media Netiquette? = the social code for using social media sites; the code we have among friends we interact.
DIGITAL CITIZENSHIP What You Should Know!.
Digital Citizenship by Jeremy Head.
Digital Citizenship By: John Beverly.
Digital Citizenship for Students and Educators
LEGAL TERMS IN DIGITAL MEDIA
Presentation transcript:

Kelley Hopkins ED 505

 Digital citizenship includes rules and guidelines to help technology users understand how to use technology appropriately  Categories of Digital Citizenship  Netiquette  Copyright and Fair Use  Plagiarism  Safety on the Internet  Safety on the Computer

 What is netiquette?  Netiquette is network etiquette, or a set of rules for behaving properly online  Guidelines exist for understanding how to behave when in cyberspace  A complete list of guidelines can be found at

Do’s and Don’ts of Social Netiquettes DO…  Behave ethically  Take time to research places you go online  Put your best foot forward (others can see what you put online, even your boss!)  Share knowledge  Be forgiving of others mistakes (Shea, 2011)

DON’T…  Participate in “flaming,” which is when people express strong opinions without holding back emotion (Shea, 2011)  Invade other’s privacy  Forget you are interacting with humans  Abuse your power  Send SPAM or chain s (Shea, 2011)

Copyright is defined by Merriam Webster as… “the exclusive legal right to reproduce, publish, sell or redistribute the matter and form of something (as a literary, musical, or artistic work)” (Merriam Webster, 2012)

Copyright Categories Include:  Literary works  Musical works  Dramatic works  Choreographic works  Pictorial, graphic, and sculptural works  Motion pictures and AV works  Sound recordings  Architectural works (Parness, 2012)

Fair Use is defined by Merriam Webster as… “a legal doctrine that portions of copyrighted materials may be used without permission of the copyright owner provided the use is fair and reasonable, does not substantially impair the value of the materials, and does not curtail the profits reasonably expected by the owner” (Merriam-Webster, 2012)

 Fair use allows for copyrighted materials to be used for educational purposes without needing permission from the owners of the material  Fair use depends on four factors:  The purpose of the used material  The nature of the used material  The amount of material used  The affect on the market of the original owner (Crews, 2011)

Fair Use Rules for Media  Teachers can make copies of…  A chapter from a book (the lesser of 10% or 1000 words)  An article from a periodical  A short story, essay, or poem (poem of 250 words of less)  Copies of an article, essay, or story (2500 words or less or less than 10 %)  Copies of charts, graphs, diagrams, or pictures (no more than 10% or 5 images/artist  Music (up to 10% but no longer than 30 seconds) (UMUC, 2011)

Plagiarize is defined by Merriam Webster as… “to steal and pass off (the ideas or words of another) as one's own : use (another's production) without crediting the source “ Or “to commit literary theft : present as new and original an idea or product derived from an existing source” (Merriam-Webster, 2012)

How to Avoid Plagiarism  Learn:  How to cite sources and give credit where credit is due  In-text citations as well as a reference page  How to paraphrase correctly  To use your own ideas (The College Board, 2012)

Ways to Check For Plagiarism  There are many websites that will check for plagiarism. These include:  Turnitin.com  Plagiarismchecker.com  Academicplagiarism.com  Checkforplagiarism.net

Safety Issues on the Internet Include…  Identity Theft  Reputation Management  Password Safety  Cyberbullying  Cyberstalking

 Identity theft occurs when someone steals your identify information, such as your name, social security number, or financial information  As many as 9 million Americans have their identity stolen each year  Identity theft happens by:  Dumpster diving  Skimming  Phishing (SPAM )  Changing your address (FTC, 2012)

Ways to Protect Yourself from Identity Theft  Monitor all accounts on a monthly basis  Be aware of what is happening to your accounts  Check your credit reports regularly  BE AWARE!

Steps to Managing Your Online Reputation  Register your username on websites  Manage privacy settings carefully  Set up monitor alerts to catch every mention of your name  Get involved in the online conversation  Build credibility (Outspoken Media, 2011)

Choosing Passwords  Your password authenticates who you are to your computer  Computer users should choose strong passwords that are difficult to decipher  Computer users should also take every caution to safeguard their passwords

How to Choose a Good Password  Choose a password with at least six characters  Mix upper and lower case with other punctuation  Use uncommon phrases  Use misspelled words  Use a password that would be random to anyone but yourself (Wells, 2012)

Tips for Safeguarding a Password  Do NOT share your password with anyone  Make your password something easy to remember  Make your password difficult for others to guess  Do NOT fall victim to an scam asking for you to change your password (Wells, 2012)

 Cyberbullying is defined as… “when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones. It has to have a minor on both sides, or at least have been instigated by a minor against another minor.” (Wired Kids, 2012)

 There are two types of cyberbullying  Direct attacks: those sent directly to the child  Direct attacks may be perpetrated through text, , on blogs, websites, or other social media  Cyberbullying by proxy: where the bullying is done using the help of another person, either knowingly or unknowingly  Cyberbullying by proxy can sometimes become even more dangerous if adults become involved (Wired Kids, 2012)

Preventing cyberbullying can be done by:  Educating children about the consequences  Teaching children how to respect each other and take a stand  Explaining cyberbullying laws to children  Great information about cyberbullying can be found at (Wired Kids, 2012)

 Cyberstalking is “threatening behavior or unwanted advances directed at another using the Internet and other forms of online and computer communications”  Cyberstalkers stalk their victims through online media, such as chat rooms, forums, and  Some cyberstalking situations advance to off-line stalking, which can result in excessive phone calls, threats, vandalism, and even assault (National Center for Victims of Crime, 2011)

Help for victims of cyberstalking  Victims under age 18 should tell an adult  Send the stalker a clear warning in written form that the communication is not wanted  File a complaint with Internet providers  Collect evidence and documentation  Keep a log of communication  Contact local authorities  Change personal information, such as addresses and phone numbers (National Center for Victims of Crime, 2011)

Safety on your computer can be compromised by:  Viruses  Phishing  Trojan Horses  Worms

 According to Merriam Webster, a virus is… “a computer program usually hidden within another seemingly innocuous program that produces copies of itself and inserts them into other programs or files, and that usually performs a malicious action (such as destroying data)”  There are two categories of viruses  Macro virus  Worms  Viruses are always man-made, but they can’t always be controlled once they are started (Merriam Webster, 2012; UITS, 2010)

Facts about computer viruses  A virus is the result of a program someone has written and placed inside a computer program  Some viruses can erase all the information on the place it is found inside your computer  Once in your computer, a virus hides in a computer’s memory and starts duplicating itself when the program it is attached to is run  Viruses can affect RAM and computer discs  Programs have been developed to detect and fix viruses found on a computer (Beal, 2011)

 Phishing is a method of online identity theft  Phishers can steal your personal and financial data  Phishers can also infect your computer with viruses  Phishing involves:  Planning  Setup  Attack  Collection  Identity theft / fraud (How Stuff Works, 2011)

 A trojan horse is a program that does something that the installer is unaware of but the programmer planned  A trojan horse appears to be useful software but does damage to your computer once it is installed  Trojan horses can cause serious damage to your computer by deleting important files or destroying system information  Trojan horses to not reproduce to infect other files or self-replicate (Beal, 2011)

Worms  Are a sub-class of a computer virus  Can spread from computer to computer without human help  Can replicate itself on your system, thus sending out thousands of copies rather than just one virus  Can travel across networks, causing individual, server, and network problems (Beal, 2011)

Preventing Computer Attacks  Keep your Operating System up to date  Install an anti-virus software, such as Norton Anti-Virus  Download updates frequently  Use a firewall to prevent unauthorized use of your system (Beal, 2011)

Beal, V. (2011, March 29). The difference between a computer virus, worm, and trojan horse. Retrieved from Copyright In Merriam-Webster.com. Retrieved February 8, 2012, from Crews, K. (2011, December 22). Copyright quick guide. Retrieved from Fair Use In Merriam-Webster.com. Retrieved February 9, 2012, from FTC. (2012). Fighting back against identity theft. Retrieved from How Stuff Works. (2011). How phishing works. Retrieved from National Center for Victims of Crime. (2011). Cyberstalking. Retrieved from Outspoken Media. (2011). The online reputation management guide. Retrieved from Parness, A. (2012). Copyright basics. Retrieved from Plagiarize In Merriam-Webster.com. Retrieved February 9, 2012, from

Shea, V. (2011). The core rules of netiquette. Retrieved from The College Board. (2012). How to avoid plagiarism: Give credit where credit's due. Retrieved from UITS. (2010). What are viruses, worms, & trojan horses. Retrieved from University of Maryland College. (2011, January 28). Copyright and fair use in the umuc online or face-to-face classroom. Retrieved from Viruses In Merriam-Webster.com. Retrieved February 9, 2012, from Wells, S. (2012, January 16). Choosing a good password. Retrieved from Wired Kids. (2012). Stop cyberbullying. Retrieved from