Digital Citizenship Project By: Tierra Collins EDU 505
Netiquette on Social Media Sites O Social Media Netiquette- is the social code for using social media.
Netiquette continued Do’s Don’ts O Share accurate info O Correct mistakes O Show love O Respect privacy O Everything in moderation O Cite references O Be brief as possible O Put your best foot forward O Be authentic O Invite with care O Don’t lie O Don’t hate O Don’t curse O Don’t disrespect O Don’t be rude O Don’t tag bad photos of friends O Avoid sarcasm
Copyright & Fair Use O Copyright- is a form of protection given to authors of creative works like music, movies, books, and photographs. O Fair Use- It’s the use of copyrighted material without the authorization of the owner for an expressive purpose.
Fair Use Rules O Print-you can use without the creator’s permission up to 10% or 1000 words, whichever is less of a single copyrighted work of text O Music- you can use without the creator’s permission up to 10% or no more than 30 seconds of a song or musical work O Video-you can use without the creator’s permission up to 10 % or 3 minutes of copyrighted videotapes, DVDs, encyclopedias on CD-ROM O Photographs-You can use without the creator’s permission five or less by the same photographer
What is Plagiarism? O Plagiarism is claiming that you are the author of someone else’s work. O How can it be avoided? O Use Quotations O Paraphrase
How does technology help in stopping plagiarism? O List of Detection Tools O O O O O hecker/ hecker/ O
Safety on the Internet O Identity Theft- is when someone uses your personally identifying information to commit fraud or other crimes. O Reputation Management- Reputation management is the practice of attempting to shape public perception of a person or organization by influencing online information about that entity. O Passwords- Make sure they are very strong. O Cyber bullying- is bullying that takes place using electronic technology. O Cyber stalking- a crime in which the attacker harasses a victim using electronic communication.
Safety on your Computer O Viruses- A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. O Phishing- when thieves pretend to be financial institutions or companies and send spam or pop-up messages to get you to reveal your personal information. O Trojan Horses- known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. O Worms- spread from computer to computer and it has the capability to travel without any human action.
References O Beal, V. (2011, March 29). The difference between a virus, worm, and trojan horse. Retrieved from net/2004/virus.asp O Chiles, D. (2011, August). Netiquette on social media sites. Retrieved from O Fighting back against identity theft: Federal trade commission. (n.d.). Retrieved from /consumers/about-identity-theft.html O Quick guide fair use. (n.d.). Retrieved from _guide_fair_use.pdf
References O Rouse, M. (2011, October). Reputation management. Retrieved from managementhttp://whatis.techtarget.com/definition/reputation- O Rouse, M. (2007, June). Cyberstalking. Retrieved from ng O Samuel, A. (n.d.). 25 rules of social media netiquette. Retrieved from social-media-netiquettehttp:// O The Pennsylvania State University. (2012, September). Copyright, fair use, and the libraries. Retrieved from airuse.html O What is cyberbullying. (n.d.). Retrieved from it/index.html