Download presentation
Presentation is loading. Please wait.
Published byCora Hicks Modified over 8 years ago
1
Technology Safety By: Stefanie Weston
2
Netiquette Dos and Don’ts for Children Do Respect the topic that is being discussed. Be polite and make friends Be a good listener Use nice words Don’t Harass Other People No Flooding (writing the same thing over and over) Don’t say ugly or gross things Don’t post websites NEVER give out personal information Don’t get offended How you should perform in a chat room or forum.
3
Copyright Copyright is a protection given to authors to protect their original work put in to place by the government of the United States. Copyright includes anything published or unpublished such as prints to anything pertaining to the media. You can obtain copyright to anything that you create on your own.
4
Fair Use The purpose of fair use was intended to allow others to use material that has a copyright for research, news reports or education. Fair Use does not mean that you are able to take someone’s copyrighted work and use it as your own in a news broad cast or education course. It is an aid to help you understand the information.
5
Copyright vs. Fair Use What is the difference between copyrights and fair use? Copyright is when you claim the rights to a document or media source. It is your own work and you are the sole author. Fair Use is when you use others copyrighted work to aid in research or the need to use others work legally. You are not coping their work however using it as an aid.
6
Fair Use Rules in Media A chapter from a book (never the entire book). An article from a periodical or newspaper. A short story, essay, or poem. One work is the norm whether it comes from an individual work or an anthology. A chart, graph, diagram, drawing, cartoon or picture from a book, periodical, or newspaper. Poetry Copies of a poem of 250 words or less that exists on two pages or less or 250 words from a longer poem. Prose Copies of an article, story or essay that are 2,500 words or less or excerpts up to 1,000 words or 10 percent of the total work, whichever is less. Illustrations Copies of a chart, graph, diagram, drawing, cartoon, or picture contained in a book or periodical issue (U.S. Copyright Office, 2009, p. 6). Retrieved from:http://www.umuc.edu/library/libhow/copyright.cfm.September 7,2012 http://www.umuc.edu/library/libhow/copyright.cfm
7
Plagiarism Plagiarism is when you deliberately copy another's work and claim it as your own. The easiest way that you can avoid plagiarizing someone else's work is give credit to the author anytime you pull information from a source. The internet can be a great resource for teachers to help protect against plagiarism. There are many sites that check the internet to see if the information given has been plagiarized.
8
Internet Safety Identity theft is when someone has wrongfully taken or used your personal information. One way to protect yourself from this crime is to NEVER give out personal information over the internet or phone. You have an online reputation if you use the internet. You should be very careful about the information that you post on the internet about yourself. This molds your online reputation. Sad to say but there are people out there to steal your password. A technology whiz, once told me not to use my birthday name or any real word as my password. Instead I should pick a phrase and then choose only the first letter. Ex. (Phrase) My anniversary is on August 1 (Password) maioa1. Having a password that is this unique really limits hackers abilities to crack the code to your password. Cyberbullying is the repeated use to purposefully put someone down or hurt them verbally. This makes it tougher to locate the source of the bully. Cyberstalking is when the bullying escalates to a more intense level. The stalker tries to attempt to physically meet up with the victum.
9
Protect your Computer Viruses are easy to get but can damage your computer and cause costly repairs. Use Virus protection programs Secure your browser Use a firewall Don’t fall for scams (email or online) Phishing is when someone tries to get you to open an email providing information that may really connect to you and seem like it is a legitimate source. Trojan horses is a type of malware. It can be a benign program that has malicious intent. It is easy to get on because it poses as a program that is safe. Worms send copies to others within a network. These can damage your computer. The main thing to remember is only open items from sources that you trust.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.