Download presentation
Presentation is loading. Please wait.
Published byJoanna Porter Modified over 8 years ago
1
Digital Citizenship Project Justin Lann
2
Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks ranging from blogs to emails to forums
3
Rules for Social Netiquette Spell check and proofread everything All caps are a no-no Tell the truth Don’t do things online you would not do in reality Don’t use personal insults Don’t follow pop-up links Be Conservative Do not send emails late at night that will call your lifestyle into question
4
Copyright The exclusive legal right given to an originator or an assignee to print, publish, film or record literacy, artistic, or musical work
5
Fair Use Limits the amount of data that can be copied from a copyrighted idea over a certain amount of time
6
Difference in copyright and fair use Fair use gives me the right to use certain information given I have met a certain criteria – Professional use – Criticize – Education
7
Plagarism Wrongful appropriation, close imitation of another authors language, thoughts or work An attempt to pass another's work off as your own original thoughts
8
To avoid Plagiarism Cite another's work when using it Don’t attempt to pass work that is not yours off as your own work Have original ideas Complete research to ensure original work
9
To Catch Plagiarism Several websites dedicated to catching plagiarism – www.plagiarism.org – www.checkforplagiarism.net – www.writecheck.com www.writecheck.com
10
Safety on the Internet Internet is a useful resource that can become dangerous some of the dangers are listed below – Identity theft – Cyberbullying – Cyberstalking – Reputation management
11
Identity Theft Personal information is stolen and used with out your consent Ways to prevent Identity theft – Lifelock – Using secure websites – Never give out your passwords – Never give out your usernames – Use a variety of passwords – Use a variety of usernames – Keep usernames and passwords in a safe place
12
Identity Theft – Never give out personal information over the internet – Never give out credit card information – Use private computer whenever possible
13
Reputation Management A process for reporting reputation Used for many types of business and personal concerns Such As – Interpersonal Relationships – International Diplomacy – Stock Market – Public Relations – Sports
14
Cyber bullying Bullying which occurs over the world wide web Hurtful and harmful events occur cause of cyber bullying – Using any of the social media sites to harm another – Most cyber bullying occurs on Facebook – Cyber bullying is associated with minors – Children have killed each other and committed suicide after having been involved in a cyber bullying incident.
15
Prevention of Cyber Bullying Educating the kids about the consequences Losing their ISP or IM accounts Teaching them to respect others To take a stand against bullying of all kinds
16
Cyber Stalking Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual or a group of individuals threatening behavior or unwanted advances directed at another using the Internet and other electronic devices
17
Prevention of Cyber Stalking Do not share personal information (real name, address, phone number, school information, marital status, occupation, income or passwords) in public spaces anywhere online, nor give it to strangers, including in email or chat rooms. Do not use your real name or nickname as your screen name or user ID. Pick a name that is gender-and-age neutral. Do not post personal information as part of any user profiles. Some filtering software programs can prevent children from posting or emailing an address, telephone number, or credit card number
18
Safety on your Computer Virus – a self replicating program that uses your own programs to infiltrate your computer Worm – same as a virus except it already has all the code needed to infiltrate your computer and does not have to use your programs against you Trojan Horse – malware that masquerades as a legitimate program but in reality is a malicious application that can be spread to many machines Phishing – an attempt to gain personal information by posing to be a trustworthy entity
19
Ways to be safe on your computer Antivirus programs Firewalls Do not open unknown emails Spyware programs Internet protection programs
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.