Download presentation
Presentation is loading. Please wait.
1
DIGITAL CITIZENSHIP What You Should Know!
2
NETIQUETTE Social Media Sites: Netiquette is Etiquette governing communication on the internet (Merriam-Webster) Rules of behavior during discussions and guidelines that reflect the unique electronic nature of the medium
3
The Do’s of Netiquette What Should You Do? Identify yourself with a salutation and signature. Respect others’ privacy. Respond to messages in a timely manner. Keep messages concise. Use appropriate language using good grammar and spelling. Include a subject line in s.
4
The Do Not’s of Netiquette
What You Should Not Do You should not be rude. You should not repeat messages. You should not copy everyone on every messages. You should not use Spam. You should not use sarcasm.
5
COPYRIGHT & FAIR USE Copyright & Fair Use Copyright is: Exclusive legal rights to reproduce, publish, sell, or distribute the matter and form of something else (merriam-webster) . Fair Use is the legal doctrine that portions of copyrighted materials may be used without permission of copyright owner provided the use is fair and reasonable (merriam-webster).
6
COPYRIGHT VERSUS FAIR USE
Copyright VS. Fair Use Copyright prohibits the use of materials (reproduction of, selling of, and publishing). Fair Use is an exception of the Copyright Act. It gives permission to use small amounts of materials in a fair and reasonable manner.
7
FAIR USE RULES Fair Use Rules, in Section 107 of the Copyright Law sets 4 factors to be considered in determining whether or not a particular use is fair: The purpose and character of use (whether for commercial use or nonprofit educational purposes). The nature of the copyright work The amount and substantiality of the portion used in relation to the copyright work as a whole. The effect of the use of upon the potential market for the copyright work, whether you used the work to create something new (U.S. Copyright Office).
8
PLAGIARISM Plagiarism is to steal and pass off the ideas and words of another as one’s own. To use another’s production without crediting the source. To present as new and original an idea or product derived from an existing source (Merriam- Webster).
9
How To Avoid Plagiarism
Put everything in quotations that comes exactly from the source. Summarize/Paraphrase in your own words. Compare your summarization to the original source.
10
Ways Teachers Recognize and Stop Plagiarism
Teachers can teach students what it means to plagiarize. Teachers can explain what is allowed/not allowed. Teachers can stress how and why it is wrong to Teachers can use different sites to check for plagiarism such as Turnitin, Plagiarism Checker, and Article Checker. Teachers can prevent plagiarism simply by using these websites.
11
INTERNET SAFETY Internet Safety includes: Identity Theft Reputation Management Passwords, Cyberstalking, and Cyberbullying.
12
IDENTITY THEFT Identity theft occurs when someone uses your Personally identifying information such as your name, address, social security number, credit/bank cards, etc. without your permission to commit fraud or other crimes. You can prevent identity theft by not giving out your credit card information, and social security number over the internet/phone unless they have a secure site/phone line.
13
REPUTATION MANAGEMENT
Reputation Management is the process of tracking an entity’s actions and other entities’ opinions about those actions. Activities performed by individuals or organizations which attempt to maintain or create a certain frame of mind regarding themselves in the public eye. A good digital reputation is achieved by blogging, social networking, etc. (Merriam- Webster).
14
PASSWORDS Passwords are secret words or phrases used to gain admission to something. A good practice to do is change your password often. Create good strong passwords that you can remember. DO NOT use the same password for everything.
15
CYBERBULLYING Cyberbullying is bullying using electronic forms of contact Intended to hurt people. We should educate kids about consequences. Teach kids to respect others. Take a stand against bullying of all kinds.
16
CYBERSTALKING Cyberstalking is a crime which an attacker harasses a victim using electronic communication such as or instant messaging. You should remain anonymous Create a different online name Set program filtering
17
SAFETY ON YOUR COMPUTER
Safety on your computer includes: Viruses, Phishing, Trojan Horses, and Worms
18
VIRUS A virus is a written program written with harmful intent. Viruses are: Able to spread through attachments and download files. Able to appear in several ways. Named according to how they work. In order to protect yourself, you should keep virus software up to date. Download only well-known sites. Never open attachments from unknown senders.
19
PHISHING Phishing is an fraud method which the guilty party sends out s that look real in an attempt to collect one’s personal information. Prevention: Be cautious of spam Communicate personal information through secure sites or by phone. Do not download files, open attachments, or click on links from unknown senders Beware of pop-ups (“Prevent Phishing Scams”,).
20
TROJAN HORSES Trojan Horses are programs in which a harmful code is contained inside apparently harmless data. Prevention: Use only reliable Trojan horse software
21
WORMS Worms are programs that replicate itself over a computer network. Able to use computer resources to shut the system down. Prevention: Use only security software and security scanning (Webopedia)
22
THE END
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.