Download presentation
Presentation is loading. Please wait.
1
Digital citizenship -erin anderson
2
What is netiquette? Merriam Webster’s Online Dictionary defines netiquette as the etiquette governing communication on the Internet. The Golden Rule of Netiquette: Do unto others on-line as you would have done to you. Do: Don’t: *Proofread & spell check *Use all caps (it looks like shouting) *Tell the truth *Flame or respond to flames *Be yourself *Spam or follow pop-ups/spam links *Be conservative *Send at night (one might question your *Use discretion- lifestyle nothing is private (
3
Copyright and fair use Merriam-Webster’s Online Dictionary defines copyright as the exclusive legal right to reproduce, publish, sell, or distribute the matter and form of something (as a literary, musical, or artistic work). Fair Use is defined as a legal doctrine that portions of copyrighted materials may be used without permission of the copyright owner. The following rules must be followed: the use is fair and reasonable, does not substantially impair the value of the materials, and does not curtail the profits reasonably expected by the owner . What is the difference? Copyright laws outline what one cannot do with other people’s works and the fair use laws are used as explanations for what one can do, within reason.
4
Plagiarism According to Merriam-Webster Online Dictionary, a work that has been plagiarize has been stolen and passed off (the ideas or words of another) as one's own, or to use (another's production) without crediting the source. Plagiarism.org advises following these tips to avoid plagiarism: Become aware of the reasons plagiarism occurs Identify different forms of plagiarism Integrate plagiarism prevention techniques into your courses Cite sources properly Using a site, such as can help students avoid plagiarism in their papers.
5
Plagiarism (cont.) Teachers can use the following sites to check student work for plagiarism: Purdue OWL Website Doc Cop Google Using these tools is simple. Teachers type in a portion of a student’s text and it is checked for similarities to other works.
6
Safety on the internet Identity Theft:
Protecting your identity (social security number, credit card information, bank accounts) from being stolen is extremely important. Makeuseof.com makes the following suggestions for avoiding identity theft: Watch out for phishing web sites. Use anti-virus/anti-malware programs. Use open DNS. Create unique passwords for every site. Shop only at reputable web sites. Don’t divulge too much personal information via social media. Monitor your credit profile. Secure your wireless network. Only download software from reputable sources.
7
Safety on the internet Reputation Management:
Companies set out to build or recover a positive reputation for companies/businesses via tools on the Internet. Brick Marketing is a company that provides reputation management services by doing the following : Building the reputation of a business Maintaining good image Recovery- working to hide a bad reputation with good marketing and self- promotion (blogging, directory listings, direct reviews, online publicity, and social networking)
8
Safety on the internet Passwords:
You should always different passwords for different web sites. Google makes the following suggestions for creating passwords: Use unique passwords for all important accounts. Use a long password. Mix letters, numbers, and symbols. Use phrases only you know. Password recovery options should be up to date and secure. Keep reminders in a safe place that is not easily visible. Add an extra layer of security, if possible. You can use the following password managers: Ipassword, LastPass, Clipperz, Roboform
9
Safety on the internet Cyber bullying:
What is it? Bullying that takes place using electronic technology- cell phones, computers, tablets (social media sites, text messages, chats, and websites). Examples of cyber bullying: Mean texts or s Rumors sent by or posted on social network sites Embarrassing pictures, videos, websites, or fake profiles Effects of cyber bullying: Use of alcohol or drugs Skipping school Experiencing in-person bullying Unwilling to attend school Receive poor grades Have lower self-esteem More health problems (
10
Safety on the internet Cyber stalking:
Cyberguards.com states that cyber stalking is the use of internet, , or other electronic communications devices to stalk another person in a threatening or harassing manner. Prevention of cyber stalking: Do not share personal information in public spaces anywhere online. Be extremely cautious about meeting on-line acquaintances in person. Meet in public and bring a friend along. If a situation online becomes hostile, log off or surf elsewhere. Contact law enforcement if you are in fear.
11
Safety on your computer
Viruses: A virus is a program that spreads by first infecting files or the system areas of a computer or a network router’s hard drive and then making copies. Use anti-virus software Back up your data to a disk or flash drive Perform virus scans before opening files Worms: A worm is a type of virus that can spread without human interaction. It spreads from computer to computer and takes up valuable memory and network bandwidth which can cause a computer to stop responding. It allows attackers to gain access to your computer remotely.
12
Safety on your computer
Trojan Horse: A computer program that hides a virus or other potentially damaging program. Trojan horses are often hidden in free software downloads and attachments.
13
Safety on your computer
Phishing: Microsoft defines phishing as: online identity theft uses and fraudulent websites that are designed to steal your personal data or information such as credit card numbers, passwords, account data, or other personal information. Microsoft provides the following suggestions to avoid phishing: Don’t click on links in s. Type addresses directly into your browser/use personal bookmarks. Check site’s security certificate before you enter personal or financial information. Don’t enter personal or financial information into pop-up windows. Keep your computer software current with the latest security updates.
14
List of websites: is-reputation-management.htm
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.