Presentation is loading. Please wait.

Presentation is loading. Please wait.

Margaret Sherrod ED 505 University of West Alabama Spring

Similar presentations


Presentation on theme: "Margaret Sherrod ED 505 University of West Alabama Spring"— Presentation transcript:

1 Margaret Sherrod ED 505 University of West Alabama Spring 1 2012
Digital Citizenship Margaret Sherrod ED 505 University of West Alabama Spring

2 What is Digital Citizenship?
The idea of helping all technology users understand what is and is not appropriate when using technology.

3 Netiquette on Social Media Sites
Proper internet etiquette Do Don’t Proofread your posts before submitting Give credit if re-tweeting Think before you click Make your profile(s) private Put a link with your posts about a product Feel obligated to follow or friend everyone Comment on every wall post received Post important headlines before checking their credibility Critique other’s grammar or spelling unless asked Type in all caps Test your Netiquette knowledge here!

4 Copyright & Fair Use Copyright
Items that are copyrighted cannot be used without permission from the original creator. Fair use Allows for some copyrighted material to be used without permission. Copyright is the creators protection from their original works being copied while Fair Use gives permission to use these works without getting direct permission from the creator. Click here for more information.

5 Fair Use Media Fair Use Includes but is not limited to print, music, photos and videos. Guidelines: Have you ever wondered why you only hear up to 30 seconds of a song in an iTunes preview? That is because reproduction of videos, music and print is limited to 3 minutes or 10% (the lesser of the two). For poems, one can only use up to 3 poems per poet and can only use poems with 250 words or less. Reproduction of music can happen as long as there are not any changes to the basic melody of the music. Find copyright free media here and here.

6 As defined by plagairism.org
Plagiarism As defined by plagairism.org ‘…turning in someone else's work as your own, copying words or ideas from someone else without giving credit, failing to put a quotation in quotation marks, giving incorrect information about the source of a quotation, changing words but copying the sentence structure of a source without giving credit, copying so many words or ideas from a source that it makes up the majority of your work, whether you give credit or not (see our section on "fair use" rules) (plagiarism.org, 2012).’ Avoiding plagiarism Credit authors within the text For phrases you cannot or do not want to change use quotations (see above definition for example) Use quotations for direct quotes. Paraphrase the summary, and make sure your paraphrase is not similar to the original

7 Recognizing Plagiarism: Sources for Teachers
Plagiarisma Plagiarism Checker Quote Finder DOC Cop Plagiarism Detect Article Checker Turnitin.com

8 Internet Safety: Identity Theft
FACT: About 9 million Americans are victims of having their personal information such as Social Security number, bank account number, credit card information and name stolen. Even by taken preventative steps, you can still become a victim. If your personal information is ever stolen, freeze and/or close all accounts you think they may have access to. Place a fraud alert on all credit cards and contact your local police department. Watch the Lifetime Movie The Michelle Brown Story for a peek into how identify theft can affect you before, during and after you have become a victim. Thieves get your personal information from: Phishing Stealing wallets Looking through garbage for mail with identifying information such as account numbers or credit card offers Prevention: Shred all important documents and applications Combine letters, numbers and symbols in your password Place important information and documents like your Social Security card in a safe place like a safe

9 Identity Theft: Reputation Management
As in ‘real-life’, you have an online reputation. Your online reputation is determined by what you post online whether it be pictures, blog posts, comments, websites you run or videos. As technology advances gaining information about people, is even easier, specifically through Google or other search engines. Many businesses use this a tool following an interview to gain more information. If you find you have a bad online reputation, Mashable Social Media, suggests the following steps: Figure out your online reputation Begin posting content that is positive ‘Create an Identity Hub’ Use online services like Brand-Yourself to help monitor your online reputation

10 Identity Theft: Passwords
Common password tips I have learned: Avoid using your name, birthday or other information that can easily be discovered Avoid using consecutive number series Keep your password to yourself. If you have to share your password with someone, change it soon after. Be creative! Combine letters, numbers and symbols in your password My personal password philosophy: ‘If it’s too easy for me to remember, then it’s too easy for someone else to find out.’

11 Internet Safety: Cyberbullying
“…when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones ( N.D.)’ Proxy cyberbullying involves the bully using others to do the bullying. Sometimes this can involve an adult or another child or children through discussion boards and chat rooms used to ‘gang up on’ the victim. Direct Attack includes: acting like an imposter sending pictures electronically harassing the person through text messages or instant messages. Prevent Cyberbullying by informing students about Digital Citizenship, Netiquette and helping them learn to stand up against bullying of all kind.

12 Internet Safety: Cyberstalking
‘Cyberbullying becomes cyberstalking when an adult and a child are involved in the harassment, embarrassment and torment of the child (stopcyberbullying.org, N.D.).’ Cyberstalking involves ‘…threatening behavior or unwanted advances directed at another using the Internet and other forms of online and computer communications (The National Center for Victims of Crime, 2003).’ Occurs through: Message boards s that are obscene, frequent in number or are threatening Flaming (verbal abuse online) Keeping track of another person’s activity on the internet Effects on victims: Fear Anxiety New sleeping and eating habits Shock

13 Computer Safety Issue Definition Signs of a problem Prevention Viruses
Microsoft defines a virus as ‘…a small software program that spreads from one computer to another computer and that interferes with computer operation.’ They can be spread through instant messages or s. Printing issues Cannot install and antivirus program or it is disabled without your consent Programs disappear Crashing and restarting of the computer Computer freezes or runs slow Up date your computer on a regular basis Install and keep the firewall turned on Install a virus protection program and update regularly Worms Virus that travels through the computer system without help or human aide. They find a file use it to transfer the virus. Copies are made of the file that is infected and may be automatically sent to contacts in your address book. s are sent with files you did not attach Security is reduced and others can access your network

14 Computer Safety Issue Definition Signs of a problem Prevention
Trojan Horses A program that looks like an application or another program, but actually puts a virus on your computer. A program pops up and says it will clean your system of a virus. If you click yes then it actually gives your computer a virus. Don’t agree to any random pop ups that you do not recognize and typical computer updates Phishing When someone sends an claiming to be someone they are not in attempts to gain access personal information Credit card or banks ask you for account information through If it looks or sounds suspicious it probably is so do not click on it If it is an claiming to be your bank or credit card company, call them directly and inform them of the

15 Sources Basu, S. (2009). Plagiarism checkers: 5 free websites to catch the copycats. Retrieved from Federal Trade Commission (N.D.). Fighting back against identify theft. Retrieved from Google Images. ‘Social Media Logos.’ Photo. Google.com. 7 Feb Kessler, S. (2011). How to: Manage your online reputation. Retrieved from McClain, J. (2009). Top 5 free websites for quality copyright free photographs. Retrieved from Microsoft . (2012). Computer viruses: Description, prevention, and recovery. Retrieved from My Lifetime Movie Network (2012). The michelle brown story. Retrieved from Netiquette (2011) Netiquette quiz. Retrieved from PBS Teachers (N.D.) Copyright law and fair use. Retrieved from People (2011). Copyright free and public domain media sources. Retrieved from The American Distance Education Consortium (2002). Fair use guidelines for educational multimedia. Retrieved from Webopedia : Online Computer Dictionary (2012). Definition search. Retrieved from WiredKids (N.D.). Stop cyberbullying. Retrieved from


Download ppt "Margaret Sherrod ED 505 University of West Alabama Spring"

Similar presentations


Ads by Google