Download presentation
Presentation is loading. Please wait.
Published byWilla Robertson Modified over 9 years ago
2
Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your grammar and spelling. - Correct other’s grammar or spelling without consent. - Make your profiles private - Say anything you will regret - Think before your submit- Post anything you wouldn’t want anyone to see. - Connect with others
3
Fair use- when you copy material that is under a copyright and use it to criticize, comment on, or parody (Stanford, 2010). - Examples: quoting a line from a song, summarizing a news report, and copying some paragraphs from an article. Copyright- a type of protection by the US Constitution that protects original work by an author (Copyright.gov, 2006).
4
Similarities Differences Both protect rights for original works. Copyright tells you what you cannot do. Fair Use tells you the exceptions to use original works that are copyrighted. Copyright is the law. Fair use is the loophole to the law.
5
Motion MediaUp to 3 minutes or 3% Text Media1,00 words or 10% Music, Lyrics, Music Videos No more than 30 seconds or up to 10%. Illustrations or Photographs No more than 5 pictures from one person Numerical Data Sets 2,500 fields or cell entries or up to 10% Copying of an Instructors Multimedia Project No more than two copies (Maryland, 2011)
6
What is it? - Using someone else's work as your own. - Using work that has not been cited. - An act of fraud. (What is Plagiarism, n.d) How can you avoid it? - Cite the sources that you get your information from. - Helpful website on citing: http://owl.english.purdue.edu/owl/search2.php
7
The following websites are available to help teachers find plagiarized materials: - http://www.canexus.com/eve/http://www.canexus.com/eve/ - http://www.paperbin.com/http://www.paperbin.com/ - http://www.plagiarism.org/http://www.plagiarism.org/ - http://www.turnitin.com/en_us/homehttp://www.turnitin.com/en_us/home The websites look for commonly used words and phrases as well as copyrighted photography.
8
On the Internet
9
When someone takes your personal information such as your social security number, name, or credit card number without you knowing (Federal Trade Commission, n.d.)
10
How They Do It How to Protect Yourself Changing your address Stealing Dumpster Diving Phishing Skimming- stealing credit card numbers by using a special machine. Pretexting- lying to services (cable, telephone, etc) to get your information. Be aware Educate those around you Pay close attention to everything associate with your name so you can detect a change Go to the FTC website at: http://www.ftc.gov/bcp/edu/microsites/idtheft//c onsumers/about-identity-theft.html
11
How you look online to others. Can be a person, business, animals, locations or materials. Your reputation on the internet could show anything from your age to your mortgage payment (Reputation, 2012) To find out your internet reputation click on this link: http://www.reputation.com/http://www.reputation.com/
12
Tips for making your passwords secure: - Have more than one password - Don’t give your password to anyone - Make it easy for you to remember, but hard for people to guess. - Use symbols ($^#%) - Have at least 8 characters in your password. (Tech Parenting Group, 2011)
13
When someone, usually a preteen, child, or teen, is targeted buy a peer on the internet. Can include embarrassment, harassment, threats, or other bullying characteristics (WiredKids, n.d.) Best way to prevent is to teach youth about it and how to stop it. Visit http://www.stopcyberbullying.org/index2.ht ml for more information. http://www.stopcyberbullying.org/index2.ht ml
14
When one person uses the internet or computer to make unwanted advances or makes threats toward another person (The National Center for Victims of Crime, 2011). Effects of cyber stalking: - Nightmares - Anxiety - Fear for safety - Shock
15
On Your Computer
16
A small type of software that connects itself to other things on your computer. When you open the programs or files it is on, it multiplies (Brian & Fenlon, 2012). How to know your computer has a virus: - Crashes a lot - Corrupted message - Browser looks different.
17
A type of stealing that is done by putting a software on your computer through a virus or stealing off your computer (Microsoft, 2012). Phishing emails have the following qualities: - Bad grammar - Spelling issues - Links - Threats - Stealing a popular company’s name. (Microsoft, 2012)
18
A part of a computer virus that puts a harmful code in your computer (Search Security, 1998) How to prevent a Trojan horse virus: - Don’t download anything from strangers - Make sure you know what a file is before opening it. - Don’t think you are safe because you have an antivirus software.
19
Programs that can move across network connections. Similar to viruses but spread differently (Virusall.com, 1997). Can be spread through the following applications: - Emails - Instant Messaging - Internet - File-sharing - IRC Worms (Computer Worm, 2012)
20
N/A (2012). No Title. Retrieved from www.dictionary.com Doyle, A. (2012). Top 10 social media do’s and don’ts. Retrieved from http://jobsearch.about.com/od/onlinecareernetworking/tp/socialmediajobsearch.htm Stanford University Libraries (2012). What is fair use? Retrieved from http://fairuse.stanford.edu/Copyright_and_Fair_Use_Overview/chapter9/9-a.html U.S. Copyright Office (2006). Copyright in general. Retrieved from http://www.copyright.gov/help/faq/faq-general.html#what University of Maryland (2011). Copyright and fair use in the UMUC online face-to-face classroom. Retrieved from http://www.umuc.edu/library/libhow/copyright.cfm#multimedia_types What is Plagiarism? (n.d.). Retrieved from http://www.plagiarism.org/ Suarez, J., Martin, A. (2001). Internet plagiarism: A teacher’s combat guide. Contemporary Issues in Technology and Teach Education, 1(4). Retrieved from http://www.citejournal.org/vol1/iss4/currentpractice/article2.htm Federal Trade Commission (n.d.) Fighting back against identity theft. Retrieved from http://www.ftc.gov/bcp/edu/microsites/idtheft//consumers/about-identity-theft.html Reputation.com, Inc (2012) Take your free reputation snapshot. Retrieved from www.reputation.com Tech Parenting Group (2011). Tips for strong, secure passwords. Retrieved from http://www.connectsafely.org/Safety-Tips/tips-to-create-and-manage-strong-passwords.html WiredKids, Inc (n.d.) STOP cyberbullying. Retrieved from http://www.stopcyberbullying.org/index2.html The National Center for Victims of Crime (2011). Cyberstalking. Retrieved from http://www.ncvc.org/ncvc/main.aspx?dbName=DocumentViewer&DocumentID=32458 Brian, M & Fenlon, W (2012). How computer viruses work. Retrieved from http://www.howstuffworks.com/virus.htm Microsoft (2012). How to recognize phishing email messages, links, or phone calls. Retrieved from http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx Search Security (1998). Trojan Horse Attacks. Retrieved from http://www.irchelp.org/irchelp/security/trojan.html#prevent VIRUSALL.COM (1997). Information. Retrieved from http://virusall.com/computer%20worms/worms.php Computer Worm (2012). What is a computer worm? Retrieved from http://computerworm.net/
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.