Download presentation
Presentation is loading. Please wait.
Published byAnnabelle Mitchell Modified over 9 years ago
1
By: Catherine Tingle
2
What is it? Netiquette refers to appropriate and safe interactions online.
3
Do’s and Don’ts “Don't SHOUT in all caps. Remember: The person on the other end of a digital communication can't see your expression or hear your tone of voice. Cool off before responding to messages in anger. Check messages for misspellings or misstatements. Respect others' privacy and your own (for example, don't give your number to that new MySpace friend). Use a clear and understandable email subject line. Adjust your tone and style to the situation (for example, don't use IM-speak or all lowercase letters in an internship application). Don't forward private messages to people they weren't intended for or copy others on replies to personal messages. Remember: Email is never really private and a copy may exist in cyberspace... forever.”
4
According to Dictionary.com:Dictionary.com Copyright- is "the legal right granted to an author, a composer, a playwright, a publisher, or a distributor to exclusive publication, production, sale, or distribution of a literary, musical, dramatic, or artistic work." Fair Use- is “the conditions under which you can use material that is copyrighted by someone else without paying royalties “
5
Fair use limits the amount of time or the type of copyrighted multimedia materials that one can use. Copyrighted material belongs to those designated as having legal rights to the material, and in order to use this material legally you must gain permission unless you are using appropriate fair use policies.
6
Fair Use Rules for Multi Media Teachers can use copyrighted materials for instructional purposes when personally instructing students, student directed self study, presentations at peer workshops, and for personal interviews related to work Students can use copyrighted materials for educational uses, portfolios, and personal uses for interviews related to work or higher education.
7
According to dictionary.com Plagiarism is “the unauthorized use or close imitation of the language and thoughts of another author and the representation of them as one's own original work, as by not crediting the author.”
8
Most plagiarism is accidental. Using online cites to check for plagiarism can be an asset to help prevent plagiarism. Plagiarism Checker Cites http://plagiarisma. net/ http://plagiarisma. net/ http://www.plagiari smchecker.com/ http://www.plagiari smchecker.com/ https://www.writec heck.com/static/ho me.html https://www.writec heck.com/static/ho me.html http://www.plagiari smdetect.com/ http://www.plagiari smdetect.com/
9
Identity Theft Reputation Management According to dictionary.com identity theft is “the fraudulent appropriation and use of someone's identifying or personal data or documents, as a credit card.” Reputation management refers to how you are perceived by others. On the internet you should be careful what you post so others do not have a poor opinion of you.
10
Passwords The longer the password the harder it is to hack. Use a combination of letters, numbers, and symbols. Don’t share your password with anyone. Don’t use the same password for several different accounts. Keep your passwords in a safe, secure place.
11
Cyber BullyingCyber Stalking When someone is targeted and harassed by another through the internet or other digital means. Using the internet or digital means to stalk or harass an individual.
12
VirusesPhishing Scam artist try to trick you into downloading viruses or malware. This can cause your computer to do unusual things such as run slowly, shut down unexpectedly, open pages you did not intend to be opened. If your computer is infected disconnect it from the internet immediately. When internet frauds trick you into giving your personal information this is called phishing. To avoid phishing delete emails or posts requesting personal information. Don’t email financial or personal information. Be careful about opening attachments Check your accounts frequently to ensure that no unauthorized activity is present.
13
Trojan HorsesWorms A trojan horse is a type of malware that is hidden in often legitimate software or documents that once installed infects other files. A worm is a stand alone malware that duplicates itself for the purpose of spreading to other computers.
14
copyright. (n.d.). Dictionary.com Unabridged. Retrieved March 30, 2012, from Dictionary.com website: http://dictionary.reference.com/browse/copyrighthttp://dictionary.reference.com/browse/copyright fair use. (n.d.). WordNet® 3.0. Retrieved March 30, 2012, from Dictionary.com website: http://dictionary.reference.com/browse/fair use http://dictionary.reference.com/browse/fair use Federal Trade Commission. Be Safe, Retrieved April 2, 2012, from On Guard Online.gov website http://www.onguardonline.gov/ http://www.onguardonline.gov/ identity theft. (n.d.). Dictionary.com Unabridged. Retrieved March 30, 2012, from Dictionary.com website: http://dictionary.reference.com/browse/identity thefthttp://dictionary.reference.com/browse/identity theft National Center for Missing & Exploited Children. Retrieved April 2, 2012. Learn With Clicky. http://www.netsmartzkids.org/LearnWithClicky. http://www.netsmartzkids.org/LearnWithClicky plagiarism. (n.d.). Dictionary.com Unabridged. Retrieved March 30, 2012, from Dictionary.com website: http://dictionary.reference.com/browse/plagiarismhttp://dictionary.reference.com/browse/plagiarism Starr, Linda. Education World®. Retrieved March 30, 2012, from education world.com website: http://www.educationworld.com/a_curr/curArticle Copyright © Education Worldr280d.shtml 5/25/2010 http://www.educationworld.com/a_curr/curArticle Weir, Laila. Behaveyourself.com: Online Manners Matter. Retrieved March 30,2012, from edutopia.org website: http://www.edutopia.org/whats-next-2008-netiquette-guidelineshttp://www.edutopia.org/whats-next-2008-netiquette-guidelines
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.