Presentation is loading. Please wait.

Presentation is loading. Please wait.

Created by Stephanie Terry (Clayton) EE 505  Netiquette  Copyright and Fair Use  Plagiarism  Safety of the Web  Safety on your Computer.

Similar presentations


Presentation on theme: "Created by Stephanie Terry (Clayton) EE 505  Netiquette  Copyright and Fair Use  Plagiarism  Safety of the Web  Safety on your Computer."— Presentation transcript:

1

2 Created by Stephanie Terry (Clayton) EE 505

3  Netiquette  Copyright and Fair Use  Plagiarism  Safety of the Web  Safety on your Computer

4  Stands for “Internet Etiquette”  Refers to a set of practices that make the internet experience more pleasant.  Primarily concerned with matters of courtesy in communication.

5  Help newbie's  Assist others in working on new areas of the internet.  Research before asking  The World Wide Web is full of information. Be sure to look your question up before asking someone.  Remember emotion  When communicating on the web be especially sensitive to the words you use. Your words are the first and only impression they receive!

6  Be brief  When messaging and emailing others get straight to the point!  Use descriptive subject lines  The subject lines allow individuals to understand why they are receiving the mail.  Stay on-Topic  Be careful sending attachments  There are many virus’s that can be passed from computer to computer through attachments. Be careful sending and receiving items!

7  Replying and Forwarding  Be sure to reply to familiar individuals.  Summarize for the group  There is no need to go into a detailed discussion that lasts 30 minutes when the same information could be given in five.  Acknowledge important communications  It is important to always acknowledge important communication. It is rude to completely ignore others!

8  Never publicize other’s email addresses  Email addresses are personal information. It is wrong to share this information without permission.  Never send what you have not read  By sending something that you have not personally read you are agreeing with the information contained within it.

9  Copyright is a law that gives an individual ownership over things they make.  Example: Poetry, movies, CD-ROMS, video games, paintings, sheet music, recorded music performances, novels, software codes, sculptures, photographs, choreography, and architectural designs.  Fair use is a concept embedded in U.S. law that recognizes that certain uses of copyright-protected works do not require permission from the copyright holder or its agent. These include instances of minimal use that do not interfere with the copyright holder's exclusive rights to reproduce and reuse the work.  Fair use is not an exception to copyright compliance; it is more of a "legal defense." That is, if you copy and share a copyright-protected work and the copyright holder claims copyright infringement, you may be able to assert a defense of fair use which you would then have to prove.

10  Plagiarism is a form of cheating.  The example below will allow you to understand more…  Chris just found some good stuff on the Web for his science report about sharks. He highlights a paragraph that explains that most sharks grow to be only 3 to 4 feet long and can't hurt people. Chris copies it and pastes it into his report. He quickly changes the font so it matches the rest of the report and continues his research.  Plagiarism is when you use someone else's words or ideas and pass them off as your own. It's not allowed in school, college, or beyond, so it's a good idea to learn the proper way to use resources, such as websites, books, and magazines.

11  In this scenario Chris should have written down the name of the website and person who developed the information. By doing this he would have given credit to the original author!

12  Two of the biggest safety issues on the web:  Predators  Individuals lurking online waiting to cause harm. Never give out personal information to anyone online!  Images  There are many great images to use online. There are also many inappropriate images that may appear online. Set up a control on your students computer to keep them from viewing these sites!!!

13  Achieving goof computer security can seem like a daunting task. Here are a few suggestions:  Use antivirus software and keep it up-to-date  Install Security Patches  Use a firewall  Secure your Browser  Take Control of your email  Treat IM Suspiciously  Avoid P2p and Distribution File Sharing  Keep abreast of internet scams  Don’t Fall Victim to Virus Hoaxes

14  You should check for new definition updates daily. Most antivirus software can be configured to do this automatically.  There are many computer professions that will assist in setting this up and teaching you more about it!!

15  Vulnerabilities in software are constantly being discovered and they don't discriminate by vendor or platform. It's not simply a matter of updating Windows; at least monthly, check for and apply updates for all software you use.  For Windows updates, visit the Windows Update CenterWindows Update Center  For all other updates, use the Secunia Software InspectorSecunia Software Inspector

16  No Internet connection is safe without one. Firewalls are necessary even if you have a dial-up Internet connection -- it takes only minutes for a a non-firewalled computer to be infected.

17  Many labor under the dangerous misconception that only Internet Explorer is a problem. It's not the browser you need to be concerned about. Nor is it a matter of simply avoiding certain 'types' of sites. Known, legitimate websites are frequently being compromised and implanted with malicious JavaScript that foists malware onto visitors' computers. To ensure optimum browsing safety, the best tip is to disable JavaScript for all but the most essential of sites - - such as your banking or regular ecommerce sites. Not only will you enjoy safer browsing, you'll be able to eliminate unwanted pop-ups as well.

18  Avoid opening email attachments received unexpectedly -- no matter who appears to have sent it. Remember that most worms and trojan-laden spam try to spoof the sender's name. And make sure your email client isn't leaving you open to infection. Reading email in plain text offers important security benefits that more than offset the loss of pretty colored fonts.

19  Instant Messaging is a frequent target of worms and trojans. Treat it just as you would email.

20  Criminals think of clever ways to separate you from your hard earned cash. Don't get fooled by emails telling sad stories, or making unsolicited job offers, or promising lotto winnings. Likewise, beware of email masquerading as a security concern from your bank or other eCommerce site.

21  Dire-sounding email spreading fear, uncertainty and doubt about non-existent threats serve only to spread needless alarm and may even cause you to delete perfectly legitimate files in response.  There is far more good than bad on the internet. The goal is not to be scared but cautious!

22 Roblyer, M.D. ( 2010). Integrating educational teachnology into teaching. Pearson. http://www.copyright.com/Services/copyright oncampus/basics/fairuse.html http://www.albion.com/netiquette/corerules. html http://encyclopedia2.thefreedictionary.com/P lagirism http://legal- dictionary.thefreedictionary.com/Plagirism http://www.auburn.wednet.edu/mtbaker/libr ary/links/teachers/plagiarism.htm


Download ppt "Created by Stephanie Terry (Clayton) EE 505  Netiquette  Copyright and Fair Use  Plagiarism  Safety of the Web  Safety on your Computer."

Similar presentations


Ads by Google