Download presentation
Presentation is loading. Please wait.
Published byCollin Johnston Modified over 9 years ago
1
Technology and Education Fall 2011
2
Netiquette is basically the way you should and should not behave on the Internet. Social Media Netiquette takes it one step further and talks about what you should not do on social media websites such as Facebook, Twitter and blogs.
3
Do: 1.When using Facebook, go to your private setting and click, “Friends Only. 2. Twitter only about the issues concerning the topic. 3.
4
A copyright is a property right attached to an original work of art or literature. It grants the author or creator exclusive rights to reproduce, distribute, adapt, perform, or display the protected work. Other than someone to whom the author/creator has extended all or part of these rights, no one else may use, copy, or alter the work. Wrongful use of the material gives the copyright owner the right to seek and recover compensation in a court of law. A copyright gives the author or owner the right of control over all forms of reproduction, including photocopies, slides, recordings on cassettes and videotapes, compact disks, and other digital formats. Fair use explicitly allows use of copyrighted materials for educational purposes such as criticism, comment, news reporting, teaching, scholarship, and research.
5
Copyright - Law. Applies universally in the United States. Fair Use - Also Law. But it is used as a defense to Copyright Infringement claims. Usable on a case-by-case basis of alleged infringement to determine if infringement actually occurred. One tells you what you CAN'T do. The other gives the exceptions (what you MIGHT be able to do, dependent on the circumstances at hand.) Fair Use is complicated, and only applies absolutely on a case- by-case basis. Basically, it allows exceptions to be able to reproduce part of a work, for purposes of criticism, comment, news reporting, teaching, scholarship, and research. Parody and satire is often considered part of criticism.
6
Work or Materials to be used for Educational Purposes Fair Use Restrictions for Face-to- Face Teaching Chapter in a book Single copy for teacher for research, teaching, or class preparation. Multiple copies (one per student per class) okay if material is (a) adequately brief, (b) spontaneously copied, (c) in compliance with cumulative effect test. Copyright notice and attribution required. Newspaper/magazine article Prose, short story, short essay, Web article Same as above. Multiple copies of complete work of less than 2,500 words and excerpts up to 1,000 words or 10% of work, whichever is less. For works of 2,500-4,999 words, 500 words may be copied. PoemSame as for first item. Multiple copies allowed of complete poem up to 250 words -- no more than two printed pages. Multiple copies of up to 250 words from longer poems. Artwork or graphic image - chart, diagram, graph, drawing, cartoon, picture from periodical, newspaper, or book, Web page image Same as for first item. No more than 5 images of an artist/photographer in one program or printing and not more than 10% or 15% of images from published collective work, whichever is less. Motion media - film and videotape productions Single copy of up to 3 minutes or 10% of the whole, whichever is less. Spontaneity required.
7
Work or Materials to be used for Educational Purposes Fair Use Restrictions for Face-to- Face Teaching Music -sheet music, songs, lyrics, operas, musical scores, compact disk, disk, or cassette taped recordings Single copy of up to 10% of a musical composition in print, sound, or multimedia form. Broadcast programsSingle copy of off-air simultaneous broadcast may be used for a period not to exceed the first 45 consecutive calendar days after recording date. Use by only individual teachers. Copyright notice required.
8
Plagiarism is the act of presenting another person's work (including ideas, writing, conversation, song, and words) as your own. When using another person's work, even when paraphrasing, you must acknowledge it fully and appropriately, unless the information is common knowledge. Proper acknowledgement requires citing sources.
9
Plagiarism CheckerPlagiarism Checker - A free online service which searches for originality (or lack of it) using a few phrases taken from different parts of the document. Article CheckerArticle Checker- A very similar plagiarism detection tool which checks for duplicate content using either Google or Yahoo. Plagiarism Detect- This is a full-featured web service with a free and a paid option. The free option requires a signup and gives us an upload of Doc or Text files (or paste contents in a text area) and basic duplicate checking.Plagiarism Detect Quote FinderQuote Finder- This is a very simple content checking aid from Google Blogoscoped; a site which unofficially covers Google related news. DOC CopDOC Cop- This free web service offers the option of a File Check and a Web Check.
10
Identity theft is a specific type of fraud, which involves stealing money or gaining other benefits by pretending to be someone else. Identity theft can be devastating both financially and emotionally. Your digital reputation is made up of everything you post, say and do, online. People judge you based on what you load up on websites and how you communicate. Because content that's posted online can be there forever, you could well be judged on how you behaved as a child well into your adult years. For example, photos and comments your child posts today may be seen by future employers. Choose a password that is simple yet sophisticated enough to keep your access restricted from others. Do not use a social security number or phone number.security Online stalkers or cyberstalkers use the internet or another form of electronic communication persistently to cause another person to feel apprehension or fear. Online stalking is serious and should be referred to police or independent legal advisors. Cyberbullying is when technology like SMS, email, social networking or chat is used to threaten, exclude, intimidate or humiliate a child. To help stay safe, children need to learn how to use these services positively and what to do if they are the target of cyberbullying.
12
Source: http://www.guidetoonlineschools.com/article s/tips-and-tools/plagiarism- piracy#ixzz1WnYjrBGy http://www.guidetoonlineschools.com/article s/tips-and-tools/plagiarism- piracy#ixzz1WnYjrBGy Read more: Internet Password Security and Personal Safety Tips | eHow.com http://www.ehow.com/list_6513267_intern et-security-personal-safety- tips.html#ixzz1WnftKOl0Internet Password Security and Personal Safety Tips | eHow.com http://www.ehow.com/list_6513267_intern et-security-personal-safety- tips.html#ixzz1WnftKOl0
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.