Presentation is loading. Please wait.

Presentation is loading. Please wait.

Donette Mullinix ED 505 UWA Clipart: www.microsoft.com.

Similar presentations


Presentation on theme: "Donette Mullinix ED 505 UWA Clipart: www.microsoft.com."— Presentation transcript:

1 Donette Mullinix ED 505 UWA Clipart: www.microsoft.com

2 According to www.digitalcitizenship.org:www.digitalcitizenship.org “the norms of appropriate, responsible behavior with regard to technology use” Areas to address  Netiquette on Social Media Sites  Copyright and Fair Use  Plagiarism  Safety on the internet  Safety on your computer

3 On Social Networks… Do  Tell the truth  Share lots  Stay positive  Google before you share  Respect others privacy Don’t  Hate  Curse or swear  Disrespect  Take it personally  Invite everyone (networketiquette.com) For emailing/messaging…  Identify yourself  Include subject line  No sarcasm  Respect privacy by not forwarding emails and addresses  Acknowledge and return messages promptly  No spam!  Use appropriate language  Use appropriate intensifiers to indicate meanings (Robyler & Doering, 2010)

4 GREAT teaching site with animated quiz: www.cyberbee.com  Copyright: “law of the U.S. that protects authors, composers, and others from being used without permission” (cyberbee.com)  Fair Use: “protects the rights of the public to limited use of copyrighted materials” (cyberbee.com) (Photo: microsoft.com) If in doubt, send an email to get special permission for use.

5  Ask questions related to:  Does it have an educational purpose?  What type of material do I want to use?  How much will be used?  Will using it stop the owner from making money? General guidelines Motion media-10% or 3 minutes Text-10% or 1000 words Music-up to 10% but no more than 30 seconds of an individual work. Photographs-best practice is asking permission (www.cyberbee.com)

6  What is it?  Stealing  Using another’s work and passing it as yours  Not giving proper credit  Plagiarism Checkers:  www.plagiarisma.net www.plagiarisma.net  www.plagiarismchecker. com www.plagiarismchecker. com  www.plagiarismdetector.com www.plagiarismdetector.com  Helpful tools for teaching on plagiarism:  http://www.lib.monash. edu.au/tutorials/citing/ citing-quiz.swf http://www.lib.monash. edu.au/tutorials/citing/ citing-quiz.swf  http://www.lycoming.e du/library/instruction/t utorials/plagiarism.aspx http://www.lycoming.e du/library/instruction/t utorials/plagiarism.aspx  Larry Ferlazzo’s Websites of the Day: The Best Online Sources to Teach about Plagiarism (9-21-09)

7  Identity Theft  Be cautious with personal information by not sending in emails, messages, texts, etc.  “https” and a padlock indicate secure sites  Green address bar-secure  Use home computer for personal/financial  Avoid clicking message links or pop-ups  Keep current information on your accounts and credit reports (Protecting Yourself from Identity Theft Online Brochure.pdf)

8  Passwords Use long phrases or sentences Mix uppercase and lowercase letters; use numbers and symbols Avoid using same passwords for multiple accounts Do not share with anyone Keep a list in secure location (Protecting Yourself from Identity Theft Online Brochure.pdf) PERFECT PASSWORD CHECKLIST: www.digizen.org  Reputation Management: working to repair on online reputation, presenting a person online in positive way, helping hide private information (http://www.reputation.com)

9 CYBERBULLYING: using the internet, cell phones, or other devices t send or post information intended to hurt or embarrass another person; affects half of American teens WAYS TO RESPOND: Block communication Delete messages without reading Report to internet provider/moderator Refuse to pass on message Talk to an adult Help raise awareness CYBERSTALKING: threatening behavior, unwanted contact, “attacks” over the internet National Crime Prevention Council @ http://www.ncpc.org  Profile precautions Use privacy settings Use safe and appropriate screen names Review child’s friends list Know what your kids are doing and who they are online with Teach children to never meet someone without talking to parents first and to never send pictures or personal information For more guidelines: (http://onguardonline.gov)

10  Protect your computer from: Viruses Trojan horses Worms Phishing  What they do: Delete your files Steal data/identity Let hackers have access Take over computer  WAYS TO COMBAT Keep all software current Install antivirus and antispyware software Never turn off firewall Use password on router Be cautious with flash drives Don’t open unknown emails/attachments

11 Robyler, M.D. & Doering, A.H. (2010) Integrating educational technology into teaching. New York, NY: Pearson Education Inc. http://onguardonline.gov http://www.cyberbee.org http://digitalcitizenship.org http://digizen.org http://kb.iu.edu/data/aehm.html http://www.lib.monash.edu.au http://www.lycoming.edu/library http://microsoft.com http://www.ncpc.org http://www.reputation.com http://wiredsafety.com (photo: microsoft.com)


Download ppt "Donette Mullinix ED 505 UWA Clipart: www.microsoft.com."

Similar presentations


Ads by Google