Download presentation
Presentation is loading. Please wait.
Published byMarcia Baldwin Modified over 9 years ago
1
Submitted by: Donna Rembert Instructor: Dr. Laurie Fowler ED508 Technology Portfolio
2
Netiquette is a cyber term for doing what is right on the internet. It is a combination of the words network and etiquette. It is how one behaves every time they hit the send button. There are over 2 billion users on the web
3
Only use your first name and personal information or pictures to anyone. Never agree to see someone you ‘meet” on line. Don’t believe everything you read. Some one may be using a false identity. Do not reply to messages that makes you feel uncomfortable. Let someone else know. Never give anyone your password.
4
Think before you post. Observe the site before you use it. Read the FAQ’s(frequently asked questions)and archives, before posting in group discussion or chat room. Use courtesy while using netiquette
5
To protect our digital reputation on and offline To avoid “Flame Wars” online To treat others the way we want to be treated For your protection
6
There are over 107trillion emails sent daily Make sure you use grammar & spell check Make sure your use your signature to let them know who is sending the email Don’t correct someone else’s spelling Don’t send emails when you are upset, angry or late at night Don’t use all caps in emails (it means you are yelling)
7
Do not text while driving. No text is worth dying for. It is not safe to text while walking. Avoid playing texting games( some people are really busy and can’t always respond ASAP) Don’t lay phone on the dinner table or in a meeting. Keep conversations quiet while in public.
8
Copyright – Allows only the person who has designed the work to edit, copy and benefit from it. Fair Use- Allows a person to use copyright materials without the owner’s permission
9
The difference between copyright and fair use is that there is no set limits for the person with copyrights and there are rules for fair use When making a copy one must consider: How will the copied materials be used? What is the purpose for copying? How much of the materials copied will be used?
10
Media materials can only be used for non-profit or educational purposes. Copied materials can be used or changed in order to entertain a large audience.
11
Using someone’s ideas and claiming them to be yours. How to Avoid Plagiarism? Use quotations or reword or paraphrase Plagiarism Identified Google Search Programs for Plagiarism
12
Identity Theft: Using another's private information for financial gain. Reputation Management: Being mindful of ones reputation on and off the internet. Password: Secret words or digits used to give one access to files and websites. Cyber bullying- Using the internet to ruin one’s reputation or harassing an individual. Cyber stalking: is stalking on the internet.
13
Virus: A virus on the computer attached itself to files on your computer and destroys it. Trojan Horses: A software that poses as one thing and only steals your information on your computer. :Worms: Send copies of itself to cause harm to the network or damage files on the computer
14
http://www.safekids.com/quiz/index.html http://www.safekids.com/quiz/index.html http://www.chipublib.org/008subject/003cyn/ sign/safety.html http://www.chipublib.org/008subject/003cyn/ sign/safety.html
15
Google. Web 06 June 2012 http://google.comhttp://google.com http://www.plagiarism.org/plag_article_educational_tips_on_plagiarism_pr evention.html http://www.plagiarism.org/plag_article_educational_tips_on_plagiarism_pr evention.html The Riles of Netiquette Web. 10 June 2012 http://smallbusiness.findlaw.com/copyright/copyright-using/fair-use.html http://smallbusiness.findlaw.com/copyright/copyright-using/fair-use.html http://wiki.ask.com/Cyberstalking http://wiki.ask.com/Cyberstalking http://www.networkequette.net/netiquettehtm. http://www.networkequette.net/netiquettehtm http://www.myreputationmanager.com/online_reputation_management_se m.html http://www.myreputationmanager.com/online_reputation_management_se m.html http://www.parentfurther.com/high-risk-behaviors/bullying/cyberbullying http://www.parentfurther.com/high-risk-behaviors/bullying/cyberbullying
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.