Download presentation
Presentation is loading. Please wait.
Published byPosy Farmer Modified over 9 years ago
1
Digital Citizenship Project By: Tierra Collins EDU 505
2
Netiquette on Social Media Sites O Social Media Netiquette- is the social code for using social media.
3
Netiquette continued Do’s Don’ts O Share accurate info O Correct mistakes O Show love O Respect privacy O Everything in moderation O Cite references O Be brief as possible O Put your best foot forward O Be authentic O Invite with care O Don’t lie O Don’t hate O Don’t curse O Don’t disrespect O Don’t be rude O Don’t tag bad photos of friends O Avoid sarcasm
4
Copyright & Fair Use O Copyright- is a form of protection given to authors of creative works like music, movies, books, and photographs. O Fair Use- It’s the use of copyrighted material without the authorization of the owner for an expressive purpose.
5
Fair Use Rules O Print-you can use without the creator’s permission up to 10% or 1000 words, whichever is less of a single copyrighted work of text O Music- you can use without the creator’s permission up to 10% or no more than 30 seconds of a song or musical work O Video-you can use without the creator’s permission up to 10 % or 3 minutes of copyrighted videotapes, DVDs, encyclopedias on CD-ROM O Photographs-You can use without the creator’s permission five or less by the same photographer
6
What is Plagiarism? O Plagiarism is claiming that you are the author of someone else’s work. O How can it be avoided? O Use Quotations O Paraphrase
7
How does technology help in stopping plagiarism? O List of Detection Tools O http://www.duplichecker.com http://www.duplichecker.com O http://www.turnitin.com http://www.turnitin.com O http://www.articlechecker.com http://www.articlechecker.com O http://www.paperrater.com http://www.paperrater.com O http://www.dustball.com/es/plagiarism.c hecker/ http://www.dustball.com/es/plagiarism.c hecker/ O http://www.copyscape.com http://www.copyscape.com
8
Safety on the Internet O Identity Theft- is when someone uses your personally identifying information to commit fraud or other crimes. O Reputation Management- Reputation management is the practice of attempting to shape public perception of a person or organization by influencing online information about that entity. O Passwords- Make sure they are very strong. O Cyber bullying- is bullying that takes place using electronic technology. O Cyber stalking- a crime in which the attacker harasses a victim using electronic communication.
9
Safety on your Computer O Viruses- A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. O Phishing- when thieves pretend to be financial institutions or companies and send spam or pop-up messages to get you to reveal your personal information. O Trojan Horses- known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. O Worms- spread from computer to computer and it has the capability to travel without any human action.
10
References O Beal, V. (2011, March 29). The difference between a virus, worm, and trojan horse. Retrieved from http://www.webopedia.com/DidYouKnow/Inter net/2004/virus.asp http://www.webopedia.com/DidYouKnow/Inter O Chiles, D. (2011, August). Netiquette on social media sites. Retrieved from http://www.networketiquette.net/socmed.htm O Fighting back against identity theft: Federal trade commission. (n.d.). Retrieved from http://www.ftc.gov/bcp/edu/microsites/idtheft /consumers/about-identity-theft.html http://www.ftc.gov/bcp/edu/microsites/idtheft O Quick guide fair use. (n.d.). Retrieved from www.powertolearn.com/..case../fair_use/quick _guide_fair_use.pdf www.powertolearn.com/..case../fair_use/quick
11
References O Rouse, M. (2011, October). Reputation management. Retrieved from http://whatis.techtarget.com/definition/reputation- managementhttp://whatis.techtarget.com/definition/reputation- O Rouse, M. (2007, June). Cyberstalking. Retrieved from http://searchsecurity.techtarget.com/definition/cyberstalki ng http://searchsecurity.techtarget.com/definition/cyberstalki O Samuel, A. (n.d.). 25 rules of social media netiquette. Retrieved from http://www.alexandrasamuel.com/world/25-rules-of- social-media-netiquettehttp://www.alexandrasamuel.com/world/25-rules-of- O The Pennsylvania State University. (2012, September). Copyright, fair use, and the libraries. Retrieved from http://www.libraries.psu.edu/psul/lls/students/copyright_f airuse.html http://www.libraries.psu.edu/psul/lls/students/copyright_f O What is cyberbullying. (n.d.). Retrieved from http://www.stopbullying.gov/cyberbullying/what-is- it/index.html http://www.stopbullying.gov/cyberbullying/what-is-
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.