Download presentation
Presentation is loading. Please wait.
Published byLawrence Banks Modified over 9 years ago
1
By: Tina Hill
2
This is the unwritten rules of the different media sites on the internet.
3
Do Share information Share accurate information Correct mistakes Show courtesy Respect Privacy Do everything in moderation Don’t Lie Hate Cuss Be disrespectful Gossip Slander
4
Copyright, Fair use, Plagiarism, Identity Theft, Reputation Management, Password, Cyberbulllying, Cyberstalking, Virus, Phishing, Trojan horses, Worms
5
The sole right to make copies and disperse someone’s writing, artistic creation, or music. This ownership is granted by law for a controlled number of years.
6
The way a copyrighted material can be used by a third party without fearing the repercussions of legal prosecution or having to pay royalties.
7
When a material is copyrighted the creator of the material has all rights to determine the manner in which their creation is used. The creator has to grant permission for their material to be used and they also have the right to control the way that their product is used. When a product is fair use that means the product can be used, with stipulations, by the parties that have produced the said product.
8
All forms of media including, but not limited to, print, music, video, photographs, and poetry can be reproduced without the written permission of the creator. The works can be copied, quoted, and re-used. This is not a positive part of the fair use rules, but with technology it is hard to prevent such practices from occurring.
9
Using or imitating the exact words of a written work in such a way that there is little difference between the original work and the new work. This is done without permission or giving credit to the source from which it came.
10
The given work can be paraphrased The source can be cited The author can give their written permission to use the material in question
11
Teachers can use technology to find out if a student has plagiarized by using software that searches the web for the duplicated work. An example is: www.turnitin.comwww.turnitin.com
12
Identity Theft, Reputation Management, Passwords, Cyberbullying, Cyberstalking
13
The crime of using someone else’s identity to get money out of their accounts and to use their credit without the owner of the identity knowing that it was happening.
14
It is managing the reputation of a company
15
A word or a group of characters that is usually kept a secret from other people so that the information that is needing to be obtained can be kept confidential from other people using a multiuser computer.
16
To bully someone online by sending messages to them or by posting mean or cruel stuff about them on public sites.
17
It involves reputedly sending unwanted messages to a person after the sender has been informed to not send the messages anymore.
18
Viruses, Phishing, Trojan Horses, and Worms
19
A program that enters a computer without the knowledge of the owner.
20
Trying to get confidential, personal, or financial information from internet users. This can be done by sending an e-mail that looks like a legitimate e-mail from a company, but is linked to a fake site.
21
A nonreplicating computer program that is put in illegally into another program in order to do damage when the software becomes activated.
22
A reproducing program that runs independently and travels across network connections.
23
http://www.brickmarketing.com/what-is-reputation-management.htm. (n.d.) http://dictionary.reference.com/. (n.d.). http://netforbeginners.about.com/od/c/f/What-Is-Cyberstalking.htm. (n.d.).
24
By: Tina Hill
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.