Download presentation
Presentation is loading. Please wait.
Published byEarl Walters Modified over 9 years ago
1
Digital Citizenship By: Amanda Thurber
2
Netiquette on Social Media Sites According to networketiquette.net, netiquette is the social code of the internet because the internet is a network and etiquette is a social code and it encompasses all digital etiquette since computers are digital.
3
DoDon’t Use descriptive titlesDon’t be rude Summarize when posting summariesDon’t be abusive Read follow-upsDon’t make people read the same thing more than once. Avoid sarcasmDon’t mass message people Avoid facetious remarksDon’t creep Cite referencesDon’t tag your friends bad photos Be as brief as possible
4
Copyright According to dictionary.com, copyright is the exclusive right to make copies, license, and otherwise exploit a literary, musical, or artistic work, whether printed, audio, video, etc. According to blackboard.com, copyright protects certain kinds of “original works of authorship”. Copyright grants the author of the work the legal right to determine how or whether the work will be produced, distributed, displayed, or performed, as well as the right to produce derivative works based on the original.
5
Fair Use According to dictionary.com, fair use is the conditions under which you can use material that is copyrighted by someone else without paying royalties.
6
Differences Copyright simply means that the author of the work has the right to determine how his/her work will be used under certain conditions whereas fair use monitors the copying and using of copyrighted works when used improperly. Copyright does not protect names, title, slogans, ideas, concepts, or facts. When copies of a copyrighted work are made spontaneously and used temporarily it would be considered to be fair use. However, if someone copies an entire chapter book and uses it for educational purposes this may be considered to not be fair use.
7
Plagiarism According to lib.usm.edu, plagiarism is the act of taking another person’s writing, conversation, song, or even idea and passing it off as your own. Merriam-Webster considers plagiarism to be when another person’s ideas or words are stolen or passed off as one’s own without crediting the source.
8
Avoiding Plagiarism The following strategies for avoiding plagiarism were provided by Indiana University: 1. Put in quotations everything that comes directly from the text especially when taking notes. 2. Paraphrase, but be sure to not just rearrange or replace a few words. 3. Check your paraphrase against the original text to be sure you have not accidentally used the same phrases or words, and that the information is accurate.
9
Technology Helps Teachers can use technology in order to teach students how to properly cite and reference others work, to publish anti-plagiarism policies with clear consequences and rules, as well as use search engines and internet sites to check students work against previously turned in assignments from other students.
10
Safety on the Internet Identity Theft Reputation Management Passwords Cyber bullying Cyber stalking
11
Identity Theft Identity theft: When someone uses an individual’s personal identifying information to commit fraud or other crimes. There are three things that you can do to be ahead of the game when it comes to identity theft. First, you should always be aware, monitor and protect your personal information, and finally know what to do if you are a victim of identity theft.
12
Reputation Management Reputation management: is simply building a reputation, keeping a positive reputation, and overcoming a negative reputation.
13
Passwords Passwords are crucial in online safety when it comes to personal information and confidentiality. If passwords did not exist anyone and everyone would have access to each other’s information.
14
Cyber Bullying Cyber bullying: when a child is targeted and thus threatened, harassed, or embarrassed by another child. This is an ongoing problem in our society and continues to become more extreme and serious on a daily basis. As a society we must come up with ways to impact this problem so that it starts to occur less regularly.
15
Cyber Stalking According to about.com, cyberstalking is a technologically-based “attack” on one person who has been targeted specifically for that attack for reasons of anger, revenge or control.
16
Safety on Your Computer Viruses Phishing Trojan horses worms
17
8 Computer Safety Tips from About.com 1. Anti-virus software (up to date) 2. Install security patches 3. Use a firewall 4. Secure your browser 5. Take control of your email 6. Treat IM suspiciously 7. Be aware of internet scams 8. Avoid file sharing
18
References http://www.ccsj.edu/blackboard/BB%20copyright_fair_use.pdf http://www.lib.usm.edu/legacy/plag/whatisplag.php http://www.indiana.edu/~wts/pamphlets/plagiarism.shtml#strateg ies http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about- identity-theft.html http://www.brickmarketing.com/what-is-reputation- management.htm http://www.stopcyberbullying.org/what_is_cyberbullying_exactly.html http://womensissues.about.com/od/violenceagainstwomen/f/Cyb erstalking.htm http://antivirus.about.com/od/securitytips/a/safetytips.htm
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.