Presentation is loading. Please wait.

Presentation is loading. Please wait.

By: Katelyn Dunagan.  What is Netiquette? -Netiquette (Network Etiquette) is the “social code” or “online ethics” of the internet. -There are 10 Core.

Similar presentations


Presentation on theme: "By: Katelyn Dunagan.  What is Netiquette? -Netiquette (Network Etiquette) is the “social code” or “online ethics” of the internet. -There are 10 Core."— Presentation transcript:

1 By: Katelyn Dunagan

2  What is Netiquette? -Netiquette (Network Etiquette) is the “social code” or “online ethics” of the internet. -There are 10 Core Rules that apply to Netiquette and should be used at all times.

3  Ten Commandments of Netiquette The book Netiquette by Virginia Shea summarizes the 10 Core Rules of Netiquette as follows:  “Rule 1. Remember the human. Never forget that the person reading your mail or posting is, indeed, a person, with feelings that can be hurt. Corollary 1 to Rule #1: It's not nice to hurt other people's feelings. Corollary 2: Never mail or post anything you wouldn't say to your reader's face. Corollary 3: Notify your readers when flaming.  Rule 2. Adhere to the same standards of behavior online that you follow in real life. Corollary 1: Be ethical. Corollary 2: Breaking the law is bad Netiquette.

4  Rule 3. Know where you are in cyberspace. Corollary 1: Netiquette varies from domain to domain. Corollary 2: Lurk before you leap.  Rule 4. Respect other people's time and bandwidth. Corollary 1: It's OK to think that what you're doing at the moment is the most important thing in the universe, but don't expect anyone else to agree with you. Corollary 2: Post messages to the appropriate discussion group. Corollary 3: Try not to ask stupid questions on discussion groups. Corollary 4: Read the FAQ (Frequently Asked Questions) document. Corollary 5: When appropriate, use private email instead of posting to the group. Corollary 6: Don't post subscribe, unsubscribe, or FAQ requests. Corollary 7: Don't waste expert readers' time by posting basic information. Corollary 8: If you disagree with the premise of a particular discussion group, don't waste the time and bandwidth of the members by telling them how stupid they are. Just stay away. Corollary 9: Conserve bandwidth when you retrieve information from a host or server.

5  Rule 5. Make yourself look good online. Corollary 1: Check grammar and spelling before you post. Corollary 2: Know what you're talking about and make sense. Corollary 3: Don't post flame-bait.  Rule 6. Share expert knowledge. Corollary 1: Offer answers and help to people who ask questions on discussion groups. Corollary 2: If you've received email answers to a posted question, summarize them and post the summary to the discussion group  Rule 7. Help keep flame wars under control. Corollary 1: Don't respond to flame-bait. Corollary 2: Don't post spelling or grammar flames. Corollary 3: If you've posted flame-bait or perpetuated a flame war, apologize.  Rule 8. Respect other people's privacy. Don't read other people's private email.  Rule 9. Don't abuse your power. The more power you have, the more important it is that you use it well.  Rule 10. Be forgiving of other people's mistakes. You were a network newbie once too!”

6  There you have it, the rules of Netiquette.  These rules should be kept in mind and put to use during any usage of the internet.  All faculty, staff and students should be educated in the “Rules of Netiquette” before school internet access is allowed.

7  In 1976, the United States passed the Copyright Act which provides protection to authors of “orginal works of authorship” and “gives owners of copyright the exclusive right to do and to authorize others to : Reproduce the work in copies or phonorecords Prepare derivative works based upon the work Distribute copies or phonorecords of the work to the public by sale or other transfer of ownership, or by rental, lease, or lending Perform the work publicly, in case of literary, musical, dramatic, and choreographic works, pantomimes, and motion pictures and other audiovisual works Display the works publicly, in the case of literary, musical, dramatic, and choreographic works, pantomimes, and pictorial, graphic, or scuptural works, including the individual images of a motion pictures and other audiovisual work Perform the work publicly (in the case of sound recordings) by means of a digital audio transmission”

8  It is illegal for anyone to violate any of these copyrights that are provided to the copyright owners under the law.  One limitation of the copyright law is the “fair use” policy.

9  The “fair use” clause under the Copyright Law states that “an author may have limited use of another author’s work without asking permission”  For educational purposes, this means that a teacher may photocopy limited amounts of others works for classroom use.  “Fair Use” also applies to research, in which the quotation of short segments or passages for scientific, technical work or scholarly purposes is allowed.

10  Is plagiarism just copying someone else’s work? NO…It is much more than that.  Plagarism is the stealing of someone else’s work or ideas without giving them credit. It is trying to pass off another author’s work as your own.

11  Can I change a few words in the sentence and then call it my own? NO, if you change a few words in the sentence, but keep the overall sentence structure, it is still considered plagiarism.  If I forget to put a direct quote in quotations or cite my source incorrectly, is it considered plagiarism? YES, failure to place quotation marks around direct quotes and improper citing are also considered plagiarism.

12  Plagiarism is considered a serious offense by all academic institutions and can lead to  As teachers, it is our job to make sure our children are educated on what plagiarism is and how to avoid it in their works.

13  The internet is a very helpful and informative tool used in today’s society. Unfortunately, there are also many dangers lurking in the unknown cyberspace.  How can we stay safe and keep our kids safe on the internet?

14 1. Security - We must take the steps to ensure online security such as: - Creating strong, secure passwords - Installing anti-virus software - Backing up data regularly - Use caution when entering personal information (SSN, credit card info, address) on websites. 2. Privacy -Be careful what kind of information you share on the web. - If you use a smart phone, be cautious of GPS locators and what they are posting - Educate kids on the importance of screening what they post on social media (pictures, threats, personal information etc.)

15  Protection against malware is very essential in maintaining computer safety.  According to the Goodwill Community Foundation (GCF), “Malware is any type of software that is designed to damage your computer or gain unauthorized access to your personal information. It includes viruses, worms, Trojan horses, spyware, and other types. Most malware is distributed over the internet, often bundled with other software.”  Anti-Malware software such as Norton, BitDefender, and Kapersky are very effective in the protection of your computer.

16  Chiles, D. (n.d.). Netiquette. Retrieved from http://www.networketiquette.nethttp://www.networketiquette.net  United States Copyright Office (n.d.). Copyright Basics. Retrieved from http://www.copyright.gov http://www.copyright.gov  The 'Fair Use' Rule: When Use of Copyrighted Material is Acceptable | Nolo.com. (n.d.). Retrieved from http://www.nolo.com/legal-encyclopedia/fair-use-rule-copyright- material-30100.htmlhttp://www.nolo.com/legal-encyclopedia/fair-use-rule-copyright- material-30100.html  What is Plagiarism? — Plagiarism.org - Best Practices for Ensuring Originality in Written Work. (n.d.). Retrieved from http://www.plagiarism.org/plagiarism-101/what-is- plagiarismhttp://www.plagiarism.org/plagiarism-101/what-is- plagiarism  Purdue OWL: Avoiding Plagiarism. (n.d.). Retrieved from http://owl.english.purdue.edu/owl/resource/589/01/ http://owl.english.purdue.edu/owl/resource/589/01/  iKeepSafe: Web Safety. (n.d.). Retrieved from http://www.ikeepsafe.org/http://www.ikeepsafe.org/  Computer Basics:Safety and Maintenance. (n.d.). Retrieved from http://www.gcflearnfree.org/computerbasics http://www.gcflearnfree.org/computerbasics


Download ppt "By: Katelyn Dunagan.  What is Netiquette? -Netiquette (Network Etiquette) is the “social code” or “online ethics” of the internet. -There are 10 Core."

Similar presentations


Ads by Google