Download presentation
Presentation is loading. Please wait.
Published byBuddy Berry Modified over 9 years ago
1
BRADLEY BARNES DIGITAL CITIZENSHIP
2
NETIQUETTE ON SOCIAL MEDIA SITES Netiquette is the etiquette guidelines that govern behavior when communicating on the Internet.
3
THINGS TO CONSIDER
4
COPYRIGHT AND FAIR USE Copyright law exists to protect the creators of original works in any medium. Fair use means that a copyrighted work may be used without prior permission for teaching, research, scholarship, and criticism.
5
COMPARISON Copyright The holder of a copyright is protected from the copying of his or her work without permission. Fair Use Fair use allows a person to use a work without permission for teaching, research, scholarship, or criticism.
6
FAIR USE RULES FOR MEDIA The performance or display of work by a teacher or a student for a nonprofit educational institution is permitted. Copies of motion pictures, audiovisual works, or individual images may not be used if they were not lawfully obtained or created.
7
PLAGIARISM Plagiarism is the act of stealing someone’s work and claiming ownership of it. It is also considered plagiarism if a person uses a source without giving credit to the source. Literary theft is also a type of plagiarism.
8
PLAGIARISM PREVENTION AND TECHNOLOGY Turnitin Plagiarism Prevention and Originality Checking This is a tool that is used to ensure that a paper is original and does not contain plagiarism. It is a website that compares a paper to an online database of other papers to check for plagiarism.
9
SAFETY ON THE INTERNET Identity theft Occurs when someone uses your personal identification to commit fraud. People can use things such as credit cards or social security numbers. Reputation management The practice of influencing an individual or business brand. Passwords Hackers can use your password to gain personal information and possibly damage your credit or other personal things. Cyberbullying Cyberbullying is the use of technology to hurt someone emotionally. This has become a growing problem, especially among young people. Cyberstalking Cyberstalking is the use of the Internet or online communication tools to stalk a person.
10
SAFETY ON YOUR COMPUTER Viruses Viruses are written for malicious purposes and can often do damage to a computer. Email attachments and downloads are the most common ways to obtain a virus. Phishing Emails that are sent and pose as a business in an effort to obtain personal information to commit identity theft. Trojan horses Often appear as a useful tool but, in reality, they are destructive. Worms A worm is a type of virus that duplicates itself to use up a computer’s resources and slows or shuts down a computer.
11
RESOURCES Roblyer, M.D., & Doering, Aaorn H. (2010). Integrating Educational Technology into Teaching (6 th ed.). Pearson. PBS Teachers.(2012). Copyright Law and Fair Use. Retrieved September 14, 2012 from http://www.pbs.org/teachers/copyright/fairuse.html What is Plagiarism? (n.d.). Retrieved September 14, 2012 from http://www.plagiarism.org/plag_article_what_is_plagiarism.html Fighting Back Against Identity Theft. (n.d.). Retrieved September 20, 2012 from http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity- theft.html Reputation Management. (n.d.). In Wikipedia. Retrieved September 20, 2012 from http://en.wikipedia.org/wiki/Online_reputation_management State Cyberstalking and Cyberharassment Laws. (2012). Retrieved September 20, 2012 from http://www.ncsl.org/issues-research/telecom/cyberstalking-and-cyberharassment- laws.aspx
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.