Download presentation
Presentation is loading. Please wait.
Published byVivien Watkins Modified over 8 years ago
1
ED 505: Magen Anthony
2
Netiquette on Social Media site is the etiquette or guideline for posting on social media or other online sites. This helps individuals know what is appropriate and how to be respectful.
3
Do’s identify yourself include a subject line respect others’ privacy acknowledge and return message promptly be concise use appropriate language Use appropriate emoticons (emotion icons) to help convey meaning Don’ts Don't use spam or junk mail Don’t use profane or inappropriate language copy with caution-do not copy everyone you know on a message. Don’t be sarcastic Don’t copy or quote other’s posts or emails without their permission.
4
Copyright Laws- Copyright laws are a form of protection given by the United States that an author’s original piece of work cannot be reproduced without permission. Fair Use- Fair Use is copyrighted material that can be used in portions for purposes such as a commentary or for a parody.
5
Copyright write privileges do not allow anyone to use another person’ s work as their own. Fair Use privileges is an exception to Copyright privileges because limited amounts of work can be used for certain reasons.
6
Media- 10 percent or three minutes of a single of copyrighted media. Print- 10 percent or 1,000words, whichever is less for a single copyrighted text. Music- 10 percent, but no more than thirty seconds of lyrics and music from a single piece of copyrighted music piece. Photography- 10 percent or 15 imagines from collective resources, but no more than five imagines from one artist or photographer. Poetry- An entire poem with 250 words or less, but no more than three poems written by one poet or five poems by different poets. If the poem is longer then no more than 250 words can be use, plus the three poems by the same poet and no more than five poems from different poets.
7
Plagiarism is when some uses another person’s work without permission or referencing.
8
Plagiarism can be avoided by citing all work and using quotations to identify phrases that have been used from various sources. When paraphrasing citation should also be given to the author of the work.
9
Plagiarism technology helps teachers recognize and stop plagiarism by identifing words or phrases that have been copied and pasted or paraphrased from other’s work. This can help stop plagiarism by identifying students that plagiarize, then the students are reprimanded for their actions. Sites like turnitin.com help teachers identify these issues and solve them quickly.
10
Identity Theft- protect yourself from identity theft by limiting the amount of personal information you give out. Do not give out passwords driver’s license number, social security number, address, etc. Reputation Management- Use netiquette when posting on the internet. Your internet reputation can affect career.
11
Passwords- Do not give out your passwords. Keep all passwords private and unique. Cyberbullying- Cyberbullying is just as bad as or worse than typical bullying. If someone is experiencing cyberbullyig they should not ignore what is going on, they should tell an adult or authority figure. Cyberstalking- Cyberstalking is when a person uses the internet to track another person’s actions. If someone is being cyberstalked they should talk to an adult or authority figure to resolved the problem.
12
viruses- Use anti-virus software and make use it is up to date. Do not open emails or visit websites that you are unsure about. phishing- Do not email personal information such as social security numbers, address, and banking account information. Emailing is not a safe way to send information such as this due to the fact that someone can use your information to steal your identity.
13
Trojan horses- Trojan horses can attach themselves to files on your computer and steal information from your computer. Do not download files form sites you are not certain about. worms- Worms can harm your computer and also disrupt internet connection. To prevent this from happening use firewall protection and update your operating system frequently.
14
U.S Copyright Office. (2009, July 05). Retrieved from http://www.copyright.gov/fls/fl102.htmlhttp://www.copyright.gov/fls/fl102.html Copyright &Fair Use. (2010) Retrieved from http://fairuse.stanford.edu/Copyright_and_Fair_Use_Overview/chapter9/9-a.html http://fairuse.stanford.edu/Copyright_and_Fair_Use_Overview/chapter9/9-a.html BullGuard. (2012) Retrieved from http://www.bullguard.com/bullguard-security-center/pc- security/computer-threats/what-is-a-worm.aspxhttp://www.bullguard.com/bullguard-security-center/pc- security/computer-threats/what-is-a-worm.aspx Roblyer, M.D. (2010). Integrating Educational Technology into Teaching 6 th edition. Columbus, Ohio: Merrill Prentice Hall Slide 5 image: Otis. (2010). Copyright and Fair Use Guidelines. Retrieved from: http://www.otis.edu/life_otis/library/copyright.html http://www.otis.edu/life_otis/library/copyright.html Slide 7 image: Plagiarism [students sitting at a desk]. (2011). Retrieved from: http://tilt.library.skagit.edu/module4/plagiarism.htm http://tilt.library.skagit.edu/module4/plagiarism.htm Slide 8 image: A Note on Plagiarism [stop sign]. (2012). Retrieved from: http://www1.ccs.k12.in.us/teachers/esalona1/turnitin-com http://www1.ccs.k12.in.us/teachers/esalona1/turnitin-com Slide 8 imagine: To patent or not to patent. [person holding a sign]. (2007]. Retrieved from: http://mutiny.wordpress.com/2007/02/12/to-patent-or-not-to-patent/ http://mutiny.wordpress.com/2007/02/12/to-patent-or-not-to-patent/
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.