Download presentation
Presentation is loading. Please wait.
Published byMeagan Lewis Modified over 9 years ago
1
Digital Citizenship By: Michael Morgan
2
Netiquette on Social Media Sites The rules of etiquette that apply when communicating over computer networks, especially the Internet. Proper manners on the internet, especially during chatting. It requires never forgetting that at the other end of the connection is an actual person. Offensive remarks and inconsiderate comments are as offending via a computer screen as in a face-to-face encounter.
3
Netiquette on Social Media Sites Do’s Spell check Tell the truth Be conservative Use discretion Be yourself Don’t Write in all capital letters Flames Spam Send email at night Shop unsecured sites
4
Copyright and Fair Use Copyright- a term used to describe the protection given to the author of an original work Fair Use- the conditions under which you can use material that is copyrighted by someone else without paying royalties
5
Copyright and Fair Use Copyright Protects certain kinds of original works of authorship whether published or unpublished. Copyrights grant the author of the work the legal right to determine how or whether the work will be reproduced, distributed, displayed, or performed, as well as the right to produce derivative works based on the original. Fair Use Copyright law allows portions of a copyrighted work to be used without the author's permission for specific purposes. Fair use allows for portions, or in some cases the entirety, of copyrighted works to be used for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research.
6
Media Allowable Portion for Fair Use Motion media: Up to 10% or 3 minutes, whichever is less. Text material: Up to 10% or 1000 words, whichever is less Music, Lyrics, Music Video: Up to 10%, but no more than 30 seconds. Illustrations, Photographs: No more than 5 images from an artist/photographer, or no more than 10% or 15 works from a published collective work. Numerical Data Sets: Up to 10% or 2500 fields, whichever is less.
7
Safety on the Internet Identity theft: when a person uses someone else's personal information without their permission to commit fraud or other crimes. Reputation management: performed by individual or organization which attempt to maintain or create a certain frame of mind regarding themselves in the public eye Passwords: Sequence of characters (letters, numbers, symbols) used as a secret key for accessing a computer system or network. Passwords are used also for authentication, validation, and verification in electronic commerce.
8
Safety on the Computer Viruses: Small but insidious piece of programming-code that attacks computer and network systems through contaminated data files, introduced into a system via disks or internet. Worms: Type of computer virus that disrupts entire networks by very fast replication over the networked machines. It gains entry into the system usually through infected emails, and reproduces itself millions of times to fill all available disk space and to choke communication lines. Phishing: The act of acquiring private or sensitive data from personal computers for use in fraudulent activities. Trojan Horses: Innocent-looking computer program that appears to perform a useful function, but also secretly performs destructive and illegal functions such as destroying the stored data or allowing an outsider to gain unauthorized access to the system.
9
Works Cited Chiles, D. (2011). Core rules of netiquette. Retrieved http://www.networketiquette.net/core_rules.htmll Copyright, fair use, &. (2000). Retrieved from http://www.ccsj.edu/blackboard/BB copyright_fair_use.pdf Murko, T. (2007). Business dictionary. Retrieved from Businessdictionary.com Pictures from Clip Art
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.