Download presentation
1
Digital Citizenship By Lori Gray
2
Netiquette on Social Media
Rules for connecting to others using social media on the internet Facebook, myspace, , blogs, etc. Social media - interactive news with User Generated Content (UGC) or Consumer Generated Content (CGC); a medium for interacting with people and organizations on the internet.
3
10 Simple Rules to Post in Your Classroom/Computer Lab
Tell the truth. Don't hate. Share a lot. Don't curse or swear. Stay positive. Don't digitally disrespect. Google before you share. Don't take it personal. Respect others privacy. Don't invite everyone.
4
Copyright & Fair Use Copyright - the right to reproduce or to authorize others to reproduce the work in copies or phonorecords (limitations in sec. 107 & 118 of the law) Fair Use – (found in sec. 107 of law) the reproduction of a particular work may be considered fair if used for criticism, comment, news reporting, teaching, scholarship, and research
5
4 Things to consider for Fair Use for media
The purpose and character of the use, including whether such use is of commercial nature or is for nonprofit educational purposes The nature of the copyrighted work The amount and substantiality of the portion used in relation to the copyrighted work as a whole The effect of the use upon the potential market for, or value of, the copyrighted work
6
Plagiarism Plagiarism is stealing someone else's work and lying about it afterward. Avoid plagiarism by citing sources for your information and providing ways to find that source. Inform students of plagiarism and importance of giving independent thoughts and ideas. Educators can subscribe to a variety of websites that require students to turn work in through them. Some sites are free while others have a free trial, but need a 1-yr paid subscription. Findsame Paperbin Howoriginal
7
Examples of Plagiarism
turning in someone else's work as your own copying words or ideas from someone else without giving credit failing to put a quotation in quotation marks giving incorrect information about the source of a quotation changing words but copying the sentence structure of a source without giving credit copying so many words or ideas from a source that it makes up the majority of your work, whether you give credit or not (see our section on "fair use" rules)
8
Internet Safety Identity Theft Reputation Management Passwords
Cyberbullying Cyberstalking
9
Identity Theft when someone uses your personal identifying information, (name, Social Security number, or credit card number) without your permission WHAT TO DO Monitor your personal information so you can quickly identify problems Do not give out personal information that is unnecessary Do not provide personal information when using public computers/devices
10
Reputation Management/Passwords
The process of tracking a person’s actions and others’ opinions about the actions Online ways of this include: Online purchases (Ebay, amazon, newegg, etc.) Wikis Blogging Computer passwords should contain a combination of letters, numbers, and symbols Do not use names of relatives or pets Write your password down in a secure place if you can’t remember it
11
Cyber-bullying/Cyberstalking
Cyber-bullying - willful and repeated harm inflicted through the use of computers, cell phones, and other electronic devices 2 types Direct attacks – messages sent directly to a child By proxy – multiple people involved cyber-bullying, with or without accomplice’s knowledge Cyberstalking - threatening behavior or unwanted advances directed at another using the Internet and other forms of online and computer communications Victims targeted in online chat rooms, discussion groups, , message boards, etc. Can lead to off-line stalking, where victims may experience vandalism, physical assault, trespassing, and many other violations.
12
Computer Virus Definitions
Virus – damaging computer program that can replicate itself and spread from one computer to another Trojan horse – software that appears to perform a desired function, but contains a virus hidden in its coding Worms – a self-replicating virus that burrows its way through one computer and continues to another that is connected via network; does not need to attach to an existing program Phishing – a way for thieves to acquire personal information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication
13
Tips to Protect Computer from Viruses
Use anti-viral software and keep it up to date Use a firewall Install security patches Secure internet browser Avoid unexpected/sudden attachments Treat instant messaging the same as s Be aware of internet scams Don’t fall victim to virus hoaxes Many trojans and worms are sent via as attachments Scams are also sent via – telling people sad stories and asking you to give money for some cause.
14
References http://www.networketiquette.net/socmed.htm
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.