Presentation is loading. Please wait.

Presentation is loading. Please wait.

By: Shervanae Scott. Social Media Netiquette “Netiquette” refers to etiquette on the Internet. Good “netiquette” involves respecting others' privacy.

Similar presentations


Presentation on theme: "By: Shervanae Scott. Social Media Netiquette “Netiquette” refers to etiquette on the Internet. Good “netiquette” involves respecting others' privacy."— Presentation transcript:

1 By: Shervanae Scott

2 Social Media Netiquette “Netiquette” refers to etiquette on the Internet. Good “netiquette” involves respecting others' privacy. There are three main areas where good “netiquette” is highly stressed: e-mail, online chatting, and newsgroups. It is also the correct or acceptable way of communicating on the Internet.

3 Do’s & Do not’s of Social Media Do respond and react Do use social media Do use privacy settings Do not surf on your company’s time Do not display your personal life Do not connect with everyone

4

5 Copy Right and Fair Use con.t Copyright is the original piece of work, and Fair use is a gray area that refers to the rights of copyright holders which allows limited use of copyrighted material, even without permission. However, there are conditions in which fair use can be claimed are not permanent depending upon certain factors. United States Copyright Office. (2008). Copyright basics. (Circular 1). Retrieved from http://www.copyright.gov/circs/circ01.pdf http://www.copyright.gov/circs/circ01.pdf

6 Fair Use Rules Media- No more than 5 images of an artist/photographer in one program or printing. Copyright notice and attribution required. Print- Single copies for teacher for research, teaching, or class preparation. Video- May be copied for archival purposes or to replace, lost damaged or stolen copies Music- Single copy of up to 10% of a musical composition in print, sound, or multimedia form may be performed and displayed as part of an educator or student multimedia program for educational purposes. Photo- Older illustrations may be in the public domain, but the collection may be copyrighted.

7 Safety on the “Net” Identity Theft- is a crime in which one wrongfully gets and uses another individual's personal information such as: bank account information or credit card information. Here are a few ways of preventing: 1. Always review monthly statements to check accuracy 2. Always check your credit reports 3. Always shred all personal information that comes in the mail whether you use it or not 4. Secure your information on and offline 5. Never carry your social security card in your purse or wallet

8 Password Safety on the Internet Technology is a huge factor in our society today, and almost every program there is you have to login to there must be a user name and password. Passwords are to be kept SAFE at all times!!! Password Safety Tips: Don’t reveal your password to anyone Don’t leave it laying around, if so keep it locked up Be very careful when using WIFI at public places Do reset your password frequently (n.d.). Retrieved from http://antivirus.about.com/od/securitytips/a/passwordsafe ty.htm

9 Cyber Bullying Cyber bullying- is bullying through email, chat room exchanges, or digital. Cyber bullying, like traditional bullying, involves an disparity of power, aggression, and a negative action that is often repeated. Types of Cyber Bullying  Harassment: Repeatedly sending offensive, rude, and insulting messages  Denigration: Distributing information about another that is derogatory and untrue through posting it on a Web page, sending it to others through email or instant messaging, or posting or sending digitally altered photos of someone  Flaming: Online "fighting" using electronic messages with angry, vulgar language  Impersonation: Breaking into an email or social networking account and using that person's online identity to send or post vicious or embarrassing material to/about others.  Outing and Trickery: Sharing someone's secrets or embarrassing information, or tricking someone into revealing secrets or embarrassing information and forwarding it to others  Cyber Stalking: Repeatedly sending messages that include threats of harm or are highly intimidating, or engaging in other online activities that make a person afraid for his or her safety. (n.d.). Retrieved from http://olweus.org/public/cyber_bullying.page

10 Cyber Stalking Safety tips on Cyber Stalking  Be cautious of who you meet on-line  Set all settings to private on social networks  DO NOT share personal information  BLOCK any unwanted messengers

11 The Life of a Computer Computer viruses are created when a programmer creates computer code that has the capability to replicate itself. To protect your home computer against computer viruses, worms, and Trojans, you should invest in anti-virus software. There are several signs to know that your computer has been infected: new files appear out of no where, program size changes, sometimes you will hear strange noises from the computer or the keyboard, and a common sign is when the computer takes longer than normal to load. (Shelly, G.B, Cashman, T.J. & Vermatt, M. E. (2001). Discovering computers 2002: Concepts for a digital world. Boston, MA: Course Technology.)

12 Protecting Your Computer  Anti-Virus software  Continuously scan your computer  Backup your files  Be aware of unknown emails  Be Alert!

13 Plagiarism Plagiarism- is defined as copying another one’s work. To avoid plagiarism you need to cite the original source and paraphrase. Even when paraphrasing one must still give credit to the source. Teachers are able to recognize plagiarism by utilizing search engines such as Article Checker. Retrieved from(http://www.ehow.com/facts)

14 Works Cited Goodridge, E. (2009, may 01). Steps to prevent identity theft and how to prevent it. (Shelly, G.B, Cashman, T.J. & Vermatt, M. E. (2001). Discovering computers 2002: Concepts for a digital world. Boston, MA: Course Technology.) United States Copyright Office. (2008). Copyright basics. (Circular 1). Retrieved from http://www.copyright.gov/circs/circ01.pdfhttp://www.copyright.gov/circs/circ01.pdf United States Copyright Office. (2009). Reproduction of copyrighted works by educators and librarians. (Circular 21). Retrieved from http://www.copyright.gov/circs/circ21.pdf http://www.copyright.gov/circs/circ21.pdf United States Copyright Office. (2010). Fair use. (Circular FL-102). Retrieved from http://www.copyright.gov/fls/fl102.htmlhttp://www.copyright.gov/fls/fl102.html http://www.westminstermo.edu/academics/resources/library/Pages/C opyrightFairUse.aspx http://www.westminstermo.edu/academics/resources/library/Pages/C opyrightFairUse.aspx Retrieved from http://antivirus.about.com/od/securitytips/a/passwordsafety.htm


Download ppt "By: Shervanae Scott. Social Media Netiquette “Netiquette” refers to etiquette on the Internet. Good “netiquette” involves respecting others' privacy."

Similar presentations


Ads by Google