Download presentation
Presentation is loading. Please wait.
Published byMae Wilcox Modified over 9 years ago
1
Digital Citizen Project By: Frances Murphey Technology and Education
2
Netiquette on Social Media Sites Netiquette is the etiquette rules for behavior when communicating on the internet. Netiquette should be used in emails, blogs, twitter, facebook, websites and presentations.
3
Netiquette Do’s Use appropriate language Respect others privacy Use appropriate emotions Include a subject line
4
Netiquette Don’ts Do not reply to or forward spam Do not use sarcasm Do not use “screaming” sentences typed in all caps. Do not copy everyone on each message
5
Copyright & Fair Use Copyright – a legal concept enforced by the government that gives the person who came up with the work rights to it. Gives the creator the right to be credited for their work. Fair Use – a copyright principle that believes the public is entitled to use pieces of the copyrighted materials for comments and criticism.
6
Differences Copyright gives rights to the person that created the work. Fair use allows the public to use pieces of the copyrighted material for criticism and comments.
7
Fair Use Rules for Media Are you creating something new or just copying? Are you competing with the source you’re copying from? Giving the author credit does not get you off the hook The more you take, the less fair your use is likely to be The quality of the material used is as important as the quantity
8
Plagiarism Using or writing materials that are closely imitating the written words and thoughts of another creator without permission and without giving them credit. Pretending like the work is your own
9
How to Avoid Plagiarism Cite your sources Give credit to the original author Get ideas from other sources but come up with your own ideas.
10
Ways Teachers Recognize & Stop Plagiarism Websites are available to teachers that check for plagiarism Teachers need to teach students about plagiarism & explain to them the repercussions. What is and is not allowed
11
Safety on the Internet Identity theft Reputation management Passwords Cyberbullying Cyberstalking
12
Identity Theft Stealing a person’s identity The thief can pretend to be you Can steal name, identification numbers or credit card numbers
13
Prevent Identity Theft Do not identify yourself unnecessarily Use strong passwords Watch your finances Never give out social security number
14
Reputation Management Monitoring the reputation of a person, business or brand Focuses on getting rid of negative search results
15
Passwords First line of defense against cyber criminals Secret word or characters use to get access approval Pick strong passwords with letters and numbers Use different passwords for different accounts
16
Cyberstalking Criminal offense in all 50 States Using the internet to stalk or harass a person, group of people or organization Making false accusations, soliciting minors for sex, monitoring, and making threats
17
Cyberbullying Using technology and the internet to deliberate way Many states have laws for cyberbullying
18
Safety on your Computer Viruses Phishing Trojan horses worms
19
Viruses Computer program that can replicate itself and spread from one computer to another Cause a lot of damage Prevention: turn on firewalls & keep computer up to date
20
Trojan horse Computer program that claims to do one thing but does damage instead
21
Phishing Trying to get information such as passwords, usernames & credit cards Things to look for: spelling and bad grammar links in emails threat (Ex: account will be closed if…) Spoofing popular websites
22
Worms Malicious software that spreads through networks by computers Do not open an email attachment or message that contains executable scripts
23
Works Cited Copyright.(n.d.). In Wikipedia.Retrieved February 3, 2013, from http://en.wikipedia.org/wiki/Copyright. http://en.wikipedia.org/wiki/Copyright Cyberbullying.(n.d.). In Wikipedia.Retrieved February 3, 2013, from http://en.wikipedia.org/wiki/Cyber_bullying. http://en.wikipedia.org/wiki/Cyber_bullying QuickStudy: Phishing.(January 19, 2004).Retrieved February 3, 2013, from http://www.computerworld.com/s/article/890 96/Phishing
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.