Download presentation
Presentation is loading. Please wait.
Published byKaren Sharp Modified over 9 years ago
1
Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety on Your Computer
2
Definition- Netiquette, network etiquette, is the social code of the internet because the internet is a network and etiquette is a social code. Do: Share in caring way Share accurate information Correct mistakes Show Love Respect privacy Everything in moderation Don’t : Lie Hate Curse Disrespect
3
Copyright is a form of protection found in the U.S. Constitution and granted by law for original works of authorship fixed in a tangible medium of expression. Copyright covers both published and unpublished works. Fair Use: Fair use is a limitation and exception to the exclusive right granted by copyright law to the author of a creative work. In United States copyright law, fair use is a doctrine that permits limited use of copyrighted material without acquiring permission from the rights holders. Difference between Copyright and Fair Use: Fair use is a doctrine that permits limited use of copyrighted material and copyright is a form of protection.
4
People have the right to use copyrighted material without permission or payment under some circumstances, especially when the cultural or social benefits of the use are predominant. The guidelines permit a teacher to make a copy of any of the following: a chapter from a book; an article from a periodical or newspaper; a short story, short essay, or short poem; a chart, graph, diagram, drawing, cartoon, or picture from a book, periodical, or newspaper. Teachers may copy articles to hand out to their class, but the guidelines have restrictions. Classroom copying cannot be used to replace texts or workbooks used in the classroom. Students cannot be charged more than the actual cost of photocopying. The number of copies cannot exceed more than one copy per pupil. And a notice of copyright must be attached to each copy.
5
An individual can copy sheet music already purchased in an emergency for an impending performance if it is not available by any other means, as long as replacement copies are purchased as soon as possible following the performance. For academic or research purposes, more than one copy of musical work excerpts can be made as long as these parts do not include a piece of the work that is performable, such as an entire movement or an aria of an opera. The amount copied cannot exceed 10% of the whole work and not more than one copy per student or per researcher. To add to this, as long as it is for academic use and not performance, a single copy of an entire part of a piece of music can be made as long as it has been confirmed to be out of print. This single copy can also be made for a teacher researching for a class.
6
For photographers, copyright is created at the click of the shutter. The fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright.
7
Copyright law has several features that permit quotations from copyrighted works without permission or payment, under certain conditions. Fair use is the most important of these features. It has been an important part of copyright law for more than 150 years. Where it applies, fair use is a right, not a mere privilege. In fact, as the Supreme Court has pointed out, fair use keeps copyright from violating the First Amendment. As copyright protects more works for longer periods than ever before, it makes new creation harder. As a result, fair use is more important today than ever before.
8
Quoting substantial portions of a work, in a poem, even for purposes of legitimate criticism, could be deemed unfair if buyers of the critique receive a copy of the entire poem without payment to the original author.
9
When a writer purposely uses someone else's idea from an original piece of work. How to avoid it: Ethical writers make every effort to acknowledge sources fully in accordance with the contexts and genres of their writing. A student who attempts to identify and credit his or her source, but who misuses a specific citation format or incorrectly uses quotation marks or other forms of identifying material taken from other sources, has not plagiarized. Instead, such a student should be considered to have failed to cite and document sources appropriately.
10
How to avoid it: Ethical writers make every effort to acknowledge sources fully and appropriately in accordance with the contexts and genres of their writing. A student who attempts (even if clumsily) to identify and credit his or her source, but who misuses a specific citation format or incorrectly uses quotation marks or other forms of identifying material taken from other sources, has not plagiarized. Instead, such a student should be considered to have failed to cite and document sources appropriately.
11
Teachers can type the work into a search engine such as Google and see if the work goes to a specific web site.
12
Identity Theft -Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud.
13
Reputation management is the monitoring of the Internet reputation of a person, brand or business, with the goal of emphasizing positive coverage rather than negative reviews or feedback. Doing reputation management for individuals is often referred to as online identity management (OIM), online image management, online personal branding or personal reputation management (PRM).
14
Passwords are used all over the internet. With so many people needing a password for multiple places on their computer, many people have chose very easy passwords that are easily hacked. “With only minimal effort, a hacker can gain access to one new account every second," said Amichai Shulman, a chief technical officer.
15
Cyber bullying is the use of the Internet and related technologies to harm other people, in a deliberate, repeated, and hostile manner. As it has become more common in society, particularly among young people, legislation and awareness campaigns have arisen to combat it. Examples of what constitutes cyber bullying include communications that seek to intimidate, control, manipulate, put down, falsely discredit, or humiliate the recipient. The actions are deliberate, repeated, and hostile behavior intended to harm another. Cyber bullying has been defined by The National Crime Prevention Council: “when the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person. [
16
Cyber stalking is the use of the Internet or other electronic ways to stalk or harass a person, a group of individuals, or an organization. It may include false accusations, monitoring, making threats, identity theft, damage to data or equipment.
17
Viruses: is a computer program that can replicate itself and spread from one computer to another. Phishing: is attempting to acquire information (and sometimes, indirectly, money) such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication Trojan horse: a type of malware that masquerades as a legitimate file or helpful program possibly with the purpose of granting a hacker unauthorized access to a computer. Worms: a standalone malware computer program that replicates itself in order to spread to other computers.
18
Plagiarism. (n.d.) In Slide Share. Retrieved from http://www.slideshare.net/guestf17a2e/using-technology- to-detect-plagiarism-229376 Plagiarism. (n.d.) In Slide Share. Retrieved from http://www.slideshare.net/guestf17a2e/using-technology- to-detect-plagiarism-229376 Reputation Management. (n.d.) In Wikipedia. Retrieved from http://en.wikipedia.org/wiki/Reputation_management http://en.wikipedia.org/wiki/Reputation_management Common Internet Words (n.d.) Retrieved from http://www.foxnews.com/tech/2010/01/26/common- internet-passwords/ Common Internet Words (n.d.) Retrieved from http://www.foxnews.com/tech/2010/01/26/common- internet-passwords/ Cyber bullying (n.d.) In Wikipedia. Retrieved from http://en.wikipedia.org/wiki/Cyberbullying Cyber bullying (n.d.) In Wikipedia. Retrieved from http://en.wikipedia.org/wiki/Cyberbullying Cyber stalking (n.d.) In Wikipedia. Retrieved from http://en.wikipedia.org/wiki/Cyberstalking Cyber stalking (n.d.) In Wikipedia. Retrieved from http://en.wikipedia.org/wiki/Cyberstalking Phishing. (n.d.) In Wikipedia. Retrieved from http://en.wikipedia.org/wiki/Phishing http://en.wikipedia.org/wiki/Phishing Trojan Horse (n.d.) In Wikipedia. Retrieved from http://en.wikipedia.org/wiki/Trojan_horse_(computing)
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.