Presentation is loading. Please wait.

Presentation is loading. Please wait.

Digital Citizenship ED 505 Jayme Hall Netiquette Derived from the words network and etiquette, it is the social code of network communication. The social.

Similar presentations


Presentation on theme: "Digital Citizenship ED 505 Jayme Hall Netiquette Derived from the words network and etiquette, it is the social code of network communication. The social."— Presentation transcript:

1

2 Digital Citizenship ED 505 Jayme Hall

3 Netiquette Derived from the words network and etiquette, it is the social code of network communication. The social and moral code of the internet based on the human condition and Golden Rule of netiquette. A philosophy of effective internet communication that utilizes common conventions and norms as a guide for rules and standards. (http://networketiquette.net )

4 Netiquette Do’s and Don’ts Do Share accurate information Respect privacy Practice correct grammar Spell check and proofread before posting Keep messages short and sweet Be honest Think before you act Don’t Be rude or abusive Use vulgar language Type in all CAPS Type in all lowercase letters Be a lurker or stalker Share too much information Tag uncomplimentary pictures of friends

5 Copyright The exclusive legal right to reproduce, publish, sell, or distribute the matter and form of something (as a literary, musical, or artistic work) (www.meriam-webster.com) Under the copyright law, the creator of the original expression in a work is its author. The author is the owner of the copyright, unless there is a written agreement releasing it to someone else.

6 Fair Use A legal doctrine that portions of copyrighted materials may be used without permission of the copyright owner provided the use is fair and reasonable, does not substantially impair the value of the materials, and does not curtail the profits reasonably expected by the owner (www.meriam-webster.com)

7 Copyright and Fair Use Copyright Law Applies universally Tells you what you can’t do Fair Use Law Applies to case by case basis Gives exceptions and tells what you may be able to do Used as defense to copyright infringement

8 Fair Use rules for media Section 107 contains a list of the various purposes for which the reproduction of a particular work may be considered fair such as criticism, comment, news reporting, teaching, scholarship, and research. It sets out four factors to be considered in determining whether or not a particular use is fair 1.The purpose and character of the use is for nonprofit educational purpose 2.The nature of the copyrighted work 3.The amount of the portion used in relation to the copyrighted work as a whole 4.The effect of the use upon the potential market for, or value of, the copyrighted work There is no specific number of words, lines, or notes that may be safely taken without permission. (http://www.copyright.gov/fls/fl102.html)

9 An act or instance of plagiarizing To steal and pass off (the ideas or words of another) as one’s own: use (another’s production) without crediting the source To commit literary theft: present as new and original an idea or product derived from an existing source http://www.merriam-webster.com/dictionary/plagiarizing?show=0&t=1340822022 Plagiarism

10 Document sources properly Include a bibliography, reference page, or works cited at the end of your work Allow sufficient time to come up with your own ideas and write something original How to avoid plagiarism

11 Recognizing and Stopping Plagiarism with technology Plagiarism detection tools are used by schools, teachers, and even students to detect plagiarism in works. – Turnitin- detects unoriginal content in students work (www.turnitin.com)www.turnitin.com – CopySpace- duplicate content detection software (www.copyscape.com)www.copyscape.com – Writecheck- new program for students- used as a preventative measure and teaching tool (www.writecheck.com)www.writecheck.com

12 Internet safety Identity Theft Identity Theft- theft, via the internet, of personal information such as social security number, bank info, credit card info, address, etc. Most victims are unaware of internet identity theft until it is too late. To protect yourself, review a website’s privacy policy. When making transactions, make sure the site offers secure date encryption to protect your information.

13 Internet Safety reputation management Internet Reputation Management helps you change what shows up in search results when people search for your name To restrict this information change privacy settings on profiles, customize who can see certain updates and delete unwanted information about yourself that appears online.

14 Internet Safety Passwords Passwords with difficult combinations make it harder for password cracking tools to figure out your password. Choose a password with the following criteria: – At least 8 characters in length – At least 1 number – At least 1 special character like & or * – Both upper and lowercase characters. Do not share your password with others

15 Internet Safety Cyberbullying and Cyberstalking Cyberbullying is the use of technology to harass, threaten, embarrass or target another person. – Mean text messages or emails, rumors or threats posted on social networking sites Report cyberbullying when it happens Do not be a cyber bully Cyberstalking is a technologically-based “attack” on one person who has been targeted specifically for that attack for reasons of anger, revenge or control. Do not share private info in a public place Be cautious about meeting online friends in public If a situation online becomes hostile, log off or surf elsewhere. If a situation places you in fear, contact a local law enforcement agency

16 viruses A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc. Protect your computer with antivirus software Stay informed about threats Do not open any attachments or emails are unknown or suspicious

17 Phishing The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft (www.webopedia.com)e-mail enterprisewww.webopedia.com To avoid getting hooked: – Use anti-virus or anti-spyware and update them regularly – Do not email personal or financial info – Be cautious about opening attachments – Forward spam that is phishing for information to spam@uce.govspam@uce.gov (http://www.ftc.gov/bcp/edu/pubs/consumer/alerts/alt127.shtm)

18 Trojan Horse A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. (www.webopedia.com)program applicationviruseswww.webopedia.com To avoid these, use good anti-virus software and update regularly

19 Worms A worm is a malicious self-replicating computer program designed to infect multiple remote computers in attempt to deliver a destructive payload. A typical worm spreads by e-mail, in file sharing networks or through unprotected network shares (www.2-spyware.com)www.2-spyware.com If you think your computer may be infected with a worm use the following: – Microsoft Safety Scanner – Malicious Software Removal Tool

20 References ( http://networketiquette.net) http://networketiquette.net (www.meriam-webster.com)www.meriam-webster.com (www.turnitin.com)www.turnitin.com (http://www.copyright.gov/fls/fl102.html)http://www.copyright.gov/fls/fl102.html (www.copyscape.com)www.copyscape.com (www.writecheck.com)www.writecheck.com (www.webopedia.com)www.webopedia.com (http://www.ftc.gov/bcp/edu/pubs/consumer/alerts /alt127.shtm)http://www.ftc.gov/bcp/edu/pubs/consumer/alerts /alt127.shtm (www.2-spyware.com)www.2-spyware.com


Download ppt "Digital Citizenship ED 505 Jayme Hall Netiquette Derived from the words network and etiquette, it is the social code of network communication. The social."

Similar presentations


Ads by Google