Download presentation
Presentation is loading. Please wait.
Published byAlexis Richard Modified over 9 years ago
1
Digital Citizenship By Lisa Brackett ED 505
2
Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior when communicating on the Internet. It covers not only rules of behavior during discussions but also guidelines that reflect the unique electronic nature of the medium.”
3
Netiquette Do List Identify yourself Include a subject line Respect others’ privacy Acknowledge and return messages promptly Copy with caution Be concise Use appropriate language Don’t List No spam (no junk mail) Avoid typing in all capital letters (screaming) Avoid sarcasm
4
Copyright vs. Fair Use Copyright Copyright is a legal conception giving the inventor of an original work exclusive rights to it, usually for a restricted time. Fair Use Fair use is a restriction and exception to the exclusive right granted by copyright law to the author of a creative work. In the United States, fair use is a policy that permits limited use of copyrighted material without obtaining consent from the right owners.
5
Fair Use Rules for media, music, print, etc. The rules of fair use and copyright apply equally to non-textual material like images, speeches, and moving pictures. Music – 10% of the work or 30 seconds from an individual work Photos – 5 images or less from one artist or photographer Book – one graphic per book or periodical Poetry – limit direct quotes to 2 lines of poetry or 300 words of prose.
6
Plagiarism The practice of taking someone else’s work or ideas and passing them off as one’s own. It can be avoided by ALWAYS making it clear where the information comes from …cite it! Technology can help teachers recognize plagiarism. There are several plagiarism detection programs including Mydropbox.com and turnitin.com.
7
Safety on the Internet Cyber bullying is the use of the internet and related technologies to harm other people, in a deliberate, repeated, and hostile manner. Cyber stalking is a crime in which the attacker harasses a victim using electronic communications such as email or instant messaging, or messages posted to a website or discussion group. Reputation management can be monitored by websites that identify how many times your name has been positively searched. Negative comments are moved to the bottom of the list. Many people use social media to monitor reputations. Passwords should be kept in a secure place and revealed to no one. Identities can be stolen. Therefore private information should be kept private. Internet surfing should be done carefully.
8
Online? Never give out… full name home address phone number Social Security number passwords names of family members credit card numbers
9
Protection is the key!
10
Preventable Computer Safety Issues Viruses – programs written for malicious purposes. Trojan horses and worms are two types of viruses. They can be sent through email attachments and downloaded files. Phishing – Websites pretending to be reputable sources with the intent to steal passwords, credit card information, etc.
11
Ways to Prevent Problems Purchase and use antivirus software Run updates on computer Block spam email Protect Wi-Fi with a password Choose strong passwords Back up information on an external hard drive
12
Bibliography www.cyberguards.com http://kidshealth.org/teen/safety/safebasics/internet_ safety.html www.met.police.uk/crimeprevention/computer.htm Onlinerepmanagement.com/what-is- reputationmanagement Roblyer, M., Doering, A. (2010, 5th edition). Intergrating education technology into teaching. Boston: Allyn & Bacon www.stopcyberbullying.org
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.