Download presentation
Presentation is loading. Please wait.
Published byJason Richards Modified over 9 years ago
1
+ Digital Citizenship Amanda Smith ED 505
2
+ Netiquette on Social Media Netiquette refers to the etiquette that is used on the internet and communicating online DO’SDON’T’S Avoid negative commentsSHOUT or write in all caps Respect others- be polite!Attack others Respect cultural differences
3
+ Copyright and Fair Use Copyright refers to the exclusive legal right to reproduce, publish, sell, or distribute the matter or form of something Fair Use refers to laws stating that portions of copyrighted materials may be used without permission of the copyright owner if the use is fair and reasonable, does not substantially impair the value of the material, and does not reduce the profits reasonably expected by the owner.
4
+ Rules for Fair Use of Media There are a few points to consider to determine if a use of copyrighted material would be “fair” 1. What is the purpose? Education, non-profit, and personal are usually considered fair while commercial is usually not 2. What is the nature of the work to be used? If the material is factual and published it is most likely fair. Articles that are found on the internet are considered published.
5
+ Rules for Fair Use of Media (cont) 3. How much of the work will you use? A good rule of thumb is no more than 10%, however, that is not always the case. 4. What effect would this use have on the market for the original or for permissions if the use were widespread? If the use would be preventing the creator from making profit off of their work, it is not fair use.
6
+ Copyright vs. Fair Use Copyright is the legal “owning” of some form of media. A person who has a copyright has all legal rights to a form of media including all profits. Fair use refers to the ability of people to legally use copyrighted material without having the permission of the copyright owner. By using the copyrighted material it cannot infringe on the owners rights. The copyright laws are somewhat vague, and can be difficult to understand in some cases. A good rule of thumb is to always err on the side of caution.
7
+ Plagiarism Plagiarism is the practice of taking someone else’s work or ideas and passing them off as your own Tips to help teachers prevent plagiarism: Change topics every semester for papers Limit the number of internet resources students may use Avoid generic topics Limit the number of direct quotes students may use Require students to submit an electronic and a paper copy Have students also do an oral presentation
8
+ Plagiarism (cont) Tips to detect plagiarism: If the paper contains various formats and/or fonts it may be plagiarized If the paper is written well above the student’s previous work, it may be plagiarized If you question a student’s work, use a search engine or plagiarism detection site Plagiarism Detection Websites http://www.canexus.com/eve/index.shtml http://www.plagtracker.com http://turnitin.com
9
+ Internet Safety- Identity Theft Identity theft is the fraudulent acquisition and use of a person’s private identifying information, usually for financial gain. To avoid identity theft teens should: Not give out personal information Not keep personal information on their cell phone Shred old documents Get a free credit report to ensure there are no false accounts Lock their computer Never put their social security number on a resume
10
+ Internet Safety- Reputation Management For teens online, reputation management is important as it can ultimately impact future jobs or college admission. Teens need to be reminded never to: Never share any type of personal information online (telephone number, email, home address, social security number, date of birth) Teens should also make sure their security settings on social media sites are on their highest level and they do not use GPS check-in sites. Remember to never post anything mean or unkind and if you are tagged in such a post make sure to remove it.
11
+ Internet Safety- Passwords Never share your passwords with anyone. To create a secure password use the following guidelines: Make sure it is at least eight characters long Do not use your username, real name, or company name Do not use a complete word Make sure it is significantly different from previous passwords Make sure it contains an uppercase letter, a lowercase letter, a number, and a symbol
12
+ Internet Safety- Cyberbullying Cyberbullying refers to any cruel or bullying messages that are sent online. These messages can be from former friends or complete strangers. It is better to ignore these types of messages than to respond to them.
13
+ Internet Safety- Cyberstalking Cyberstalking is the harassment or unwanted communication through some form of technology Cyberstalking can be done via email, chat rooms, or message boards, just to name a few Cyberstalking includes: harassing or obscene emails, excessive spamming, flaming, sending electronic viruses, or electronic identity theft. To prevent cyberstalking, have internet filters in place, adjust privacy setting to be as secure as possible, do not use GPS check ins, and avoid giving out personal information.
14
+ Safety on Your Computer There are various types of malware that can infect your computer. A few common types include: Virus- a software program capable of reproducing itself and usually capable of causing harm to other files or programs on the computer Trojan Horse- a program in which malicious or harmful code is contained inside apparently armless programming or data Worm- self-replicating malware that uses one computer to spread to others Phishing is the fraudulent practice of sending emails pretending to be from a legitimate company in order to induce individuals to reveal personal information and can be a problem if someone is not careful about giving out their personal information online.
15
+ Safety on Your Computer (cont) To help prevent malware: Use up-to-date antivirus software Install security patches as they become available Use a firewall when surfing the internet Secure your internet browser Avoid opening email attachments that look suspicious Treat all instant messages with caution Avoid filesharing
16
+ Resources (2013). Tips for teenage online reputation management. Retrieved from http://www.reputation.com/reputationwatch/articles/tips-teenage- online-reputation-management Dowshen, S. (2011). Online safety. Retrieved from http://kidshealth.org/teen/safety/safebasics/internet_safety.html# http://kidshealth.org/teen/safety/safebasics/internet_safety.html# Flinders University. Net etiquette guidelines. Retrieved from http://www.flinders.edu.au/its/policies-procedures-and- guidelines/acceptable-use-of-ict/net-etiquette-guidelines.cfm http://www.flinders.edu.au/its/policies-procedures-and- guidelines/acceptable-use-of-ict/net-etiquette-guidelines.cfm Identity theft tip sheet for teens. Retrieved from http://www.mesaaz.gov/police/TeenConnection/pdf/IdentityTheftTeen s.pdf http://www.mesaaz.gov/police/TeenConnection/pdf/IdentityTheftTeen s.pdf Landesman, M. Computer safety tips: 9 steps to protecting your computer from viruses and other malware. Retrieved from http://antivirus.about.com/od/securitytips/a/safetytips.htm Learn NC. (2005). Fair use. The University of North Carolina- Chapel Hill. Retrieved from http://www.learnnc.org/lp/pages/4455http://www.learnnc.org/lp/pages/4455 Roig, M. Strategies for preventing and detecting plagiarism. St. John’s University. Retrieved from http://fcpe.adelphi.edu/resources/Roig_plagiarism.pdf http://fcpe.adelphi.edu/resources/Roig_plagiarism.pdf Tips for creating a strong password. Retrieved from http://windows.microsoft.com/en-us/windows-vista/tips-for-creating-a- strong-password
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.