Presentation is loading. Please wait.

Presentation is loading. Please wait.

Netiquette on Social Media Sites What is Netiquette? Netiquette is network etiquette – this is the etiquette of cyberspace. Etiquette means the conventional.

Similar presentations


Presentation on theme: "Netiquette on Social Media Sites What is Netiquette? Netiquette is network etiquette – this is the etiquette of cyberspace. Etiquette means the conventional."— Presentation transcript:

1

2

3 Netiquette on Social Media Sites What is Netiquette? Netiquette is network etiquette – this is the etiquette of cyberspace. Etiquette means the conventional requirements as to social behavior; proprieties of conduct as established in any community or for any occasion. Netiquette is a set of rules for behaving properly online.  Do’s  Be clear  Use appropriate language  Be brief  Make a good impression  Be selective on what information  Consider others  Obey copyright laws  Cite others' work you use  Forward e-mail messages you receive-only with permission of the sender  Remember you are not anonymous  Don’t  Don't use ALL CAPITAL LETTERS--it's equal to shouting or screaming  Don’t send SPAM  Don't forward chain letters  Don't respond to "flames" or personal attacks  Don't send the message, save it, and review it "later"

4 Copyright and Fair Use Copyrights are forms of intellectual property that protect original works of authorship, including novels, plays, songs, software, and paintings. Copyright law gives the author or owner of a work the right to control reproduction, distribution, adaptation, public performance, public display and translations into other languages or other media. Fair Use US law does allow people to use copyrighted material in limited cases without the author’s permission. This is known as fair use.  Examples of fair use include commentary, criticism, news reporting, research, teaching, library archiving and scholarship. It provides for the legal, non-licensed citation or incorporation of copyrighted material in another author’s work under a four- factor balancing test. According to copyright.gov these include:  The purpose and character of the use, including whether such use is of commercial nature or is for nonprofit educational purposes  The nature of the copyrighted work  The amount and substantiality of the portion used in relation to the copyrighted work as a whole  The effect of the use upon the potential market for, or value of, the copyrighted work

5 What is Plagiarism? According to the Merriam- Webster Online Dictionary, to "plagiarize" means  to steal and pass off (the ideas or words of another) as one's own  to use (another's production) without crediting the source  to commit literary theft  to present as new and original an idea or product derived from an existing source According to writecheck.com there are 6 Ways to Avoid Plagiarism:  Paraphrase  Cite  Quoting  Citing Quotes  Citing Your Own Material  Referencing There are two sites that help instructors recognize and stop plagiarism.  First, WriteCheck is intended for students to check grammar, style, usage, mechanics, spelling and originality.  Whereas, Turnitin is used for instructors to check for originality and grammar, facilitate peer review and enable online grading of student's written work. Both services search the same database content.

6 According to internetsafetycenter.com :  Internet Safety starts with computer users setting up and scanning computers for viruses. Installing anti- virus, anti-spyware, anti-malware software will stop this botnet. There are different products that have software designed to detect and stop botnet. F-Secure, Norton internet security, Kaspersky, and Trend Micro are some of the well known products that stops botnet. All internet user should verify they have the latest security updates and run a full system scan.

7 IDENTITY THEFT REPUTATION MANAGEMENT Security experts now say that identity theft is the fasting growing crime on the internet. Identity theft is growing at 20% per year and is growing faster and faster every year. Criminals are creating fake website to steal user names and password ever day. They also send emails all the time and saying bank accounts have been compromised or someone has tried to access your account. The biggest thing everybody can do to prevent identity theft is to not click on links inside emails. These links are taking people to fraudulent websites. If you get an email from a bank or credit card company read it and don't click on anything. Open a new browser and type in the bank or credit card company web address.  Online reputation management is the exercise of observing the Internet reputation of a person, brand or business, with the objective of stressing positive attention rather than negative criticisms. Before the July 2007 story in the Washington Post the phrase reputation management was unknown. Reputation management for individuals was talked about as an online identity management, online image management, online personal branding or personal reputation management. An important part of reputation management is to take action to remove the negative statements about your brand from the Internet once they are located, ways to do this is by using management tools like Google Alerts.

8 CYBER STALKING WAYS TO AVOID CYBER STALKING  Cyber stalking is a new term referring to online harassment. Cyber stalkers are just like physical stalkers, except they stalk through the Internet and email rather than in a face to face environment. According to datehookup.com there are ways to avoid becoming a victim of cyber stalking, there are different steps you can take to protect yourself.  Never release your real name online, you can create a pen name to be known by so that your friends know you and stalkers can't figure it out.  Don't release your phone number, address, or any other sensitive information online.

9 PASSWORDSCYBER BULLYING According to antivirus.about.com: Password Safety: Tips for Keeping Passwords Safe  Don't leave your passwords lying around.  Don't reveal your passwords to others.  Never give your password out in an email.  Don't use the default password assigned to you unless it's a hard requirement. According to stopbullying.gov: Cyber bullying is bullying that takes place using electronic technology. Examples of cyber bullying consist of mean text messages or emails, rumors sent by email or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles. Ways to prevent Cyber bullying  Parents and kids can prevent cyber bullying. Together, they can search safe ways to use technology.  Be Aware of What Your Kids are Doing Online  Form Rules about Technology Use  Understand School Rules

10  Datehookup.com. (2013). Retrieved from http://www.datehookup.com/content- cyberstalking-and-harassment.htm  Wikipedia.org. (2013). Retrieved from http://en.wikipedia.org/wiki/Reputation_management  Networketiquette.net. (2013). Retrieved from http://www.networketiquette.net/netiquette.htm  Studygs.net. (2013). Retrieved from http://www.studygs.net/netiquette.htm  Albion.com. (2013). Retrieved from http://www.albion.com/netiquette/introduction.html  Blogs.lawyers.com. (2011). Retrieved from http://blogs.lawyers.com/2011/02/fair-use- vs-copyright-infringement-quoting-material-on-the-internet/  Plagiarism.org. (2013). Retrieved from http://plagiarism.org/plagiarism-101/what-is- plagiarism  writecheck.com. (2013). Retrieved from https://www.writecheck.com/pricing_signup.asp?svr=11&t=d6df4714fc0480f60e531136 3573ea02&landing=  Antivirus.about.com. (2013). Retrieved from http://antivirus.about.com/od/securitytips/a/passwordsafety.htm


Download ppt "Netiquette on Social Media Sites What is Netiquette? Netiquette is network etiquette – this is the etiquette of cyberspace. Etiquette means the conventional."

Similar presentations


Ads by Google