Presentation is loading. Please wait.

Presentation is loading. Please wait.

By Stoney Pritchett.  The rules of etiquette that apply when communicating over computer networks, especially the internet.

Similar presentations


Presentation on theme: "By Stoney Pritchett.  The rules of etiquette that apply when communicating over computer networks, especially the internet."— Presentation transcript:

1 By Stoney Pritchett

2  The rules of etiquette that apply when communicating over computer networks, especially the internet.

3  Put all items in an appropriate group.  Reply via mail  Exhibit care in preparing items  Read follow ups  Be authentic and generous  Don’t tag your friends (bad)photos  Don’t be rude or abusive  Don’t mass message people  Don’t use sarcasm and facetious remarks.

4  The use of another person’s ideas, words, data, graphics, or intellectual property without acknowledging the source.

5  Cite the work of others, if you use it in your paper.  Start your research early to give yourself adequate time required for research based writing.  Consult your instructor when you are unsure about how to acknowledge the contributions of others.  Show your students how to evaluate there sources.  Teach students appropriate use of citations.  Ask students to draw on and document a variety of sources.  Start building possible topics early.

6  TurnItIn.com a website which compares your paper to papers on the internet..  PlagiarismDetect.com runs your paper through a basic comparison search for free  Anti plagiarism software googles unattributed phrases they find in your paper to internet resources.

7  Viruses, Trojan horses, Phishing, Worms, and Spyware are all threats that can damage your computer system. To avoid damaging your computer hare are a few ways to help protect your computer.  Antivirus software/Anti malware protects your computer from infected attachments, corrupt websites, internet worm viruses and spyware  Antivirus specifically protects against viruses  Anti spyware protects against malicious software that may be gathering your information without your knowledge.  Firewall screens out threats that try to reach your computer over the internet  These are the components you must have to have an excellent anti viruses software, if there not offered in your anti virus software package I advise you not to buy it.

8  Copyright is a legal, concept enacted by most governments, giving the creator of an original work exclusive rights to it, usually for a limited time.  Fair Use allows you to be able to reproduce part of someone’s else work, for purposes of criticism, news, reporting, comment, teaching, and research without violating copyright laws.

9  The difference between copyright and fair use is material that has been copyright has a legal agreement, enacted by most government to restrict printing, however, fair use allows a person to reproduce the same work for circumstances, such as criticism, news, reporting, comment, teaching, and research as long as the creator is acknowledge and it doesn’t violate any copyright laws. For example, Disney’s Mickey Mouse cartoon, restricts others from making copies of this cartoon or creating works based on Disney’s mouse, however, it does not prohibit other works about a mouse as long as it is different from Disney’s cartoon.

10  The Four Factor Rule test helps determine if a given use is fair use.  The purpose and character  The nature of the copy righted work  The amount and substantiality  The effect upon work’s value  Ask yourself these four factors to help you determine if your use of one of the following materials fall upon the fair use rule, if not sure consult the company or owner.

11  Place your computer on YouTube safety mode.  Preview websites with your children.  Educate your kids on consequences of cyber bulling.  Teach students to ignore it and don’t respond back.  Don’t accept people you don’t know as your face book friend.  Always logout after using public computers  Teach students to respect others and to take a stand against bullying of all kinds.  Never give anyone your password.

12  Use non suggestive screen names  Remove any personal information from your social media profiles.  Never give out details like your phone number or physical address  Give a firm no  Don’t respond  Don’t attempt to engage the stalker in any way.  Protect your mail  Join an id prevention service  Monitor credit regularly  Beware of employment and mortgage schemes.

13    Wen.wikipedia.org   Wpa.council.org   


Download ppt "By Stoney Pritchett.  The rules of etiquette that apply when communicating over computer networks, especially the internet."

Similar presentations


Ads by Google