Presentation on theme: "Digital Citizenship Project"— Presentation transcript:
1 Digital Citizenship Project By: Rachel NowlingUWA – ED 505
2 Netiquette on Social Media Sites Is there a proper etiquette that we must follow when using Social Media Sites?Absolutely! We refer to this as “Netiquette”
3 What exactly is Netiquette? Netiquette is the social code of the internet. This is how you say what you want to say to your friends and the public. Social media mimics real relationships, so there are some do’s and don’ts that you need to follow.
4 Do’s and Don’ts of Social Media Use Spell CheckSeparate business and personal accountsProvide a link to your sourcesBe as brief as possibleDon’t overuse acronymsDon’t voice opinions about politics or religionDon’t use at inappropriate times (the dinner table)Don’t use inappropriate language
5 Copyright and Fair UseCopyrightFair UseCopyright gives the author of the work the legal right to determine how the work will be reproduced, distributed, displayed, or performedCopyright law allows portions of a copyright work to be used without the author’s permission for specific purposes. This is referred to as “fair use”.
6 Fair Use for Media Motion Media Up to 10% or three minutes, whichever is lessText MaterialUp to 10% or 1000 words, whichever is less.Music, Lyrics, Music VideoUp to 10%, but no more than 30 seconds.Illustrations, PhotographsNo more than 5 images from anartist/photographer, or no more than10% or 15 works from a publishedcollective work.Numerical Data SetsUp to 10% or 2500 fields, whichever isless.
7 Plagiarism Plagiarism is representing someone else’s work as your own. To avoid plagiarism, one must keep a couple things in mind.1. If you use the author’s exact words, you must put them in parenthesis and credit the source.2. If you use your own words, but you obtained the information or ideas you are presenting from a source, you must document the source.
8 How Can Technology Help? There are a number of sites that can help teachers detect plagiarism. Some sites are free while others are subscription based. Below are links to some of these sites.Eve 2FindSame-free serviceHowOriginal.com-free servicePaperBin.comPlagiarism.orgHow Can Technology Help?Technology can help teachers recognize and stop plagiarism.
9 Identity Theft: Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes.How to avoid: Be aware of how information is stolen. Monitor your personal information so you can detect a problem early.Safety on the InternetIn order to ensure your safety while using the internet, you must be aware of potential dangers.
10 Reputation Management: This day in time, people may judge you by your online reputation. It is important that you make decisions while using the internet and social media that will not damage your reputation. It is important that you are careful and selective when posting pictures and comments on facebook, blogs, etc.Safety on the InternetIn order to ensure your safety while using the internet, you must be aware of potential dangers.
11 Safety and the Internet Passwords: Sometimes we tend to use the same password on multiple accounts so that we only have to remember that one. BAD IDEA! Your accounts will be more secure if you use a different password for each. The user names and passwords that you use to access Web pages or to enter your may travel over the Internet in the form of unencrypted plain text, so devious folk can grab your password and give it a try elsewhere. Keep a log of your passwords in a safe place for your security.Safety and the InternetIn order to ensure your safety while using the internet, you must be aware of potential dangers.
12 Safety and the Internet Cyberbullying and cyberstalking are two issues that face kids and teens today. Cyberbullying involves children bullying others via text messages, instant messages, or . Cyberstalking referes to threatening behavior or unwanted advances directed at another using the Internet and other forms of online and computer communications.Safety and the InternetIn order to ensure your safety while using the internet, you must be aware of potential dangers.
13 SourcesBeal, V. (2010, June 29). The difference between a computer virus, worm and trojan horse . Retrieved fromSamuel, A. (2011, April 7). 25 rules of social media netiquette. Retrieved fromThe writing center: Avoiding plagiarism. (2011, December 13). Retrieved fromRetrieved from :(2008) Retrieved from
14 Safety Issues Cyberbullying Cyberstalking Save all s or text messages as evidence in case the bully has to be reported.If you receive a bullying message, don’t participate.Talk to them about it in person.Report the bully if situation doesn’t change.Victims should tell a parent or teacher.Victims may file a complaint with their internet service provider.Victims may want to file a report with local law enforcement.Changing addresses or deleting social media site may be necessary.
15 Keep Your Computer Safe! VirusesPhishingComputer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.To help avoid computer viruses, it's essential that you keep your computer current with the latest updates and antivirus tools, stay informed about recent threats.Phishing is the act of sending an to someone falsely claiming to be a legitimate company in an attempt to scam the user into giving out private information.Know who you are giving your private information to and for what reason!
16 Keep Your Computer Safe Trojan HorsesWormsThe Trojan Horse, at first glance will appear to be useful software, but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source.Worms are similar to viruses, but unlike viruses worms have the capability to travel without any human action. The biggest danger with a worm is its capability to replicate itself on your system.