Presentation is loading. Please wait.

Presentation is loading. Please wait.

Digital Citizenship Project

Similar presentations


Presentation on theme: "Digital Citizenship Project"— Presentation transcript:

1 Digital Citizenship Project
By: Rachel Nowling UWA – ED 505

2 Netiquette on Social Media Sites
Is there a proper etiquette that we must follow when using Social Media Sites? Absolutely! We refer to this as “Netiquette”

3 What exactly is Netiquette?
Netiquette is the social code of the internet. This is how you say what you want to say to your friends and the public. Social media mimics real relationships, so there are some do’s and don’ts that you need to follow.

4 Do’s and Don’ts of Social Media
Use Spell Check Separate business and personal accounts Provide a link to your sources Be as brief as possible Don’t overuse acronyms Don’t voice opinions about politics or religion Don’t use at inappropriate times (the dinner table) Don’t use inappropriate language

5 Copyright and Fair Use Copyright Fair Use Copyright gives the author of the work the legal right to determine how the work will be reproduced, distributed, displayed, or performed Copyright law allows portions of a copyright work to be used without the author’s permission for specific purposes. This is referred to as “fair use”.

6 Fair Use for Media Motion Media Up to 10% or three minutes,
whichever is less Text Material Up to 10% or 1000 words, whichever is less. Music, Lyrics, Music Video Up to 10%, but no more than 30 seconds. Illustrations, Photographs No more than 5 images from an artist/photographer, or no more than 10% or 15 works from a published collective work. Numerical Data Sets Up to 10% or 2500 fields, whichever is less.

7 Plagiarism Plagiarism is representing someone else’s work as your own.
To avoid plagiarism, one must keep a couple things in mind. 1. If you use the author’s exact words, you must put them in parenthesis and credit the source. 2. If you use your own words, but you obtained the information or ideas you are presenting from a source, you must document the source.

8 How Can Technology Help?
There are a number of sites that can help teachers detect plagiarism. Some sites are free while others are subscription based. Below are links to some of these sites. Eve 2 FindSame-free service HowOriginal.com-free service PaperBin.com Plagiarism.org How Can Technology Help? Technology can help teachers recognize and stop plagiarism.

9 Identity Theft: Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes. How to avoid: Be aware of how information is stolen. Monitor your personal information so you can detect a problem early. Safety on the Internet In order to ensure your safety while using the internet, you must be aware of potential dangers.

10 Reputation Management: This day in time, people may judge you by your online reputation. It is important that you make decisions while using the internet and social media that will not damage your reputation. It is important that you are careful and selective when posting pictures and comments on facebook, blogs, etc. Safety on the Internet In order to ensure your safety while using the internet, you must be aware of potential dangers.

11 Safety and the Internet
Passwords: Sometimes we tend to use the same password on multiple accounts so that we only have to remember that one. BAD IDEA! Your accounts will be more secure if you use a different password for each. The user names and passwords that you use to access Web pages or to enter your may travel over the Internet in the form of unencrypted plain text, so devious folk can grab your password and give it a try elsewhere. Keep a log of your passwords in a safe place for your security. Safety and the Internet In order to ensure your safety while using the internet, you must be aware of potential dangers.

12 Safety and the Internet
Cyberbullying and cyberstalking are two issues that face kids and teens today. Cyberbullying involves children bullying others via text messages, instant messages, or . Cyberstalking referes to threatening behavior or unwanted advances directed at another using the Internet and other forms of online and computer communications. Safety and the Internet In order to ensure your safety while using the internet, you must be aware of potential dangers.

13 Sources Beal, V. (2010, June 29). The difference between a computer virus, worm and trojan horse . Retrieved from Samuel, A. (2011, April 7). 25 rules of social media netiquette. Retrieved from The writing center: Avoiding plagiarism. (2011, December 13). Retrieved from Retrieved from : (2008) Retrieved from

14 Safety Issues Cyberbullying Cyberstalking
Save all s or text messages as evidence in case the bully has to be reported. If you receive a bullying message, don’t participate. Talk to them about it in person. Report the bully if situation doesn’t change. Victims should tell a parent or teacher. Victims may file a complaint with their internet service provider. Victims may want to file a report with local law enforcement. Changing addresses or deleting social media site may be necessary.

15 Keep Your Computer Safe!
Viruses Phishing Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. To help avoid computer viruses, it's essential that you keep your computer current with the latest updates and antivirus tools, stay informed about recent threats. Phishing is the act of sending an to someone falsely claiming to be a legitimate company in an attempt to scam the user into giving out private information. Know who you are giving your private information to and for what reason!

16 Keep Your Computer Safe
Trojan Horses Worms The Trojan Horse, at first glance will appear to be useful software, but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. Worms are similar to viruses, but unlike viruses worms have the capability to travel without any human action. The biggest danger with a worm is its capability to replicate itself on your system.


Download ppt "Digital Citizenship Project"

Similar presentations


Ads by Google