Presentation is loading. Please wait.

Presentation is loading. Please wait.

D IGITAL C ITIZENSHIP. Definition: The informal rules of behavior to be followed when using the Internet N ETIQUETTE.

Similar presentations


Presentation on theme: "D IGITAL C ITIZENSHIP. Definition: The informal rules of behavior to be followed when using the Internet N ETIQUETTE."— Presentation transcript:

1 D IGITAL C ITIZENSHIP

2 Definition: The informal rules of behavior to be followed when using the Internet N ETIQUETTE

3 L IST OF WHAT DO AND DON ’ TS FOR SOCIAL MEDIA Do Respect others’ privacy Forgive other people’s mistakes Be brief Be truthful Use proper language Research before posting Do Respect others’ privacy Forgive other people’s mistakes Be brief Be truthful Use proper language Research before posting Don’t Post illegal activities Be rude Forward messages without permission Don’t Post illegal activities Be rude Forward messages without permission

4 C OPYRIGHT AND FAIR USE Copyright is an exclusive legal right to reproduce, publish, sell, or distribute the matter and form of something (as a literary, musical, or artistic work). Copyright Laws protect the use of copying a work without permission or paying a fee. Fair Use - the conditions under which you can use material that is copyrighted by someone else without paying a fee or asking permission. Copyright is an exclusive legal right to reproduce, publish, sell, or distribute the matter and form of something (as a literary, musical, or artistic work). Copyright Laws protect the use of copying a work without permission or paying a fee. Fair Use - the conditions under which you can use material that is copyrighted by someone else without paying a fee or asking permission.

5 R ULES F OR F AIR U SE Print A chapter from a book Poetry Copies of a poem of 250 words or less that exists on two pages Music Up to 10 % of the work but no more than 30 seconds of the music or lyrics from an individual musical work Video Up to 10 % of the total or three minutes, whichever is less Photo No more than five images from one artist or photographer No more than 10% or 15 images, whichever is less, from a collection Print A chapter from a book Poetry Copies of a poem of 250 words or less that exists on two pages Music Up to 10 % of the work but no more than 30 seconds of the music or lyrics from an individual musical work Video Up to 10 % of the total or three minutes, whichever is less Photo No more than five images from one artist or photographer No more than 10% or 15 images, whichever is less, from a collection

6 P LAGIARISM Plagiarism means to steal and pass off the ideas or words of another as one's own, and the use of a created production without crediting the source. In order to escape plagiarism, ideas should be cited or written in your own words. Website such as www.tutorial.com helps teachers recognize and stop plagiarism.www.tutorial.com Plagiarism means to steal and pass off the ideas or words of another as one's own, and the use of a created production without crediting the source. In order to escape plagiarism, ideas should be cited or written in your own words. Website such as www.tutorial.com helps teachers recognize and stop plagiarism.www.tutorial.com

7 S AFETY ON THE I NTERNET Identity Theft: Use Anti-virus software Use secure sites Use a Firewall Use cache and temporary internet files Use secure passwords Monitor the Internet use Identity Theft: Use Anti-virus software Use secure sites Use a Firewall Use cache and temporary internet files Use secure passwords Monitor the Internet use

8 S AFETY ON THE I NTERNET Reputation Management: Be cautious what you say or write on the Internet because it will be public. Passwords: Change passwords frequently Do not reveal your passwords to others Never give your passwords out in an e-mail Reputation Management: Be cautious what you say or write on the Internet because it will be public. Passwords: Change passwords frequently Do not reveal your passwords to others Never give your passwords out in an e-mail

9 S AFETY ON THE I NTERNET Cyber bullying: Always safe the evidence Tell an adult Tell the cyber bully to stop Ignore the cyber bully File the complaint with the Website or service Cyber stalking: Do not share your personal information online If a situation online becomes hostile, log off or surf elsewhere. If a situation places you in fear, contact the police. Cyber bullying: Always safe the evidence Tell an adult Tell the cyber bully to stop Ignore the cyber bully File the complaint with the Website or service Cyber stalking: Do not share your personal information online If a situation online becomes hostile, log off or surf elsewhere. If a situation places you in fear, contact the police.

10 S AFETY ON C OMPUTER Viruses: A computer virus is a small software program that spreads from one computer to another and interferes with computer operation. Phishing is a fraudulent attempt, usually made through an email, to steal your personal information. Phishing e-mails usually come from well-known organization and ask for your information. Viruses: A computer virus is a small software program that spreads from one computer to another and interferes with computer operation. Phishing is a fraudulent attempt, usually made through an email, to steal your personal information. Phishing e-mails usually come from well-known organization and ask for your information.

11 S AFETY ON COMPUTER Trojan Horse is an email virus usually released by an email attachment. If opened, it will get your hard drive for any personal and financial information. Once it has collected your info, it is sent to a thief’s database. Worm is a self-replicating malware computer program. It uses a computer network to send copies of itself to other computers without any use intervention. Trojan Horse is an email virus usually released by an email attachment. If opened, it will get your hard drive for any personal and financial information. Once it has collected your info, it is sent to a thief’s database. Worm is a self-replicating malware computer program. It uses a computer network to send copies of itself to other computers without any use intervention.

12 R EFERENCES Baker, L. (2011). Retrieved from http://www.ivillage.com/10-rules-internet- safety-kids-0/6-a-128700http://www.ivillage.com/10-rules-internet- safety-kids-0/6-a-128700 Copyright, fair use, & educational multimedia faq. (2000). Retrieved from http://www.ccsj.edu/blackboard/BB copyright_fair_use.pdf Netiquette (internet etiquette). (2000). Retrieved from http://www.livinginternet.com/i/ia_nq.htm http://www.livinginternet.com/i/ia_nq.htm Retrieved from http://www.plagiarism.org/plag_article_what_is_plagiarism.html http://www.plagiarism.org/plag_article_what_is_plagiarism.html Spam laws. (n.d.). Retrieved from http://www.spamlaws.com/computer- identity-theft.htmlhttp://www.spamlaws.com/computer- identity-theft.html State cyberstalking and cyberharassment laws. (2012, 03). Retrieved from http://www.ncsl.org/issues-research/telecom/cyberstalking-and- cyberharassment-laws.aspx http://www.ncsl.org/issues-research/telecom/cyberstalking-and- cyberharassment-laws.aspx Virus basics. (n.d.). Retrieved from http://www.us- cert.gov/reading_room/virus.html Baker, L. (2011). Retrieved from http://www.ivillage.com/10-rules-internet- safety-kids-0/6-a-128700http://www.ivillage.com/10-rules-internet- safety-kids-0/6-a-128700 Copyright, fair use, & educational multimedia faq. (2000). Retrieved from http://www.ccsj.edu/blackboard/BB copyright_fair_use.pdf Netiquette (internet etiquette). (2000). Retrieved from http://www.livinginternet.com/i/ia_nq.htm http://www.livinginternet.com/i/ia_nq.htm Retrieved from http://www.plagiarism.org/plag_article_what_is_plagiarism.html http://www.plagiarism.org/plag_article_what_is_plagiarism.html Spam laws. (n.d.). Retrieved from http://www.spamlaws.com/computer- identity-theft.htmlhttp://www.spamlaws.com/computer- identity-theft.html State cyberstalking and cyberharassment laws. (2012, 03). Retrieved from http://www.ncsl.org/issues-research/telecom/cyberstalking-and- cyberharassment-laws.aspx http://www.ncsl.org/issues-research/telecom/cyberstalking-and- cyberharassment-laws.aspx Virus basics. (n.d.). Retrieved from http://www.us- cert.gov/reading_room/virus.html


Download ppt "D IGITAL C ITIZENSHIP. Definition: The informal rules of behavior to be followed when using the Internet N ETIQUETTE."

Similar presentations


Ads by Google