Presentation is loading. Please wait.

Presentation is loading. Please wait.

Digital Citizenship Donna Watson ED505. Definition of NETIQUETTE Etiquette governing communication on the Internet. Etiquette governing communication.

Similar presentations


Presentation on theme: "Digital Citizenship Donna Watson ED505. Definition of NETIQUETTE Etiquette governing communication on the Internet. Etiquette governing communication."— Presentation transcript:

1 Digital Citizenship Donna Watson ED505

2 Definition of NETIQUETTE Etiquette governing communication on the Internet. Etiquette governing communication on the Internet.

3 Netiquette Rules for Students  Never post illegal activities.  Bully  Talk negatively about your teachers.  Post objectionable content from school computers or networks.  Post confidential/private information.  Post your location.  Lie, cheat, or plagiarize.  Threaten violence against a person.  Ignore school policies.  Post unprofessional public profiles.  Never rely on privacy setting to be 100%.  Never post while in an emotional state. Rieved from http://www.albion.com/netiquette/rule1.html Rieved from http://www.albion.com/netiquette/rule1.htmlhttp://www.albion.com/netiquette/rule1.html

4 Netiquette Do Treat others the way you want to be treated Treat others the way you want to be treated Be ethical and law abiding Be ethical and law abiding Spell correctly Spell correctly Use correct grammar Use correct grammar Be knowledgeable Be knowledgeable Be positive, pleasant, and polite Be positive, pleasant, and polite Respect other people’s privacy Respect other people’s privacy Be forgiving Be forgivingDon’t Post illegal activities Post illegal activities Bully Bully Trash talk your teacher Trash talk your teacher Post profanity or harassment from school or anywhere Post profanity or harassment from school or anywhere Post your location Post your location Post private information Post private information Lie or cheat Lie or cheat Threaten violence Threaten violence Post unprofessional public profiles Post unprofessional public profiles Post while overly emotional. Post while overly emotional. Rieved from http://www.albion.com/netiquette/rule1.html Rieved from http://www.albion.com/netiquette/rule1.htmlhttp://www.albion.com/netiquette/rule1.html

5 Definition of Copyright The exclusive legal right to reproduce, publish, sell, or distribute the matter and form of something (as a literary, musical, or artistic work). The exclusive legal right to reproduce, publish, sell, or distribute the matter and form of something (as a literary, musical, or artistic work). Retrieved from http://www.merriam-webster.com/dictionary/netiquette www.fotosearch.com/photos-images/etiquette.htmlhttp://www.merriam-webster.com/dictionary/netiquette

6 Definition of Fair Use A legal doctrine that portions of copyrighted materials may be used without permission of the copyright owner provided the use is fair and reasonable, does not substantially impair the value of the materials, and does not curtail the profits reasonably expected by the owner. A legal doctrine that portions of copyrighted materials may be used without permission of the copyright owner provided the use is fair and reasonable, does not substantially impair the value of the materials, and does not curtail the profits reasonably expected by the owner. Retrieved from http://smallbusiness.findlaw.com/intellectual-property/fair-use-law.htmlhttp://smallbusiness.findlaw.com/intellectual-property/fair-use-law.html

7 Compare and Contrast Copyright The Copyright Act prevents the unauthorized copying of a work of authorship. Fair Use Allows for use of copyrighted material for certain purposes. Criticism, Comment, News Reporting, Teaching, Scholarship, Research, Parody Copyright protects the work of an author. However, fair use allows use of copyrighted material only for certain purposes without the permission of the author. Copyright protects the work of an author. However, fair use allows use of copyrighted material only for certain purposes without the permission of the author.

8 Fair Use - Media Fair Use of Copyrighted Material Fair Use of Copyrighted Material Fair Use allows use of copyrighted materials for certain purposes. The purposes are: Criticism, Comment, News Reporting, Teaching, The purposes are: Criticism, Comment, News Reporting, Teaching, Scholarship and research, Parody.

9 Definition of Plagiarism To steal and pass off (the ideas or words of another) as one's own : use (another's production) without crediting the source. To steal and pass off (the ideas or words of another) as one's own : use (another's production) without crediting the source. Retrieved from http://www.hamilton.edu/style/avoiding-plagiarismhttp://www.hamilton.edu/style/avoiding-plagiarism

10 Avoiding Plagiarism In order to avoid plagiarism, you must give credit where credit is due. In order to avoid plagiarism, you must give credit where credit is due. This simply means you must cite the person whose work you are using. This simply means you must cite the person whose work you are using. When using an author’s exact words, you must use quotation marks and cite the work. When using an author’s exact words, you must use quotation marks and cite the work. If you use large amounts of an author’s work or simply copy it, you may need written permission. If you use large amounts of an author’s work or simply copy it, you may need written permission. The best way to avoid plagiarism is to use your own thoughts and ideas. But, many times in research this is not possible. So, simply give credit where credit is due. The best way to avoid plagiarism is to use your own thoughts and ideas. But, many times in research this is not possible. So, simply give credit where credit is due. Retrieved from http://www.hamilton.edu/style/avoiding-plagiarismhttp://www.hamilton.edu/style/avoiding-plagiarism

11 Detection of Plagiarism One way teachers detect plagiarism is by being familiar with their students and knowing their writing abilities and vocabulary. One way teachers detect plagiarism is by being familiar with their students and knowing their writing abilities and vocabulary. Technological Advances Using Tools to Match the Text Another way teachers detect plagiarism is by using technology, or electronic software. This software has the capability to match the text. Another way teachers detect plagiarism is by using technology, or electronic software. This software has the capability to match the text. Also, there are many free sites on line in which to check for plagiarism. Also, there are many free sites on line in which to check for plagiarism. Retrieved from http://www.hamilton.edu/style/avoiding-plagiarismhttp://www.hamilton.edu/style/avoiding-plagiarism

12 Safety Tips for Children Never give out personal information. (Full name, school name, telephone numbers, or address) Never give out personal information. (Full name, school name, telephone numbers, or address) If you begin to feel uncomfortable online, you should always tell your parents. If you begin to feel uncomfortable online, you should always tell your parents. Never agree to meet someone you have met online unless your parents are with you. Always meet with your parents in a public place. Never agree to meet someone you have met online unless your parents are with you. Always meet with your parents in a public place. Never send a picture of yourself to someone online without getting permission from your parents. Never send a picture of yourself to someone online without getting permission from your parents. If someone sends you a mean message or one that makes you feel uncomfortable, tell your parents. If someone sends you a mean message or one that makes you feel uncomfortable, tell your parents. Your parents are the only people you should share your password with. Your parents are the only people you should share your password with. You should not say hurtful things online to anyone. You should not say hurtful things online to anyone. Retrieved from http://www.safekids.com/kids-rules-for-online-safety/ Retrieved from http://www.safekids.com/kids-rules-for-online-safety/ http://www.safekids.com/kids-rules-for-online-safety/

13 Identity Theft What is identity theft? What is identity theft? The illegal use of someone else's personal information (as a Social Security number) in order to obtain money or credit. The illegal use of someone else's personal information (as a Social Security number) in order to obtain money or credit. Retrieved from http://www.merriam-webster.com/dictionary/identity%20theft http://www.merriam-webster.com/dictionary/identity%20theft Retrievedhttp://www.fotosearch.com/photos-images/identity-theft.html

14 Prevention of Identity Theft Password Protection Never share your password or write it down. Never share your password or write it down. Create passwords with numbers, letters, capitals, and symbols. Create passwords with numbers, letters, capitals, and symbols. Use different passwords for different accounts. Use different passwords for different accounts.E-Mail Never e-mail account numbers or social security numbers. Never e-mail account numbers or social security numbers. Be cautious opening e-mails even if you know the person. Be cautious opening e-mails even if you know the person. Beware of e-mail scams. Beware of e-mail scams. Use e-mail filtering software to detect spam. Use e-mail filtering software to detect spam. Retrieved from http://www.tdbank.com/bank/preventingidtheft_online.html Online Security Use secure sites when providing financial information. Use secure sites when providing financial information. Watch out for sites that imitate other sites. Watch out for sites that imitate other sites. Don’t reply to unknown Don’t reply to unknowne-mails. Log off completely after communicating with a secure site. Log off completely after communicating with a secure site. Only use computers you know and trust. Only use computers you know and trust. Install an anti-virus, anti- spyware, and firewall software. Install an anti-virus, anti- spyware, and firewall software. Turn on all security features when using wireless internet. Turn on all security features when using wireless internet.

15 Definitions of Reputation and Management Reputation “a. Overall quality or character as seen or judged by people in general “a. Overall quality or character as seen or judged by people in general b. Recognition by other people of some characteristic or ability b. Recognition by other people of some characteristic or ability C. A place in public esteem or regard : good name.” C. A place in public esteem or regard : good name.” “The act or art of managing : the conducting or supervising of something (as a business).” “The act or art of managing : the conducting or supervising of something (as a business).” Retrieved from http://www.merriam-webster.com/

16 Reputation Management Search Engine Optimization The internet has made it possible to easily research a company or a person. This does not always reflect in a positive manner on a person or company. “Most reputation services work by tracking what's written about a client on the Web, then doing search engine optimization (BusinessWeek.com, 9/10/07), promoting positive pages, and creating other sites that will push damaging references off the first pages of search results. The services are pitched as another tool companies can use in their PR and marketing efforts.” The Top 10 Best Online Reputation Management Companies for February 2012 are: 1. ReputationManagement Consultants 2. Reputation Management Experts 3. Distilled 4. Cube3 Marketing 5. Clickthrough Marketing 6. Tecmark7. KwikChex8. MediaVision 9. Reputation 24/7 10. Online Reputation Management Retrieved from http://www.businessweek.com/stories/2008-04-30/do- reputation-management-services-work-businessweek-business-news- stock-market-and-financial-advice Retrieved from http://www.prweb.com/releases/2012/2/prweb9167933.htm

17 Cyberbullying and Cyberstalking What Is Cyberbullying? Cyberbullying involves the use of technology to harass, threaten, embarrass, or target another person. How to Prevent Cyberbullying Pay attention to online activity Pay attention to online activity Know the effects of your words Know the effects of your words Know the law Know the law Know when to respond Know when to respond What is Cyberstalking? Cyberstalking is stalking a person online. It may occur in chat room, e-mails, social networking websites, and message boards. Cyberstalking is stalking a person online. It may occur in chat room, e-mails, social networking websites, and message boards. How to Prevent Cyberstalking Never use real name online Never use real name online Never give your telephone number Never give your telephone number Never give your address online Never give your address online Retrieved from http://kidshealth.org/parent/positive/talk/cyberbullying.html http://www.ourfamilyworld.com/2011/11/30/how-to-prevent-cyberbullying/ http://www.fotosearch.com/photos-images/cyberstalking.html

18 Computer Viruses Computer viruses are small software programs designed to interfere with the function of your computer. They travel from one computer to another through e-mail, attachments, or instant messaging. Computer viruses are small software programs designed to interfere with the function of your computer. They travel from one computer to another through e-mail, attachments, or instant messaging. Types of Viruses Boot Sector Viruses File Infecting Viruses Macro Viruses Master Boot Record Infectors Polymorphic Viruses Stealth Viruses http://www.microsoft.com/security/pc-security/virus-whatis.aspx

19 Phishing Definition Definition A scam by which an e-mail user is duped into revealing personal or confidential information which the scammer can use illicitly. A scam by which an e-mail user is duped into revealing personal or confidential information which the scammer can use illicitly. Safety Tips to Prevent Phishing Do not give personal data in any e-mails. Do not give personal data in any e-mails. Use anti-virus software and firewalls on all computers. Use anti-virus software and firewalls on all computers. http://www.merriam-webster.com/dictionary/phishing http://www.cityofbinghamton.com/%5Clibrary%5Cpages%5Cdept-police%5CProtect%20yourself%20from%20Phishing.pdf http://www.fotosearch.com/photos-images/phishing.html

20 Worms and Trojans A worm has the ability to replicate itself and send itself out without human action. A worm can cause web servers, network servers, and individual computers to stop responding. Trojans can be an annoyance by changing your desktop or adding icons. They can also be devastating by deleting information on your system. It also has the ability to open a, “Backdoor,” which allows hackers to obtain personal information. http://www.chicalogic.com/tips-tricks/what-is-the-difference-between-viruses-worms-and-trojan-horses http://www.fotosearch.com/photos-images/computer-trojans.html

21 References http://www.merriam-webster.com/dictionary/netiquette http://www.merriam-webster.com/dictionary/netiquette http://www.merriam-webster.com/dictionary/netiquette Etiquette Stock Photos and Images. 1429 etiquette pictures and... Etiquette Stock Photos and Images. 1429 etiquette pictures and... Etiquette Stock Photos and Images. 1429 etiquette pictures and... Etiquette Stock Photos and Images. 1429 etiquette pictures and... www.fotosearch.com/photos-images/etiquette.html www.fotosearch.com/photos-images/etiquette.html www.fotosearch.com/photos-images/etiquette.html www.fotosearch.com/photos-images/etiquette.html http://www.albion.com/netiquette/rule1.html http://www.albion.com/netiquette/rule1.html http://www.albion.com/netiquette/rule1.html http://mashable.com/2012/09/04/students-social-media-warnings/ http://mashable.com/2012/09/04/students-social-media-warnings/ http://mashable.com/2012/09/04/students-social-media-warnings/ http://smallbusiness.findlaw.com/intellectual-property/fair-use-law.html http://smallbusiness.findlaw.com/intellectual-property/fair-use-law.html http://smallbusiness.findlaw.com/intellectual-property/fair-use-law.html http://www.hamilton.edu/style/avoiding-plagiarism http://www.hamilton.edu/style/avoiding-plagiarism http://www.hamilton.edu/style/avoiding-plagiarism http://kidshealth.org/teen/safety/safebasics/internet_safety.html# http://kidshealth.org/teen/safety/safebasics/internet_safety.html# http://kidshealth.org/teen/safety/safebasics/internet_safety.html# www.heacademy.ac.uk/.../82ResourceReview157to166.pdf www.heacademy.ac.uk/.../82ResourceReview157to166.pdf www.heacademy.ac.uk/.../82ResourceReview157to166.pdf http://www.safekids.com/kids-rules-for-online-safety/ http://www.safekids.com/kids-rules-for-online-safety/ http://www.safekids.com/kids-rules-for-online-safety/ http://www.tdbank.com/bank/preventingidtheft_online.html http://www.tdbank.com/bank/preventingidtheft_online.html http://www.tdbank.com/bank/preventingidtheft_online.html http://www.prweb.com/releases/2012/2/prweb9167933.htm http://www.prweb.com/releases/2012/2/prweb9167933.htm http://www.prweb.com/releases/2012/2/prweb9167933.htm http://www.businessweek.com/stories/2008-04-30/do-reputation-management-services-work- businessweek-business-news-stock-market-and-financial-advice http://www.businessweek.com/stories/2008-04-30/do-reputation-management-services-work- businessweek-business-news-stock-market-and-financial-advice http://www.businessweek.com/stories/2008-04-30/do-reputation-management-services-work- businessweek-business-news-stock-market-and-financial-advice http://www.businessweek.com/stories/2008-04-30/do-reputation-management-services-work- businessweek-business-news-stock-market-and-financial-advice http://kidshealth.org/parent/positive/talk/cyberbullying.html http://kidshealth.org/parent/positive/talk/cyberbullying.html http://kidshealth.org/parent/positive/talk/cyberbullying.html http://www.ourfamilyworld.com/2011/11/30/how-to-prevent-cyberbullying/ http://www.ourfamilyworld.com/2011/11/30/how-to-prevent-cyberbullying/ http://www.ourfamilyworld.com/2011/11/30/how-to-prevent-cyberbullying/ http://www.chicalogic.com/tips-tricks/what-is-the-difference-between-viruses-worms-and-trojan- horses http://www.chicalogic.com/tips-tricks/what-is-the-difference-between-viruses-worms-and-trojan- horses http://www.chicalogic.com/tips-tricks/what-is-the-difference-between-viruses-worms-and-trojan- horses http://www.chicalogic.com/tips-tricks/what-is-the-difference-between-viruses-worms-and-trojan- horses


Download ppt "Digital Citizenship Donna Watson ED505. Definition of NETIQUETTE Etiquette governing communication on the Internet. Etiquette governing communication."

Similar presentations


Ads by Google