Presentation is loading. Please wait.

Presentation is loading. Please wait.

Digital Citizenship Project Amanda Friscia University of West Alabama ED 505--Fall 2011 Online.

Similar presentations


Presentation on theme: "Digital Citizenship Project Amanda Friscia University of West Alabama ED 505--Fall 2011 Online."— Presentation transcript:

1 Digital Citizenship Project Amanda Friscia University of West Alabama ED 505--Fall 2011 Online

2 Netiquette on Social Media Sites Definition of Netiquette According to Doering and Roblyer, Netiquette is, “the etiquette guidelines that govern behavior when communicating on the Internet” (220).

3 Netiquette Do’s and Don’ts Do… Identify yourself Include a subject line Respect other’s privacy Acknowledge and respond to messages in a timely manner Copy with caution Be concise Use appropriate language Use emoticons to convey meaning (happy, sad, etc…) Use appropriate intensifiers Use proper grammar and spelling Don’t… Use sarcasm Send or respond to spam Use online “screaming” or all caps Use profanity Quote or forward personal email without author’s permission Note: Adapted from Figure 7.10 on page 222 of Doering and Roblyer book

4 Copyright and Fair Use Definitions Copyright Definition –According to the website Teaching Copyright, Copyright is, “A form of legal protection given to the creators of ‘original works of authorship,’ including literary, dramatic, musical, and artistic works. U.S. copyright law generally gives the author of an original creative work an exclusive right to reproduce (copy) or distribute the original work to the public, create new works based upon the original work, and perform or display the work publicly.” Fair Use Definition –According to the website Teaching Copyright, “Fair use allows people other than the copyright owner to copy part or, in some circumstances, all of a copyrighted work, even where the copyright holder has not given permission or objects.” Definitions courtesy of: http://www.teachingcopyright.org/

5 Copyright and Fair Use Difference The difference between copyright and fair use is that copyright protects the work’s original creator from anyone using, reproducing, or copying the work without permission. Fair use allows users to use the work without the permission of the copyrighted owner, even though the work has been copyrighted. The copyright is only valid for a certain period of time and after that, the material is subject to “fair use”.

6 Fair Use Rules for Media Motion Media –Up to 10% or 3 minutes (whichever is less) Print Material –Up to 10% or 1,000 words (whichever is less) Poetry Music, Lyrics, and Music Videos –Up to 10% but no more than 30 seconds Illustrations and Photos –No more than 5 images by one person –No more than 10% or 15 images from a single published work Numerical Data Sets –Up to 10% or 2,500 fields/cell entries (whichever is less) **All numbers are based on one single copyrighted piece**

7 Plagiarism What it is… Plagiarism is passing off, claiming, or using someone else’s work as your own and not giving due credit to the original creator. How to Avoid it… Plagiarism can be avoided by: 1.Teaching students what plagiarism is, the rules of it, and why it is wrong 2.Using the internet and various sites to check work for authenticity and plagiarism. Using Technology to Recognize and Stop it… Various internet sites will check submitted work for authenticity and plagiarism. Sites include: www.turnitin.com www.mydropbox.com **Information derived from Doering & Roblyer book, Page 219**

8 Safety on the Internet Identity Theft and Reputation Management Identity Theft –Avoid giving sensitive and personal information on the internet –Be aware of where you are releasing sensitive information –Use strong passwords –Monitor your credit and banking Reputation Management –Search yourself and be aware of what is on the internet about you –Anything you put on the internet can be viewed by others for any purpose –Explore your options to remove unwanted personal material, or anything that can effect your reputation, from the internet (I.e. contacting the poster, contact the web administrator, etc…)

9 Safety on the Internet Passwords, Cyber bullying, and Cyber stalking Passwords –Choose strong passwords that are not easy to determine (use upper and lower case letters, numbers, symbols, etc…) Cyber bullying –Can be done through social networks, e-mail, chartrooms, using cell phones, and on game consoles –Repeated and unwanted harassment through one of the above mentioned technological tools and on the internet Cyber stalking –Using the internet to stalk a person (similar to cyber bullying)

10 Safety on Your Computer Viruses –Can be downloaded through visiting internet sites or attached to emails Phishing –When an intruder sends a message, posing as a company or other reputable source, asking for personal information Trojan Horses –A program that depicts itself as one that the user wants but in reality, steals all of your personal information Worms –Worms can transfer information from your computers to others in mass amounts

11 How to Protect Your Computer Doering and Roblyer, page 219, Figure 7.8 1.Keep virus protection software up to date 2.Download only from reputable sites 3.Never open email attachments from unknown senders 4.Never open email attachments until you confirm their intent

12 References Bakker, Connie. "Saying "yes" instead of "no"." LearnNC, 2000. Web. 8 Sept. 2011.<http://www.learnnc.org/lp/pages /800?ref=search>. Doering, Aaron H., and M D. Roblyer. Integrating educational technology into teaching. 5th ed. N.p.: Allyn & Bacon, 2010. 218-22. Print. Microsoft safety and security center. Microsoft, 2011. Web. 8 Sept. 2011.<http://www.microsoft.com/security /default.aspx>. Teaching Copyright. Electronic Frontier Foundation, 2010. Web. 8 Sept. 2011..


Download ppt "Digital Citizenship Project Amanda Friscia University of West Alabama ED 505--Fall 2011 Online."

Similar presentations


Ads by Google