Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
Introduction This power point presentation will give and explain the varies types of digital citizenship. It is always important to know what you are.
Shermaine L. Mahan. Social media netiquette is the social code for using social media. Social media is user generated content while netiquette is the.
Lathrop Intermediate School Cyber Savvy Week December 1 – December 5, 2014 Be RespectfulBe ResponsibleBe Safe Science Classrooms – Thursday, December 4,
Digital Citizenship Project
A Guide to Digital Citizenship
D IGITAL C ITIZENSHIP. Definition: The informal rules of behavior to be followed when using the Internet N ETIQUETTE.
Digital Citizenship By: Miranda Scorver.
 Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your.
Digital Citizenship Donna Watson ED505. Definition of NETIQUETTE Etiquette governing communication on the Internet. Etiquette governing communication.
Ashley Chambliss ED 505 Fall 2. “Digital Citizenship is a way for teachers to prepare you for a world full of technology.” (Ribble, ) “A means.
Digital Citizenship Jessica L. Webb ED 505. Netiquette Netiquette Social Media- interactive dissemination of information through the internet. Netiquette-
Joseph Pettaway ED505. What is Digital Citizenship? Concepts that aids individuals in learning and understanding how to use technology appropriately.
DIGITAL CITIZENSHIP DIGITAL CITIZENSHIP By: Erica Lewis ED 505.
By: Catherine Tingle. What is it?  Netiquette refers to appropriate and safe interactions online.
Donette Mullinix ED 505 UWA Clipart:
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
Submitted by: Donna Rembert Instructor: Dr. Laurie Fowler ED508 Technology Portfolio.
Digital Citizen Project Katie Goodall Educational Technology 505.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
What is Digital Citizenship?. Digital Citizenship Digital Citizenship is knowing and understanding the proper use of technology. The following are some.
A guide to netiquette, copyright & fair use, plagiarism, internet and computer safety By Briana Horton.
Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered.
Digital Citizenship Project By: Tierra Collins EDU 505.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
By: Tina Hill.  This is the unwritten rules of the different media sites on the internet.
Digital Citizenship Created By: Kelli Stinson June 2011.
Digital Citizenship Project Jared Smith ED 505. Netiquette on Social Media Sites  Netiquette on Social Media Sites is “the social code of using social.
According to netiquette simply refers to our behavior the internet.
Digital Citizenship Project Amanda Friscia University of West Alabama ED 505--Fall 2011 Online.
Digital Citizenship Project By Allen Naylor Ed 505.
Digital Citizenship. Topics  Netiquette  Copyright and Fair Use  Plagiarism  Safety on the Internet  Safety on your Computer.
Digital Citizenship By: Amanda Thurber. Netiquette on Social Media Sites According to networketiquette.net, netiquette is the social code of the internet.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
Digital Citizenship Project. Netiquette Do’s -Read before you post messages. -Try to keep your postings brief and easy to read. -Be kind when others make.
BRADLEY BARNES DIGITAL CITIZENSHIP. NETIQUETTE ON SOCIAL MEDIA SITES Netiquette is the etiquette guidelines that govern behavior when communicating on.
By: Elizabeth Scruggs Digital Citizenship Project.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
ED 505: Magen Anthony. Netiquette on Social Media site is the etiquette or guideline for posting on social media or other online sites. This helps individuals.
Digital Citizen Project Xiomara Hernandez. Topics Defined Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety.
Berkeley Unified School District Cyber Savvy social networking and netiquette.
Digital Citizenship By: Michael Morgan. Netiquette on Social Media Sites  The rules of etiquette that apply when communicating over computer networks,
Cassidy Culligan Digital Citizenship Project ED 505.
Topic 5: Basic Security.
Digital Citizenship By Lori Gray.
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
Digital Citizenship. What is Netiquette? Netiquette is known as the “social code of the internet.” Netiquette comes from the words “network” and “etiquette.”
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Digital Citizenship. What is a Digital Citizen? Digital Citizens are people who use technology often and appropriately. Digital Citizens are people who.
By: Mr. Jamie Ferguson. Before we begin using our computers for internet use this semester, we will be learning the rules for the classroom. You will.
Digital Citizenship Amy Tubb ED 505 University of West Alabama.
Digital Citizen Project By: Frances Murphey Technology and Education.
By: Mallory Thornton.  Social code of website  Cyber term  Derived from network and etiquette.
I want you to be a good Digital Citizen By: Brandi S. Howard.
Computer crimes.
DIGITAL CITIZENSHIP. Digital Citizenship covers 9 areas according to Mike Ribble, an expert in the field.  Etiquette  Communication  Literacy  Access.
Digital Citizenship ED 505 Jayme Hall Netiquette Derived from the words network and etiquette, it is the social code of network communication. The social.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
+ Digital Citizenship Amanda Smith ED Netiquette on Social Media Netiquette refers to the etiquette that is used on the internet and communicating.
Things Every Computer User Should Know… Jessica Johnsey ED 505- Technology and Education.
Any criminal action perpetrated primarily through the use of a computer.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Technology Safety By: Stefanie Weston. Netiquette Dos and Don’ts for Children  Do  Respect the topic that is being discussed.  Be polite and make friends.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
DIGITAL CITIZENSHIP What You Should Know!.
Digital Citizenship by Jeremy Head.
Digital Citizenship By: John Beverly.
Presentation transcript:

Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler

Netiquette Netiquette, a cyber-word, is the combination of words network and etiquette. Netiquette, a cyber-word, is the combination of words network and etiquette. Using proper netiquette is important while on the internet, for example: Facebook and Twitter. Using proper netiquette is important while on the internet, for example: Facebook and Twitter. It is also, the social code of the internet. It is also, the social code of the internet.

Netiquette Introduce yourself when asking someone for a friend invite. Introduce yourself when asking someone for a friend invite. Posting private conversations on your wall. You have to make sure you inbox the person that you talking to because if you post your conversation on your wall the people on your friends list will see your conversation. Posting private conversations on your wall. You have to make sure you inbox the person that you talking to because if you post your conversation on your wall the people on your friends list will see your conversation. Tagging individuals in photos. When tagging someone you have to make sure your settings is set to private so everyone won’t see unflattering photos. Tagging individuals in photos. When tagging someone you have to make sure your settings is set to private so everyone won’t see unflattering photos.

Do’s and Don’t of Proper Netiquette Do think before you post. Do think before you post. Do observe the site before you use it. Do observe the site before you use it. Do read the FAQ’s(frequently asked questions)and archives, before posting in group discussion or chat room. Do read the FAQ’s(frequently asked questions)and archives, before posting in group discussion or chat room. Do use courtesy while using netiquette. Do use courtesy while using netiquette.

Do’s and Don’t of Proper Netiquette Don’t those silly animated program( jokes, etc.) without permission from the recipient. Don’t those silly animated program( jokes, etc.) without permission from the recipient. Do not pass along warnings about internet viruses or any other threat. Do not pass along warnings about internet viruses or any other threat. Don’t entice a flame and don’t participate in flame fests. Don’t entice a flame and don’t participate in flame fests. Do not type in all capital letter- they are hard to read. Do not type in all capital letter- they are hard to read.

Copyright Copyright is a set of exclusive rights granted by the state to the creator of an original work. Copyright is a set of exclusive rights granted by the state to the creator of an original work. This includes the right to copy, distribute and adapt the work. This includes the right to copy, distribute and adapt the work.

Fair Use The law allows the use of portions of the copyrighted work without permission from the owner. The law allows the use of portions of the copyrighted work without permission from the owner. This mean that an unauthorized use of copyrighted materials is excusable if it falls under the principal of fair use. This mean that an unauthorized use of copyrighted materials is excusable if it falls under the principal of fair use.

Different between Copyright and Fair Use The different between copyright and fair use is copyright owners have exclusive statutory right to exercise control over their work and fair use have no control without the owners permission. The different between copyright and fair use is copyright owners have exclusive statutory right to exercise control over their work and fair use have no control without the owners permission. These rights applies to both published and unpublished works. These rights applies to both published and unpublished works.

What is Plagiarism? Plagiarism is stealing someone’s work and saying it is your own. Plagiarism is stealing someone’s work and saying it is your own. Copying words or ideas without giving credit Copying words or ideas without giving credit Failing to put a quotation in quotation marks. Failing to put a quotation in quotation marks.

How to avoid Plagiarism There are many ways you can avoid Plagiarism. Every time you use a source make sure you write where you got your information from. There are many ways you can avoid Plagiarism. Every time you use a source make sure you write where you got your information from. What many teachers do to detect plagiarism is they use plagiarism checkers. You can find plagiarism checkers online if you use GOOGLE or YAHOO, just type plagiarism checker in the tool bar. What many teachers do to detect plagiarism is they use plagiarism checkers. You can find plagiarism checkers online if you use GOOGLE or YAHOO, just type plagiarism checker in the tool bar.

Ways teacher can avoid plagiarism Teachers can become more aware of the reason for why plagiarism occurs. Teachers can become more aware of the reason for why plagiarism occurs. Identify different forms of plagiarism. Identify different forms of plagiarism. Integrate plagiarism prevention techniques into the curriculmn. Integrate plagiarism prevention techniques into the curriculmn.

Safety on the Internet Computer has produced many benefits for the ways we communicate in the world today, but it has enable criminal activities as well. Computer has produced many benefits for the ways we communicate in the world today, but it has enable criminal activities as well. Criminal activities such as Internet fraud, child exploitation and terrorism. Criminal activities such as Internet fraud, child exploitation and terrorism.

Safety on the Internet Identity theft Identity theft Many people get their identity stolen everyday. So you have to be careful when buying items online and putting your credit cards and other information online because you can get you identity stolen. Identity theft is a crime.

Reputation Management Your reputation can be damaged by something as simple as posting misguided blogs or opening and e- mail. Your reputation can be damaged by something as simple as posting misguided blogs or opening and e- mail. Individuals and businesses have the rights to have confidentiality and privacy respected. Individuals and businesses have the rights to have confidentiality and privacy respected. There are management programs that can help you manage your reputation. There are management programs that can help you manage your reputation.

Passwords Password is a unique identifier of letters and/numbers which allows a computer user to gain access to a computer. Password is a unique identifier of letters and/numbers which allows a computer user to gain access to a computer. Passwords are very important. Many websites you have to have a username and a password so that people can not invade your privacy. Passwords are very important. Many websites you have to have a username and a password so that people can not invade your privacy.

Cyberbullying Cyberbullying is bullying on the internet. Cyberbullying is bullying on the internet. Cyberbullying is when a person is being harass or being threaten on the internet. Cyberbullying is when a person is being harass or being threaten on the internet. Cyberbullying include activities as; text messaging; having an embarrassing picture posted without permission; and having rumors spread about them online. Cyberbullying include activities as; text messaging; having an embarrassing picture posted without permission; and having rumors spread about them online.

Cyberstalking Cyberstalking is stalking on the internet. Cyberstalking is stalking on the internet. Stalking is a form of mental assault, in which the perpetrator, unwantedly, and disruptively breaks into the life of it’s victim. Stalking is a form of mental assault, in which the perpetrator, unwantedly, and disruptively breaks into the life of it’s victim. Cybersalking can be dangers, just like real life stalking. Cybersalking can be dangers, just like real life stalking. Reports any form of stalking to your local authority. Reports any form of stalking to your local authority.

Safety on your computer Viruses a computer virus attaches it self to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Viruses a computer virus attaches it self to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Viruses can not be spread unless you run or open the malicious program. Viruses can not be spread unless you run or open the malicious program. Computer viruses can not infected your computer without human actions. Computer viruses can not infected your computer without human actions.

Worms A worm is similar to a virus but it is concerned to be a sub-class of a virus. A worm is similar to a virus but it is concerned to be a sub-class of a virus. Worms can spreads it’s virus without humans action. Worms can spreads it’s virus without humans action. The biggest danger with a worm is its capability to replicate itself on your system. The biggest danger with a worm is its capability to replicate itself on your system.

Trojan horse A Trojan horse seem to be useful but it will actually do damage once installed or run on your computer. A Trojan horse seem to be useful but it will actually do damage once installed or run on your computer. Trojan horses can appear to be legitimate software or files sources, but when you activated it on your computer, it can be very annoying. Trojan horses can appear to be legitimate software or files sources, but when you activated it on your computer, it can be very annoying. Trojan horses creates a backdoor that can let other users have access to your personal information Trojan horses creates a backdoor that can let other users have access to your personal information

Sources ial-media-etiquette-handbook/ ial-media-etiquette-handbook/ ial-media-etiquette-handbook/ ial-media-etiquette-handbook/ le_what_is_plagiarism.html le_what_is_plagiarism.html le_what_is_plagiarism.html le_what_is_plagiarism.html

Sources echnology/netiquet.shtml echnology/netiquet.shtml echnology/netiquet.shtml echnology/netiquet.shtml pyright/copyright-using/fair-use.html pyright/copyright-using/fair-use.html pyright/copyright-using/fair-use.html pyright/copyright-using/fair-use.html 17/1/ /1/ /1/ /1/107

Sources le_educational_tips_on_plagiarism_p revention.html le_educational_tips_on_plagiarism_p revention.html le_educational_tips_on_plagiarism_p revention.html le_educational_tips_on_plagiarism_p revention.html d/websites/idtheft.html d/websites/idtheft.html d/websites/idtheft.html d/websites/idtheft.html m/aboutus_sem.html m/aboutus_sem.html m/aboutus_sem.html m/aboutus_sem.html

Sources m/online_reputation_management_s em.html m/online_reputation_management_s em.html m/online_reputation_management_s em.html m/online_reputation_management_s em.html risk-behaviors/bullying/cyberbullying risk-behaviors/bullying/cyberbullying risk-behaviors/bullying/cyberbullying risk-behaviors/bullying/cyberbullying

Sources echnology/netiquet.shtml echnology/netiquet.shtml echnology/netiquet.shtml echnology/netiquet.shtml pyright/copyright-using/fair-use.html pyright/copyright-using/fair-use.html pyright/copyright-using/fair-use.html pyright/copyright-using/fair-use.html