 Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your.

Slides:



Advertisements
Similar presentations
Developed by Technology Services 1:1 Laptop Initiative
Advertisements

INTERNET SAFETY FOR STUDENTS
How Secure Are You When You Use the Internet?. Overview What is the Internet? And what it is commonly used for? o Parents vs. Teens/Kids Use Ways of accessing.
INTERNET SAFETY FOR STUDENTS
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
Shermaine L. Mahan. Social media netiquette is the social code for using social media. Social media is user generated content while netiquette is the.
Margaret Sherrod ED 505 University of West Alabama Spring
Digital Citizenship Project
A Guide to Digital Citizenship
D IGITAL C ITIZENSHIP. Definition: The informal rules of behavior to be followed when using the Internet N ETIQUETTE.
Digital Citizenship By: Miranda Scorver.
Digital Citizenship Donna Watson ED505. Definition of NETIQUETTE Etiquette governing communication on the Internet. Etiquette governing communication.
Ashley Chambliss ED 505 Fall 2. “Digital Citizenship is a way for teachers to prepare you for a world full of technology.” (Ribble, ) “A means.
Digital Citizenship Jessica L. Webb ED 505. Netiquette Netiquette Social Media- interactive dissemination of information through the internet. Netiquette-
Digital Citizenship Project By: Wanda Hicks Technology and Education Dr. Hocutt.
DIGITAL CITIZENSHIP DIGITAL CITIZENSHIP By: Erica Lewis ED 505.
By: Catherine Tingle. What is it?  Netiquette refers to appropriate and safe interactions online.
Digital Citizenship Project Elle Wagner ED 505. Netiquette on Social Media Sites DoDon’t Be professionalPost illegal activity Share accurate informationBully.
Donette Mullinix ED 505 UWA Clipart:
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
Submitted by: Donna Rembert Instructor: Dr. Laurie Fowler ED508 Technology Portfolio.
Digital Citizen Project Katie Goodall Educational Technology 505.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
What is Digital Citizenship?. Digital Citizenship Digital Citizenship is knowing and understanding the proper use of technology. The following are some.
A guide to netiquette, copyright & fair use, plagiarism, internet and computer safety By Briana Horton.
Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered.
Donald Constant. Digital Citizenship  For teachers and students, digital citizenship changes as new technology tools are used by the educational world.
Digital Citizenship Project By: Tierra Collins EDU 505.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
By: Tina Hill.  This is the unwritten rules of the different media sites on the internet.
Digital Citizenship Project Jared Smith ED 505. Netiquette on Social Media Sites  Netiquette on Social Media Sites is “the social code of using social.
Digital Citizenship Project Amanda Friscia University of West Alabama ED 505--Fall 2011 Online.
Digital Citizenship Project By Allen Naylor Ed 505.
Digital Citizenship By: Amanda Thurber. Netiquette on Social Media Sites According to networketiquette.net, netiquette is the social code of the internet.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
Digital Citizenship Project. Netiquette Do’s -Read before you post messages. -Try to keep your postings brief and easy to read. -Be kind when others make.
BRADLEY BARNES DIGITAL CITIZENSHIP. NETIQUETTE ON SOCIAL MEDIA SITES Netiquette is the etiquette guidelines that govern behavior when communicating on.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
ED 505: Magen Anthony. Netiquette on Social Media site is the etiquette or guideline for posting on social media or other online sites. This helps individuals.
Digital Citizen Project Xiomara Hernandez. Topics Defined Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety.
Digital Citizenship By: Michael Morgan. Netiquette on Social Media Sites  The rules of etiquette that apply when communicating over computer networks,
Digital Citizenship Sonya McGraw June 2, Netiquette WHAT IS IT? n Set of rules for proper behavior among people on the Internet.
Cassidy Culligan Digital Citizenship Project ED 505.
THE SAFE AND ETHICAL USE OF TECHNOLOGY IN SCHOOLS PRESENTED BY JESSICA CHAIDEZ TECH 503.
Digital Citizenship By Lori Gray.
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
Digital Citizenship. What is Netiquette? Netiquette is known as the “social code of the internet.” Netiquette comes from the words “network” and “etiquette.”
By: Shervanae Scott. Social Media Netiquette “Netiquette” refers to etiquette on the Internet. Good “netiquette” involves respecting others' privacy.
Digital Citizenship By: William Rickman Digital Citizenship is the knowledge for children and other computer users to know how to appropriately use the.
Digital Citizenship. What is a Digital Citizen? Digital Citizens are people who use technology often and appropriately. Digital Citizens are people who.
Digital Citizen Project By: Frances Murphey Technology and Education.
By: Mallory Thornton.  Social code of website  Cyber term  Derived from network and etiquette.
Randall E. Jackson ED 505 Dr. Ray  Netiquette is essentially manners for the internet. It is rules for how you should behave online.
I want you to be a good Digital Citizen By: Brandi S. Howard.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
+ Digital Citizenship Amanda Smith ED Netiquette on Social Media Netiquette refers to the etiquette that is used on the internet and communicating.
Things Every Computer User Should Know… Jessica Johnsey ED 505- Technology and Education.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
Digital Citizenship By: Michelle Hamby ED505. Digital citizenship is the norms of appropriate, responsible technology use. Netiquette Copyright Fair Use.
Netiquette on Social Media Sites What is Netiquette? Netiquette is network etiquette – this is the etiquette of cyberspace. Etiquette means the conventional.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
INTERNET SAFETY, NETIQUETTE, AND COPYRIGHT LAWS By Alex Pagliaro.
Technology Safety By: Stefanie Weston. Netiquette Dos and Don’ts for Children  Do  Respect the topic that is being discussed.  Be polite and make friends.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
DIGITAL CITIZENSHIP What You Should Know!.
Online Safety! By: Michelle Deng.
Digital Citizenship by Jeremy Head.
Presentation transcript:

 Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your grammar and spelling. - Correct other’s grammar or spelling without consent. - Make your profiles private - Say anything you will regret - Think before your submit- Post anything you wouldn’t want anyone to see. - Connect with others

 Fair use- when you copy material that is under a copyright and use it to criticize, comment on, or parody (Stanford, 2010). - Examples: quoting a line from a song, summarizing a news report, and copying some paragraphs from an article.  Copyright- a type of protection by the US Constitution that protects original work by an author (Copyright.gov, 2006).

Similarities Differences  Both protect rights for original works.  Copyright tells you what you cannot do.  Fair Use tells you the exceptions to use original works that are copyrighted.  Copyright is the law.  Fair use is the loophole to the law.

Motion MediaUp to 3 minutes or 3% Text Media1,00 words or 10% Music, Lyrics, Music Videos No more than 30 seconds or up to 10%. Illustrations or Photographs No more than 5 pictures from one person Numerical Data Sets 2,500 fields or cell entries or up to 10% Copying of an Instructors Multimedia Project No more than two copies (Maryland, 2011)

 What is it? - Using someone else's work as your own. - Using work that has not been cited. - An act of fraud. (What is Plagiarism, n.d)  How can you avoid it? - Cite the sources that you get your information from. - Helpful website on citing:

 The following websites are available to help teachers find plagiarized materials:  The websites look for commonly used words and phrases as well as copyrighted photography.

On the Internet

 When someone takes your personal information such as your social security number, name, or credit card number without you knowing (Federal Trade Commission, n.d.)

How They Do It How to Protect Yourself  Changing your address  Stealing  Dumpster Diving  Phishing  Skimming- stealing credit card numbers by using a special machine.  Pretexting- lying to services (cable, telephone, etc) to get your information.  Be aware  Educate those around you  Pay close attention to everything associate with your name so you can detect a change  Go to the FTC website at: onsumers/about-identity-theft.html

 How you look online to others.  Can be a person, business, animals, locations or materials.  Your reputation on the internet could show anything from your age to your mortgage payment (Reputation, 2012)  To find out your internet reputation click on this link:

 Tips for making your passwords secure: - Have more than one password - Don’t give your password to anyone - Make it easy for you to remember, but hard for people to guess. - Use symbols ($^#%) - Have at least 8 characters in your password. (Tech Parenting Group, 2011)

 When someone, usually a preteen, child, or teen, is targeted buy a peer on the internet. Can include embarrassment, harassment, threats, or other bullying characteristics (WiredKids, n.d.)  Best way to prevent is to teach youth about it and how to stop it.  Visit ml for more information. ml

 When one person uses the internet or computer to make unwanted advances or makes threats toward another person (The National Center for Victims of Crime, 2011).  Effects of cyber stalking: - Nightmares - Anxiety - Fear for safety - Shock

On Your Computer

 A small type of software that connects itself to other things on your computer. When you open the programs or files it is on, it multiplies (Brian & Fenlon, 2012).  How to know your computer has a virus: - Crashes a lot - Corrupted message - Browser looks different.

 A type of stealing that is done by putting a software on your computer through a virus or stealing off your computer (Microsoft, 2012).  Phishing s have the following qualities: - Bad grammar - Spelling issues - Links - Threats - Stealing a popular company’s name. (Microsoft, 2012)

 A part of a computer virus that puts a harmful code in your computer (Search Security, 1998)  How to prevent a Trojan horse virus: - Don’t download anything from strangers - Make sure you know what a file is before opening it. - Don’t think you are safe because you have an antivirus software.

 Programs that can move across network connections. Similar to viruses but spread differently (Virusall.com, 1997).  Can be spread through the following applications: - s - Instant Messaging - Internet - File-sharing - IRC Worms (Computer Worm, 2012)

 N/A (2012). No Title. Retrieved from  Doyle, A. (2012). Top 10 social media do’s and don’ts. Retrieved from  Stanford University Libraries (2012). What is fair use? Retrieved from  U.S. Copyright Office (2006). Copyright in general. Retrieved from  University of Maryland (2011). Copyright and fair use in the UMUC online face-to-face classroom. Retrieved from  What is Plagiarism? (n.d.). Retrieved from  Suarez, J., Martin, A. (2001). Internet plagiarism: A teacher’s combat guide. Contemporary Issues in Technology and Teach Education, 1(4). Retrieved from  Federal Trade Commission (n.d.) Fighting back against identity theft. Retrieved from  Reputation.com, Inc (2012) Take your free reputation snapshot. Retrieved from  Tech Parenting Group (2011). Tips for strong, secure passwords. Retrieved from  WiredKids, Inc (n.d.) STOP cyberbullying. Retrieved from  The National Center for Victims of Crime (2011). Cyberstalking. Retrieved from  Brian, M & Fenlon, W (2012). How computer viruses work. Retrieved from  Microsoft (2012). How to recognize phishing messages, links, or phone calls. Retrieved from  Search Security (1998). Trojan Horse Attacks. Retrieved from  VIRUSALL.COM (1997). Information. Retrieved from  Computer Worm (2012). What is a computer worm? Retrieved from