Presentation is loading. Please wait.

Presentation is loading. Please wait.

Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.

Similar presentations


Presentation on theme: "Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler."— Presentation transcript:

1 Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler

2 Netiquette Netiquette, a cyber-word, is the combination of words network and etiquette. Netiquette, a cyber-word, is the combination of words network and etiquette. Using proper netiquette is important while on the internet, for example: Facebook and Twitter. Using proper netiquette is important while on the internet, for example: Facebook and Twitter. It is also, the social code of the internet. It is also, the social code of the internet.

3 Netiquette Introduce yourself when asking someone for a friend invite. Introduce yourself when asking someone for a friend invite. Posting private conversations on your wall. You have to make sure you inbox the person that you talking to because if you post your conversation on your wall the people on your friends list will see your conversation. Posting private conversations on your wall. You have to make sure you inbox the person that you talking to because if you post your conversation on your wall the people on your friends list will see your conversation. Tagging individuals in photos. When tagging someone you have to make sure your settings is set to private so everyone won’t see unflattering photos. Tagging individuals in photos. When tagging someone you have to make sure your settings is set to private so everyone won’t see unflattering photos.

4 Do’s and Don’t of Proper Netiquette Do think before you post. Do think before you post. Do observe the site before you use it. Do observe the site before you use it. Do read the FAQ’s(frequently asked questions)and archives, before posting in group discussion or chat room. Do read the FAQ’s(frequently asked questions)and archives, before posting in group discussion or chat room. Do use courtesy while using netiquette. Do use courtesy while using netiquette.

5 Do’s and Don’t of Proper Netiquette Don’t email those silly animated program( jokes, etc.) without permission from the recipient. Don’t email those silly animated program( jokes, etc.) without permission from the recipient. Do not pass along warnings about internet viruses or any other threat. Do not pass along warnings about internet viruses or any other threat. Don’t entice a flame and don’t participate in flame fests. Don’t entice a flame and don’t participate in flame fests. Do not type in all capital letter- they are hard to read. Do not type in all capital letter- they are hard to read.

6 Copyright Copyright is a set of exclusive rights granted by the state to the creator of an original work. Copyright is a set of exclusive rights granted by the state to the creator of an original work. This includes the right to copy, distribute and adapt the work. This includes the right to copy, distribute and adapt the work.

7 Fair Use The law allows the use of portions of the copyrighted work without permission from the owner. The law allows the use of portions of the copyrighted work without permission from the owner. This mean that an unauthorized use of copyrighted materials is excusable if it falls under the principal of fair use. This mean that an unauthorized use of copyrighted materials is excusable if it falls under the principal of fair use.

8 Different between Copyright and Fair Use The different between copyright and fair use is copyright owners have exclusive statutory right to exercise control over their work and fair use have no control without the owners permission. The different between copyright and fair use is copyright owners have exclusive statutory right to exercise control over their work and fair use have no control without the owners permission. These rights applies to both published and unpublished works. These rights applies to both published and unpublished works.

9 What is Plagiarism? Plagiarism is stealing someone’s work and saying it is your own. Plagiarism is stealing someone’s work and saying it is your own. Copying words or ideas without giving credit Copying words or ideas without giving credit Failing to put a quotation in quotation marks. Failing to put a quotation in quotation marks.

10 How to avoid Plagiarism There are many ways you can avoid Plagiarism. Every time you use a source make sure you write where you got your information from. There are many ways you can avoid Plagiarism. Every time you use a source make sure you write where you got your information from. What many teachers do to detect plagiarism is they use plagiarism checkers. You can find plagiarism checkers online if you use GOOGLE or YAHOO, just type plagiarism checker in the tool bar. What many teachers do to detect plagiarism is they use plagiarism checkers. You can find plagiarism checkers online if you use GOOGLE or YAHOO, just type plagiarism checker in the tool bar.

11 Ways teacher can avoid plagiarism Teachers can become more aware of the reason for why plagiarism occurs. Teachers can become more aware of the reason for why plagiarism occurs. Identify different forms of plagiarism. Identify different forms of plagiarism. Integrate plagiarism prevention techniques into the curriculmn. Integrate plagiarism prevention techniques into the curriculmn.

12 Safety on the Internet Computer has produced many benefits for the ways we communicate in the world today, but it has enable criminal activities as well. Computer has produced many benefits for the ways we communicate in the world today, but it has enable criminal activities as well. Criminal activities such as Internet fraud, child exploitation and terrorism. Criminal activities such as Internet fraud, child exploitation and terrorism.

13 Safety on the Internet Identity theft Identity theft Many people get their identity stolen everyday. So you have to be careful when buying items online and putting your credit cards and other information online because you can get you identity stolen. Identity theft is a crime.

14 Reputation Management Your reputation can be damaged by something as simple as posting misguided blogs or opening and e- mail. Your reputation can be damaged by something as simple as posting misguided blogs or opening and e- mail. Individuals and businesses have the rights to have confidentiality and privacy respected. Individuals and businesses have the rights to have confidentiality and privacy respected. There are management programs that can help you manage your reputation. There are management programs that can help you manage your reputation.

15 Passwords Password is a unique identifier of letters and/numbers which allows a computer user to gain access to a computer. Password is a unique identifier of letters and/numbers which allows a computer user to gain access to a computer. Passwords are very important. Many websites you have to have a username and a password so that people can not invade your privacy. Passwords are very important. Many websites you have to have a username and a password so that people can not invade your privacy.

16 Cyberbullying Cyberbullying is bullying on the internet. Cyberbullying is bullying on the internet. Cyberbullying is when a person is being harass or being threaten on the internet. Cyberbullying is when a person is being harass or being threaten on the internet. Cyberbullying include activities as; text messaging; having an embarrassing picture posted without permission; and having rumors spread about them online. Cyberbullying include activities as; text messaging; having an embarrassing picture posted without permission; and having rumors spread about them online.

17 Cyberstalking Cyberstalking is stalking on the internet. Cyberstalking is stalking on the internet. Stalking is a form of mental assault, in which the perpetrator, unwantedly, and disruptively breaks into the life of it’s victim. Stalking is a form of mental assault, in which the perpetrator, unwantedly, and disruptively breaks into the life of it’s victim. Cybersalking can be dangers, just like real life stalking. Cybersalking can be dangers, just like real life stalking. Reports any form of stalking to your local authority. Reports any form of stalking to your local authority.

18 Safety on your computer Viruses a computer virus attaches it self to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Viruses a computer virus attaches it self to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Viruses can not be spread unless you run or open the malicious program. Viruses can not be spread unless you run or open the malicious program. Computer viruses can not infected your computer without human actions. Computer viruses can not infected your computer without human actions.

19 Worms A worm is similar to a virus but it is concerned to be a sub-class of a virus. A worm is similar to a virus but it is concerned to be a sub-class of a virus. Worms can spreads it’s virus without humans action. Worms can spreads it’s virus without humans action. The biggest danger with a worm is its capability to replicate itself on your system. The biggest danger with a worm is its capability to replicate itself on your system.

20 Trojan horse A Trojan horse seem to be useful but it will actually do damage once installed or run on your computer. A Trojan horse seem to be useful but it will actually do damage once installed or run on your computer. Trojan horses can appear to be legitimate software or files sources, but when you activated it on your computer, it can be very annoying. Trojan horses can appear to be legitimate software or files sources, but when you activated it on your computer, it can be very annoying. Trojan horses creates a backdoor that can let other users have access to your personal information Trojan horses creates a backdoor that can let other users have access to your personal information

21 Sources http://www.techipedia.com/2008/soc ial-media-etiquette-handbook/ http://www.techipedia.com/2008/soc ial-media-etiquette-handbook/ http://www.techipedia.com/2008/soc ial-media-etiquette-handbook/ http://www.techipedia.com/2008/soc ial-media-etiquette-handbook/ http://www.plagiarism.org/plag_artic le_what_is_plagiarism.html http://www.plagiarism.org/plag_artic le_what_is_plagiarism.html http://www.plagiarism.org/plag_artic le_what_is_plagiarism.html http://www.plagiarism.org/plag_artic le_what_is_plagiarism.html http://www.networketiquette.net/ http://www.networketiquette.net/http://www.networketiquette.net/

22 Sources http://www.jamaicans.com/articles/t echnology/netiquet.shtml http://www.jamaicans.com/articles/t echnology/netiquet.shtml http://www.jamaicans.com/articles/t echnology/netiquet.shtml http://www.jamaicans.com/articles/t echnology/netiquet.shtml http://smallbusiness.findlaw.com/co pyright/copyright-using/fair-use.html http://smallbusiness.findlaw.com/co pyright/copyright-using/fair-use.html http://smallbusiness.findlaw.com/co pyright/copyright-using/fair-use.html http://smallbusiness.findlaw.com/co pyright/copyright-using/fair-use.html http://codes.lp.findlaw.com/uscode/ 17/1/107 http://codes.lp.findlaw.com/uscode/ 17/1/107 http://codes.lp.findlaw.com/uscode/ 17/1/107 http://codes.lp.findlaw.com/uscode/ 17/1/107

23 Sources http://www.plagiarism.org/plag_artic le_educational_tips_on_plagiarism_p revention.html http://www.plagiarism.org/plag_artic le_educational_tips_on_plagiarism_p revention.html http://www.plagiarism.org/plag_artic le_educational_tips_on_plagiarism_p revention.html http://www.plagiarism.org/plag_artic le_educational_tips_on_plagiarism_p revention.html http://www.justice.gov/criminal/frau d/websites/idtheft.html http://www.justice.gov/criminal/frau d/websites/idtheft.html http://www.justice.gov/criminal/frau d/websites/idtheft.html http://www.justice.gov/criminal/frau d/websites/idtheft.html http://www.myreputationmanager.co m/aboutus_sem.html http://www.myreputationmanager.co m/aboutus_sem.html http://www.myreputationmanager.co m/aboutus_sem.html http://www.myreputationmanager.co m/aboutus_sem.html

24 Sources http://www.myreputationmanager.co m/online_reputation_management_s em.html http://www.myreputationmanager.co m/online_reputation_management_s em.html http://www.myreputationmanager.co m/online_reputation_management_s em.html http://www.myreputationmanager.co m/online_reputation_management_s em.html http://www.parentfurther.com/high- risk-behaviors/bullying/cyberbullying http://www.parentfurther.com/high- risk-behaviors/bullying/cyberbullying http://www.parentfurther.com/high- risk-behaviors/bullying/cyberbullying http://www.parentfurther.com/high- risk-behaviors/bullying/cyberbullying http://wiki.ask.com/Cyberstalking http://wiki.ask.com/Cyberstalking http://wiki.ask.com/Cyberstalking

25 Sources http://www.jamaicans.com/articles/t echnology/netiquet.shtml http://www.jamaicans.com/articles/t echnology/netiquet.shtml http://www.jamaicans.com/articles/t echnology/netiquet.shtml http://www.jamaicans.com/articles/t echnology/netiquet.shtml http://wiki.ask.com/Copyright http://wiki.ask.com/Copyright http://wiki.ask.com/Copyright http://smallbusiness.findlaw.com/co pyright/copyright-using/fair-use.html http://smallbusiness.findlaw.com/co pyright/copyright-using/fair-use.html http://smallbusiness.findlaw.com/co pyright/copyright-using/fair-use.html http://smallbusiness.findlaw.com/co pyright/copyright-using/fair-use.html


Download ppt "Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler."

Similar presentations


Ads by Google