Presentation is loading. Please wait.

Presentation is loading. Please wait.

Shermaine L. Mahan. Social media netiquette is the social code for using social media. Social media is user generated content while netiquette is the.

Similar presentations

Presentation on theme: "Shermaine L. Mahan. Social media netiquette is the social code for using social media. Social media is user generated content while netiquette is the."— Presentation transcript:

1 Shermaine L. Mahan


3 Social media netiquette is the social code for using social media. Social media is user generated content while netiquette is the social code of the internet. Therefore, social media netiquette is the way users conduct themselves while online with others.


5 Dos Be generous Share accurate information Correct mistakes Show love Respect privacy Don’t lie Don’t hate No cursing No disrespect Avoid sarcasm and facetious remarks Don’ts


7 Copyright is a legal device that provides the creator of a work of art or literature, or a work that conveys information or ideas, the right to control how the work is used. Fair use is the most significant limitation on the copyright holder’s exclusive rights.

8 Rules for using Fair Use: (Education) If a teacher is using a copyrighted work for the purpose of educating and is using only a segment of the copyrighted work, it usually will fall under fair use laws. The opening screen in multimedia presentations needs to say that the usage of the copyrighted material falls under fair use laws with no intended copyright violation. Proper credits and citations must always be included. If the copyrighted work is placed on the internet, is copied more than nine times in a semester, or if the entire work is being used, fair use no longer exists. (Lengths Limits) Only small segments of multimedia can be used under fair use, and if the usage exceeds that amount, copyright has been breached. Motion media, such as television and film, can be used for only three minutes or 10 percent of the work. Music can be played for 30 seconds or 10 percent of the piece. Text can be used for 1,000 words or 10 percent of the work. Most importantly, alterations to the work are not permitted in any format.


10 Plagiarism means to steal and pass off (the ideas or words of another) as one’s own to use (another’s production) without crediting the source to commit literary theft to present as new and original an idea or product derived from an existing source.

11 Ways to avoid plagiarism: Brainstorm before working on the paper so you will have an idea of what you want to discuss. Use multiple sources. Use paraphrasing. Give credit to the author(s) for everything copied word for word. Use citations in text, footnotes and bibliography.

12 Ways teachers can recognize plagiarism:


14 Identity theft occurs when your personal information is stolen and used without your knowledge to commit fraud or other crimes. Ways to avoid identity theft: Keep your social security card in a safe place. Check your credit report twice a year. Use a paper shredder to destroy any documents that contain your personal information. Do not save website passwords on the Internet browser. Do not give credit card numbers or social security numbers over the phone unless you initiated the call.

15 Ways to maintain reputation management: Show respect to others. Refrain from spreading rumors about others. Report any rumors spreading about you.


17 Everyone uses passwords while online, but it is very important to keep those passwords safe. It is highly recommended to remember your passwords as you browse online, but if it is not possible to remember your passwords, you should keep them in a SAFE place. Do not save passwords on the Internet browser because they are in danger of being stolen by hackers.


19 Cyberbullying is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones. It has to have a minor on both sides, or at least have been instigated by a minor against another minor. Once adults become involved, it is called cyber-harassment or cyberstalking. Adult cyber-harassment or cyberstalking is never considered as cyberbullying. Cyberstalking is a technologically-based “attack” on one person who has been targeted specifically for that attack for reasons of anger, revenge or control. Cyberstalking includes: harassment, embarrassment and humiliation of the victim emptying bank accounts or other economic control such as ruining the victim's credit score harassing family, friends and employers to isolate the victim scare tactics to instill fear and more.


21 A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs). An e-mail virus travels as an attachment to e-mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Phishing is a method of online identity theft. In addition to stealing personal and financial data, phishers can infect computers with viruses and convince people to participate unwittingly in money laundering. A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically. A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.

22 How to keep your computer safe? Use a firewall. Scan for viruses. Scan for spyware. Keep your virus software up-to-date. Make sure your mobile connection is secure. Make sure you browse on sites that you trust. Be careful with email attachments if you don’t know the sender.

23 Copyright and Fair Use Cyberbullying Deter. Detect. Defeat. Avoid ID Theft Fair Use How To Avoid Identity Theft Official Social Netiquette Plagiarism: How To Avoid It STOP cyberbullying The Rules of Netiquette

Download ppt "Shermaine L. Mahan. Social media netiquette is the social code for using social media. Social media is user generated content while netiquette is the."

Similar presentations

Ads by Google