2 Netiquette on social media sites A network- several computers that communicate and work together.Etiquette – social code or behavior based on standards of contemporary and social expectations.Netiquette- (network etiquette) the social standard of the internet, based on behavior and standards on the internet.
3 Netiquette Do’s and Dont’s Treat others like you want to be treated.Do remember that once it is on the internet it is there for ever.Do be briefDo your research before you postDo respect others and their opinionDon’tsDon’t verbally abuse othersUse foul languageDon’t take it personally
4 Copyright and fair useCopyright- the exclusive legal right to reproduce, publish, sell, or distribute the matter and form of something (as a literary, musical, or artistic work.Fair use- a legal doctrine that portions of copyrighted materials may be used without permission of the copyright owner provided the use is fair and reasonable, does not substantially impair the value of the materials, and does not curtail the profits reasonably expected by the ownerWhat’s the difference?A copyright must be obtained ,whereas fair use is spontaneous and used solely for educational purposes.
5 Copyright Rules Must be spontaneous Must have educational value List of what can be printedOne chapter from a bookVideo- single copy, 3 minutes, 10% of the whole, whichever is lessMusic- single copy for teacher and up to 10% on composition.Poetry- single copy 250 words or less, no more than two pagesPhotos- single copy for a teacher, and no more than five images of one artist/ photographer in one program or printing and not more than 10% to 15% of an artists published work
6 Plagiarism How to Avoid it Ways for teachers to detect it… to steal and pass off (the ideas or words of another) as one's ownto use (another's production) without crediting the sourceto commit literary theftto present as new and original an idea or product derived from an existing sourceHow to Avoid itCite sourcesMaking the audience aware of where you received the informationWays for teachers to detect it…Use programs like Turnitin, iThenticate, or Write CheckThese are all programs designed to promote authenticity of material
7 Internet safety tips Prevent identity theft by: To protect passwords keeping as much personal information off of the internet as possibleinstalling antivirus, firewall software protection on your computeronly use secure sitesTo protect passwordsDo not use the same password,Use “safer” passwords with numbers, lower case and uppercase lettersChange your password at least once a yearDo not share or reveal passwords to anyoneProtect your reputation: once you have posted it online it is there for anyone to see and forever. If you would not say it or do it in public don’t put it online
8 Internet safety tipsCyberbullying: verbally abusing a person online for whatever reasonWhat to do about cyberbulliesTell an adultTell the person to stopContact authorities and internet service providerSave all communication for possible proof later onCyberstalking: usually done by an adult (unlike cyberbullying)What to doSave communications unalteredContact authorities then ISP and keep a record
9 Computer safetyKeep your computer safe from hackers and identity thieves by watching out for the following:Phishing- when a person pretends to be a company through to steal personal information, and passwords from people.Viruses- a program that replicates itself after it has entered your computerTrojan horse- a malicious program that is designed to look like a benign program to infiltrate your computerWorms- are programs that bury themselves inside your computer that spread through
10 referencesCyberbullying / Stalking & Harassment . (n.d.). Welcome to WiredSafety. Retrieved January 31, 2012, from egory&layout=blog&id=96&Itemid=371Dictionary and Thesaurus - Merriam-Webster Online. (n.d.). Dictionary and Thesaurus - Merriam-Webster Online. Retrieved January 30, 2012, fromPlagiarism.org. (n.d.). Plagiarism.org. Retrieved January 30, 2012, fromThe Rules of Netiquette. (n.d.). Netiquette. Retrieved January 30, 2012, from