2 Netiquette on Social Media Sites “Netiquette, network etiquette, is the social code of the internet because the internet is a network and etiquette is a social code.” (Social Media Netiquette, n. d.)
3 Netiquette- Dos and Don’ts Do- Act with courtesy.Don’t – Act DisrespectfulDo- Respect your privacy and others privacy.Don’t – Post things you don’t want to share with the world.(Social Media Netiquette, n. d.)
4 Copyright and Fair Use“Copyright grants the author of the work the legal right to determine how or whether the work will be reproduced, distributed, displayed, or performed, as well as the right to produce derivative works based on the original.”“Fair use allows for portions, or in some cases the entirety, of copyrighted works to be used for purposes such as "criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research."(BlackBoard, 2000)
5 PlagiarismACCORDING TO THE MERRIAM-WEBSTER ONLINE DICTIONARY, TO "PLAGIARIZE" MEANSto steal and pass off (the ideas or words of another) as one's ownto use (another's production) without crediting the sourceto commit literary theftto present as new and original an idea or product derived from an existing source(Plagiarism 101, 2013)
6 Ways to Avoid Plagiarism Plagiarism can be avoided by properly siting sources.There are a few online websites that will check work for plagiarism, this tool is very useful for teachers.
7 Safety on the InternetThe internet can be a very dangerous place if certain rules are not followed or certain precautions not taken.“ Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain. ” (Identity Theft and Identity Fraud, 2013)You should not share your passwords with others.
8 Cyberbullying“Cyberbullying is bullying that takes place using electronic technology. Examples of cyberbullying include mean text messages or s, rumors sent by or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles.” (Cyberbullying, 2013)
9 Cyberstalking“Cyberstalking may arise where an individual pursues or repeatedly attempts to contact someone via the Internet. The Internet provides a number of protocols by way of which this may happen, such as , chat rooms, instant messaging, bulletin boards, website discussion forums or user net groups. The distinction between harassment and cyberstalking is that cyberstalking is characterized by pursuit and fear.” (Harvey, 2003)
10 Reputation Management It is important to represent yourself well on the internet. Once you post something to any social media site it is available for the world to see. Be sure to represent yourself on the internet in the same way you would in person.
11 Safety on the ComputerIt is also very important to protect your computer itself from being harmed or invaded.“According to Webster's Collegiate Dictionary, a computer virus is "a computer program usually hidden within another seemingly innocuous program that produces copies of itself and inserts them into other programs or files, and that usually performs a malicious action (such as destroying data)“.”“Worms are very similar to viruses in that they are computer programs that replicate functional copies of themselves (usually to other computer systems via network connections) and often, but not always, contain some functionality that will interfere with the normal use of a computer or a program.”“A Trojan horse is a program that does something undocumented which the programmer intended, but that users would not accept if they knew about it.”(University Information Technology Services, 2013)
12 Phishing“Phishing is a technique used to gain personal information for purposes of identity theft, using fraudulent messages that appear to come from legitimate businesses. These authentic- looking messages are designed to fool recipients into divulging personal data such as account numbers and passwords, credit card numbers and Social Security numbers.” (Quick Study: Phishing, 2013)
13 Works CitedBlackBoard. (2000). Copyright, Fair Use, & . Retrieved fromCyberbullying. (2013). Retrieved from Stop Bullying:Harvey, J. D. (2003). CYBERSTALKING AND INTERNET HARASSMENT: WHAT THE.Identity Theft and Identity Fraud. (2013). Retrieved from The United States Department of Justice:Plagiarism 101. (2013). Retrieved from Plagiarism.Org: 101/what-is-plagiarismQuick Study: Phishing. (2013). Retrieved from ComputerWorld:Social Media Netiquette. (n.d.). Retrieved from Network Etiquette:University Information Technology Services. (2013). Retrieved from Indiana University: