Presentation is loading. Please wait.

Presentation is loading. Please wait.

 Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your.

Similar presentations

Presentation on theme: " Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your."— Presentation transcript:


2  Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your grammar and spelling. - Correct other’s grammar or spelling without consent. - Make your profiles private - Say anything you will regret - Think before your submit- Post anything you wouldn’t want anyone to see. - Connect with others

3  Fair use- when you copy material that is under a copyright and use it to criticize, comment on, or parody (Stanford, 2010). - Examples: quoting a line from a song, summarizing a news report, and copying some paragraphs from an article.  Copyright- a type of protection by the US Constitution that protects original work by an author (, 2006).

4 Similarities Differences  Both protect rights for original works.  Copyright tells you what you cannot do.  Fair Use tells you the exceptions to use original works that are copyrighted.  Copyright is the law.  Fair use is the loophole to the law.

5 Motion MediaUp to 3 minutes or 3% Text Media1,00 words or 10% Music, Lyrics, Music Videos No more than 30 seconds or up to 10%. Illustrations or Photographs No more than 5 pictures from one person Numerical Data Sets 2,500 fields or cell entries or up to 10% Copying of an Instructors Multimedia Project No more than two copies (Maryland, 2011)

6  What is it? - Using someone else's work as your own. - Using work that has not been cited. - An act of fraud. (What is Plagiarism, n.d)  How can you avoid it? - Cite the sources that you get your information from. - Helpful website on citing:

7  The following websites are available to help teachers find plagiarized materials: - - - -  The websites look for commonly used words and phrases as well as copyrighted photography.

8 On the Internet

9  When someone takes your personal information such as your social security number, name, or credit card number without you knowing (Federal Trade Commission, n.d.)

10 How They Do It How to Protect Yourself  Changing your address  Stealing  Dumpster Diving  Phishing  Skimming- stealing credit card numbers by using a special machine.  Pretexting- lying to services (cable, telephone, etc) to get your information.  Be aware  Educate those around you  Pay close attention to everything associate with your name so you can detect a change  Go to the FTC website at: onsumers/about-identity-theft.html

11  How you look online to others.  Can be a person, business, animals, locations or materials.  Your reputation on the internet could show anything from your age to your mortgage payment (Reputation, 2012)  To find out your internet reputation click on this link:

12  Tips for making your passwords secure: - Have more than one password - Don’t give your password to anyone - Make it easy for you to remember, but hard for people to guess. - Use symbols ($^#%) - Have at least 8 characters in your password. (Tech Parenting Group, 2011)

13  When someone, usually a preteen, child, or teen, is targeted buy a peer on the internet. Can include embarrassment, harassment, threats, or other bullying characteristics (WiredKids, n.d.)  Best way to prevent is to teach youth about it and how to stop it.  Visit ml for more information. ml

14  When one person uses the internet or computer to make unwanted advances or makes threats toward another person (The National Center for Victims of Crime, 2011).  Effects of cyber stalking: - Nightmares - Anxiety - Fear for safety - Shock

15 On Your Computer

16  A small type of software that connects itself to other things on your computer. When you open the programs or files it is on, it multiplies (Brian & Fenlon, 2012).  How to know your computer has a virus: - Crashes a lot - Corrupted message - Browser looks different.

17  A type of stealing that is done by putting a software on your computer through a virus or stealing off your computer (Microsoft, 2012).  Phishing emails have the following qualities: - Bad grammar - Spelling issues - Links - Threats - Stealing a popular company’s name. (Microsoft, 2012)

18  A part of a computer virus that puts a harmful code in your computer (Search Security, 1998)  How to prevent a Trojan horse virus: - Don’t download anything from strangers - Make sure you know what a file is before opening it. - Don’t think you are safe because you have an antivirus software.

19  Programs that can move across network connections. Similar to viruses but spread differently (, 1997).  Can be spread through the following applications: - Emails - Instant Messaging - Internet - File-sharing - IRC Worms (Computer Worm, 2012)

20  N/A (2012). No Title. Retrieved from  Doyle, A. (2012). Top 10 social media do’s and don’ts. Retrieved from  Stanford University Libraries (2012). What is fair use? Retrieved from  U.S. Copyright Office (2006). Copyright in general. Retrieved from  University of Maryland (2011). Copyright and fair use in the UMUC online face-to-face classroom. Retrieved from  What is Plagiarism? (n.d.). Retrieved from  Suarez, J., Martin, A. (2001). Internet plagiarism: A teacher’s combat guide. Contemporary Issues in Technology and Teach Education, 1(4). Retrieved from  Federal Trade Commission (n.d.) Fighting back against identity theft. Retrieved from , Inc (2012) Take your free reputation snapshot. Retrieved from  Tech Parenting Group (2011). Tips for strong, secure passwords. Retrieved from  WiredKids, Inc (n.d.) STOP cyberbullying. Retrieved from  The National Center for Victims of Crime (2011). Cyberstalking. Retrieved from  Brian, M & Fenlon, W (2012). How computer viruses work. Retrieved from  Microsoft (2012). How to recognize phishing email messages, links, or phone calls. Retrieved from  Search Security (1998). Trojan Horse Attacks. Retrieved from  VIRUSALL.COM (1997). Information. Retrieved from  Computer Worm (2012). What is a computer worm? Retrieved from

Download ppt " Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your."

Similar presentations

Ads by Google