Presentation is loading. Please wait.

Presentation is loading. Please wait.

Digital Citizenship Project By: Wanda Hicks Technology and Education Dr. Hocutt.

Similar presentations

Presentation on theme: "Digital Citizenship Project By: Wanda Hicks Technology and Education Dr. Hocutt."— Presentation transcript:

1 Digital Citizenship Project By: Wanda Hicks Technology and Education Dr. Hocutt

2 Netiquette on Social Media Sites  “Netiquette” deals with “Internet Etiquette”. It is the set of practices created over the years to make the Internet experience better for everyone. Netiquette is primarily concerned with matters of courtesy in communications.

3 Netiquette To Do:  Be yourself.  Tell the truth-share accurate information.  Shop secure sites.  Spell check and proofread all written internet communications because errors diminish the credibility of the message.  Keep your emotions in check while posting. Not To Do:  Do not share personal information.  Do not write in all capital letters because all caps are considered shouting when written on the internet.  Do not digitally disrespect others.  Do not publish other individuals email address.  Do not spam or follow pop up links.

4 Copyright and Fair Use  Copyright: the exclusive legal right to reproduce copies and to control an original literary, musical, or artistic work for a certain amount of time.  Fair Use: the conditions under which you can use material that is copyrighted by someone else without paying royalties.

5 The Difference Between Copyright and Fair Use: Copyright:  When something is copyrighted you are not allowed to sell or republish an authors work without their permission. Fair Use:  Using others work as a reference and giving the author credit for their work, using proper documentation.

6 Fair Use Rules For: Print- try to use other people words sparingly, but when you must use quotes or otherwise indicate whose words they are. You can use without the creator’s permission:  Up to 10% or 1000 words, whichever is less, of a single copyrighted work of text.  An entire poem of less than 250 words  Articles, stories or essays of less than 2500 words. Music- you can use without the creator’s permission:  Up to 10% or no more than 30 seconds of a song or musical work.

7 Fair Use Rules Continued: Video-You can use without the creator’s permission:  Up to 10% or up to 3 minutes( whichever is less) of copyrighted, videotapes, DVDs, encyclopedias on CD ROM, etc. Photographs- Use captions with photos or other graphics that you use. You may find that older graphics are in the public domain and do not need permission. You can use without the creator’s permission:  Photos and illustrations- you can use five or less by the same photographer or illustrator.  Charts, pictures, diagrams, cartoons or maps- you can use one(by scanning or photocopying) per book, encyclopedia, newspaper or magazine. Poetry:  Multiple copies used again and again without permission is illegal.

8 Plagiarism:  Using others’ ideas and words without clearly acknowledging the source of that information.

9 How to avoid Plagiarism: To avoid plagiarism you must give credit whenever you use:  Another person’s idea, opinion or theory.  Any facts, statistics, graphs, drawings or any piece of information that is not common knowledge.  Quotations of another person’s actual spoken or written words.  Paraphrasing of another person’s spoken or written words.

10 How Technology Help Teachers Recognize and Stop Plagiarism  and are just a few of the sites that help teachers detect plagiarism. These sites keep work from being recycled or recirculated every year.  Also, another way to stop plagiarism is by means of prevention. Educate students about plagiarism by explaining what it is and how to avoid it.

11 Safety On The Internet  Identity Theft- when someone acquires your personal information and uses it to commit fraud without your knowledge. Keep your personal information private on the internet regardless of what sites you may visit.  Reputation Management- managing what people are saying about you. Controlling what people see.  Passwords- create a strong password that you can remember and not have to write down. Never give your password to others. Also, change your password regularly.  Cyberbullying- is similar to other types of bullying except it takes place online or through text messages sent to cell phones.  Cyberstalking- is a technologically-based “attack” on one person who has been targeted specifically for that attack for reasons of anger, revenge, or control.

12 Safety On Your Computer 10 Tips to prevent viruses: 1.Install reliable antivirus software 2.Don’t automatically open attachments 3.Scan all incoming email attachments 4.Get immediate protection. Make sure your antivirus software automatically runs at all times. 5.Update antivirus software frequently 6.Don’t download programs from the web 7.Don’t boot from an unknown data CD 8.Scan files for viruses before using them 9.Don’t share data CDs 10.Use common sense

13 Safety On Your Computer Continued  Phishing: The act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The email directs the user to visit a website where they are asked to update personal information, such as passwords, credit card, social security, and bank account numbers that the legitimate company already has on file.  Trojan Horses: a program in which a harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the allocation table on your hard disk. In one celebrated case, a Trojan horse was a program that was supposed to find and destroy viruses. A Trojan horse may be widely redistributed as part of a computer virus.

14 Safety On Your Computer Continued  Worms: a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.

15 Works Cited Page  Basic Rules of Fair Use. Retrieved June 29, 2012. domain/basicrules-fair-use.html domain/basicrules-fair-use.html  Cyberstalking.The National Center for Victims of Crimes. Retrieved June 29, 2012.  How Computer Viruses Work. Retrieved June 30, 2012.  Merriam Webster, 2012.Retrieved June 29, 2012.  Netiquette, Retrieved June 29, 2012.  Online Reputation Tips for Parents of the College-Bound. Retrieved June 30, 2012. agement-tips-for-college-bound-students / agement-tips-for-college-bound-students /

16 Works Cited Page  Password Safety: Tips for Keeping Passwords Safe. Mary Landesman Retrieved June 30, 2012.  The Free Dictionary, 2003-2011.Retrieved June 30, 2012.  Phishing.Webopedia. Retrieved June 30, 2012.  What is Identity Theft? Retrieved June 30, 2012 from  What is Plagiarism? Retrieved June 30, 2012 from center/what is plagiarism.html center/what is plagiarism.html

Download ppt "Digital Citizenship Project By: Wanda Hicks Technology and Education Dr. Hocutt."

Similar presentations

Ads by Google