Presentation is loading. Please wait.

Presentation is loading. Please wait.

D IGITAL C ITIZENSHIP LeAnna Patterson ED 505. N ETIQUETTE ON S OCIAL M EDIA S ITES The social and moral code of the internet based on the human condition.

Similar presentations


Presentation on theme: "D IGITAL C ITIZENSHIP LeAnna Patterson ED 505. N ETIQUETTE ON S OCIAL M EDIA S ITES The social and moral code of the internet based on the human condition."— Presentation transcript:

1 D IGITAL C ITIZENSHIP LeAnna Patterson ED 505

2 N ETIQUETTE ON S OCIAL M EDIA S ITES The social and moral code of the internet based on the human condition and Golden Rule of Netiquette Internet etiquette is centered around data and its use. The types of data are: text, audio, graphic, and video

3 N ETIQUETTE D O ’ S AND D ON ’ TS Do… Engage about subjects that would be of interest to your followers Send a private and personal email message to someone and ask permission if you want to promote a product or business Make sure to use spell-check and proof read messages before pushing the send button Have a personality that shines online Remember, SPAM is a four-letter word Make sure you send a personal message along with a networking request; it’s about human interaction, not numbers Don’t… Give opinions on politics, religion, personal attacks, and controversial subjects that could cause embarrassment to others Post and “tag” photos of people that aren’t complimentary Send an email when you’re angry Don’t overuse acronyms in online communication Get in the habit of self-promoting your next event on someone else’s profile Spread gossip, lies, and untruths about anyone on the internet

4 D EFINITION OF C OPYRIGHT AND F AIR U SE Copyright refers to laws that regulate the use of the work of a creator; including copying, distributing, altering and displaying creative, literary and other types of work unless otherwise stated in a contract Fair Use refers to the conditions under which you can use material that is copyrighted by someone else without paying royalties

5 E XAMPLES OF D IFFERENCES Books Magazines Newspapers Educational Workbooks Educational CD’s Music Commentaries Criticisms News reporting Research Teaching Library archiving and scholarship CopyrightFair Use

6 F AIR U SE R ULES FOR M EDIA Things a person cannot do: copy sheet music or recorded music for the purpose of creating anthologies or compilations used in class copy from works intended to be “consumable” in the course of study or teaching such as workbooks, exercises, standardized tests and answer sheets, and like material copy sheet music or recorded music for the purpose of performance, except for emergency copying to replace purchased copies which are not available for an imminent performance (provided purchased replacement copies are substituted in due course); or copy any materials without including the copyright notice which appears on the printed copy

7 W HAT IS P LAGIARISM ? to steal and pass off (the ideas or words of another) as one's own to use (another's production) without crediting the source to commit literary theft to present as new and original an idea or product derived from an existing source involves both stealing someone else's work and lying about it afterward

8 H OW TO A VOID P LAGIARISM Develop a topic based on what has already been said and written, but write something new and original Rely on experts' and authorities' opinions, but improve upon and/or disagree with those same opinions Give credit to previous researchers, but make your own significant contribution

9 W AYS T ECHNOLOGY H ELPS T EACHERS R ECOGNIZE AND S TOP P LAGIARISM To prevent cheating or plagiarism, teachers sometimes have their students turn in papers to turnitin.com. This website can detect any plagiarism that students may use in their papers. PlagiarismDetection.org offers an innovative, user-friendly online tool that helps students and instructors with detection and prevention of academic plagiarism.

10 S AFETY ON THE I NTERNET Identity Theft… a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name Reputation Management is the practice of attempting to shape public perception of a person or organization by influencing online information about that entity Passwords protects others from getting into your computer or phone without a code Cyberbullying sending messages that are threatening or harassing in nature to another person by way of internet Cyberstalking stalking someone on the internet

11 S AFETY ON THE C OMPUTER Viruses It is very important to use anti-virus protection software to keep your computer safe Phishing Phishing email messages, websites, and phone calls are designed to steal money. Cybercriminals can do this by installing malicious software on your computer or stealing personal information off of your computer Trojan Horses A destructive program that masquerades as a benign application. Trojan horses do not replicate themselves, but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses, but instead introduces viruses onto your computer Worms malicious software applications designed to spread via computer networks which are inadvertently spread by opening an email attachment or message that contains executable scripts

12 R EFERENCES http://www.networketiquette.net/ http://socialmediamore.com/the-top-10-rules-of- netiquette-for-social-media http://graphicdesign.about.com/od/legalglossary/g /copyright.htm http://www.thefreedictionary.com/fair+use http://www.plagiarism.org/plag_article_what_is_ plagiarism.html http://owl.english.purdue.edu/owl/resource/589/01 /


Download ppt "D IGITAL C ITIZENSHIP LeAnna Patterson ED 505. N ETIQUETTE ON S OCIAL M EDIA S ITES The social and moral code of the internet based on the human condition."

Similar presentations


Ads by Google