Presentation is loading. Please wait.

Presentation is loading. Please wait.

By: Catherine Tingle. What is it?  Netiquette refers to appropriate and safe interactions online.

Similar presentations

Presentation on theme: "By: Catherine Tingle. What is it?  Netiquette refers to appropriate and safe interactions online."— Presentation transcript:

1 By: Catherine Tingle

2 What is it?  Netiquette refers to appropriate and safe interactions online.

3 Do’s and Don’ts  “Don't SHOUT in all caps.  Remember: The person on the other end of a digital communication can't see your expression or hear your tone of voice.  Cool off before responding to messages in anger.  Check messages for misspellings or misstatements.  Respect others' privacy and your own (for example, don't give your number to that new MySpace friend).  Use a clear and understandable email subject line.  Adjust your tone and style to the situation (for example, don't use IM-speak or all lowercase letters in an internship application).  Don't forward private messages to people they weren't intended for or copy others on replies to personal messages.  Remember: Email is never really private and a copy may exist in cyberspace... forever.”

4 According to Copyright- is "the legal right granted to an author, a composer, a playwright, a publisher, or a distributor to exclusive publication, production, sale, or distribution of a literary, musical, dramatic, or artistic work." Fair Use- is “the conditions under which you can use material that is copyrighted by someone else without paying royalties “

5  Fair use limits the amount of time or the type of copyrighted multimedia materials that one can use. Copyrighted material belongs to those designated as having legal rights to the material, and in order to use this material legally you must gain permission unless you are using appropriate fair use policies.

6 Fair Use Rules for Multi Media  Teachers can use copyrighted materials for instructional purposes when personally instructing students, student directed self study, presentations at peer workshops, and for personal interviews related to work  Students can use copyrighted materials for educational uses, portfolios, and personal uses for interviews related to work or higher education.

7  According to Plagiarism is “the unauthorized use or close imitation of the language and thoughts of another author and the representation of them as one's own original work, as by not crediting the author.”

8  Most plagiarism is accidental. Using online cites to check for plagiarism can be an asset to help prevent plagiarism. Plagiarism Checker Cites  http://plagiarisma. net/ http://plagiarisma. net/  http://www.plagiari http://www.plagiari  https://www.writec me.html https://www.writec me.html  http://www.plagiari http://www.plagiari

9 Identity Theft Reputation Management  According to identity theft is “the fraudulent appropriation and use of someone's identifying or personal data or documents, as a credit card.”  Reputation management refers to how you are perceived by others. On the internet you should be careful what you post so others do not have a poor opinion of you.

10 Passwords  The longer the password the harder it is to hack.  Use a combination of letters, numbers, and symbols.  Don’t share your password with anyone.  Don’t use the same password for several different accounts.  Keep your passwords in a safe, secure place.

11 Cyber BullyingCyber Stalking  When someone is targeted and harassed by another through the internet or other digital means.  Using the internet or digital means to stalk or harass an individual.

12 VirusesPhishing  Scam artist try to trick you into downloading viruses or malware. This can cause your computer to do unusual things such as run slowly, shut down unexpectedly, open pages you did not intend to be opened. If your computer is infected disconnect it from the internet immediately.   When internet frauds trick you into giving your personal information this is called phishing.  To avoid phishing delete emails or posts requesting personal information.  Don’t email financial or personal information.  Be careful about opening attachments  Check your accounts frequently to ensure that no unauthorized activity is present.

13 Trojan HorsesWorms  A trojan horse is a type of malware that is hidden in often legitimate software or documents that once installed infects other files.  A worm is a stand alone malware that duplicates itself for the purpose of spreading to other computers.

14  copyright. (n.d.). Unabridged. Retrieved March 30, 2012, from website:  fair use. (n.d.). WordNet® 3.0. Retrieved March 30, 2012, from website: use use  Federal Trade Commission. Be Safe, Retrieved April 2, 2012, from On Guard website  identity theft. (n.d.). Unabridged. Retrieved March 30, 2012, from website: theft theft  National Center for Missing & Exploited Children. Retrieved April 2, 2012. Learn With Clicky.  plagiarism. (n.d.). Unabridged. Retrieved March 30, 2012, from website:  Starr, Linda. Education World®. Retrieved March 30, 2012, from education website: Copyright © Education Worldr280d.shtml 5/25/2010  Weir, Laila. Online Manners Matter. Retrieved March 30,2012, from website:

Download ppt "By: Catherine Tingle. What is it?  Netiquette refers to appropriate and safe interactions online."

Similar presentations

Ads by Google