Presentation on theme: "Digital Citizenship Project Elle Wagner ED 505. Netiquette on Social Media Sites DoDon’t Be professionalPost illegal activity Share accurate informationBully."— Presentation transcript:
Netiquette on Social Media Sites DoDon’t Be professionalPost illegal activity Share accurate informationBully others Respect PrivacyTrash your teacher Show lovePost confidential information Netiquette: the actions that are socially and morally acceptable for an online or digital setting or situation
Plagiarism What is it? Using someone else’s work as your own without citing it. How do I avoid it? Use quotation marks when you use someone else’s words exactly. Cite the source that you gained your information from. How can teachers stop plagiarism in student work? Teachers can use www.turnitin.com or www.grammarly.com/Plagiarism_Check when their students are turning in their work. These websites run plagiarism checks.www.turnitin.com www.grammarly.com/Plagiarism_Check
Safety on the Internet Stop Identity Theft by safeguarding your computer. Password protect your computer Install Firewall Software Search internet for your name and last 4 of your social to erase personal information Reputation Management Remember that everything you write on the internet can be seen by others Request incorrect information to be deleted from a page. Report false information
Safety on the Internet Cont… Passwords Do not share with anyone Change often Do not make all of your passwords the same. Include different characters including capital letters, numbers, symbols, etc. Do not use easy to guess passwords. (birthday, name, husbands name, etc) Cyberbullying-When someone is bullied, tormented, or threatened by another person on the internet or while using social media sites. Educate students on how to prevent it. Take 5! Take 5 minutes and think about what you should do. When you are calm, your actions might be different.
Cyberstalking: using any sort of communication device to stalk someone. Do not share personal information in a public forum Do not use your real name as a screen name or email address Block users that you may suspect on your email or from viewing your Facebook Contact local police in appropriate cases Internet Safety Cont….
Safety on your computer Viruses- a computer program that works like a virus, infecting your computer. – Prevent them by: Have a virus scanning program Do not open any files from unknown emails Do not download from strangers Phishing- a technique used to gain personal information – Prevent phishing by: Look for misspelling of words or bad grammar Be cautious when there is a strange URL – @ symbols in the URL – “O’s” that are replaced with zeros Trojan Horse- similar to a virus; usually pretends to be ridding your computer of viruses – Prevent trojan horses by: Do not open anything from an unknown source Do not click on any unknown links Worms- Similar to a virus; cause by security problems on the targeted computer – Prevent worms by: Have a security system installed Do not open unexpected email.
Sources Buck, S. (2012, September 4). 12 Things Students Should Never Do on Social Media. Retrieved September 5, 2012, from Mashable Lifestyle website: http://mashable.com/2012/09/04/ students-social-media-warnings/ Social Media Netiquette. (n.d.). Retrieved September 5, 2012, from Netiquette website: http://www.networketiquette.net/socmed.htm McWhinney, J. E. (2010, May 3). Identity Theft: How To Avoid It. Retrieved September 5, 2012, from Investopedia website: http://www.investopedia.com/articles/pf/05/051805.asp#axzz25e79pkO0 Reputation Management. (n.d.). Retrieved September 5, 2012, from Wikipedia website: http://en.wikipedia.org/wiki/Reputation_management Dicker, R. (2011, July 9). How to Create a Safe, Memorable Online Password. Retrieved September 5, 2012, from Daily Finance website: http://www.dailyfinance.com/2011/07/09/ how-to-create-a-safe-memorable-online-password/ Aftab, P. (n.d.). Stop Cyberbullying: Prevention. Retrieved September 5, 2012, from Stop Byberbullying website: http://www.stopcyberbullying.org/tweens/take_5.html CyberGuards. (2012). CyberStalking. Retrieved September 5, 2012, from CyberGuards website: http://www.cyberguards.com/CyberStalking.html McAfee. (2012). Anti-Virus Tips. Retrieved September 5, 2012, from McAfee website: http://home.mcafee.com/virusinfo/anti-virus- tips?ctst=1http://home.mcafee.com/virusinfo/anti-virus- Trojan Horse. (2012). Retrieved September 5, 2012, from Webopedia website: http://www.webopedia.com/ TERM/T/Trojan_horse.html Kay, R. (2004, January 19). Quick Study: Phishing. Retrieved September 5, 2012, from ComputerWorld website: http://www.computerworld.com/s/article/89096/Phishing Computer Worm. (n.d.). Retrieved September 5, 2012, from Wikipedia website: http://en.wikipedia.org/ wiki/Computer_worm#Protecting_against_dangerous_computer_worms
Sources Glassbergen, R. (2008, September 23). [Cartoon]. Retrieved September 5, 2012, from Linda's Computer Stop website: http://personal-computer-tutor.com/abc/humor.htm Spielman, M. (n.d.). [Cartoon]. Retrieved September 5, 2012, from LSU.edu website: http://www.lsu.edu/departments/safety/2008campaign.shtml Staford University Libraries. (2010). Copyright and Fair Use. Retrieved September 5, 2012, from SU Lair website: http://fairuse.stanford.edu/Copyright_and_Fair_Use_Overview/chapter7/7-b.html