Presentation is loading. Please wait.

Presentation is loading. Please wait.

DIGITAL CITIZENSHIP ED 505 Created By: Danielle McDaniel.

Similar presentations


Presentation on theme: "DIGITAL CITIZENSHIP ED 505 Created By: Danielle McDaniel."— Presentation transcript:

1 DIGITAL CITIZENSHIP ED 505 Created By: Danielle McDaniel

2 NETIQUETTE ON SOCIAL MEDIA SITES  Netiquette on social media is defined as the social code of using social media. Most individuals consider this the way people say what they would like to say to their friends.  It is a code that people communicate by. It is not a politically correct form of communication.  Social media is user generated content.  Netiquette is the social code of the internet.

3 DO’S AND DON’TS OF NETIQUETTE ON SOCIAL MEDIA SITES DO’S of Netiquette on Social Media Sites 1. Share accurate information 2. Sharing is caring for others 3. Show love 4. Respect privacy 5. Place everything in moderation 6. Correct your mistakes  DON’TS of Netiquette on Social Media Sites 1. Don’t lie 2. Don’t hate 3. No cursing 4. No disrespect

4 COPYRIGHT AND FAIR USE  Copyright- This is a legal concept, enacted by most governments, giving the creator of an original work exclusive rights to it, usually for a limited time. Generally, it is “the right to copy”, but also gives the copyright holder the right to be credited for the work, to determine who may adapt the work to other forms, who may perform the work, who any financially benefit from it, and other related rights.  Fair Use-A legal principle that provides certain limitations on the exclusive rights of copyright holders. The purpose of these guidelines is to provide guidance on the application of fair use principles by educational institutions, educators, scholars, and students who wish to copy, perform, or create a digital copy of a print musical score or record, copy, or download a recorded performance or recorded song under fair use rather than by seeking authorization from the copyright owners for non-commercial educational purposes.

5 FAIR USE RULES FOR MEDIA Print material:  Up to 1,000 words or 10% of the work, whichever is less.  Up to 250 words of a poem, and only 3 poems per poet.  If the text is longer than 10,000 words, you may use up to 1,000 of the words.  If the text is shorter than 10,000 words, you many use up to 10% of it. **As long as you or your teacher will NOT post it on the Internet, the rules are: 1. You must cite your source to give proper credit. 2. You must follow the length requirements

6 FAIR USE RULES FOR MEDIA CONT. Music:  Must be legal (not bootleg) copies of records, cassette tapes, CD’s, or audio clips on the web of iTunes  Up to 30 seconds only, or 10% of the work, whichever is less  If an audio clip is longer than 5 minutes, you may use up to 30 seconds of it.  If a video is shorter than 5 minutes, you can use up to 10% of it. **You must cite your source to give proper credit. **You must follow the length rules.

7 FAIR USE RULES FOR MEDIA CONT. Video: Must be legal copies of DVDs, multimedia encyclopedia clips, Quick Time movies, of video clips from the Internet  Up to 3 minutes only OR 10% of the work, whichever is less.  If a video is LONGER than 30 minutes, you may use up to 3 minutes of it.  If a video is SHORTER than 30 minutes, you can use up to 10% of it. **You must cite your source to give proper credit. **You must follow the length rules.

8 FAIR USE RULES FOR MEDIA CONT. Photographs:  You may use single graphics in their entirety.  No more than 4 images by a single artist or photographer may be used.  If a graphic is from a collection, you may use no more than 15 images or 10% of the collection, whichever is LESS. **You must cite your source to give proper credit. **You must follow the requirements.

9 PLAGIARISM Plagiarism is the act of taking another person’s writing, conversation, song, or even idea and passing it off as your own. This includes information from web pages, books, songs, television shows, email messages, interviews, articles, artworks or any other medium.

10 PLAGIARISM CONT. Examples of Committing Plagiarism:  Turning in someone else’s work as your own.  Copying words or ideas from someone else without giving credit.  Failing to put a quotation in quotation marks.  Giving incorrect information about the source of a quotation.  Changing words but copying the sentence structure of a source without giving credit.  Copying so many words or ideas from a source that it makes up the majority of your world, whether you give credit or not.

11 WAYS TO AVOID PLAGIARISM When using secondary sources in papers, you can avoid plagiarism by knowing what must be documented. Specific words or phrases If you use an author’s specific word or words, you must place those words within quotation marks and you must credit the source. Information and Ideas Even if you use your own words, if you obtained the information or ideas you are presenting from a source, you must document the source.

12 WAYS TO AVOID PLAGIARISM CONT. Common Knowledge You do not need to cite a source for material considered common knowledge:  General common knowledge  Field-specific common knowledge ***When in doubt, be cautious and cite the source. In the case of both general and field-specific common knowledge, if you use the exact words of the reference source, you must use quotation marks and credit the source.

13 WAYS THAT TECHNOLOGY HELPS TEACHERS IDENTIFY PLAGIARISM Websites Available to Identify Plagiarism www.plagiarismdetection.org www.grammarly.com www.turnitin.com www.dustball.com/cs/plagiarism.checker www.copyscape.com www.antiplagiarism.sf.net Also Available: Google Alerts

14 SAFETY ON THE INTERNET Identity Theft Computers store all kids of information about you and stores it in files hidden deep on your hard drive. These files store information like logins and passwords, names addresses, and even credit card numbers. A thief can get this information either by grabbing it when it is being sent over an unsecured transmission, or he can install malicious software on your computer that will collect everything he needs and automatically send it back to him.

15 SAFETY ON THE INTERNET CONT. Identity Theft The best way to protect yourself from identity theft is to secure your web browser!!

16 SAFETY ON THE INTERNET Reputation Management Reputation management is the practice of understanding or influencing an individual's or business's reputation. In order to ensure a safe reputation on social media, individuals should manage their social media reputation.

17 SAFETY ON THE INTERNET To manage your reputation on social media, here is a guide to help ensure safety.  Decide what you want to track  Set up accounts with free social media monitoring tools  Set up your alerts and searches  Set up your own social media accounts  Engage-Act quickly, be nice, and be pro-active

18 SAFETY ON THE INTERNET Passwords Passwords are an important aspect of computer safety. They provide protection for your online user accounts. If someone else has your password, your electronic life becomes available to others. Your password gives others the power to:  Modify or destroy your files  Send malicious e-mail in your name  Commit fraud while masquerading as you  Use your computer to illegally distribute things

19 SAFETY ON THE INTERNET Helpful Tips for Passwords  Keep your password private  Change you password regularly  Create a complex password By doing these things, you are providing a better defense against account intrusion.

20 SAFETY ON THE INTERNET Cyberbullying Cyberbullying is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones. It has to have a minor on both sides, or at least have been instigated by a minor against another minor.

21 SAFETY ON THE INTERNET Cyberbullying Steps to Preventing Cyberbullying: 1. Educate kids about what cyberbullying is 2. Educate kids about the consequences of cyberbullying (loosing online accounts). 3. Teach kids to respect others and take a stand against bullying of all kids Schools and parents need to partner together stop cyberbullying by educating the students on cyberethics and laws.

22 SAFETY ON THE INTERNET Cyberstalking Cyberstalking is online stalking. It is the use of technology, mainly the Internet, to harass someone. Common characteristics include false accusations, monitoring, threats, identity theft, and destroying data. Cyberstalking also includes exploitation of minors, be it sexual or otherwise. Cyberstalking can damage many things. It can destroy friendships, credit, careers, self-image, and confidence.

23 SAFETY ON THE INTERNET Cyberstalking Anti-Stalking Tips:  Maintain physical access to your computer and other Web- enabled devices like cell phones  Be sure to always log off your computer  Use good password management  Use the privacy settings on your computer  Use good updated security software  Teach your children to never provide any personal information on the computer  Any suspicions of cyberstalking should be reported

24 SAFETY ON THE INTERNET VIRUSES A virus can compromise your personal information and even destroy your computer completely. In order to prevent viruses from attacking your computer, there are several things you can do.

25 SAFETY ON THE INTERNET How to Avoid Viruses on Your Computer 1. Install a reliable anti virus program. 2. Install anti-spyware and anti-malware programs 3. Avoid suspicious websites 4. Never open email attachments without scanning them first 5. Set up automatic scans 6. Watch your downloads 7. Updates, Updates, Updates 8. Know what to look for 9. Stay away from cracked software 10. Install a firewall 11. Be prepared to lock down

26 SAFETY ON THE INTERNET Phishing Phishing scams are scams that try to get valuable information from individuals. Things to do to avoid phishing scams: 1. Stay alert and be cautious with e-mail and on Web sites 2. Don’t get scared by the content of e-mail 3. Don’t give out information they should have 4. Never use links in e-mail to get to any page on the Web 5. Make sure the Web site you’re on is truly secure 6. Check your hosts file and your accounts regularly 7. Keep your software secure

27 SAFETY ON THE INTERNET Trojan Horses Trojan horses are harmful programs disguised as helpful programs. They may be attached to and hiding behind a legitimate program or be a program who intent is misrepresented. Trojans do not self-replicate, but can be used to spread, activate, or hide other viruses.

28 SAFETY ON THE INTERNET Worms A worm is a stand-alone program that does not need a host program to replicate and spread. It typically modifies the operating system to become part of the boot process and it can also write changes to the registry. Worms can travel and spread via networks.

29 SAFETY ON THE INTERNET Things to do to prevent Trojans and Worms  Install an antivirus software and keep it up-to-date  Use complex passwords  Install and use a firewall  Be a suspicious user  Be a cautious Internet surfer  Be a conservative and informed downloader  Recognize the signs!!


Download ppt "DIGITAL CITIZENSHIP ED 505 Created By: Danielle McDaniel."

Similar presentations


Ads by Google