Presentation is loading. Please wait.

Presentation is loading. Please wait.

Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered.

Similar presentations


Presentation on theme: "Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered."— Presentation transcript:

1

2 Alisa Ward-Allen Ms. Ray Fall 1, 2011

3 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered to be literary stealing.

4 Use Your own Ideas. If you have to use someone else’s work, put it in quotations. Always site the source of the work. Use endnotes and footnotes. In text citation paraphrasing

5 “Turnitin is the leading academic plagiarism detector, utilized by teachers and students to avoid plagiarism and ensure academic integrity.”

6  “ "Identity theft" refers to crimes in which someone wrongfully obtains and uses another person's personal data (i.e., name, date of birth, social security number, driver's license number, and your financial identity— credit card, bank account and phone-card numbers) in some way that involves fraud or deception, typically for economic gain (to obtain money or goods/services). Criminals also use identity theft to fraudulently obtain identification cards, driver licenses, birth certificates, social security numbers, travel visas and other official government papers. “

7

8  Guard personal information ( such as social security number, birthdates, credit card number, etc)  Check your credit ratings often.  Beware of fake business.  If you have to use personal information, make sure that the site has a lock.  Invest in a safe Identity company such as lifelock.  Beware of the marketing emails and never send personal information via email because it has no security.

9  It is very important that when creating a password that you do not use personal information such as your name or actual date of birth. A password should contain numbers as well as alphabets.

10  Cyber bullying is just what is says. Bullying through cyber space. Many times bullying takes place through social networks, instant messaging and cell phones.

11  Many times cyberbullying happens to our children. They can avoid by not responding to threatful or hate email/messages. Parents need to encourage their child to report any type of inappropriate emails.

12 “Cyberstalking is the use of the internet or any other electronic means to stalk, harass an individual, a group of individuals, an organization, etc. Cyberstalking can be just like regular stalking, it is just done over the web”

13  Reputation management is an online company that is used to protect your online reputation. It is a good service to protect business from a negative online reputation.

14

15  A computer virus, according to Webster's Collegiate Dictionary, is "a computer program usually hidden within another seemingly innocuous program that produces copies of itself and inserts them into other programs or files, and that usually performs a malicious action (such as destroying data)".

16  Computer viruses can come in several forms. One form is known as a macro viruses.  A macro virus attaches itself to files such as Microsoft word documents.  These types of viruses are becoming more common.

17  Worms are a type of virus.  Worms are computer programs that duplicate copies of files to other computers  Worms does not usually attach themselves, they just duplicate.

18  Phishing is an attack on an individual to obtain personal information. An attacker will usually create a fake website or email to ask personal questions.

19  “Trojan horses are intended to replace existing files with malicious versions, whereas other Trojan horses add another application to a system without overwriting existing files. Trojan horses are often difficult to detect because they appear to be performing a useful function”.

20  Download software from its original data.  Download a reputable virus software onto the computer.  Check free downloadable programs for virus.  Use good passwords.

21

22  Copyright- give the originator legal rights to their print, music, videos, etc.  Fair Use-the ability to use copyrighted materials without permission for use such as critiquing copyrighted materials.

23  To use one’s work without copyright permission is illegal. A person who failed to obtain permission is subject to jail time. As where as fair use can be used without obtaining permission.

24  Uses That Are Generally Fair Uses  Subject to some general limitations discussed later in this article, the following types of uses are usually deemed fair uses:  Criticism and comment -- for example, quoting or excerpting a work in a review or criticism for purposes of illustration or comment.  News reporting -- for example, summarizing an address or article, with brief quotations, in a news report.  Research and scholarship -- for example, quoting a short passage in a scholarly, scientific, or technical work for illustration or clarification of the author's observations.  Nonprofit educational uses -- for example, photocopying of limited portions of written works by teachers for classroom use.  Parody -- that is, a work that ridicules another, usually well-known, work by imitating it in a comic way.  In most other situations, copying is not legally a fair use. Without an author's permission, such a use violates the author's copyright.

25 Social media site are used as an informal social network to social communication all over the world.

26  Facebook  Twitter  Linkedln  My Space  Ning  Google Plus +  Tagged  Orkut  Hi 5  My year book

27  http://www.plagiarism.org/ http://www.plagiarism.org/  http://www.aresearchguide.com/6plagiar.html http://www.aresearchguide.com/6plagiar.html  http://www.collegeboard.com/student/plan/college-success/10314.html http://www.collegeboard.com/student/plan/college-success/10314.html  http://www.indiana.edu/~wts/pamphlets/plagiarism.shtml http://www.indiana.edu/~wts/pamphlets/plagiarism.shtml  https://www.writecheck.com/static/home.html https://www.writecheck.com/static/home.html  https://turnitin.com/static/index.php https://turnitin.com/static/index.php  www.parentfurther.com www.parentfurther.com  http://www.ou.edu/oupd/kidsafe/start.htm http://www.ou.edu/oupd/kidsafe/start.htm  http://www.fraud.org/tips/internet/idtheftavoid.htm http://www.fraud.org/tips/internet/idtheftavoid.htm  http://www.netsmartz.org/Parents http://www.netsmartz.org/Parents  http://www.reputationmanagements.com/ http://www.reputationmanagements.com/  http://kb.iu.edu/data/aehm.html http://kb.iu.edu/data/aehm.html

28  http://www.newton.dep.anl.gov/teachers/compvir.htm http://fairuse.stanford.edu/Copyright_and_Fair_Use_Overview /chapter9/9-a.html http://www.newton.dep.anl.gov/teachers/compvir.htm http://fairuse.stanford.edu/Copyright_and_Fair_Use_Overview /chapter9/9-a.html  http://www.nolo.com/legal-encyclopedia/fair-use-rule- copyright-material-30100.html http://www.ebizmba.com/articles/social-networking-websites http://www.nolo.com/legal-encyclopedia/fair-use-rule- copyright-material-30100.html http://www.ebizmba.com/articles/social-networking-websites


Download ppt "Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered."

Similar presentations


Ads by Google