Download presentation
Presentation is loading. Please wait.
Published byKristopher Ray Modified over 9 years ago
1
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505
2
Objectives At the end of this presentation, you will be able to… 1. Identify the correct uses of social networking sites. 2. Identify and describe social and ethical behaviors related to technology use.
3
What is Social Media? 0 Social media is user generated, online technology that enable people to communicate easily through shared resources and information.
4
Social Media Netiquette 0 What is Social Media Netiquette? 0 Social media netiquette is the social code of conventional and contemporary guidelines of user generated content (UGC) for accessing social media. 0 Rules of Social Media Netiquette 0 Sharing is caring, Share accurate information 0 Respect privacy 0 Project a positive image 0 Do not be dishonest, hateful, or disrespectful
5
What is Copyright? 0C0C opyright is defined as the exclusive right of the author or creators works to be protected against copies, license, and otherwise exploitation of a literary, musical, or artistic work by unauthorized users.
6
What are Fair Use Laws? 0 Fair use is a legal doctrine that portions of copyrighted material may be used without permission from the author or creator, the use must be fair and reasonable. The documents can not impair the value of the material and can not be used to make profit.
7
Copyright or Fair Use What’s the Difference ? 0 Copyright 0 Protects the creator of any type of work from someone copying it or using it without permission. 0 Fair Use 0 Allows certain materials to be used without having to ask permission or to pay.
8
Plagiarism 0 Plagiarism is using someone else’s work without giving them credit. Avoid plagiarism by putting quotation marks around quotes from a work and giving the author some credit
9
Plagiarism Prevention Listed below are great internet sites to help check student’s work for plagiarism. http://www.plagiarism.org/ http://turnitin.com/ http://www.scanmyessay.com/plagiarism-prevention.php
11
0 Do Not Share Files 0 Use Firewalls 0 Use Anti Virus Software Identity Theft 0 Shred, Shred, Shred 0 Password Protection 0 Filter Emails
12
0 Do not spread rumors. 0 Report others who post negative comments. 0 Always be positive because what you post can be read by others. Reputation Management
13
Cyber Bullying When a person says or does hurtful things using technology. http://www.youtube.com/watch?v=ybwC6v Q0nY0&feature=related Cyber-bullying Video: Sponsored by YouTube Click on the link below to watch a video on cyber- bullying.
14
The electronic means to stalk or harass individuals. Examples: Threats, negative comments, or taunting through texting, emails, or social networking. cyber-stalking Link: Click on the link below to access YouTube video on prevention of cyber-stalking http://www.youtube.com/watch?v=cLkkmCRhfnc
15
Computer Safety What’s the Difference? 0 Viruses 0 Phishing 0 Trojan horses 0 Worms
16
0 Computer viruses spread from one computer to another and it interfere with computer operations. 0 Keep up-to-date anti- virus software 0 Do not download files from unknown emails and instant messages 0 Watch how you surf the internet
17
Phishing is when someone attempts to get your personal information through emails or scams. PREVENTION 0N0N ever email personal information 0U0U se secure websites 0P0P rotect your computer with firewalls, antivirus tools, and spam filters 0D0D o not click on links, download attachments, or open files from unknown senders
18
Trojan Horses 0 Unwanted program that can upload information, change your desktop, and opens a back door to allow your personal and confidential information to be compromised. 0 PREVENTION 0 Keep your operating system updated 0 Use a firewall
19
Worms 0 Worms are similar to a virus but it spreads from one computer to another without any human action. 0 Replicates itself on a computer system 0 Consumes system memory 0 Causes servers to stop responding 0 If severe enough, allows malicious users to control your computer remotely.
20
Computer Safety
21
References 0 http://webtrends.about.com/od/web20/a/social-media.htm http://webtrends.about.com/od/web20/a/social-media.htm 0 http://www.networketiquette.net/socmed.htm http://www.networketiquette.net/socmed.htm 0 http://www.copyright.gov/fls/fl102.html http://www.copyright.gov/fls/fl102.html 0 http://www.copyrightkids.org/whatcopyframes.htm http://www.copyrightkids.org/whatcopyframes.htm 0 http://www.plagiarism.org/ http://www.plagiarism.org/ 0 http://www.ftc.gov/bcp/edu/microsites/idtheft/ http://www.ftc.gov/bcp/edu/microsites/idtheft/ 0 http://mashable.com/2012/09/04/students-social-media-warnings/ http://mashable.com/2012/09/04/students-social-media-warnings/ 0 http://www.stopcyberbullying.org/ http://www.stopcyberbullying.org/ 0 http://www.cyberguards.com/CyberStalking.html http://www.cyberguards.com/CyberStalking.html 0 http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp 0 http://www.trojan-horse.info/en/index.aspx http://www.trojan-horse.info/en/index.aspx
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.