Presentation is loading. Please wait.

Presentation is loading. Please wait.

According to netiquette simply refers to our behavior the internet.http://www.netdictionary.

Similar presentations


Presentation on theme: "According to netiquette simply refers to our behavior the internet.http://www.netdictionary."— Presentation transcript:

1

2 According to http://www.netdictionary, netiquette simply refers to our behavior the internet.http://www.netdictionary

3 DO DON’T  “Rule 1: Remember the Human “Rule 1: Remember the Human  Rule 2: Adhere to the same standards of behavior online that you follow in real life Rule 2: Adhere to the same standards of behavior online that you follow in real life  Rule 3: Know where you are in cyberspace Rule 3: Know where you are in cyberspace  Rule 4: Respect other people's time and bandwidth Rule 4: Respect other people's time and bandwidth  Rule 5: Make yourself look good online Rule 5: Make yourself look good online  Rule 6: Share expert knowledge Rule 6: Share expert knowledge  Rule 7: Help keep flame wars under control Rule 7: Help keep flame wars under control  Rule 8: Respect other people's privacy Rule 8: Respect other people's privacy  Rule 9: Don't abuse your power Rule 9: Don't abuse your power  Rule 10: Be forgiving of other people's mistakes Rule 10: Be forgiving of other people's mistakes  (1) Rule 1: “ DON'T include the entire contents of a previous posting in your reply. (2) Rule 2: DON'T reply to a point in a posting without quoting or paraphrasing what you're responding to and who said it. Reason: a dozen postings may occur between the original message and your reply. At some sites your reply may arrive before the original does. (3) Rule 3: DON'T send a message saying, "Why doesn't anybody say anything about X?" or "Who wants to talk about X?“ (4) Rule 4: DON'T send lines longer than 70 characters. This is a kindness. (5) Rule 5: DON'T SEND A MESSAGE IN ALL CAPS. (6) Rule 6: DON'T betray confidences (7) Rule 7: DON'T make statements which can be interpreted as official positions of your organization or offers to do business (8) Rule 8: DON'T rely on the ability of your readers to tell the difference between serious statements and satire or sarcasm. (9) Rule 9: DON'T put a huge signature at the bottom of your messages. (10) Rule 10: DON'T put a huge signature at the bottom of your messages.

4  Webster defines copyright as the sole right to sell publish, or distribute a literary or artistic work.

5  Fair use is a doctrine that protects the copyrighter from others who may use his work for profit. This doctrine allows others to use the material without having permission.

6  Copyright and fair use work together. Fair use allows non copyrighters to used material for purposes that are not for profit. Music is different. The music can be shared after it has been purchased but piracy is not legal. So, duplicating CDs for profit is a misuse of the fair use doctrine.

7  According to Webster, plagiarism is the act of using someone else’s ideas or writings as one’s own.  Plagiarism can be avoided by giving proper credit to the original writers and by giving credit for other’s ideas.

8  Technology has made it easier for teachers to detect plagiarism. One particular tool of note is turnitin.com. Teachers can use this website to check for duplications in assignments.

9  Identity Theft—”theft of personal information: theft of personal information such as somebody's credit card details” (http://www.bing.com/Dictionary/search?q=defi ne+identity+theft)

10  According to google.com, reputation management is the process of identifying what other people are saying or feeling about you or your business; and taking steps to ensure that the general consensus is in line with your goals. According to google.com, reputation managementprocessbusinessstepsensuregeneralconsensusin linegoals

11  dictionary.reference.com/browse/ password  defines password as a secret word or expression used by authorized persons to prove their right to access, information, etc.

12  The use of technology to threaten, insult, or harass.

13  Is defined as threatening behavior or unwanted advances directed at another using the Internet and other forms of online and computer communications. (http://www.ncvc.org/ncvc/main.aspx?dbNam e=DocumentViewer&DocumentID=32458#1)

14  A computer virus, according to Webster's Collegiate Dictionary, is "a computer program usually hidden within another seemingly innocuous program that produces copies of itself and inserts them into other programs or files, and that usually performs a malicious action.” (http://kb.iu.edu/data/aehm.html)

15  “Phishing is a fraudulent attempt, usually made through email, to steal personal information.” (http://www.phishtank.com/what _is_phishing.php) 

16  “Trojan horse is a program that does something undocumented which the programmer intended, but that the user would not approve of if he or she knew about it. According to some people, a virus is a particular case of a Trojan horse, namely one which is able to spread to other programs”

17  “Worms are computer programs that replicate functional copies of themselves (usually to other computer systems via network connections) and often, but not always, contain some functionality that will interfere with the normal use of a computer or a program. The difference is that unlike viruses, worms exist as separate entities; they do not attach themselves to other files or programs. Because of their similarity to viruses, worms are often also referred to as viruses. “

18  http://www.netdictionary, http://www.netdictionary  http://www.webreference.com/roadmap/map07.html http://www.webreference.com/roadmap/map07.html  Webster. Riverside Webster’s II Dictionary, Revised Edition Houghton Mifflin 1996.  http://www.bing.com/Dictionary/search? http://www.bing.com/Dictionary/search?  http://www.google.com/reputationmanagement http://www.google.com/reputationmanagement  http://www.dictionary.reference.com/browse/ password http://www.dictionary.reference.com/browse/ password  http://www.ncvc.org/ncvc/main.aspx?dbName=DocumentViewer&DocumentID=32458#1 http://www.ncvc.org/ncvc/main.aspx?dbName=DocumentViewer&DocumentID=32458#1  http://kb.iu.edu/data/aehm.html http://kb.iu.edu/data/aehm.html  http://www.phishtank.com/what _is_phishing.php http://www.phishtank.com/what _is_phishing.php


Download ppt "According to netiquette simply refers to our behavior the internet.http://www.netdictionary."

Similar presentations


Ads by Google