Presentation is loading. Please wait.

Presentation is loading. Please wait.

By Todd Bennett.  Netiquette  Fair Use and Copyright  Plagiarism  Safety Computer Internet.

Similar presentations


Presentation on theme: "By Todd Bennett.  Netiquette  Fair Use and Copyright  Plagiarism  Safety Computer Internet."— Presentation transcript:

1 By Todd Bennett

2  Netiquette  Fair Use and Copyright  Plagiarism  Safety Computer Internet

3 Netiquette

4  Dictionary.com defines netiquette as “the rules of etiquette that apply when communicating over computer networks, especially the internet.”

5  According to David Chiles of networketiquette.net, the top ten rules of netiquette are: 1. Spell check & proof read messages. 2. Do not write in all capital letters. 3. Tell the truth in your profiles. 4. Be yourself online. 5. Do not send personal insults (Flames). 6. Stay away from spam. 7. Be conservative in email you send and liberal in email you receive. 8. Do not send email late at night. 9. Shop secure web sites (https://). 10. Information on the internet is public. Use discretion when creating account profiles

6  Always make sure that you check the spelling of everything you send over the internet.  It is not uncommon for people to not know how to spell, but everything that is electronically transferred has spell- check and not using it just a sign of laziness and a lack of respect for your recipient.

7  Writing something in all capital letters on the internet is intended to show that you are shouting.  If you e-mail something to someone in all-caps, it is the equivalent of screaming it at them.

8  Always tell the truth in your digital profiles (Facebook, Myspace, etc.)  Little lies are still lies and lying is not only dishonest and a general waste of time, but it is also illegal and can result in embarrassment for you than telling the truth.

9  Make sure you are always yourself online.  Pretending to be someone you are not to get friends will not get you the kind of friends you really want.  Also, pretending to be someone else to make fun of them could be construed as cyber bullying.

10  Do not use the internet as a bullying tool.  The internet can be an anonymous way to post nasty comments about someone you don’t like, but it is not a nice thing to do.  Cyber bullying can get you in a lot of trouble. Nothing is anonymous on the internet. Everything you post can be linked back to the exact place and computer you posted it from.

11  Keep away from spam e-mails and messages.  Do not open anything that sounds too good to be true. You didn’t win any prize, that girl really doesn’t want to talk, that Nigerian dictator doesn’t really want you to watch his money from him.  Don’t forward anything that looks suspicious to anyone. Doing this in a business setting could cause a widely spread virus and termination of the source (you).

12  If you need to e-mail someone, say everything you need to say in one e-mail and not 100 small ones.  It takes them longer to sort through and read your mail than it did you to send it.  Too much e-mail can result in them no longer caring, and ending up spam yourself.  It is ok and socially expected to read every e-mail you get, however.

13  Realize that, in this day and age, most everyone has their e-mail tied to their phone and it beeps every time they receive their e-mail.  If your e-mail makes their phone beep in the middle of the night and wakes them up, their response may not be what you wanted.

14  The “s” after http in the website gives it a level of security.  Websites that lack the “s” do not encrypt your information as it travels over the wires and servers of the internet. People can get this information and use it for their personal gain.  Websites that have the added “s” encrypt that information and it will make it harder for criminals to use.

15  No matter how private you think your information is on the internet, someone can get it.  All it takes is a guessed password, a friend turned into an enemy, or a brokenhearted ex, and your personal private information or pictures can become public and your world can be ruined.  If you don’t want it out there, don’t put it on the internet.

16 Fair Use, Copyright, and Plagiarism

17  According to the U.S. Copyright office the principle of fair use states that some material can be used without the permission of the author because, “Section 107 contains a list of the various purposes for which the reproduction of a particular work may be considered fair, such as criticism, comment, news reporting, teaching, scholarship, and research.”

18  When people work hard to create content, they copyright it to ensure that their ideas cannot be stolen.  Stealing their ideas can result in failing grades or lawsuits, depending on the thief.

19  When someone gets paid to create something, they get paid based on the number of that thing that they sell.  When you use that thing without their permission, you are stealing money from them.  It may seem like a victimless crime, but it is still a crime nonetheless.

20  Fair use simply means that small portions of someone’s material can be used if you give them credit and you are using it for a useful purpose. Such as:  Criticism  Teaching  Reviews  News reports  Scholarly purposes  Copying someone’s words or ideas and trying to pass them off as your own is plagiarism.

21  The public domain consists of non- copyrighted materials that you can freely use and not have to pay for.  These are useful for use in content creation when you need a theme song, picture, or Christmas carol.  This also applies to knowledge that is considered to be public.

22  According to Dictionary.com, plagiarism is defined as “the unauthorized use or close imitation of the language and thoughts of another author and the representation of them as one's own original work. “

23  It is important to avoid trying to pass someone else’s work as your own or copy portions of their work without giving them credit.  Avoiding this is simple: Give them credit.  Use proper MLA or APA citations and your plagiarism will fall under fair use.

24 Internet and Computer Safety

25  Tip 1: Do not post anything you wouldn’t want everyone seeing.  Nothing is private. There are people out there that can hack into any private account and make your items public. Don’t share it if you don’t want it shared with everyone.

26  Tip 2: Do not “friend” people you do not know personally online.  If you do not know a person in real life, do not become friends with them on a social networking website.  This can seem innocent, but this person may not be truthful about who they are and can be someone much older trying to take advantage of you.

27  Tip 3: Do not meet anyone in real life that you meet on the internet.  Just because someone posts a lot of pictures of someone on their Facebook page, doesn’t mean that is the person you will be meeting.  Meeting someone in public that you have met online is very dangerous and can put you in a great deal of danger.

28  Tip 4: Do not open e-mails from people you do not recognize.  Spam e-mails can cause viruses to spread on your computer and can give people control of your accounts.

29  Tip 5: Do not give out your passwords or social security information.  If someone asks for your password or social security number, do not give it to them. No one is allowed to ask for this information over e-mail, so if someone does, they are trying to break the law.

30  Tip 6: Stay away from file-sharing programs.  Illegally sharing and downloading music is a crime.  You may download viruses from these websites and think you are downloading safe files.  Some of these programs can allow anyone to access all of the files on your computer.

31  Tip 1: Make sure you have anti-virus software and that it scans and updates regularly.  New viruses come out every day and anti- virus software updates daily to keep up with it.  Having anti-virus software is pointless, if you do not allow the software to scan.  Scans may slow your computer down, but so do viruses.

32  Tip 2: Make sure you have a firewall.  Not having a firewall on your computer is like leaving the front door open on your house. Anyone can come in.  People can leave viruses and access files on your computer if there is nothing to stop them.

33  Tip 3: Make sure you have anti-spyware software.  Spyware is different from a virus. Spyware allows people to spy on your actions on your computer. They can steal passwords, bank information, and files that you access on your computer.  Like anti-virus software, if you don’t use it, it will do you no good.

34  Tip 4: If someone does something bad on your computer, you will be responsible.  If you let someone do bad things on your computer, it will be traced back to you and not them.  You can be punished for crimes they commit.

35  Tip 5: Do not use pirated software.  This process is not only illegal and can result in fines or arrest, but it is also dangerous. Pirated software can come packaged with viruses and spyware.  If they stole the software from someone, they will steal from you.

36 The person you are on the internet and the person you are in real life is the same person. Don’t do anything on the internet that you wouldn’t do in real life.

37  Chiles, D. (2006). The rules of netiquette. Retrieved April 16, 2011, from http://www.networketiquette.net/ http://www.networketiquette.net/  netiquette. (n.d.). Dictionary.com Unabridged. Retrieved April 16, 2011, from Dictionary.com website: http://dictionary.reference.com/browse/netiquette http://dictionary.reference.com/browse/netiquette  plagiarism. (n.d.). Dictionary.com Unabridged. Retrieved April 16, 2011, from Dictionary.com website: http://dictionary.reference.com/browse/plagiarism http://dictionary.reference.com/browse/plagiarism  U.s. copyright office - fair use. (2009, November). Retrieved April 16, 2011, from http://www.copyright.gov/fls/fl102.html http://www.copyright.gov/fls/fl102.html


Download ppt "By Todd Bennett.  Netiquette  Fair Use and Copyright  Plagiarism  Safety Computer Internet."

Similar presentations


Ads by Google