by: shervanae scott. social media netiquette “netiquette” refers to etiquette on the internet....
TRANSCRIPT
Digital Citizenship ProjectBy: Shervanae Scott
Social Media Netiquette“Netiquette” refers to etiquette on the Internet. Good
“netiquette” involves respecting others' privacy. There are three main areas where good “netiquette” is
highly stressed: e-mail, online chatting, and newsgroups.
It is also the correct or acceptable way of communicating on the Internet.
Do’s & Do not’s of Social Media• Do respond and react• Do use social media• Do use privacy settings• Do not surf on your company’s
time• Do not display your personal life • Do not connect with everyone
Copyright & Fair Use Copyright- a legal device that provides the
creator of a work of art or literature, or a work that conveys information or ideas, the right to control how the work is used"(Fishman, 2008, p. 6).
Fair Use- is the most significant limitation on the copyright holder's exclusive rights (United States Copyright Office, 2010, para. 1).
Copy Right and Fair Use con.tCopyright is the original piece of work, and
Fair use is a gray area that refers to the rights of copyright holders which allows limited use of copyrighted material, even without permission. However, there are conditions in which fair use can be claimed are not permanent depending upon certain factors.
United States Copyright Office. (2008). Copyright basics. (Circular 1). Retrieved from http://www.copyright.gov/circs/circ01.pdf
Fair Use RulesMedia- No more than 5 images of an artist/photographer
in one program or printing. Copyright notice and attribution required.
Print- Single copies for teacher for research, teaching, or class preparation.
Video- May be copied for archival purposes or to replace, lost damaged or stolen copies
Music- Single copy of up to 10% of a musical composition in print, sound, or multimedia form may be performed and displayed as part of an educator or student multimedia program for educational purposes.
Photo- Older illustrations may be in the public domain, but the collection may be copyrighted.
Safety on the “Net”Identity Theft- is a crime in which one wrongfully
gets and uses another individual's personal information such as: bank account information or credit card information.
Here are a few ways of preventing:1. Always review monthly statements to check
accuracy2. Always check your credit reports3. Always shred all personal information that comes
in the mail whether you use it or not4. Secure your information on and offline5. Never carry your social security card in your
purse or wallet
Password Safety on the InternetTechnology is a huge factor in our society today, and
almost every program there is you have to login to there must be a user name and password. Passwords are to be kept SAFE at all times!!!
Password Safety Tips:• Don’t reveal your password to anyone• Don’t leave it laying around, if so keep it locked up• Be very careful when using WIFI at public places• Do reset your password frequently (n.d.). Retrieved
from http://antivirus.about.com/od/securitytips/a/passwordsafety.htm
Cyber BullyingCyber bullying- is bullying through email, chat room exchanges, or
digital. Cyber bullying, like traditional bullying, involves an disparity of power, aggression, and a negative action that is often repeated.
Types of Cyber Bullying Harassment: Repeatedly sending offensive, rude, and insulting
messages Denigration: Distributing information about another that is derogatory
and untrue through posting it on a Web page, sending it to others through email or instant messaging, or posting or sending digitally altered photos of someone
Flaming: Online "fighting" using electronic messages with angry, vulgar language
Impersonation: Breaking into an email or social networking account and using that person's online identity to send or post vicious or embarrassing material to/about others.
Outing and Trickery: Sharing someone's secrets or embarrassing information, or tricking someone into revealing secrets or embarrassing information and forwarding it to others
Cyber Stalking: Repeatedly sending messages that include threats of harm or are highly intimidating, or engaging in other online activities that make a person afraid for his or her safety.
(n.d.). Retrieved from http://olweus.org/public/cyber_bullying.page
Cyber Stalking Safety tips on Cyber Stalking
Be cautious of who you meet on-line
Set all settings to private on social networks
DO NOT share personal information
BLOCK any unwanted messengers
The Life of a ComputerComputer viruses are created when a programmer creates
computer code that has the capability to replicate itself. To protect your home computer against computer viruses,
worms, and Trojans, you should invest in anti-virus software.
There are several signs to know that your computer has been infected: new files appear out of no where, program size changes, sometimes you will hear strange noises from the computer or the keyboard, and a common sign is when the computer takes longer than normal to load. (Shelly, G.B, Cashman, T.J. & Vermatt, M. E. (2001). Discovering computers 2002: Concepts for a digital world. Boston, MA: Course Technology.)
Protecting Your Computer Anti-Virus software Continuously scan your computer
Backup your files Be aware of unknown emails Be Alert!
Plagiarism Plagiarism- is defined as copying another
one’s work. To avoid plagiarism you need to cite the original source and paraphrase. Even when paraphrasing one must still give credit to the source. Teachers are able to recognize plagiarism by utilizing search engines such as Article Checker.
Retrieved from(http://www.ehow.com/facts)
Works CitedGoodridge, E. (2009, may 01). Steps to prevent identity theft and how
to prevent it. (Shelly, G.B, Cashman, T.J. & Vermatt, M. E. (2001). Discovering
computers 2002: Concepts for a digital world. Boston, MA: Course Technology.)
United States Copyright Office. (2008). Copyright basics. (Circular 1). Retrieved from http://www.copyright.gov/circs/circ01.pdf
United States Copyright Office. (2009). Reproduction of copyrighted works by educators and librarians. (Circular 21). Retrieved from http://www.copyright.gov/circs/circ21.pdf
United States Copyright Office. (2010). Fair use. (Circular FL-102). Retrieved from http://www.copyright.gov/fls/fl102.html
http://www.westminstermo.edu/academics/resources/library/Pages/CopyrightFairUse.aspx
Retrieved from http://antivirus.about.com/od/securitytips/a/passwordsafety.htm