by: shervanae scott. social media netiquette “netiquette” refers to etiquette on the internet....

14
Digital Citizenship Project By: Shervanae Scott

Upload: anis-montgomery

Post on 18-Jan-2016

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: By: Shervanae Scott. Social Media Netiquette “Netiquette” refers to etiquette on the Internet. Good “netiquette” involves respecting others' privacy

Digital Citizenship ProjectBy: Shervanae Scott

Page 2: By: Shervanae Scott. Social Media Netiquette “Netiquette” refers to etiquette on the Internet. Good “netiquette” involves respecting others' privacy

Social Media Netiquette“Netiquette” refers to etiquette on the Internet. Good

“netiquette” involves respecting others' privacy. There are three main areas where good “netiquette” is

highly stressed: e-mail, online chatting, and newsgroups.

It is also the correct or acceptable way of communicating on the Internet.

Page 3: By: Shervanae Scott. Social Media Netiquette “Netiquette” refers to etiquette on the Internet. Good “netiquette” involves respecting others' privacy

Do’s & Do not’s of Social Media• Do respond and react• Do use social media• Do use privacy settings• Do not surf on your company’s

time• Do not display your personal life • Do not connect with everyone

Page 4: By: Shervanae Scott. Social Media Netiquette “Netiquette” refers to etiquette on the Internet. Good “netiquette” involves respecting others' privacy

Copyright & Fair Use Copyright- a legal device that provides the

creator of a work of art or literature, or a work that conveys information or ideas, the right to control how the work is used"(Fishman, 2008, p. 6).

Fair Use- is the most significant limitation on the copyright holder's exclusive rights (United States Copyright Office, 2010, para. 1).

Page 5: By: Shervanae Scott. Social Media Netiquette “Netiquette” refers to etiquette on the Internet. Good “netiquette” involves respecting others' privacy

Copy Right and Fair Use con.tCopyright is the original piece of work, and

Fair use is a gray area that refers to the rights of copyright holders which allows limited use of copyrighted material, even without permission. However, there are conditions in which fair use can be claimed are not permanent depending upon certain factors.

United States Copyright Office. (2008). Copyright basics. (Circular 1). Retrieved from http://www.copyright.gov/circs/circ01.pdf

Page 6: By: Shervanae Scott. Social Media Netiquette “Netiquette” refers to etiquette on the Internet. Good “netiquette” involves respecting others' privacy

Fair Use RulesMedia- No more than 5 images of an artist/photographer

in one program or printing. Copyright notice and attribution required. 

Print- Single copies for teacher for research, teaching, or class preparation.

Video- May be copied for archival purposes or to replace, lost damaged or stolen copies

Music- Single copy of up to 10% of a musical composition in print, sound, or multimedia form may be performed and displayed as part of an educator or student multimedia program for educational purposes.

Photo- Older illustrations may be in the public domain, but the collection may be copyrighted.

Page 7: By: Shervanae Scott. Social Media Netiquette “Netiquette” refers to etiquette on the Internet. Good “netiquette” involves respecting others' privacy

Safety on the “Net”Identity Theft- is a crime in which one wrongfully

gets and uses another individual's personal information such as: bank account information or credit card information.

Here are a few ways of preventing:1. Always review monthly statements to check

accuracy2. Always check your credit reports3. Always shred all personal information that comes

in the mail whether you use it or not4. Secure your information on and offline5. Never carry your social security card in your

purse or wallet

Page 8: By: Shervanae Scott. Social Media Netiquette “Netiquette” refers to etiquette on the Internet. Good “netiquette” involves respecting others' privacy

Password Safety on the InternetTechnology is a huge factor in our society today, and

almost every program there is you have to login to there must be a user name and password. Passwords are to be kept SAFE at all times!!!

Password Safety Tips:• Don’t reveal your password to anyone• Don’t leave it laying around, if so keep it locked up• Be very careful when using WIFI at public places• Do reset your password frequently (n.d.). Retrieved

from http://antivirus.about.com/od/securitytips/a/passwordsafety.htm

Page 9: By: Shervanae Scott. Social Media Netiquette “Netiquette” refers to etiquette on the Internet. Good “netiquette” involves respecting others' privacy

Cyber BullyingCyber bullying- is bullying through email, chat room exchanges, or

digital. Cyber bullying, like traditional bullying, involves an disparity of power, aggression, and a negative action that is often repeated.

Types of Cyber Bullying Harassment: Repeatedly sending offensive, rude, and insulting

messages Denigration: Distributing information about another that is derogatory

and untrue through posting it on a Web page, sending it to others through email or instant messaging, or posting or sending digitally altered photos of someone

Flaming: Online "fighting" using electronic messages with angry, vulgar language

Impersonation: Breaking into an email or social networking account and using that person's online identity to send or post vicious or embarrassing material to/about others.

Outing and Trickery: Sharing someone's secrets or embarrassing information, or tricking someone into revealing secrets or embarrassing information and forwarding it to others

Cyber Stalking: Repeatedly sending messages that include threats of harm or are highly intimidating, or engaging in other online activities that make a person afraid for his or her safety.

(n.d.). Retrieved from http://olweus.org/public/cyber_bullying.page

Page 10: By: Shervanae Scott. Social Media Netiquette “Netiquette” refers to etiquette on the Internet. Good “netiquette” involves respecting others' privacy

Cyber Stalking Safety tips on Cyber Stalking

Be cautious of who you meet on-line

Set all settings to private on social networks

DO NOT share personal information

BLOCK any unwanted messengers

Page 11: By: Shervanae Scott. Social Media Netiquette “Netiquette” refers to etiquette on the Internet. Good “netiquette” involves respecting others' privacy

The Life of a ComputerComputer viruses are created when a programmer creates

computer code that has the capability to replicate itself. To protect your home computer against computer viruses,

worms, and Trojans, you should invest in anti-virus software.

There are several signs to know that your computer has been infected: new files appear out of no where, program size changes, sometimes you will hear strange noises from the computer or the keyboard, and a common sign is when the computer takes longer than normal to load. (Shelly, G.B, Cashman, T.J. & Vermatt, M. E. (2001). Discovering computers 2002: Concepts for a digital world. Boston, MA: Course Technology.)

Page 12: By: Shervanae Scott. Social Media Netiquette “Netiquette” refers to etiquette on the Internet. Good “netiquette” involves respecting others' privacy

Protecting Your Computer Anti-Virus software Continuously scan your computer

Backup your files Be aware of unknown emails Be Alert!

Page 13: By: Shervanae Scott. Social Media Netiquette “Netiquette” refers to etiquette on the Internet. Good “netiquette” involves respecting others' privacy

Plagiarism Plagiarism- is defined as copying another

one’s work. To avoid plagiarism you need to cite the original source and paraphrase. Even when paraphrasing one must still give credit to the source. Teachers are able to recognize plagiarism by utilizing search engines such as Article Checker.

Retrieved from(http://www.ehow.com/facts)

Page 14: By: Shervanae Scott. Social Media Netiquette “Netiquette” refers to etiquette on the Internet. Good “netiquette” involves respecting others' privacy

Works CitedGoodridge, E. (2009, may 01). Steps to prevent identity theft and how

to prevent it. (Shelly, G.B, Cashman, T.J. & Vermatt, M. E. (2001). Discovering

computers 2002: Concepts for a digital world. Boston, MA: Course Technology.)

United States Copyright Office. (2008). Copyright basics. (Circular 1). Retrieved from http://www.copyright.gov/circs/circ01.pdf

United States Copyright Office. (2009). Reproduction of copyrighted works by educators and librarians. (Circular 21). Retrieved from http://www.copyright.gov/circs/circ21.pdf

United States Copyright Office. (2010). Fair use. (Circular FL-102). Retrieved from http://www.copyright.gov/fls/fl102.html

http://www.westminstermo.edu/academics/resources/library/Pages/CopyrightFairUse.aspx

Retrieved from http://antivirus.about.com/od/securitytips/a/passwordsafety.htm