by: tina hill. this is the unwritten rules of the different media sites on the internet
TRANSCRIPT
DIGITAL CITIZENSHIP
PROJECTBy: Tina Hill
NETIQUETTE ON SOCIAL MEDIA SITES
This is the unwritten rules of the different media sites on the internet.
THE DO’S AND DON’TS OF SOCIAL MEDIA SITES
Do Share
information Share accurate
information Correct mistakes
Show courtesy Respect Privacy Do everything in
moderation
Don’t Lie
Hate Cuss
Be disrespectful Gossip Slander
OTHER TERMS NEEDED TO
UNDERSTAND THE SOCIAL
MEDIA SITESCopyright, Fair use, Plagiarism, Identity
Theft, Reputation Management, Password, Cyberbulllying, Cyberstalking, Virus,
Phishing, Trojan horses, Worms
COPYRIGHT-The sole right to make copies and disperse someone’s writing, artistic creation, or music. This ownership is granted by law for a controlled number of years.
FAIR USE-The way a copyrighted material can be used by a third party without fearing the repercussions of legal prosecution or having to pay royalties.
THE DIFFERENCE BETWEEN COPYRIGHT AND FAIR USE: When a material is copyrighted the
creator of the material has all rights to determine the manner in which their creation is used. The creator has to grant permission for their material to be used and they also have the right to control the way that their product is used.
When a product is fair use that means the product can be used, with stipulations, by the parties that have produced the said product.
FAIR USE RULES FOR MEDIA: All forms of media including, but not limited to, print, music, video, photographs, and poetry can be reproduced without the written permission of the creator. The works can be copied, quoted, and re-used. This is not a positive part of the fair use rules, but with technology it is hard to prevent such practices from occurring.
PLAGIARISMUsing or imitating the exact words of a written work in such a way that there is little difference between the original work and the new work. This is done without permission or giving credit to the source from which it came.
HOW CAN PLAGIARISM BE AVOIDED? The given work can be paraphrased
The source can be cited
The author can give their written permission to use the material in question
PLAGIARISM RECOGNITION Teachers can use technology to find out
if a student has plagiarized by using software that searches the web for the duplicated work.
An example is: www.turnitin.com
SAFETY ON THE INTERNET:
Identity Theft, Reputation Management, Passwords, Cyberbullying, Cyberstalking
IDENTITY THEFT The crime of using someone else’s
identity to get money out of their accounts and to use their credit without the owner of the identity knowing that it was happening.
REPUTATION MANAGEMENT It is managing the reputation of a
company
PASSWORDS A word or a group of characters that is
usually kept a secret from other people so that the information that is needing to be obtained can be kept confidential from other people using a multiuser computer.
CYBERBULLYING To bully someone online by sending
messages to them or by posting mean or cruel stuff about them on public sites.
CYBERSTALKING It involves reputedly sending unwanted
messages to a person after the sender has been informed to not send the messages anymore.
SAFETY ON THE COMPUTER
Viruses, Phishing, Trojan Horses, and Worms
VIRUS A program that enters a computer
without the knowledge of the owner.
PHISHING Trying to get confidential, personal, or
financial information from internet users. This can be done by sending an e-mail that looks like a legitimate e-mail from a company, but is linked to a fake site.
TROJAN HORSE A nonreplicating computer program that
is put in illegally into another program in order to do damage when the software becomes activated.
WORM A reproducing program that runs
independently and travels across network connections.
SOURCES:.
http://www.brickmarketing.com/what-is-reputation-management.htm. (n.d.)
http://dictionary.reference.com/. (n.d.).
http://netforbeginners.about.com/od/c/f/What-Is-Cyberstalking.htm. (n.d.).
DIGITAL CITIZENSHIP
PROJECTBy: Tina Hill