digital citizenship donna watson ed505. definition of netiquette etiquette governing communication...

21
Digital Citizenship Digital Citizenship Donna Watson Donna Watson ED505 ED505

Upload: robyn-morton

Post on 26-Dec-2015

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Digital Citizenship Donna Watson ED505. Definition of NETIQUETTE Etiquette governing communication on the Internet. Etiquette governing communication

Digital CitizenshipDigital Citizenship

Donna WatsonDonna Watson

ED505ED505

Page 2: Digital Citizenship Donna Watson ED505. Definition of NETIQUETTE Etiquette governing communication on the Internet. Etiquette governing communication

Definition of Definition of NETIQUETTENETIQUETTE

Etiquette governing communication on Etiquette governing communication on the Internet.the Internet.

Page 3: Digital Citizenship Donna Watson ED505. Definition of NETIQUETTE Etiquette governing communication on the Internet. Etiquette governing communication

Netiquette Rules for Netiquette Rules for StudentsStudents

1.1. Never post illegal activities.Never post illegal activities.2.2. Bully Bully 3.3. Talk negatively about your teachers.Talk negatively about your teachers.4.4. Post objectionable content from school computers or Post objectionable content from school computers or

networks.networks.5.5. Post confidential/private information.Post confidential/private information.6.6. Post your location.Post your location.7.7. Lie, cheat, or plagiarize.Lie, cheat, or plagiarize.8.8. Threaten violence against a person.Threaten violence against a person.9.9. Ignore school policies.Ignore school policies.10.10. Post unprofessional public profiles.Post unprofessional public profiles.11.11. Never rely on privacy setting to be 100%.Never rely on privacy setting to be 100%.12.12. Never post while in an emotional state. Never post while in an emotional state.

Rieved from Rieved from http://www.albion.com/netiquette/rule1.html

Page 4: Digital Citizenship Donna Watson ED505. Definition of NETIQUETTE Etiquette governing communication on the Internet. Etiquette governing communication

NetiquetteNetiquette

DoDo Treat others the way you Treat others the way you

want to be treatedwant to be treated Be ethical and law abidingBe ethical and law abiding

Spell correctlySpell correctly Use correct grammarUse correct grammar

Be knowledgeableBe knowledgeable Be positive, pleasant, and Be positive, pleasant, and

politepolite Respect other people’s Respect other people’s

privacyprivacy Be forgivingBe forgiving

Don’tDon’t Post illegal activities Post illegal activities

BullyBully Trash talk your teacherTrash talk your teacher

Post profanity or harassment Post profanity or harassment from school or anywherefrom school or anywhere Post your locationPost your location

Post private informationPost private information Lie or cheatLie or cheat

Threaten violenceThreaten violence Post unprofessional public Post unprofessional public

profilesprofiles Post while overly emotional.Post while overly emotional.

Rieved from Rieved from http://www.albion.com/netiquette/rule1.html

Page 5: Digital Citizenship Donna Watson ED505. Definition of NETIQUETTE Etiquette governing communication on the Internet. Etiquette governing communication

Definition of CopyrightDefinition of Copyright

The exclusive legal right to The exclusive legal right to reproduce, publish, sell, or distribute reproduce, publish, sell, or distribute the matter and form of something the matter and form of something (as a literary, musical, or artistic (as a literary, musical, or artistic work).work).

Retrieved from http://www.merriam-webster.com/dictionary/netiquette www.fotosearch.com/photos-images/etiquette.html

Page 6: Digital Citizenship Donna Watson ED505. Definition of NETIQUETTE Etiquette governing communication on the Internet. Etiquette governing communication

Definition of Fair UseDefinition of Fair Use

A legal doctrine that portions of A legal doctrine that portions of copyrighted materials may be used copyrighted materials may be used without permission of the copyright without permission of the copyright owner provided the use is fair and owner provided the use is fair and reasonable, does not substantially reasonable, does not substantially impair the value of the materials, impair the value of the materials, and does not curtail the profits and does not curtail the profits reasonably expected by the owner. reasonably expected by the owner.

Retrieved from http://smallbusiness.findlaw.com/intellectual-property/fair-use-law.html

Page 7: Digital Citizenship Donna Watson ED505. Definition of NETIQUETTE Etiquette governing communication on the Internet. Etiquette governing communication

Compare and Contrast Compare and Contrast

CopyrightCopyrightThe Copyright Act prevents The Copyright Act prevents the unauthorized copying of the unauthorized copying of

a work of authorship.a work of authorship.

Fair UseFair UseAllows for use of copyrighted Allows for use of copyrighted material for certain purposes.material for certain purposes.

Criticism, Comment, News Criticism, Comment, News Reporting, Teaching, Reporting, Teaching,

Scholarship, Research, ParodyScholarship, Research, Parody

Copyright protects the Copyright protects the work of an author. work of an author. However, fair use However, fair use

allows use of allows use of copyrighted material copyrighted material

only for certain only for certain purposes without the purposes without the

permission of the permission of the author.author.

Page 8: Digital Citizenship Donna Watson ED505. Definition of NETIQUETTE Etiquette governing communication on the Internet. Etiquette governing communication

Fair Use - MediaFair Use - Media

Fair Use of Copyrighted Fair Use of Copyrighted MaterialMaterial Fair Use allows use of copyrighted materials for Fair Use allows use of copyrighted materials for

certain purposes.certain purposes.

The purposes are: Criticism, Comment, News The purposes are: Criticism, Comment, News Reporting, Teaching,Reporting, Teaching,

Scholarship and research, Parody.Scholarship and research, Parody.

Page 9: Digital Citizenship Donna Watson ED505. Definition of NETIQUETTE Etiquette governing communication on the Internet. Etiquette governing communication

Definition of PlagiarismDefinition of Plagiarism

To steal and pass off (the ideas or To steal and pass off (the ideas or words of another) as one's own words of another) as one's own :: use use (another's production) without (another's production) without crediting the source. crediting the source.

Retrieved from http://www.hamilton.edu/style/avoiding-plagiarism

Page 10: Digital Citizenship Donna Watson ED505. Definition of NETIQUETTE Etiquette governing communication on the Internet. Etiquette governing communication

Avoiding PlagiarismAvoiding Plagiarism In order to avoid plagiarism, you must give credit In order to avoid plagiarism, you must give credit

where credit is due.where credit is due. This simply means you must cite the person whose This simply means you must cite the person whose

work you are using.work you are using.

When using an author’s exact words, you must use When using an author’s exact words, you must use quotation marks and cite the work.quotation marks and cite the work.

If you use large amounts of an author’s work or simply If you use large amounts of an author’s work or simply copy it, you may need written permission.copy it, you may need written permission.

The best way to avoid plagiarism is to use your own The best way to avoid plagiarism is to use your own thoughts and ideas. But, many times in research this thoughts and ideas. But, many times in research this is not possible. So, simply give credit where credit is is not possible. So, simply give credit where credit is due.due.

Retrieved from http://www.hamilton.edu/style/avoiding-plagiarism

Page 11: Digital Citizenship Donna Watson ED505. Definition of NETIQUETTE Etiquette governing communication on the Internet. Etiquette governing communication

Detection of PlagiarismDetection of Plagiarism One way teachers detect plagiarism is by being familiar One way teachers detect plagiarism is by being familiar

with their students and knowing their writing abilities and with their students and knowing their writing abilities and vocabulary. vocabulary.

Technological AdvancesTechnological AdvancesUsing Tools to Match the TextUsing Tools to Match the Text

Another way teachers detect plagiarism is by using Another way teachers detect plagiarism is by using technology, or electronic software. This software has the technology, or electronic software. This software has the capability to match the text. capability to match the text.

Also, there are many free sites on line in which to check Also, there are many free sites on line in which to check

for plagiarism.for plagiarism.

Retrieved from http://www.hamilton.edu/style/avoiding-plagiarism

Page 12: Digital Citizenship Donna Watson ED505. Definition of NETIQUETTE Etiquette governing communication on the Internet. Etiquette governing communication

Safety Tips for ChildrenSafety Tips for Children Never give out personal information. (Full name, school name, telephone Never give out personal information. (Full name, school name, telephone

numbers, or address)numbers, or address) If you begin to feel uncomfortable online, you should always tell your If you begin to feel uncomfortable online, you should always tell your

parents.parents. Never agree to meet someone you have met online unless your parents are Never agree to meet someone you have met online unless your parents are

with you. Always meet with your parents in a public place.with you. Always meet with your parents in a public place. Never send a picture of yourself to someone online without getting Never send a picture of yourself to someone online without getting

permission from your parents.permission from your parents. If someone sends you a mean message or one that makes you feel If someone sends you a mean message or one that makes you feel

uncomfortable, tell your parents. uncomfortable, tell your parents. Your parents are the only people you should share your password with.Your parents are the only people you should share your password with. You should not say hurtful things online to anyone.You should not say hurtful things online to anyone.

Retrieved fromRetrieved from http://www.safekids.com/kids-rules-for-online-safety/

  

Page 13: Digital Citizenship Donna Watson ED505. Definition of NETIQUETTE Etiquette governing communication on the Internet. Etiquette governing communication

Identity TheftIdentity Theft

What is identity theft?What is identity theft? The illegal use of someone else's personal The illegal use of someone else's personal information (as a Social Security number) in information (as a Social Security number) in

order to obtain money or credit.order to obtain money or credit.

Retrieved from Retrieved from http://www.merriam-webster.com/dictionary/identity%20theft Retrievedhttp://www.fotosearch.com/photos-images/identity-theft.htmlRetrievedhttp://www.fotosearch.com/photos-images/identity-theft.html

Page 14: Digital Citizenship Donna Watson ED505. Definition of NETIQUETTE Etiquette governing communication on the Internet. Etiquette governing communication

Prevention of Identity TheftPrevention of Identity TheftPassword ProtectionPassword Protection

Never share your password Never share your password or write it down.or write it down.

Create passwords with Create passwords with numbers, letters, capitals, numbers, letters, capitals,

and symbols.and symbols. Use different passwords for Use different passwords for

different accounts.different accounts.

E-MailE-Mail Never e-mail account Never e-mail account numbers or social security numbers or social security

numbers.numbers. Be cautious opening e-mails Be cautious opening e-mails

even if you know the person.even if you know the person. Beware of e-mail scams.Beware of e-mail scams.

Use e-mail filtering software Use e-mail filtering software to detect spam.to detect spam.

Retrieved fromRetrieved from http://www.tdbank.com/bank/preventingidtheft_online.htmlhttp://www.tdbank.com/bank/preventingidtheft_online.html

Online SecurityOnline Security Use secure sites when Use secure sites when

providing financial providing financial information.information.

Watch out for sites that Watch out for sites that imitate other sites.imitate other sites.

Don’t reply to unknown Don’t reply to unknown e-mails.e-mails.

Log off completely after Log off completely after communicating with a secure communicating with a secure

site.site. Only use computers you know Only use computers you know

and trust.and trust. Install an anti-virus, anti-Install an anti-virus, anti-

spyware, and firewall spyware, and firewall software.software.

Turn on all security features Turn on all security features when using wireless internet.when using wireless internet.

Page 15: Digital Citizenship Donna Watson ED505. Definition of NETIQUETTE Etiquette governing communication on the Internet. Etiquette governing communication

Definitions of Reputation and Definitions of Reputation and ManagementManagement

ReputationReputation ““aa . Overall quality or . Overall quality or

character as seen or character as seen or judged by people in judged by people in general general

bb . Recognition by other . Recognition by other people of some people of some characteristic or ability characteristic or ability <has the <has the reputationreputation of of being clever> being clever>

C. A place in public esteem C. A place in public esteem or regard or regard :: good name good name <trying to protect his <trying to protect his reputationreputation>.”>.”

““The act or art of The act or art of managing managing :: the conducting the conducting or supervising of or supervising of something (as a something (as a business).”business).”

Retrieved from http://www.merriam-webster.com/

Page 16: Digital Citizenship Donna Watson ED505. Definition of NETIQUETTE Etiquette governing communication on the Internet. Etiquette governing communication

Reputation ManagementReputation ManagementSearch Engine OptimizationSearch Engine Optimization

The internet has made it possible The internet has made it possible to easily research a company to easily research a company

or a person. This does not or a person. This does not always reflect in a positive always reflect in a positive

manner on a person or manner on a person or company. company.

““Most reputation services work by Most reputation services work by tracking what's written about a tracking what's written about a client on the Web, then doing client on the Web, then doing search engine optimization search engine optimization

(BusinessWeek.com, 9/10/07), (BusinessWeek.com, 9/10/07), promoting positive pages, and promoting positive pages, and creating other sites that will creating other sites that will

push damaging references off push damaging references off the first pages of search the first pages of search results. The services are results. The services are pitched as another tool pitched as another tool

companies can use in their PR companies can use in their PR and marketing effortsand marketing efforts.”.”

The Top 10 Best Online The Top 10 Best Online Reputation Management Reputation Management Companies for February Companies for February

2012 are:2012 are:1.  ReputationManagement 1.  ReputationManagement

ConsultantsConsultants2.  Reputation Management 2.  Reputation Management

ExpertsExperts3.  Distilled 3.  Distilled 4.  Cube3 Marketing 4.  Cube3 Marketing 5.  Clickthrough Marketing 5.  Clickthrough Marketing 6.  Tecmark 6.  Tecmark 7.  KwikChex 7.  KwikChex 8.  MediaVision 8.  MediaVision 9.  Reputation 24/7 9.  Reputation 24/7 10. Online Reputation 10. Online Reputation

ManagementManagement

Retrieved from http://www.businessweek.com/stories/2008-04-30/do-reputation-management-services-work-businessweek-business-news-stock-market-and-financial-advice

Retrieved from http://www.prweb.com/releases/2012/2/prweb9167933.htm

Page 17: Digital Citizenship Donna Watson ED505. Definition of NETIQUETTE Etiquette governing communication on the Internet. Etiquette governing communication

Cyberbullying and Cyberbullying and CyberstalkingCyberstalking

What Is Cyberbullying?What Is Cyberbullying?Cyberbullying involves the Cyberbullying involves the

use of technology to use of technology to harass, threaten, harass, threaten,

embarrass, or target embarrass, or target another person.another person.

How to Prevent How to Prevent CyberbullyingCyberbullying

Pay attention to online Pay attention to online activity activity

Know the effects of your Know the effects of your wordswords

Know the lawKnow the law Know when to respondKnow when to respond

What is Cyberstalking?What is Cyberstalking? Cyberstalking is stalking a Cyberstalking is stalking a

person online. It may person online. It may occur in chat room, e-occur in chat room, e-mails, social networking mails, social networking websites, and message websites, and message boards.boards.

How to Prevent How to Prevent CyberstalkingCyberstalking

Never use real name Never use real name onlineonline

Never give your telephone Never give your telephone numbernumber

Never give your address Never give your address onlineonline

Retrieved from http://kidshealth.org/parent/positive/talk/cyberbullying.html

http://www.ourfamilyworld.com/2011/11/30/how-to-prevent-cyberbullying/

http://www.fotosearch.com/photos-images/cyberstalking.html

Page 18: Digital Citizenship Donna Watson ED505. Definition of NETIQUETTE Etiquette governing communication on the Internet. Etiquette governing communication

Computer VirusesComputer Viruses

Computer viruses are small Computer viruses are small software programs software programs

designed to interfere with designed to interfere with the function of your the function of your

computer. They travel computer. They travel from one computer to from one computer to

another through e-mail, another through e-mail, attachments, or instant attachments, or instant

messaging.messaging.

Types of VirusesTypes of VirusesBoot Sector VirusesBoot Sector Viruses

File Infecting VirusesFile Infecting Viruses

Macro VirusesMacro Viruses

Master Boot Record InfectorsMaster Boot Record Infectors

Polymorphic VirusesPolymorphic Viruses

Stealth VirusesStealth Viruses

http://www.microsoft.com/security/pc-security/virus-whatis.aspxhttp://www.microsoft.com/security/pc-security/virus-whatis.aspx

Page 19: Digital Citizenship Donna Watson ED505. Definition of NETIQUETTE Etiquette governing communication on the Internet. Etiquette governing communication

PhishingPhishing DefinitionDefinition

A scam by which an e-mail A scam by which an e-mail user is duped into user is duped into revealing personal or revealing personal or confidential information confidential information which the scammer can which the scammer can use illicitlyuse illicitly . .

Safety Tips to Prevent Safety Tips to Prevent PhishingPhishing

Do not give personal data Do not give personal data in any e-mails.in any e-mails.

Use anti-virus software and Use anti-virus software and firewalls on all computers.firewalls on all computers.

http://www.merriam-webster.com/dictionary/phishinghttp://www.cityofbinghamton.com/%5Clibrary%5Cpages%5Cdept-police%5CProtect%20yourself%20from%20Phishing.pdf

http://www.fotosearch.com/photos-images/phishing.html

Page 20: Digital Citizenship Donna Watson ED505. Definition of NETIQUETTE Etiquette governing communication on the Internet. Etiquette governing communication

Worms and TrojansWorms and Trojans

A worm has the ability to A worm has the ability to replicate itself and replicate itself and

send itself out without send itself out without human action. A human action. A

worm can cause web worm can cause web servers, network servers, network

servers, and individual servers, and individual computers to stop computers to stop

responding.responding.

Trojans can be an Trojans can be an annoyance by changing annoyance by changing your desktop or adding your desktop or adding icons. They can also icons. They can also

be devastating by be devastating by deleting information on deleting information on

your system. It also your system. It also has the ability to open has the ability to open a, “Backdoor,” which a, “Backdoor,” which

allows hackers to allows hackers to obtain personal obtain personal

information.information.

http://www.chicalogic.com/tips-tricks/what-is-the-difference-between-viruses-worms-and-trojan-horseshttp://www.chicalogic.com/tips-tricks/what-is-the-difference-between-viruses-worms-and-trojan-horses

http://www.fotosearch.com/photos-images/computer-trojans.htmlhttp://www.fotosearch.com/photos-images/computer-trojans.html

Page 21: Digital Citizenship Donna Watson ED505. Definition of NETIQUETTE Etiquette governing communication on the Internet. Etiquette governing communication

ReferencesReferences

http://www.merriam-webster.com/dictionary/netiquette EtiquetteEtiquette Stock Photos and Stock Photos and ImagesImages. 1429 . 1429 etiquetteetiquette pictures and ... pictures and ... www.fotosearch.com/photos-images/etiquette.html http://www.albion.com/netiquette/rule1.htmlhttp://www.albion.com/netiquette/rule1.html http://mashable.com/2012/09/04/students-social-media-warnings/http://mashable.com/2012/09/04/students-social-media-warnings/ http://smallbusiness.findlaw.com/intellectual-property/fair-use-law.htmlhttp://smallbusiness.findlaw.com/intellectual-property/fair-use-law.html http://www.hamilton.edu/style/avoiding-plagiarismhttp://www.hamilton.edu/style/avoiding-plagiarism http://kidshealth.org/teen/safety/safebasics/internet_safety.html#http://kidshealth.org/teen/safety/safebasics/internet_safety.html# www.heacademy.ac.uk/.../82ResourceReview157to166.pdfwww.heacademy.ac.uk/.../82ResourceReview157to166.pdf http://www.safekids.com/kids-rules-for-online-safety/http://www.safekids.com/kids-rules-for-online-safety/ http://www.tdbank.com/bank/preventingidtheft_online.htmlhttp://www.tdbank.com/bank/preventingidtheft_online.html http://www.prweb.com/releases/2012/2/prweb9167933.htmhttp://www.prweb.com/releases/2012/2/prweb9167933.htm http://www.businessweek.com/stories/2008-04-30/do-reputation-management-http://www.businessweek.com/stories/2008-04-30/do-reputation-management-

services-work-businessweek-business-news-stock-market-and-financial-adviceservices-work-businessweek-business-news-stock-market-and-financial-advice http://kidshealth.org/parent/positive/talk/cyberbullying.htmlhttp://kidshealth.org/parent/positive/talk/cyberbullying.html http://www.ourfamilyworld.com/2011/11/30/how-to-prevent-cyberbullying/http://www.ourfamilyworld.com/2011/11/30/how-to-prevent-cyberbullying/ http://www.chicalogic.com/tips-tricks/what-is-the-difference-between-viruses-worms-http://www.chicalogic.com/tips-tricks/what-is-the-difference-between-viruses-worms-

and-trojan-horsesand-trojan-horses