witherspoon_Digitalcitizenship

advertisement
By: Candace Witherspoon
Social Media Netiquette
 “Netiquette” refers to etiquette on the Internet. Good
“netiquette” involves respecting others' privacy.
 There are three main areas where good “netiquette” is
highly stressed: e-mail, online chatting, and
newsgroups.
 It is also the correct or acceptable way of
communicating on the Internet.
Do’s & Do not’s of Social Media
• Do respond and react
• Do use social media
• Do use privacy settings
• Do not surf on your company’s time
• Do not display your personal life
• Do not connect with everyone
a legal device that provides the creator
of a work of art or literature, or a work that conveys
information or ideas, the right to control how the
work is used"(Fishman, 2008, p. 6).
is the most significant limitation on the
copyright holder's exclusive rights (United States
Copyright Office, 2010, para. 1).
Copy Right and Fair Use con.t
Copyright is the original piece of work, and Fair use
is a gray area that refers to the rights of copyright
holders which allows limited use of copyrighted
material, even without permission. However, there
are conditions in which fair use can be claimed are
not permanent depending upon certain factors.
United States Copyright Office. (2008). Copyright
basics. (Circular 1). Retrieved from
http://www.copyright.gov/circs/circ01.pdf
Fair Use Rules
 Media- No more than 5 images of an artist/photographer in




one program or printing. Copyright notice and attribution
required.
Print- Single copies for teacher for research, teaching, or
class preparation.
Video- May be copied for archival purposes or to replace,
lost damaged or stolen copies
Music- Single copy of up to 10% of a musical composition
in print, sound, or multimedia form may be performed and
displayed as part of an educator or student multimedia
program for educational purposes.
Photo- Older illustrations may be in the public domain,
but the collection may be copyrighted.
Safety on the “Net”
Identity Theft- is a crime in which one wrongfully gets and
uses another individual's personal information such as: bank
account information or credit card information.
Here are a few ways of preventing:
1. Always review monthly statements to check accuracy
2. Always check your credit reports
3. Always shred all personal information that comes in the
mail whether you use it or not
4. Secure your information on and offline
5. Never carry your social security card in your purse or wallet
Password Safety on the Internet
Technology is a huge factor in our society today, and almost
every program there is you have to login to there must be a
user name and password. Passwords are to be kept SAFE at
all times!!!
Password Safety Tips:
• Don’t reveal your password to anyone
• Don’t leave it laying around, if so keep it locked up
• Be very careful when using WIFI at public places
• Do reset your password frequently (n.d.). Retrieved from
http://antivirus.about.com/od/securitytips/a/passwordsafe
ty.htm
Cyber Bullying
Cyber bullying- is bullying through email, chat room exchanges, or digital. Cyber
bullying, like traditional bullying, involves an disparity of power, aggression, and a
negative action that is often repeated.
Types of Cyber Bullying
 Harassment: Repeatedly sending offensive, rude, and insulting messages
 Denigration: Distributing information about another that is derogatory and untrue
through posting it on a Web page, sending it to others through email or instant
messaging, or posting or sending digitally altered photos of someone
 Flaming: Online "fighting" using electronic messages with angry, vulgar language
 Impersonation: Breaking into an email or social networking account and using that
person's online identity to send or post vicious or embarrassing material to/about
others.
 Outing and Trickery: Sharing someone's secrets or embarrassing information, or
tricking someone into revealing secrets or embarrassing information and
forwarding it to others
 Cyber Stalking: Repeatedly sending messages that include threats of harm or are
highly intimidating, or engaging in other online activities that make a person afraid
for his or her safety.
(n.d.). Retrieved from http://olweus.org/public/cyber_bullying.page
Cyber Stalking
Safety tips on Cyber Stalking
 Be cautious of who you meet on-line
 Set all settings to private on social
networks
 DO NOT share personal information
 BLOCK any unwanted messengers
The Life of a Computer
 Computer viruses are created when a programmer creates
computer code that has the capability to replicate itself.
 To protect your home computer against computer viruses,
worms, and Trojans, you should invest in anti-virus
software.
 There are several signs to know that your computer has
been infected: new files appear out of no where, program
size changes, sometimes you will hear strange noises from
the computer or the keyboard, and a common sign is when
the computer takes longer than normal to load. (Shelly,
G.B, Cashman, T.J. & Vermatt, M. E. (2001). Discovering
computers 2002: Concepts for a digital world. Boston, MA:
Course Technology.)
Protecting Your Computer
 Anti-Virus software
 Continuously scan your computer
 Backup your files
 Be aware of unknown emails
 Be Alert!
Plagiarism
Plagiarism- is defined as copying another one’s work.
To avoid plagiarism you need to cite the original source
and paraphrase. Even when paraphrasing one must
still give credit to the source. Teachers are able to
recognize plagiarism by utilizing search engines such
as Article Checker.
Retrieved from(http://www.ehow.com/facts)
Works Cited
 Goodridge, E. (2009, may 01). Steps to prevent identity theft and how






to prevent it.
(Shelly, G.B, Cashman, T.J. & Vermatt, M. E. (2001). Discovering
computers 2002: Concepts for a digital world. Boston, MA: Course
Technology.)
United States Copyright Office. (2008). Copyright basics. (Circular 1).
Retrieved from http://www.copyright.gov/circs/circ01.pdf
United States Copyright Office. (2009). Reproduction of copyrighted
works by educators and librarians. (Circular 21). Retrieved from
http://www.copyright.gov/circs/circ21.pdf
United States Copyright Office. (2010). Fair use. (Circular FL-102).
Retrieved from http://www.copyright.gov/fls/fl102.html
http://www.westminstermo.edu/academics/resources/library/Pages/C
opyrightFairUse.aspx
Retrieved from
http://antivirus.about.com/od/securitytips/a/passwordsafety.htm
Download