Digital Citizenship Project Elle Wagner ED 505 Netiquette on Social Media Sites Netiquette: the actions that are socially and morally acceptable for an online or digital setting or situation Do Don’t Be professional Post illegal activity Share accurate information Bully others Respect Privacy Trash your teacher Show love Post confidential information Copyright : the exclusive right to make copies, license, and otherwise exploit a literary, musical, or artistic work, whether printed, audio, or video. • Law • These laws protect creators from other people claiming that the creators work is their own without paying for it. Fair Use: The condition under which you can use material that is copyrighted by someone else without paying royalties • • • • • • Law You do not have to ask permission to use someone else’s work when in certain circumstances Print: articles, chapters, or pages of text can be printed and copied. These do not replace text books or other teaching materials. • Poetry: Less than 250 words or an excerpt of not more than 250 words Music: Can copy sheet music (not more than 10% of the whole work) Video: must be discarded after 45 days Photographs: One copy is allowed to be made for each student. Note copyright. Plagiarism • What is it? Using someone else’s work as your own without citing it. • How do I avoid it? Use quotation marks when you use someone else’s words exactly. Cite the source that you gained your information from. • How can teachers stop plagiarism in student work? Teachers can use www.turnitin.com or www.grammarly.com/Plagiarism_Check when their students are turning in their work. These websites run plagiarism checks. Safety on the Internet Safety on the Internet Cont… Internet Safety Cont…. Cyberstalking: using any sort of communication device to stalk someone. • Do not share personal information in a public forum • Do not use your real name as a screen name or email address • Block users that you may suspect on your email or from viewing your Facebook • Contact local police in appropriate cases Safety on your computer • Viruses- a computer program that works like a virus, infecting your computer. – Prevent them by: • Have a virus scanning program • Do not open any files from unknown emails • Do not download from strangers • Phishing- a technique used to gain personal information – Prevent phishing by: • Look for misspelling of words or bad grammar • Be cautious when there is a strange URL – @ symbols in the URL – “O’s” that are replaced with zeros • Trojan Horse- similar to a virus; usually pretends to be ridding your computer of viruses – Prevent trojan horses by: • Do not open anything from an unknown source • Do not click on any unknown links • Worms- Similar to a virus; cause by security problems on the targeted computer – Prevent worms by: • • Have a security system installed Do not open unexpected email. Sources • Buck, S. (2012, September 4). 12 Things Students Should Never Do on Social Media. Retrieved September 5, 2012, from Mashable Lifestyle website: http://mashable.com/2012/09/04/ students-social-media-warnings/ • Social Media Netiquette. (n.d.). Retrieved September 5, 2012, from Netiquette website: http://www.networketiquette.net/socmed.htm • McWhinney, J. E. (2010, May 3). Identity Theft: How To Avoid It. Retrieved September 5, 2012, from Investopedia website: http://www.investopedia.com/articles/pf/05/051805.asp#axzz25e79pkO0 • Reputation Management. (n.d.). Retrieved September 5, 2012, from Wikipedia website: http://en.wikipedia.org/wiki/Reputation_management • Dicker, R. (2011, July 9). How to Create a Safe, Memorable Online Password. Retrieved September 5, 2012, from Daily Finance website: http://www.dailyfinance.com/2011/07/09/ how-to-create-a-safe-memorable-online-password/ • Aftab, P. (n.d.). Stop Cyberbullying: Prevention. Retrieved September 5, 2012, from Stop Byberbullying website: http://www.stopcyberbullying.org/tweens/take_5.html • CyberGuards. (2012). CyberStalking. Retrieved September 5, 2012, from CyberGuards website: http://www.cyberguards.com/CyberStalking.html • McAfee. (2012). Anti-Virus Tips. Retrieved September 5, 2012, from McAfee website: http://home.mcafee.com/virusinfo/anti-virustips?ctst=1 • Trojan Horse. (2012). Retrieved September 5, 2012, from Webopedia website: http://www.webopedia.com/ TERM/T/Trojan_horse.html • Kay, R. (2004, January 19). Quick Study: Phishing. Retrieved September 5, 2012, from ComputerWorld website: http://www.computerworld.com/s/article/89096/Phishing • Computer Worm. (n.d.). Retrieved September 5, 2012, from Wikipedia website: http://en.wikipedia.org/ wiki/Computer_worm#Protecting_against_dangerous_computer_worms Sources • Glassbergen, R. (2008, September 23). [Cartoon]. Retrieved September 5, 2012, from Linda's Computer Stop website: http://personal-computer-tutor.com/abc/humor.htm • Spielman, M. (n.d.). [Cartoon]. Retrieved September 5, 2012, from LSU.edu website: http://www.lsu.edu/departments/safety/2008campaign.shtml • Staford University Libraries. (2010). Copyright and Fair Use. Retrieved September 5, 2012, from SU Lair website: http://fairuse.stanford.edu/Copyright_and_Fair_Use_Overview/chapter7/7-b.html