Netquette on Social Media Do & Don’t List With all the talk of Twitter and Facebook and being careful of what you post on the internet, Social media Netiquette takes it one step further and talks about what you should and should not do on social medial websites. Social Media Netiquette Definition • Social Media Netiquette is the guidelines that govern behavior when communicating on the Internet. Netiquette covers not only rules of behavior during discussions but also guidelines that reflect the unique electronic nature of the medium. • The Social Media medium of communication consists of interactive and User Generated Content (UGC) delivered through the internet and its applications. The content is on public and semi-public domains with unique url's that facilitate one to one, one to many, and many to many communications. It is User Generated Content. User Generated Content is a cyber word that means social content. Social content is the content we create for our friends. Do’s of Netiquette on Social Media Be yourself, but only better. Blogs, discussion boards, forums, social networks and wikis are places where people interact on a one-to-one or one-to-many basis. Use appropriate language. Observe good grammar and spelling. Identify yourself. Begin message with a salutation and end them with your name Respect others privacy. Show information only to those who need to see it. Don’t List • Don’t post anything on LinkedIn, Facebook, Twitter, or other sites that shouldn’t be broadcast to the nation. Even with privacy settings, accounts can be hacked. • Avoid sarcasm. People who don’t know you may misinterpret its meaning. • Don’t approach social networking as a monologue. it should be engaging. • No Spam. Don’t contribute to worthless information on the internet by sending or responding to mass postings of chain letter, rumors, etc. Copyright & Fair Use Definitions of Key terms Copyright- A reproduction of an original work of art. Copyright is the legal term used to describe the rights a person has to control the use of their original works. By assuring that the original owner of a work can control legal control over it’s use, innovation and creativity is encouraged. Important Point-The exclusive right to make copies license, and otherwise exploit a literary, musical, or artistic work, whether printed, audio, video, etc., works granted such right by law on or after January 1,1978, are protected for the lifetime of the author or creator and for a period of 50 years after his or her death. Copyright & Fair Use • Photographs-Any picture produced in some specific way such as movies, film clips, excerpts from TV shows. • Poetry- A literary work produced in lyric or prose expressing feelings and ideas by the use of style and rhythm is intense. Differences in each of these terms • Copying of an educator’s multimedia project which contains materials used under fair use: Copyright & Fair Use • Print-According to the rule, the need to copy should be closely in time to the need to use the copies with the expectation of obtaining permission from the copyright holder. If something is used over a long period of time, it is not considered fair use. • Music,lyric, and music video-Up to 10% of the work but no more than 30 seconds of the music or lyrics from an individual music work. • Photographs-Illustrations or photographs: o No more than five images from one artist or photographer. o No more than 10% or 15 images, whichever is less, from a collection. Copyright & Fair Use • Poetry-Up to 10% of the total or 1,000 words, whichever is less. An entire poem of less than 250 words may be used, but no more than three poems by one poet or five poems by different authors. • Points to Remember- The fair use of copyrighted material in multimedia projects lasts for two years only. After two years, obtain permission before using the project again (Lehman, 1998, p. 53). • According to the text, “If the site clearly is copyrighted, request permission from owner. If the site has no copyright statement, reference the site by its URL and owner name.” Plaglarism • Stealing somebody's work or idea: the process of copying another person's idea or written work and claiming it as original. • Something plagiarized: a piece of written work or an idea that somebody has copied and claimed as his or her own. • Ways that technology helps teachers recognize and stop plagiarism: • Plagiarism prevention websites-http://turnitin.com and http://www.safeassign.com Plagiarism Ways to avoid plagiarism-One of the easiest and most effective means to avoid plagiarism is to properly document any source you use to compose a written work or project. Even if you have paraphrased an entire reference in your own words, you should still consider using quotation marks to encapsulate phrases or words that are also used verbatim in your chosen reference. Safety on the Internet • Staying safe on the internet is everyone’s job. • Children-Parents need to stay in close touch with their kids as they explore the Internet. • Teachers need to help students use the Internet appropriately and safely. • Kids and teens need to learn to take responsibility for their own behavior -- with guidance from their families and communities. • Teach children about some of the risks involved if they reveal their name, address, telephone number and/or email address online. Also print out some general rules for them to follow as they surf online. Safety on the Internet • Identity theft-The term “identity theft” refers to the illegal use of another’s identity through the theft and successive use of his or her personal information. • To prevent identity theft on the internet • Create passwords or PIN numbers out of a random mix of letters and numbers. • Doing so makes it harder for identity thieves to discover these codes, and makes it easier for you to prevent identity theft. • Be careful when giving out personal information. Safety on the Internet • Reputation Management-When doing business online, there is nothing more painful than to hear that a potential customer "Googled" your company or personal name and will not be doing business with you because of what they read online. • Protect your reputation: • Start by identifying the most likely places online for your name to come up. • Once you’ve identified the sites you want to monitor, set up alerts. Safety on the Internet • Protecting your Reputation • Identify the nature of the attack and act accordingly. • Insulate yourself against attacks and build a brand that reflects the professional you. • Cyber bullying-Cyber bullying is any harassment that occurs via the Internet. Vicious forum posts, name calling in chat rooms, posting fake profiles on web sites, and mean or cruel email messages are all ways of cyber bullying. Safety on the Internet • How to prevent internet cyber bullying- Encourage children not to use their real name, age, address, gender, or even provocative words while creating email accounts or passwords. • Do not use real photos, maybe pictures or images. • Make passwords using random numbers or letters. Ask your child to it private, not to write it down. • Stress that if an incident of Cyber bullying occurs, they must inform someone immediately. Safety on the Internet • Important Points about cyber bullying-Make sure that a clear definition is given for cyber bullying and make sure that the computer being used is in a public area where online sessions can be monitored. • Cyber-stalking-A crime in which the attacker harasses a victim using electronic communication such as email or instant messages. • Preventive Measures for cyber stalking: • Use email address with only trustworthy people. • When choosing an online name, make it different from real name. Safety on the Internet • Preventive measures for cyber stalking• Don’t put any identifying details on profiles. • Important Points-Should you become the victim of a cyber stalker, the most effective course of action is to report the offender to their Internet service provider. Should that option be impossible, or ineffective, the best thing to do is to change your own ISP and all your online names. Safety on your Computer • Viruses- Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operations. • Ways to prevent computer viruses: • Never open email attachments unless you know who it is from and you are expecting it. • To help avoid computer viruses, it's essential that you keep your computer current with the latest updates, antivirus software, recent threats, run your computer as a standard user, not administrator. Safety on your Computer • Phishing- The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. Phishing, also referred to as brand spoofing or carding, is a variation on "fishing," the idea being that bait is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting. Safety on your Computer • Preventive Measures for Phishing• Anti-phishing software • If you are entering personal information into a web form, verify that the website has a secure connection. This can be done easily by confirming that the prefix for the website is https:// as opposed to http://. • If an email seems suspicious, do not click on any links or download any attachments. If you need to visit any links, manually type them into your address bar, as many phishing emails contain misdirected hyperlinks. Safety on your Computer • Trojan Horses-Named after the Trojan Horse of ancient Greek history, it is a particular kind of network software application developed to stay hidden on the computer where it has been installed. Trojans generally serve malicious purposes. Trojans access personal information stored on home or business computers and then send it to a remote party via the Internet. Trojan tries to prevent various security applications . from working by renaming files belonging to security applications so that they can no longer load. It then attempts to block access to a range of security-related Websites by altering the Windows HOSTS file. Safety on the Internet • Trojan Horses Preventive Measures: • First, structure the user-accounts permissions on your computer so that accounts with full administrative rights are used rarely, and only to install or update software. For all other tasks, including Internet use and regular office work, use limited accounts that cannot modify applications. • Second, turn on whatever firewalls are available on your home network. • Third, install a robust anti-virus software product, and make sure you keep it constantly updated, and set it up to regularly perform automatic system scans Safety on the Internet • Worms-A computer program that copies itself to other computers across the internet is called a worm. Worms are often used to infect large numbers of broadband-connected computers with remote-control software. There are ways, however, of protecting your computer from such an attack. • Worms Preventive Measures: • A good anti-virus program can protect you to some extent, but it's not enough on its own as it's hard to keep it up to date. Many modern worms change hourly and it can take a day or more to create and distribute an anti-virus update Safety on your computer • Worms Preventive Measures: • You also need a firewall to help block the worm's communications, and you should always browse the web with restricted rights as a user never as an administrator. • Overall View of Digital Citizenship Project: • Digital citizenship as defined by Ribble and Bailey (2007)as the norm of behavior for technology use. Teachers as well as students need to learn the tools to become responsible citizens in a digital society. Reference List • Retrieved From: • http://zoesands.wordpress.com/2013/03/28/creatin g-a-social-media-policy-10-points-you-shouldinclude/ • http://blsciblogs.baruch.cuny.edu/bcam/2010/10/1 4/%E2%80%9Cnetiquette%E2%80%9D-socialnetworking-dos-and-don%E2%80%99ts/ • http://whttp://www.umuc.edu/library/libhow/copyr ight.cfmww.umuc.edu/library/libhow/copyright.cfm #copyright_definition Reference List • RetrievedFrom: • http://blsciblogs.baruch.cuny.edu/bcam/2010/10/1 4/%E2%80%9Cnetiquette%E2%80%9D-socialnetworking-dos-and-don%E2%80%99ts/ • http://www.bing.com/Dictionary/search?q=define+ plagiarism • http://www.identitytheft.com/article/id_theft • http://www.cbsnews.com/8301-505125_16251349621/how-to-protect-your-reputation-online/ • http://ezinearticles.com/?How-to-Prevent-CyberBullying&id=5433770 Reference List • http://searchsecurity.techtarget.com/definition/cy berstalking • http://www.microsoft.com/security/pcsecurity/virus-whatis.aspx • http://www.ehow.com/facts_5002935_whatphishing-protection-computer.html • http://computer.yourdictionary.com/trojan • www.bbc.co.uk/webwise/guides/internet-worms