Netquette on Social Media

advertisement
Netquette on Social Media
Do & Don’t List
With all the talk of Twitter and Facebook
and being careful of what you post on
the internet, Social media Netiquette
takes it one step further and talks about
what you should and should not do on
social medial websites.
Social Media Netiquette Definition
• Social Media Netiquette is the guidelines that govern
behavior when communicating on the Internet.
Netiquette covers not only rules of behavior during
discussions but also guidelines that reflect the unique
electronic nature of the medium.
• The Social Media medium of communication consists of
interactive and User Generated Content (UGC)
delivered through the internet and its applications. The
content is on public and semi-public domains with
unique url's that facilitate one to one, one to many, and
many to many communications. It is User Generated
Content. User Generated Content is a cyber word that
means social content. Social content is the content we
create for our friends.
Do’s of Netiquette on Social Media
 Be yourself, but only better. Blogs, discussion boards, forums,
social networks and wikis are places where people interact on
a one-to-one or one-to-many basis.
 Use appropriate language. Observe good grammar and
spelling.
 Identify yourself. Begin message with a salutation and end
them with your name
 Respect others privacy. Show information only to those who
need to see it.
Don’t List
• Don’t post anything on LinkedIn, Facebook, Twitter, or other
sites that shouldn’t be broadcast to the nation. Even with
privacy settings, accounts can be hacked.
• Avoid sarcasm. People who don’t know you may misinterpret
its meaning.
• Don’t approach social networking as a monologue. it should
be engaging.
• No Spam. Don’t contribute to worthless information on the
internet by sending or responding to mass postings of chain
letter, rumors, etc.
Copyright & Fair Use
Definitions of Key terms
 Copyright- A reproduction of an original work of art. Copyright
is the legal term used to describe the rights a person has to
control the use of their original works. By assuring that the
original owner of a work can control legal control over it’s use,
innovation and creativity is encouraged.
 Important Point-The exclusive right to make copies license,
and otherwise exploit a literary, musical, or artistic work,
whether printed, audio, video, etc., works granted such right
by law on or after January 1,1978, are protected for the
lifetime of the author or creator and for a period of 50 years
after his or her death.
Copyright & Fair Use
• Photographs-Any picture produced in some specific way such
as movies, film clips, excerpts from TV shows.
• Poetry- A literary work produced in lyric or prose expressing
feelings and ideas by the use of style and rhythm is intense.
Differences in each of these terms
• Copying of an educator’s multimedia project which contains
materials used under fair use:
Copyright & Fair Use
• Print-According to the rule, the need to copy should be
closely in time to the need to use the copies with the
expectation of obtaining permission from the copyright
holder. If something is used over a long period of time, it is not
considered fair use.
• Music,lyric, and music video-Up to 10% of the work but no
more than 30 seconds of the music or lyrics from an individual
music work.
• Photographs-Illustrations or photographs:
o No more than five images from one artist or photographer.
o No more than 10% or 15 images, whichever is less, from a
collection.
Copyright & Fair Use
• Poetry-Up to 10% of the total or 1,000 words, whichever is less.
An entire poem of less than 250 words may be used, but no
more than three poems by one poet or five poems by
different authors.
• Points to Remember- The fair use of copyrighted material in
multimedia projects lasts for two years only. After two years,
obtain permission before using the project again (Lehman,
1998, p. 53).
• According to the text, “If the site clearly is copyrighted,
request permission from owner. If the site has no copyright
statement, reference the site by its URL and owner name.”
Plaglarism
• Stealing somebody's work or idea: the process of copying
another person's idea or written work and claiming it as
original.
• Something plagiarized: a piece of written work or an idea that
somebody has copied and claimed as his or her own.
• Ways that technology helps teachers recognize and stop
plagiarism:
• Plagiarism prevention websites-http://turnitin.com and
http://www.safeassign.com
Plagiarism
 Ways to avoid plagiarism-One of the easiest and
most effective means to avoid plagiarism is to
properly document any source you use to compose
a written work or project.
 Even if you have paraphrased an entire reference
in your own words, you should still consider using
quotation marks to encapsulate phrases or words
that are also used verbatim in your chosen
reference.
Safety on the Internet
• Staying safe on the internet is everyone’s job.
• Children-Parents need to stay in close touch with
their kids as they explore the Internet.
• Teachers need to help students use the Internet
appropriately and safely.
• Kids and teens need to learn to take responsibility
for their own behavior -- with guidance from their
families and communities.
• Teach children about some of the risks involved if
they reveal their name, address, telephone number
and/or email address online. Also print out some
general rules for them to follow as they surf online.
Safety on the Internet
• Identity theft-The term “identity theft” refers to the
illegal use of another’s identity through the theft
and successive use of his or her personal
information.
• To prevent identity theft on the internet
• Create passwords or PIN numbers out of a random
mix of letters and numbers.
• Doing so makes it harder for identity thieves to
discover these codes, and makes it easier for you to
prevent identity theft.
• Be careful when giving out personal information.
Safety on the Internet
• Reputation Management-When doing business
online, there is nothing more painful than to hear
that a potential customer "Googled" your company
or personal name and will not be doing business
with you because of what they read online.
• Protect your reputation:
• Start by identifying the most likely places
online for your name to come up.
• Once you’ve identified the sites
you want to monitor, set up alerts.
Safety on the Internet
• Protecting your Reputation
• Identify the nature of the attack and act
accordingly.
• Insulate yourself against attacks and build a
brand that reflects the professional you.
• Cyber bullying-Cyber bullying is any harassment
that occurs via the Internet. Vicious forum posts,
name calling in chat rooms, posting fake profiles on
web sites, and mean or cruel email messages are all
ways of cyber bullying.
Safety on the Internet
• How to prevent internet cyber bullying- Encourage
children not to use their real name, age, address,
gender, or even provocative words while creating
email accounts or passwords.
• Do not use real photos, maybe pictures or images.
• Make passwords using random numbers or letters.
Ask your child to it private, not to write it down.
• Stress that if an incident of Cyber bullying occurs,
they must inform someone immediately.
Safety on the Internet
• Important Points about cyber bullying-Make sure
that a clear definition is given for cyber bullying and
make sure that the computer being used is in a
public area where online sessions can be
monitored.
• Cyber-stalking-A crime in which the attacker
harasses a victim using electronic communication
such as email or instant messages.
• Preventive Measures for cyber stalking:
• Use email address with only trustworthy people.
• When choosing an online name, make it different
from real name.
Safety on the Internet
• Preventive measures for cyber stalking• Don’t put any identifying details on profiles.
• Important Points-Should you become the victim of a
cyber stalker, the most effective course of action is
to report the offender to their Internet service
provider. Should that option be impossible, or
ineffective, the best thing to do is to change your
own ISP and all your online names.
Safety on your Computer
• Viruses- Computer viruses are small software
programs that are designed to spread from one
computer to another and to interfere with
computer operations.
• Ways to prevent computer viruses:
• Never open email attachments unless you know
who it is from and you are expecting it.
• To help avoid computer viruses, it's essential that
you keep your computer current with the latest
updates, antivirus software, recent threats, run your
computer as a standard user, not administrator.
Safety on your Computer
• Phishing- The act of sending an e-mail to a user
falsely claiming to be an established legitimate
enterprise in an attempt to scam the user into
surrendering private information that will be used for
identity theft. Phishing, also referred to as brand
spoofing or carding, is a variation on "fishing," the
idea being that bait is thrown out with the hopes
that while most will ignore the bait, some will be
tempted into biting.
Safety on your Computer
• Preventive Measures for Phishing• Anti-phishing software
• If you are entering personal information into a web
form, verify that the website has a secure
connection. This can be done easily by confirming
that the prefix for the website is https:// as opposed
to http://.
• If an email seems suspicious, do not click on any
links or download any attachments. If you need to
visit any links, manually type them into your address
bar, as many phishing emails contain misdirected
hyperlinks.
Safety on your Computer
• Trojan Horses-Named after the Trojan Horse of
ancient Greek history, it is a particular kind of
network software application developed to stay
hidden on the computer where it has been
installed. Trojans generally serve malicious purposes.
Trojans access personal information stored on home
or business computers and then send it to a remote
party via the Internet. Trojan tries to prevent various
security applications . from working by renaming
files belonging to security applications so that they
can no longer load. It then attempts to block
access to a range of security-related Websites by
altering the Windows HOSTS file.
Safety on the Internet
• Trojan Horses Preventive Measures:
• First, structure the user-accounts permissions on your
computer so that accounts with full administrative
rights are used rarely, and only to install or update
software. For all other tasks, including Internet use
and regular office work, use limited accounts that
cannot modify applications.
• Second, turn on whatever firewalls are available on
your home network.
• Third, install a robust anti-virus software product, and
make sure you keep it constantly updated, and set
it up to regularly perform automatic system scans
Safety on the Internet
• Worms-A computer program that copies itself to
other computers across the internet is called a
worm. Worms are often used to infect large
numbers of broadband-connected computers with
remote-control software. There are ways, however,
of protecting your computer from such an attack.
• Worms Preventive Measures:
• A good anti-virus program can protect you to some
extent, but it's not enough on its own as it's hard to
keep it up to date. Many modern worms change
hourly and it can take a day or more to create and
distribute an anti-virus update
Safety on your computer
• Worms Preventive Measures:
• You also need a firewall to help block the worm's
communications, and you should always browse
the web with restricted rights as a user never as an
administrator.
• Overall View of Digital Citizenship Project:
• Digital citizenship as defined by Ribble and Bailey
(2007)as the norm of behavior for technology use.
Teachers as well as students need to learn the tools
to become responsible citizens in a digital society.
Reference List
• Retrieved From:
• http://zoesands.wordpress.com/2013/03/28/creatin
g-a-social-media-policy-10-points-you-shouldinclude/
• http://blsciblogs.baruch.cuny.edu/bcam/2010/10/1
4/%E2%80%9Cnetiquette%E2%80%9D-socialnetworking-dos-and-don%E2%80%99ts/
• http://whttp://www.umuc.edu/library/libhow/copyr
ight.cfmww.umuc.edu/library/libhow/copyright.cfm
#copyright_definition
Reference List
• RetrievedFrom:
• http://blsciblogs.baruch.cuny.edu/bcam/2010/10/1
4/%E2%80%9Cnetiquette%E2%80%9D-socialnetworking-dos-and-don%E2%80%99ts/
• http://www.bing.com/Dictionary/search?q=define+
plagiarism
• http://www.identitytheft.com/article/id_theft
• http://www.cbsnews.com/8301-505125_16251349621/how-to-protect-your-reputation-online/
• http://ezinearticles.com/?How-to-Prevent-CyberBullying&id=5433770
Reference List
• http://searchsecurity.techtarget.com/definition/cy
berstalking
• http://www.microsoft.com/security/pcsecurity/virus-whatis.aspx
• http://www.ehow.com/facts_5002935_whatphishing-protection-computer.html
• http://computer.yourdictionary.com/trojan
• www.bbc.co.uk/webwise/guides/internet-worms
Download