digital citizen project by: frances murphey technology and education
TRANSCRIPT
Digital Citizen ProjectBy: Frances Murphey
Technology and Education
Netiquette on Social Media Sites
Netiquette is the etiquette rules for behavior when communicating on the internet.
Netiquette should be used in emails, blogs, twitter, facebook, websites and presentations.
Netiquette Do’s
Use appropriate language
Respect others privacy
Use appropriate emotions
Include a subject line
Netiquette Don’ts Do not reply to or
forward spam Do not use sarcasm Do not use
“screaming” sentences typed in all caps.
Do not copy everyone on each message
Copyright & Fair Use Copyright – a legal concept enforced by
the government that gives the person who came up with the work rights to it. Gives the creator the right to be credited for their work.
Fair Use – a copyright principle that believes the public is entitled to use pieces of the copyrighted materials for comments and criticism.
Differences Copyright gives
rights to the person that created the work.
Fair use allows the public to use pieces of the copyrighted material for criticism and comments.
Fair Use Rules for Media Are you creating something new or just
copying? Are you competing with the source you’re
copying from? Giving the author credit does not get you
off the hook The more you take, the less fair your use
is likely to be The quality of the material used is as
important as the quantity
Plagiarism Using or writing materials that are
closely imitating the written words and thoughts of another creator without permission and without giving them credit.
Pretending like the work is your own
How to Avoid Plagiarism Cite your sources
Give credit to the original author
Get ideas from other sources but come up with your own ideas.
Ways Teachers Recognize & Stop Plagiarism
Websites are available to teachers that check for plagiarism
Teachers need to teach students about plagiarism & explain to them the repercussions. What is and is not allowed
Safety on the Internet Identity theft Reputation management Passwords Cyberbullying Cyberstalking
Identity Theft Stealing a
person’s identity The thief can
pretend to be you Can steal name,
identification numbers or credit card numbers
Prevent Identity Theft Do not identify
yourself unnecessarily
Use strong passwords
Watch your finances
Never give out social security number
Reputation ManagementMonitoring the reputation of a
person, business or brandFocuses on getting rid of
negative search results
Passwords First line of defense against cyber
criminals Secret word or characters use to get
access approval Pick strong passwords with letters and
numbers Use different passwords for different
accounts
CyberstalkingCriminal offense in all 50 States
Using the internet to stalk or harass a person, group of people or organization
Making false accusations, soliciting minors for sex, monitoring, and making threats
Cyberbullying Using technology
and the internet to deliberate way
Many states have laws for cyberbullying
Safety on your Computer Viruses Phishing Trojan horses worms
Viruses Computer program
that can replicate itself and spread from one computer to another
Cause a lot of damage
Prevention: turn on firewalls & keep computer up to date
Trojan horse Computer
program that claims to do one thing but does damage instead
Phishing Trying to get
information such as passwords, usernames & credit cards
Things to look for: spelling and bad
grammar links in emails threat (Ex:
account will be closed if…)
Spoofing popular websites
Worms Malicious software
that spreads through networks by computers
Do not open an email attachment or message that contains executable scripts
Works Cited Copyright.(n.d.). In Wikipedia.Retrieved
February 3, 2013, from http://en.wikipedia.org/wiki/Copyright.
Cyberbullying.(n.d.). In Wikipedia.Retrieved February 3, 2013, from http://en.wikipedia.org/wiki/Cyber_bullying.
QuickStudy: Phishing.(January 19, 2004).Retrieved February 3, 2013, from http://www.computerworld.com/s/article/89096/Phishing