Upload
brendan-scott
View
213
Download
0
Embed Size (px)
Citation preview
Digital Citizenship
Alisa Ward-AllenMs. Ray
Fall 1, 2011
PlagiarismThis is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered to be literary stealing.
How to avoid Plagiarism•Use Your own Ideas.•If you have to use someone else’s work, put it in quotations.•Always site the source of the work.•Use endnotes and footnotes.•In text citation•paraphrasing
“Turnitin is the leading academic plagiarism detector, utilized by teachers and students to avoid plagiarism and ensure academic integrity.”
How Technology Helps Recognize and Stop Plagiarism.
“"Identity theft" refers to crimes in which someone wrongfully obtains and uses another person's personal data (i.e., name, date of birth, social security number, driver's license number, and your financial identity— credit card, bank account and phone-card numbers) in some way that involves fraud or deception, typically for economic gain (to obtain money or goods/services). Criminals also use identity theft to fraudulently obtain identification cards, driver licenses, birth certificates, social security numbers, travel visas and other official government papers. “
Identity Theft
Safety on The Internet
Guard personal information ( such as social security number, birthdates, credit card number, etc)
Check your credit ratings often. Beware of fake business. If you have to use personal information, make
sure that the site has a lock. Invest in a safe Identity company such as lifelock. Beware of the marketing emails and never send
personal information via email because it has no security.
How to Avoid Identity Theft
It is very important that when creating a password that you do not use personal information such as your name or actual date of birth. A password should contain numbers as well as alphabets.
Passwords
Cyber bullying is just what is says. Bullying through cyber space. Many times bullying takes place through social networks, instant messaging and cell phones.
Cyberbullying
Many times cyberbullying happens to our children. They can avoid by not responding to threatful or hate email/messages. Parents need to encourage their child to report any type of inappropriate emails.
How to Avoid Cyberbullying
“Cyberstalking is the use of the internet or any other electronic means to stalk, harass an individual, a group of individuals, an organization, etc. Cyberstalking can be just like regular stalking, it is just done over the web”
Cyber Stalking
Reputation management is an online company that is used to protect your online reputation. It is a good service to protect business from a negative online reputation.
Reputation Management
Safety on Your Computer
A computer virus, according to Webster's Collegiate Dictionary, is "a computer program usually hidden within another seemingly innocuous program that produces copies of itself and inserts them into other programs or files, and that usually performs a malicious action (such as destroying data)".
Viruses
Computer viruses can come in several forms. One form is known as a macro viruses.
A macro virus attaches itself to files such as Microsoft word documents.
These types of viruses are becoming more common.
Worms are a type of virus. Worms are computer programs that
duplicate copies of files to other computers Worms does not usually attach themselves,
they just duplicate.
Worms
Phishing is an attack on an individual to obtain personal information. An attacker will usually create a fake website or email to ask personal questions.
Phishing
“Trojan horses are intended to replace existing files with malicious versions, whereas other Trojan horses add another application to a system without overwriting existing files. Trojan horses are often difficult to detect because they appear to be performing a useful function” .
Trojan Horses
Download software from its original data. Download a reputable virus software onto
the computer. Check free downloadable programs for
virus. Use good passwords.
How to Protect Your Computer From Viruses
Copyright and Fair Use
Copyright- give the originator legal rights to their print, music, videos, etc.
Fair Use-the ability to use copyrighted materials without permission for use such as critiquing copyrighted materials.
To use one’s work without copyright permission is illegal. A person who failed to obtain permission is subject to jail time. As where as fair use can be used without obtaining permission.
The Difference BetweenCopyright and Fair Use
Uses That Are Generally Fair Uses Subject to some general limitations discussed later in this article,
the following types of uses are usually deemed fair uses: Criticism and comment -- for example, quoting or excerpting a
work in a review or criticism for purposes of illustration or comment.
News reporting -- for example, summarizing an address or article, with brief quotations, in a news report.
Research and scholarship -- for example, quoting a short passage in a scholarly, scientific, or technical work for illustration or clarification of the author's observations.
Nonprofit educational uses -- for example, photocopying of limited portions of written works by teachers for classroom use.
Parody -- that is, a work that ridicules another, usually well-known, work by imitating it in a comic way.
In most other situations, copying is not legally a fair use. Without an author's permission, such a use violates the author's copyright.
Fair Use Rules
Social media site are used as an informal social network to social communication all over the world.
Social Media Sites
Facebook Twitter Linkedln My Space Ning Google Plus + Tagged Orkut Hi 5 My year book
List of Social Media Site( top 10)
http://www.plagiarism.org/ http://www.aresearchguide.com/6plagiar.html http://www.collegeboard.com/student/plan/college-success/10314.html http://www.indiana.edu/~wts/pamphlets/plagiarism.shtml https://www.writecheck.com/static/home.html https://turnitin.com/static/index.php www.parentfurther.com http://www.ou.edu/oupd/kidsafe/start.htm http://www.fraud.org/tips/internet/idtheftavoid.htm http://www.netsmartz.org/Parents http://www.reputationmanagements.com/ http://kb.iu.edu/data/aehm.html
References
http://www.newton.dep.anl.gov/teachers/compvir.htm http://fairuse.stanford.edu/Copyright_and_Fair_Use_Overview/chapter9/9-a.html
http://www.nolo.com/legal-encyclopedia/fair-use-rule-copyright-material-30100.html http://www.ebizmba.com/articles/social-networking-websites
“Reference continue”