27
Digital Citizenship Alisa Ward-Allen Ms. Ray Fall 1, 2011

Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered

Embed Size (px)

Citation preview

Page 1: Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered

Digital Citizenship

Alisa Ward-AllenMs. Ray

Fall 1, 2011

Page 2: Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered

PlagiarismThis is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered to be literary stealing.

Page 3: Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered

How to avoid Plagiarism•Use Your own Ideas.•If you have to use someone else’s work, put it in quotations.•Always site the source of the work.•Use endnotes and footnotes.•In text citation•paraphrasing

Page 4: Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered

“Turnitin is the leading academic plagiarism detector, utilized by teachers and students to avoid plagiarism and ensure academic integrity.”

How Technology Helps Recognize and Stop Plagiarism.

Page 5: Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered

“"Identity theft" refers to crimes in which someone wrongfully obtains and uses another person's personal data (i.e., name, date of birth, social security number, driver's license number, and your financial identity— credit card, bank account and phone-card numbers) in some way that involves fraud or deception, typically for economic gain (to obtain money or goods/services). Criminals also use identity theft to fraudulently obtain identification cards, driver licenses, birth certificates, social security numbers, travel visas and other official government papers. “

Identity Theft

Page 6: Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered

Safety on The Internet

Page 7: Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered

Guard personal information ( such as social security number, birthdates, credit card number, etc)

Check your credit ratings often. Beware of fake business. If you have to use personal information, make

sure that the site has a lock. Invest in a safe Identity company such as lifelock. Beware of the marketing emails and never send

personal information via email because it has no security.

How to Avoid Identity Theft

Page 8: Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered

It is very important that when creating a password that you do not use personal information such as your name or actual date of birth. A password should contain numbers as well as alphabets.

Passwords

Page 9: Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered

Cyber bullying is just what is says. Bullying through cyber space. Many times bullying takes place through social networks, instant messaging and cell phones.

Cyberbullying

Page 10: Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered

Many times cyberbullying happens to our children. They can avoid by not responding to threatful or hate email/messages. Parents need to encourage their child to report any type of inappropriate emails.

How to Avoid Cyberbullying

Page 11: Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered

“Cyberstalking is the use of the internet or any other electronic means to stalk, harass an individual, a group of individuals, an organization, etc. Cyberstalking can be just like regular stalking, it is just done over the web”

Cyber Stalking

Page 12: Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered

Reputation management is an online company that is used to protect your online reputation. It is a good service to protect business from a negative online reputation.

Reputation Management

Page 13: Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered

Safety on Your Computer

Page 14: Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered

A computer virus, according to Webster's Collegiate Dictionary, is "a computer program usually hidden within another seemingly innocuous program that produces copies of itself and inserts them into other programs or files, and that usually performs a malicious action (such as destroying data)".

Viruses

Page 15: Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered

Computer viruses can come in several forms. One form is known as a macro viruses.

A macro virus attaches itself to files such as Microsoft word documents.

These types of viruses are becoming more common.

Page 16: Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered

Worms are a type of virus. Worms are computer programs that

duplicate copies of files to other computers Worms does not usually attach themselves,

they just duplicate.

Worms

Page 17: Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered

Phishing is an attack on an individual to obtain personal information. An attacker will usually create a fake website or email to ask personal questions.

Phishing

Page 18: Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered

“Trojan horses are intended to replace existing files with malicious versions, whereas other Trojan horses add another application to a system without overwriting existing files. Trojan horses are often difficult to detect because they appear to be performing a useful function” .

Trojan Horses

Page 19: Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered

Download software from its original data. Download a reputable virus software onto

the computer. Check free downloadable programs for

virus. Use good passwords.

How to Protect Your Computer From Viruses

Page 20: Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered

Copyright and Fair Use

Page 21: Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered

Copyright- give the originator legal rights to their print, music, videos, etc.

Fair Use-the ability to use copyrighted materials without permission for use such as critiquing copyrighted materials.

Page 22: Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered

To use one’s work without copyright permission is illegal. A person who failed to obtain permission is subject to jail time. As where as fair use can be used without obtaining permission.

The Difference BetweenCopyright and Fair Use

Page 23: Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered

Uses That Are Generally Fair Uses Subject to some general limitations discussed later in this article,

the following types of uses are usually deemed fair uses: Criticism and comment -- for example, quoting or excerpting a

work in a review or criticism for purposes of illustration or comment.

News reporting -- for example, summarizing an address or article, with brief quotations, in a news report.

Research and scholarship -- for example, quoting a short passage in a scholarly, scientific, or technical work for illustration or clarification of the author's observations.

Nonprofit educational uses -- for example, photocopying of limited portions of written works by teachers for classroom use.

Parody -- that is, a work that ridicules another, usually well-known, work by imitating it in a comic way.

In most other situations, copying is not legally a fair use. Without an author's permission, such a use violates the author's copyright.

Fair Use Rules

Page 24: Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered

Social media site are used as an informal social network to social communication all over the world.

Social Media Sites

Page 25: Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered

Facebook Twitter Linkedln My Space Ning Google Plus + Tagged Orkut Hi 5 My year book

List of Social Media Site( top 10)

Page 26: Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered

http://www.plagiarism.org/ http://www.aresearchguide.com/6plagiar.html http://www.collegeboard.com/student/plan/college-success/10314.html http://www.indiana.edu/~wts/pamphlets/plagiarism.shtml https://www.writecheck.com/static/home.html https://turnitin.com/static/index.php www.parentfurther.com http://www.ou.edu/oupd/kidsafe/start.htm http://www.fraud.org/tips/internet/idtheftavoid.htm http://www.netsmartz.org/Parents http://www.reputationmanagements.com/ http://kb.iu.edu/data/aehm.html

References