2. NETIQUETTE ON SOCIAL MEDIA SITES Netiquette on social media
is defined as the social code ofusing social media. Most
individuals consider this the waypeople say what they would like to
say to their friends. It is a code that people communicate by. It
is not a politicallycorrect form of communication. Social media is
user generated content. Netiquette is the social code of the
internet.
3. DOS AND DONTS OF NETIQUETTE ONSOCIAL MEDIA SITESDOS of
Netiquette on SocialMedia Sites1. Share accurateinformation2.
Sharing is caring forothers3. Show love4. Respect privacy5. Place
everything inmoderation6. Correct your mistakes DONTS of Netiquette
onSocial Media Sites1. Dont lie2. Dont hate3. No cursing4. No
disrespect
4. COPYRIGHT AND FAIR USE Copyright- This is a legal concept,
enacted by most governments, givingthe creator of an original work
exclusive rights to it, usually for a limitedtime. Generally, it is
the right to copy, but also gives the copyright holderthe right to
be credited for the work, to determine who may adapt thework to
other forms, who may perform the work, who any financiallybenefit
from it, and other related rights. Fair Use-A legal principle that
provides certain limitations on theexclusive rights of copyright
holders. The purpose of these guidelines isto provide guidance on
the application of fair use principles byeducational institutions,
educators, scholars, and students who wish tocopy, perform, or
create a digital copy of a print musical score or record,copy, or
download a recorded performance or recorded song under fairuse
rather than by seeking authorization from the copyright owners
fornon-commercial educational purposes.
5. FAIR USE RULES FOR MEDIAPrint material: Up to 1,000 words or
10% of the work, whichever is less. Up to 250 words of a poem, and
only 3 poems per poet. If the text is longer than 10,000 words, you
may use up to 1,000 ofthe words. If the text is shorter than 10,000
words, you many use up to 10%of it.**As long as you or your teacher
will NOT post it on the Internet, therules are:1. You must cite
your source to give proper credit.2. You must follow the length
requirements
6. FAIR USE RULES FOR MEDIA CONT.Music: Must be legal (not
bootleg) copies of records, cassette tapes,CDs, or audio clips on
the web of iTunes Up to 30 seconds only, or 10% of the work,
whichever is less If an audio clip is longer than 5 minutes, you
may use up to 30seconds of it. If a video is shorter than 5
minutes, you can use up to 10% of it.**You must cite your source to
give proper credit.**You must follow the length rules.
7. FAIR USE RULES FOR MEDIA CONT.Video:Must be legal copies of
DVDs, multimedia encyclopedia clips,Quick Time movies, of video
clips from the Internet Up to 3 minutes only OR 10% of the work,
whichever is less. If a video is LONGER than 30 minutes, you may
use up to 3minutes of it. If a video is SHORTER than 30 minutes,
you can use up to10% of it.**You must cite your source to give
proper credit.**You must follow the length rules.
8. FAIR USE RULES FOR MEDIA CONT.Photographs: You may use
single graphics in their entirety. No more than 4 images by a
single artist or photographermay be used. If a graphic is from a
collection, you may use no more than15 images or 10% of the
collection, whichever is LESS.**You must cite your source to give
proper credit.**You must follow the requirements.
9. PLAGIARISMPlagiarism is the act of taking another persons
writing,conversation, song, or even idea and passing it off as
yourown. This includes information from web pages, books,
songs,television shows, email messages, interviews,
articles,artworks or any other medium.
10. PLAGIARISM CONT.Examples of Committing Plagiarism: Turning
in someone elses work as your own. Copying words or ideas from
someone else without givingcredit. Failing to put a quotation in
quotation marks. Giving incorrect information about the source of a
quotation. Changing words but copying the sentence structure of
asource without giving credit. Copying so many words or ideas from
a source that it makesup the majority of your world, whether you
give credit or not.
11. WAYS TO AVOID PLAGIARISMWhen using secondary sources in
papers, you can avoidplagiarism by knowing what must be
documented.Specific words or phrasesIf you use an authors specific
word or words, you must placethose words within quotation marks and
you must credit thesource.Information and IdeasEven if you use your
own words, if you obtained the information orideas you are
presenting from a source, you must document thesource.
12. WAYS TO AVOID PLAGIARISM CONT.Common KnowledgeYou do not
need to cite a source for material consideredcommon knowledge:
General common knowledge Field-specific common knowledge***When in
doubt, be cautious and cite the source. In the caseof both general
and field-specific common knowledge, if youuse the exact words of
the reference source, you must usequotation marks and credit the
source.
13. WAYS THAT TECHNOLOGY HELPSTEACHERS IDENTIFY
PLAGIARISMWebsites Available to Identify
Plagiarismwww.plagiarismdetection.orgwww.grammarly.comwww.turnitin.comwww.dustball.com/cs/plagiarism.checkerwww.copyscape.comwww.antiplagiarism.sf.netAlso
Available:Google Alerts
14. SAFETY ON THE INTERNETIdentity TheftComputers store all
kids of information about you and stores itin files hidden deep on
your hard drive. These files storeinformation like logins and
passwords, names addresses, andeven credit card numbers.A thief can
get this information either by grabbing it when it isbeing sent
over an unsecured transmission, or he can installmalicious software
on your computer that will collecteverything he needs and
automatically send it back to him.
15. SAFETY ON THE INTERNET CONT.Identity TheftThe best way to
protectyourself from identity theft isto secure your
webbrowser!!
16. SAFETY ON THE INTERNETReputation ManagementReputation
management is the practice of understanding orinfluencing an
individuals or businesss reputation.In order to ensure a safe
reputation on social media, individualsshould manage their social
media reputation.
17. SAFETY ON THE INTERNETTo manage your reputation on social
media, here is a guide tohelp ensure safety. Decide what you want
to track Set up accounts with free social media monitoring tools
Set up your alerts and searches Set up your own social media
accounts Engage-Act quickly, be nice, and be pro-active
18. SAFETY ON THE INTERNETPasswordsPasswords are an important
aspect of computer safety. Theyprovide protection for your online
user accounts. If someoneelse has your password, your electronic
life becomes availableto others.Your password gives others the
power to: Modify or destroy your files Send malicious e-mail in
your name Commit fraud while masquerading as you Use your computer
to illegally distribute things
19. SAFETY ON THE INTERNETHelpful Tips for Passwords Keep your
password private Change you password regularly Create a complex
passwordBy doing these things, you are providing a better
defenseagainst account intrusion.
20. SAFETY ON THE INTERNETCyberbullyingCyberbullying is when a
child, preteen or teen is tormented,threatened, harassed,
humiliated, embarrassed or otherwisetargeted by another child,
preteen or teen using the Internet,interactive and digital
technologies or mobile phones.It has to have a minor on both sides,
or at least have beeninstigated by a minor against another
minor.
21. SAFETY ON THE INTERNETCyberbullyingSteps to Preventing
Cyberbullying:1. Educate kids about what cyberbullying is2. Educate
kids about the consequences of cyberbullying(loosing online
accounts).3. Teach kids to respect others and take a stand
againstbullying of all kidsSchools and parents need to partner
together stopcyberbullying by educating the students on cyberethics
andlaws.
22. SAFETY ON THE INTERNETCyberstalkingCyberstalking is online
stalking. It is the use of technology,mainly the Internet, to
harass someone. Commoncharacteristics include false accusations,
monitoring, threats,identity theft, and destroying data.
Cyberstalking also includesexploitation of minors, be it sexual or
otherwise.Cyberstalking can damage many things. It can
destroyfriendships, credit, careers, self-image, and
confidence.
23. SAFETY ON THE INTERNETCyberstalkingAnti-Stalking Tips:
Maintain physical access to your computer and other Web-enabled
devices like cell phones Be sure to always log off your computer
Use good password management Use the privacy settings on your
computer Use good updated security software Teach your children to
never provide any personal informationon the computer Any
suspicions of cyberstalking should be reported
24. SAFETY ON THE INTERNETVIRUSESA virus can compromise your
personalinformation and even destroy your computercompletely.In
order to prevent viruses from attackingyour computer, there are
several things youcan do.
25. SAFETY ON THE INTERNETHow to Avoid Viruses on Your
Computer1. Install a reliable anti virus program.2. Install
anti-spyware and anti-malware programs3. Avoid suspicious
websites4. Never open email attachments without scanning them
first5. Set up automatic scans6. Watch your downloads7. Updates,
Updates, Updates8. Know what to look for9. Stay away from cracked
software10. Install a firewall11. Be prepared to lock down
26. SAFETY ON THE INTERNETPhishingPhishing scams are scams that
try to get valuable information fromindividuals.Things to do to
avoid phishing scams:1. Stay alert and be cautious with e-mail and
on Web sites2. Dont get scared by the content of e-mail3. Dont give
out information they should have4. Never use links in e-mail to get
to any page on the Web5. Make sure the Web site youre on is truly
secure6. Check your hosts file and your accounts regularly7. Keep
your software secure
27. SAFETY ON THE INTERNETTrojan HorsesTrojan horses are
harmful programs disguised ashelpful programs. They may be attached
to andhiding behind a legitimate program or be a programwho intent
is misrepresented. Trojans do not self-replicate, but can be used
to spread, activate, or hideother viruses.
28. SAFETY ON THE INTERNETWormsA worm is a stand-alone program
that does not needa host program to replicate and spread. It
typicallymodifies the operating system to become part of theboot
process and it can also write changes to theregistry. Worms can
travel and spread via networks.
29. SAFETY ON THE INTERNETThings to do to prevent Trojans and
Worms Install an antivirus software and keep it up-to-date Use
complex passwords Install and use a firewall Be a suspicious user
Be a cautious Internet surfer Be a conservative and informed
downloader Recognize the signs!!