29
DIGITAL CITIZENSHIP ED 505 Created By: Danielle McDaniel

Digital citizenship project

  • Upload
    fig2381

  • View
    84

  • Download
    0

Embed Size (px)

Citation preview

  1. 1. DIGITALCITIZENSHIPED 505Created By:Danielle McDaniel
  2. 2. NETIQUETTE ON SOCIAL MEDIA SITES Netiquette on social media is defined as the social code ofusing social media. Most individuals consider this the waypeople say what they would like to say to their friends. It is a code that people communicate by. It is not a politicallycorrect form of communication. Social media is user generated content. Netiquette is the social code of the internet.
  3. 3. DOS AND DONTS OF NETIQUETTE ONSOCIAL MEDIA SITESDOS of Netiquette on SocialMedia Sites1. Share accurateinformation2. Sharing is caring forothers3. Show love4. Respect privacy5. Place everything inmoderation6. Correct your mistakes DONTS of Netiquette onSocial Media Sites1. Dont lie2. Dont hate3. No cursing4. No disrespect
  4. 4. COPYRIGHT AND FAIR USE Copyright- This is a legal concept, enacted by most governments, givingthe creator of an original work exclusive rights to it, usually for a limitedtime. Generally, it is the right to copy, but also gives the copyright holderthe right to be credited for the work, to determine who may adapt thework to other forms, who may perform the work, who any financiallybenefit from it, and other related rights. Fair Use-A legal principle that provides certain limitations on theexclusive rights of copyright holders. The purpose of these guidelines isto provide guidance on the application of fair use principles byeducational institutions, educators, scholars, and students who wish tocopy, perform, or create a digital copy of a print musical score or record,copy, or download a recorded performance or recorded song under fairuse rather than by seeking authorization from the copyright owners fornon-commercial educational purposes.
  5. 5. FAIR USE RULES FOR MEDIAPrint material: Up to 1,000 words or 10% of the work, whichever is less. Up to 250 words of a poem, and only 3 poems per poet. If the text is longer than 10,000 words, you may use up to 1,000 ofthe words. If the text is shorter than 10,000 words, you many use up to 10%of it.**As long as you or your teacher will NOT post it on the Internet, therules are:1. You must cite your source to give proper credit.2. You must follow the length requirements
  6. 6. FAIR USE RULES FOR MEDIA CONT.Music: Must be legal (not bootleg) copies of records, cassette tapes,CDs, or audio clips on the web of iTunes Up to 30 seconds only, or 10% of the work, whichever is less If an audio clip is longer than 5 minutes, you may use up to 30seconds of it. If a video is shorter than 5 minutes, you can use up to 10% of it.**You must cite your source to give proper credit.**You must follow the length rules.
  7. 7. FAIR USE RULES FOR MEDIA CONT.Video:Must be legal copies of DVDs, multimedia encyclopedia clips,Quick Time movies, of video clips from the Internet Up to 3 minutes only OR 10% of the work, whichever is less. If a video is LONGER than 30 minutes, you may use up to 3minutes of it. If a video is SHORTER than 30 minutes, you can use up to10% of it.**You must cite your source to give proper credit.**You must follow the length rules.
  8. 8. FAIR USE RULES FOR MEDIA CONT.Photographs: You may use single graphics in their entirety. No more than 4 images by a single artist or photographermay be used. If a graphic is from a collection, you may use no more than15 images or 10% of the collection, whichever is LESS.**You must cite your source to give proper credit.**You must follow the requirements.
  9. 9. PLAGIARISMPlagiarism is the act of taking another persons writing,conversation, song, or even idea and passing it off as yourown. This includes information from web pages, books, songs,television shows, email messages, interviews, articles,artworks or any other medium.
  10. 10. PLAGIARISM CONT.Examples of Committing Plagiarism: Turning in someone elses work as your own. Copying words or ideas from someone else without givingcredit. Failing to put a quotation in quotation marks. Giving incorrect information about the source of a quotation. Changing words but copying the sentence structure of asource without giving credit. Copying so many words or ideas from a source that it makesup the majority of your world, whether you give credit or not.
  11. 11. WAYS TO AVOID PLAGIARISMWhen using secondary sources in papers, you can avoidplagiarism by knowing what must be documented.Specific words or phrasesIf you use an authors specific word or words, you must placethose words within quotation marks and you must credit thesource.Information and IdeasEven if you use your own words, if you obtained the information orideas you are presenting from a source, you must document thesource.
  12. 12. WAYS TO AVOID PLAGIARISM CONT.Common KnowledgeYou do not need to cite a source for material consideredcommon knowledge: General common knowledge Field-specific common knowledge***When in doubt, be cautious and cite the source. In the caseof both general and field-specific common knowledge, if youuse the exact words of the reference source, you must usequotation marks and credit the source.
  13. 13. WAYS THAT TECHNOLOGY HELPSTEACHERS IDENTIFY PLAGIARISMWebsites Available to Identify Plagiarismwww.plagiarismdetection.orgwww.grammarly.comwww.turnitin.comwww.dustball.com/cs/plagiarism.checkerwww.copyscape.comwww.antiplagiarism.sf.netAlso Available:Google Alerts
  14. 14. SAFETY ON THE INTERNETIdentity TheftComputers store all kids of information about you and stores itin files hidden deep on your hard drive. These files storeinformation like logins and passwords, names addresses, andeven credit card numbers.A thief can get this information either by grabbing it when it isbeing sent over an unsecured transmission, or he can installmalicious software on your computer that will collecteverything he needs and automatically send it back to him.
  15. 15. SAFETY ON THE INTERNET CONT.Identity TheftThe best way to protectyourself from identity theft isto secure your webbrowser!!
  16. 16. SAFETY ON THE INTERNETReputation ManagementReputation management is the practice of understanding orinfluencing an individuals or businesss reputation.In order to ensure a safe reputation on social media, individualsshould manage their social media reputation.
  17. 17. SAFETY ON THE INTERNETTo manage your reputation on social media, here is a guide tohelp ensure safety. Decide what you want to track Set up accounts with free social media monitoring tools Set up your alerts and searches Set up your own social media accounts Engage-Act quickly, be nice, and be pro-active
  18. 18. SAFETY ON THE INTERNETPasswordsPasswords are an important aspect of computer safety. Theyprovide protection for your online user accounts. If someoneelse has your password, your electronic life becomes availableto others.Your password gives others the power to: Modify or destroy your files Send malicious e-mail in your name Commit fraud while masquerading as you Use your computer to illegally distribute things
  19. 19. SAFETY ON THE INTERNETHelpful Tips for Passwords Keep your password private Change you password regularly Create a complex passwordBy doing these things, you are providing a better defenseagainst account intrusion.
  20. 20. SAFETY ON THE INTERNETCyberbullyingCyberbullying is when a child, preteen or teen is tormented,threatened, harassed, humiliated, embarrassed or otherwisetargeted by another child, preteen or teen using the Internet,interactive and digital technologies or mobile phones.It has to have a minor on both sides, or at least have beeninstigated by a minor against another minor.
  21. 21. SAFETY ON THE INTERNETCyberbullyingSteps to Preventing Cyberbullying:1. Educate kids about what cyberbullying is2. Educate kids about the consequences of cyberbullying(loosing online accounts).3. Teach kids to respect others and take a stand againstbullying of all kidsSchools and parents need to partner together stopcyberbullying by educating the students on cyberethics andlaws.
  22. 22. SAFETY ON THE INTERNETCyberstalkingCyberstalking is online stalking. It is the use of technology,mainly the Internet, to harass someone. Commoncharacteristics include false accusations, monitoring, threats,identity theft, and destroying data. Cyberstalking also includesexploitation of minors, be it sexual or otherwise.Cyberstalking can damage many things. It can destroyfriendships, credit, careers, self-image, and confidence.
  23. 23. SAFETY ON THE INTERNETCyberstalkingAnti-Stalking Tips: Maintain physical access to your computer and other Web-enabled devices like cell phones Be sure to always log off your computer Use good password management Use the privacy settings on your computer Use good updated security software Teach your children to never provide any personal informationon the computer Any suspicions of cyberstalking should be reported
  24. 24. SAFETY ON THE INTERNETVIRUSESA virus can compromise your personalinformation and even destroy your computercompletely.In order to prevent viruses from attackingyour computer, there are several things youcan do.
  25. 25. SAFETY ON THE INTERNETHow to Avoid Viruses on Your Computer1. Install a reliable anti virus program.2. Install anti-spyware and anti-malware programs3. Avoid suspicious websites4. Never open email attachments without scanning them first5. Set up automatic scans6. Watch your downloads7. Updates, Updates, Updates8. Know what to look for9. Stay away from cracked software10. Install a firewall11. Be prepared to lock down
  26. 26. SAFETY ON THE INTERNETPhishingPhishing scams are scams that try to get valuable information fromindividuals.Things to do to avoid phishing scams:1. Stay alert and be cautious with e-mail and on Web sites2. Dont get scared by the content of e-mail3. Dont give out information they should have4. Never use links in e-mail to get to any page on the Web5. Make sure the Web site youre on is truly secure6. Check your hosts file and your accounts regularly7. Keep your software secure
  27. 27. SAFETY ON THE INTERNETTrojan HorsesTrojan horses are harmful programs disguised ashelpful programs. They may be attached to andhiding behind a legitimate program or be a programwho intent is misrepresented. Trojans do not self-replicate, but can be used to spread, activate, or hideother viruses.
  28. 28. SAFETY ON THE INTERNETWormsA worm is a stand-alone program that does not needa host program to replicate and spread. It typicallymodifies the operating system to become part of theboot process and it can also write changes to theregistry. Worms can travel and spread via networks.
  29. 29. SAFETY ON THE INTERNETThings to do to prevent Trojans and Worms Install an antivirus software and keep it up-to-date Use complex passwords Install and use a firewall Be a suspicious user Be a cautious Internet surfer Be a conservative and informed downloader Recognize the signs!!