Upload
everett-watkins
View
218
Download
0
Tags:
Embed Size (px)
Citation preview
Digital Digital CitizenshipCitizenship
TopicsTopics
NetiquetteNetiquette Copyright and Fair UseCopyright and Fair Use PlagiarismPlagiarism Safety on the InternetSafety on the Internet Safety on your ComputerSafety on your Computer
Netiquette-Netiquette- Etiquette guidelines for posting Etiquette guidelines for posting messages to in-line services especially in e-mail.messages to in-line services especially in e-mail.
Do’sDo’s
Identify YourselfIdentify Yourself
Include a subject lineInclude a subject line
Respect others PrivacyRespect others Privacy
Copy with CautionCopy with Caution
Use appropriate language.Use appropriate language.
Don’tsDon’ts
Avoid SarcasmAvoid Sarcasm
No SpamNo Spam
Avoid FlamingAvoid Flaming
Avoid bad LanguageAvoid bad Language
(Educational Technology into Teaching, p.428)
Copyright and Fair UseCopyright and Fair Use
Copyright- Copyright- Exclusive rights granted to the Exclusive rights granted to the author or creator of an original work, including author or creator of an original work, including the right to copy, distribute, and adapt the workthe right to copy, distribute, and adapt the work ..
Fair Use- Fair Use- A doctrine in the U.S copyright law A doctrine in the U.S copyright law that allows limited use of copyrighted material that allows limited use of copyrighted material without acquiring permission from the rights without acquiring permission from the rights holder.holder.
Copyright and Fair Use Copyright and Fair Use continued…continued…
DifferencesDifferences A copyright is owned by the author/creator A copyright is owned by the author/creator
and as such they have limitless rights to and as such they have limitless rights to their work. their work.
Fair use allows for limited use of material Fair use allows for limited use of material that is protected by a copyright. Fair use that is protected by a copyright. Fair use
PlagiarismPlagiarism
The unauthorized use or close The unauthorized use or close imitation of the language and imitation of the language and thoughts of another author and the thoughts of another author and the representation of them as one’s own representation of them as one’s own original work, as by not crediting the original work, as by not crediting the author.author.
Dictionary.com
Ways to Avoid PlagiarismWays to Avoid Plagiarism
Avoid by giving credit when Avoid by giving credit when you use:you use: Another person’s idea or opinionAnother person’s idea or opinion Any facts, statistics, graphs, or Any facts, statistics, graphs, or
drawingsdrawings Quotations of another person’s Quotations of another person’s
actual spoken or written wordsactual spoken or written words Paraphrase of another person’s Paraphrase of another person’s
spoken or written words.spoken or written words.
Indiana.edu/writingtutorialservices
Plagiarism and Plagiarism and technologytechnology
Online sites such as turnitin.com, Online sites such as turnitin.com, grammarly.com,and plagiarism.net allow grammarly.com,and plagiarism.net allow teachers to check for plagiarism quickly teachers to check for plagiarism quickly and efficiently.and efficiently.
Safety on the InternetSafety on the Internet
Identity theftIdentity theft Reputation Reputation
managementmanagement PasswordsPasswords CyberbullyingCyberbullying CyberstalkingCyberstalking
Safety on the InternetSafety on the InternetIdentity TheftIdentity Theft
Ways to PreventWays to Prevent Don’t give out personal information over e-mail.Don’t give out personal information over e-mail. Don’t use passwords on public computers.Don’t use passwords on public computers. Don’t open e-mail from unknown source.Don’t open e-mail from unknown source.
Safety on the InternetSafety on the InternetReputation ManagementReputation Management A feedback loop that A feedback loop that
allows people on allows people on both ends of a both ends of a transaction to voice transaction to voice opinions and raise opinions and raise concerns about concerns about quality. quality.
wikipedia.com
Safety on the InternetSafety on the InternetPasswordsPasswords
Ways to avoid stolen PasswordsWays to avoid stolen Passwords Never give passwords outNever give passwords out Don’t create passwords based on personal Don’t create passwords based on personal
informationinformation Never provide passwords over e-mailNever provide passwords over e-mail Do not use passwords on public computersDo not use passwords on public computers Do not use same password for every Do not use same password for every
accountaccount
Safety on the InternetSafety on the Internet
CyberbullyingCyberbullying Use of the internet Use of the internet
and related and related technology to harm technology to harm other people, in a other people, in a deliberate, repeated, deliberate, repeated, and hostile mannerand hostile manner
CyberstalkingCyberstalking Use of the internet Use of the internet
and related and related technology to stalk or technology to stalk or harass an individual, harass an individual, a group of a group of individuals, or an individuals, or an organization.organization.
To avoid cyberbullying and cyberstalking extra measures must be taken to protect one’s self. For example, do not accept friend requests from anyone you do not know personally.
.Wikipedia.com
Safety on your Safety on your ComputerComputer
VirusesViruses
PhishingPhishing
Trojan HorsesTrojan Horses
WormsWorms
Viruses-Viruses- A computer program that A computer program that can replicate itself and spread from can replicate itself and spread from one computer to another.one computer to another.
PreventionPrevention Antivirus softwareAntivirus software
Wikipedia.com
Phishing-Phishing- A way of attempting to acquire sensitive A way of attempting to acquire sensitive information such as user names, passwords, and credit information such as user names, passwords, and credit card details by masquerading as a trustworthy entity in card details by masquerading as a trustworthy entity in an electronic communication.an electronic communication.
PreventionPrevention Guard against spamGuard against spam Communicate personal information via Communicate personal information via
phonephone Never e-mail personal informationNever e-mail personal information Protect your computer with firewall and Protect your computer with firewall and
antispam.antispam.
Wikipedia.com
Trojan Horse- Trojan Horse- Destructive Destructive program that masquerades as an program that masquerades as an application.application.
PreventionPrevention Never execute programs unless they are Never execute programs unless they are
form a trusted source.form a trusted source. Never open e-mail attachments from Never open e-mail attachments from
unknown source unknown source Update security software regularlyUpdate security software regularly Beware of homemade cd’s.Beware of homemade cd’s.
Wikipedia.com
WormWorm-- Self replicating malware computer Self replicating malware computer program which uses a computer network to program which uses a computer network to send copies of itself to other nodes and it send copies of itself to other nodes and it may do so without any user intervention.may do so without any user intervention.
PreventionPrevention Use of firewallUse of firewall Use of antivirusUse of antivirus Use of antispywareUse of antispyware
Wikipedia.com
ReferencesReferences
The American Heritage® Dictionary of the English The American Heritage® Dictionary of the English Language, Fourth EditionLanguage, Fourth Edition. Retrieved August 29, 2011, from . Retrieved August 29, 2011, from http://dictionary.reference.com/http://dictionary.reference.com/
Indiana University.(2011).retrieved August 28, 2011,Indiana University.(2011).retrieved August 28, 2011,from from http://www.indiana.edu/~wts/pamphlets/plagiarism.shtmlhttp://www.indiana.edu/~wts/pamphlets/plagiarism.shtml
Doering, A. H. & Roblyer, M. D. (2007). Doering, A. H. & Roblyer, M. D. (2007). Intergrating educational Intergrating educational technology into teaching, Fifth edition. technology into teaching, Fifth edition. Boston: Allyn & Bacon.Boston: Allyn & Bacon.
In Wikipedia, The Free Encyclopedia. Retrieved,August 28, 2011, In Wikipedia, The Free Encyclopedia. Retrieved,August 28, 2011, from http://www.wikipedia.org/from http://www.wikipedia.org/
THE ENDTHE END