Digital Citizen Project By: Frances Murphey Technology and Education.

Post on 21-Jan-2016

216 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

Transcript

Digital Citizen ProjectBy: Frances Murphey

Technology and Education

Netiquette on Social Media Sites

Netiquette is the etiquette rules for behavior when communicating on the internet.

Netiquette should be used in emails, blogs, twitter, facebook, websites and presentations.

Netiquette Do’s

Use appropriate language

Respect others privacy

Use appropriate emotions

Include a subject line

Netiquette Don’ts Do not reply to or

forward spam Do not use sarcasm Do not use

“screaming” sentences typed in all caps.

Do not copy everyone on each message

Copyright & Fair Use Copyright – a legal concept enforced by

the government that gives the person who came up with the work rights to it. Gives the creator the right to be credited for their work.

Fair Use – a copyright principle that believes the public is entitled to use pieces of the copyrighted materials for comments and criticism.

Differences Copyright gives

rights to the person that created the work.

Fair use allows the public to use pieces of the copyrighted material for criticism and comments.

Fair Use Rules for Media Are you creating something new or just

copying? Are you competing with the source you’re

copying from? Giving the author credit does not get you

off the hook The more you take, the less fair your use

is likely to be The quality of the material used is as

important as the quantity

Plagiarism Using or writing materials that are

closely imitating the written words and thoughts of another creator without permission and without giving them credit.

Pretending like the work is your own

How to Avoid Plagiarism Cite your sources

Give credit to the original author

Get ideas from other sources but come up with your own ideas.

Ways Teachers Recognize & Stop Plagiarism

Websites are available to teachers that check for plagiarism

Teachers need to teach students about plagiarism & explain to them the repercussions. What is and is not allowed

Safety on the Internet Identity theft Reputation management Passwords Cyberbullying Cyberstalking

Identity Theft Stealing a

person’s identity The thief can

pretend to be you Can steal name,

identification numbers or credit card numbers

Prevent Identity Theft Do not identify

yourself unnecessarily

Use strong passwords

Watch your finances

Never give out social security number

Reputation ManagementMonitoring the reputation of a

person, business or brandFocuses on getting rid of

negative search results

Passwords First line of defense against cyber

criminals Secret word or characters use to get

access approval Pick strong passwords with letters and

numbers Use different passwords for different

accounts

CyberstalkingCriminal offense in all 50 States

Using the internet to stalk or harass a person, group of people or organization

Making false accusations, soliciting minors for sex, monitoring, and making threats

Cyberbullying Using technology

and the internet to deliberate way

Many states have laws for cyberbullying

Safety on your Computer Viruses Phishing Trojan horses worms

Viruses Computer program

that can replicate itself and spread from one computer to another

Cause a lot of damage

Prevention: turn on firewalls & keep computer up to date

Trojan horse Computer

program that claims to do one thing but does damage instead

Phishing Trying to get

information such as passwords, usernames & credit cards

Things to look for: spelling and bad

grammar links in emails threat (Ex:

account will be closed if…)

Spoofing popular websites

Worms Malicious software

that spreads through networks by computers

Do not open an email attachment or message that contains executable scripts

Works Cited Copyright.(n.d.). In Wikipedia.Retrieved

February 3, 2013, from http://en.wikipedia.org/wiki/Copyright.

Cyberbullying.(n.d.). In Wikipedia.Retrieved February 3, 2013, from http://en.wikipedia.org/wiki/Cyber_bullying.

QuickStudy: Phishing.(January 19, 2004).Retrieved February 3, 2013, from http://www.computerworld.com/s/article/89096/Phishing

top related