BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.
-
Upload
crystal-parrish -
Category
Documents
-
view
215 -
download
2
Transcript of BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.
![Page 1: BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.](https://reader030.fdocuments.us/reader030/viewer/2022032804/56649edc5503460f94bed380/html5/thumbnails/1.jpg)
BY CONTESSA RUSHING
ED 505
TECHNOLOGY AND EDUCATION
DIGITAL CITIZENSHIP
PROJECT
![Page 2: BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.](https://reader030.fdocuments.us/reader030/viewer/2022032804/56649edc5503460f94bed380/html5/thumbnails/2.jpg)
Network Etiquette – Set of Rules for Behaving Properly Online.
NETIQUETTE
![Page 3: BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.](https://reader030.fdocuments.us/reader030/viewer/2022032804/56649edc5503460f94bed380/html5/thumbnails/3.jpg)
Words communicate your meaning.Follow the same behavior online that you
follow in real life.Be ethical.Do not waste people’s time.
NETIQUETTE RULES
![Page 4: BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.](https://reader030.fdocuments.us/reader030/viewer/2022032804/56649edc5503460f94bed380/html5/thumbnails/4.jpg)
TEST YOUR NETIQUETTEhttp://www.albion.com/netiquette/netiquiz.html
![Page 5: BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.](https://reader030.fdocuments.us/reader030/viewer/2022032804/56649edc5503460f94bed380/html5/thumbnails/5.jpg)
Avoid typing in all caps
Avoid flamewars
Avoid spam
THINGS TO AVOID
![Page 6: BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.](https://reader030.fdocuments.us/reader030/viewer/2022032804/56649edc5503460f94bed380/html5/thumbnails/6.jpg)
Communicate clearly
Use appropriate language
Be brief
Forward email messages you receive
Remember you are not anonymous
Consider others
Obey copyright laws
Cite others’ work you use
Do not send spam
Do not forward chain letters
Important things to remember about netiquette
![Page 7: BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.](https://reader030.fdocuments.us/reader030/viewer/2022032804/56649edc5503460f94bed380/html5/thumbnails/7.jpg)
Section 107 of Copyright law (Title 17, U.S. Code) states
1. The purpose and character of the use, including whether such use is of commercial nature or is for non-profit educational purposes.
2. The nature of the copyrighted work.3. The amount of substantiality of the portion
used in relation to the copyrighted work as a whole.
4. The effect of the use upon the potential market for, or value of the copyrighted work.
Copyright and Fair Use
![Page 8: BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.](https://reader030.fdocuments.us/reader030/viewer/2022032804/56649edc5503460f94bed380/html5/thumbnails/8.jpg)
FAIR USE –
A limitation and exception to the exclusive right granted by copyright law to the author of creative work without acquiring permission from the rights holder.
Copyright and Fair Use
![Page 9: BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.](https://reader030.fdocuments.us/reader030/viewer/2022032804/56649edc5503460f94bed380/html5/thumbnails/9.jpg)
Copyright – a property right attached to an original work of art or literature. Wrongful use gives the owner the right to seek and recover compensation in a court of law.
Copyright
![Page 10: BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.](https://reader030.fdocuments.us/reader030/viewer/2022032804/56649edc5503460f94bed380/html5/thumbnails/10.jpg)
Chapter from a book.Article from a periodical or newspaper, short
story, essay or poem.Chart, graph, diagram, cartoon or picture from a
book, periodical or newspaper.Poetry – 250 words or less that exist on 2 pages
or less or 250 words from a longer poemCopies of an article, story or short essay 2500
words or less.Charts, graphs, diagrams, drawings, cartoons in
a book or periodical issue.
What counts as fair use:
![Page 11: BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.](https://reader030.fdocuments.us/reader030/viewer/2022032804/56649edc5503460f94bed380/html5/thumbnails/11.jpg)
Multiple copies of different works that could substitute for purchase of books, publishers, reprints or periodicals.
Copying and using the same work from semester to semester
Copying and using the same material for several different courses at the same or different institutions.
Copying more than 9 separate times in a single semester.
THINGS TO AVOID
![Page 12: BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.](https://reader030.fdocuments.us/reader030/viewer/2022032804/56649edc5503460f94bed380/html5/thumbnails/12.jpg)
PLAGIARISMMerriam-Webster Online
DictionarySteal and pass off ideas or
words of another as one’s own.
To use another’s production without crediting the source.
To commit literary theft.To present as new and
original an idea or product derived from an existing source.
![Page 13: BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.](https://reader030.fdocuments.us/reader030/viewer/2022032804/56649edc5503460f94bed380/html5/thumbnails/13.jpg)
Turning in someone’s work as your own.Copying words or ideas from someone without
giving credit.Failing to put quotation marks.Giving incorrect information about the source
of a quotation.Changing words by copying sentence structure
of a source without giving credit.Copying so many words or ideas from a source
it makes up the majority of your work whether you give credit or not.
Examples of plagiarism
![Page 14: BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.](https://reader030.fdocuments.us/reader030/viewer/2022032804/56649edc5503460f94bed380/html5/thumbnails/14.jpg)
SAFETY ON THE WEB
![Page 15: BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.](https://reader030.fdocuments.us/reader030/viewer/2022032804/56649edc5503460f94bed380/html5/thumbnails/15.jpg)
Great website for information about safety on the
web:
http://www.websafety4kids.org
EDUCATE
![Page 16: BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.](https://reader030.fdocuments.us/reader030/viewer/2022032804/56649edc5503460f94bed380/html5/thumbnails/16.jpg)
Do not give out personal informationStudents should inform teachers or parents of
any information they feel they do not understand or if it makes then feel uncomfortable.
Never meet someone face to face.Never send a photograph.Choose passwords that no one could guess.Have family meeting to set rules.Never give out password.Do not do anything that cost money without
parental permission.
SAFETY TIPS
![Page 17: BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.](https://reader030.fdocuments.us/reader030/viewer/2022032804/56649edc5503460f94bed380/html5/thumbnails/17.jpg)
CYBERBULLING
![Page 18: BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.](https://reader030.fdocuments.us/reader030/viewer/2022032804/56649edc5503460f94bed380/html5/thumbnails/18.jpg)
1 in 7 child internet users have receive unwanted messages
1 in 17 children reported being threatened or harassed while using the internet
Internet Statistics from the U.S. Department of Justice
![Page 19: BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.](https://reader030.fdocuments.us/reader030/viewer/2022032804/56649edc5503460f94bed380/html5/thumbnails/19.jpg)
WEBSITES FOR 5 TO 15 YEAR OLDS
![Page 20: BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.](https://reader030.fdocuments.us/reader030/viewer/2022032804/56649edc5503460f94bed380/html5/thumbnails/20.jpg)
www.whyville.comwww.clubpenguin.comwww.wizard101.com
![Page 21: BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.](https://reader030.fdocuments.us/reader030/viewer/2022032804/56649edc5503460f94bed380/html5/thumbnails/21.jpg)
Use antivirus software and keep it up-to-date.Install security patches.Use a firewall.Secure your browser.Take control of your email.Treat Instant Messages suspiciously.Keep abreast of internet scamsDon’t fall victim to virus hoaxes.
SAFETY ON YOUR COMPUTER
![Page 22: BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.](https://reader030.fdocuments.us/reader030/viewer/2022032804/56649edc5503460f94bed380/html5/thumbnails/22.jpg)
1. Don’t save your log on information.2. Don’t leave the computer unattended
with sensitive information on the screen.3. Erase your tracks.4. Watch for over the shoulder snoops.5. Do not enter sensitive information into a
public computer.
5 SAFETY TIPS FOR USING A PUBLIC COMPUTER
![Page 23: BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.](https://reader030.fdocuments.us/reader030/viewer/2022032804/56649edc5503460f94bed380/html5/thumbnails/23.jpg)
http://www.microsoft.comhttp://www.albion.com/netiquette/netiquiz.htmlhttp://www.albion.com/netiquettehttp://www.studygs.net/netiquette.htmhttp://www.copyright.gov/fls/f1102.htmlhttp://en.wikipedia.org/wiki.Fair_usehttp://home.earthlink.net/cnew/research.htmhttp://www.umuc.edu/library/copy.shtmlhttp://plagiarism.org/plag_article_what_is_plagiari
sm.htmlhttp://antivirus.about.com/od/securitytips/a/safetyt
rips.htmhttp://www.websafety4kids.org/
REFERENCES