By: Valerie C. Burrell ED 505 “There is eating etiquette, dating etiquette, phone etiquette and...

10
By: Valerie C. Burrell By: Valerie C. Burrell ED 505 ED 505 There is eating etiquette, dating etiquette, phone etiquette and There is eating etiquette, dating etiquette, phone etiquette and even golf etiquette. In recent years, a new kind of etiquette even golf etiquette. In recent years, a new kind of etiquette guides online social rules. It’s called Internet etiquette, or guides online social rules. It’s called Internet etiquette, or ‘netiquette’. ‘netiquette’. Just as it is wise to learn the social norms before traveling to Just as it is wise to learn the social norms before traveling to another country, it is also a good idea to learn the underlying another country, it is also a good idea to learn the underlying social rules of cyberspace before embarking on your journey social rules of cyberspace before embarking on your journey through the World Wide Web.” through the World Wide Web.” Shea, Virginia. The core rules of netiquette. Retrieved July 8, 2011, from Netiquette Web site: Shea, Virginia. The core rules of netiquette. Retrieved July 8, 2011, from Netiquette Web site: http://www.albion.com/netiquette/corerules.html http://www.albion.com/netiquette/corerules.html (title image from www.bing.com/images) (title image from www.bing.com/images)

description

If you like visuals, see this one that summarizes the basics of Netiquette: Courtesy of

Transcript of By: Valerie C. Burrell ED 505 “There is eating etiquette, dating etiquette, phone etiquette and...

Page 1: By: Valerie C. Burrell ED 505 “There is eating etiquette, dating etiquette, phone etiquette and even golf etiquette. In recent years, a new kind of etiquette.

By: Valerie C. Burrell ED 505By: Valerie C. Burrell ED 505

““There is eating etiquette, dating etiquette, phone etiquette and even golf etiquette. There is eating etiquette, dating etiquette, phone etiquette and even golf etiquette. In recent years, a new kind of etiquette guides online social rules. It’s called Internet In recent years, a new kind of etiquette guides online social rules. It’s called Internet

etiquette, or ‘netiquette’. etiquette, or ‘netiquette’. Just as it is wise to learn the social norms before traveling to another country, it is Just as it is wise to learn the social norms before traveling to another country, it is

also a good idea to learn the underlying social rules of cyberspace before also a good idea to learn the underlying social rules of cyberspace before embarking on your journey through the World Wide Web.” embarking on your journey through the World Wide Web.”

Shea, Virginia. The core rules of netiquette. Retrieved July 8, 2011, from Netiquette Web site: Shea, Virginia. The core rules of netiquette. Retrieved July 8, 2011, from Netiquette Web site:

http://www.albion.com/netiquette/corerules.htmlhttp://www.albion.com/netiquette/corerules.html (title image from www.bing.com/images)(title image from www.bing.com/images)

Page 2: By: Valerie C. Burrell ED 505 “There is eating etiquette, dating etiquette, phone etiquette and even golf etiquette. In recent years, a new kind of etiquette.

Netiquette is a term derived from the words "Internet Etiquette” or Netiquette is a term derived from the words "Internet Etiquette” or “Network Etiquette" which describes the use of proper manners and “Network Etiquette" which describes the use of proper manners and behavior online. Internet Etiquette should be used in all areas of behavior online. Internet Etiquette should be used in all areas of electronic means including email, chatting, blogging, forums, message electronic means including email, chatting, blogging, forums, message boards, and so on.boards, and so on.

First, check out this great First, check out this great CBS NewsCBS News video all about Netiquette!video all about Netiquette!

http://http://www.cbsnews.comwww.cbsnews.com/video/watch/?id=2154399n/video/watch/?id=2154399n

Then, view this “little wonder” on Then, view this “little wonder” on Computer Safety—great for novices as Computer Safety—great for novices as well as veteran computer users.well as veteran computer users.

http://www.microsoft.com/http://www.microsoft.com/athome/security/videos/privacy.htmlathome/security/videos/privacy.html

Page 3: By: Valerie C. Burrell ED 505 “There is eating etiquette, dating etiquette, phone etiquette and even golf etiquette. In recent years, a new kind of etiquette.

If you like visuals, see this If you like visuals, see this one that summarizes the one that summarizes the basics of Netiquette:basics of Netiquette:

Courtesy of www.bing.com/imagesCourtesy of www.bing.com/images

Page 4: By: Valerie C. Burrell ED 505 “There is eating etiquette, dating etiquette, phone etiquette and even golf etiquette. In recent years, a new kind of etiquette.

4-1-1 on Copyright and Fair Use4-1-1 on Copyright and Fair Use(from Jace-Shoemaker Galloway)(from Jace-Shoemaker Galloway)

Remember the humanRemember the human A couple good rules of thumb before sending your opinion are: One—before clicking send, ask yourself, “would I say this to this person’s face?” And two—don’t shoot A couple good rules of thumb before sending your opinion are: One—before clicking send, ask yourself, “would I say this to this person’s face?” And two—don’t shoot

from the hip. In other words, take some time and think about what you’re typing, don’t let your emotions rule your words and choose your words carefully. from the hip. In other words, take some time and think about what you’re typing, don’t let your emotions rule your words and choose your words carefully. Adhere to the same standards of behavior online that you follow in real lifeAdhere to the same standards of behavior online that you follow in real life If it’s illegal, it isn’t good netiquette. Apply real–life ethics to online situations. If it’s illegal, it isn’t good netiquette. Apply real–life ethics to online situations. Respect other people’s time and bandwidthRespect other people’s time and bandwidth Don’t email large or unnecessary files without getting the person’s permission. These may include images or video jokes. It’s not funny to tie up someone’s computer for Don’t email large or unnecessary files without getting the person’s permission. These may include images or video jokes. It’s not funny to tie up someone’s computer for

ten minutes while a video clip joke downloads. ten minutes while a video clip joke downloads. Make yourself look good onlineMake yourself look good online Check your emails and other messages for spelling and grammar errors. If it’s a really important message, have someone else read it before sending it. Check your emails and other messages for spelling and grammar errors. If it’s a really important message, have someone else read it before sending it. Avoid racial and other demeaning terms that refer to someone’s race, sex, sexual orientation or religion. Avoid racial and other demeaning terms that refer to someone’s race, sex, sexual orientation or religion. Help keep flame wars under controlHelp keep flame wars under control Flaming someone is sharing your opinion without tact and sometimes even attacking someone personally. Though netiquette doesn’t forbid flaming, constant flaming Flaming someone is sharing your opinion without tact and sometimes even attacking someone personally. Though netiquette doesn’t forbid flaming, constant flaming

between participants in a chatroom or forum isn’t necessary. Once your opinion is expressed, let it rest. between participants in a chatroom or forum isn’t necessary. Once your opinion is expressed, let it rest. Respect other people’s privacyRespect other people’s privacy Don’t post personal information about someone without their consent. If you’re sending an email to a group of people and some members of the group may not want Don’t post personal information about someone without their consent. If you’re sending an email to a group of people and some members of the group may not want

their email addresses disclosed to other members, use the blind carbon copy (Bcc) option. Furthermore, don’t read other’s emails or rummage through their personal their email addresses disclosed to other members, use the blind carbon copy (Bcc) option. Furthermore, don’t read other’s emails or rummage through their personal files. files.

Be forgiving of other people’s mistakesBe forgiving of other people’s mistakes Internet users are people and people are imperfect. Before getting irate because of an inaccurate posting or a mistake on someone’s website, ask them nicely to Internet users are people and people are imperfect. Before getting irate because of an inaccurate posting or a mistake on someone’s website, ask them nicely to

change or remove it. Most mistakes are unintentional and the person will be glad you brought it to their attention. change or remove it. Most mistakes are unintentional and the person will be glad you brought it to their attention. DON’T SHOUT!DON’T SHOUT! No matter what forum, writing in all capital letters is considered SHOUTING and is considered very rude. A word or two in caps is fine, but shouting is not No matter what forum, writing in all capital letters is considered SHOUTING and is considered very rude. A word or two in caps is fine, but shouting is not

recommended.recommended. Pay Attention to Language IssuesPay Attention to Language Issues Improper, inappropriate or bad language may get a participant kicked out or permanently banned from a forum or group. It is also important to remember people from Improper, inappropriate or bad language may get a participant kicked out or permanently banned from a forum or group. It is also important to remember people from

other countries may be participating in the conversation and language barriers may be an issue.other countries may be participating in the conversation and language barriers may be an issue. Think Before PostingThink Before Posting It is important to note, what is posted online today, may come back and haunt the writer tomorrow. That silly or fun photograph posted on a social networking site, may It is important to note, what is posted online today, may come back and haunt the writer tomorrow. That silly or fun photograph posted on a social networking site, may

keep that person from getting a job later on. Many colleges and employers are now searching social networking sites prior to hiring.keep that person from getting a job later on. Many colleges and employers are now searching social networking sites prior to hiring. Keep Personal Information Private Keep Personal Information Private Posting private and personal information in the wrong location can have serious consequences. Identity theft is a rapidly growing concern. Divulging too much Posting private and personal information in the wrong location can have serious consequences. Identity theft is a rapidly growing concern. Divulging too much

information could give predators and those with bad intentions valuable information. Be careful where personal information is posted. If private information is posted in a information could give predators and those with bad intentions valuable information. Be careful where personal information is posted. If private information is posted in a group setting, read the guidelines prior to posting. Children should not post private information onlinegroup setting, read the guidelines prior to posting. Children should not post private information online

Obey Copyright LawsObey Copyright Laws That speaks for itself.That speaks for itself.

Page 5: By: Valerie C. Burrell ED 505 “There is eating etiquette, dating etiquette, phone etiquette and even golf etiquette. In recent years, a new kind of etiquette.

More 4-1-1 on Copyright and Fair Use...More 4-1-1 on Copyright and Fair Use...(from www.copyright.gov)(from www.copyright.gov)

Section 107 contains a list of the various purposes for which the reproduction of a particular work may be Section 107 contains a list of the various purposes for which the reproduction of a particular work may be considered fair, such as criticism, comment, news reporting, teaching, scholarship, and research. Section 107 considered fair, such as criticism, comment, news reporting, teaching, scholarship, and research. Section 107 also sets out four factors to be considered in determining whether or not a particular use is fair:also sets out four factors to be considered in determining whether or not a particular use is fair:

The purpose and character of the use, including whether such use is of commercial nature or is for nonprofit educational The purpose and character of the use, including whether such use is of commercial nature or is for nonprofit educational purposes purposes

The nature of the copyrighted work The nature of the copyrighted work The amount and substantiality of the portion used in relation to the copyrighted work as a whole The amount and substantiality of the portion used in relation to the copyrighted work as a whole The effect of the use upon the potential market for, or value of, the copyrighted work The effect of the use upon the potential market for, or value of, the copyrighted work

The distinction between fair use and infringement may be unclear and not easily defined. There is no specific The distinction between fair use and infringement may be unclear and not easily defined. There is no specific number of words, lines, or notes that may safely be taken without permission. Acknowledging the source of the number of words, lines, or notes that may safely be taken without permission. Acknowledging the source of the copyrighted material does not substitute for obtaining permission. copyrighted material does not substitute for obtaining permission.

Copyright protects the particular way authors have expressed themselves. It does not extend to any ideas, Copyright protects the particular way authors have expressed themselves. It does not extend to any ideas, systems, or factual information conveyed in a work. systems, or factual information conveyed in a work.

The safest course is always to get permission from the copyright owner before using copyrighted material. The The safest course is always to get permission from the copyright owner before using copyrighted material. The Copyright Office cannot give this permission. Copyright Office cannot give this permission.

There are different rules for what may be copied from television, Internet, computer software, printed material, There are different rules for what may be copied from television, Internet, computer software, printed material, illustrations/photos, videos, music, etc.illustrations/photos, videos, music, etc.

Page 6: By: Valerie C. Burrell ED 505 “There is eating etiquette, dating etiquette, phone etiquette and even golf etiquette. In recent years, a new kind of etiquette.

This is too important to miss:This is too important to miss:The 1961 The 1961 Report of the Register of Copyrights on the Report of the Register of Copyrights on the General Revision of the U.S. Copyright LawGeneral Revision of the U.S. Copyright Law cites cites examples of activities that courts have regarded as fair examples of activities that courts have regarded as fair use: “quotation of excerpts in a review or criticism for use: “quotation of excerpts in a review or criticism for purposes of illustration or comment; quotation of short purposes of illustration or comment; quotation of short passages in a scholarly or technical work, for passages in a scholarly or technical work, for illustration or clarification of the author’s observations; illustration or clarification of the author’s observations; use in a parody of some of the content of the work use in a parody of some of the content of the work parodied; summary of an address or article, with brief parodied; summary of an address or article, with brief quotations, in a news report; reproduction by a library quotations, in a news report; reproduction by a library of a portion of a work to replace part of a damaged of a portion of a work to replace part of a damaged copy; reproduction by a teacher or student of a small copy; reproduction by a teacher or student of a small part of a work to illustrate a lesson; reproduction of a part of a work to illustrate a lesson; reproduction of a work in legislative or judicial proceedings or reports; work in legislative or judicial proceedings or reports; incidental and fortuitous reproduction, in a newsreel or incidental and fortuitous reproduction, in a newsreel or broadcast, of a work located in the scene of an event broadcast, of a work located in the scene of an event being reported.”being reported.”(courtesy of www.copyright.gov)(courtesy of www.copyright.gov)

Page 7: By: Valerie C. Burrell ED 505 “There is eating etiquette, dating etiquette, phone etiquette and even golf etiquette. In recent years, a new kind of etiquette.

A VERY A VERY dirtydirty word: PLAGIARISM word: PLAGIARISM""PlagiarismPlagiarism is a species of intellectual fraud. It consists of unauthorized copying that the copier is a species of intellectual fraud. It consists of unauthorized copying that the copier claims (whether explicitly or implicitly, and whether deliberately or carelessly) is original with claims (whether explicitly or implicitly, and whether deliberately or carelessly) is original with him and the claim causes the copier's audience to behave otherwise than it would if it knew him and the claim causes the copier's audience to behave otherwise than it would if it knew

the truth."the truth."(Richard A. Posner, (Richard A. Posner, The Little Book of PlagiarismThe Little Book of Plagiarism. Pantheon, 2007). Pantheon, 2007)

Are you using your own independent material, common knowledge, or someone else’s independent material?Are you using your own independent material, common knowledge, or someone else’s independent material?You must acknowledge someone else’s material.You must acknowledge someone else’s material.Here’s a super easy checklist for the beginners and fanatics to keep in mind...Here’s a super easy checklist for the beginners and fanatics to keep in mind...QuotationsQuotations · Do all quotations exactly match their sources? Check them.· Do all quotations exactly match their sources? Check them. · Have you inserted quotation marks around quotations that are run into· Have you inserted quotation marks around quotations that are run into your text?your text? · Have you shown omissions with ellipsis marks and additions with· Have you shown omissions with ellipsis marks and additions with brackets?brackets? · Does every quotation have a source citation?· Does every quotation have a source citation?Paraphrases and summariesParaphrases and summaries · Have you used your own words and sentence structures for every· Have you used your own words and sentence structures for every paraphrase and summary? If not, use quotation marks around the originalparaphrase and summary? If not, use quotation marks around the original author’s words.author’s words. · Does every paraphrase and summary have a source citation?· Does every paraphrase and summary have a source citation?The WebThe Web · Have you obtained any necessary permission to use someone else’s· Have you obtained any necessary permission to use someone else’s material on your Web site?material on your Web site?Source citationsSource citations · Have you acknowledged every use of someone else’s material in the· Have you acknowledged every use of someone else’s material in the place where you use it?place where you use it? · Does your list of works cited include all the sources you have used?· Does your list of works cited include all the sources you have used?

Taken from: Fowler, Ramsey H. and Jane I. Aaron. The Little, Brown Handbook. New York:Taken from: Fowler, Ramsey H. and Jane I. Aaron. The Little, Brown Handbook. New York:Pearson Education, Inc., 2004. Companion Website http://wps.ablongman.com/long_fowler_lbh_9/Pearson Education, Inc., 2004. Companion Website http://wps.ablongman.com/long_fowler_lbh_9/

Page 8: By: Valerie C. Burrell ED 505 “There is eating etiquette, dating etiquette, phone etiquette and even golf etiquette. In recent years, a new kind of etiquette.

Adults can use the same general web safety Adults can use the same general web safety rules recommended by rules recommended by www.kidshealth.comwww.kidshealth.com

WEB SAFETYWEB SAFETY

A federal law, the Children's Online Privacy Protection Act (COPPA), was A federal law, the Children's Online Privacy Protection Act (COPPA), was created to help protect kids online. It's designed to keep anyone from created to help protect kids online. It's designed to keep anyone from obtaining a child's personal information without a parent knowing about obtaining a child's personal information without a parent knowing about it and agreeing to it first.it and agreeing to it first.

They and we can use online protection tools. I even found an Internet offer They and we can use online protection tools. I even found an Internet offer for Computer Alarm—comparable to a burglar alarm! So cool!for Computer Alarm—comparable to a burglar alarm! So cool!

Watch for the Warning Signs that something is not quite right:Watch for the Warning Signs that something is not quite right: spending long hours online, especially at night, phone calls from people spending long hours online, especially at night, phone calls from people

you don't know, or unsolicited gifts arriving in the mail. If your child/you you don't know, or unsolicited gifts arriving in the mail. If your child/you suddenly turn off the computer when someone walks into the room, ask suddenly turn off the computer when someone walks into the room, ask why and monitor computer time more closely. Withdrawal from family why and monitor computer time more closely. Withdrawal from family life and reluctance to discuss online activities are other signs to watch life and reluctance to discuss online activities are other signs to watch for.for.

Page 9: By: Valerie C. Burrell ED 505 “There is eating etiquette, dating etiquette, phone etiquette and even golf etiquette. In recent years, a new kind of etiquette.

Who knows more about Computers and Who knows more about Computers and Computer Safety than our friends and Computer Safety than our friends and innovators at Microsoft? innovators at Microsoft?

7 safety tips for using a public computer7 safety tips for using a public computerPublic computers in libraries, Internet cafes, airports, and copy shops can be safe if you follow aPublic computers in libraries, Internet cafes, airports, and copy shops can be safe if you follow a few simple rules when you use them. Read these tips to help keep your work, personal, or financial informationfew simple rules when you use them. Read these tips to help keep your work, personal, or financial information private.private.

Don't save your logon informationDon't save your logon information Don't leave the computer unattended with sensitive information on the screenDon't leave the computer unattended with sensitive information on the screen

Erase your tracksErase your tracks

Disable the feature that stores passwordsDisable the feature that stores passwords Delete your temporary Internet files and your historyDelete your temporary Internet files and your history

Watch for over-the-shoulder snoopsWatch for over-the-shoulder snoops

Don't enter sensitive information into a public computerDon't enter sensitive information into a public computer

www.microsoft.com/security/online-privacy/publicwww.microsoft.com/security/online-privacy/public

Page 10: By: Valerie C. Burrell ED 505 “There is eating etiquette, dating etiquette, phone etiquette and even golf etiquette. In recent years, a new kind of etiquette.

And remember Internet And remember Internet fans...fans...