DIGITAL CITIZENSHIP ED 505 Created By: Danielle McDaniel.

29
DIGITAL CITIZENSHIP ED 505 Created By: Danielle McDaniel

Transcript of DIGITAL CITIZENSHIP ED 505 Created By: Danielle McDaniel.

Digital citizenship project ED 505

Digital citizenship

ED 505Created By:Danielle McDanielNetiquette on social media sitesNetiquette on social media is defined as the social code of using social media. Most individuals consider this the way people say what they would like to say to their friends.

It is a code that people communicate by. It is not a politically correct form of communication.

Social media is user generated content.

Netiquette is the social code of the internet.Dos and donts of netiquette on social media sitesDOS of Netiquette on Social Media SitesShare accurate informationSharing is caring for othersShow loveRespect privacyPlace everything in moderationCorrect your mistakes

DONTS of Netiquette on Social Media SitesDont lieDont hateNo cursingNo disrespect

Copyright and fair useCopyright- This is a legal concept, enacted by most governments, giving the creator of an original work exclusive rights to it, usually for a limited time. Generally, it is the right to copy, but also gives the copyright holder the right to be credited for the work, to determine who may adapt the work to other forms, who may perform the work, who any financially benefit from it, and other related rights.

Fair Use-A legal principle that provides certain limitations on the exclusive rights of copyright holders. The purpose of these guidelines is to provide guidance on the application of fair use principles by educational institutions, educators, scholars, and students who wish to copy, perform, or create a digital copy of a print musical score or record, copy, or download a recorded performance or recorded song under fair use rather than by seeking authorization from the copyright owners for non-commercial educational purposes.Fair use rules for mediaPrint material: Up to 1,000 words or 10% of the work, whichever is less.Up to 250 words of a poem, and only 3 poems per poet.If the text is longer than 10,000 words, you may use up to 1,000 of the words.If the text is shorter than 10,000 words, you many use up to 10% of it.

**As long as you or your teacher will NOT post it on the Internet, the rules are:You must cite your source to give proper credit.You must follow the length requirements

Fair Use rules for media cont.Music:Must be legal (not bootleg) copies of records, cassette tapes, CDs, or audio clips on the web of iTunes

Up to 30 seconds only, or 10% of the work, whichever is lessIf an audio clip is longer than 5 minutes, you may use up to 30 seconds of it.If a video is shorter than 5 minutes, you can use up to 10% of it.

**You must cite your source to give proper credit.**You must follow the length rules.

Fair use rules for media cont.Video:Must be legal copies of DVDs, multimedia encyclopedia clips, Quick Time movies, of video clips from the InternetUp to 3 minutes only OR 10% of the work, whichever is less.If a video is LONGER than 30 minutes, you may use up to 3 minutes of it.If a video is SHORTER than 30 minutes, you can use up to 10% of it.

**You must cite your source to give proper credit.**You must follow the length rules.

Fair use rules for media cont.Photographs:You may use single graphics in their entirety.No more than 4 images by a single artist or photographer may be used.If a graphic is from a collection, you may use no more than 15 images or 10% of the collection, whichever is LESS.

**You must cite your source to give proper credit.**You must follow the requirements.PlagiarismPlagiarism is the act of taking another persons writing, conversation, song, or even idea and passing it off as your own. This includes information from web pages, books, songs, television shows, email messages, interviews, articles, artworks or any other medium.Plagiarism cont.Examples of Committing Plagiarism:

Turning in someone elses work as your own.Copying words or ideas from someone else without giving credit.Failing to put a quotation in quotation marks.Giving incorrect information about the source of a quotation.Changing words but copying the sentence structure of a source without giving credit.Copying so many words or ideas from a source that it makes up the majority of your world, whether you give credit or not.

Ways to avoid plagiarismWhen using secondary sources in papers, you can avoid plagiarism by knowing what must be documented.

Specific words or phrasesIf you use an authors specific word or words, you must place those words within quotation marks and you must credit the source.

Information and IdeasEven if you use your own words, if you obtained the information or ideas you are presenting from a source, you must document the source.Ways to avoid plagiarism cont.Common KnowledgeYou do not need to cite a source for material considered common knowledge:General common knowledgeField-specific common knowledge

***When in doubt, be cautious and cite the source. In the case of both general and field-specific common knowledge, if you use the exact words of the reference source, you must use quotation marks and credit the source.Ways that technology helps teachers identify plagiarismWebsites Available to Identify Plagiarismwww.plagiarismdetection.orgwww.grammarly.comwww.turnitin.comwww.dustball.com/cs/plagiarism.checkerwww.copyscape.comwww.antiplagiarism.sf.netAlso Available:Google Alerts

Safety on the internetIdentity TheftComputers store all kids of information about you and stores it in files hidden deep on your hard drive. These files store information like logins and passwords, names addresses, and even credit card numbers.

A thief can get this information either by grabbing it when it is being sent over an unsecured transmission, or he can install malicious software on your computer that will collect everything he needs and automatically send it back to him.Safety on the internet cont.Identity Theft

The best way to protect yourself from identity theft is to secure your web browser!!Safety on the internetReputation Management

Reputation management is the practice of understanding or influencing an individual's or business's reputation.

In order to ensure a safe reputation on social media, individuals should manage their social media reputation.Safety on the internetTo manage your reputation on social media, here is a guide to help ensure safety.

Decide what you want to trackSet up accounts with free social media monitoring toolsSet up your alerts and searchesSet up your own social media accountsEngage-Act quickly, be nice, and be pro-activeSafety on the internetPasswordsPasswords are an important aspect of computer safety. They provide protection for your online user accounts. If someone else has your password, your electronic life becomes available to others.Your password gives others the power to:Modify or destroy your filesSend malicious e-mail in your nameCommit fraud while masquerading as youUse your computer to illegally distribute thingsSafety on the internetHelpful Tips for PasswordsKeep your password private

Change you password regularly

Create a complex password

By doing these things, you are providing a better defense against account intrusion.

Safety on the internetCyberbullying

Cyberbullying is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones.

It has to have a minor on both sides, or at least have been instigated by a minor against another minor.Safety on the internetCyberbullyingSteps to Preventing Cyberbullying:Educate kids about what cyberbullying isEducate kids about the consequences of cyberbullying (loosing online accounts).Teach kids to respect others and take a stand against bullying of all kids

Schools and parents need to partner together stop cyberbullying by educating the students on cyberethics and laws.Safety on the internetCyberstalking

Cyberstalking is online stalking. It is the use of technology, mainly the Internet, to harass someone. Common characteristics include false accusations, monitoring, threats, identity theft, and destroying data. Cyberstalking also includes exploitation of minors, be it sexual or otherwise.

Cyberstalking can damage many things. It can destroy friendships, credit, careers, self-image, and confidence.Safety on the internetCyberstalkingAnti-Stalking Tips:Maintain physical access to your computer and other Web-enabled devices like cell phonesBe sure to always log off your computerUse good password managementUse the privacy settings on your computerUse good updated security softwareTeach your children to never provide any personal information on the computerAny suspicions of cyberstalking should be reportedSafety on the InternetVIRUSESA virus can compromise your personal information and even destroy your computer completely.

In order to prevent viruses from attacking your computer, there are several things you can do.Safety on the InternetHow to Avoid Viruses on Your ComputerInstall a reliable anti virus program.Install anti-spyware and anti-malware programsAvoid suspicious websitesNever open email attachments without scanning them firstSet up automatic scansWatch your downloadsUpdates, Updates, UpdatesKnow what to look forStay away from cracked softwareInstall a firewallBe prepared to lock downSafety on the InternetPhishingPhishing scams are scams that try to get valuable information from individuals.

Things to do to avoid phishing scams:Stay alert and be cautious with e-mail and on Web sitesDont get scared by the content of e-mailDont give out information they should haveNever use links in e-mail to get to any page on the WebMake sure the Web site youre on is truly secureCheck your hosts file and your accounts regularlyKeep your software secureSafety on the InternetTrojan HorsesTrojan horses are harmful programs disguised as helpful programs. They may be attached to and hiding behind a legitimate program or be a program who intent is misrepresented. Trojans do not self-replicate, but can be used to spread, activate, or hide other viruses.

Safety on the InternetWorms

A worm is a stand-alone program that does not need a host program to replicate and spread. It typically modifies the operating system to become part of the boot process and it can also write changes to the registry. Worms can travel and spread via networks. Safety on the InternetThings to do to prevent Trojans and Worms

Install an antivirus software and keep it up-to-dateUse complex passwordsInstall and use a firewallBe a suspicious userBe a cautious Internet surferBe a conservative and informed downloaderRecognize the signs!!