Presented by Joe Childers. Overview of Topics o Netiquette for Social Media sites o Copyright and...
-
Upload
christian-thomas -
Category
Documents
-
view
212 -
download
0
Transcript of Presented by Joe Childers. Overview of Topics o Netiquette for Social Media sites o Copyright and...
DIGITAL CITZENSHIPPresented by Joe Childers
Overview of Topics
oNetiquette for Social Media sites
oCopyright and Fair UseoPlagiarism
oInternet SafetyoSafety on you Computer
Netiquette on Social Media Sites
Social Media Netiquette is the social
code of using social media. This is how
you say what you like to your friends.
It's not necessarily politically correct,
but there is a code. Social media is
user generated content. Netiquette is
the social code of the internet.
STOP! DO NOT PROCEDE! HALT!
Things NOT to do on Social Media SitesPost Illegal ActivityBullyingTrash your Teachers/AdministratorsPost Objectionable Content from
school computers or networksPost Confidential InformationOverly Specific Location Check-ins
STOP! DO NOT PROCEDE! HALT!Things NOT to do on Social Media
SitesLie / Cheat / PlagiarizeThreaten ViolenceIgnore school specific policiesUnprofessional Public ProfilesNever fully rely on Privacy SettingsPost Emotionally
IT’s OK, Go right ahead with it!The DO’s of Social Media sites
Have a strong password Verify Friend/Follower requestsUse Privacy SettingsVerify Links/Attachments/
Downloads before opening them Be Professional about anything
that you post, You never know who might see it.
Copyright and Fair Use
Copyright refers to laws that regulate the use of the work of a creator, such as an artist or author.
Fair Use is any copying of copyrighted material done for a limited and “transformative” purposes, such as to comment upon, criticize, or parody a copyrighted work. Such uses can be done without permission of the copyrighted owner.
Copyright and Fair UseDifference between Copyright and Fair Use
• Using short, attributed snippets of a piece for the purpose of commentary or education is generally considered fair use.
• However, reprinting an entire work without attribution for the purpose of self-promotion or profit isn’t. The shorter the amount copied and the more it is for the purpose of commentary or education, the more likely it is to be deemed fair use.
PlagiarismIn an instructional setting, plagiarism
occurs when a writer deliberately uses someone else’s language, ideas, or other original (not common-knowledge) material without acknowledging its source.
Plagiarism
Ways to Avoid PlagiarismTeaching students the conventions for
citing documents and acknowledging sources in their field, and allowing students to practice these skills
Avoiding the use of recycled or formulaic assignments that may invite stock or plagiarized responses
PlagiarismWays to Avoid Plagiarism
Discussing problems students may encounter in documenting and analyzing sources, and offering strategies for avoiding or solving those problems;
Discussing papers suspected of plagiarism with the students who have turned them in, to determine if the papers are the result of a deliberate intent to deceive
Plagiarism
Plagiarism Detection Tools for Educators• Turnitin.com is the leading academic
plagiarism detector, utilized by teachers and students to avoid plagiarism and ensure academic integrity.• SafeAssign is a plagiarism prevention
service that helps educators prevent plagiarism by detecting unoriginal content in student papers.
PlagiarismOther Plagiarism Detection Tools for
Educators• Glatt Plagiarism Services • Essay Verification Engine (EVE)• PlagiarismDotOrg
Internet SafetyReputation Management
• Internet Reputation Management can protect a child’s future. While children use the Web to connect with friends and share photos through social media sites such as Facebook and Twitter, it is important to understand the real dangers of posting personal information online.
• Personal information posted on the Internet becomes public instantly, allowing anyone to search for your child on the Web and find stories, photos and even videos. For older adolescents entering the college and business world, incriminating photos and information could mean devastating damage to their reputation.
Internet SafetyPassword Protection
With many situations requiring a username and password, it essential to have good password habits.
Unfortunately, any password can be broken with enough time. However, careful use of strong passwords may successfully prevent attackers from accessing your data and accounts. Realizing the benefits of passwords comes not only through choosing the right passwords, but by maintaining good "password habits" and avoiding vulnerabilities
Internet SafetyCyber Bullying
In recent years the Internet has not only increased the ability to bully at school, but has brought the problem into our homes and elsewhere - actually just about anywhere - at any time.
Cyber bullying is the repeated use of information technology, including e-mail, instant messaging, blogs, chat rooms, pagers, cell phones, and gaming systems, to deliberately harass, threaten or intimidate others. Unlike physical bullying, where the victim can walk away, technology now allows for continuous harassment, from any distance, in a variety of ways.
Internet SafetyCyber Stalking
Cyberstalking is a severe form of cyberbullying where an individual uses the Internet to repeatedly threaten, harrass, or attempt to contact another individual. Cyberstalkers exhibit a seeming obsession to keep tabs on a victim's personal whereabouts. As opposed to cyberbully where the inappropriate behavior online in usually kept online, cyberstalkers often call their victims on the phone, know where their victims live, and try to monitor their targets' physical whereabouts
Safety on your ComputerViruses
Computer viruses are self-executing, replicating programs written specifically to change the way a machine works, without the knowledge or permission of the operator/owner. Just as biological viruses pass from person to person, replicating themselves as they go, computer viruses pass from computer to computer. Unlike most biological viruses, however - computer viruses are entirely man made.
Safety on your ComputerPhishing
Phishing is an attempt to get you to reveal logins, passwords, account numbers and other personal information. Phishers send an e-mail or instant message that claims to be from a business or organization that you deal with - for example, your Internet service provider (ISP), bank, credit card company, online payment service (such as PayPal), eBay, or even a government agency (such as the IRS).
Safety on your ComputerTrojan Horses
Trojan horses are not actually viruses but - they are often thought of as viruses. They are named after the famous Trojan Horse - an enormous hollow, wooden horse that was left outside the ancient Greek city of Troy by the enemy. The Trojans thought the horse was a gift and brought it inside their city walls but actually, it was a trick and the horse's hollow body contained warriors who captured Troy and ended the Trojan War.
Safety on your ComputerWorms
Worms are computer programs that can copy themselves from machine to machine, extremely quickly, through computer networks.
Computer worms differ from computer viruses because they run independently and do not need a host file, boot sector or file transfer between machines to propogate
References http://mashable.com/2012/09/04/students-
social-media-warnings/http://www.networketiquette.net/socmed.h
tmhttp://www.wadsworth.com/english_d/speci
al_features/plagiarism/WPAplagiarism.pdfhttp://www.truecare.com/blog/internet-rep
utation-management/internet-reputation-management-and-your-child/
http://graphicdesign.about.com/od/legalglossary/g/copyright.htm
http://writing.mit.edu/wcc/resources/teachers/detectplagiarism
References (cont.)http://www.criminaljustice.ny.gov/missing/i
_safety/cyberbullying.htmhttp://www.internetsafetyproject.org/wiki/c
yberstalkinghttps://www.wiredsafety.orghttp://think.stedwards.edu/computerhelp/i
nternetsafetyphishinghttp://www.nolo.com/legal-encyclopedia/fai
r-use-rule-copyright-material-30100.htmlhttp://www.internetsafetycenter.com