Presented by Joe Childers. Overview of Topics o Netiquette for Social Media sites o Copyright and...

23
DIGITAL CITZENSHIP Presented by Joe Childers

Transcript of Presented by Joe Childers. Overview of Topics o Netiquette for Social Media sites o Copyright and...

Page 1: Presented by Joe Childers. Overview of Topics o Netiquette for Social Media sites o Copyright and Fair Use o Plagiarism o Internet Safety o Safety on.

DIGITAL CITZENSHIPPresented by Joe Childers

Page 2: Presented by Joe Childers. Overview of Topics o Netiquette for Social Media sites o Copyright and Fair Use o Plagiarism o Internet Safety o Safety on.

Overview of Topics

oNetiquette for Social Media sites

oCopyright and Fair UseoPlagiarism

oInternet SafetyoSafety on you Computer

Page 3: Presented by Joe Childers. Overview of Topics o Netiquette for Social Media sites o Copyright and Fair Use o Plagiarism o Internet Safety o Safety on.

Netiquette on Social Media Sites

Social Media Netiquette is the social

code of using social media. This is how

you say what you like to your friends.

It's not necessarily politically correct,

but there is a code. Social media is

user generated content. Netiquette is

the social code of the internet.

Page 4: Presented by Joe Childers. Overview of Topics o Netiquette for Social Media sites o Copyright and Fair Use o Plagiarism o Internet Safety o Safety on.

STOP! DO NOT PROCEDE! HALT!

Things NOT to do on Social Media SitesPost Illegal ActivityBullyingTrash your Teachers/AdministratorsPost Objectionable Content from

school computers or networksPost Confidential InformationOverly Specific Location Check-ins

Page 5: Presented by Joe Childers. Overview of Topics o Netiquette for Social Media sites o Copyright and Fair Use o Plagiarism o Internet Safety o Safety on.

STOP! DO NOT PROCEDE! HALT!Things NOT to do on Social Media

SitesLie / Cheat / PlagiarizeThreaten ViolenceIgnore school specific policiesUnprofessional Public ProfilesNever fully rely on Privacy SettingsPost Emotionally

Page 6: Presented by Joe Childers. Overview of Topics o Netiquette for Social Media sites o Copyright and Fair Use o Plagiarism o Internet Safety o Safety on.

IT’s OK, Go right ahead with it!The DO’s of Social Media sites

Have a strong password Verify Friend/Follower requestsUse Privacy SettingsVerify Links/Attachments/

Downloads before opening them Be Professional about anything

that you post, You never know who might see it.

Page 7: Presented by Joe Childers. Overview of Topics o Netiquette for Social Media sites o Copyright and Fair Use o Plagiarism o Internet Safety o Safety on.

Copyright and Fair Use

Copyright refers to laws that regulate the use of the work of a creator, such as an artist or author.

Fair Use is any copying of copyrighted material done for a limited and “transformative” purposes, such as to comment upon, criticize, or parody a copyrighted work. Such uses can be done without permission of the copyrighted owner.

Page 8: Presented by Joe Childers. Overview of Topics o Netiquette for Social Media sites o Copyright and Fair Use o Plagiarism o Internet Safety o Safety on.

Copyright and Fair UseDifference between Copyright and Fair Use

• Using short, attributed snippets of a piece for the purpose of commentary or education is generally considered fair use.

• However, reprinting an entire work without attribution for the purpose of self-promotion or profit isn’t. The shorter the amount copied and the more it is for the purpose of commentary or education, the more likely it is to be deemed fair use.

Page 9: Presented by Joe Childers. Overview of Topics o Netiquette for Social Media sites o Copyright and Fair Use o Plagiarism o Internet Safety o Safety on.

PlagiarismIn an instructional setting, plagiarism

occurs when a writer deliberately uses someone else’s language, ideas, or other original (not common-knowledge) material without acknowledging its source.

Page 10: Presented by Joe Childers. Overview of Topics o Netiquette for Social Media sites o Copyright and Fair Use o Plagiarism o Internet Safety o Safety on.

Plagiarism

Ways to Avoid PlagiarismTeaching students the conventions for

citing documents and acknowledging sources in their field, and allowing students to practice these skills

Avoiding the use of recycled or formulaic assignments that may invite stock or plagiarized responses

Page 11: Presented by Joe Childers. Overview of Topics o Netiquette for Social Media sites o Copyright and Fair Use o Plagiarism o Internet Safety o Safety on.

PlagiarismWays to Avoid Plagiarism

Discussing problems students may encounter in documenting and analyzing sources, and offering strategies for avoiding or solving those problems;

Discussing papers suspected of plagiarism with the students who have turned them in, to determine if the papers are the result of a deliberate intent to deceive

Page 12: Presented by Joe Childers. Overview of Topics o Netiquette for Social Media sites o Copyright and Fair Use o Plagiarism o Internet Safety o Safety on.

Plagiarism

Plagiarism Detection Tools for Educators• Turnitin.com is the leading academic

plagiarism detector, utilized by teachers and students to avoid plagiarism and ensure academic integrity.• SafeAssign is a plagiarism prevention

service that helps educators prevent plagiarism by detecting unoriginal content in student papers.

Page 13: Presented by Joe Childers. Overview of Topics o Netiquette for Social Media sites o Copyright and Fair Use o Plagiarism o Internet Safety o Safety on.

PlagiarismOther Plagiarism Detection Tools for

Educators• Glatt Plagiarism Services • Essay Verification Engine (EVE)• PlagiarismDotOrg

Page 14: Presented by Joe Childers. Overview of Topics o Netiquette for Social Media sites o Copyright and Fair Use o Plagiarism o Internet Safety o Safety on.

Internet SafetyReputation Management

• Internet Reputation Management can protect a child’s future. While children use the Web to connect with friends and share photos through social media sites such as Facebook and Twitter, it is important to understand the real dangers of posting personal information online.

• Personal information posted on the Internet becomes public instantly, allowing anyone to search for your child on the Web and find stories, photos and even videos. For older adolescents entering the college and business world, incriminating photos and information could mean devastating damage to their reputation.

Page 15: Presented by Joe Childers. Overview of Topics o Netiquette for Social Media sites o Copyright and Fair Use o Plagiarism o Internet Safety o Safety on.

Internet SafetyPassword Protection

With many situations requiring a username and password, it essential to have good password habits.

Unfortunately, any password can be broken with enough time. However, careful use of strong passwords may successfully prevent attackers from accessing your data and accounts. Realizing the benefits of passwords comes not only through choosing the right passwords, but by maintaining good "password habits" and avoiding vulnerabilities

Page 16: Presented by Joe Childers. Overview of Topics o Netiquette for Social Media sites o Copyright and Fair Use o Plagiarism o Internet Safety o Safety on.

Internet SafetyCyber Bullying

In recent years the Internet has not only increased the ability to bully at school, but has brought the problem into our homes and elsewhere - actually just about anywhere - at any time.

Cyber bullying is the repeated use of information technology, including e-mail, instant messaging, blogs, chat rooms, pagers, cell phones, and gaming systems, to deliberately harass, threaten or intimidate others. Unlike physical bullying, where the victim can walk away, technology now allows for continuous harassment, from any distance, in a variety of ways.

Page 17: Presented by Joe Childers. Overview of Topics o Netiquette for Social Media sites o Copyright and Fair Use o Plagiarism o Internet Safety o Safety on.

Internet SafetyCyber Stalking

Cyberstalking is a severe form of cyberbullying where an individual uses the Internet to repeatedly threaten, harrass, or attempt to contact another individual. Cyberstalkers exhibit a seeming obsession to keep tabs on a victim's personal whereabouts. As opposed to cyberbully where the inappropriate behavior online in usually kept online, cyberstalkers often call their victims on the phone, know where their victims live, and try to monitor their targets' physical whereabouts

Page 18: Presented by Joe Childers. Overview of Topics o Netiquette for Social Media sites o Copyright and Fair Use o Plagiarism o Internet Safety o Safety on.

Safety on your ComputerViruses

Computer viruses are self-executing, replicating programs written specifically to change the way a machine works, without the knowledge or permission of the operator/owner. Just as biological viruses pass from person to person, replicating themselves as they go, computer viruses pass from computer to computer. Unlike most biological viruses, however - computer viruses are entirely man made.

Page 19: Presented by Joe Childers. Overview of Topics o Netiquette for Social Media sites o Copyright and Fair Use o Plagiarism o Internet Safety o Safety on.

Safety on your ComputerPhishing

Phishing is an attempt to get you to reveal logins, passwords, account numbers and other personal information. Phishers send an e-mail or instant message that claims to be from a business or organization that you deal with - for example, your Internet service provider (ISP), bank, credit card company, online payment service (such as PayPal), eBay, or even a government agency (such as the IRS).

Page 20: Presented by Joe Childers. Overview of Topics o Netiquette for Social Media sites o Copyright and Fair Use o Plagiarism o Internet Safety o Safety on.

Safety on your ComputerTrojan Horses

Trojan horses are not actually viruses but - they are often thought of as viruses. They are named after the famous Trojan Horse - an enormous hollow, wooden horse that was left outside the ancient Greek city of Troy by the enemy. The Trojans thought the horse was a gift and brought it inside their city walls but actually, it was a trick and the horse's hollow body contained warriors who captured Troy and ended the Trojan War.

Page 21: Presented by Joe Childers. Overview of Topics o Netiquette for Social Media sites o Copyright and Fair Use o Plagiarism o Internet Safety o Safety on.

Safety on your ComputerWorms

Worms are computer programs that can copy themselves from machine to machine, extremely quickly, through computer networks.

Computer worms differ from computer viruses because they run independently and do not need a host file, boot sector or file transfer between machines to propogate