Upload
willa-robertson
View
215
Download
0
Embed Size (px)
Citation preview
Netiquette- manners for how to use computer networks, including the internet.
Do’s Don’ts
- Make a presence online
- Submit before you think
- Check your grammar and spelling.
- Correct other’s grammar or spelling without consent.
- Make your profiles private
- Say anything you will regret
- Think before your submit
- Post anything you wouldn’t want anyone to see.
- Connect with others
Fair use- when you copy material that is under a copyright and use it to criticize, comment on, or parody (Stanford, 2010).- Examples: quoting a line from a song, summarizing a news report, and copying some paragraphs from an article.
Copyright- a type of protection by the US Constitution that protects original work by an author (Copyright.gov, 2006).
Both protect rights for original works.
Copyright tells you what you cannot do. Fair Use tells you the exceptions to use
original works that are copyrighted. Copyright is the law. Fair use is the loophole to the law.
Motion Media Up to 3 minutes or 3%
Text Media 1,00 words or 10%
Music, Lyrics, Music Videos
No more than 30 seconds or up to 10%.
Illustrations or Photographs
No more than 5 pictures from one person
Numerical Data Sets
2,500 fields or cell entries or up to 10%
Copying of an Instructors Multimedia Project
No more than two copies
(Maryland, 2011)
What is it?- Using someone else's work as your own.- Using work that has not been cited.- An act of fraud.
(What is Plagiarism, n.d) How can you avoid it?
- Cite the sources that you get your information from.- Helpful website on citing: http://owl.english.purdue.edu/owl/search2.php
The following websites are available to help teachers find plagiarized materials:- http://www.canexus.com/eve/- http://www.paperbin.com/- http://www.plagiarism.org/- http://www.turnitin.com/en_us/home
The websites look for commonly used words and phrases as well as copyrighted photography.
On the Internet
When someone takes your personal information such as your social security number, name, or credit card number without you knowing (Federal Trade Commission, n.d.)
Changing your address Stealing Dumpster Diving Phishing Skimming- stealing credit card numbers by
using a special machine. Pretexting- lying to services (cable, telephone,
etc) to get your information.
Be aware Educate those around you Pay close attention to everything associate with
your name so you can detect a change Go to the FTC website at:
http://www.ftc.gov/bcp/edu/microsites/idtheft//consumers/about-identity-theft.html
How you look online to others. Can be a person, business, animals,
locations or materials. Your reputation on the internet could
show anything from your age to your mortgage payment (Reputation, 2012)
To find out your internet reputation click on this link: http://www.reputation.com/
Tips for making your passwords secure:- Have more than one password- Don’t give your password to anyone- Make it easy for you to remember, but hard for people to guess.- Use symbols ($^#%)- Have at least 8 characters in your password.
(Tech Parenting Group, 2011)
When someone, usually a preteen, child, or teen, is targeted buy a peer on the internet. Can include embarrassment, harassment, threats, or other bullying characteristics (WiredKids, n.d.)
Best way to prevent is to teach youth about it and how to stop it.
Visit http://www.stopcyberbullying.org/index2.html for more information.
When one person uses the internet or computer to make unwanted advances or makes threats toward another person (The National Center for Victims of Crime, 2011).
Effects of cyber stalking:- Nightmares- Anxiety- Fear for safety- Shock
On Your Computer
A small type of software that connects itself to other things on your computer. When you open the programs or files it is on, it multiplies (Brian & Fenlon, 2012).
How to know your computer has a virus:- Crashes a lot- Corrupted message
- Browser looks different.
A type of stealing that is done by putting a software on your computer through a virus or stealing off your computer (Microsoft, 2012).
Phishing emails have the following qualities:- Bad grammar- Spelling issues- Links- Threats- Stealing a popular company’s name.(Microsoft, 2012)
A part of a computer virus that puts a harmful code in your computer (Search Security, 1998)
How to prevent a Trojan horse virus:- Don’t download anything from strangers- Make sure you know what a file is before opening it.- Don’t think you are safe because you have an antivirus software.
Programs that can move across network connections. Similar to viruses but spread differently (Virusall.com, 1997).
Can be spread through the following applications:- Emails- Instant Messaging- Internet- File-sharing- IRC Worms
(Computer Worm, 2012)
N/A (2012). No Title. Retrieved from www.dictionary.com Doyle, A. (2012). Top 10 social media do’s and don’ts. Retrieved from
http://jobsearch.about.com/od/onlinecareernetworking/tp/socialmediajobsearch.htm Stanford University Libraries (2012). What is fair use? Retrieved from
http://fairuse.stanford.edu/Copyright_and_Fair_Use_Overview/chapter9/9-a.html U.S. Copyright Office (2006). Copyright in general. Retrieved from
http://www.copyright.gov/help/faq/faq-general.html#what University of Maryland (2011). Copyright and fair use in the UMUC online face-to-face classroom.
Retrieved from http://www.umuc.edu/library/libhow/copyright.cfm#multimedia_types What is Plagiarism? (n.d.). Retrieved from http://www.plagiarism.org/ Suarez, J., Martin, A. (2001). Internet plagiarism: A teacher’s combat guide. Contemporary Issues in
Technology and Teach Education, 1(4). Retrieved from http://www.citejournal.org/vol1/iss4/currentpractice/article2.htm
Federal Trade Commission (n.d.) Fighting back against identity theft. Retrieved from http://www.ftc.gov/bcp/edu/microsites/idtheft//consumers/about-identity-theft.html
Reputation.com, Inc (2012) Take your free reputation snapshot. Retrieved from www.reputation.com Tech Parenting Group (2011). Tips for strong, secure passwords. Retrieved from
http://www.connectsafely.org/Safety-Tips/tips-to-create-and-manage-strong-passwords.html WiredKids, Inc (n.d.) STOP cyberbullying. Retrieved from
http://www.stopcyberbullying.org/index2.html The National Center for Victims of Crime (2011). Cyberstalking. Retrieved from
http://www.ncvc.org/ncvc/main.aspx?dbName=DocumentViewer&DocumentID=32458 Brian, M & Fenlon, W (2012). How computer viruses work. Retrieved from
http://www.howstuffworks.com/virus.htm Microsoft (2012). How to recognize phishing email messages, links, or phone calls. Retrieved from
http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx Search Security (1998). Trojan Horse Attacks. Retrieved from
http://www.irchelp.org/irchelp/security/trojan.html#prevent VIRUSALL.COM (1997). Information. Retrieved from
http://virusall.com/computer%20worms/worms.php Computer Worm (2012). What is a computer worm? Retrieved from http://computerworm.net/