20

Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your

Embed Size (px)

Citation preview

Page 1: Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your
Page 2: Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your

Netiquette- manners for how to use computer networks, including the internet.

Do’s Don’ts

- Make a presence online

- Submit before you think

- Check your grammar and spelling.

- Correct other’s grammar or spelling without consent.

- Make your profiles private

- Say anything you will regret

- Think before your submit

- Post anything you wouldn’t want anyone to see.

- Connect with others

Page 3: Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your

Fair use- when you copy material that is under a copyright and use it to criticize, comment on, or parody (Stanford, 2010).- Examples: quoting a line from a song, summarizing a news report, and copying some paragraphs from an article.

Copyright- a type of protection by the US Constitution that protects original work by an author (Copyright.gov, 2006).

Page 4: Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your

Both protect rights for original works.

Copyright tells you what you cannot do. Fair Use tells you the exceptions to use

original works that are copyrighted. Copyright is the law. Fair use is the loophole to the law.

Page 5: Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your

Motion Media Up to 3 minutes or 3%

Text Media 1,00 words or 10%

Music, Lyrics, Music Videos

No more than 30 seconds or up to 10%.

Illustrations or Photographs

No more than 5 pictures from one person

Numerical Data Sets

2,500 fields or cell entries or up to 10%

Copying of an Instructors Multimedia Project

No more than two copies

(Maryland, 2011)

Page 6: Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your

What is it?- Using someone else's work as your own.- Using work that has not been cited.- An act of fraud.

(What is Plagiarism, n.d) How can you avoid it?

- Cite the sources that you get your information from.- Helpful website on citing: http://owl.english.purdue.edu/owl/search2.php

Page 7: Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your

The following websites are available to help teachers find plagiarized materials:- http://www.canexus.com/eve/- http://www.paperbin.com/- http://www.plagiarism.org/- http://www.turnitin.com/en_us/home

The websites look for commonly used words and phrases as well as copyrighted photography.

Page 8: Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your

On the Internet

Page 9: Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your

When someone takes your personal information such as your social security number, name, or credit card number without you knowing (Federal Trade Commission, n.d.)

Page 10: Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your

Changing your address Stealing Dumpster Diving Phishing Skimming- stealing credit card numbers by

using a special machine. Pretexting- lying to services (cable, telephone,

etc) to get your information.

Be aware Educate those around you Pay close attention to everything associate with

your name so you can detect a change Go to the FTC website at:

http://www.ftc.gov/bcp/edu/microsites/idtheft//consumers/about-identity-theft.html

Page 11: Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your

How you look online to others. Can be a person, business, animals,

locations or materials. Your reputation on the internet could

show anything from your age to your mortgage payment (Reputation, 2012)

To find out your internet reputation click on this link: http://www.reputation.com/

Page 12: Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your

Tips for making your passwords secure:- Have more than one password- Don’t give your password to anyone- Make it easy for you to remember, but hard for people to guess.- Use symbols ($^#%)- Have at least 8 characters in your password.

(Tech Parenting Group, 2011)

Page 13: Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your

When someone, usually a preteen, child, or teen, is targeted buy a peer on the internet. Can include embarrassment, harassment, threats, or other bullying characteristics (WiredKids, n.d.)

Best way to prevent is to teach youth about it and how to stop it.

Visit http://www.stopcyberbullying.org/index2.html for more information.

Page 14: Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your

When one person uses the internet or computer to make unwanted advances or makes threats toward another person (The National Center for Victims of Crime, 2011).

Effects of cyber stalking:- Nightmares- Anxiety- Fear for safety- Shock

Page 15: Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your

On Your Computer

Page 16: Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your

A small type of software that connects itself to other things on your computer. When you open the programs or files it is on, it multiplies (Brian & Fenlon, 2012).

How to know your computer has a virus:- Crashes a lot- Corrupted message

- Browser looks different.

Page 17: Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your

A type of stealing that is done by putting a software on your computer through a virus or stealing off your computer (Microsoft, 2012).

Phishing emails have the following qualities:- Bad grammar- Spelling issues- Links- Threats- Stealing a popular company’s name.(Microsoft, 2012)

Page 18: Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your

A part of a computer virus that puts a harmful code in your computer (Search Security, 1998)

How to prevent a Trojan horse virus:- Don’t download anything from strangers- Make sure you know what a file is before opening it.- Don’t think you are safe because you have an antivirus software.

Page 19: Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your

Programs that can move across network connections. Similar to viruses but spread differently (Virusall.com, 1997).

Can be spread through the following applications:- Emails- Instant Messaging- Internet- File-sharing- IRC Worms

(Computer Worm, 2012)

Page 20: Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your

N/A (2012). No Title. Retrieved from www.dictionary.com Doyle, A. (2012). Top 10 social media do’s and don’ts. Retrieved from

http://jobsearch.about.com/od/onlinecareernetworking/tp/socialmediajobsearch.htm Stanford University Libraries (2012). What is fair use? Retrieved from

http://fairuse.stanford.edu/Copyright_and_Fair_Use_Overview/chapter9/9-a.html U.S. Copyright Office (2006). Copyright in general. Retrieved from

http://www.copyright.gov/help/faq/faq-general.html#what University of Maryland (2011). Copyright and fair use in the UMUC online face-to-face classroom.

Retrieved from http://www.umuc.edu/library/libhow/copyright.cfm#multimedia_types What is Plagiarism? (n.d.). Retrieved from http://www.plagiarism.org/ Suarez, J., Martin, A. (2001). Internet plagiarism: A teacher’s combat guide. Contemporary Issues in

Technology and Teach Education, 1(4). Retrieved from http://www.citejournal.org/vol1/iss4/currentpractice/article2.htm

Federal Trade Commission (n.d.) Fighting back against identity theft. Retrieved from http://www.ftc.gov/bcp/edu/microsites/idtheft//consumers/about-identity-theft.html

Reputation.com, Inc (2012) Take your free reputation snapshot. Retrieved from www.reputation.com Tech Parenting Group (2011). Tips for strong, secure passwords. Retrieved from

http://www.connectsafely.org/Safety-Tips/tips-to-create-and-manage-strong-passwords.html WiredKids, Inc (n.d.) STOP cyberbullying. Retrieved from

http://www.stopcyberbullying.org/index2.html The National Center for Victims of Crime (2011). Cyberstalking. Retrieved from

http://www.ncvc.org/ncvc/main.aspx?dbName=DocumentViewer&DocumentID=32458 Brian, M & Fenlon, W (2012). How computer viruses work. Retrieved from

http://www.howstuffworks.com/virus.htm Microsoft (2012). How to recognize phishing email messages, links, or phone calls. Retrieved from

http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx Search Security (1998). Trojan Horse Attacks. Retrieved from

http://www.irchelp.org/irchelp/security/trojan.html#prevent VIRUSALL.COM (1997). Information. Retrieved from

http://virusall.com/computer%20worms/worms.php Computer Worm (2012). What is a computer worm? Retrieved from http://computerworm.net/