16
DIGITAL CITIZENSHIP By: Kendra Payne

DIGITAL CITIZENSHIP By: Kendra Payne. NETIQUETTE Identify yourself: You should always identify yourself when communicating with others online. You should

Embed Size (px)

Citation preview

Page 1: DIGITAL CITIZENSHIP By: Kendra Payne. NETIQUETTE  Identify yourself: You should always identify yourself when communicating with others online. You should

DIGITAL CITIZENSHIPBy: Kendra Payne

Page 2: DIGITAL CITIZENSHIP By: Kendra Payne. NETIQUETTE  Identify yourself: You should always identify yourself when communicating with others online. You should

Roblyer, M., & Doering, A. (2013, July 21). Netiquette: Rules of Behavior on the

NETIQUETTE

Identify yourself: You should always identify yourself when communicating with others online. You should begin with a greeting and add a signature at the end that contains your identifying information.

Include a subject line: Reveal the subject of the email in the subject line rather than a generic greeting such as “hi.”

Avoid sarcasm: Understanding meaning of text is hard enough on the web. It is important to be clear and direct so that readers do not misunderstand your intentions.

Respect others' privacy: If someone sends you a personal email it is important not to forward it without the author’s permission.

Acknowledge and return messages promptly: It is important to let those who are emailing you know that you have received their message and to respond in a timely manner.

Copy with caution: Use caution when copying those in messages.

Page 3: DIGITAL CITIZENSHIP By: Kendra Payne. NETIQUETTE  Identify yourself: You should always identify yourself when communicating with others online. You should

Roblyer, M., & Doering, A. (2013, July 21). Netiquette: Rules of Behavior on the

NETIQUETTE (CONT’D)

No spam (a.k.a. junk mail): Do not continue chain letters by responding and do not forward those messages to others.

Be concise: Keep messages concise—about one screen, as a rule of thumb.

Use appropriate language: Do not be rude and make sure that you observe good grammar.

Use appropriate emoticons (emotion icons) to help convey meaning: Emoticons and smileys can be used to help convey emotions. See website list of emoticons at http://netlingo.com/smiley.cfm and http://www.robelle.com/smugbook/smiley.html.

Use appropriate intensifiers to help convey meaning”: Do not type in all caps. Use asterisk around words to show emphasis.

Page 4: DIGITAL CITIZENSHIP By: Kendra Payne. NETIQUETTE  Identify yourself: You should always identify yourself when communicating with others online. You should

10 Copyright Laws You Have To Know. (n.d.). Copyright Law. Retrieved June 3, 2014, from http://copyright.laws.com/copyright-law

COPYRIGHT LAWS

1. Legal Definition of copyright law: Copyrights are defined as “legally exclusive rights that are granted to the author or creator of a creative work.”

2. Works that can be copyrighted: There are some types of works that are eligible to be copyrighted. Among the types of works are: literary works and books, maps and charts, engravings, musical compositions and lyrics, dramatic works and choreography, photographs, paintings, drawings, sculptures, motion pictures, audiovisual works, computer software, architectural works, and sound recordings.

Page 5: DIGITAL CITIZENSHIP By: Kendra Payne. NETIQUETTE  Identify yourself: You should always identify yourself when communicating with others online. You should

10 Copyright Laws You Have To Know. (n.d.). Copyright Law. Retrieved June 3, 2014, from http://copyright.laws.com/copyright-law

COPYRIGHT LAWS (CONT’D)

3. Copyright terms or periods: It is important for users to be aware of the copyright protection limits in reference to time. Works created after January 1st, 1978 have a protection period in place for the life of the author, creator or owner of copyright plus 70 additional years after the date of the individual’s death. Anonymous works have a copyright term of 95 years from the date of its first publication.

4. First sale doctrine: The owner or creator of a copyrighted work may resell copies of copyrighted works that are obtained by legal means.

Page 6: DIGITAL CITIZENSHIP By: Kendra Payne. NETIQUETTE  Identify yourself: You should always identify yourself when communicating with others online. You should

10 Copyright Laws You Have To Know. (n.d.). Copyright Law. Retrieved June 3, 2014, from http://copyright.laws.com/copyright-law

COPYRIGHT LAWS (CONT’D)

5. Fair use: There are four factors that are considered as fair use:

The purpose for copying the work and overall intended use of the work

The nature or material content of the copyrighted work

How much of the copyrighted work is to be copied

How copying such work can impact the market value of the copyrighted work.

6. Copyright infringement: This law refers to the unauthorized use of copyrighted works. This includes the piracy of CDs, DVDs, and similar media.

Page 7: DIGITAL CITIZENSHIP By: Kendra Payne. NETIQUETTE  Identify yourself: You should always identify yourself when communicating with others online. You should

10 Copyright Laws You Have To Know. (n.d.). Copyright Law. Retrieved June 3, 2014, from http://copyright.laws.com/copyright-law

COPYRIGHT LAWS (CONT’D)

7. Public Domain: There are some works that are considered to be in the public domain thus not protected by copyright laws such as works by William Shakespeare and the physics formulas of Isaac Newton.

8. Berne convention for the protection of literary and artistic works: National Treatment means that a country will recognize the copyrights given to citizens of another nation as if such works were copyrighted within that particular country.

9. Idea-Expression Divide: An important facet of copyright laws that places a distinction of copyright protection from the expression of a particular idea versus the actual idea itself.

10. Poor man’s copyright: Copyright laws in the United States do not require that creative works to be registered in order to have copyright protection. Even though it is highly recommended to register all creative works, copyright laws grant protection to creative works upon their inception or creation. A Poor Man's Copyright is an alternative to registering a copyright and provides for a legal document establishing the creation of a created work as the sole property of the author or creator.

Page 8: DIGITAL CITIZENSHIP By: Kendra Payne. NETIQUETTE  Identify yourself: You should always identify yourself when communicating with others online. You should

10 Copyright Laws You Have To Know. (n.d.). Copyright Law. Retrieved June 3, 2014, from http://copyright.laws.com/copyright-law

FAIR USE

There are four factors that are considered when determining if works are available for fair use:

1. The purpose and character of the use, including whether such use is of commercial nature or is for nonprofit educational purposes

2. The nature of the copyrighted work

3. The amount and substantiality of the portion used in relation to the copyrighted work as a whole

4. The effect of the use upon the potential market for, or value of, the copyrighted work.

Page 9: DIGITAL CITIZENSHIP By: Kendra Payne. NETIQUETTE  Identify yourself: You should always identify yourself when communicating with others online. You should

Home. (n.d.). Plagiarism.org. Retrieved June 3, 2014, from http://www.plagiarism.org/

PLAGIARISM

According to the Merriam-Webster Online Dictionary, to "plagiarize" means

to steal and pass off (the ideas or words of another) as one's own

to use (another's production) without crediting the source

to commit literary theft

to present as new and original an idea or product derived from an existing source

Page 10: DIGITAL CITIZENSHIP By: Kendra Payne. NETIQUETTE  Identify yourself: You should always identify yourself when communicating with others online. You should

Home. (n.d.). Plagiarism.org. Retrieved June 3, 2014, from http://www.plagiarism.org/

PLAGIARISM (CONT’D)

www.plagiarism.org List the following as types of plagiarism:

turning in someone else's work as your own

copying words or ideas from someone else without giving credit

failing to put a quotation in quotation marks

giving incorrect information about the source of a quotation

changing words but copying the sentence structure of a source without giving credit

copying so many words or ideas from a source that it makes up the majority of your work, whether you give credit or not

Page 11: DIGITAL CITIZENSHIP By: Kendra Payne. NETIQUETTE  Identify yourself: You should always identify yourself when communicating with others online. You should

Safety Center â“ Google. (n.d.). Safety Center â“ Google. Retrieved � �June 3, 2014, from https://www.google.com/safetycenter/

SAFETY ON THE WEB

Google list factors that can help keep you and your family safe on the web:

Secure your passwords: Passwords are the gateway into all of your personal information. Make sure that you always choose a password that is safe and secure. Include different types of characters and change your passwords occasionally.

Signing in and out: Make sure that when signing in that you are familiar with the website and that it is indeed the site you are trying to access. Always sign out immediately after use on public computers.

Managing multiple accounts: Be careful when managing multiple accounts. Never use multiple accounts on public computers.

Page 12: DIGITAL CITIZENSHIP By: Kendra Payne. NETIQUETTE  Identify yourself: You should always identify yourself when communicating with others online. You should

Safety Center â“ Google. (n.d.). Safety Center â“ Google. Retrieved � �June 3, 2014, from https://www.google.com/safetycenter/

SAFETY ON THE WEB (CONT’D)

Check your settings: Settings allow you to choose different privacy features based on your preferences. This is especially useful when using social media.

Use secure networks: Make sure that you are connected via secure networks. Your data and personal information may be compromised if you are connected via an insecure network. Leave your WiFi off in unfamiliar areas to prevent connection to unsecure networks.

Lock your screen or device: Sensitive and personal information can be compromised if you leave your devices unlocked especially if your device is lost or stolen.

Page 13: DIGITAL CITIZENSHIP By: Kendra Payne. NETIQUETTE  Identify yourself: You should always identify yourself when communicating with others online. You should

Mitz. (2006, February 2). 10 Top Safety Computer Tips. Tips4pc. Retrieved June 2, 2014, from http://tips4pc.com/top_10_computer_tips/10-top-safety-computer-tips.htm

SAFETY ON YOUR COMPUTER

Safety Computer Tips #1: Use Anti-Virus Software: Anti-virus software protects your computer against viruses. Viruses can be spread through email, internet downloads, directly through the network, and USB disk drives.

Safety Computer Tips #2: Beware Downloading: Make sure that you only download things from a trusted site or program. Downloads are the easiest way for malware and viruses to be downloaded.

Safety Computer Tips #3: Don’t Trust Email

Be careful downloading attachments. Some emails can be taken over by hackers who send emails from your loved ones in order to get you to download links and attachments. Be careful entering passwords directly from links sent in emails. It is best to go directly to the website your are trying to enter through your browser.

Page 14: DIGITAL CITIZENSHIP By: Kendra Payne. NETIQUETTE  Identify yourself: You should always identify yourself when communicating with others online. You should

Mitz. (2006, February 2). 10 Top Safety Computer Tips. Tips4pc. Retrieved June 2, 2014, from http://tips4pc.com/top_10_computer_tips/10-top-safety-computer-tips.htm

SAFETY ON YOUR COMPUTER (CONT’D)

Safety Computer Tips #4: Investigate: At the first sign that there appears to be something wrong with your computer, investigate. Viruses can get bigger over time so it is important to try to stop them as soon as possible.

Is there something goofy about your computer? Is it running slow? Are you getting strange error

Safety Computer Tips #5: Restrict Administrative Access: Allow administrator access for only the person in the household that knows how to keep the computer safe.

Safety Computer Tips #6: Backup!

Keep your computer data safe by backing it up often. Losing all of your data can happen and it is best to have a method of recovery such as backup.

Page 15: DIGITAL CITIZENSHIP By: Kendra Payne. NETIQUETTE  Identify yourself: You should always identify yourself when communicating with others online. You should

Mitz. (2006, February 2). 10 Top Safety Computer Tips. Tips4pc. Retrieved June 2, 2014, from http://tips4pc.com/top_10_computer_tips/10-top-safety-computer-tips.htm

SAFETY ON YOUR COMPUTER

Safety Computer Tips #7: Different Sites, Different Passwords

Users should use different passwords for different accounts. If a user uses the same password for different accounts, it can lead to all of your accounts being compromised. A hacker can hack into your account and retrieve your account password for accounts that are not very secure and then use it to log into secure accounts such as bank accounts.

Safety Computer Tips #8: Firewall

Firewalls protect your computer from known virus attacks. It is usually user friendly and allows you to control programs that are blocked on your computer.

Page 16: DIGITAL CITIZENSHIP By: Kendra Payne. NETIQUETTE  Identify yourself: You should always identify yourself when communicating with others online. You should

REFERENCES:

Roblyer, M., & Doering, A. (2013, July 21). Netiquette: Rules of Behavior on the Internet. Education.com. Retrieved June 3, 2014, from

http://www.education.com/reference/article/netiquette-rules-behavior-internet/

10 Copyright Laws You Have To Know. (n.d.). Copyright Law. Retrieved June 3, 2014, from http://copyright.laws.com/copyright-law

Home. (n.d.). Plagiarism.org. Retrieved June 3, 2014, from http://www.plagiarism.org/

Safety Center â“ Google. (n.d.). � Safety Center â“ Google� . Retrieved June 3, 2014, from https://www.google.com/safetycenter/

Mitz. (2006, February 2). 10 Top Safety Computer Tips. Tips4pc. Retrieved June 2, 2014, from http://tips4pc.com/top_10_computer_tips/10-top-safety-computer-tips.htm