digital citizenship by lisa brackett ed 505. netiquette on social media sites what is it?...
DESCRIPTION
Netiquette Do List Identify yourself Include a subject line Respect others’ privacy Acknowledge and return messages promptly Copy with caution Be concise Use appropriate language Don’t List No spam (no junk mail) Avoid typing in all capital letters (screaming) Avoid sarcasmTRANSCRIPT
Digital Citizenship
By Lisa Brackett
ED 505
Netiquette on Social Media Sites
What is it?
“Netiquette is the etiquette guidelines that govern behavior when communicating on the Internet. It covers not only rules of behavior during discussions but also guidelines that reflect the unique electronic nature of the medium.”
NetiquetteDo List
• Identify yourself• Include a subject line• Respect others’ privacy• Acknowledge and return
messages promptly• Copy with caution• Be concise• Use appropriate
language
Don’t List• No spam (no junk
mail)• Avoid typing in all
capital letters (screaming)
• Avoid sarcasm
Copyright vs. Fair Use
CopyrightCopyright is a legal conception giving the inventor of an original work exclusive rights to it, usually for a restricted time.
Fair UseFair use is a restriction and exception to the exclusive right granted by copyright law to the author of a creative work. In the United States, fair use is a policy that permits limited use of copyrighted material without obtaining consent from the right owners.
Fair Use Rules for media, music, print, etc.
• The rules of fair use and copyright apply equally to non-textual material like images, speeches, and moving pictures.
• Music – 10% of the work or 30 seconds from an individual work
• Photos – 5 images or less from one artist or photographer
• Book – one graphic per book or periodical
• Poetry – limit direct quotes to 2 lines of poetry or 300 words of prose.
Plagiarism
The practice of taking someone else’s work or ideas and passing them off as one’s own. It can be avoided by ALWAYS making it clear where the information comes from …cite it!
Technology can help teachers recognize plagiarism. There are several plagiarism detection programs including Mydropbox.com and turnitin.com.
Safety on the Internet• Cyber bullying is the use of the internet and related technologies to
harm other people, in a deliberate, repeated, and hostile manner.• Cyber stalking is a crime in which the attacker harasses a victim
using electronic communications such as email or instant messaging, or messages posted to a website or discussion group.
• Reputation management can be monitored by websites that identify how many times your name has been positively searched. Negative comments are moved to the bottom of the list. Many people use social media to monitor reputations.
• Passwords should be kept in a secure place and revealed to no one.• Identities can be stolen. Therefore private information should be
kept private. Internet surfing should be done carefully.
Online? Never give out…
• full name• home address• phone number• Social Security number• passwords• names of family members• credit card numbers
Protection is the key!
Preventable Computer Safety Issues
• Viruses – programs written for malicious purposes. Trojan horses and worms are two types of viruses. They can be sent through email attachments and downloaded files.
• Phishing – Websites pretending to be reputable sources with the intent to steal passwords, credit card information, etc.
Ways to Prevent Problems
• Purchase and use antivirus software• Run updates on computer• Block spam email• Protect Wi-Fi with a password• Choose strong passwords• Back up information on an external hard drive
Bibliography
• www.cyberguards.com• http://kidshealth.org/teen/safety/safebasics/
internet_safety.html• www.met.police.uk/crimeprevention/computer.htm• Onlinerepmanagement.com/what-is-
reputationmanagement• Roblyer, M., Doering, A. (2010, 5th edition). Intergrating
education technology into teaching. Boston: Allyn & Bacon
• www.stopcyberbullying.org