netiquette on social media sites copyright and fair use plagiarism safety on the internet safety on...

18
Digital Citizenship Project Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety on Your Computer

Upload: karen-sharp

Post on 21-Jan-2016

219 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety on Your Computer

Digital Citizenship Project

Netiquette on Social Media SitesCopyright and Fair Use

PlagiarismSafety on the Internet

Safety on Your Computer

Page 2: Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety on Your Computer

Definition- Netiquette, network etiquette, is the social code of the internet because the internet is a network and etiquette is a social code.

Do: Share in caring wayShare accurate informationCorrect mistakesShow LoveRespect privacyEverything in moderation

Don’t :LieHateCurseDisrespect

Netiquette on Social Media Sites

Page 3: Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety on Your Computer

Copyright is a form of protection found in the U.S. Constitution and granted by law for original works of authorship fixed in a tangible medium of expression. Copyright covers both published and unpublished works.

Fair Use: Fair use is a limitation and exception to the exclusive right granted by copyright law to the author of a creative work. In United States copyright law, fair use is a doctrine that permits limited use of copyrighted material without acquiring permission from the rights holders.

Difference between Copyright and Fair Use: Fair use is a doctrine that permits limited use of copyrighted material and copyright is a form of protection.

Copyright and Fair Use

Page 4: Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety on Your Computer

People have the right to use copyrighted material without permission or payment under some circumstances, especially when the cultural or social benefits of the use are predominant. The guidelines permit a teacher to make a copy of any of the

following: a chapter from a book; an article from a periodical or newspaper; a short story, short essay, or short poem; a chart, graph, diagram, drawing, cartoon, or picture from a book, periodical, or newspaper.

Teachers may copy articles to hand out to their class, but the guidelines have restrictions. Classroom copying cannot be used to replace texts or workbooks used in the classroom. Students cannot be charged more than the actual cost of photocopying. The number of copies cannot exceed more than one copy per pupil. And a notice of copyright must be attached to each copy.

Fair Use for Media-Print

Page 5: Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety on Your Computer

An individual can copy sheet music already purchased in an emergency for an impending performance if it is not available by any other means, as long as replacement copies are purchased as soon as possible following the performance.

For academic or research purposes, more than one copy of musical work excerpts can be made as long as these parts do not include a piece of the work that is performable, such as an entire movement or an aria of an opera. The amount copied cannot exceed 10% of the whole work and not more than one copy per student or per researcher. To add to this, as long as it is for academic use and not performance, a single copy of an entire part of a piece of music can be made as long as it has been confirmed to be out of print. This single copy can also be made for a teacher researching for a class.

Fair Use for Music

Page 6: Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety on Your Computer

For photographers, copyright is created at the click of the shutter.

The fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright.

Fair Use for photographs

Page 7: Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety on Your Computer

Copyright law has several features that permit quotations from copyrighted works without permission or payment, under certain conditions. Fair use is the most important of these features. It has been an important part of copyright law for more than 150 years. Where it applies, fair use is a right, not a mere privilege. In fact, as the Supreme Court has pointed out, fair use keeps copyright from violating the First Amendment. As copyright protects more works for longer periods than ever before, it makes new creation harder. As a result, fair use is more important today than ever before.

Fair Use for Video

Page 8: Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety on Your Computer

Quoting substantial portions of a work, in a poem, even for purposes of legitimate criticism, could be deemed unfair if buyers of the critique receive a copy of the entire poem without payment to the original author.

Fair Use for poetry

Page 9: Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety on Your Computer

When a writer purposely uses someone else's idea from an original piece of work.

How to avoid it: Ethical writers make every effort to acknowledge sources fully in accordance with the contexts and genres of their writing. A student who attempts to identify and credit his or her source, but who misuses a specific citation format or incorrectly uses quotation marks or other forms of identifying material taken from other sources, has not plagiarized. Instead, such a student should be considered to have failed to cite and document sources appropriately.

Plagiarism

Page 10: Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety on Your Computer

How to avoid it: Ethical writers make every effort to acknowledge sources fully and appropriately in accordance with the contexts and genres of their writing. A student who attempts (even if clumsily) to identify and credit his or her source, but who misuses a specific citation format or incorrectly uses quotation marks or other forms of identifying material taken from other sources, has not plagiarized. Instead, such a student should be considered to have failed to cite and document sources appropriately.

How to avoid plagiarism

Page 11: Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety on Your Computer

Teachers can type the work into a search engine such as Google and see if the work goes to a specific web site.

Ways technology helps teachers recognize and stop plagiarism:

Page 12: Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety on Your Computer

Identity Theft -Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud.

Safety on the Internet

Page 13: Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety on Your Computer

Reputation management is the monitoring of the Internet reputation of a person, brand or business, with the goal of emphasizing positive coverage rather than negative reviews or feedback. Doing reputation management for individuals is often referred to as online identity management (OIM), online image management, online personal branding or personal reputation management (PRM).

Safety on the InternetReputation Management

Page 14: Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety on Your Computer

Passwords are used all over the internet. With so many people needing a password for multiple places on their computer, many people have chose very easy passwords that are easily hacked.

“With only minimal effort, a hacker can gain access to one new account every second," said Amichai Shulman, a chief technical officer.

Safety on the Internet:Passwords

Page 15: Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety on Your Computer

Cyber bullying is the use of the Internet and related technologies to harm other people, in a deliberate, repeated, and hostile manner. As it has become more common in society, particularly among young people, legislation and awareness campaigns have arisen to combat it.

Examples of what constitutes cyber bullying include communications that seek to intimidate, control, manipulate, put down, falsely discredit, or humiliate the recipient. The actions are deliberate, repeated, and hostile behavior intended to harm another. Cyber bullying has been defined by The National Crime Prevention Council: “when the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person.[

Safety on The InternetCyber bulling

Page 16: Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety on Your Computer

Cyber stalking is the use of the Internet or other electronic ways to stalk or harass a person, a group of individuals, or an organization. It may include false accusations, monitoring, making threats, identity theft, damage to data or equipment.

Safety on the InternetCyber stalking

Page 17: Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety on Your Computer

Viruses: is a computer program that can replicate itself and spread from one computer to another.

Phishing: is attempting to acquire information (and sometimes, indirectly, money) such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication

Trojan horse: a type of malware that masquerades as a legitimate file or helpful program possibly with the purpose of granting a hacker unauthorized access to a computer.

Worms: a standalone malware computer program that replicates itself in order to spread to other computers.

Safety on your Computer

Page 18: Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety on Your Computer

Plagiarism. (n.d.) In Slide Share. Retrieved from http://www.slideshare.net/guestf17a2e/using-technology-to-detect-plagiarism-229376

Reputation Management. (n.d.) In Wikipedia. Retrieved from http://en.wikipedia.org/wiki/Reputation_management

Common Internet Words (n.d.) Retrieved from http://www.foxnews.com/tech/2010/01/26/common-internet-passwords/

Cyber bullying (n.d.) In Wikipedia . Retrieved from http://en.wikipedia.org/wiki/Cyberbullying

Cyber stalking (n.d.) In Wikipedia. Retrieved from http://en.wikipedia.org/wiki/Cyberstalking

Phishing. (n.d.) In Wikipedia. Retrieved from http://en.wikipedia.org/wiki/Phishing

Trojan Horse (n.d.) In Wikipedia. Retrieved from http://en.wikipedia.org/wiki/

Trojan_horse_(computing)

Work Citation