SlideShare uma empresa Scribd logo
1 de 28
Digital Citizenship



                  Jodi Leverett
                    ED 505
Netiquette on Social Media Sites
                What is “netiquette?
First of all, let’s break down the word
   “netiquette.”
Net is short for internet.
Etiquette is defined as conventional
   requirements as to social behavior.
Let’s put the two meanings together to define
   netiquette as the conventional
   requirements as to social behavior on the
   internet.
Simple terms: The way one should act on the
   internet.
How should one conduct himself or herself
        on social media sites?




  Social behavior is much the same as
           behavior in real life.
What to do:
• Be honest – don’t hide behind a computer
  (because it’s easy) and be someone that you
  aren’t.
• Respect everyone’s privacy – Don’t over indulge
  information about others.
• Fill out your online profiles completely with
  information about you and your business.
• Compose your posts, updates or tweets in a word
  processing document so you can check grammar
  and spelling before you send them.
• Check your “friends” and potential “friends” out
  before adding on social websites.
• Most importantly, be nice, but not overly nice to
  everyone that you come in contact with online.
What not to do:
• Do not approach strangers and ask them to be
  friends with you just so you can then try to sell
  them on your products or services.
• Do not turn social media into your own personal
  complaint forum.
• Do not update your status with every move that you
  make.
• Do not post pictures and status updates that you
  will regret later.
• Do not give into anger and post hurtful things that
  you will later regret.
Copyright and Fair Use
• Copyright is defined as the exclusive
  right to make copies, license, and
  otherwise exploit a literary, musical, or
  artistic work, whether
  printed, audio, video, etc.
• Fair use is defined as the conditions under
  which you can use material that is
  copyrighted by someone else without
  paying royalties.
Copyright
Copyright is different from fair use but both are related.
According to the United States Copyright Office, any
   material that is "reproduced, performed, publicly
   displayed, or made into a derivative work without
   permission" is an illegal violation of the rights of the
   copyright owner.
Copyright infringement gives the copyright owner the right to
   take legal action against anyone who has used their work
   illegally.
The owner of the copyright material has the right to
   determine if something is fair use. If it is not and used
   without permission then there has probably been a
   copyright infringement.
Fair Use
The fair use doctrine was devised by the courts to
  allow copyrighted material to be shared with the
  public in certain circumstances.
There are a set of factors that are used to determine if
  an instance of copyright infringement can be
  considered fair use.
   1) What is the intent of use?
  2) What is the original work – factual or creative?
  3) How much is taken?
  4) Will the use change the market value?
Plagiarism
Plagiarism is defined as an act or instance of
  using or closely imitating the language and
  thoughts of another author without
  authorization and the representation of
  that author's work as one's own, as by not
  crediting the original author .
So, basically, if someone uses someone
  else’s work without permission or citing
  they have stolen or plagiarized.
Plagiarism
In order to avoid plagiarism, one must cite or
   give credit to the original work or author.
A "citation" is the way you tell your readers
   that certain material in your work came
   from another source.
Giving credit to the original author by citing
   sources is the only way to use other
   people's work without plagiarizing.
Plagiarism and Technology
Technology today helps educators detect plagiarism.
  Educators can have their students turn
  assignments in through websites and programs
  such as turnitin.com, so that the assignments can
  be checked for plagiarizing.
Teachers can also google key phrases that they think
  may have came from somewhere else. If the
  phrase has been previously used it will show up in
  a search.
There are also a number of websites designed to
  check for plagiarism that allows phrases to be
  copied and pasted to detect for plagiarism.
Safety on the Internet
Identity Theft is defined occurs when
   someone uses your personally identifying
   information, like your name, Social
   Security number, or credit card
   number, without your permission, to
   commit fraud or other crimes.
How do thieves steal an identity?
    According to the Federal Trade commission….

•    Dumpster Diving. They rummage through trash looking for bills
     or other paper with your personal information on it.
•    Skimming. They steal credit/debit card numbers by using a
     special storage device when processing your card.
•    Phishing. They pretend to be financial institutions or companies
     and send spam or pop-up messages to get you to reveal your
     personal information.
•    Changing Your Address. They divert your billing statements to
     another location by completing a change of address form.
•    Old-Fashioned Stealing. They steal wallets and purses; mail,
     including bank and credit card statements; pre-approved credit
     offers; and new checks or tax information. They steal personnel
     records, or bribe employees who have access.
•    Pre-texting. They use false pretenses to obtain your personal
     information from financial institutions, telephone companies, and
     other sources.
Reputation Management
• Reputation management is the act of monitoring
  the reputation of an individual or brand, addressing
  contents which are damaging to it, and using
  customer feedback to gain insight or get early
  warning signals to reputation problems.
• Online reputation management is the practice of
  monitoring the Internet reputation of a
  person, brand or business, with the goal of
  emphasizing positive coverage rather than
  negative reviews or feedback.
Passwords
Most websites require you to sign up and login every
   time you use their site.
As a rule, it is not good to have all of your passwords
   the same in case your identity was stolen and
   someone could gain access to all of your accounts.
Great passwords are usually at least 8 characters, and
   includes letters, numbers, and symbols.
To keep your passwords safe it is a good rule of
   thumb to change them often.
Cyberbullying
Cyberbullying is defined as the act of
  harassing someone online by sending or
  posting mean messages, usually
  anonymously.
Examples of what constitutes cyberbullying
  include communications that seek to
  intimidate, control, manipulate, put
  down, falsely discredit, or humiliate the
  recipient. The actions are
  deliberate, repeated, and hostile and this
  behavior is intended to harm another.
Cyberstalking
• Cyberstalking is the use of the Internet or other
  electronic means to stalk or harass an individual, a
  group of individuals, or an organization.
• Examples can include false
  accusations, monitoring, making threats, identity
  theft, damage to data or equipment, the solicitation
  of minors for sex, or gathering information in order
  to harass.
• A cyberstalker may be an online stranger or a
  person whom the target knows and is considered a
  criminal offense.
Safety On Your Computer
Computers are susceptible to many harmful
  viruses, Trojan horses, and worms that
  can damage and possibly “kill” your
  computer.
Computer Virus
A virus is defined as a software program
  capable of reproducing itself and usually
  capable of causing great harm to files or
  other programs on the same computer.
Phishing
• Phishing is attempting to acquire
  information and sometimes, indirectly
  money, such as
  usernames, passwords, and credit card
  details by masquerading as a trustworthy
  entity in an electronic communication.
Trojan horses
• A Trojan horse is a program in which
  malicious or harmful code is contained
  inside apparently harmless programming
  or data in such a way that it can get control
  and do its chosen form of damage, such
  as ruining the file allocation table on your
  hard disk.
Worm
• A computer worm is a stand alone
  malware computer program that replicates
  itself in order to spread to other
  computers.
• Often, it uses a computer network to
  spread itself.
Safety On Your Computer
In order to protect computers from harmful
   intrusions one must keep all antivirus
   software updated, install security patches,
   use a firewall, secure your browser, secure
   your email and attachments, avoid person
   to person sharing and distributed file
   sharing.
A person must keep abreast of internet
   scams and don’t fall into online virus traps
   in order to be safe while online.
Works Cited
• Retrieved September 5,
  2012 from Dictionary.com. http://dictionary.referenc
  e.com/.
• Lydia Ramsey. (2012). Top 12 Rules of Social
  Media Etiquette. Retrieved September 5,
  2012 from http://www.businessknowhow.com/intern
  et/socialmedi aetiquette.htm .
• JR Raphael. (2012). The 10 Commandments of
  Social Media Etiquette. Retrieved September 5,
  2012 from PCWorld
  . http://www.pcworld.com/article/258898/the_10_co
  mma ndments_of_social_media_etiquette.html.
Works Cited
• Brenda Coleman. (2009). Fair Use and Copyright
  Infringement. Retrieved September 5,
  2012 from Media Literacy at Suite
  101. http://suite101.com/article/fair-use-and-
  copyright -infringement-a145845 .
• (2012). What is Citation? . Retrieved September 5,
  2012 from PlagiarismdotOrg. http://www.plagiarism.
  org/plag_article_what_is_cit ation.html .
• About Identity Theft . n.p. United States Federal
  Government. Retrieved September 5,
  2012 from PlagiarismdotOrg. http://www.ftc.gov/bcp
  /edu/microsites/idtheft/cons umers/about-identity-
  theft.html .
Works Cited
•  Reputation Management. n.p: Retrieved
  September 5,
  2012 from Wikipedia. http://en.wikipedia.org/wiki/R
  eputation_management .
•  Change Passwords. n.p: Retrieved September 5,
  2012 from Microsoft. http://www.microsoft.com/sec
  urity/online-privacy/p asswords-create.aspx .
• (2012). Cyberbullying. n.p: Retrieved September 5,
  2012 from Wikipedia. http://en.wikipedia.org/wiki/C
  yberbullying .
Works Cited
• Cyberstalking . n.p: Retrieved September
  5,
  2012 from Wikipedia. http://en.wikipedia.or
  g/wiki/Cyberstalking.
• n.p: Retrieved September 5,
  2012 from Princeton. http://www.wordnetw
  eb.princeton.edu/perl/webwn
• Phishing. n.p: Retrieved September 5,
  2012 from Wikipedia. http://en.wikipedia.or
  g/wiki/Phishing.
Works Cited
• What is a Trojan Horse? n.p: Retrieved
  September 5, 2012 from Tech
  Target. http://searchsecurity.techtarget.co
  m/definition/Trojan-horse .
• Mary Landesman. What is a Trojan
  Horse? n.p: Retrieved September 5,
  2012 from About.com. http://antivirus.abou
  t.com/od/securitytips/a/safet ytips.htm .
• n.p: http://www.animationfactory.com .

Mais conteúdo relacionado

Mais procurados

Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012
curlistl
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital Identity
Digital-identity
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
Mazni Salleh
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
rowenick
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
vincentl33
 
Digital citizenship project
Digital citizenship projectDigital citizenship project
Digital citizenship project
fig2381
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
Areeb Khan
 
Ethical issues in Digital Identity
Ethical issues in Digital Identity Ethical issues in Digital Identity
Ethical issues in Digital Identity
Digital-identity
 

Mais procurados (19)

Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social media
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital Identity
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
Digital citizenship project
Digital citizenship projectDigital citizenship project
Digital citizenship project
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Introduction to ethics 1
Introduction to ethics 1Introduction to ethics 1
Introduction to ethics 1
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Kinds of Cyber Crimes
Kinds of Cyber CrimesKinds of Cyber Crimes
Kinds of Cyber Crimes
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Digital dangers pp1
Digital dangers pp1Digital dangers pp1
Digital dangers pp1
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligatt
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyberbullying and Cybercrime
Cyberbullying and CybercrimeCyberbullying and Cybercrime
Cyberbullying and Cybercrime
 
Ethical issues in Digital Identity
Ethical issues in Digital Identity Ethical issues in Digital Identity
Ethical issues in Digital Identity
 

Semelhante a Digital Citizenship

wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
xenhalo561
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
ExtremelyDarkness2
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
MdRuga
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptx
sheena711714
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptx
Joy Dugayo
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
BHUt6
 

Semelhante a Digital Citizenship (20)

Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
Living in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptxLiving in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptx
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptx
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptx
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
E-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptxE-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptx
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptx
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
E commerce
E commerce E commerce
E commerce
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 

Último

MASTERING FOREX: STRATEGIES FOR SUCCESS.pdf
MASTERING FOREX: STRATEGIES FOR SUCCESS.pdfMASTERING FOREX: STRATEGIES FOR SUCCESS.pdf
MASTERING FOREX: STRATEGIES FOR SUCCESS.pdf
Cocity Enterprises
 

Último (20)

Bhubaneswar🌹Kalpana Mesuem ❤CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswa...
Bhubaneswar🌹Kalpana Mesuem  ❤CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswa...Bhubaneswar🌹Kalpana Mesuem  ❤CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswa...
Bhubaneswar🌹Kalpana Mesuem ❤CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswa...
 
Webinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumWebinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech Belgium
 
Fixed exchange rate and flexible exchange rate.pptx
Fixed exchange rate and flexible exchange rate.pptxFixed exchange rate and flexible exchange rate.pptx
Fixed exchange rate and flexible exchange rate.pptx
 
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
 
Strategic Resources May 2024 Corporate Presentation
Strategic Resources May 2024 Corporate PresentationStrategic Resources May 2024 Corporate Presentation
Strategic Resources May 2024 Corporate Presentation
 
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsMahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
✂️ 👅 Independent Bhubaneswar Escorts Odisha Call Girls With Room Bhubaneswar ...
✂️ 👅 Independent Bhubaneswar Escorts Odisha Call Girls With Room Bhubaneswar ...✂️ 👅 Independent Bhubaneswar Escorts Odisha Call Girls With Room Bhubaneswar ...
✂️ 👅 Independent Bhubaneswar Escorts Odisha Call Girls With Room Bhubaneswar ...
 
Turbhe Fantastic Escorts📞📞9833754194 Kopar Khairane Marathi Call Girls-Kopar ...
Turbhe Fantastic Escorts📞📞9833754194 Kopar Khairane Marathi Call Girls-Kopar ...Turbhe Fantastic Escorts📞📞9833754194 Kopar Khairane Marathi Call Girls-Kopar ...
Turbhe Fantastic Escorts📞📞9833754194 Kopar Khairane Marathi Call Girls-Kopar ...
 
GIFT City Overview India's Gateway to Global Finance
GIFT City Overview  India's Gateway to Global FinanceGIFT City Overview  India's Gateway to Global Finance
GIFT City Overview India's Gateway to Global Finance
 
Famous Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist i...
Famous Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist i...Famous Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist i...
Famous Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist i...
 
Female Russian Escorts Mumbai Call Girls-((ANdheri))9833754194-Jogeshawri Fre...
Female Russian Escorts Mumbai Call Girls-((ANdheri))9833754194-Jogeshawri Fre...Female Russian Escorts Mumbai Call Girls-((ANdheri))9833754194-Jogeshawri Fre...
Female Russian Escorts Mumbai Call Girls-((ANdheri))9833754194-Jogeshawri Fre...
 
Technology industry / Finnish economic outlook
Technology industry / Finnish economic outlookTechnology industry / Finnish economic outlook
Technology industry / Finnish economic outlook
 
Dubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai Multiple
Dubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai MultipleDubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai Multiple
Dubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai Multiple
 
Significant AI Trends for the Financial Industry in 2024 and How to Utilize Them
Significant AI Trends for the Financial Industry in 2024 and How to Utilize ThemSignificant AI Trends for the Financial Industry in 2024 and How to Utilize Them
Significant AI Trends for the Financial Industry in 2024 and How to Utilize Them
 
MASTERING FOREX: STRATEGIES FOR SUCCESS.pdf
MASTERING FOREX: STRATEGIES FOR SUCCESS.pdfMASTERING FOREX: STRATEGIES FOR SUCCESS.pdf
MASTERING FOREX: STRATEGIES FOR SUCCESS.pdf
 
Lion One Corporate Presentation May 2024
Lion One Corporate Presentation May 2024Lion One Corporate Presentation May 2024
Lion One Corporate Presentation May 2024
 
Pension dashboards forum 1 May 2024 (1).pdf
Pension dashboards forum 1 May 2024 (1).pdfPension dashboards forum 1 May 2024 (1).pdf
Pension dashboards forum 1 May 2024 (1).pdf
 
W.D. Gann Theory Complete Information.pdf
W.D. Gann Theory Complete Information.pdfW.D. Gann Theory Complete Information.pdf
W.D. Gann Theory Complete Information.pdf
 
Solution Manual For Financial Statement Analysis, 13th Edition By Charles H. ...
Solution Manual For Financial Statement Analysis, 13th Edition By Charles H. ...Solution Manual For Financial Statement Analysis, 13th Edition By Charles H. ...
Solution Manual For Financial Statement Analysis, 13th Edition By Charles H. ...
 
Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...
Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...
Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...
 

Digital Citizenship

  • 1. Digital Citizenship Jodi Leverett ED 505
  • 2. Netiquette on Social Media Sites What is “netiquette? First of all, let’s break down the word “netiquette.” Net is short for internet. Etiquette is defined as conventional requirements as to social behavior. Let’s put the two meanings together to define netiquette as the conventional requirements as to social behavior on the internet. Simple terms: The way one should act on the internet.
  • 3. How should one conduct himself or herself on social media sites? Social behavior is much the same as behavior in real life.
  • 4. What to do: • Be honest – don’t hide behind a computer (because it’s easy) and be someone that you aren’t. • Respect everyone’s privacy – Don’t over indulge information about others. • Fill out your online profiles completely with information about you and your business. • Compose your posts, updates or tweets in a word processing document so you can check grammar and spelling before you send them. • Check your “friends” and potential “friends” out before adding on social websites. • Most importantly, be nice, but not overly nice to everyone that you come in contact with online.
  • 5. What not to do: • Do not approach strangers and ask them to be friends with you just so you can then try to sell them on your products or services. • Do not turn social media into your own personal complaint forum. • Do not update your status with every move that you make. • Do not post pictures and status updates that you will regret later. • Do not give into anger and post hurtful things that you will later regret.
  • 6. Copyright and Fair Use • Copyright is defined as the exclusive right to make copies, license, and otherwise exploit a literary, musical, or artistic work, whether printed, audio, video, etc. • Fair use is defined as the conditions under which you can use material that is copyrighted by someone else without paying royalties.
  • 7. Copyright Copyright is different from fair use but both are related. According to the United States Copyright Office, any material that is "reproduced, performed, publicly displayed, or made into a derivative work without permission" is an illegal violation of the rights of the copyright owner. Copyright infringement gives the copyright owner the right to take legal action against anyone who has used their work illegally. The owner of the copyright material has the right to determine if something is fair use. If it is not and used without permission then there has probably been a copyright infringement.
  • 8. Fair Use The fair use doctrine was devised by the courts to allow copyrighted material to be shared with the public in certain circumstances. There are a set of factors that are used to determine if an instance of copyright infringement can be considered fair use. 1) What is the intent of use? 2) What is the original work – factual or creative? 3) How much is taken? 4) Will the use change the market value?
  • 9. Plagiarism Plagiarism is defined as an act or instance of using or closely imitating the language and thoughts of another author without authorization and the representation of that author's work as one's own, as by not crediting the original author . So, basically, if someone uses someone else’s work without permission or citing they have stolen or plagiarized.
  • 10. Plagiarism In order to avoid plagiarism, one must cite or give credit to the original work or author. A "citation" is the way you tell your readers that certain material in your work came from another source. Giving credit to the original author by citing sources is the only way to use other people's work without plagiarizing.
  • 11. Plagiarism and Technology Technology today helps educators detect plagiarism. Educators can have their students turn assignments in through websites and programs such as turnitin.com, so that the assignments can be checked for plagiarizing. Teachers can also google key phrases that they think may have came from somewhere else. If the phrase has been previously used it will show up in a search. There are also a number of websites designed to check for plagiarism that allows phrases to be copied and pasted to detect for plagiarism.
  • 12. Safety on the Internet Identity Theft is defined occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes.
  • 13. How do thieves steal an identity? According to the Federal Trade commission…. • Dumpster Diving. They rummage through trash looking for bills or other paper with your personal information on it. • Skimming. They steal credit/debit card numbers by using a special storage device when processing your card. • Phishing. They pretend to be financial institutions or companies and send spam or pop-up messages to get you to reveal your personal information. • Changing Your Address. They divert your billing statements to another location by completing a change of address form. • Old-Fashioned Stealing. They steal wallets and purses; mail, including bank and credit card statements; pre-approved credit offers; and new checks or tax information. They steal personnel records, or bribe employees who have access. • Pre-texting. They use false pretenses to obtain your personal information from financial institutions, telephone companies, and other sources.
  • 14. Reputation Management • Reputation management is the act of monitoring the reputation of an individual or brand, addressing contents which are damaging to it, and using customer feedback to gain insight or get early warning signals to reputation problems. • Online reputation management is the practice of monitoring the Internet reputation of a person, brand or business, with the goal of emphasizing positive coverage rather than negative reviews or feedback.
  • 15. Passwords Most websites require you to sign up and login every time you use their site. As a rule, it is not good to have all of your passwords the same in case your identity was stolen and someone could gain access to all of your accounts. Great passwords are usually at least 8 characters, and includes letters, numbers, and symbols. To keep your passwords safe it is a good rule of thumb to change them often.
  • 16. Cyberbullying Cyberbullying is defined as the act of harassing someone online by sending or posting mean messages, usually anonymously. Examples of what constitutes cyberbullying include communications that seek to intimidate, control, manipulate, put down, falsely discredit, or humiliate the recipient. The actions are deliberate, repeated, and hostile and this behavior is intended to harm another.
  • 17. Cyberstalking • Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. • Examples can include false accusations, monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information in order to harass. • A cyberstalker may be an online stranger or a person whom the target knows and is considered a criminal offense.
  • 18. Safety On Your Computer Computers are susceptible to many harmful viruses, Trojan horses, and worms that can damage and possibly “kill” your computer.
  • 19. Computer Virus A virus is defined as a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer.
  • 20. Phishing • Phishing is attempting to acquire information and sometimes, indirectly money, such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.
  • 21. Trojan horses • A Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk.
  • 22. Worm • A computer worm is a stand alone malware computer program that replicates itself in order to spread to other computers. • Often, it uses a computer network to spread itself.
  • 23. Safety On Your Computer In order to protect computers from harmful intrusions one must keep all antivirus software updated, install security patches, use a firewall, secure your browser, secure your email and attachments, avoid person to person sharing and distributed file sharing. A person must keep abreast of internet scams and don’t fall into online virus traps in order to be safe while online.
  • 24. Works Cited • Retrieved September 5, 2012 from Dictionary.com. http://dictionary.referenc e.com/. • Lydia Ramsey. (2012). Top 12 Rules of Social Media Etiquette. Retrieved September 5, 2012 from http://www.businessknowhow.com/intern et/socialmedi aetiquette.htm . • JR Raphael. (2012). The 10 Commandments of Social Media Etiquette. Retrieved September 5, 2012 from PCWorld . http://www.pcworld.com/article/258898/the_10_co mma ndments_of_social_media_etiquette.html.
  • 25. Works Cited • Brenda Coleman. (2009). Fair Use and Copyright Infringement. Retrieved September 5, 2012 from Media Literacy at Suite 101. http://suite101.com/article/fair-use-and- copyright -infringement-a145845 . • (2012). What is Citation? . Retrieved September 5, 2012 from PlagiarismdotOrg. http://www.plagiarism. org/plag_article_what_is_cit ation.html . • About Identity Theft . n.p. United States Federal Government. Retrieved September 5, 2012 from PlagiarismdotOrg. http://www.ftc.gov/bcp /edu/microsites/idtheft/cons umers/about-identity- theft.html .
  • 26. Works Cited • Reputation Management. n.p: Retrieved September 5, 2012 from Wikipedia. http://en.wikipedia.org/wiki/R eputation_management . • Change Passwords. n.p: Retrieved September 5, 2012 from Microsoft. http://www.microsoft.com/sec urity/online-privacy/p asswords-create.aspx . • (2012). Cyberbullying. n.p: Retrieved September 5, 2012 from Wikipedia. http://en.wikipedia.org/wiki/C yberbullying .
  • 27. Works Cited • Cyberstalking . n.p: Retrieved September 5, 2012 from Wikipedia. http://en.wikipedia.or g/wiki/Cyberstalking. • n.p: Retrieved September 5, 2012 from Princeton. http://www.wordnetw eb.princeton.edu/perl/webwn • Phishing. n.p: Retrieved September 5, 2012 from Wikipedia. http://en.wikipedia.or g/wiki/Phishing.
  • 28. Works Cited • What is a Trojan Horse? n.p: Retrieved September 5, 2012 from Tech Target. http://searchsecurity.techtarget.co m/definition/Trojan-horse . • Mary Landesman. What is a Trojan Horse? n.p: Retrieved September 5, 2012 from About.com. http://antivirus.abou t.com/od/securitytips/a/safet ytips.htm . • n.p: http://www.animationfactory.com .