Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Digital Citizenship

How to be a good citizen on the Internet.
by

Holly Wilks

on 4 September 2012

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Digital Citizenship

Digital Citizenship What It Means to Be Responsible on the Internet The Do's and Don'ts of Netiquette Netiquette on Social Media Sites How To Avoid It What's the Difference? Copyright and Fair Use Viruses Safety on Your Computer Safety on the Internet DO
1. Identify Yourself
2. Respect Other's Privacy
3. Copy With Caution
4.Be Concise
5. Use Appropriate Language DON'T
1. Use Sarcasm
2. Send Spam
3. Use All Caps
4. Participate In "Flaming"
5. Get Too Personal Plagiarism is taking someone else's work or ideas as your own. Netiquette can be defined as acceptable social behavior on the Internet. What is netiquette? It is acceptable, social behavior on the Internet. In order to avoid plagiarizing, simply give credit where credit is due. Here are a few tips:
Don't turn in someone else's work as your own.
Don't copy words or ideas without giving credit.
Always put quotation marks where needed.
Make sure you cite the source correctly.
Don't copy from a source and try to change a few words.
Try to avoid using too much of someone else's work even if you do cite.
("What Is Plagiarism?," 2012) Getting Wiser Now there are multiple resources available that educators can use to help identify plagiarism. One of these sources is online sites which allows educators to instantly compare student work with thousands of others for similarity and copying. Knowing this, students are more apt to provide original work. Click on each link to visit one of these plagiarism sites. ("What Is Plagiarism?," 2012) http://www.turnitin.com http://www.ithenticate.com/ https://www.writecheck.com/static/home.html What Are They? Copyright is a protection by law of a person's intellectual property from being reproduced, copied, or exploited.
Fair Use is a part of the copyright law which allows educators and students to use portions of copyrighted material for educational purposes. (Aufderheide, Hobbs, & Jaszi, 2012) Plagiarism Copyright is a protection to ensure that ideas are not stolen. Fair Use allows for others to use some of the copyrighted material to educate, create, and collaborate. (Aufderheide, Hobbs, & Jaszi, 2012) Phishing Trojan Horses Worms Viruses work by attaching themselves to existing programs and then replicating inside the source. When the source is sent, so is the virus. (Tanner, 2011) Unlike viruses, worms do not have to have an existing source to cause damage. They can access a network and send worms to other computer. Even if they do not cause damage, worms can take up valuable memory space. (Tanner, 2011) Phishing occurs when a fake message is sent to you that looks legitimate and asks for information that could be used to gain personal information from you. Sometimes just clicking on the link opens your computer up to phishing. (Tanner, 2011) Trojan Horses are computer programs that look desirable, but when downloaded reek havoc on a computer. Most of the time they are disguised as free downloads of a program. (Tanner, 2011) Safety on
the Internet Identity Theft Reputation Management Passwords Cyberbullying Cyberstalking Passwords are something that should not be taken lightly. They should not be based on personal information, because it makes it easier for hackers to crack into. Try using phrases and numbers with caps inserted to add a challenge. It is a good idea to change passwords monthly and remind children to never share them. (SafetyWeb, 2012a) Identity theft occurs when a person's personal information is stolen and used to cause damage. This can happen as a result of phishing, lack of anti virus software, online shopping, and sharing too much personal information on the Internet. (SafetyWeb, 2012a) An online reputation is how you are perceived or portrayed on various social media networks. This can be very harmful to a career, social life, and future if not taken seriously. Employers now use the Internet to search for potential employees. Something that happened years ago could keep someone from being hired. The repercussions of online activity should always be taken into consideration before being made public. (SafetyWeb, 2012d) cyberbullying is a growing problem in today's world of ubiquitous computing and hand held devices. Cyberbullying is simply bullying online and consists of threats of violence, harassment, impersonation, mental abuse, and any other forms of bullying. Cyberbullying can be done by individuals and groups and has very harmful effects. (SafetyWeb, 2012b) Cyberstalking is using technology to force unwanted communication that can lead to harassment. Cyberstalking can be done through the use of various technologies including: Global Positioning Devices, cameras, cell phones, recording devices, chat room, email, and etc. Cyberstalking should be taken seriously because it could potentially be dangerous. (SafetyWeb, 2012c) (Roblyer & Doering, 2010) library/libhow/copyright.cfm Reference No more than five images from the same source.
No more than 10% or 15 images from the same collection, whichever is less
("Copyright and fair use," 2011) Photographs Music should be no more than 30 seconds or 10% of entire work
Video should be no more than 10% or 3 minutes, whichever is less
These items should only be used for two years.
Students can use portions of multimedia in projects and present those projects.
("Copyright and fair use," 2011) Music/Video Print Items That May Be Used for a Limited Time in the Classroom:
Chapter from a book
Article from periodical or newspaper
Short story, essay, or poem.
Chart, graph, diagram, cartoon, or picture
Copies of poem 250 words or less
Items can only be used for up to 2 years.
("Copyright and fair use," 2011) Print material Even though Fair Use allows for the use of copyrighted material, all sources should still be cited and material should only be kept for two years.
You should avoid copying and using the same work again and again.
You should also avoid copying publications to prevent purchase of the source.
("Copyright and fair use," 2011) Fair Use Rules for Media It is okay to use verses from poetry as long as the total words of the excerpt do not exceed 2,500 words.

Special works should never be copied in their entirety.

No more than two pages or 10% of special works may be used.

Everything should still be cited.

("Copyright and fair use," 2011) Poetry Copyright and fair use in the umuc online or face-to-face classroom (2011, January 28). Retrieved from http://www.umuc.edu/
Full transcript