digital citizenship lavern hollis ed 505 fall 1 2012

15
Digital Citizenship Lavern Hollis ED 505 Fall 1 2012

Upload: violet-rodgers

Post on 28-Dec-2015

217 views

Category:

Documents


2 download

TRANSCRIPT

Digital CitizenshipLavern Hollis

ED 505Fall 1 2012

Netquette:Etiquette for using the internet

Do List

Respect others in all your communications.

Keep e-mails brief and to the point.

Be sure to include a subject line.

Don’t List

Do not use all capital letters in messages-it is considered screaming at the recipient.

Do not send chain e-mails through your work e-mail.

Do not send overly long e-mails with unnecessary information.

Do not intentionally post untrue or inaccurate information about others.

Do not send inappropriate subject matter e-mails or photos to others.

Do not troll-post intentionally inflammatory comments to provoke reaction.

Do not ghoul- post graphic pictures of accidents or tragedies to hurt or offend viewers.

Copyright versus Fair Use

Copyright

The exclusive legal right to reproduce, publish, sell, or distribute most forms of something such as literary music as defined by Merrian-Webster dictionary.

Fair Use

Merrian-Webster defines fair use as “A legal doctrine that allows the use of copyrighted material without obtaining permission from the owner of the copyright if the use fits in with a certain set of guidelines”

The Columbia Copyright office explains the Fair Use factors as noted below: The purpose or reason you are using the material. The nature of the work or the particular type of

work being used. The amount or how much of the work you are

using. The effect of the use upon potential market value

or if the amount you are using is the amount of the work which is usually paid for.

Fair Use- Deciding Factors

Fair Use Guidelines

Fair Use in Media for Print Resources

A limited amount of a copyrighted material may be copied. One copy for teacher use or one copy for each student to use depending on the type of text such as textbook or magazine article.

Fair Use in Music

A small portion of a musical work or a copy of part of sheet music may be copied for educational reasons such as practice. This usually depends on the portion of the music copied and its relation to the music as a whole.

Fair Use Guidelines

Fair Use in Video

Videos can be imbedded in your project from sites such as YouTube or Vimeo if it has the embed option according to Edublogger’s copyright guide.

The amount of video that can be used varies according to factors such if a portion of a video clip is being copied or just shown for use of educational purposes.

Fair Use in Photography

The amount of photographs or illustrations being used and if they all come from the same work are factors that affect fair use in regards to photographs.

Fair Use for Poetry

Is dependent upon the length of the poem. Some poems may be copied once in their entirety while only excerpts may be copied from longer poems for educational purposes. In some cases a copy may be made for each student in the class.

Fair Use Guidelines

Plagiarism:Using the exact words, thoughts, or nearly exact words of another person in your writing and passing it off as your own without giving

the original author credit is known as plagiarism.

Avoiding plagiarism

Use in-text citations including quotation marks as needed to let the reader know you are using the words of another person.

When you paraphrase another person’s words, put it in your own words and do not just use synonyms to change a few of the words.

Properly cite the other people you used on you works cited or reference page.

Teacher recognition

Teachers use resources such as www.turn-it-in.com to help recognize and stop plagiarism.

This resources runs students turned in assignments against others in their databases for an originality score.

The originality scores allows teachers to see how much if any of your paper comes from previously turned in papers of other students or if it is directly copied from another source.

Safety on the Internet

Identity theft-a person assumes your identity in order to commit fraudulent acts. This can often be done on-line now. The person does things such as accessing your bank account and credit card information.

Identity thieves usually steal money from your account or make purchases in your name.

Most people are unaware of identity theft until they begin to receive the bills or get phone calls about past due bills.

Passwords- These are combinations of words and numbers that allow access to your accounts such as bank accounts, credit cards, and e-mail.

Passwords need to be kept confidential.

Passwords should be changed regularly.

Use a different password for each account.

Choose random sets of letters and numbers. Do not use easily guessed numbers and names such as birthdays, social security numbers, or home address.

Safety on the Internet

Cyber bullying -using the internet or other technological methods to threaten or intimidate another person. This can include social media pages devoted to hating a certain student or group of students or e-mails that threaten a person with being beaten or killed.

Teachers and parents can minimize cyber bullying by keeping the lines of communication open with youth and teens so they are not afraid to report it.

Cyber stalking- using the internet or other technological methods to stalk a person. This can include using webcams to spy on a person or setting up a phone to dial a person at random times to let them know you are watching them.

Reputation ManagementYour reputation can be ruined or called into question by comments or pictures you post on social networking sites such as Facebook, e-mails you send, or even your internet browsing history especially if this is done on your job.*Your reputation can also be ruined if others hack into your account and do damaging things while online in your name.*Reputations can be ruined deliberately as well when other people post compromising pictures of you or purposely spread false information about you.* Reputation management firms are now helping people to maintain or recover their reputation online.

Safety on the Internet

Safety on Your Computer

Viruses

A program that person or group writes to intentionally make computers “sick” which leads to poor performance, crashes, and loss of files .

Viruses replicate on other computers.

Infects other computers

Worms

A type of virus that does not directly harm the computers it is on but clogs up networks as it passes from one computer to another.

Safety on your Computer

Trojan Horses

A program that sometimes appears to be a useful download but is not.

Can make simple annoying changes such as to your desktop screen.

Can delete files and destroy important information on your system.

Can carry spyware which allows hackers access to your information.

Phishing

A type of scam that occurs through e-mails.

Sends official looking e-mails that appear to be from trusted sites.

Attempt to get information about credit cards or bank accounts.

Caution is needed to keep your identity and your computer needed.

Be cautious about downloading files and software to your computer.

Be cautious about putting in personal information. Order from reputable websites. Use a method such as PayPal for ordering on-line so that you do have to put in financial information and risk having it compromised.

Use a good anti-virus program, use anti-spyware, use a firewall, and use common sense. I

Safety on your Computer

www.businessknowhow.com/tips/virworm.htm http://copyright.columbia.edu/copyright/fair-use/fair-use-checklist www.cyberbullying.us www.indiana.edu/~wts/pamphlets/plagiarism.shtml www.tdbank.com/bank/preventingidtheft_online.html http://theedublogger.com/2012/02/09/the-educators-guide-to-copyright-fair-u

se-and-creative-commons www.webopedia.com/didyouLnow/Internet/2004/virus.asp

References