digital citizenship project amanda friscia university of west alabama ed 505--fall 2011 online
TRANSCRIPT
Digital Citizenship Project
Amanda FrisciaUniversity of West Alabama
ED 505--Fall 2011 Online
Netiquette on Social Media Sites
Definition of Netiquette
According to Doering and Roblyer, Netiquette
is, “the etiquette guidelines that govern
behavior when communicating on the
Internet” (220).
Netiquette Do’s and Don’ts
Do…Identify yourselfInclude a subject lineRespect other’s privacyAcknowledge and respond to messages in a timely mannerCopy with cautionBe conciseUse appropriate languageUse emoticons to convey meaning (happy, sad, etc…)Use appropriate intensifiersUse proper grammar and spelling
Don’t…Use sarcasm
Send or respond to spam
Use online “screaming” or all caps
Use profanity
Quote or forward personal email without author’s permission
Note: Adapted from Figure 7.10 on page 222 of Doering and Roblyer book
Copyright and Fair Use Definitions
Copyright Definition– According to the website Teaching Copyright, Copyright is, “A form of
legal protection given to the creators of ‘original works of authorship,’ including literary, dramatic, musical, and artistic works. U.S. copyright law generally gives the author of an original creative work an exclusive right to reproduce (copy) or distribute the original work to the public, create new works based upon the original work, and perform or display the work publicly.”
Fair Use Definition– According to the website Teaching Copyright, “Fair use allows people
other than the copyright owner to copy part or, in some circumstances, all of a copyrighted work, even where the copyright holder has not given permission or objects.”
Definitions courtesy of: http://www.teachingcopyright.org/
Copyright and Fair Use Difference
The difference between copyright and fair use is that
copyright protects the work’s original creator from anyone
using, reproducing, or copying the work without
permission. Fair use allows users to use the work without
the permission of the copyrighted owner, even though the
work has been copyrighted. The copyright is only valid for
a certain period of time and after that, the material is
subject to “fair use”.
Fair Use Rules for Media
Motion Media– Up to 10% or 3 minutes (whichever is less)
Print Material– Up to 10% or 1,000 words (whichever is less) Poetry
Music, Lyrics, and Music Videos– Up to 10% but no more than 30 seconds
Illustrations and Photos– No more than 5 images by one person– No more than 10% or 15 images from a single published work
Numerical Data Sets– Up to 10% or 2,500 fields/cell entries (whichever is less)
**All numbers are based on one single copyrighted piece**
Plagiarism
What it is…Plagiarism is passing off, claiming, or using someone else’s work as your own and not giving
due credit to the original creator.
How to Avoid it…Plagiarism can be avoided by:
Teaching students what plagiarism is, the rules of it, and why it is wrongUsing the internet and various sites to check work for authenticity and plagiarism.
Using Technology to Recognize and Stop it…Various internet sites will check submitted work for authenticity and plagiarism. Sites include:
www.turnitin.comwww.mydropbox.com
**Information derived from Doering & Roblyer book, Page 219**
Safety on the InternetIdentity Theft and Reputation Management
Identity Theft– Avoid giving sensitive and personal information on the internet– Be aware of where you are releasing sensitive information– Use strong passwords– Monitor your credit and banking
Reputation Management– Search yourself and be aware of what is on the internet about you– Anything you put on the internet can be viewed by others for any purpose– Explore your options to remove unwanted personal material, or anything
that can effect your reputation, from the internet (I.e. contacting the poster, contact the web administrator, etc…)
Safety on the InternetPasswords, Cyber bullying, and Cyber
stalking
Passwords– Choose strong passwords that are not easy to determine (use
upper and lower case letters, numbers, symbols, etc…)
Cyber bullying– Can be done through social networks, e-mail, chartrooms, using
cell phones, and on game consoles
– Repeated and unwanted harassment through one of the above mentioned technological tools and on the internet
Cyber stalking– Using the internet to stalk a person (similar to cyber bullying)
Safety on Your Computer
Viruses– Can be downloaded through visiting internet sites or attached to emails
Phishing– When an intruder sends a message, posing as a company or other
reputable source, asking for personal information
Trojan Horses– A program that depicts itself as one that the user wants but in reality, steals
all of your personal information
Worms– Worms can transfer information from your computers to others in mass
amounts
How to Protect Your Computer
Doering and Roblyer, page 219, Figure 7.8
Keep virus protection software up to date
Download only from reputable sites
Never open email attachments from unknown senders
Never open email attachments until you confirm their intent
References
Bakker, Connie. "Saying "yes" instead of "no"." LearnNC, 2000. Web. 8 Sept. 2011.<http://www.learnnc.org/lp/pages
/800?ref=search>.
Doering, Aaron H., and M D. Roblyer. Integrating educational technology into teaching. 5th ed. N.p.: Allyn & Bacon, 2010. 218-22. Print.
Microsoft safety and security center. Microsoft, 2011. Web. 8 Sept. 2011.<http://www.microsoft.com/security
/default.aspx>.
Teaching Copyright. Electronic Frontier Foundation, 2010. Web. 8 Sept. 2011. <www.teachingcopyright.org>.