Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • The reference from could not be found on
  • Digitalcitizenproject

    1. 1. Jennifer Minor ED 505 Fall 2013
    2. 2. “Social Media Netiquette is the social code of using social media. This is how you say what you like to your friends” (Chiles, 2011).
    3. 3.  Be honest!  Don’t use hate but be positive.  Share information that is positive and can be helpful to others.  Do not curse or swear.  No digitally disrespecting others!  Make sure the information you share is accurate.  If you notice mistakes correct them.  Do not share information that is personal about others.  Do everything in moderation. (Chiles, 2011).
    4. 4. Copyright- “Copyright protects works such as poetry, movies, CD- ROMs, video games, videos, plays, paintings, sheet music, recorded music performances, novels, software code, sculptures, photographs, choreography and architectural designs” (Stim, 2010). Fair Use- “In its most general sense, a fair use is any copying of copyrighted material done for a limited and “transformative” purpose, such as to comment upon, criticize, or parody a copyrighted work” (Stim, 2010). .
    5. 5.  The difference between these two terms is copyright is a law that tell you what you can not do and fair use is a law that tells you that you can copy things for certain reasons.  Media can be copied for educational purposes. You must get permission if it’s not for education (Stim, 2010).
    6. 6.  Motion media, e.g., movies, film clips, excerpts from television shows, etc.:  Up to 10 percent of the total or three minutes, whichever is less.  Text material:  Up to 10 percent of the total or 1,000 words, whichever is less.  An entire poem of less than 250 words may be used, but no more than three poems by one poet or five poems by different authors in an anthology. For poems exceeding 250 words, 250 words should be used but no more than three excerpts from one poet or five excerpts from different poets in the same work (UMUC, 2011).
    7. 7.  Music, lyrics, and music video:  Up to 10 percent of the work but no more than 30 seconds of the music or lyrics from an individual musical work.  Illustrations or photographs:  No more than five images from one artist or photographer.  No more than 10% or 15 images, whichever is less, from a collection.  Numerical data sets:  Up to 10 percent or 2,500 fields or cell entries, whichever is less, from a copyrighted database or data table (UMUC, 2011).
    8. 8.  Plagiarism refers to using someone else’s work without giving them credit.  You can prevent plagiarizing by learning how to process information that you read- you will learn more this way instead of just copying something!  You can also prevent plagiarizing if you don’t procrastinate when working on projects. Give yourself enough time to research information.  There are several websites available such as that helps you see if you are plagiarizing ("Educational tips on," 2012).
    9. 9. Identity Theft: Identity theft or fraud refers to someone taking personal information from someone else (such as a banking account number or Social Security Number) and using that to make a profit. You can prevent this by protecting your personal information and shredding anything that has such information on it (Travis, 1998). Reputation Management: According to this term means “Activities performed by individual or organization which attempt to maintain or create a certain frame of mind regarding themselves in the public eye.” ("," 2012). Everyone should be careful about what they post on the internet because there is no way to really control what happens to the content in the future. An example of this would be a teenager posting a picture of himself partying and people that are friends with him on Facebook could share it. People would know this person by the images portrayed online. This can be a disadvantage to you if you are trying to get a job. Some employers search information about you online and you could lose a job offer on account of some scandalous picture (Travis, 1998).
    10. 10.  One way to stay on the internet is to have strong passwords for each and every account that you have. You want to prevent a hacker from getting into your accounts. Hackers have special dictionaries that they use to crack passwords. You can make strong passwords by giving it at least 8 characters. It should also not just be a common word. For example, don’t use the word sailboat. You could make it saliM0at with the o being a zero (, n.d.).
    11. 11. According to “"Cyberbullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones. It has to have a minor on both sides, or at least have been instigated by a minor against another minor.” The reasons kids become cyberbullies could be because of revenge or to try to be known as the “tough guy” (Aftab, 2011). Cyberstalking is pretty much the same thing as cyberbullying except it is adults that are the culprit and not children (Aftab, 2011). Cyberguards says that cyberstalking refers “…to the use of the Internet, e-mail, or other electronic communications devices to stalk another person” (CyberGuards, 2012).
    12. 12. Viruses: Viruses are things that attach themselves to other programs. When you run a program that has a virus the virus runs to. This virus will cause problems with the program. Some viruses can travel through one’s e-mail. It is important to protect your computer from such viruses by purchasing an anti-virus program for your computer (Brain, 2011). Trojan Horses: A trojan horse is a computer program that claims to be something it’s not. For example, it may say it is a game but when you run it it is actually a virus ready to wreak havoc on your computer (Brain, 2011).
    13. 13. Phishing: Phishing consists of websites, email messages, and phone calls that are set out to steal money. This is done by someone who has installed software on your computer that will steal personal information from you. Beware of emails that contain links, poor spelling, threats, or a graphic from a legitimate website. Also, do not provide personal information over the phone to an unknown source” ("Microsoft safety &," ). Worms: According to “A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.” (Brain, 2011).
    14. 14. Chiles, D. (2011, August 07). Netiquette. Retrieved from Stim, R. (2010). Copyright faqs. Retrieved from UMUC. (2011, Jan 28). University of maryland university college. Retrieved from Educational tips on plagiarism prevention . (2012). Retrieved from Travis, J. (1998, July). National criminal justice reference service. Retrieved from (2012, March 12). Retrieved from Aftab, P. (2011, March 05). What is cyberbullying, exactly?. Retrieved from CyberGuards. (2012). What is cyberstalking?. Retrieved from Brain, M. (2011). How stuff work. Retrieved from Microsoft safety & security center. (n.d.). Retrieved from privacy/phishing-symptoms.aspx