Hot topic
Upcoming SlideShare
Loading in...5
×
 

Hot topic

on

  • 226 views

 

Statistics

Views

Total Views
226
Views on SlideShare
226
Embed Views
0

Actions

Likes
0
Downloads
1
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Hot topic Presentation Transcript

  • 1. WHAT’S THAT?
  • 2. NETIQUETTENET ETIQUETTEE orINTERNET ETIQUETTE– IS ASET OF SOCIALCONVENTIONS (RULES OFCONDUCT AND BEHAVIOR)THAT FACILITATEINTERACTIONS(communication) BETWEENPEOPLE OVER NETWORKS.(IE: EMAIL, BLOGS,FORUMS)
  • 3. 1) Spell check and proof 6) Don’t follow spamread everything links2) Do not use all caps, it’s 7) Be conservative inshouting email you send3) Tell the truth online 8) Do not send emailand in your profiles msgs late @ night4) Don’t do things you 9) Shop secure sites (TSL,wouldn’t do in reality SSL)5) Don’t flame or 10) Use discretion whenrespond sharing online Source: networketiquette.net/core_rules.html
  • 4.  KEEP MESSAGES SHORT & TO THE POINT USE ACCURATE SUBJECT LINES STICK TO THE TOPIC REMEMBER, TONE DOESN’T TRANSLATE WELL, USE EMOTICONS ()TO HELP CLARIFY YOUR TONE OR EMOTIONAL FRAME OF MIND
  • 5.  PERSONAL EMAIL  BUSINESS EMAIL  STUDENT NETIQUETTE  TEACHER NETIQUETTE ONLINE CLASS ETIQUETTE  COLLEGE NETIQUETTE
  • 6.  DON’T SHARE OTHERS ADDRESSES SEND IT IN PLAIN TEXT ASK BEFORE FORWARDING EMAIL IS NOT IMMEDIATE CHECK YOUR EMAIL REGULARLY ASK FOR CLARIFICATION DON’T ASSUME ANYTHING USE AN EMAIL SIGNATURE Networketiquette.net/personal_email.h tml
  • 7.  Follow company culture Work email belongs to work Use the out of office reply Always sign your messages Don’t spam Use proper salutations Use blue or black font, not red Check your email regularly Scan your inbox before replying networketiquette.net/professional_email.html
  • 8.  Give people a chance to respond Reminders are acceptable Acknowledge receipt Do not email jokes Don’t go above your supervisor Make your department look good networketiquette.net/professional_email.html
  • 9.  1) Ask permission 2) Use good conduct 3) Appropriate content 4) Don’t use your name 5) Keep your address private Source: networketiquette.net/studentk12.html
  • 10.  6) Don’t reveal your number 7) No chat rooms 8) School work only 9) Report bullies 10) Ask to email Source: networketiquette.net/studentk12.html
  • 11.  Don’t access other students files Don’t use another students login Don’t bring in media from outside the classroom (i.e. Cd’s floppy disks, or other removable drive/memory device) Students also should not teach their classmates what they know about the internet Source: networketiquette.net/studentk12.html
  • 12.  1) Always monitor students 2) Ensure age appropriate activity 3) Balance online activity 4) Zero tolerance for cyber bullies 5) Filter search engines Source: networketiquette.net/teachersk12.html
  • 13.  6) Listen to students 7) Partner with parents 8) Don’t post student pictures 9) Moderate all interaction 10) Display your internet rues Source: networketiquette.net/teachersk12.html
  • 14.  Show students how to use the internet Conduct a lesson on search engines for educational purposes Expose students to new places and cultures, illustrating the educational possibilities of the internet Awareness of cyber bullying should be taught before students move on to middle school Source: networketiquette.net/teachersk12.html
  • 15.  1) Do your homework 2) Participate in discussions 3) Be friendly 4) Do not digitally disrupt 5) Site credible sources Networketiquette.net/ecourse.html
  • 16.  6) Do not plagiarize 7) Use emoticons 8) It’s a public domain 9) Share your knowledge 10) Don’t be judgmental Networketiquette.net/ecourse.html
  • 17.  1) Respect opinions 2) Watch your tone 3) Avoid sarcasm 4) Post appropriate material 5) Stay on topic Source: networketiquette.net/college.html
  • 18.  6) Contribute frequently 7) Be forgiving/understanding 8) Don’t post jokes 9) Be culturally sensitive 10) Respect privacy Source: networketiquette.net/colloge.html
  • 19.  Your email identifies you as a student, as such when sending email remember you represent your college Email between students is generally informal – this is not an excuse, however for being mean, being a bully or negative in other ways When emailing professors use proper salutations, if your professor is a doctor address him/her as one. Close your email with your name, school, class and phone number Source: networketiquette.net/college.html
  • 20.  FLAMING – The act of posting or sending offensive messages over the internet through forums, newsgroups, email or instant messaging. Flaming occurs when people express their views or emotions without holding anything back SPAM – Spam is the use of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately
  • 21.  DON’TVENT YOUR FRUSTRATIONS ONFACEBOOK OR OTHERBLOGS, CHAT ROOMS ETC!!!
  • 22.  NEWARK, N.J. (AP) — A New Jersey administrative law judge has ruled that a first-grade teacher who wrote that she was a "warden for future criminals" on Facebook earlier this year should lose her tenured job. The state education commissioner now has 45 days to accept, reject or modify the decision regarding Jennifer OBrien. The Paterson teacher posted her remark to 333 friends on March 28. But it was forwarded and several parents saw it. OBriens lawyer, Nancy Oxfeld, tells The Record newspaper (http://bit.ly/v8ERLR) that her client will appeal the ruling, which was made public Tuesday. OBrien had testified that she wrote the post in exasperation because several students kept disrupting her lessons and one boy had recently hit her. But the judge called OBriens conduct "inexcusable."
  • 23.  http://news.yahoo.com/judge-facebook-post- cost-job-nj-teacher- 010230579.html?bouchon=501,ny http://en.wikipedia.org/wiki/Spam_(electron ic) http://www.networketiquette.net http://www.techterms.com/definition/flamin g
  • 24. By:Matt Lanzoni
  • 25.  Privacy in the classroom is ensuring the rights and information of students is not compromised. This can include personal information about the student regarding their residence, family, and/or educational records.
  • 26.  The Family Educational Rights and Privacy Act (FEPRA), 1974, mandates that schools must have either the student’s (they are 18) or their parents (if the student is not 18) permission prior to the disclosure of that student’s education records. This includes:  Discussion of the student’s behavior or grades with anyone other than the student.  School work with a grade posted on a bulletin board
  • 27.  Do not post personal information about students online, whether it is your professional website displaying student work or the school’s website. Do not give out personal information or education records to anyone without the consent of the student or their parent/guardian as well as notifying the school administration about the release of the information.
  • 28.  Most schools use a student login and password in order to log on to and use a school computer. Passwords should be longer than 6 characters and include both upper-case and lower-case numbers as well as numbers. Passwords should be changed often, especially if any nefarious activity is suspected. Make sure students log out of the computers when they are done using them.
  • 29.  With the increased use of Facebook and other social networking sites, it is important that students utilize safety precautions online as well. Remind students not to post personal information online as well as make their profile private so only their friends can view their information Once you put information online, it is out there and can be accessed or saved by anyone for any reason they want to.
  • 30.  Many teachers are now creating blogs or websites that their students can log into post questions or topics of discussion. If you intend to do this, you must be sure that:  In order to create an account, the site creator/administrator/manager (usually the teacher) has to authorize and allow it  Students do not need to give too much personal information such as their home address or any phone number.  You continually monitor the site to make sure that the site is being properly used and that there are no breaches in the privacy of the site.
  • 31.  More and more emphasis is being placed on student privacy and safety. Make sure to monitor student use of the computer to make sure they are not using it improperly. If a student’s information is obtained from a school’s website or from a school a school computer, it will ultimately fall on the school or even the teacher. To protect yourself and your job, make sure your students information is protected.
  • 32.  Astuto, Angela, et al. "Cyberethics: social ethics teaching in educational technology programs." Communication Research Trends 24.4 (2005): 3+. Academic OneFile. Web. 28 Nov. 2011. Berson, Ilene R., and Michael J. Berson. "Privileges, privacy, and protection of youth bloggers in the social studies classroom." Social Education 70.3 (2006): 124+. Academic OneFile. Web. 20 Nov. 2011. Dyrli, Odvard Egil. "Unwelcome visitors: spyware threatens privacy and wastes district technology resources. (The Online Edge)." District Administration July 2003: 49. Academic OneFile. Web. 20 Nov. 2011. Harris, F. (2010). Teens and privacy: Myths and realities. Knowledge Quest, 39(1), 74-79. Langendefer, J., & Miyazaki, A. (2009). Privacy in the information economy. The Journal of Consumer Affairs, 43(3), 380-388. Youn, S. (2009). Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. The Journal of Consumer Affairs, 43(3), 389-418.
  • 33.  1. What are three teacher netiquette rules? 2. What are three student netiquette rules? 3. What is flaming? 4. What constitutes a strong password? 5. What federal act guarantees a student’s privacy concerning their academic record? 6. What can you do as a teacher to ensure that properly use the school’s computers and that their information is safe?