SlideShare a Scribd company logo
1 of 13
› Netiquette
› Copyright
› Fair Use
› Plagiarism
› Safety on the web
› Safety on your computer
 Netiquette is a set of guidelines to
encourage proper activity online.
 These guidelines or rules are needed to
prevent inappropriate interactions
online.
 Netiquette is useful for all internet users.
 The golden rule
 Have same behaviors online as in person
 Know where you are in cyberspace
 Respect others time and privacy
 Make yourself look good online
 Share expert knowledge
 Do not abuse internet power
 Copyright protects the author’s rights to
their original work.
 This protection is available for both
published and unpublished work.
 Items that are protected by copyright
include but are not limited to literacy,
dramatic, musical, and artistic.
 Reproduce copies
 Produce works
originated from or
influenced by the
work
 Choose to sale,
lease, or lend work
 Give permission to
be performed
 The purpose and character of the use,
including whether such use is of
commercial nature or is for nonprofit
educational purposes
 The nature of the copyrighted work
 The amount and substantiality of the
portion used in relation to the copyrighted
work as a whole
 The effect of the use upon the potential
market for, or value of, the copyrighted
work
 Plagiarism means to steal someone’s
ideas without giving proper credit.
 The expression of work is considered
intellectual property.
 Stealing another’s intellectual property is
against the U.S. law.
 Turning in someone else's work as your own
 Copying words or ideas from someone else
without giving credit
 Failing to put a quotation in quotation marks
 Giving incorrect information about the source
of a quotation
 Changing words but copying the sentence
structure of a source without giving credit
 Copying so many words or ideas from a source
that it makes up the majority of your work,
whether you give credit or not (see our section
on "fair use" rules)
 Cyber bullying
 Exposure to
inappropriate
material
 Online predators
 Revealing too much
personal information
 Children are at high
risk when internet use
is not under adult
supervision.
 Avoid Chat rooms
 Do not reveal too much person information
 Be aware of secure websites
 Keep computer in family room (for children)
 NEVER met someone in person that was
met online
 Use appropriate internet blocking resources
 Choose strong passwords
 Use secure connections
 Avoid pop-ups
 Visit secure websites
 Install
firewall/protective
software
 Backup important
information
 Stay informed
 Basic Internet Safety. (n.d.). Basic Internet Safety.
Retrieved June 3, 2014, from
http://www.netsmartz.org/internetsafety
 Copyright Basics. (2012, January 1). . Retrieved June 3,
2014, from http://www.copyright.gov/circs/circ01.pdf
 Shea, V. (2004, January 1). THE CORE RULES OF NETIQUETTE.
The Core Rules of Netiquette. Retrieved June 3, 2014, from
http://www.albion.com/netiquette/corerules.html
 Top Ten Safe Computing Tips. (n.d.). Information Systems &
Technology. Retrieved June 3, 2014, from
http://ist.mit.edu/security/tips
 U.S. Copyright Office - Fair Use. (n.d.). U.S. Copyright Office
- Fair Use. Retrieved June 3, 2014, from
http://www.copyright.gov/fls/fl102.html
 What is Plagiarism? (n.d.) Retrieved June 2, 2014, from
http://plagiarism.org/citing-sources/whats-a-citation

More Related Content

What's hot

cybersecurity and Bullying
cybersecurity and Bullying cybersecurity and Bullying
cybersecurity and Bullying Karthik Kumar
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online NetiquetteZoro18
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEAlminaVelasco
 
Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldAmae OlFato
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for childrenSaurav Jha
 
Bolo bhi-nust-stay-safe-online-
Bolo bhi-nust-stay-safe-online-Bolo bhi-nust-stay-safe-online-
Bolo bhi-nust-stay-safe-online-Sanasaleem2
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Moumita Chatterjee
 
recent trends in technology.pptx
recent trends in technology.pptxrecent trends in technology.pptx
recent trends in technology.pptxkeerthivemireddy
 
HIPAA Compliance For Emerging Technologies
HIPAA Compliance For Emerging TechnologiesHIPAA Compliance For Emerging Technologies
HIPAA Compliance For Emerging TechnologiesSynerzip
 
Cybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the RetaliationCybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the RetaliationPECB
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for studentsAkhil Nadh PC
 
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...Segun Ebenezer Olaniyan
 
Cybercrime
CybercrimeCybercrime
CybercrimeFraz Ali
 
CYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIACYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIAcharitha garimella
 

What's hot (20)

C3 and digital citizenship
C3 and digital citizenshipC3 and digital citizenship
C3 and digital citizenship
 
cybersecurity and Bullying
cybersecurity and Bullying cybersecurity and Bullying
cybersecurity and Bullying
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online Netiquette
 
Webgraphicorganizerkaur
WebgraphicorganizerkaurWebgraphicorganizerkaur
Webgraphicorganizerkaur
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
 
Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is Cyberworld
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
Bolo bhi-nust-stay-safe-online-
Bolo bhi-nust-stay-safe-online-Bolo bhi-nust-stay-safe-online-
Bolo bhi-nust-stay-safe-online-
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
recent trends in technology.pptx
recent trends in technology.pptxrecent trends in technology.pptx
recent trends in technology.pptx
 
HIPAA Compliance For Emerging Technologies
HIPAA Compliance For Emerging TechnologiesHIPAA Compliance For Emerging Technologies
HIPAA Compliance For Emerging Technologies
 
Cybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the RetaliationCybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the Retaliation
 
Technology to Mitigate Risk
Technology to Mitigate RiskTechnology to Mitigate Risk
Technology to Mitigate Risk
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIACYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIA
 

Viewers also liked

Viewers also liked (16)

Jobs comment about obama
Jobs comment about obamaJobs comment about obama
Jobs comment about obama
 
A429868
A429868A429868
A429868
 
PAX PERDIZES
PAX PERDIZESPAX PERDIZES
PAX PERDIZES
 
Administración general 1
Administración general 1Administración general 1
Administración general 1
 
Tinamen mountains
Tinamen mountainsTinamen mountains
Tinamen mountains
 
Aqua(rd) faire
Aqua(rd) faireAqua(rd) faire
Aqua(rd) faire
 
Pubmed Avançat [Guia d'ús]
Pubmed Avançat  [Guia d'ús]Pubmed Avançat  [Guia d'ús]
Pubmed Avançat [Guia d'ús]
 
Seúl III
Seúl IIISeúl III
Seúl III
 
Employability skills powerpoint
Employability skills powerpointEmployability skills powerpoint
Employability skills powerpoint
 
INTRODUCCION
INTRODUCCIONINTRODUCCION
INTRODUCCION
 
Lead based paint legislation
Lead based paint legislationLead based paint legislation
Lead based paint legislation
 
Playing test
Playing testPlaying test
Playing test
 
Sportingtips
SportingtipsSportingtips
Sportingtips
 
Connecting Classrooms - Projects
Connecting Classrooms - ProjectsConnecting Classrooms - Projects
Connecting Classrooms - Projects
 
Why to volunteer
Why to volunteerWhy to volunteer
Why to volunteer
 
Estudio EconóMico De Un Proyecto
Estudio EconóMico De Un ProyectoEstudio EconóMico De Un Proyecto
Estudio EconóMico De Un Proyecto
 

Similar to Digital citizenship Presentation

Digital citizenship project
Digital citizenship projectDigital citizenship project
Digital citizenship projectfig2381
 
Lesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety OnlineLesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety Onlinessuser9cd7f3
 
Issues with computers
Issues with computersIssues with computers
Issues with computersayerssaa
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
 
Educational Technology 1
Educational Technology 1Educational Technology 1
Educational Technology 1Angelica Vargas
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 
Rules of Netiquette.pptx
Rules of Netiquette.pptxRules of Netiquette.pptx
Rules of Netiquette.pptxPaulineMae5
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)Christopher Lisasi
 
Digital citizenship 1
Digital citizenship 1Digital citizenship 1
Digital citizenship 1rbyoung
 

Similar to Digital citizenship Presentation (20)

Digital citizenship project
Digital citizenship projectDigital citizenship project
Digital citizenship project
 
Digital citizenship project
Digital citizenship projectDigital citizenship project
Digital citizenship project
 
Lesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety OnlineLesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety Online
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Chapter8
Chapter8Chapter8
Chapter8
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
Educational Technology 1
Educational Technology 1Educational Technology 1
Educational Technology 1
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Rules of Netiquette.pptx
Rules of Netiquette.pptxRules of Netiquette.pptx
Rules of Netiquette.pptx
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
 
Digital citizenship 1
Digital citizenship 1Digital citizenship 1
Digital citizenship 1
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 

Digital citizenship Presentation

  • 1.
  • 2. › Netiquette › Copyright › Fair Use › Plagiarism › Safety on the web › Safety on your computer
  • 3.  Netiquette is a set of guidelines to encourage proper activity online.  These guidelines or rules are needed to prevent inappropriate interactions online.  Netiquette is useful for all internet users.
  • 4.  The golden rule  Have same behaviors online as in person  Know where you are in cyberspace  Respect others time and privacy  Make yourself look good online  Share expert knowledge  Do not abuse internet power
  • 5.  Copyright protects the author’s rights to their original work.  This protection is available for both published and unpublished work.  Items that are protected by copyright include but are not limited to literacy, dramatic, musical, and artistic.
  • 6.  Reproduce copies  Produce works originated from or influenced by the work  Choose to sale, lease, or lend work  Give permission to be performed
  • 7.  The purpose and character of the use, including whether such use is of commercial nature or is for nonprofit educational purposes  The nature of the copyrighted work  The amount and substantiality of the portion used in relation to the copyrighted work as a whole  The effect of the use upon the potential market for, or value of, the copyrighted work
  • 8.  Plagiarism means to steal someone’s ideas without giving proper credit.  The expression of work is considered intellectual property.  Stealing another’s intellectual property is against the U.S. law.
  • 9.  Turning in someone else's work as your own  Copying words or ideas from someone else without giving credit  Failing to put a quotation in quotation marks  Giving incorrect information about the source of a quotation  Changing words but copying the sentence structure of a source without giving credit  Copying so many words or ideas from a source that it makes up the majority of your work, whether you give credit or not (see our section on "fair use" rules)
  • 10.  Cyber bullying  Exposure to inappropriate material  Online predators  Revealing too much personal information  Children are at high risk when internet use is not under adult supervision.
  • 11.  Avoid Chat rooms  Do not reveal too much person information  Be aware of secure websites  Keep computer in family room (for children)  NEVER met someone in person that was met online  Use appropriate internet blocking resources  Choose strong passwords  Use secure connections
  • 12.  Avoid pop-ups  Visit secure websites  Install firewall/protective software  Backup important information  Stay informed
  • 13.  Basic Internet Safety. (n.d.). Basic Internet Safety. Retrieved June 3, 2014, from http://www.netsmartz.org/internetsafety  Copyright Basics. (2012, January 1). . Retrieved June 3, 2014, from http://www.copyright.gov/circs/circ01.pdf  Shea, V. (2004, January 1). THE CORE RULES OF NETIQUETTE. The Core Rules of Netiquette. Retrieved June 3, 2014, from http://www.albion.com/netiquette/corerules.html  Top Ten Safe Computing Tips. (n.d.). Information Systems & Technology. Retrieved June 3, 2014, from http://ist.mit.edu/security/tips  U.S. Copyright Office - Fair Use. (n.d.). U.S. Copyright Office - Fair Use. Retrieved June 3, 2014, from http://www.copyright.gov/fls/fl102.html  What is Plagiarism? (n.d.) Retrieved June 2, 2014, from http://plagiarism.org/citing-sources/whats-a-citation