2. Netiquette on Social Media Sites
What is “netiquette?
First of all, let’s break down the word
“netiquette.”
Net is short for internet.
Etiquette is defined as conventional
requirements as to social behavior.
Let’s put the two meanings together to define
netiquette as the conventional
requirements as to social behavior on the
internet.
Simple terms: The way one should act on the
internet.
3. How should one conduct himself or herself
on social media sites?
Social behavior is much the same as
behavior in real life.
4. What to do:
• Be honest – don’t hide behind a computer
(because it’s easy) and be someone that you
aren’t.
• Respect everyone’s privacy – Don’t over indulge
information about others.
• Fill out your online profiles completely with
information about you and your business.
• Compose your posts, updates or tweets in a word
processing document so you can check grammar
and spelling before you send them.
• Check your “friends” and potential “friends” out
before adding on social websites.
• Most importantly, be nice, but not overly nice to
everyone that you come in contact with online.
5. What not to do:
• Do not approach strangers and ask them to be
friends with you just so you can then try to sell
them on your products or services.
• Do not turn social media into your own personal
complaint forum.
• Do not update your status with every move that you
make.
• Do not post pictures and status updates that you
will regret later.
• Do not give into anger and post hurtful things that
you will later regret.
6. Copyright and Fair Use
• Copyright is defined as the exclusive
right to make copies, license, and
otherwise exploit a literary, musical, or
artistic work, whether
printed, audio, video, etc.
• Fair use is defined as the conditions under
which you can use material that is
copyrighted by someone else without
paying royalties.
7. Copyright
Copyright is different from fair use but both are related.
According to the United States Copyright Office, any
material that is "reproduced, performed, publicly
displayed, or made into a derivative work without
permission" is an illegal violation of the rights of the
copyright owner.
Copyright infringement gives the copyright owner the right to
take legal action against anyone who has used their work
illegally.
The owner of the copyright material has the right to
determine if something is fair use. If it is not and used
without permission then there has probably been a
copyright infringement.
8. Fair Use
The fair use doctrine was devised by the courts to
allow copyrighted material to be shared with the
public in certain circumstances.
There are a set of factors that are used to determine if
an instance of copyright infringement can be
considered fair use.
1) What is the intent of use?
2) What is the original work – factual or creative?
3) How much is taken?
4) Will the use change the market value?
9. Plagiarism
Plagiarism is defined as an act or instance of
using or closely imitating the language and
thoughts of another author without
authorization and the representation of
that author's work as one's own, as by not
crediting the original author .
So, basically, if someone uses someone
else’s work without permission or citing
they have stolen or plagiarized.
10. Plagiarism
In order to avoid plagiarism, one must cite or
give credit to the original work or author.
A "citation" is the way you tell your readers
that certain material in your work came
from another source.
Giving credit to the original author by citing
sources is the only way to use other
people's work without plagiarizing.
11. Plagiarism and Technology
Technology today helps educators detect plagiarism.
Educators can have their students turn
assignments in through websites and programs
such as turnitin.com, so that the assignments can
be checked for plagiarizing.
Teachers can also google key phrases that they think
may have came from somewhere else. If the
phrase has been previously used it will show up in
a search.
There are also a number of websites designed to
check for plagiarism that allows phrases to be
copied and pasted to detect for plagiarism.
12. Safety on the Internet
Identity Theft is defined occurs when
someone uses your personally identifying
information, like your name, Social
Security number, or credit card
number, without your permission, to
commit fraud or other crimes.
13. How do thieves steal an identity?
According to the Federal Trade commission….
• Dumpster Diving. They rummage through trash looking for bills
or other paper with your personal information on it.
• Skimming. They steal credit/debit card numbers by using a
special storage device when processing your card.
• Phishing. They pretend to be financial institutions or companies
and send spam or pop-up messages to get you to reveal your
personal information.
• Changing Your Address. They divert your billing statements to
another location by completing a change of address form.
• Old-Fashioned Stealing. They steal wallets and purses; mail,
including bank and credit card statements; pre-approved credit
offers; and new checks or tax information. They steal personnel
records, or bribe employees who have access.
• Pre-texting. They use false pretenses to obtain your personal
information from financial institutions, telephone companies, and
other sources.
14. Reputation Management
• Reputation management is the act of monitoring
the reputation of an individual or brand, addressing
contents which are damaging to it, and using
customer feedback to gain insight or get early
warning signals to reputation problems.
• Online reputation management is the practice of
monitoring the Internet reputation of a
person, brand or business, with the goal of
emphasizing positive coverage rather than
negative reviews or feedback.
15. Passwords
Most websites require you to sign up and login every
time you use their site.
As a rule, it is not good to have all of your passwords
the same in case your identity was stolen and
someone could gain access to all of your accounts.
Great passwords are usually at least 8 characters, and
includes letters, numbers, and symbols.
To keep your passwords safe it is a good rule of
thumb to change them often.
16. Cyberbullying
Cyberbullying is defined as the act of
harassing someone online by sending or
posting mean messages, usually
anonymously.
Examples of what constitutes cyberbullying
include communications that seek to
intimidate, control, manipulate, put
down, falsely discredit, or humiliate the
recipient. The actions are
deliberate, repeated, and hostile and this
behavior is intended to harm another.
17. Cyberstalking
• Cyberstalking is the use of the Internet or other
electronic means to stalk or harass an individual, a
group of individuals, or an organization.
• Examples can include false
accusations, monitoring, making threats, identity
theft, damage to data or equipment, the solicitation
of minors for sex, or gathering information in order
to harass.
• A cyberstalker may be an online stranger or a
person whom the target knows and is considered a
criminal offense.
18. Safety On Your Computer
Computers are susceptible to many harmful
viruses, Trojan horses, and worms that
can damage and possibly “kill” your
computer.
19. Computer Virus
A virus is defined as a software program
capable of reproducing itself and usually
capable of causing great harm to files or
other programs on the same computer.
20. Phishing
• Phishing is attempting to acquire
information and sometimes, indirectly
money, such as
usernames, passwords, and credit card
details by masquerading as a trustworthy
entity in an electronic communication.
21. Trojan horses
• A Trojan horse is a program in which
malicious or harmful code is contained
inside apparently harmless programming
or data in such a way that it can get control
and do its chosen form of damage, such
as ruining the file allocation table on your
hard disk.
22. Worm
• A computer worm is a stand alone
malware computer program that replicates
itself in order to spread to other
computers.
• Often, it uses a computer network to
spread itself.
23. Safety On Your Computer
In order to protect computers from harmful
intrusions one must keep all antivirus
software updated, install security patches,
use a firewall, secure your browser, secure
your email and attachments, avoid person
to person sharing and distributed file
sharing.
A person must keep abreast of internet
scams and don’t fall into online virus traps
in order to be safe while online.
24. Works Cited
• Retrieved September 5,
2012 from Dictionary.com. http://dictionary.referenc
e.com/.
• Lydia Ramsey. (2012). Top 12 Rules of Social
Media Etiquette. Retrieved September 5,
2012 from http://www.businessknowhow.com/intern
et/socialmedi aetiquette.htm .
• JR Raphael. (2012). The 10 Commandments of
Social Media Etiquette. Retrieved September 5,
2012 from PCWorld
. http://www.pcworld.com/article/258898/the_10_co
mma ndments_of_social_media_etiquette.html.
25. Works Cited
• Brenda Coleman. (2009). Fair Use and Copyright
Infringement. Retrieved September 5,
2012 from Media Literacy at Suite
101. http://suite101.com/article/fair-use-and-
copyright -infringement-a145845 .
• (2012). What is Citation? . Retrieved September 5,
2012 from PlagiarismdotOrg. http://www.plagiarism.
org/plag_article_what_is_cit ation.html .
• About Identity Theft . n.p. United States Federal
Government. Retrieved September 5,
2012 from PlagiarismdotOrg. http://www.ftc.gov/bcp
/edu/microsites/idtheft/cons umers/about-identity-
theft.html .
26. Works Cited
• Reputation Management. n.p: Retrieved
September 5,
2012 from Wikipedia. http://en.wikipedia.org/wiki/R
eputation_management .
• Change Passwords. n.p: Retrieved September 5,
2012 from Microsoft. http://www.microsoft.com/sec
urity/online-privacy/p asswords-create.aspx .
• (2012). Cyberbullying. n.p: Retrieved September 5,
2012 from Wikipedia. http://en.wikipedia.org/wiki/C
yberbullying .
27. Works Cited
• Cyberstalking . n.p: Retrieved September
5,
2012 from Wikipedia. http://en.wikipedia.or
g/wiki/Cyberstalking.
• n.p: Retrieved September 5,
2012 from Princeton. http://www.wordnetw
eb.princeton.edu/perl/webwn
• Phishing. n.p: Retrieved September 5,
2012 from Wikipedia. http://en.wikipedia.or
g/wiki/Phishing.
28. Works Cited
• What is a Trojan Horse? n.p: Retrieved
September 5, 2012 from Tech
Target. http://searchsecurity.techtarget.co
m/definition/Trojan-horse .
• Mary Landesman. What is a Trojan
Horse? n.p: Retrieved September 5,
2012 from About.com. http://antivirus.abou
t.com/od/securitytips/a/safet ytips.htm .
• n.p: http://www.animationfactory.com .