SlideShare a Scribd company logo
1 of 28
Digital Citizenship



                  Jodi Leverett
                    ED 505
Netiquette on Social Media Sites
                What is “netiquette?
First of all, let’s break down the word
   “netiquette.”
Net is short for internet.
Etiquette is defined as conventional
   requirements as to social behavior.
Let’s put the two meanings together to define
   netiquette as the conventional
   requirements as to social behavior on the
   internet.
Simple terms: The way one should act on the
   internet.
How should one conduct himself or herself
        on social media sites?




  Social behavior is much the same as
           behavior in real life.
What to do:
• Be honest – don’t hide behind a computer
  (because it’s easy) and be someone that you
  aren’t.
• Respect everyone’s privacy – Don’t over indulge
  information about others.
• Fill out your online profiles completely with
  information about you and your business.
• Compose your posts, updates or tweets in a word
  processing document so you can check grammar
  and spelling before you send them.
• Check your “friends” and potential “friends” out
  before adding on social websites.
• Most importantly, be nice, but not overly nice to
  everyone that you come in contact with online.
What not to do:
• Do not approach strangers and ask them to be
  friends with you just so you can then try to sell
  them on your products or services.
• Do not turn social media into your own personal
  complaint forum.
• Do not update your status with every move that you
  make.
• Do not post pictures and status updates that you
  will regret later.
• Do not give into anger and post hurtful things that
  you will later regret.
Copyright and Fair Use
• Copyright is defined as the exclusive
  right to make copies, license, and
  otherwise exploit a literary, musical, or
  artistic work, whether
  printed, audio, video, etc.
• Fair use is defined as the conditions under
  which you can use material that is
  copyrighted by someone else without
  paying royalties.
Copyright
Copyright is different from fair use but both are related.
According to the United States Copyright Office, any
   material that is "reproduced, performed, publicly
   displayed, or made into a derivative work without
   permission" is an illegal violation of the rights of the
   copyright owner.
Copyright infringement gives the copyright owner the right to
   take legal action against anyone who has used their work
   illegally.
The owner of the copyright material has the right to
   determine if something is fair use. If it is not and used
   without permission then there has probably been a
   copyright infringement.
Fair Use
The fair use doctrine was devised by the courts to
  allow copyrighted material to be shared with the
  public in certain circumstances.
There are a set of factors that are used to determine if
  an instance of copyright infringement can be
  considered fair use.
   1) What is the intent of use?
  2) What is the original work – factual or creative?
  3) How much is taken?
  4) Will the use change the market value?
Plagiarism
Plagiarism is defined as an act or instance of
  using or closely imitating the language and
  thoughts of another author without
  authorization and the representation of
  that author's work as one's own, as by not
  crediting the original author .
So, basically, if someone uses someone
  else’s work without permission or citing
  they have stolen or plagiarized.
Plagiarism
In order to avoid plagiarism, one must cite or
   give credit to the original work or author.
A "citation" is the way you tell your readers
   that certain material in your work came
   from another source.
Giving credit to the original author by citing
   sources is the only way to use other
   people's work without plagiarizing.
Plagiarism and Technology
Technology today helps educators detect plagiarism.
  Educators can have their students turn
  assignments in through websites and programs
  such as turnitin.com, so that the assignments can
  be checked for plagiarizing.
Teachers can also google key phrases that they think
  may have came from somewhere else. If the
  phrase has been previously used it will show up in
  a search.
There are also a number of websites designed to
  check for plagiarism that allows phrases to be
  copied and pasted to detect for plagiarism.
Safety on the Internet
Identity Theft is defined occurs when
   someone uses your personally identifying
   information, like your name, Social
   Security number, or credit card
   number, without your permission, to
   commit fraud or other crimes.
How do thieves steal an identity?
    According to the Federal Trade commission….

•    Dumpster Diving. They rummage through trash looking for bills
     or other paper with your personal information on it.
•    Skimming. They steal credit/debit card numbers by using a
     special storage device when processing your card.
•    Phishing. They pretend to be financial institutions or companies
     and send spam or pop-up messages to get you to reveal your
     personal information.
•    Changing Your Address. They divert your billing statements to
     another location by completing a change of address form.
•    Old-Fashioned Stealing. They steal wallets and purses; mail,
     including bank and credit card statements; pre-approved credit
     offers; and new checks or tax information. They steal personnel
     records, or bribe employees who have access.
•    Pre-texting. They use false pretenses to obtain your personal
     information from financial institutions, telephone companies, and
     other sources.
Reputation Management
• Reputation management is the act of monitoring
  the reputation of an individual or brand, addressing
  contents which are damaging to it, and using
  customer feedback to gain insight or get early
  warning signals to reputation problems.
• Online reputation management is the practice of
  monitoring the Internet reputation of a
  person, brand or business, with the goal of
  emphasizing positive coverage rather than
  negative reviews or feedback.
Passwords
Most websites require you to sign up and login every
   time you use their site.
As a rule, it is not good to have all of your passwords
   the same in case your identity was stolen and
   someone could gain access to all of your accounts.
Great passwords are usually at least 8 characters, and
   includes letters, numbers, and symbols.
To keep your passwords safe it is a good rule of
   thumb to change them often.
Cyberbullying
Cyberbullying is defined as the act of
  harassing someone online by sending or
  posting mean messages, usually
  anonymously.
Examples of what constitutes cyberbullying
  include communications that seek to
  intimidate, control, manipulate, put
  down, falsely discredit, or humiliate the
  recipient. The actions are
  deliberate, repeated, and hostile and this
  behavior is intended to harm another.
Cyberstalking
• Cyberstalking is the use of the Internet or other
  electronic means to stalk or harass an individual, a
  group of individuals, or an organization.
• Examples can include false
  accusations, monitoring, making threats, identity
  theft, damage to data or equipment, the solicitation
  of minors for sex, or gathering information in order
  to harass.
• A cyberstalker may be an online stranger or a
  person whom the target knows and is considered a
  criminal offense.
Safety On Your Computer
Computers are susceptible to many harmful
  viruses, Trojan horses, and worms that
  can damage and possibly “kill” your
  computer.
Computer Virus
A virus is defined as a software program
  capable of reproducing itself and usually
  capable of causing great harm to files or
  other programs on the same computer.
Phishing
• Phishing is attempting to acquire
  information and sometimes, indirectly
  money, such as
  usernames, passwords, and credit card
  details by masquerading as a trustworthy
  entity in an electronic communication.
Trojan horses
• A Trojan horse is a program in which
  malicious or harmful code is contained
  inside apparently harmless programming
  or data in such a way that it can get control
  and do its chosen form of damage, such
  as ruining the file allocation table on your
  hard disk.
Worm
• A computer worm is a stand alone
  malware computer program that replicates
  itself in order to spread to other
  computers.
• Often, it uses a computer network to
  spread itself.
Safety On Your Computer
In order to protect computers from harmful
   intrusions one must keep all antivirus
   software updated, install security patches,
   use a firewall, secure your browser, secure
   your email and attachments, avoid person
   to person sharing and distributed file
   sharing.
A person must keep abreast of internet
   scams and don’t fall into online virus traps
   in order to be safe while online.
Works Cited
• Retrieved September 5,
  2012 from Dictionary.com. http://dictionary.referenc
  e.com/.
• Lydia Ramsey. (2012). Top 12 Rules of Social
  Media Etiquette. Retrieved September 5,
  2012 from http://www.businessknowhow.com/intern
  et/socialmedi aetiquette.htm .
• JR Raphael. (2012). The 10 Commandments of
  Social Media Etiquette. Retrieved September 5,
  2012 from PCWorld
  . http://www.pcworld.com/article/258898/the_10_co
  mma ndments_of_social_media_etiquette.html.
Works Cited
• Brenda Coleman. (2009). Fair Use and Copyright
  Infringement. Retrieved September 5,
  2012 from Media Literacy at Suite
  101. http://suite101.com/article/fair-use-and-
  copyright -infringement-a145845 .
• (2012). What is Citation? . Retrieved September 5,
  2012 from PlagiarismdotOrg. http://www.plagiarism.
  org/plag_article_what_is_cit ation.html .
• About Identity Theft . n.p. United States Federal
  Government. Retrieved September 5,
  2012 from PlagiarismdotOrg. http://www.ftc.gov/bcp
  /edu/microsites/idtheft/cons umers/about-identity-
  theft.html .
Works Cited
•  Reputation Management. n.p: Retrieved
  September 5,
  2012 from Wikipedia. http://en.wikipedia.org/wiki/R
  eputation_management .
•  Change Passwords. n.p: Retrieved September 5,
  2012 from Microsoft. http://www.microsoft.com/sec
  urity/online-privacy/p asswords-create.aspx .
• (2012). Cyberbullying. n.p: Retrieved September 5,
  2012 from Wikipedia. http://en.wikipedia.org/wiki/C
  yberbullying .
Works Cited
• Cyberstalking . n.p: Retrieved September
  5,
  2012 from Wikipedia. http://en.wikipedia.or
  g/wiki/Cyberstalking.
• n.p: Retrieved September 5,
  2012 from Princeton. http://www.wordnetw
  eb.princeton.edu/perl/webwn
• Phishing. n.p: Retrieved September 5,
  2012 from Wikipedia. http://en.wikipedia.or
  g/wiki/Phishing.
Works Cited
• What is a Trojan Horse? n.p: Retrieved
  September 5, 2012 from Tech
  Target. http://searchsecurity.techtarget.co
  m/definition/Trojan-horse .
• Mary Landesman. What is a Trojan
  Horse? n.p: Retrieved September 5,
  2012 from About.com. http://antivirus.abou
  t.com/od/securitytips/a/safet ytips.htm .
• n.p: http://www.animationfactory.com .

More Related Content

What's hot

Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012curlistl
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal informationZev Aidikoff
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social mediaAM Oh
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital IdentityDigital-identity
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rulesMazni Salleh
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethicsvincentl33
 
Digital citizenship project
Digital citizenship projectDigital citizenship project
Digital citizenship projectfig2381
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of InternetAreeb Khan
 
Digital dangers pp1
Digital dangers pp1Digital dangers pp1
Digital dangers pp1YanelysRuiz1
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligattBen Rothke
 
Ethical issues in Digital Identity
Ethical issues in Digital Identity Ethical issues in Digital Identity
Ethical issues in Digital Identity Digital-identity
 

What's hot (20)

Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social media
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital Identity
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
Digital citizenship project
Digital citizenship projectDigital citizenship project
Digital citizenship project
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Introduction to ethics 1
Introduction to ethics 1Introduction to ethics 1
Introduction to ethics 1
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Kinds of Cyber Crimes
Kinds of Cyber CrimesKinds of Cyber Crimes
Kinds of Cyber Crimes
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Digital dangers pp1
Digital dangers pp1Digital dangers pp1
Digital dangers pp1
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligatt
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyberbullying and Cybercrime
Cyberbullying and CybercrimeCyberbullying and Cybercrime
Cyberbullying and Cybercrime
 
Ethical issues in Digital Identity
Ethical issues in Digital Identity Ethical issues in Digital Identity
Ethical issues in Digital Identity
 

Similar to Digital Citizenship

Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsusxenhalo561
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxAarush59
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfExtremelyDarkness2
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in ComputingAnkit Malviya
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYFaMulan2
 
Living in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptxLiving in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptxFroilan Cantillo
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxSheenaAFuentes
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxsheena711714
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 
E-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptxE-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptxLeah Condina
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safetyjaenjenny
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxJoy Dugayo
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxBHUt6
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 

Similar to Digital Citizenship (20)

Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
Living in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptxLiving in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptx
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptx
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptx
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
E-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptxE-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptx
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptx
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
E commerce
E commerce E commerce
E commerce
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 

Recently uploaded

Quantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector CompaniesQuantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector Companiesprashantbhati354
 
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...Amil baba
 
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证rjrjkk
 
(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)twfkn8xj
 
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证jdkhjh
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfHenry Tapper
 
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACTGOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACTharshitverma1762
 
212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technologyz xss
 
2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGecko2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGeckoCoinGecko
 
Managing Finances in a Small Business (yes).pdf
Managing Finances  in a Small Business (yes).pdfManaging Finances  in a Small Business (yes).pdf
Managing Finances in a Small Business (yes).pdfmar yame
 
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...Amil Baba Dawood bangali
 
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》rnrncn29
 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...First NO1 World Amil baba in Faisalabad
 
The Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarThe Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarHarsh Kumar
 
Financial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and DisadvantagesFinancial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and Disadvantagesjayjaymabutot13
 
(办理学位证)美国加州州立大学东湾分校毕业证成绩单原版一比一
(办理学位证)美国加州州立大学东湾分校毕业证成绩单原版一比一(办理学位证)美国加州州立大学东湾分校毕业证成绩单原版一比一
(办理学位证)美国加州州立大学东湾分校毕业证成绩单原版一比一S SDS
 
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Sonam Pathan
 
Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithClassical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithAdamYassin2
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdfHenry Tapper
 
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Quantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector CompaniesQuantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector Companies
 
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
 
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
 
(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)
 
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
 
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACTGOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
 
212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology
 
2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGecko2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGecko
 
Managing Finances in a Small Business (yes).pdf
Managing Finances  in a Small Business (yes).pdfManaging Finances  in a Small Business (yes).pdf
Managing Finances in a Small Business (yes).pdf
 
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
 
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
 
The Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarThe Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh Kumar
 
Financial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and DisadvantagesFinancial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and Disadvantages
 
(办理学位证)美国加州州立大学东湾分校毕业证成绩单原版一比一
(办理学位证)美国加州州立大学东湾分校毕业证成绩单原版一比一(办理学位证)美国加州州立大学东湾分校毕业证成绩单原版一比一
(办理学位证)美国加州州立大学东湾分校毕业证成绩单原版一比一
 
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
 
Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithClassical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam Smith
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdf
 
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 

Digital Citizenship

  • 1. Digital Citizenship Jodi Leverett ED 505
  • 2. Netiquette on Social Media Sites What is “netiquette? First of all, let’s break down the word “netiquette.” Net is short for internet. Etiquette is defined as conventional requirements as to social behavior. Let’s put the two meanings together to define netiquette as the conventional requirements as to social behavior on the internet. Simple terms: The way one should act on the internet.
  • 3. How should one conduct himself or herself on social media sites? Social behavior is much the same as behavior in real life.
  • 4. What to do: • Be honest – don’t hide behind a computer (because it’s easy) and be someone that you aren’t. • Respect everyone’s privacy – Don’t over indulge information about others. • Fill out your online profiles completely with information about you and your business. • Compose your posts, updates or tweets in a word processing document so you can check grammar and spelling before you send them. • Check your “friends” and potential “friends” out before adding on social websites. • Most importantly, be nice, but not overly nice to everyone that you come in contact with online.
  • 5. What not to do: • Do not approach strangers and ask them to be friends with you just so you can then try to sell them on your products or services. • Do not turn social media into your own personal complaint forum. • Do not update your status with every move that you make. • Do not post pictures and status updates that you will regret later. • Do not give into anger and post hurtful things that you will later regret.
  • 6. Copyright and Fair Use • Copyright is defined as the exclusive right to make copies, license, and otherwise exploit a literary, musical, or artistic work, whether printed, audio, video, etc. • Fair use is defined as the conditions under which you can use material that is copyrighted by someone else without paying royalties.
  • 7. Copyright Copyright is different from fair use but both are related. According to the United States Copyright Office, any material that is "reproduced, performed, publicly displayed, or made into a derivative work without permission" is an illegal violation of the rights of the copyright owner. Copyright infringement gives the copyright owner the right to take legal action against anyone who has used their work illegally. The owner of the copyright material has the right to determine if something is fair use. If it is not and used without permission then there has probably been a copyright infringement.
  • 8. Fair Use The fair use doctrine was devised by the courts to allow copyrighted material to be shared with the public in certain circumstances. There are a set of factors that are used to determine if an instance of copyright infringement can be considered fair use. 1) What is the intent of use? 2) What is the original work – factual or creative? 3) How much is taken? 4) Will the use change the market value?
  • 9. Plagiarism Plagiarism is defined as an act or instance of using or closely imitating the language and thoughts of another author without authorization and the representation of that author's work as one's own, as by not crediting the original author . So, basically, if someone uses someone else’s work without permission or citing they have stolen or plagiarized.
  • 10. Plagiarism In order to avoid plagiarism, one must cite or give credit to the original work or author. A "citation" is the way you tell your readers that certain material in your work came from another source. Giving credit to the original author by citing sources is the only way to use other people's work without plagiarizing.
  • 11. Plagiarism and Technology Technology today helps educators detect plagiarism. Educators can have their students turn assignments in through websites and programs such as turnitin.com, so that the assignments can be checked for plagiarizing. Teachers can also google key phrases that they think may have came from somewhere else. If the phrase has been previously used it will show up in a search. There are also a number of websites designed to check for plagiarism that allows phrases to be copied and pasted to detect for plagiarism.
  • 12. Safety on the Internet Identity Theft is defined occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes.
  • 13. How do thieves steal an identity? According to the Federal Trade commission…. • Dumpster Diving. They rummage through trash looking for bills or other paper with your personal information on it. • Skimming. They steal credit/debit card numbers by using a special storage device when processing your card. • Phishing. They pretend to be financial institutions or companies and send spam or pop-up messages to get you to reveal your personal information. • Changing Your Address. They divert your billing statements to another location by completing a change of address form. • Old-Fashioned Stealing. They steal wallets and purses; mail, including bank and credit card statements; pre-approved credit offers; and new checks or tax information. They steal personnel records, or bribe employees who have access. • Pre-texting. They use false pretenses to obtain your personal information from financial institutions, telephone companies, and other sources.
  • 14. Reputation Management • Reputation management is the act of monitoring the reputation of an individual or brand, addressing contents which are damaging to it, and using customer feedback to gain insight or get early warning signals to reputation problems. • Online reputation management is the practice of monitoring the Internet reputation of a person, brand or business, with the goal of emphasizing positive coverage rather than negative reviews or feedback.
  • 15. Passwords Most websites require you to sign up and login every time you use their site. As a rule, it is not good to have all of your passwords the same in case your identity was stolen and someone could gain access to all of your accounts. Great passwords are usually at least 8 characters, and includes letters, numbers, and symbols. To keep your passwords safe it is a good rule of thumb to change them often.
  • 16. Cyberbullying Cyberbullying is defined as the act of harassing someone online by sending or posting mean messages, usually anonymously. Examples of what constitutes cyberbullying include communications that seek to intimidate, control, manipulate, put down, falsely discredit, or humiliate the recipient. The actions are deliberate, repeated, and hostile and this behavior is intended to harm another.
  • 17. Cyberstalking • Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. • Examples can include false accusations, monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information in order to harass. • A cyberstalker may be an online stranger or a person whom the target knows and is considered a criminal offense.
  • 18. Safety On Your Computer Computers are susceptible to many harmful viruses, Trojan horses, and worms that can damage and possibly “kill” your computer.
  • 19. Computer Virus A virus is defined as a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer.
  • 20. Phishing • Phishing is attempting to acquire information and sometimes, indirectly money, such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.
  • 21. Trojan horses • A Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk.
  • 22. Worm • A computer worm is a stand alone malware computer program that replicates itself in order to spread to other computers. • Often, it uses a computer network to spread itself.
  • 23. Safety On Your Computer In order to protect computers from harmful intrusions one must keep all antivirus software updated, install security patches, use a firewall, secure your browser, secure your email and attachments, avoid person to person sharing and distributed file sharing. A person must keep abreast of internet scams and don’t fall into online virus traps in order to be safe while online.
  • 24. Works Cited • Retrieved September 5, 2012 from Dictionary.com. http://dictionary.referenc e.com/. • Lydia Ramsey. (2012). Top 12 Rules of Social Media Etiquette. Retrieved September 5, 2012 from http://www.businessknowhow.com/intern et/socialmedi aetiquette.htm . • JR Raphael. (2012). The 10 Commandments of Social Media Etiquette. Retrieved September 5, 2012 from PCWorld . http://www.pcworld.com/article/258898/the_10_co mma ndments_of_social_media_etiquette.html.
  • 25. Works Cited • Brenda Coleman. (2009). Fair Use and Copyright Infringement. Retrieved September 5, 2012 from Media Literacy at Suite 101. http://suite101.com/article/fair-use-and- copyright -infringement-a145845 . • (2012). What is Citation? . Retrieved September 5, 2012 from PlagiarismdotOrg. http://www.plagiarism. org/plag_article_what_is_cit ation.html . • About Identity Theft . n.p. United States Federal Government. Retrieved September 5, 2012 from PlagiarismdotOrg. http://www.ftc.gov/bcp /edu/microsites/idtheft/cons umers/about-identity- theft.html .
  • 26. Works Cited • Reputation Management. n.p: Retrieved September 5, 2012 from Wikipedia. http://en.wikipedia.org/wiki/R eputation_management . • Change Passwords. n.p: Retrieved September 5, 2012 from Microsoft. http://www.microsoft.com/sec urity/online-privacy/p asswords-create.aspx . • (2012). Cyberbullying. n.p: Retrieved September 5, 2012 from Wikipedia. http://en.wikipedia.org/wiki/C yberbullying .
  • 27. Works Cited • Cyberstalking . n.p: Retrieved September 5, 2012 from Wikipedia. http://en.wikipedia.or g/wiki/Cyberstalking. • n.p: Retrieved September 5, 2012 from Princeton. http://www.wordnetw eb.princeton.edu/perl/webwn • Phishing. n.p: Retrieved September 5, 2012 from Wikipedia. http://en.wikipedia.or g/wiki/Phishing.
  • 28. Works Cited • What is a Trojan Horse? n.p: Retrieved September 5, 2012 from Tech Target. http://searchsecurity.techtarget.co m/definition/Trojan-horse . • Mary Landesman. What is a Trojan Horse? n.p: Retrieved September 5, 2012 from About.com. http://antivirus.abou t.com/od/securitytips/a/safet ytips.htm . • n.p: http://www.animationfactory.com .