2. “Social Media Netiquette is the social code of
using social media. This is how you say what
you like to your friends” (Chiles, 2011).
3. Be honest!
Don’t use hate but be positive.
Share information that is positive and can be helpful to
others.
Do not curse or swear.
No digitally disrespecting others!
Make sure the information you share is accurate.
If you notice mistakes correct them.
Do not share information that is personal about others.
Do everything in moderation. (Chiles, 2011).
4. Copyright- “Copyright
protects works such as
poetry, movies, CD-
ROMs, video games,
videos, plays, paintings,
sheet music, recorded
music performances,
novels, software code,
sculptures,
photographs,
choreography and
architectural designs”
(Stim, 2010).
Fair Use- “In its most
general sense, a fair use
is any copying of
copyrighted material
done for a limited and
“transformative”
purpose, such as to
comment upon,
criticize, or parody a
copyrighted work”
(Stim, 2010).
.
5. The difference between these two terms is
copyright is a law that tell you what you can not
do and fair use is a law that tells you that you
can copy things for certain reasons.
Media can be copied for educational purposes.
You must get permission if it’s not for education
(Stim, 2010).
6. Motion media, e.g., movies, film clips, excerpts
from television shows, etc.:
Up to 10 percent of the total or three minutes,
whichever is less.
Text material:
Up to 10 percent of the total or 1,000 words,
whichever is less.
An entire poem of less than 250 words may be used,
but no more than three poems by one poet or five
poems by different authors in an anthology. For
poems exceeding 250 words, 250 words should be
used but no more than three excerpts from one poet
or five excerpts from different poets in the same
work (UMUC, 2011).
7. Music, lyrics, and music video:
Up to 10 percent of the work but no more than
30 seconds of the music or lyrics from an
individual musical work.
Illustrations or photographs:
No more than five images from one artist or
photographer.
No more than 10% or 15 images, whichever is
less, from a collection.
Numerical data sets:
Up to 10 percent or 2,500 fields or cell entries,
whichever is less, from a copyrighted database or
data table (UMUC, 2011).
8. Plagiarism refers to using
someone else’s work without
giving them credit.
You can prevent plagiarizing by
learning how to process
information that you read- you
will learn more this way instead
of just copying something!
You can also prevent plagiarizing
if you don’t procrastinate when
working on projects. Give
yourself enough time to research
information.
There are several websites
available such as turnitin.com
that helps you see if you are
plagiarizing ("Educational tips
on," 2012).
9.
10. Identity Theft:
Identity theft or fraud refers to someone
taking personal information from
someone else (such as a banking account
number or Social Security Number) and
using that to make a profit. You can
prevent this by protecting your personal
information and shredding anything that
has such information on it (Travis, 1998).
Reputation Management:
According to BusinessDictionary.com this
term means “Activities performed by
individual or organization which attempt
to maintain or create a certain frame of
mind regarding themselves in the public
eye.” ("Businessdictionary.com," 2012).
Everyone should be careful about what they
post on the internet because there is no
way to really control what happens to
the content in the future. An example of
this would be a teenager posting a
picture of himself partying and people
that are friends with him on Facebook
could share it. People would know this
person by the images portrayed online.
This can be a disadvantage to you if you
are trying to get a job. Some employers
search information about you online and
you could lose a job offer on account of
some scandalous picture (Travis, 1998).
11. One way to stay on the
internet is to have strong
passwords for each and every
account that you have. You
want to prevent a hacker
from getting into your
accounts. Hackers have
special dictionaries that they
use to crack passwords. You
can make strong passwords
by giving it at least 8
characters. It should also not
just be a common word. For
example, don’t use the word
sailboat. You could make it
saliM0at with the o being a
zero (vetspride.com, n.d.).
12. According to
www.stopcyberbullying.org
“"Cyberbullying" is when a child,
preteen or teen is tormented,
threatened, harassed,
humiliated, embarrassed or
otherwise targeted by another
child, preteen or teen using
the Internet, interactive and
digital technologies or mobile
phones. It has to have a minor
on both sides, or at least have
been instigated by a minor
against another minor.” The
reasons kids become
cyberbullies could be because
of revenge or to try to be
known as the “tough guy”
(Aftab, 2011).
Cyberstalking is pretty much the
same thing as cyberbullying
except it is adults that are the
culprit and not children (Aftab,
2011).
Cyberguards says that
cyberstalking refers “…to the
use of the Internet, e-mail, or
other electronic
communications devices to
stalk another person”
(CyberGuards, 2012).
13. Viruses:
Viruses are things that attach
themselves to other programs.
When you run a program that has
a virus the virus runs to. This
virus will cause problems with
the program. Some viruses can
travel through one’s e-mail. It is
important to protect your
computer from such viruses by
purchasing an anti-virus program
for your computer (Brain, 2011).
Trojan Horses:
A trojan horse is a computer
program that claims to be
something it’s not. For example,
it may say it is a game but when
you run it it is actually a virus
ready to wreak havoc on your
computer (Brain, 2011).
14. Phishing:
Phishing consists of websites, email
messages, and phone calls that
are set out to steal money. This
is done by someone who has
installed software on your
computer that will steal personal
information from you. Beware of
emails that contain links, poor
spelling, threats, or a graphic
from a legitimate website. Also,
do not provide personal
information over the phone to an
unknown source” ("Microsoft
safety &," ).
Worms:
According to howstuffworks.com
“A worm is a small piece of
software that uses computer
networks and security holes to
replicate itself. A copy of the
worm scans the network for
another machine that has a
specific security hole. It copies
itself to the new machine using
the security hole, and then starts
replicating from there, as well.”
(Brain, 2011).
15. Chiles, D. (2011, August 07). Netiquette. Retrieved from http://networketiquette.net/socmed.htm
Stim, R. (2010). Copyright faqs. Retrieved from
http://fairuse.stanford.edu/Copyright_and_Fair_Use_Overview/
UMUC. (2011, Jan 28). University of maryland university college. Retrieved from
http://www.umuc.edu/library/libhow/copyright.cfm
Educational tips on plagiarism prevention . (2012). Retrieved from http://www.plagiarism.org
Travis, J. (1998, July). National criminal justice reference service. Retrieved from
https://www.ncjrs.gov
Businessdictionary.com. (2012, March 12). Retrieved from http://www.businessdictionary.com
http://vetspride.com/message.php?name=password
Aftab, P. (2011, March 05). What is cyberbullying, exactly?. Retrieved from
http://www.stopcyberbullying.org
CyberGuards. (2012). What is cyberstalking?. Retrieved from
http://www.cyberguards.com/CyberStalking.html
Brain, M. (2011). How stuff work. Retrieved from http://www.howstuffworks.com/virus.htm
Microsoft safety & security center. (n.d.). Retrieved from http://www.microsoft.com/security/online-
privacy/phishing-symptoms.aspx
Hinweis der Redaktion
The reference from vetspride.com could not be found on citationmachine.net.