SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Jennifer Minor
ED 505
Fall 2013
“Social Media Netiquette is the social code of
using social media. This is how you say what
you like to your friends” (Chiles, 2011).
 Be honest!
 Don’t use hate but be positive.
 Share information that is positive and can be helpful to
others.
 Do not curse or swear.
 No digitally disrespecting others!
 Make sure the information you share is accurate.
 If you notice mistakes correct them.
 Do not share information that is personal about others.
 Do everything in moderation. (Chiles, 2011).
Copyright- “Copyright
protects works such as
poetry, movies, CD-
ROMs, video games,
videos, plays, paintings,
sheet music, recorded
music performances,
novels, software code,
sculptures,
photographs,
choreography and
architectural designs”
(Stim, 2010).
Fair Use- “In its most
general sense, a fair use
is any copying of
copyrighted material
done for a limited and
“transformative”
purpose, such as to
comment upon,
criticize, or parody a
copyrighted work”
(Stim, 2010).
.
 The difference between these two terms is
copyright is a law that tell you what you can not
do and fair use is a law that tells you that you
can copy things for certain reasons.
 Media can be copied for educational purposes.
You must get permission if it’s not for education
(Stim, 2010).
 Motion media, e.g., movies, film clips, excerpts
from television shows, etc.:
 Up to 10 percent of the total or three minutes,
whichever is less.
 Text material:
 Up to 10 percent of the total or 1,000 words,
whichever is less.
 An entire poem of less than 250 words may be used,
but no more than three poems by one poet or five
poems by different authors in an anthology. For
poems exceeding 250 words, 250 words should be
used but no more than three excerpts from one poet
or five excerpts from different poets in the same
work (UMUC, 2011).
 Music, lyrics, and music video:
 Up to 10 percent of the work but no more than
30 seconds of the music or lyrics from an
individual musical work.
 Illustrations or photographs:
 No more than five images from one artist or
photographer.
 No more than 10% or 15 images, whichever is
less, from a collection.
 Numerical data sets:
 Up to 10 percent or 2,500 fields or cell entries,
whichever is less, from a copyrighted database or
data table (UMUC, 2011).
 Plagiarism refers to using
someone else’s work without
giving them credit.
 You can prevent plagiarizing by
learning how to process
information that you read- you
will learn more this way instead
of just copying something!
 You can also prevent plagiarizing
if you don’t procrastinate when
working on projects. Give
yourself enough time to research
information.
 There are several websites
available such as turnitin.com
that helps you see if you are
plagiarizing ("Educational tips
on," 2012).
Identity Theft:
Identity theft or fraud refers to someone
taking personal information from
someone else (such as a banking account
number or Social Security Number) and
using that to make a profit. You can
prevent this by protecting your personal
information and shredding anything that
has such information on it (Travis, 1998).
Reputation Management:
According to BusinessDictionary.com this
term means “Activities performed by
individual or organization which attempt
to maintain or create a certain frame of
mind regarding themselves in the public
eye.” ("Businessdictionary.com," 2012).
Everyone should be careful about what they
post on the internet because there is no
way to really control what happens to
the content in the future. An example of
this would be a teenager posting a
picture of himself partying and people
that are friends with him on Facebook
could share it. People would know this
person by the images portrayed online.
This can be a disadvantage to you if you
are trying to get a job. Some employers
search information about you online and
you could lose a job offer on account of
some scandalous picture (Travis, 1998).
 One way to stay on the
internet is to have strong
passwords for each and every
account that you have. You
want to prevent a hacker
from getting into your
accounts. Hackers have
special dictionaries that they
use to crack passwords. You
can make strong passwords
by giving it at least 8
characters. It should also not
just be a common word. For
example, don’t use the word
sailboat. You could make it
saliM0at with the o being a
zero (vetspride.com, n.d.).
According to
www.stopcyberbullying.org
“"Cyberbullying" is when a child,
preteen or teen is tormented,
threatened, harassed,
humiliated, embarrassed or
otherwise targeted by another
child, preteen or teen using
the Internet, interactive and
digital technologies or mobile
phones. It has to have a minor
on both sides, or at least have
been instigated by a minor
against another minor.” The
reasons kids become
cyberbullies could be because
of revenge or to try to be
known as the “tough guy”
(Aftab, 2011).
Cyberstalking is pretty much the
same thing as cyberbullying
except it is adults that are the
culprit and not children (Aftab,
2011).
Cyberguards says that
cyberstalking refers “…to the
use of the Internet, e-mail, or
other electronic
communications devices to
stalk another person”
(CyberGuards, 2012).
Viruses:
Viruses are things that attach
themselves to other programs.
When you run a program that has
a virus the virus runs to. This
virus will cause problems with
the program. Some viruses can
travel through one’s e-mail. It is
important to protect your
computer from such viruses by
purchasing an anti-virus program
for your computer (Brain, 2011).
Trojan Horses:
A trojan horse is a computer
program that claims to be
something it’s not. For example,
it may say it is a game but when
you run it it is actually a virus
ready to wreak havoc on your
computer (Brain, 2011).
Phishing:
Phishing consists of websites, email
messages, and phone calls that
are set out to steal money. This
is done by someone who has
installed software on your
computer that will steal personal
information from you. Beware of
emails that contain links, poor
spelling, threats, or a graphic
from a legitimate website. Also,
do not provide personal
information over the phone to an
unknown source” ("Microsoft
safety &," ).
Worms:
According to howstuffworks.com
“A worm is a small piece of
software that uses computer
networks and security holes to
replicate itself. A copy of the
worm scans the network for
another machine that has a
specific security hole. It copies
itself to the new machine using
the security hole, and then starts
replicating from there, as well.”
(Brain, 2011).
Chiles, D. (2011, August 07). Netiquette. Retrieved from http://networketiquette.net/socmed.htm
Stim, R. (2010). Copyright faqs. Retrieved from
http://fairuse.stanford.edu/Copyright_and_Fair_Use_Overview/
UMUC. (2011, Jan 28). University of maryland university college. Retrieved from
http://www.umuc.edu/library/libhow/copyright.cfm
Educational tips on plagiarism prevention . (2012). Retrieved from http://www.plagiarism.org
Travis, J. (1998, July). National criminal justice reference service. Retrieved from
https://www.ncjrs.gov
Businessdictionary.com. (2012, March 12). Retrieved from http://www.businessdictionary.com
http://vetspride.com/message.php?name=password
Aftab, P. (2011, March 05). What is cyberbullying, exactly?. Retrieved from
http://www.stopcyberbullying.org
CyberGuards. (2012). What is cyberstalking?. Retrieved from
http://www.cyberguards.com/CyberStalking.html
Brain, M. (2011). How stuff work. Retrieved from http://www.howstuffworks.com/virus.htm
Microsoft safety & security center. (n.d.). Retrieved from http://www.microsoft.com/security/online-
privacy/phishing-symptoms.aspx

Weitere ähnliche Inhalte

Was ist angesagt?

L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Bowhuis Group Ppt Draft5
Bowhuis Group Ppt Draft5Bowhuis Group Ppt Draft5
Bowhuis Group Ppt Draft5lisamulka
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullyingseswear9388
 
Ten commandments of computing
Ten commandments of computingTen commandments of computing
Ten commandments of computingMichael Jarata
 
Cyberbullying No27 2009 Laurence And Saad
Cyberbullying No27 2009 Laurence And SaadCyberbullying No27 2009 Laurence And Saad
Cyberbullying No27 2009 Laurence And Saadsbaluch1
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingdrogt1mm
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guidemjtheman
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
Legal PD - Cyberbullying
Legal PD - CyberbullyingLegal PD - Cyberbullying
Legal PD - Cyberbullyingjgrosenthal
 
Module 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review PaperModule 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review PaperMeghan.V
 
InfraGard Cyber Tips: October, 2015
InfraGard Cyber Tips: October, 2015InfraGard Cyber Tips: October, 2015
InfraGard Cyber Tips: October, 2015Ryan Renicker CFA
 
Investigation Of Media Law Online
Investigation Of Media Law OnlineInvestigation Of Media Law Online
Investigation Of Media Law Onlinebsteineck
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safetyConnectSafely
 
Digital media flipbook
Digital media flipbookDigital media flipbook
Digital media flipbookdanderson688
 
Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior Larry Magid
 

Was ist angesagt? (20)

cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Bowhuis Group Ppt Draft5
Bowhuis Group Ppt Draft5Bowhuis Group Ppt Draft5
Bowhuis Group Ppt Draft5
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullying
 
Ten commandments of computing
Ten commandments of computingTen commandments of computing
Ten commandments of computing
 
Cyberbullying No27 2009 Laurence And Saad
Cyberbullying No27 2009 Laurence And SaadCyberbullying No27 2009 Laurence And Saad
Cyberbullying No27 2009 Laurence And Saad
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Legal PD - Cyberbullying
Legal PD - CyberbullyingLegal PD - Cyberbullying
Legal PD - Cyberbullying
 
Module 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review PaperModule 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review Paper
 
InfraGard Cyber Tips: October, 2015
InfraGard Cyber Tips: October, 2015InfraGard Cyber Tips: October, 2015
InfraGard Cyber Tips: October, 2015
 
Investigation Of Media Law Online
Investigation Of Media Law OnlineInvestigation Of Media Law Online
Investigation Of Media Law Online
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safety
 
Digital media flipbook
Digital media flipbookDigital media flipbook
Digital media flipbook
 
Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior
 

Ähnlich wie Digitalcitizenproject

Digital citizenship project
Digital citizenship projectDigital citizenship project
Digital citizenship projectfig2381
 
Cyberspace
CyberspaceCyberspace
CyberspaceUtchi
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centurygracestearns
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centurygracestearns
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for childrenSaurav Jha
 
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...John Bambenek
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
How to protect yourself in e world?
How to protect yourself in e world? How to protect yourself in e world?
How to protect yourself in e world? Dipak Parmar
 
Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Termsmikel_l
 

Ähnlich wie Digitalcitizenproject (17)

Digital citizenship project
Digital citizenship projectDigital citizenship project
Digital citizenship project
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Cyber Essays
Cyber EssaysCyber Essays
Cyber Essays
 
Essay Topic Internet
Essay Topic InternetEssay Topic Internet
Essay Topic Internet
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_century
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_century
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
How to protect yourself in e world?
How to protect yourself in e world? How to protect yourself in e world?
How to protect yourself in e world?
 
Clear as FUD CCC eSentire PPT
Clear as FUD CCC eSentire PPTClear as FUD CCC eSentire PPT
Clear as FUD CCC eSentire PPT
 
Improve your writing
Improve your writingImprove your writing
Improve your writing
 
Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Terms
 
C 7
C 7C 7
C 7
 

Kürzlich hochgeladen

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Kürzlich hochgeladen (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

Digitalcitizenproject

  • 2. “Social Media Netiquette is the social code of using social media. This is how you say what you like to your friends” (Chiles, 2011).
  • 3.  Be honest!  Don’t use hate but be positive.  Share information that is positive and can be helpful to others.  Do not curse or swear.  No digitally disrespecting others!  Make sure the information you share is accurate.  If you notice mistakes correct them.  Do not share information that is personal about others.  Do everything in moderation. (Chiles, 2011).
  • 4. Copyright- “Copyright protects works such as poetry, movies, CD- ROMs, video games, videos, plays, paintings, sheet music, recorded music performances, novels, software code, sculptures, photographs, choreography and architectural designs” (Stim, 2010). Fair Use- “In its most general sense, a fair use is any copying of copyrighted material done for a limited and “transformative” purpose, such as to comment upon, criticize, or parody a copyrighted work” (Stim, 2010). .
  • 5.  The difference between these two terms is copyright is a law that tell you what you can not do and fair use is a law that tells you that you can copy things for certain reasons.  Media can be copied for educational purposes. You must get permission if it’s not for education (Stim, 2010).
  • 6.  Motion media, e.g., movies, film clips, excerpts from television shows, etc.:  Up to 10 percent of the total or three minutes, whichever is less.  Text material:  Up to 10 percent of the total or 1,000 words, whichever is less.  An entire poem of less than 250 words may be used, but no more than three poems by one poet or five poems by different authors in an anthology. For poems exceeding 250 words, 250 words should be used but no more than three excerpts from one poet or five excerpts from different poets in the same work (UMUC, 2011).
  • 7.  Music, lyrics, and music video:  Up to 10 percent of the work but no more than 30 seconds of the music or lyrics from an individual musical work.  Illustrations or photographs:  No more than five images from one artist or photographer.  No more than 10% or 15 images, whichever is less, from a collection.  Numerical data sets:  Up to 10 percent or 2,500 fields or cell entries, whichever is less, from a copyrighted database or data table (UMUC, 2011).
  • 8.  Plagiarism refers to using someone else’s work without giving them credit.  You can prevent plagiarizing by learning how to process information that you read- you will learn more this way instead of just copying something!  You can also prevent plagiarizing if you don’t procrastinate when working on projects. Give yourself enough time to research information.  There are several websites available such as turnitin.com that helps you see if you are plagiarizing ("Educational tips on," 2012).
  • 9.
  • 10. Identity Theft: Identity theft or fraud refers to someone taking personal information from someone else (such as a banking account number or Social Security Number) and using that to make a profit. You can prevent this by protecting your personal information and shredding anything that has such information on it (Travis, 1998). Reputation Management: According to BusinessDictionary.com this term means “Activities performed by individual or organization which attempt to maintain or create a certain frame of mind regarding themselves in the public eye.” ("Businessdictionary.com," 2012). Everyone should be careful about what they post on the internet because there is no way to really control what happens to the content in the future. An example of this would be a teenager posting a picture of himself partying and people that are friends with him on Facebook could share it. People would know this person by the images portrayed online. This can be a disadvantage to you if you are trying to get a job. Some employers search information about you online and you could lose a job offer on account of some scandalous picture (Travis, 1998).
  • 11.  One way to stay on the internet is to have strong passwords for each and every account that you have. You want to prevent a hacker from getting into your accounts. Hackers have special dictionaries that they use to crack passwords. You can make strong passwords by giving it at least 8 characters. It should also not just be a common word. For example, don’t use the word sailboat. You could make it saliM0at with the o being a zero (vetspride.com, n.d.).
  • 12. According to www.stopcyberbullying.org “"Cyberbullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones. It has to have a minor on both sides, or at least have been instigated by a minor against another minor.” The reasons kids become cyberbullies could be because of revenge or to try to be known as the “tough guy” (Aftab, 2011). Cyberstalking is pretty much the same thing as cyberbullying except it is adults that are the culprit and not children (Aftab, 2011). Cyberguards says that cyberstalking refers “…to the use of the Internet, e-mail, or other electronic communications devices to stalk another person” (CyberGuards, 2012).
  • 13. Viruses: Viruses are things that attach themselves to other programs. When you run a program that has a virus the virus runs to. This virus will cause problems with the program. Some viruses can travel through one’s e-mail. It is important to protect your computer from such viruses by purchasing an anti-virus program for your computer (Brain, 2011). Trojan Horses: A trojan horse is a computer program that claims to be something it’s not. For example, it may say it is a game but when you run it it is actually a virus ready to wreak havoc on your computer (Brain, 2011).
  • 14. Phishing: Phishing consists of websites, email messages, and phone calls that are set out to steal money. This is done by someone who has installed software on your computer that will steal personal information from you. Beware of emails that contain links, poor spelling, threats, or a graphic from a legitimate website. Also, do not provide personal information over the phone to an unknown source” ("Microsoft safety &," ). Worms: According to howstuffworks.com “A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.” (Brain, 2011).
  • 15. Chiles, D. (2011, August 07). Netiquette. Retrieved from http://networketiquette.net/socmed.htm Stim, R. (2010). Copyright faqs. Retrieved from http://fairuse.stanford.edu/Copyright_and_Fair_Use_Overview/ UMUC. (2011, Jan 28). University of maryland university college. Retrieved from http://www.umuc.edu/library/libhow/copyright.cfm Educational tips on plagiarism prevention . (2012). Retrieved from http://www.plagiarism.org Travis, J. (1998, July). National criminal justice reference service. Retrieved from https://www.ncjrs.gov Businessdictionary.com. (2012, March 12). Retrieved from http://www.businessdictionary.com http://vetspride.com/message.php?name=password Aftab, P. (2011, March 05). What is cyberbullying, exactly?. Retrieved from http://www.stopcyberbullying.org CyberGuards. (2012). What is cyberstalking?. Retrieved from http://www.cyberguards.com/CyberStalking.html Brain, M. (2011). How stuff work. Retrieved from http://www.howstuffworks.com/virus.htm Microsoft safety & security center. (n.d.). Retrieved from http://www.microsoft.com/security/online- privacy/phishing-symptoms.aspx

Hinweis der Redaktion

  1. The reference from vetspride.com could not be found on citationmachine.net.