2. NETIQUETTE
NET ETIQUETTEE or
INTERNET ETIQUETTE– IS A
SET OF SOCIAL
CONVENTIONS (RULES OF
CONDUCT AND BEHAVIOR)
THAT FACILITATE
INTERACTIONS
(communication) BETWEEN
PEOPLE OVER NETWORKS.
(IE: EMAIL, BLOGS,
FORUMS)
3. 1) Spell check and proof 6) Don’t follow spam
read everything links
2) Do not use all caps, it’s 7) Be conservative in
shouting email you send
3) Tell the truth online 8) Do not send email
and in your profiles msgs late @ night
4) Don’t do things you 9) Shop secure sites (TSL,
wouldn’t do in reality SSL)
5) Don’t flame or 10) Use discretion when
respond sharing online
Source:
networketiquette.net/core_rules.html
4. KEEP MESSAGES SHORT & TO THE POINT
USE ACCURATE SUBJECT LINES
STICK TO THE TOPIC
REMEMBER, TONE DOESN’T TRANSLATE
WELL, USE EMOTICONS ()TO HELP
CLARIFY YOUR TONE OR EMOTIONAL
FRAME OF MIND
5. PERSONAL EMAIL
BUSINESS EMAIL
STUDENT NETIQUETTE
TEACHER NETIQUETTE
ONLINE CLASS ETIQUETTE
COLLEGE NETIQUETTE
6. DON’T SHARE OTHERS ADDRESSES
SEND IT IN PLAIN TEXT
ASK BEFORE FORWARDING
EMAIL IS NOT IMMEDIATE
CHECK YOUR EMAIL REGULARLY
ASK FOR CLARIFICATION
DON’T ASSUME ANYTHING
USE AN EMAIL SIGNATURE
Networketiquette.net/personal_email.h
tml
7. Follow company culture
Work email belongs to work
Use the out of office reply
Always sign your messages
Don’t spam
Use proper salutations
Use blue or black font, not red
Check your email regularly
Scan your inbox before replying
networketiquette.net/professional_email.html
8. Give people a chance to respond
Reminders are acceptable
Acknowledge receipt
Do not email jokes
Don’t go above your supervisor
Make your department look good
networketiquette.net/professional_email.html
9. 1) Ask permission
2) Use good conduct
3) Appropriate content
4) Don’t use your name
5) Keep your address private
Source:
networketiquette.net/studentk12.html
10. 6) Don’t reveal your number
7) No chat rooms
8) School work only
9) Report bullies
10) Ask to email
Source:
networketiquette.net/studentk12.html
11. Don’t access other students files
Don’t use another students login
Don’t bring in media from outside the
classroom (i.e. Cd’s floppy disks, or other
removable drive/memory device)
Students also should not teach their classmates
what they know about the internet
Source:
networketiquette.net/studentk12.html
12. 1) Always monitor students
2) Ensure age appropriate activity
3) Balance online activity
4) Zero tolerance for cyber bullies
5) Filter search engines
Source:
networketiquette.net/teachersk12.html
13. 6) Listen to students
7) Partner with parents
8) Don’t post student pictures
9) Moderate all interaction
10) Display your internet rues
Source:
networketiquette.net/teachersk12.html
14. Show students how to use the internet
Conduct a lesson on search engines for
educational purposes
Expose students to new places and cultures,
illustrating the educational possibilities of the
internet
Awareness of cyber bullying should be taught
before students move on to middle school
Source:
networketiquette.net/teachersk12.html
15. 1) Do your homework
2) Participate in discussions
3) Be friendly
4) Do not digitally disrupt
5) Site credible sources
Networketiquette.net/ecourse.html
16. 6) Do not plagiarize
7) Use emoticons
8) It’s a public domain
9) Share your knowledge
10) Don’t be judgmental
Networketiquette.net/ecourse.html
17. 1) Respect opinions
2) Watch your tone
3) Avoid sarcasm
4) Post appropriate material
5) Stay on topic
Source:
networketiquette.net/college.html
18. 6) Contribute frequently
7) Be forgiving/understanding
8) Don’t post jokes
9) Be culturally sensitive
10) Respect privacy
Source:
networketiquette.net/colloge.html
19. Your email identifies you as a student, as such
when sending email remember you represent
your college
Email between students is generally informal –
this is not an excuse, however for being mean,
being a bully or negative in other ways
When emailing professors use proper
salutations, if your professor is a doctor
address him/her as one. Close your email with
your name, school, class and phone number
Source:
networketiquette.net/college.html
20. FLAMING – The act of posting or sending
offensive messages over the internet through
forums, newsgroups, email or instant
messaging. Flaming occurs when people
express their views or emotions without
holding anything back
SPAM – Spam is the use of electronic
messaging systems (including most broadcast
media, digital delivery systems) to send
unsolicited bulk messages indiscriminately
21. DON’TVENT YOUR
FRUSTRATIONS ON
FACEBOOK OR OTHER
BLOGS, CHAT ROOMS
ETC!!!
22. NEWARK, N.J. (AP) — A New Jersey administrative law judge
has ruled that a first-grade teacher who wrote that she was a
"warden for future criminals" on Facebook earlier this year should
lose her tenured job.
The state education commissioner now has 45 days to accept,
reject or modify the decision regarding Jennifer O'Brien.
The Paterson teacher posted her remark to 333 friends on March
28. But it was forwarded and several parents saw it.
O'Brien's lawyer, Nancy Oxfeld, tells The Record newspaper
(http://bit.ly/v8ERLR) that her client will appeal the ruling,
which was made public Tuesday. O'Brien had testified that she
wrote the post in exasperation because several students kept
disrupting her lessons and one boy had recently hit her.
But the judge called O'Brien's conduct "inexcusable."
25. Privacy in the classroom is ensuring the rights
and information of students is not
compromised.
This can include personal information about
the student regarding their residence, family,
and/or educational records.
26. The Family Educational Rights and Privacy Act
(FEPRA), 1974, mandates that schools must
have either the student’s (they are 18) or their
parents (if the student is not 18) permission
prior to the disclosure of that student’s
education records. This includes:
Discussion of the student’s behavior or grades with anyone
other than the student.
School work with a grade posted on a bulletin board
27. Do not post personal information about
students online, whether it is your professional
website displaying student work or the
school’s website.
Do not give out personal information or
education records to anyone without the
consent of the student or their parent/guardian
as well as notifying the school administration
about the release of the information.
28. Most schools use a student login and password
in order to log on to and use a school
computer.
Passwords should be longer than 6 characters
and include both upper-case and lower-case
numbers as well as numbers.
Passwords should be changed often, especially
if any nefarious activity is suspected.
Make sure students log out of the computers
when they are done using them.
29. With the increased use of Facebook and other
social networking sites, it is important that
students utilize safety precautions online as
well.
Remind students not to post personal
information online as well as make their profile
private so only their friends can view their
information
Once you put information online, it is out there
and can be accessed or saved by anyone for any
reason they want to.
30. Many teachers are now creating blogs or
websites that their students can log into post
questions or topics of discussion.
If you intend to do this, you must be sure that:
In order to create an account, the site
creator/administrator/manager (usually the teacher) has
to authorize and allow it
Students do not need to give too much personal
information such as their home address or any phone
number.
You continually monitor the site to make sure that the site
is being properly used and that there are no breaches in the
privacy of the site.
31. More and more emphasis is being placed on
student privacy and safety.
Make sure to monitor student use of the
computer to make sure they are not using it
improperly.
If a student’s information is obtained from a
school’s website or from a school a school
computer, it will ultimately fall on the school or
even the teacher.
To protect yourself and your job, make sure
your students information is protected.
32. Astuto, Angela, et al. "Cyberethics: social ethics teaching in educational
technology programs." Communication Research Trends 24.4 (2005): 3+.
Academic OneFile. Web. 28 Nov. 2011.
Berson, Ilene R., and Michael J. Berson. "Privileges, privacy, and
protection of youth bloggers in the social studies classroom." Social
Education 70.3 (2006): 124+. Academic OneFile. Web. 20 Nov. 2011.
Dyrli, Odvard Egil. "Unwelcome visitors: spyware threatens privacy and
wastes district technology resources. (The Online Edge)." District
Administration July 2003: 49. Academic OneFile. Web. 20 Nov. 2011.
Harris, F. (2010). Teens and privacy: Myths and realities. Knowledge
Quest, 39(1), 74-79.
Langendefer, J., & Miyazaki, A. (2009). Privacy in the information
economy. The Journal of Consumer Affairs, 43(3), 380-388.
Youn, S. (2009). Determinants of online privacy concern and its influence
on privacy protection behaviors among young adolescents. The Journal
of Consumer Affairs, 43(3), 389-418.
33. 1. What are three teacher netiquette rules?
2. What are three student netiquette rules?
3. What is flaming?
4. What constitutes a strong password?
5. What federal act guarantees a student’s
privacy concerning their academic record?
6. What can you do as a teacher to ensure that
properly use the school’s computers and that
their information is safe?