SlideShare une entreprise Scribd logo
1  sur  8
Megan Tubby
Technology and Education
August 25, 2013
Netiquette
an online etiquette for behaving properly on-line and to help new comer’s to the world
wide web minimize their mistakes
Rules of Netiquette
1. Remember the Human
2. Adhere to the same standards of behavior online that you follow in
real life
3. Know where you are in cyberspace
4. Respect other people’s time and bandwidth
5. Make yourself look good online
6. Share expert knowledge
7. Help keep flame wars under control
8. Respect other people’s privacy
9. Don’t abuse your power
10. Be forgiving of other people’s mistakes
Copyright
Learning about Copyrighting-Topics on the Home page
 Search Records
 Publications
 How to Register
 How to Record a document
 Licensing
 Budget
 Law and Regulations
 Congressional Testimony (Online Privacy)
 Related Links
Fair Use Policy
 Section 107 of the copyright law allows various
purposes of reproduced work such as criticism,
comment, news reporting, teaching, scholarship, and
research.
Four ways to determine whether or not a particular use is
fair:
1. Purpose and character of the use
2. Nature of copyrighted work
3. Amount used of the portion used in relation to the copyright work as
a whole
4. Effect of use upon the potential market, or value of copyright work
Plagiarism
Webpage Outline
 What is Plagiarism?
 What and how to cite sources
 Questions for expert help
 Tools- helpful sites, news, student material, etc.
 A way to check for plagiarism
Safety on the Web
This website discusses how to keep children and teens
safe when using the internet. It keeps the age of under
age people who use the site private until they are 18.
Then, the person has a choice of keeping it private or
not. It is a good, safe site for children, and it is parent
approved.
Security on Personal Computers
This site discusses best practices that one expert shares
on the best ways to protect your computer. He teaches
about back-up disks, limiting applications, laptop
security, etc.
Reference Page
1. Albion.com, Ross, Seth T.(1990-2001) The Core Rules of Netiquette.
Retrieved from: http://www.albion.com/netiquette/
2. Bruce Schneier. (2004, December 14) Safe Personal Computing [Web
Log Comment]. Retrieved from:
http://www.schneier.com/blog/archives/2004/12/safe_personal_c.ht
ml
3. Magid, Larry. (August 23, 2013) ‘The Kids Are (mostly) All Right’
when it comes to privacy and bullying. Retrieved from:
http://www.safekids.com
4. The Library of Congress. (2013) Copyright. Retrieved from:
http://www.copyright.gov/
5. The Library of Congress. (2012) Fair Use Policy. Retrieved from:
http://www.copyright.gov/fls/fl102.html
6. 2013 Plagiarism. Retrieved from: http://plagiarism.org

Contenu connexe

Tendances

Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
Areeb Khan
 
FOSS and activism
FOSS and activismFOSS and activism
FOSS and activism
sky croeser
 
Legal and Ethical Issues
Legal and Ethical IssuesLegal and Ethical Issues
Legal and Ethical Issues
dyonking
 
Copyright presentation mcfarlandrevised
Copyright presentation mcfarlandrevisedCopyright presentation mcfarlandrevised
Copyright presentation mcfarlandrevised
susanrmcfarland
 

Tendances (19)

Digital Citizenship Presentation
Digital Citizenship PresentationDigital Citizenship Presentation
Digital Citizenship Presentation
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorld
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Social Networking and Cyberbullying
Social Networking and CyberbullyingSocial Networking and Cyberbullying
Social Networking and Cyberbullying
 
FOSS and activism
FOSS and activismFOSS and activism
FOSS and activism
 
Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is Cyberworld
 
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
 
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)
 
Legal and Ethical Issues
Legal and Ethical IssuesLegal and Ethical Issues
Legal and Ethical Issues
 
110317 ictu1 ict_issues_social_networking
110317 ictu1 ict_issues_social_networking110317 ictu1 ict_issues_social_networking
110317 ictu1 ict_issues_social_networking
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Camouflage and Safety in the Virtual World
Camouflage and Safety in the Virtual WorldCamouflage and Safety in the Virtual World
Camouflage and Safety in the Virtual World
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
Copyright presentation mcfarlandrevised
Copyright presentation mcfarlandrevisedCopyright presentation mcfarlandrevised
Copyright presentation mcfarlandrevised
 
S01.L01 - Understanding the Internet
S01.L01 - Understanding the InternetS01.L01 - Understanding the Internet
S01.L01 - Understanding the Internet
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
 

Similaire à Digital citizenship project

Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
iallen
 
Lesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety OnlineLesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety Online
ssuser9cd7f3
 
Ethical and safe internet use
Ethical and safe internet useEthical and safe internet use
Ethical and safe internet use
BurkeV
 
Teaching with technology
Teaching with technologyTeaching with technology
Teaching with technology
gibbs753
 
Teaching with technology
Teaching with technologyTeaching with technology
Teaching with technology
gibbs753
 
Teaching with technology 2
Teaching with technology 2Teaching with technology 2
Teaching with technology 2
awood6
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
lahill16
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
Johan Koren
 

Similaire à Digital citizenship project (20)

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Digital footprints
Digital footprintsDigital footprints
Digital footprints
 
DIWAN2 HUMSS 11 A.pptx
DIWAN2 HUMSS 11 A.pptxDIWAN2 HUMSS 11 A.pptx
DIWAN2 HUMSS 11 A.pptx
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Lesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety OnlineLesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety Online
 
Ethical and safe internet use
Ethical and safe internet useEthical and safe internet use
Ethical and safe internet use
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Teaching with technology
Teaching with technologyTeaching with technology
Teaching with technology
 
Teaching with technology
Teaching with technologyTeaching with technology
Teaching with technology
 
Teaching with technology 2
Teaching with technology 2Teaching with technology 2
Teaching with technology 2
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
MIL WEEK 8.pptx
MIL WEEK 8.pptxMIL WEEK 8.pptx
MIL WEEK 8.pptx
 
Research Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxResearch Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptx
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 

Dernier

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Dernier (20)

Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 

Digital citizenship project

  • 1. Megan Tubby Technology and Education August 25, 2013
  • 2. Netiquette an online etiquette for behaving properly on-line and to help new comer’s to the world wide web minimize their mistakes Rules of Netiquette 1. Remember the Human 2. Adhere to the same standards of behavior online that you follow in real life 3. Know where you are in cyberspace 4. Respect other people’s time and bandwidth 5. Make yourself look good online 6. Share expert knowledge 7. Help keep flame wars under control 8. Respect other people’s privacy 9. Don’t abuse your power 10. Be forgiving of other people’s mistakes
  • 3. Copyright Learning about Copyrighting-Topics on the Home page  Search Records  Publications  How to Register  How to Record a document  Licensing  Budget  Law and Regulations  Congressional Testimony (Online Privacy)  Related Links
  • 4. Fair Use Policy  Section 107 of the copyright law allows various purposes of reproduced work such as criticism, comment, news reporting, teaching, scholarship, and research. Four ways to determine whether or not a particular use is fair: 1. Purpose and character of the use 2. Nature of copyrighted work 3. Amount used of the portion used in relation to the copyright work as a whole 4. Effect of use upon the potential market, or value of copyright work
  • 5. Plagiarism Webpage Outline  What is Plagiarism?  What and how to cite sources  Questions for expert help  Tools- helpful sites, news, student material, etc.  A way to check for plagiarism
  • 6. Safety on the Web This website discusses how to keep children and teens safe when using the internet. It keeps the age of under age people who use the site private until they are 18. Then, the person has a choice of keeping it private or not. It is a good, safe site for children, and it is parent approved.
  • 7. Security on Personal Computers This site discusses best practices that one expert shares on the best ways to protect your computer. He teaches about back-up disks, limiting applications, laptop security, etc.
  • 8. Reference Page 1. Albion.com, Ross, Seth T.(1990-2001) The Core Rules of Netiquette. Retrieved from: http://www.albion.com/netiquette/ 2. Bruce Schneier. (2004, December 14) Safe Personal Computing [Web Log Comment]. Retrieved from: http://www.schneier.com/blog/archives/2004/12/safe_personal_c.ht ml 3. Magid, Larry. (August 23, 2013) ‘The Kids Are (mostly) All Right’ when it comes to privacy and bullying. Retrieved from: http://www.safekids.com 4. The Library of Congress. (2013) Copyright. Retrieved from: http://www.copyright.gov/ 5. The Library of Congress. (2012) Fair Use Policy. Retrieved from: http://www.copyright.gov/fls/fl102.html 6. 2013 Plagiarism. Retrieved from: http://plagiarism.org