CITIZENSHIP

CITIZENSHIP/DIGITAL CITIZENSHIP PROJECT   Digital Citizenship Project Netiquette; Copyright & Fair Use; Plagiarism; Safety on the Web; Safety on your Computer  Netiquette What it is and More!  Network etiquette (the etiquette of cyberspace).  Netiquette is a set of rules for behaving properly online.  First purpose is to help net newbies minimize their mistakes.  Second purpose is to help experienced cyberspace travelers help the newbies.

 Netiquette Guidelines   Unless you have your own Internet access through an Internet provider, be sure to check with your employer about ownership of electronic mail.  Unless you are using an encryption device (hardware or software), you should assume that mail on the Internet is not secure.  Never put in a mail message anything you would not put on a postcard.  Respect the copyright on material that you reproduce.  If you are forwarding or re-posting a message you've received, do not change the wording.  Netiquette Guidelines Cont.  Never send chain letters via electronic mail.  Be conservative in what you send and liberal in what you receive.  You should not send heated messages (we call these "flames") even if you are provoked.  it's a good idea to at least check all your mail subjects before responding to a message.  Netiquette Guidelines Cont.  Make things easy for the recipient.  In order to ensure that people know who you are, be sure to include a line or two at the end of your message with contact information.  Be careful when addressing mail.  There are addresses which may go to a group but the address looks like it is just one person.  Know to whom you are sending.  Netiquette Guidelines Cont.  Talk is a set of protocols which allow two people to have an interactive dialogue via computer.  Be sure you have established written guidelines for dealing with situations especially illegal, improper, or forged traffic.  Read both mailing lists and newsgroups for one to two months before you post anything.  Clarify any policies your site has regarding its subscription to NetNews groups and about subscribing to mailing lists.

 Netiquette Guidelines Cont.  Keep mailing lists up to date to avoid the "bouncing mail" problem.  Publicize the nature of the feed you receive.  Make sure your Frequently Asked Questions (FAQ) is posted at regular intervals.  Remember that all these services belong to someone else.  Netiquette Guidelines Cont.  Listen first to get to know the culture of the group.  Make clear what's available for copying and what is not.  Don't point to other sites without asking first.  Make sure your policy on user information services, such as homepages, is well known.

 Copy Right & Fair Use What It Is And More!  The set of exclusive legal rights authors have over their works for a limited period of time.  Rights include copying the works (including parts of the works), making derivative works, distributing the works, and performing the works (this means showing a movie or playing an audio recording, as well as performing a dramatic work.   The author's rights begin when a work is created.    Copyright & Fair Use What It Is And More! Cont.    Copyright ‘s purpose is to promote science and the useful arts.    Fair use provisions of the copyright law allow for limited copying or distribution of published works without the author's permission in some cases.    There are no explicit, predefined, legal specifications of how much and when one can copy, but there are guidelines for fair use.    Copyright & Fair Use What It Is And More!Cont.    Each case of copying must be evaluated according to four factors:    The purpose and nature of the use.    The nature and substantiality of the material used.  The nature of the copyrighted work.  The effect of use on the potential market for or value of the work.

 Copyright & Fair Use What It Is And More!Cont.  If the copy is used for teaching at a non-profit institution, distributed without charge, and made by a teacher or students acting individually, then the copy is more likely to be considered as fair use.  In addition, an interpretation of fair use is more likely if the copy was made spontaneously, for temporary use, not as part of an "anthology" and not as an institutional requirement or suggestion.  Copyright & Fair Use What It Is And More!Cont.  An article from a newspaper would be considered differently than a workbook made for instruction.  When other criteria are met, the copying of extracts that are "not substantial in length" when compared to the whole of which they are part may be considered fair use.  A work that supplants the normal market is considered an infringement, but a work does not have to have an effect on the market to be an infringement.

 Copyright & Fair Use What It Is And More!Cont.  Include the copyright symbol and the name of the copyright owner directly on/under/around the digital material.  Images, graphics and video should be credited to their owners/sources just as written material.

 Plagiarism What It Is And More!  to steal and pass off (the ideas or words of another) as one's own   to use (another's production) without crediting the source    to commit literary theft    to present as new and original an idea or product derived from an existing source.

 Plagiarism What It Is And More!Cont.  Plagiarism is an act of fraud.  Such as, turning in someone else's work as your own.  Copying words or ideas from someone else without giving credit.  Failing to put a quotation in quotation marks.  Giving incorrect information about the source of a quotation.

 Plagiarism What It Is And More!Cont.  The most important steps in preventing plagiarism are those taken to address its causes, they include:   becoming aware of the reasons plagiarism occurs.  identifying the different forms of plagiarism.  integrating plagiarism prevention techniques into your courses.  Plagiarism What It Is And More!Cont.  Reasons why students plagarize:   Intentional Plagiarism (just like hacking into websites).  Searching vs. Researching (Today's students learn quickly that finding and manipulating data on the Internet is a valuable skill).  But their words are better (Why sweat over producing an analysis that has already been done better).  Plagiarism What It Is And More!Cont.  Everyone else is doing it (Students often justify plagiarism by pointing out that since their peers plagiarize, they must do the same to keep up).  Poor Planning (Students are not always the best judges of how much time their assignments will take).  Unintentional Plagiarism (No honest student would walk out of a neighbors' house accidentally carrying their television). 

Safety on the Web How to Keep Yourself Safe!  Traditional Protection Layers (Antivirus, Firewall, HIPS) (Installing an active antivirus program is one of the most important steps in keeping your computer secure).  Secure Your Browser (Almost all popular web browsers now provide some general protection).  Keep Your Software Up To Date (Secunia PSI will scan your computer for programs that need to be updated, or are end of life).

 Safety on the Web How to Keep Yourself Safe!Cont.  Use a Secure DNS Service (they are relatively easy to setup and require no software).  Limit Program Rights (If you're not running a strong HIPS program then I highly suggest that you use a limited/standard user account (LUA or least-privileged user account) instead of a normal administrator account).  Block Hosts Known to Be Dangerous (or too Inquisitive)

 Safety on Your Computer How to Keep Yourself Safe!  Use antivirus software and keep it up-to-date (Top Antivirus Software & Top Spyware Scanners).  Install security patches (check for and apply updates for all software you use).  Use a firewall (No Internet connection is safe without one).  Secure your browser (legitimate websites are frequently being compromised and implanted with malicious javascript that foists malware onto visitors' computers).  Safety on Your Computer How to Keep Yourself Safe!Cont.  Take control of your email (avoid opening email attachments received unexpectedly).  Treat IM suspiciously (Instant Messaging is a frequent target of worms and trojans).  Avoid P2P and distributed file sharing (Torrent, Kazaa, Gnutella, Morpheus and at least a dozen other file sharing networks exist).  Keep abreast of Internet scams (Criminals think of clever ways to separate you from your hard earned cash).  References   Shea, V. Oct. 24, 1995. Netiquette. (RFC 1855 Netiquette Guidelines) Retrieved from: []   Copyright and Fair Use. Stanford University, Libraries and Academic Information Resources. Retrieved From: [|http://www-sul.standford.edu]   What is Plagiarism? Retrieved From: []   How to stay Safe on the Internet. Retrieved from [|www.techsupportalert.com/content/how-to-stay] safe

 References   How to stay Safe on the Internet. Retrieved from: __ www.techsupportalert.com/content/how-to-staysafe __  9 Steps to Protecting Your Computer from Viruses and Other Malware. Retrieved from: [|www.About.com]

The Outline of the Power Point