SlideShare una empresa de Scribd logo
1 de 8
Megan Tubby
Technology and Education
August 25, 2013
Netiquette
an online etiquette for behaving properly on-line and to help new comer’s to the world
wide web minimize their mistakes
Rules of Netiquette
1. Remember the Human
2. Adhere to the same standards of behavior online that you follow in
real life
3. Know where you are in cyberspace
4. Respect other people’s time and bandwidth
5. Make yourself look good online
6. Share expert knowledge
7. Help keep flame wars under control
8. Respect other people’s privacy
9. Don’t abuse your power
10. Be forgiving of other people’s mistakes
Copyright
Learning about Copyrighting-Topics on the Home page
 Search Records
 Publications
 How to Register
 How to Record a document
 Licensing
 Budget
 Law and Regulations
 Congressional Testimony (Online Privacy)
 Related Links
Fair Use Policy
 Section 107 of the copyright law allows various
purposes of reproduced work such as criticism,
comment, news reporting, teaching, scholarship, and
research.
Four ways to determine whether or not a particular use is
fair:
1. Purpose and character of the use
2. Nature of copyrighted work
3. Amount used of the portion used in relation to the copyright work as
a whole
4. Effect of use upon the potential market, or value of copyright work
Plagiarism
Webpage Outline
 What is Plagiarism?
 What and how to cite sources
 Questions for expert help
 Tools- helpful sites, news, student material, etc.
 A way to check for plagiarism
Safety on the Web
This website discusses how to keep children and teens
safe when using the internet. It keeps the age of under
age people who use the site private until they are 18.
Then, the person has a choice of keeping it private or
not. It is a good, safe site for children, and it is parent
approved.
Security on Personal Computers
This site discusses best practices that one expert shares
on the best ways to protect your computer. He teaches
about back-up disks, limiting applications, laptop
security, etc.
Reference Page
1. Albion.com, Ross, Seth T.(1990-2001) The Core Rules of Netiquette.
Retrieved from: http://www.albion.com/netiquette/
2. Bruce Schneier. (2004, December 14) Safe Personal Computing [Web
Log Comment]. Retrieved from:
http://www.schneier.com/blog/archives/2004/12/safe_personal_c.ht
ml
3. Magid, Larry. (August 23, 2013) ‘The Kids Are (mostly) All Right’
when it comes to privacy and bullying. Retrieved from:
http://www.safekids.com
4. The Library of Congress. (2013) Copyright. Retrieved from:
http://www.copyright.gov/
5. The Library of Congress. (2012) Fair Use Policy. Retrieved from:
http://www.copyright.gov/fls/fl102.html
6. 2013 Plagiarism. Retrieved from: http://plagiarism.org

Más contenido relacionado

La actualidad más candente

Digital Citizenship Presentation
Digital Citizenship PresentationDigital Citizenship Presentation
Digital Citizenship Presentationhjhteach
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldRownel Cerezo Gagani
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of InternetAreeb Khan
 
Social Networking and Cyberbullying
Social Networking and CyberbullyingSocial Networking and Cyberbullying
Social Networking and CyberbullyingLouise Jones
 
FOSS and activism
FOSS and activismFOSS and activism
FOSS and activismsky croeser
 
Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldAmae OlFato
 
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely
 
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Andrew Schwabe
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)Rakshit Sharma
 
Legal and Ethical Issues
Legal and Ethical IssuesLegal and Ethical Issues
Legal and Ethical Issuesdyonking
 
110317 ictu1 ict_issues_social_networking
110317 ictu1 ict_issues_social_networking110317 ictu1 ict_issues_social_networking
110317 ictu1 ict_issues_social_networkingsnoonan
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Camouflage and Safety in the Virtual World
Camouflage and Safety in the Virtual WorldCamouflage and Safety in the Virtual World
Camouflage and Safety in the Virtual WorldInterMediaKT
 
Copyright presentation mcfarlandrevised
Copyright presentation mcfarlandrevisedCopyright presentation mcfarlandrevised
Copyright presentation mcfarlandrevisedsusanrmcfarland
 
S01.L01 - Understanding the Internet
S01.L01 - Understanding the InternetS01.L01 - Understanding the Internet
S01.L01 - Understanding the Internetselcukca84
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityMohammed Adam
 

La actualidad más candente (19)

Digital Citizenship Presentation
Digital Citizenship PresentationDigital Citizenship Presentation
Digital Citizenship Presentation
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorld
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Social Networking and Cyberbullying
Social Networking and CyberbullyingSocial Networking and Cyberbullying
Social Networking and Cyberbullying
 
FOSS and activism
FOSS and activismFOSS and activism
FOSS and activism
 
Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is Cyberworld
 
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
 
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)
 
Legal and Ethical Issues
Legal and Ethical IssuesLegal and Ethical Issues
Legal and Ethical Issues
 
110317 ictu1 ict_issues_social_networking
110317 ictu1 ict_issues_social_networking110317 ictu1 ict_issues_social_networking
110317 ictu1 ict_issues_social_networking
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Camouflage and Safety in the Virtual World
Camouflage and Safety in the Virtual WorldCamouflage and Safety in the Virtual World
Camouflage and Safety in the Virtual World
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
Copyright presentation mcfarlandrevised
Copyright presentation mcfarlandrevisedCopyright presentation mcfarlandrevised
Copyright presentation mcfarlandrevised
 
S01.L01 - Understanding the Internet
S01.L01 - Understanding the InternetS01.L01 - Understanding the Internet
S01.L01 - Understanding the Internet
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
 

Similar a Digital citizenship project

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipegschool
 
Digital footprints
Digital footprintsDigital footprints
Digital footprintsbutlermom2
 
DIWAN2 HUMSS 11 A.pptx
DIWAN2 HUMSS 11 A.pptxDIWAN2 HUMSS 11 A.pptx
DIWAN2 HUMSS 11 A.pptxJoshuaCasas7
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
Lesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety OnlineLesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety Onlinessuser9cd7f3
 
Ethical and safe internet use
Ethical and safe internet useEthical and safe internet use
Ethical and safe internet useBurkeV
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Teaching with technology
Teaching with technologyTeaching with technology
Teaching with technologygibbs753
 
Teaching with technology
Teaching with technologyTeaching with technology
Teaching with technologygibbs753
 
Teaching with technology 2
Teaching with technology 2Teaching with technology 2
Teaching with technology 2awood6
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentationlahill16
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
Research Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxResearch Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxPallawiBulakh1
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technologyJohan Koren
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxRheamaeLiwan
 

Similar a Digital citizenship project (20)

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Digital footprints
Digital footprintsDigital footprints
Digital footprints
 
DIWAN2 HUMSS 11 A.pptx
DIWAN2 HUMSS 11 A.pptxDIWAN2 HUMSS 11 A.pptx
DIWAN2 HUMSS 11 A.pptx
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Lesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety OnlineLesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety Online
 
Ethical and safe internet use
Ethical and safe internet useEthical and safe internet use
Ethical and safe internet use
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Teaching with technology
Teaching with technologyTeaching with technology
Teaching with technology
 
Teaching with technology
Teaching with technologyTeaching with technology
Teaching with technology
 
Teaching with technology 2
Teaching with technology 2Teaching with technology 2
Teaching with technology 2
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
MIL WEEK 8.pptx
MIL WEEK 8.pptxMIL WEEK 8.pptx
MIL WEEK 8.pptx
 
Research Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxResearch Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptx
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 

Último

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 

Último (20)

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

Digital citizenship project

  • 1. Megan Tubby Technology and Education August 25, 2013
  • 2. Netiquette an online etiquette for behaving properly on-line and to help new comer’s to the world wide web minimize their mistakes Rules of Netiquette 1. Remember the Human 2. Adhere to the same standards of behavior online that you follow in real life 3. Know where you are in cyberspace 4. Respect other people’s time and bandwidth 5. Make yourself look good online 6. Share expert knowledge 7. Help keep flame wars under control 8. Respect other people’s privacy 9. Don’t abuse your power 10. Be forgiving of other people’s mistakes
  • 3. Copyright Learning about Copyrighting-Topics on the Home page  Search Records  Publications  How to Register  How to Record a document  Licensing  Budget  Law and Regulations  Congressional Testimony (Online Privacy)  Related Links
  • 4. Fair Use Policy  Section 107 of the copyright law allows various purposes of reproduced work such as criticism, comment, news reporting, teaching, scholarship, and research. Four ways to determine whether or not a particular use is fair: 1. Purpose and character of the use 2. Nature of copyrighted work 3. Amount used of the portion used in relation to the copyright work as a whole 4. Effect of use upon the potential market, or value of copyright work
  • 5. Plagiarism Webpage Outline  What is Plagiarism?  What and how to cite sources  Questions for expert help  Tools- helpful sites, news, student material, etc.  A way to check for plagiarism
  • 6. Safety on the Web This website discusses how to keep children and teens safe when using the internet. It keeps the age of under age people who use the site private until they are 18. Then, the person has a choice of keeping it private or not. It is a good, safe site for children, and it is parent approved.
  • 7. Security on Personal Computers This site discusses best practices that one expert shares on the best ways to protect your computer. He teaches about back-up disks, limiting applications, laptop security, etc.
  • 8. Reference Page 1. Albion.com, Ross, Seth T.(1990-2001) The Core Rules of Netiquette. Retrieved from: http://www.albion.com/netiquette/ 2. Bruce Schneier. (2004, December 14) Safe Personal Computing [Web Log Comment]. Retrieved from: http://www.schneier.com/blog/archives/2004/12/safe_personal_c.ht ml 3. Magid, Larry. (August 23, 2013) ‘The Kids Are (mostly) All Right’ when it comes to privacy and bullying. Retrieved from: http://www.safekids.com 4. The Library of Congress. (2013) Copyright. Retrieved from: http://www.copyright.gov/ 5. The Library of Congress. (2012) Fair Use Policy. Retrieved from: http://www.copyright.gov/fls/fl102.html 6. 2013 Plagiarism. Retrieved from: http://plagiarism.org