an introduction of multimedia etiquette afl@nfu 2006 ----nicole huang

12
An Introduction of Multimedia Etiquette AFL@NFU 2006 ----Nicole Huang

Upload: beatrice-clarke

Post on 16-Dec-2015

215 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: An Introduction of Multimedia Etiquette AFL@NFU 2006 ----Nicole Huang

An Introduction of Multimedia Etiquette

AFL@NFU 2006 ----Nicole Huang

Page 2: An Introduction of Multimedia Etiquette AFL@NFU 2006 ----Nicole Huang

NHIT 2003 Multimedia English

Multimedia Etiquette

Etiquette:The set of rules or customs which control accepted

behavior in particular social groups or social situations.. --from Cambridge Advanced Learner Dictionary

Netiquette:The set of rules about behaviors that is acceptable when

writing an email or talking to people in a chat room. --from Cambridge Advanced Learner Dictionary

Page 3: An Introduction of Multimedia Etiquette AFL@NFU 2006 ----Nicole Huang

NHIT 2003 Multimedia English

Multimedia Etiquette

Email Netiquette

Computer Etiquette

Internet Etiquette

Copyright & Educational Fair Use

Page 4: An Introduction of Multimedia Etiquette AFL@NFU 2006 ----Nicole Huang

NHIT 2003 Multimedia English

Email Etiquette

Clearly summarize the contents of your message in the subject line. Don't use CC (Carbon Copy) to copy your message to everyone. Use BCCs (Blind Carbon Copies) when addressing a message that will go to a large group of people who don't necessarily know each other. Keep your messages short and focused. Avoid using all capital letters. Don't write anything you wouldn't't say in public.

Page 5: An Introduction of Multimedia Etiquette AFL@NFU 2006 ----Nicole Huang

NHIT 2003 Multimedia English

Computer Ethic

1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness.

Page 6: An Introduction of Multimedia Etiquette AFL@NFU 2006 ----Nicole Huang

NHIT 2003 Multimedia English

Computer Ethic

6. Thou shalt not use or copy software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you write. 10. Thou shalt use a computer in ways that show consideration and respect

Page 7: An Introduction of Multimedia Etiquette AFL@NFU 2006 ----Nicole Huang

NHIT 2003 Multimedia English

What Is an "Educational Use"

"Educational purposes" means:non-commercial instruction or curriculum based teaching by educators to students at nonprofit educational institutions planned non-commercial study or investigation directed toward making a contribution to a field of knowledge, or presentation of research findings at non-commercial peer conferences, workshops or seminars.

Page 8: An Introduction of Multimedia Etiquette AFL@NFU 2006 ----Nicole Huang

NHIT 2003 Multimedia English

Rules for Reproducing Text Materials

for Use in Class

Examples of what can be copied and distributed in class include:a complete poem if less than 250 words or an excerpt of not more than 250 words from a longer poem a complete article, story or essay if less than 2,500 words, or an excerpt from any prose work of not more than 1,000 words or 10% of the work, whichever is less; or one chart, graph, diagram, drawing, cartoon or picture per book or per periodical issue.

Page 9: An Introduction of Multimedia Etiquette AFL@NFU 2006 ----Nicole Huang

NHIT 2003 Multimedia English

Watch Out!

Multimedia vs. technopolyPower vs. manipulationPros & ConsMultimedia Chaos

information overload; rumor and accidental misinformation; plagiarism; hacking; viruses and worms; mail bombing; surveillance; impersonation; incitement

Page 10: An Introduction of Multimedia Etiquette AFL@NFU 2006 ----Nicole Huang

NHIT 2003 Multimedia English

Multimedia Chaos

Information OverloadInformation OverloadRumor and Accidental MisinformationRumor and Accidental MisinformationPlagiarismPlagiarismHacking: Hacking: someone exploits a security weakness in an installation and damages data stored or leaves a message for the system administrator, or accessed data stored in that installation..Viruses and Worms: Viruses and Worms: someone creates an environment in which a virus or worm will propagate.

Page 11: An Introduction of Multimedia Etiquette AFL@NFU 2006 ----Nicole Huang

NHIT 2003 Multimedia English

Multimedia Chaos

Mail-BombingMail-Bombing:Someone sends very large messages to someone else’s mailbox.SurveillanceSurveillance: An employer openly monitors the content of email traffic to and from their employees.ImpersonationImpersonation:Someone uses the security weaknesses inherent in an email package or systems software to send a message which appears to come from someone else. (e.g. students send out a notice of current assignment has been cancelled)

Page 12: An Introduction of Multimedia Etiquette AFL@NFU 2006 ----Nicole Huang

NHIT 2003 Multimedia English

Multimedia Chaos

Incitement:Incitement: Someone sends emails to one, a few, or many people, criticizing some class of people (e.g. those of a particular ethnic origin, or of a particular religious persuasion), and urging that action be taken against such people, their property, or their meeting places.