Sunday, July 11, 2010

“TOP 10 RULES OF ACADEMIC NETIQUETTE: The Next 3 Do’s!”

Page copy protected against web site content infringement by Copyscape

TOP 10 RULES (continued)
Here are the last 3

NETIQUETTE DO’S:

4. RESPECT COPYRIGHTS: Unscrupulous ninnies are stealing information off of every imaginable cyber-source without permission or credit. Even several of these ninnies stole one of my blogs and parts of others. Plagiarism is out of control. As academicians, you’re trained APA style-wise or, heaven forbid, in Chicago or AMA style to cite and acknowledge sources in ALL of your writing. Do the same online.

Make sure to get permissions and/or acknowledge sources when appropriate, even Wikipedia. DO NOT swipe any material—print or nonprint media. As a contributor to the Internet, you also need to protect your intellectual property. For the consequences of violations and guidelines on how to protect your work, check out my October 2009 blogs on “Copyright Infringement” and “Intellectual Property.”

5. USE APPROPRIATE SIGNATURE LINES: Do you have a signature line? If not, get one soon. They’re on sale at COSTCO®. Haha. You need to identify who you are. If you are commenting on professional issues on listservs or in group discussions, your credentials are important to colleagues so they can evaluate the weight of your contributions. Your position and expertise provide a context for your messages. For example, if you are Director of the Alligator Rehabilitation Institute at Everglades University, your suggestions on how to capture an alligator with asthma in your hot-tub are noteworthy.

Also, a signature line with title, institution, address, e-mail, phone, and fax makes it possible for colleagues to contact you easily. If you have a business Website, blog, publishing company, and/or other professional sites, you should include links to them. If the list appears too unwieldy, create different signature lines for different target readerships. (SIGNATURE ALERT: Of course, if you’re a spy, recently involved in the Espionage Exchange Program, or work for Homeland Security with a code fuchsia clearance or above, none of these contact rules apply. Stay undercover; see if we care.)

6. RESPOND TO SPECIFIC REQUESTS IN A TIMELY FASHION: If colleagues, known or unknown, or students request information from you, try to respond in a timely fashion, within 24 hours. If you don’t have time to fill the request, respond that you will get back to them by a certain date. That’s just professional courtesy. Be empathetic.

You may receive inquiries from all over the world. It may be a copyright permission, article, research evidence, teaching request, or resource request. Respond appropriately and quickly. Everyone appreciates a rapid response. Again, it’s your professional reputation on the line. "Just do it!"

My next blog will continue with 3 don’ts related to caps, flaming, and crossposting. Hope this info is helpful.

COPYRIGHT © 2010 Ronald A. Berk, LLC

No comments:

Post a Comment