SlideShare une entreprise Scribd logo
1  sur  30
Digital Citizenship

  By Christa Stephens
What is
  Digital Citizenship?

“Digital Citizenship is about using
technology appropriately, and not
 misusing or abusing technology”

                -http://educationaltechnology.ca
Nine Themes of Digital
     Citizenship
           • digital etiquette
      • digital communication
            • digital literacy
         • digital commerce
             • digital law
  • digital rights and responsibilities
     • digital health and wellness
   • digital security (self protection)
This project addresses:

•   Netiquette
•   Copyright and Fair Use
•   Plagiarism
•   Safety on the internet
•   Safety on your computer
Digital Ettiquette
 or “Netiquette”

     - set of rules
       on how to
    behave online
The Core Rules of Netiquette:

            Dos                 Don't Lie


       Sharing is caring       Don't Hate


       Correct mistakes        No cursing


     Share accurate info.     No disrespect


   Everything in moderation

       Respect privacy

         Show Love
          Don’ts
Copyright
   &
Fair Use
Copyright

  “a legal concept, enacted by most
governments, giving the creator of an
   original work exclusive rights to
    it, usually for a limited time.”
                            - wikipedia.org
Fair Use

“a limitation and exception to the
    exclusive right granted by
 copyright law to the author of a
         creative work.”
                       -   wikipedia.org
What is the difference between
  Copyright and Fair Use?

          Fair Use refers to
       being able to use parts
      of copyrighted materials
         without permission
      for educational reasons.
Plagarism
According to the Merriam-Webster
Online Dictionary, to "plagiarize"
              means:

• to steal and pass off (the ideas or words of
  another) as one's own
• to use (another's production) without
  crediting the source
• to commit literary theft
• to present as new and original an idea or
  product derived from an existing source.
How can I avoid Plagarism?

• Don’t turn in someone else's work as your own
• Don’t copy words or ideas from someone else without
  giving credit
• Don’t forget to put a quotation in quotation marks
• Don’t give incorrect information about where the
  quotation came from
• Don’t copy so many words or ideas from a source that
  it makes up the majority of your work, whether you
  give credit or not
Remember…

 If the site is copyrighted, you need to
request permission from the owners of
                the website.

It there is no clear copyright listed, be
sure to reference the site with the URL
Technology Tools to help
    stop Plagiarism:


      Turnitin.com

    MyDropBox.com
Safety
 on the
Internet
Safety on the Internet
      includes:
    • Identity Theft
• Reputation management
      • Passwords
    • Cyberbullying
    • Cyberstalking
Identity Theft
    When your personal
  information is stolen and
then that person pretends to
           be you.
Reputation
      Management
When a individual or a business
 is continuously monitored in
    hopes to create positive
        commentary and
      dispute the negative.
Passwords
  • Don't leave your passwords lying
                 around
• Don't reveal your passwords to others
 • Never give your password out in an
                  email
   • Don't use the default password
      • Change reset passwords
Cyberbullying
Refers to bullying on the internet – social networking
                sites, emails and texts



              Remember…
 • If its something that is going to hurt someone’s
                 feelings, don’t do it.
               • Don’t fight back.
                 • Tell an adult.
  • What you say online could stay there forever.
Cyberstalking
Refers to using the Internet or any other electronic device
  to harass an individual, a group, or an organization.


                This includes:
            • Making false accusations.
                • Making threats.
          • Stealing someone’s identity.
    • Causing harm to someone’s data or computer
                      equipment.
Safety on your
  computer
Safety on your computer
        includes:

        • Viruses
       • Phishing
     • Trojan horses
        • Worms
Viruses
   A computer virus is a type of computer program that
   duplicates itself and can infect and damage a computer
                 without the person knowing.

Sometimes, when the computer gets a virus it can cause the
   computer to “act up” and may cause the computer to be
   slow, or even crash. Many important documents can be
                            lost.
Phishing
Phishing happens through e-mails and instant
 messages. Phishing guides computer users to
 enter their information on a fake website that
         looks just like the real website.


          Types of Phishing:
               • Whaling
             • Clone Phishing
             • Spear Phishing
Trojan Horses can:

• Retrieve passwords or credit card information
         • Install damaging software
   • Download or upload files on anyone’s
                    computer
                • Delete files
     • Watch the computer user's screen
            • Crash the computer
Worms
  A computer worm is a damaging
computer program that duplicates itself
 in order to spread to other computers
    through the computer network.

Some worms have been created with
         good intentions.
Ways to keep your computer
           safe:

  Make sure that your computer has an
      antivirus program installed.

Never download anything off the internet
      without a parent’s permission.
References
Doering, A. H., & Roblyer, M. D. (2010). Integrating educational
    technology into teaching. (5 ed., pp. 217-222). Boston, MA:
    Pearson Education, Inc.
http://www.wikipedia.org/
http://www.surfnetparents.com
www.brainpop.com
http://networketiquette.net/
http://fairuse.stanford.edu
http://www.educationworld.com
http://www.plagiarism.org/
http://learn-the-ropes.wikispaces.com/Digital+Citizenship
http://educationaltechnology.ca

Contenu connexe

Tendances

Rules on the road to netique
Rules on the road to netiqueRules on the road to netique
Rules on the road to netiqueC_Warrick
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide showBeckusq
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525chadolivard
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for childrenSaurav Jha
 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online_chimes_
 
How To Keep Safe On The Internet!
How To Keep Safe On The Internet!How To Keep Safe On The Internet!
How To Keep Safe On The Internet!alexclark-efc
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYFaMulan2
 
Social Media Marketing 04 08 10
Social Media Marketing 04 08 10Social Media Marketing 04 08 10
Social Media Marketing 04 08 10Matthew Asbell
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parentswstagnaro
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyJonathan Bacon
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online Nader Alkeinay
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centurygracestearns
 
6 8 safety ppt final copy
6 8 safety ppt final copy6 8 safety ppt final copy
6 8 safety ppt final copymarkkreiter
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 

Tendances (18)

Rules on the road to netique
Rules on the road to netiqueRules on the road to netique
Rules on the road to netique
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online
 
How To Keep Safe On The Internet!
How To Keep Safe On The Internet!How To Keep Safe On The Internet!
How To Keep Safe On The Internet!
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
Social Media Marketing 04 08 10
Social Media Marketing 04 08 10Social Media Marketing 04 08 10
Social Media Marketing 04 08 10
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Internet security
Internet securityInternet security
Internet security
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and Privacy
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_century
 
6 8 safety ppt final copy
6 8 safety ppt final copy6 8 safety ppt final copy
6 8 safety ppt final copy
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 

En vedette

Best practices for bulk mailings with CiviCRM
Best practices for bulk mailings with CiviCRMBest practices for bulk mailings with CiviCRM
Best practices for bulk mailings with CiviCRMLeyla Alieva
 
Trends Within Youth Delinquency
Trends Within Youth DelinquencyTrends Within Youth Delinquency
Trends Within Youth Delinquency174521
 
Real power point
Real power pointReal power point
Real power pointSilia07
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Emotional intelligence
Emotional intelligenceEmotional intelligence
Emotional intelligenceJoanMalone
 
Real power point
Real power pointReal power point
Real power pointSilia07
 
Emotional Intelligence
Emotional IntelligenceEmotional Intelligence
Emotional IntelligenceJoanMalone
 
Jim and lori
Jim and loriJim and lori
Jim and lorizidster
 
中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知
中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知
中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知ennhchen
 
How Recruiters Use Linked In 072312
How Recruiters Use Linked In 072312How Recruiters Use Linked In 072312
How Recruiters Use Linked In 072312JoanMalone
 
Best of #PRProchat: Special Edition with Stockton University
Best of #PRProchat: Special Edition with Stockton UniversityBest of #PRProchat: Special Edition with Stockton University
Best of #PRProchat: Special Edition with Stockton UniversityCarrie Morgan
 

En vedette (14)

Best practices for bulk mailings with CiviCRM
Best practices for bulk mailings with CiviCRMBest practices for bulk mailings with CiviCRM
Best practices for bulk mailings with CiviCRM
 
Trends Within Youth Delinquency
Trends Within Youth DelinquencyTrends Within Youth Delinquency
Trends Within Youth Delinquency
 
Real power point
Real power pointReal power point
Real power point
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Emotional intelligence
Emotional intelligenceEmotional intelligence
Emotional intelligence
 
Real power point
Real power pointReal power point
Real power point
 
Web
WebWeb
Web
 
Aula 8 php
Aula 8 phpAula 8 php
Aula 8 php
 
Emotional Intelligence
Emotional IntelligenceEmotional Intelligence
Emotional Intelligence
 
Jim and lori
Jim and loriJim and lori
Jim and lori
 
中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知
中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知
中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知
 
How Recruiters Use Linked In 072312
How Recruiters Use Linked In 072312How Recruiters Use Linked In 072312
How Recruiters Use Linked In 072312
 
Best of #PRProchat: Special Edition with Stockton University
Best of #PRProchat: Special Edition with Stockton UniversityBest of #PRProchat: Special Edition with Stockton University
Best of #PRProchat: Special Edition with Stockton University
 
Music of vietnam
Music of vietnamMusic of vietnam
Music of vietnam
 

Similaire à Digital citizenship

IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safetyjaenjenny
 
Computer Security
Computer SecurityComputer Security
Computer Securitytonik
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxAarush59
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfExtremelyDarkness2
 
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...Egyptian Engineers Association
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxBrian Pichman
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thKartik Chhabra
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 

Similaire à Digital citizenship (20)

IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer security
Computer securityComputer security
Computer security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
 
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12th
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 

Dernier

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 

Dernier (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 

Digital citizenship

  • 1. Digital Citizenship By Christa Stephens
  • 2. What is Digital Citizenship? “Digital Citizenship is about using technology appropriately, and not misusing or abusing technology” -http://educationaltechnology.ca
  • 3. Nine Themes of Digital Citizenship • digital etiquette • digital communication • digital literacy • digital commerce • digital law • digital rights and responsibilities • digital health and wellness • digital security (self protection)
  • 4. This project addresses: • Netiquette • Copyright and Fair Use • Plagiarism • Safety on the internet • Safety on your computer
  • 5. Digital Ettiquette or “Netiquette” - set of rules on how to behave online
  • 6. The Core Rules of Netiquette: Dos Don't Lie Sharing is caring Don't Hate Correct mistakes No cursing Share accurate info. No disrespect Everything in moderation Respect privacy Show Love Don’ts
  • 7. Copyright & Fair Use
  • 8. Copyright “a legal concept, enacted by most governments, giving the creator of an original work exclusive rights to it, usually for a limited time.” - wikipedia.org
  • 9. Fair Use “a limitation and exception to the exclusive right granted by copyright law to the author of a creative work.” - wikipedia.org
  • 10. What is the difference between Copyright and Fair Use? Fair Use refers to being able to use parts of copyrighted materials without permission for educational reasons.
  • 12. According to the Merriam-Webster Online Dictionary, to "plagiarize" means: • to steal and pass off (the ideas or words of another) as one's own • to use (another's production) without crediting the source • to commit literary theft • to present as new and original an idea or product derived from an existing source.
  • 13. How can I avoid Plagarism? • Don’t turn in someone else's work as your own • Don’t copy words or ideas from someone else without giving credit • Don’t forget to put a quotation in quotation marks • Don’t give incorrect information about where the quotation came from • Don’t copy so many words or ideas from a source that it makes up the majority of your work, whether you give credit or not
  • 14. Remember… If the site is copyrighted, you need to request permission from the owners of the website. It there is no clear copyright listed, be sure to reference the site with the URL
  • 15. Technology Tools to help stop Plagiarism: Turnitin.com MyDropBox.com
  • 17. Safety on the Internet includes: • Identity Theft • Reputation management • Passwords • Cyberbullying • Cyberstalking
  • 18. Identity Theft When your personal information is stolen and then that person pretends to be you.
  • 19. Reputation Management When a individual or a business is continuously monitored in hopes to create positive commentary and dispute the negative.
  • 20. Passwords • Don't leave your passwords lying around • Don't reveal your passwords to others • Never give your password out in an email • Don't use the default password • Change reset passwords
  • 21. Cyberbullying Refers to bullying on the internet – social networking sites, emails and texts Remember… • If its something that is going to hurt someone’s feelings, don’t do it. • Don’t fight back. • Tell an adult. • What you say online could stay there forever.
  • 22. Cyberstalking Refers to using the Internet or any other electronic device to harass an individual, a group, or an organization. This includes: • Making false accusations. • Making threats. • Stealing someone’s identity. • Causing harm to someone’s data or computer equipment.
  • 23. Safety on your computer
  • 24. Safety on your computer includes: • Viruses • Phishing • Trojan horses • Worms
  • 25. Viruses A computer virus is a type of computer program that duplicates itself and can infect and damage a computer without the person knowing. Sometimes, when the computer gets a virus it can cause the computer to “act up” and may cause the computer to be slow, or even crash. Many important documents can be lost.
  • 26. Phishing Phishing happens through e-mails and instant messages. Phishing guides computer users to enter their information on a fake website that looks just like the real website. Types of Phishing: • Whaling • Clone Phishing • Spear Phishing
  • 27. Trojan Horses can: • Retrieve passwords or credit card information • Install damaging software • Download or upload files on anyone’s computer • Delete files • Watch the computer user's screen • Crash the computer
  • 28. Worms A computer worm is a damaging computer program that duplicates itself in order to spread to other computers through the computer network. Some worms have been created with good intentions.
  • 29. Ways to keep your computer safe: Make sure that your computer has an antivirus program installed. Never download anything off the internet without a parent’s permission.
  • 30. References Doering, A. H., & Roblyer, M. D. (2010). Integrating educational technology into teaching. (5 ed., pp. 217-222). Boston, MA: Pearson Education, Inc. http://www.wikipedia.org/ http://www.surfnetparents.com www.brainpop.com http://networketiquette.net/ http://fairuse.stanford.edu http://www.educationworld.com http://www.plagiarism.org/ http://learn-the-ropes.wikispaces.com/Digital+Citizenship http://educationaltechnology.ca