SlideShare a Scribd company logo
1 of 30
Digital Citizenship

  By Christa Stephens
What is
  Digital Citizenship?

“Digital Citizenship is about using
technology appropriately, and not
 misusing or abusing technology”

                -http://educationaltechnology.ca
Nine Themes of Digital
     Citizenship
           • digital etiquette
      • digital communication
            • digital literacy
         • digital commerce
             • digital law
  • digital rights and responsibilities
     • digital health and wellness
   • digital security (self protection)
This project addresses:

•   Netiquette
•   Copyright and Fair Use
•   Plagiarism
•   Safety on the internet
•   Safety on your computer
Digital Ettiquette
 or “Netiquette”

     - set of rules
       on how to
    behave online
The Core Rules of Netiquette:

            Dos                 Don't Lie


       Sharing is caring       Don't Hate


       Correct mistakes        No cursing


     Share accurate info.     No disrespect


   Everything in moderation

       Respect privacy

         Show Love
          Don’ts
Copyright
   &
Fair Use
Copyright

  “a legal concept, enacted by most
governments, giving the creator of an
   original work exclusive rights to
    it, usually for a limited time.”
                            - wikipedia.org
Fair Use

“a limitation and exception to the
    exclusive right granted by
 copyright law to the author of a
         creative work.”
                       -   wikipedia.org
What is the difference between
  Copyright and Fair Use?

          Fair Use refers to
       being able to use parts
      of copyrighted materials
         without permission
      for educational reasons.
Plagarism
According to the Merriam-Webster
Online Dictionary, to "plagiarize"
              means:

• to steal and pass off (the ideas or words of
  another) as one's own
• to use (another's production) without
  crediting the source
• to commit literary theft
• to present as new and original an idea or
  product derived from an existing source.
How can I avoid Plagarism?

• Don’t turn in someone else's work as your own
• Don’t copy words or ideas from someone else without
  giving credit
• Don’t forget to put a quotation in quotation marks
• Don’t give incorrect information about where the
  quotation came from
• Don’t copy so many words or ideas from a source that
  it makes up the majority of your work, whether you
  give credit or not
Remember…

 If the site is copyrighted, you need to
request permission from the owners of
                the website.

It there is no clear copyright listed, be
sure to reference the site with the URL
Technology Tools to help
    stop Plagiarism:


      Turnitin.com

    MyDropBox.com
Safety
 on the
Internet
Safety on the Internet
      includes:
    • Identity Theft
• Reputation management
      • Passwords
    • Cyberbullying
    • Cyberstalking
Identity Theft
    When your personal
  information is stolen and
then that person pretends to
           be you.
Reputation
      Management
When a individual or a business
 is continuously monitored in
    hopes to create positive
        commentary and
      dispute the negative.
Passwords
  • Don't leave your passwords lying
                 around
• Don't reveal your passwords to others
 • Never give your password out in an
                  email
   • Don't use the default password
      • Change reset passwords
Cyberbullying
Refers to bullying on the internet – social networking
                sites, emails and texts



              Remember…
 • If its something that is going to hurt someone’s
                 feelings, don’t do it.
               • Don’t fight back.
                 • Tell an adult.
  • What you say online could stay there forever.
Cyberstalking
Refers to using the Internet or any other electronic device
  to harass an individual, a group, or an organization.


                This includes:
            • Making false accusations.
                • Making threats.
          • Stealing someone’s identity.
    • Causing harm to someone’s data or computer
                      equipment.
Safety on your
  computer
Safety on your computer
        includes:

        • Viruses
       • Phishing
     • Trojan horses
        • Worms
Viruses
   A computer virus is a type of computer program that
   duplicates itself and can infect and damage a computer
                 without the person knowing.

Sometimes, when the computer gets a virus it can cause the
   computer to “act up” and may cause the computer to be
   slow, or even crash. Many important documents can be
                            lost.
Phishing
Phishing happens through e-mails and instant
 messages. Phishing guides computer users to
 enter their information on a fake website that
         looks just like the real website.


          Types of Phishing:
               • Whaling
             • Clone Phishing
             • Spear Phishing
Trojan Horses can:

• Retrieve passwords or credit card information
         • Install damaging software
   • Download or upload files on anyone’s
                    computer
                • Delete files
     • Watch the computer user's screen
            • Crash the computer
Worms
  A computer worm is a damaging
computer program that duplicates itself
 in order to spread to other computers
    through the computer network.

Some worms have been created with
         good intentions.
Ways to keep your computer
           safe:

  Make sure that your computer has an
      antivirus program installed.

Never download anything off the internet
      without a parent’s permission.
References
Doering, A. H., & Roblyer, M. D. (2010). Integrating educational
    technology into teaching. (5 ed., pp. 217-222). Boston, MA:
    Pearson Education, Inc.
http://www.wikipedia.org/
http://www.surfnetparents.com
www.brainpop.com
http://networketiquette.net/
http://fairuse.stanford.edu
http://www.educationworld.com
http://www.plagiarism.org/
http://learn-the-ropes.wikispaces.com/Digital+Citizenship
http://educationaltechnology.ca

More Related Content

What's hot

Rules on the road to netique
Rules on the road to netiqueRules on the road to netique
Rules on the road to netiqueC_Warrick
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide showBeckusq
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525chadolivard
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for childrenSaurav Jha
 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online_chimes_
 
How To Keep Safe On The Internet!
How To Keep Safe On The Internet!How To Keep Safe On The Internet!
How To Keep Safe On The Internet!alexclark-efc
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYFaMulan2
 
Social Media Marketing 04 08 10
Social Media Marketing 04 08 10Social Media Marketing 04 08 10
Social Media Marketing 04 08 10Matthew Asbell
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parentswstagnaro
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyJonathan Bacon
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online Nader Alkeinay
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centurygracestearns
 
6 8 safety ppt final copy
6 8 safety ppt final copy6 8 safety ppt final copy
6 8 safety ppt final copymarkkreiter
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 

What's hot (18)

Rules on the road to netique
Rules on the road to netiqueRules on the road to netique
Rules on the road to netique
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online
 
How To Keep Safe On The Internet!
How To Keep Safe On The Internet!How To Keep Safe On The Internet!
How To Keep Safe On The Internet!
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
Social Media Marketing 04 08 10
Social Media Marketing 04 08 10Social Media Marketing 04 08 10
Social Media Marketing 04 08 10
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Internet security
Internet securityInternet security
Internet security
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and Privacy
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_century
 
6 8 safety ppt final copy
6 8 safety ppt final copy6 8 safety ppt final copy
6 8 safety ppt final copy
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 

Viewers also liked

Trends Within Youth Delinquency
Trends Within Youth DelinquencyTrends Within Youth Delinquency
Trends Within Youth Delinquency174521
 
Real power point
Real power pointReal power point
Real power pointSilia07
 
How Recruiters Use Linked In 072312
How Recruiters Use Linked In 072312How Recruiters Use Linked In 072312
How Recruiters Use Linked In 072312JoanMalone
 
中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知
中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知
中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知ennhchen
 
Emotional Intelligence
Emotional IntelligenceEmotional Intelligence
Emotional IntelligenceJoanMalone
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Best practices for bulk mailings with CiviCRM
Best practices for bulk mailings with CiviCRMBest practices for bulk mailings with CiviCRM
Best practices for bulk mailings with CiviCRMLeyla Alieva
 
Real power point
Real power pointReal power point
Real power pointSilia07
 
Jim and lori
Jim and loriJim and lori
Jim and lorizidster
 
Emotional intelligence
Emotional intelligenceEmotional intelligence
Emotional intelligenceJoanMalone
 
Best of #PRProchat: Special Edition with Stockton University
Best of #PRProchat: Special Edition with Stockton UniversityBest of #PRProchat: Special Edition with Stockton University
Best of #PRProchat: Special Edition with Stockton UniversityCarrie Morgan
 

Viewers also liked (14)

Trends Within Youth Delinquency
Trends Within Youth DelinquencyTrends Within Youth Delinquency
Trends Within Youth Delinquency
 
Aula 8 php
Aula 8 phpAula 8 php
Aula 8 php
 
Real power point
Real power pointReal power point
Real power point
 
Web
WebWeb
Web
 
How Recruiters Use Linked In 072312
How Recruiters Use Linked In 072312How Recruiters Use Linked In 072312
How Recruiters Use Linked In 072312
 
中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知
中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知
中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知
 
Emotional Intelligence
Emotional IntelligenceEmotional Intelligence
Emotional Intelligence
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Best practices for bulk mailings with CiviCRM
Best practices for bulk mailings with CiviCRMBest practices for bulk mailings with CiviCRM
Best practices for bulk mailings with CiviCRM
 
Real power point
Real power pointReal power point
Real power point
 
Jim and lori
Jim and loriJim and lori
Jim and lori
 
Emotional intelligence
Emotional intelligenceEmotional intelligence
Emotional intelligence
 
Best of #PRProchat: Special Edition with Stockton University
Best of #PRProchat: Special Edition with Stockton UniversityBest of #PRProchat: Special Edition with Stockton University
Best of #PRProchat: Special Edition with Stockton University
 
Music of vietnam
Music of vietnamMusic of vietnam
Music of vietnam
 

Similar to Digital citizenship

IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safetyjaenjenny
 
Computer Security
Computer SecurityComputer Security
Computer Securitytonik
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxAarush59
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfExtremelyDarkness2
 
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...Egyptian Engineers Association
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxBrian Pichman
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thKartik Chhabra
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 

Similar to Digital citizenship (20)

IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer security
Computer securityComputer security
Computer security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
 
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12th
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 

Recently uploaded (20)

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 

Digital citizenship

  • 1. Digital Citizenship By Christa Stephens
  • 2. What is Digital Citizenship? “Digital Citizenship is about using technology appropriately, and not misusing or abusing technology” -http://educationaltechnology.ca
  • 3. Nine Themes of Digital Citizenship • digital etiquette • digital communication • digital literacy • digital commerce • digital law • digital rights and responsibilities • digital health and wellness • digital security (self protection)
  • 4. This project addresses: • Netiquette • Copyright and Fair Use • Plagiarism • Safety on the internet • Safety on your computer
  • 5. Digital Ettiquette or “Netiquette” - set of rules on how to behave online
  • 6. The Core Rules of Netiquette: Dos Don't Lie Sharing is caring Don't Hate Correct mistakes No cursing Share accurate info. No disrespect Everything in moderation Respect privacy Show Love Don’ts
  • 7. Copyright & Fair Use
  • 8. Copyright “a legal concept, enacted by most governments, giving the creator of an original work exclusive rights to it, usually for a limited time.” - wikipedia.org
  • 9. Fair Use “a limitation and exception to the exclusive right granted by copyright law to the author of a creative work.” - wikipedia.org
  • 10. What is the difference between Copyright and Fair Use? Fair Use refers to being able to use parts of copyrighted materials without permission for educational reasons.
  • 12. According to the Merriam-Webster Online Dictionary, to "plagiarize" means: • to steal and pass off (the ideas or words of another) as one's own • to use (another's production) without crediting the source • to commit literary theft • to present as new and original an idea or product derived from an existing source.
  • 13. How can I avoid Plagarism? • Don’t turn in someone else's work as your own • Don’t copy words or ideas from someone else without giving credit • Don’t forget to put a quotation in quotation marks • Don’t give incorrect information about where the quotation came from • Don’t copy so many words or ideas from a source that it makes up the majority of your work, whether you give credit or not
  • 14. Remember… If the site is copyrighted, you need to request permission from the owners of the website. It there is no clear copyright listed, be sure to reference the site with the URL
  • 15. Technology Tools to help stop Plagiarism: Turnitin.com MyDropBox.com
  • 17. Safety on the Internet includes: • Identity Theft • Reputation management • Passwords • Cyberbullying • Cyberstalking
  • 18. Identity Theft When your personal information is stolen and then that person pretends to be you.
  • 19. Reputation Management When a individual or a business is continuously monitored in hopes to create positive commentary and dispute the negative.
  • 20. Passwords • Don't leave your passwords lying around • Don't reveal your passwords to others • Never give your password out in an email • Don't use the default password • Change reset passwords
  • 21. Cyberbullying Refers to bullying on the internet – social networking sites, emails and texts Remember… • If its something that is going to hurt someone’s feelings, don’t do it. • Don’t fight back. • Tell an adult. • What you say online could stay there forever.
  • 22. Cyberstalking Refers to using the Internet or any other electronic device to harass an individual, a group, or an organization. This includes: • Making false accusations. • Making threats. • Stealing someone’s identity. • Causing harm to someone’s data or computer equipment.
  • 23. Safety on your computer
  • 24. Safety on your computer includes: • Viruses • Phishing • Trojan horses • Worms
  • 25. Viruses A computer virus is a type of computer program that duplicates itself and can infect and damage a computer without the person knowing. Sometimes, when the computer gets a virus it can cause the computer to “act up” and may cause the computer to be slow, or even crash. Many important documents can be lost.
  • 26. Phishing Phishing happens through e-mails and instant messages. Phishing guides computer users to enter their information on a fake website that looks just like the real website. Types of Phishing: • Whaling • Clone Phishing • Spear Phishing
  • 27. Trojan Horses can: • Retrieve passwords or credit card information • Install damaging software • Download or upload files on anyone’s computer • Delete files • Watch the computer user's screen • Crash the computer
  • 28. Worms A computer worm is a damaging computer program that duplicates itself in order to spread to other computers through the computer network. Some worms have been created with good intentions.
  • 29. Ways to keep your computer safe: Make sure that your computer has an antivirus program installed. Never download anything off the internet without a parent’s permission.
  • 30. References Doering, A. H., & Roblyer, M. D. (2010). Integrating educational technology into teaching. (5 ed., pp. 217-222). Boston, MA: Pearson Education, Inc. http://www.wikipedia.org/ http://www.surfnetparents.com www.brainpop.com http://networketiquette.net/ http://fairuse.stanford.edu http://www.educationworld.com http://www.plagiarism.org/ http://learn-the-ropes.wikispaces.com/Digital+Citizenship http://educationaltechnology.ca