SlideShare a Scribd company logo
1 of 31
Digital Citizenship

  By Christa Stephens
What is
Digital Citizenship?

  “Digital Citizenship is about using
  technology appropriately, and not
   misusing or abusing technology”

                  -http://educationaltechnology.ca
Nine Themes of Digital
     Citizenship
           • digital etiquette
      • digital communication
            • digital literacy
         • digital commerce
             • digital law
  • digital rights and responsibilities
     • digital health and wellness
   • digital security (self protection)
This Digital Citizen
 project addresses:
      1. Netiquette
 2. Copyright and Fair Use
      3. Plagiarism
  4. Safety on the internet
5. Safety on your computer
“Netiquette”
Digital Ettiquette
  or “Netiquette”

A set of rules
  on how to
behave online
Core Rules on Netiquette
      Behavior:
                 Do’s
           Sharing is caring
          Correct mistakes
      Share accurate information
       Everything in moderation
           Respect privacy
              Show love


               Don’ts
              Don’t lie
             Don’t hate
             No cursing
            No disrespect
Copyright
   &
Fair Use
Copyright

  “a legal concept, enacted by most
governments, giving the creator of an
 original work exclusive rights to it,
      usually for a limited time.”
                            - wikipedia.org
Fair Use
“a limitation and exception to the
    exclusive right granted by
 copyright law to the author of a
         creative work.”
                        -wikipedia.org
What is the difference between
  Copyright and Fair Use?


         Fair Use refers to
      being able to use parts
     of copyrighted materials
        without permission
     for educational reasons.
Plagarism
According to the Merriam-Webster
Online Dictionary, to "plagiarize"
              means:

• to steal and pass off (the ideas or words of
  another) as one's own
• to use (another's production) without
  crediting the source
• to commit literary theft
• to present as new and original an idea or
  product derived from an existing source.
How can I avoid Plagarism?

• Don’t turn in someone else's work as your own
• Don’t copy words or ideas from someone else without
  giving credit
• Don’t forget to put a quotation in quotation marks
• Don’t give incorrect information about where the
  quotation came from
• Don’t copy so many words or ideas from a source that
  it makes up the majority of your work, whether you
  give credit or not
Remember…




  If the site is copyrighted, you need to
request permission from the owners of the
                   website.

  It there is no clear copyright listed, be
 sure to reference the site with the URL.
Technology Tools used to help
      stop Plagiarism:



        Turnitin.com

      MyDropBox.com
Safety
 on the
Internet
Safety on the Internet
      includes:
    • Identity Theft
• Reputation management
      • Passwords
    • Cyberbullying
    • Cyberstalking
Identity Theft
   When your
    personal
 information is
stolen and then
   that person
 pretends to be
      you.
Reputation
         Management
When a individual or a business is continuously
    monitored in hopes to create positive
    commentary and dispute the negative.
Passwords



• Don't leave your passwords lying around
 • Don't reveal your passwords to others
• Never give your password out in an email
   • Don't use the default password
      • Change reset passwords
Cyberbullying
Refers to bullying on the internet through social
       networking sites, emails and texts

                 Remember…
•If its something that is going to hurt someone’s feelings,
                         don’t do it.
                    •Don’t fight back.
                       •Tell an adult.
       •What you say online could stay there forever.
Cyberstalking
Refers to using the Internet or any other electronic device
  to harass an individual, a group, or an organization.


                This includes:
               •Making false accusations.
                    • Making threats.
             • Stealing someone’s identity.
•Causing harm to someone’s data or computer equipment.
Safety on your
  computer
Safety on your computer
        includes:

        • Viruses
       • Phishing
     • Trojan horses
        • Worms
Viruses
   A computer virus is a type of computer program that
   duplicates itself and can infect and damage a computer
                 without the person knowing.

Sometimes, when the computer gets a virus it can cause the
   computer to “act up” and may cause the computer to be
   slow, or even crash. Many important documents can be
                            lost.
Phishing
Phishing guides computer users to enter
  their information on a fake website that
 looks just like the real website. Phishing
    happens through e-mails and instant
                  messages.

        Types of Phishing:
              • Whaling
           • Clone Phishing
           • Spear Phishing
Trojan Horses can:
    •    Retrieve passwords or credit card information
               • Install damaging software
•       Download or upload files on anyone’s computer
                      • Delete files
           • Watch the computer user's screen
                  • Crash the computer
Worms
  A computer worm is a damaging
computer program that duplicates itself
 in order to spread to other computers
    through the computer network.

Some worms have been created with
good intentions, but most are harmful.
Make sure that your computer has an
      antivirus program installed.

Never download anything off the internet
      without a parent’s permission.
References
Doering, A. H., & Roblyer, M. D. (2010). Integrating educational
    technology into teaching. (5 ed., pp. 217-222). Boston, MA:
    Pearson Education, Inc.
http://www.wikipedia.org/
http://www.surfnetparents.com
www.brainpop.com
http://networketiquette.net/
http://fairuse.stanford.edu
http://www.educationworld.com
http://www.plagiarism.org/
http://learn-the-ropes.wikispaces.com/Digital+Citizenship
http://educationaltechnology.ca

More Related Content

What's hot

Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of NetiquetteACLC Antipolo
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525chadolivard
 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online_chimes_
 
Rules on the road to netique
Rules on the road to netiqueRules on the road to netique
Rules on the road to netiqueC_Warrick
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyJonathan Bacon
 
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEAlminaVelasco
 
Social Media Marketing 04 08 10
Social Media Marketing 04 08 10Social Media Marketing 04 08 10
Social Media Marketing 04 08 10Matthew Asbell
 
Cyber crime lecture pp update
Cyber crime lecture pp updateCyber crime lecture pp update
Cyber crime lecture pp updateyahooteacher
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parentswstagnaro
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
How To Keep Safe On The Internet!
How To Keep Safe On The Internet!How To Keep Safe On The Internet!
How To Keep Safe On The Internet!alexclark-efc
 
UW School of Medicine Social Engineering and Phishing Awareness
UW School of Medicine   Social Engineering and Phishing AwarenessUW School of Medicine   Social Engineering and Phishing Awareness
UW School of Medicine Social Engineering and Phishing AwarenessNicholas Davis
 

What's hot (20)

Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of Netiquette
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online
 
Rules on the road to netique
Rules on the road to netiqueRules on the road to netique
Rules on the road to netique
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and Privacy
 
Social Engineering : To Err is Human...
Social Engineering : To Err is Human...Social Engineering : To Err is Human...
Social Engineering : To Err is Human...
 
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social Media Marketing 04 08 10
Social Media Marketing 04 08 10Social Media Marketing 04 08 10
Social Media Marketing 04 08 10
 
Internet security
Internet securityInternet security
Internet security
 
Cyber crime lecture pp update
Cyber crime lecture pp updateCyber crime lecture pp update
Cyber crime lecture pp update
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
How To Keep Safe On The Internet!
How To Keep Safe On The Internet!How To Keep Safe On The Internet!
How To Keep Safe On The Internet!
 
UW School of Medicine Social Engineering and Phishing Awareness
UW School of Medicine   Social Engineering and Phishing AwarenessUW School of Medicine   Social Engineering and Phishing Awareness
UW School of Medicine Social Engineering and Phishing Awareness
 

Viewers also liked

Best of #PRProchat: Special Edition with Stockton University
Best of #PRProchat: Special Edition with Stockton UniversityBest of #PRProchat: Special Edition with Stockton University
Best of #PRProchat: Special Edition with Stockton UniversityCarrie Morgan
 
Real power point
Real power pointReal power point
Real power pointSilia07
 
中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知
中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知
中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知ennhchen
 
Emotional intelligence
Emotional intelligenceEmotional intelligence
Emotional intelligenceJoanMalone
 
Real power point
Real power pointReal power point
Real power pointSilia07
 
Best practices for bulk mailings with CiviCRM
Best practices for bulk mailings with CiviCRMBest practices for bulk mailings with CiviCRM
Best practices for bulk mailings with CiviCRMLeyla Alieva
 
Trends Within Youth Delinquency
Trends Within Youth DelinquencyTrends Within Youth Delinquency
Trends Within Youth Delinquency174521
 
How Recruiters Use Linked In 072312
How Recruiters Use Linked In 072312How Recruiters Use Linked In 072312
How Recruiters Use Linked In 072312JoanMalone
 
Emotional Intelligence
Emotional IntelligenceEmotional Intelligence
Emotional IntelligenceJoanMalone
 
Jim and lori
Jim and loriJim and lori
Jim and lorizidster
 

Viewers also liked (13)

Best of #PRProchat: Special Edition with Stockton University
Best of #PRProchat: Special Edition with Stockton UniversityBest of #PRProchat: Special Edition with Stockton University
Best of #PRProchat: Special Edition with Stockton University
 
Real power point
Real power pointReal power point
Real power point
 
中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知
中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知
中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知
 
Emotional intelligence
Emotional intelligenceEmotional intelligence
Emotional intelligence
 
Real power point
Real power pointReal power point
Real power point
 
Aula 8 php
Aula 8 phpAula 8 php
Aula 8 php
 
Best practices for bulk mailings with CiviCRM
Best practices for bulk mailings with CiviCRMBest practices for bulk mailings with CiviCRM
Best practices for bulk mailings with CiviCRM
 
Trends Within Youth Delinquency
Trends Within Youth DelinquencyTrends Within Youth Delinquency
Trends Within Youth Delinquency
 
How Recruiters Use Linked In 072312
How Recruiters Use Linked In 072312How Recruiters Use Linked In 072312
How Recruiters Use Linked In 072312
 
Emotional Intelligence
Emotional IntelligenceEmotional Intelligence
Emotional Intelligence
 
Web
WebWeb
Web
 
Jim and lori
Jim and loriJim and lori
Jim and lori
 
Music of vietnam
Music of vietnamMusic of vietnam
Music of vietnam
 

Similar to Digital citizenship

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safetyjaenjenny
 
Computer Security
Computer SecurityComputer Security
Computer Securitytonik
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxAarush59
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfExtremelyDarkness2
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online Nader Alkeinay
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thKartik Chhabra
 
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...Egyptian Engineers Association
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxBrian Pichman
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 

Similar to Digital citizenship (20)

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer security
Computer securityComputer security
Computer security
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12th
 
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 

Recently uploaded

How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17Celine George
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Celine George
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
CHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxCHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxAneriPatwari
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 

Recently uploaded (20)

How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
CHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxCHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptx
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 

Digital citizenship

  • 1. Digital Citizenship By Christa Stephens
  • 2. What is Digital Citizenship? “Digital Citizenship is about using technology appropriately, and not misusing or abusing technology” -http://educationaltechnology.ca
  • 3. Nine Themes of Digital Citizenship • digital etiquette • digital communication • digital literacy • digital commerce • digital law • digital rights and responsibilities • digital health and wellness • digital security (self protection)
  • 4. This Digital Citizen project addresses: 1. Netiquette 2. Copyright and Fair Use 3. Plagiarism 4. Safety on the internet 5. Safety on your computer
  • 6. Digital Ettiquette or “Netiquette” A set of rules on how to behave online
  • 7. Core Rules on Netiquette Behavior: Do’s Sharing is caring Correct mistakes Share accurate information Everything in moderation Respect privacy Show love Don’ts Don’t lie Don’t hate No cursing No disrespect
  • 8. Copyright & Fair Use
  • 9. Copyright “a legal concept, enacted by most governments, giving the creator of an original work exclusive rights to it, usually for a limited time.” - wikipedia.org
  • 10. Fair Use “a limitation and exception to the exclusive right granted by copyright law to the author of a creative work.” -wikipedia.org
  • 11. What is the difference between Copyright and Fair Use? Fair Use refers to being able to use parts of copyrighted materials without permission for educational reasons.
  • 13. According to the Merriam-Webster Online Dictionary, to "plagiarize" means: • to steal and pass off (the ideas or words of another) as one's own • to use (another's production) without crediting the source • to commit literary theft • to present as new and original an idea or product derived from an existing source.
  • 14. How can I avoid Plagarism? • Don’t turn in someone else's work as your own • Don’t copy words or ideas from someone else without giving credit • Don’t forget to put a quotation in quotation marks • Don’t give incorrect information about where the quotation came from • Don’t copy so many words or ideas from a source that it makes up the majority of your work, whether you give credit or not
  • 15. Remember… If the site is copyrighted, you need to request permission from the owners of the website. It there is no clear copyright listed, be sure to reference the site with the URL.
  • 16. Technology Tools used to help stop Plagiarism: Turnitin.com MyDropBox.com
  • 18. Safety on the Internet includes: • Identity Theft • Reputation management • Passwords • Cyberbullying • Cyberstalking
  • 19. Identity Theft When your personal information is stolen and then that person pretends to be you.
  • 20. Reputation Management When a individual or a business is continuously monitored in hopes to create positive commentary and dispute the negative.
  • 21. Passwords • Don't leave your passwords lying around • Don't reveal your passwords to others • Never give your password out in an email • Don't use the default password • Change reset passwords
  • 22. Cyberbullying Refers to bullying on the internet through social networking sites, emails and texts Remember… •If its something that is going to hurt someone’s feelings, don’t do it. •Don’t fight back. •Tell an adult. •What you say online could stay there forever.
  • 23. Cyberstalking Refers to using the Internet or any other electronic device to harass an individual, a group, or an organization. This includes: •Making false accusations. • Making threats. • Stealing someone’s identity. •Causing harm to someone’s data or computer equipment.
  • 24. Safety on your computer
  • 25. Safety on your computer includes: • Viruses • Phishing • Trojan horses • Worms
  • 26. Viruses A computer virus is a type of computer program that duplicates itself and can infect and damage a computer without the person knowing. Sometimes, when the computer gets a virus it can cause the computer to “act up” and may cause the computer to be slow, or even crash. Many important documents can be lost.
  • 27. Phishing Phishing guides computer users to enter their information on a fake website that looks just like the real website. Phishing happens through e-mails and instant messages. Types of Phishing: • Whaling • Clone Phishing • Spear Phishing
  • 28. Trojan Horses can: • Retrieve passwords or credit card information • Install damaging software • Download or upload files on anyone’s computer • Delete files • Watch the computer user's screen • Crash the computer
  • 29. Worms A computer worm is a damaging computer program that duplicates itself in order to spread to other computers through the computer network. Some worms have been created with good intentions, but most are harmful.
  • 30. Make sure that your computer has an antivirus program installed. Never download anything off the internet without a parent’s permission.
  • 31. References Doering, A. H., & Roblyer, M. D. (2010). Integrating educational technology into teaching. (5 ed., pp. 217-222). Boston, MA: Pearson Education, Inc. http://www.wikipedia.org/ http://www.surfnetparents.com www.brainpop.com http://networketiquette.net/ http://fairuse.stanford.edu http://www.educationworld.com http://www.plagiarism.org/ http://learn-the-ropes.wikispaces.com/Digital+Citizenship http://educationaltechnology.ca