SlideShare uma empresa Scribd logo
1 de 15
QUESTION 4
DIGITAL ETIQUETTE
May 20, 2017May 24, 2017 Deneilia Nadasen
Digital etiquette or netiquette,, as it is some of the time called, is a fundamental arrangement
of tenets you ought to follow keeping in mind the end goal to improve the web for others, and
better for you. It's similarly as essential to treat individuals with politeness and regard online
as it is, all things considered. When you text, visit, or email somebody over the Web, they can't
see your face to tell in case you're prodding them or saying something in delight or a joke. How
would you rehearse great Netiquette? It's straightforward. Simply regard others as you need
to be dealt with, with civility and regard. Individuals know these guidelines however normally
don't tail them when utilizing the Web. This incorporates hacking others PC, downloading
wrongfully, copyright infringement, and utilizing terrible dialect on the Web. (Bethel-Tate,
2017).
INAPPROPRIATE BEHAVIOUR
Wrong conduct in the web may brings about numerous things, things like cyberbullying,
cyberstalking, wholesale fraud, Hacking, undermining other individuals' PC and attacking
individuals' privacy.If you encounter any conduct that you find unseemly, experience hostile
material, or know about any manhandle happening on the web, you should report it to the
fitting experts You ought to likewise obstruct the culpable client or erase them from your
Contact Rundown." Web Wellbeing (2012)
Case of security and protection dangers and who they make you defenseless against:
Overlooking security settings. Security and protection dangers: demolished online notoriety,
digital stalkers, cyberbullies, and youngster predators.
*lying about your age and setting dates with outsiders disconnected. Disconnected dangers:
digital stalkers, tyke predators.
*clicking on each connection you go over. Web security dangers: malware diseases, phishing
locales.
IMPLICATIONS
Youngsters can feel humiliated and mortified. In the event that they're extremely upset this
could prompt self-damage or suicide.
Remember:
You have no control over what happens to photos and videos once they are sent.
Photos and videos can last forever
You put yourself at risk of whenever you share sexually explicit material.” Internet Safety
(2012)
Rule 1: Remember the Human
Rule 2: Adhere to the same standards of behavior online that you follow in real life
Rule 3: Know where you are in cyberspace
Rule 4: Respect other people's time and bandwidth
Rule 5: Make yourself look good online
Rule 6: Share expert knowledge
Rule 7: Help keep flame wars under control
Rule 8: Respect other people's privacy
Rule 9: Don't abuse your power
Rule 10: Be forgiving of other people's mistakes” albion(2011)
CYBERSTALKING
Is the point at which somebody is utilizing gadgets or the web to disturb or to stalk other
individual. This conduct is done for the most part by individuals who are genuine stalkers and
it can brings about other web clients feeling awkward.
CYBERBULLYING
Is a sort of harassing which is done electronically by means of cellphone, PCs and the web
might be web-based social networking, messages and instant messages. This is done for the
most part by young people. The casualties of this sort of harassing as a rule are additionally
tormented face to face. Casualties may experience the ill effects of lower confidence and as a
rule they begin utilizing/overdosing medications or alcohol.(Rouse;2012)
Data fraud
When somebody is utilizing other individuals' profiles as their own. Individuals much of the
time they utilize other individuals' profile to carry out wrongdoings again they may utilize it to
uncover false data about the genuine proprietor.
HACKING
*Getting in to somebody's record without their authorization.
Adulterating OTHER PEOPLE'S PCs
*Deleting other individuals' data without their consent.
Attacking Individuals Protection
*Sharing individuals' private information without counseling them.
CONSEQUENCES
This can prompt somebody being denied access to a specific site or online networking in light
of the fact that the is no site that is advancing misuse or tormenting. Human nobility of the can
be harmed or slighted. Casualties of this wrong conduct for the most part submits suicide since
you find that a specific data was uncovered about them and is a false. Again the separating of
connections of friends,collagues and family may happen.
LOSS OF JOB OPPORTUNITIES
•in many cases previously they procure a man they do a more profound research about that
individual I mean experiencing his/her web life suppose they locate that false data was spread
that you stole from your previous supervisors will despite everything they employ you on the
off chance that they saw that information?
MY Guidelines
•Always abstain from writing with Tops since individuals consider it as perhaps you are irate or
you are yelling.
•Always be human-recall about the individual you are sending the messages to, envision if
similar messages was send to you, in what manner will you feel - if great then you can send.
•Before posting a photo of you and your companion ask his/her authorization first-regardless
of the possibility that it's your telephone.
REFERENCE
Shea, V (1994) THE CORE RULES OF NETIQUETTE. Available
at http://www.albion.com/netiquette/corerules.html[Accessed 24 May 2017]
Inappropriate Behaviour | Internet Safety Available at http://internet-safety-
2012.info [Accessed 24 May 2017]
QUESTION 3
The “Napalm-Girl”
I think this picture is improper, on the grounds that this is a nine years of age young lady who
was stripped and escaping far from the smoke they were encountering a war in her nation.
Despite the fact that society appears to at long last be more alright with parts of life that ought
to have been acknowledged in any case, bareness is as yet an idea that flashes overwhelming
contention. The regular demonstration of breastfeeding is still observed by some as a
dishonorable thing that ought to be done in private. A lady's areola is still, in some obscure,
strange path, not quite the same as that of a man's. Also, now, a memorable narrative
photograph delineating the terrible outcome of a napalm assault amid the Vietnam War has
been seen to no end more than a photograph of an exposed youngster. Because the human
body can be related with sexual acts doesn't imply that is its sole reason. In the event that
seeing anything in connection to a bare body just starts profane musings, an inquiry in regards
to the level of development becomes possibly the most important factor. With a photo so
notable and outstanding as that of the napalm young lady, one can just ask why it was even an
inquiry regarding whether the photograph ought to have been evacuated. With the world
winding up increasingly tolerating, it appears to be just fit that we figure out how to
acknowledge the most normal and honest to goodness type of ourselves. Obviously, there are
occasions in which nakedness shouldn't be permitted or seen as fitting, however as far as such
basic and essential cases, there shouldn't be an inquiry.
REFERENCE:
https://www.theodysseyonline.com/napalm-girl
QUESTION 2
Digital Literacy & Information Fluency
Inquire:
Who was Homo-Naledi?
What is critical about the disclosure?
Secure:
Data was obtained at the accompanying site:
http://ewn.co.za/Highlights/Naledi
Break down:
A group of archeologists drove by Teacher Lee Berger embraced the Rising
Star Endeavor and they had left a mark on the world by finding and rescuing
fossils of no less than 15 people from the Dinaledi Chamber. This was a
developmental revelation since another types of hominines called Homo
Naledi was found oblivious , remote chamber.Homo Naledi have particular
physical highlights that are amazingly comparable to that of a person, for
example,
1. Curved fingers
2. Small skulls
3. Slender bodies
4. Ape-like shoulders
The intriguing realities include:
1. None of the fossils bear any imprints that could recommend that the
people were executed or that their bodies were rummaged.
2. Therewas no proof that demonstrated that the bodies were conveyed
into the chamber by something besides their kindred hominines.
3. Archaeological confirmation likewise proposes that they didn't all go
to the chamber in the meantime.
4.And out of more than 1,550 fossil components uncovered in the chamber,
just a modest bunch have a place with creatures, (for example, mice and
fowls) other than hominines.
Apply:
As indicated by the discoveries featured in the investigation Homo Naledi
could be our regular precursor thusly this proposes it could have had human
attributes both physical and mental and in addition comparative behavioral
qualities.The Dinaledi load could have been utilizedas a graveyardwherethe
newly discovered species could have performed entombment ceremonies
since none of the fossils had marks nor did they go to the chamber in the
meantime.
Evaluate:
Research was directed altogether and the data was removed from a decent
source.
REFERENCE
EWN Online (2016). Who was Homo Naledi? Accessed 09 April 2016:
http://ewn.co.za/Features/Naledi/What-Makes-Naledi-Special
QUESTION 6
6.1 Digital socialization: It is the methods for taking in the advanced standards, qualities,
conduct, and social aptitudes fitting keeping in mind the end goal to obtain a computerized
personality.
Web-based social networking can change groups and their practices and conventions through:
• Commodification:
Where our social conventions, for example, religious ceremonies, customary ethnic rights, and
so on are diminished and 'sterilized' to be exhibited to the worldwide group of onlookers;
• Staged impact:
Those exceptionally ceremonies and customs lose their esteem or reason as they turn into a
product;
• Acculturation:
This is the procedure of social and mental change that is a consequence of two societies
meeting.
• Behavior:
With quick access to data and correspondence, our conduct has changed to oblige it.
• Privacy:
In spite of the fact that the issue will be managed in the accompanying segment, the part of
protection here is managed from a socio-social perspective and not a legitimate viewpoint.
• Crime:
The Web has made it far less demanding for culprits to discover potential casualties. (The Free
Organization of Instruction (Pty) Ltd., 2016)
REFERENCE:
The Independent Institute of Education (Pty) Ltd., 2016. DIGITAL CITIZENSHIP MODULE
MANUAL 2016 (First Edition: 2015), n.p.: IIE.
6.2 Morals incorporate good decisions made by people in connection to whatever remains of
the group, norms of adequate conduct, and guidelines overseeing individuals from a calling.
The under-said moral issues are what we should know about when we take a gander at our
activities and how they can affect on society on the loose. These moral issues are extensive,
including perspectives, for example,
• Copyright access and encroachment;
• Freedoms and responsibility;
• Privacy and security;
• Cultural observations and qualities;
• Cross social correspondence;
REFERENCE:
DIGITAL CITIZENSHIP 2017 MODULE MANUAL First Edition (2015) Revised Edition 2
IIE. 2017.
QUESTION 7
There are different risks that can influence the children or kindred understudies on the web
and I will simply name and clarify the few dangers beneath:
CYBERBULLYING
The harassing occurs on both play grounds and in the computerized world, harmful words are
traded during the time spent conveying in the advanced world and furthermore gossipy tidbits
effortlessly begin and spread rapidly.
GAMING
While online you can reassure recreations and it can be exceptionally fun, instructive and
intuitive, there are additionally concealed threats. A significant part of the substance of a few
diversions contains sexual substance, savagery,andrough dialectinaddition to web associated
recreations empower children to connect with outsiders and some of which can be risky.
Obscenity
More than once seeing explicit entertainment, particularly from a youthful age can
fundamentally shape one's sexual disposition and convictions. Visit presentation to sexual
unequivocal material is firmly connected to more tolerant dispositions about sex.
PREDATORS
The web is the absolute best discussion to meet new individuals, yet some with pernicious
expectation canutilize it to become a closeacquaintence with your companion. Web predators
are expecting controllers, ready to cultivate a relationship of reliance with a young person.
YOUTUBE
YouTube is the world's biggest video sharing site, but since anybody can transfer anything to
YouTube, regularly recordings can break the group rules for YouTube, and even those that
don't can in any case be loaded with sexual insinuation, provocative substance, and foul
dialect.
My cordial cautioning to my kindred understudies is that they should be extremely cautious on
the above perils as they like utilizing web, despite the fact that it is in reality compelling on
these days to utilize innovation yet as we as a whole realize that everything that has points of
interest it has additionally impediments. In this way, to my kindred understudies please utilize
the web viably for good purposes to abstain from being addictive on some of these dangers as
it isn't useful for your age.
REFERENCE:
http://www.accessismyright.pk/aimr/?q=content/hazards-digital-security
QUESTION 9
Digital commerceis the electronic selling of buying and goods. (Ribble, 2011) According to
some estimates, digital commerce accounts for 6.5% of all global retail sales and project e-
commerce to surpass a trillion dollars annually in 2016 (Business Insider, 2013).
According to SamMallikarjunan
B2B (Business to Business)
Business-To-Business (B2B) alludes to a business (the online business retailer) offering
specifically to another business merchandise or administrations that are utilized by the
beneficiary to control their business. It might be as central to their business as pitching iron to
a development organization or as supplemental as pitching espresso to be devoured by
representatives at a promoting programming organization in Boston.
C2C (Purchaser to Buyer)
In a Purchaser To-Buyer (C2C) display, the internet business site serves to encourage the
exchange between two shoppers. Sale locales, for example, eBay (particularly when things are
sold by people, as opposed to organizations posting items available to be purchased - a
semantic refinement which in any case on a very basic level changes the connection between
the dealer and purchaser) are the great cases of C2C online business destinations. Dating sites
or locales like Etsy where people can offer specifically to different people could be viewed as
another case of C2C internet business.
C2B (Buyer to Business)
In a Buyer To-Business (C2B) demonstrate, shoppers pitch items and administrations to
organizations,rather than the a differentway. For instance, the shoppers could listoccupations
to-be-done or items they need and organizations vie for and finish the exchange through the
C2B site, or a business could have a site where customers can offer them things that they
require.
B2C (Business to Shopper)
Internet business is ordinarily thought of as a business pitching something through an online
interface to a customer - otherwise called Business to Shopper (B2C). The most generally
known web based business organizations, for example, Amazon Coordinate (which varies
from Amazon in general - which we'll address later) or Buy.com, Wal-Mart.com, Target.com,
and so forth., is one where a retailer offers straightforwardly to an end client.
References
Sam Mallikarjunan. (February 19, 2014).
X2X ECOMMERCE: A PRIMER ON 4 DIFFERENT BUSINESS MODELS.
Available: https://blog.hubspot.com/ecommerce/x2x-ecommerce-business-models.
Last accessed 6/12/2017.
Module Manual, pages 156-157, (Ribble, 2011)
QUESTION 5
Digital Bill of Rights.
The meaning of digital rights and responsibilities is having the privilege and flexibility to utilize
a wide rangeof computerized innovation whileutilizing the innovation in a worthy and suitable
way. As a client of advanced innovation, you likewise have the privilege to security and the
opportunity of personal expression. http://www.digitalcitizenship.net
The reason I picked the point of digital rights and responsibilities is on account of in spite of
the fact that we have the privilege to security and opportunity in the computerized world, we
do have a duty to utilize it carefully and regard crafted by others. With everything there are
rules; along these lines, as instructors we have to ingrain the estimations of obligation, regard,
and trustworthiness, in our understudies when obtaining material or discussing in the
computerized sense. Understudies ought to be required to take after the Adequate Utilize
Arrangementintheir school regionthat points of interest how to be carefullyawareall through
the classroom setting. There have been such a significant number of cases as of late in the
media of digital harassing through messaging,sexting, Facebook, and other online networking,
and it needs to stop. Sadly, there have been frightful results and outcomes because of this sort
of annoying correspondence. Sometimes, the tormenting was bad to the point, that
understudies have ended their lives just to put a conclusion to the badgering. Understudies
ought not just comprehend that they not acting dependable and aware, but rather unlawful.
They should know that this kind of conduct is inadmissible and they will be condemned and
arraigned if gotten.
Despite the fact that the utilization of mobile phones has expanded in our general public, so
have the issues that go with them. Messaging to undermine tests or assignments is an uprising
issue in schools. Understudies desires and results ought to be made completely clear in the
school or classroom AUP (Worthy Utilize Arrangement) concerning mobile phone utilize. It is
similarly vital to instruct our understudies how refer to crafted by others suitably. They have
to comprehend that in spite of the fact that it is adequate to utilize somebody's work as an
asset, they additionally need to understand that giving legitimate credit to that individual is
going about as a capable subject. Literary theft has been a continuous issue in schools and
universities. This sort of conduct is wrong and encroach on the privileges of others. We have
to clarify to our understudies the desires of utilizing another person's work. The unlawfully
downloading of music and recordings has additionally been a continuous issue in our general
public. Understudies need to comprehend this isn't just rude to the craftsmen and creating
organizations, yet it is illegal. As educators, we too should regard crafted by others, such an
utilizing YouTube or instructor tube recordings inside our webpage's; they should be refered
to appropriately on our website page's so credit given. Once more, we should display our
understudy desires
* Below is a list digital rights and responsibilities in the digital sense:
Digital Rights:
*Right to freedom of expression.
*Right to privacy.
*Right to credit for personal works.
*Right to digital access.
*Right to our identity.
Digital Responsibilities:
*Responsibility to report bullying, harassing, sexting, or identity theft.
*Responsibility to cite works used for resources and researching.
*Responsibility to download music, videos, and other material legally.
*Responsibility to model and teach student expectations of technology use
.
*Responsibility to keep data/information safe from hackers.
*Responsibility not to falsify our identity in any way.
REFERENCE
http://www.digitalcitizenship.net/ (A guide to the components of digital citizenship.)
nternet bill of rights. [Web]. Retrieved from http://digiteen09-
flatclassroomproject.org/file/view/edRights.png/96109334/edRights
Wikipedia, . (2010, June 14). Digital rights. Retrieved
from http://en.wikipedia.org/wiki/Digital_rights 8.
Ribble, M. (2007). Digtial citizenship using technology appropriately. Retrieved
from http://www.digitalcitizenship.net/
Cybersmart!, . (2010). Digital citizenship lessons and activities. Retrieved
from http://cybersmartcurriculum.org/digitalcitizenship/
Warlick, D. (n.d.). Son of citation machine. Retrieved from http://citationmachine.net/
QUESTION 8
https://pin.it/2IuQ2zv
QUESTION 1
Link:
https://www.surveymonkey.com/results/SM-DWCC5L6Y8/

Mais conteúdo relacionado

Mais procurados

Social Media for Job Search
Social Media for Job SearchSocial Media for Job Search
Social Media for Job SearchCareer Maven
 
Internet safety brochure
Internet safety brochureInternet safety brochure
Internet safety brochureKdog9
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for ParentsRodolfo Salazar
 
Do fear and exaggeration increase risk?
Do fear and exaggeration increase risk?Do fear and exaggeration increase risk?
Do fear and exaggeration increase risk?Larry Magid
 
Digital Students, Digital Parents
Digital Students, Digital ParentsDigital Students, Digital Parents
Digital Students, Digital ParentsClint Hamada
 
JSCHS / Digital Citizenship Discussion
JSCHS / Digital Citizenship DiscussionJSCHS / Digital Citizenship Discussion
JSCHS / Digital Citizenship DiscussionOCHS Librarian
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Larry Magid
 
Cybersafety Preso
Cybersafety PresoCybersafety Preso
Cybersafety PresoJon Corippo
 
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakRaising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakBex Lewis
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)Pat Sine
 
Cyber-bullying
Cyber-bullyingCyber-bullying
Cyber-bullyinganwidener
 
Branding You
Branding YouBranding You
Branding Youyirvin
 
Social Media Safety For High School
Social Media Safety For High SchoolSocial Media Safety For High School
Social Media Safety For High SchoolLiftPotential
 
E safety training for foster carers by stephen carrick-davies jan 2013
E  safety training for foster carers by stephen carrick-davies jan 2013E  safety training for foster carers by stephen carrick-davies jan 2013
E safety training for foster carers by stephen carrick-davies jan 2013Stevecd
 
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...Adria Richards
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the LawSuna Gurol
 

Mais procurados (20)

E-safety leaflet
E-safety leaflet E-safety leaflet
E-safety leaflet
 
Social Media for Job Search
Social Media for Job SearchSocial Media for Job Search
Social Media for Job Search
 
Internet safety brochure
Internet safety brochureInternet safety brochure
Internet safety brochure
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
 
Do fear and exaggeration increase risk?
Do fear and exaggeration increase risk?Do fear and exaggeration increase risk?
Do fear and exaggeration increase risk?
 
Digital Students, Digital Parents
Digital Students, Digital ParentsDigital Students, Digital Parents
Digital Students, Digital Parents
 
JSCHS / Digital Citizenship Discussion
JSCHS / Digital Citizenship DiscussionJSCHS / Digital Citizenship Discussion
JSCHS / Digital Citizenship Discussion
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
Cybersafety Preso
Cybersafety PresoCybersafety Preso
Cybersafety Preso
 
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakRaising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Cyber-bullying
Cyber-bullyingCyber-bullying
Cyber-bullying
 
Branding You
Branding YouBranding You
Branding You
 
Social Media Safety For High School
Social Media Safety For High SchoolSocial Media Safety For High School
Social Media Safety For High School
 
E safety training for foster carers by stephen carrick-davies jan 2013
E  safety training for foster carers by stephen carrick-davies jan 2013E  safety training for foster carers by stephen carrick-davies jan 2013
E safety training for foster carers by stephen carrick-davies jan 2013
 
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...
 
Digital literacies
Digital literaciesDigital literacies
Digital literacies
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the Law
 

Semelhante a POE

Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
 
How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009bermandry
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
Assignment 8 draft 3
Assignment 8   draft 3Assignment 8   draft 3
Assignment 8 draft 3ksumbland
 
DIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptx
DIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptxDIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptx
DIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptxafhkdfs
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 SoundLarry Magid
 
Cyber sex preo-rf-v5
Cyber sex preo-rf-v5Cyber sex preo-rf-v5
Cyber sex preo-rf-v5Tom Daly
 
Digital Citizenship Symposium - Slide Compilation
Digital Citizenship Symposium - Slide CompilationDigital Citizenship Symposium - Slide Compilation
Digital Citizenship Symposium - Slide CompilationAlec Couros
 
Freedom-and-Responsibility-Dan-Lohrmann (3)
Freedom-and-Responsibility-Dan-Lohrmann (3)Freedom-and-Responsibility-Dan-Lohrmann (3)
Freedom-and-Responsibility-Dan-Lohrmann (3)Dan Lohrmann
 
Social networking by jarin
Social networking by jarinSocial networking by jarin
Social networking by jarinjarin651
 
Social Media101 V5
Social Media101 V5Social Media101 V5
Social Media101 V5KimBenedict
 
Social Media 101 for Parents: Do you know where your children are?
Social Media 101 for Parents:  Do you know where your children are?Social Media 101 for Parents:  Do you know where your children are?
Social Media 101 for Parents: Do you know where your children are?Sarah Welstead
 
Expanding our Horizons by Exploring the World Wide Web
Expanding our Horizons by Exploring the World Wide WebExpanding our Horizons by Exploring the World Wide Web
Expanding our Horizons by Exploring the World Wide WebSheila Dingcong
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk ManagementConnectSafely
 

Semelhante a POE (20)

Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
Your Child's Digital Tattoo
Your Child's Digital TattooYour Child's Digital Tattoo
Your Child's Digital Tattoo
 
How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Assignment 8 draft 3
Assignment 8   draft 3Assignment 8   draft 3
Assignment 8 draft 3
 
DIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptx
DIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptxDIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptx
DIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptx
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 
Cyber sex preo-rf-v5
Cyber sex preo-rf-v5Cyber sex preo-rf-v5
Cyber sex preo-rf-v5
 
Digital Citizenship Symposium - Slide Compilation
Digital Citizenship Symposium - Slide CompilationDigital Citizenship Symposium - Slide Compilation
Digital Citizenship Symposium - Slide Compilation
 
Freedom-and-Responsibility-Dan-Lohrmann (3)
Freedom-and-Responsibility-Dan-Lohrmann (3)Freedom-and-Responsibility-Dan-Lohrmann (3)
Freedom-and-Responsibility-Dan-Lohrmann (3)
 
Social networking by jarin
Social networking by jarinSocial networking by jarin
Social networking by jarin
 
Social Media101 V5
Social Media101 V5Social Media101 V5
Social Media101 V5
 
Social Media 101 for Parents: Do you know where your children are?
Social Media 101 for Parents:  Do you know where your children are?Social Media 101 for Parents:  Do you know where your children are?
Social Media 101 for Parents: Do you know where your children are?
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Expanding our Horizons by Exploring the World Wide Web
Expanding our Horizons by Exploring the World Wide WebExpanding our Horizons by Exploring the World Wide Web
Expanding our Horizons by Exploring the World Wide Web
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
 
U6 lesson 8 task 7
U6 lesson 8   task 7U6 lesson 8   task 7
U6 lesson 8 task 7
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 

Último (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 

POE

  • 1. QUESTION 4 DIGITAL ETIQUETTE May 20, 2017May 24, 2017 Deneilia Nadasen Digital etiquette or netiquette,, as it is some of the time called, is a fundamental arrangement of tenets you ought to follow keeping in mind the end goal to improve the web for others, and better for you. It's similarly as essential to treat individuals with politeness and regard online as it is, all things considered. When you text, visit, or email somebody over the Web, they can't see your face to tell in case you're prodding them or saying something in delight or a joke. How would you rehearse great Netiquette? It's straightforward. Simply regard others as you need to be dealt with, with civility and regard. Individuals know these guidelines however normally don't tail them when utilizing the Web. This incorporates hacking others PC, downloading wrongfully, copyright infringement, and utilizing terrible dialect on the Web. (Bethel-Tate, 2017). INAPPROPRIATE BEHAVIOUR Wrong conduct in the web may brings about numerous things, things like cyberbullying, cyberstalking, wholesale fraud, Hacking, undermining other individuals' PC and attacking individuals' privacy.If you encounter any conduct that you find unseemly, experience hostile material, or know about any manhandle happening on the web, you should report it to the fitting experts You ought to likewise obstruct the culpable client or erase them from your Contact Rundown." Web Wellbeing (2012) Case of security and protection dangers and who they make you defenseless against: Overlooking security settings. Security and protection dangers: demolished online notoriety, digital stalkers, cyberbullies, and youngster predators. *lying about your age and setting dates with outsiders disconnected. Disconnected dangers: digital stalkers, tyke predators. *clicking on each connection you go over. Web security dangers: malware diseases, phishing locales. IMPLICATIONS Youngsters can feel humiliated and mortified. In the event that they're extremely upset this could prompt self-damage or suicide.
  • 2. Remember: You have no control over what happens to photos and videos once they are sent. Photos and videos can last forever You put yourself at risk of whenever you share sexually explicit material.” Internet Safety (2012) Rule 1: Remember the Human Rule 2: Adhere to the same standards of behavior online that you follow in real life Rule 3: Know where you are in cyberspace Rule 4: Respect other people's time and bandwidth Rule 5: Make yourself look good online Rule 6: Share expert knowledge Rule 7: Help keep flame wars under control Rule 8: Respect other people's privacy Rule 9: Don't abuse your power Rule 10: Be forgiving of other people's mistakes” albion(2011) CYBERSTALKING Is the point at which somebody is utilizing gadgets or the web to disturb or to stalk other individual. This conduct is done for the most part by individuals who are genuine stalkers and it can brings about other web clients feeling awkward. CYBERBULLYING Is a sort of harassing which is done electronically by means of cellphone, PCs and the web might be web-based social networking, messages and instant messages. This is done for the most part by young people. The casualties of this sort of harassing as a rule are additionally tormented face to face. Casualties may experience the ill effects of lower confidence and as a rule they begin utilizing/overdosing medications or alcohol.(Rouse;2012) Data fraud When somebody is utilizing other individuals' profiles as their own. Individuals much of the time they utilize other individuals' profile to carry out wrongdoings again they may utilize it to uncover false data about the genuine proprietor. HACKING *Getting in to somebody's record without their authorization. Adulterating OTHER PEOPLE'S PCs *Deleting other individuals' data without their consent. Attacking Individuals Protection *Sharing individuals' private information without counseling them.
  • 3. CONSEQUENCES This can prompt somebody being denied access to a specific site or online networking in light of the fact that the is no site that is advancing misuse or tormenting. Human nobility of the can be harmed or slighted. Casualties of this wrong conduct for the most part submits suicide since you find that a specific data was uncovered about them and is a false. Again the separating of connections of friends,collagues and family may happen. LOSS OF JOB OPPORTUNITIES •in many cases previously they procure a man they do a more profound research about that individual I mean experiencing his/her web life suppose they locate that false data was spread that you stole from your previous supervisors will despite everything they employ you on the off chance that they saw that information? MY Guidelines •Always abstain from writing with Tops since individuals consider it as perhaps you are irate or you are yelling. •Always be human-recall about the individual you are sending the messages to, envision if similar messages was send to you, in what manner will you feel - if great then you can send. •Before posting a photo of you and your companion ask his/her authorization first-regardless of the possibility that it's your telephone. REFERENCE Shea, V (1994) THE CORE RULES OF NETIQUETTE. Available at http://www.albion.com/netiquette/corerules.html[Accessed 24 May 2017] Inappropriate Behaviour | Internet Safety Available at http://internet-safety- 2012.info [Accessed 24 May 2017]
  • 4. QUESTION 3 The “Napalm-Girl” I think this picture is improper, on the grounds that this is a nine years of age young lady who was stripped and escaping far from the smoke they were encountering a war in her nation. Despite the fact that society appears to at long last be more alright with parts of life that ought to have been acknowledged in any case, bareness is as yet an idea that flashes overwhelming contention. The regular demonstration of breastfeeding is still observed by some as a dishonorable thing that ought to be done in private. A lady's areola is still, in some obscure, strange path, not quite the same as that of a man's. Also, now, a memorable narrative photograph delineating the terrible outcome of a napalm assault amid the Vietnam War has been seen to no end more than a photograph of an exposed youngster. Because the human body can be related with sexual acts doesn't imply that is its sole reason. In the event that seeing anything in connection to a bare body just starts profane musings, an inquiry in regards to the level of development becomes possibly the most important factor. With a photo so notable and outstanding as that of the napalm young lady, one can just ask why it was even an inquiry regarding whether the photograph ought to have been evacuated. With the world winding up increasingly tolerating, it appears to be just fit that we figure out how to acknowledge the most normal and honest to goodness type of ourselves. Obviously, there are occasions in which nakedness shouldn't be permitted or seen as fitting, however as far as such basic and essential cases, there shouldn't be an inquiry. REFERENCE: https://www.theodysseyonline.com/napalm-girl
  • 5. QUESTION 2 Digital Literacy & Information Fluency Inquire: Who was Homo-Naledi? What is critical about the disclosure? Secure: Data was obtained at the accompanying site: http://ewn.co.za/Highlights/Naledi Break down: A group of archeologists drove by Teacher Lee Berger embraced the Rising Star Endeavor and they had left a mark on the world by finding and rescuing fossils of no less than 15 people from the Dinaledi Chamber. This was a developmental revelation since another types of hominines called Homo Naledi was found oblivious , remote chamber.Homo Naledi have particular physical highlights that are amazingly comparable to that of a person, for example, 1. Curved fingers 2. Small skulls 3. Slender bodies 4. Ape-like shoulders The intriguing realities include: 1. None of the fossils bear any imprints that could recommend that the people were executed or that their bodies were rummaged. 2. Therewas no proof that demonstrated that the bodies were conveyed into the chamber by something besides their kindred hominines. 3. Archaeological confirmation likewise proposes that they didn't all go to the chamber in the meantime.
  • 6. 4.And out of more than 1,550 fossil components uncovered in the chamber, just a modest bunch have a place with creatures, (for example, mice and fowls) other than hominines. Apply: As indicated by the discoveries featured in the investigation Homo Naledi could be our regular precursor thusly this proposes it could have had human attributes both physical and mental and in addition comparative behavioral qualities.The Dinaledi load could have been utilizedas a graveyardwherethe newly discovered species could have performed entombment ceremonies since none of the fossils had marks nor did they go to the chamber in the meantime. Evaluate: Research was directed altogether and the data was removed from a decent source. REFERENCE EWN Online (2016). Who was Homo Naledi? Accessed 09 April 2016: http://ewn.co.za/Features/Naledi/What-Makes-Naledi-Special
  • 7. QUESTION 6 6.1 Digital socialization: It is the methods for taking in the advanced standards, qualities, conduct, and social aptitudes fitting keeping in mind the end goal to obtain a computerized personality. Web-based social networking can change groups and their practices and conventions through: • Commodification: Where our social conventions, for example, religious ceremonies, customary ethnic rights, and so on are diminished and 'sterilized' to be exhibited to the worldwide group of onlookers; • Staged impact: Those exceptionally ceremonies and customs lose their esteem or reason as they turn into a product; • Acculturation: This is the procedure of social and mental change that is a consequence of two societies meeting. • Behavior: With quick access to data and correspondence, our conduct has changed to oblige it. • Privacy: In spite of the fact that the issue will be managed in the accompanying segment, the part of protection here is managed from a socio-social perspective and not a legitimate viewpoint. • Crime: The Web has made it far less demanding for culprits to discover potential casualties. (The Free Organization of Instruction (Pty) Ltd., 2016) REFERENCE: The Independent Institute of Education (Pty) Ltd., 2016. DIGITAL CITIZENSHIP MODULE MANUAL 2016 (First Edition: 2015), n.p.: IIE.
  • 8. 6.2 Morals incorporate good decisions made by people in connection to whatever remains of the group, norms of adequate conduct, and guidelines overseeing individuals from a calling. The under-said moral issues are what we should know about when we take a gander at our activities and how they can affect on society on the loose. These moral issues are extensive, including perspectives, for example, • Copyright access and encroachment; • Freedoms and responsibility; • Privacy and security; • Cultural observations and qualities; • Cross social correspondence; REFERENCE: DIGITAL CITIZENSHIP 2017 MODULE MANUAL First Edition (2015) Revised Edition 2 IIE. 2017.
  • 9. QUESTION 7 There are different risks that can influence the children or kindred understudies on the web and I will simply name and clarify the few dangers beneath: CYBERBULLYING The harassing occurs on both play grounds and in the computerized world, harmful words are traded during the time spent conveying in the advanced world and furthermore gossipy tidbits effortlessly begin and spread rapidly. GAMING While online you can reassure recreations and it can be exceptionally fun, instructive and intuitive, there are additionally concealed threats. A significant part of the substance of a few diversions contains sexual substance, savagery,andrough dialectinaddition to web associated recreations empower children to connect with outsiders and some of which can be risky. Obscenity More than once seeing explicit entertainment, particularly from a youthful age can fundamentally shape one's sexual disposition and convictions. Visit presentation to sexual unequivocal material is firmly connected to more tolerant dispositions about sex. PREDATORS The web is the absolute best discussion to meet new individuals, yet some with pernicious expectation canutilize it to become a closeacquaintence with your companion. Web predators are expecting controllers, ready to cultivate a relationship of reliance with a young person. YOUTUBE YouTube is the world's biggest video sharing site, but since anybody can transfer anything to YouTube, regularly recordings can break the group rules for YouTube, and even those that don't can in any case be loaded with sexual insinuation, provocative substance, and foul dialect. My cordial cautioning to my kindred understudies is that they should be extremely cautious on the above perils as they like utilizing web, despite the fact that it is in reality compelling on these days to utilize innovation yet as we as a whole realize that everything that has points of interest it has additionally impediments. In this way, to my kindred understudies please utilize the web viably for good purposes to abstain from being addictive on some of these dangers as it isn't useful for your age. REFERENCE: http://www.accessismyright.pk/aimr/?q=content/hazards-digital-security
  • 10. QUESTION 9 Digital commerceis the electronic selling of buying and goods. (Ribble, 2011) According to some estimates, digital commerce accounts for 6.5% of all global retail sales and project e- commerce to surpass a trillion dollars annually in 2016 (Business Insider, 2013). According to SamMallikarjunan B2B (Business to Business) Business-To-Business (B2B) alludes to a business (the online business retailer) offering specifically to another business merchandise or administrations that are utilized by the beneficiary to control their business. It might be as central to their business as pitching iron to a development organization or as supplemental as pitching espresso to be devoured by representatives at a promoting programming organization in Boston. C2C (Purchaser to Buyer) In a Purchaser To-Buyer (C2C) display, the internet business site serves to encourage the exchange between two shoppers. Sale locales, for example, eBay (particularly when things are sold by people, as opposed to organizations posting items available to be purchased - a semantic refinement which in any case on a very basic level changes the connection between the dealer and purchaser) are the great cases of C2C online business destinations. Dating sites or locales like Etsy where people can offer specifically to different people could be viewed as another case of C2C internet business. C2B (Buyer to Business) In a Buyer To-Business (C2B) demonstrate, shoppers pitch items and administrations to organizations,rather than the a differentway. For instance, the shoppers could listoccupations to-be-done or items they need and organizations vie for and finish the exchange through the C2B site, or a business could have a site where customers can offer them things that they require.
  • 11. B2C (Business to Shopper) Internet business is ordinarily thought of as a business pitching something through an online interface to a customer - otherwise called Business to Shopper (B2C). The most generally known web based business organizations, for example, Amazon Coordinate (which varies from Amazon in general - which we'll address later) or Buy.com, Wal-Mart.com, Target.com, and so forth., is one where a retailer offers straightforwardly to an end client. References Sam Mallikarjunan. (February 19, 2014). X2X ECOMMERCE: A PRIMER ON 4 DIFFERENT BUSINESS MODELS. Available: https://blog.hubspot.com/ecommerce/x2x-ecommerce-business-models. Last accessed 6/12/2017. Module Manual, pages 156-157, (Ribble, 2011)
  • 12. QUESTION 5 Digital Bill of Rights. The meaning of digital rights and responsibilities is having the privilege and flexibility to utilize a wide rangeof computerized innovation whileutilizing the innovation in a worthy and suitable way. As a client of advanced innovation, you likewise have the privilege to security and the opportunity of personal expression. http://www.digitalcitizenship.net The reason I picked the point of digital rights and responsibilities is on account of in spite of the fact that we have the privilege to security and opportunity in the computerized world, we do have a duty to utilize it carefully and regard crafted by others. With everything there are rules; along these lines, as instructors we have to ingrain the estimations of obligation, regard, and trustworthiness, in our understudies when obtaining material or discussing in the computerized sense. Understudies ought to be required to take after the Adequate Utilize Arrangementintheir school regionthat points of interest how to be carefullyawareall through the classroom setting. There have been such a significant number of cases as of late in the media of digital harassing through messaging,sexting, Facebook, and other online networking, and it needs to stop. Sadly, there have been frightful results and outcomes because of this sort of annoying correspondence. Sometimes, the tormenting was bad to the point, that understudies have ended their lives just to put a conclusion to the badgering. Understudies ought not just comprehend that they not acting dependable and aware, but rather unlawful. They should know that this kind of conduct is inadmissible and they will be condemned and arraigned if gotten. Despite the fact that the utilization of mobile phones has expanded in our general public, so have the issues that go with them. Messaging to undermine tests or assignments is an uprising issue in schools. Understudies desires and results ought to be made completely clear in the school or classroom AUP (Worthy Utilize Arrangement) concerning mobile phone utilize. It is similarly vital to instruct our understudies how refer to crafted by others suitably. They have to comprehend that in spite of the fact that it is adequate to utilize somebody's work as an asset, they additionally need to understand that giving legitimate credit to that individual is going about as a capable subject. Literary theft has been a continuous issue in schools and universities. This sort of conduct is wrong and encroach on the privileges of others. We have to clarify to our understudies the desires of utilizing another person's work. The unlawfully downloading of music and recordings has additionally been a continuous issue in our general public. Understudies need to comprehend this isn't just rude to the craftsmen and creating organizations, yet it is illegal. As educators, we too should regard crafted by others, such an utilizing YouTube or instructor tube recordings inside our webpage's; they should be refered to appropriately on our website page's so credit given. Once more, we should display our understudy desires
  • 13. * Below is a list digital rights and responsibilities in the digital sense: Digital Rights: *Right to freedom of expression. *Right to privacy. *Right to credit for personal works. *Right to digital access. *Right to our identity. Digital Responsibilities: *Responsibility to report bullying, harassing, sexting, or identity theft. *Responsibility to cite works used for resources and researching. *Responsibility to download music, videos, and other material legally. *Responsibility to model and teach student expectations of technology use . *Responsibility to keep data/information safe from hackers. *Responsibility not to falsify our identity in any way. REFERENCE http://www.digitalcitizenship.net/ (A guide to the components of digital citizenship.) nternet bill of rights. [Web]. Retrieved from http://digiteen09- flatclassroomproject.org/file/view/edRights.png/96109334/edRights Wikipedia, . (2010, June 14). Digital rights. Retrieved from http://en.wikipedia.org/wiki/Digital_rights 8. Ribble, M. (2007). Digtial citizenship using technology appropriately. Retrieved from http://www.digitalcitizenship.net/ Cybersmart!, . (2010). Digital citizenship lessons and activities. Retrieved from http://cybersmartcurriculum.org/digitalcitizenship/ Warlick, D. (n.d.). Son of citation machine. Retrieved from http://citationmachine.net/