digital citizenship. what is a digital citizen? digital citizens are people who use technology often...
TRANSCRIPT
Digital CitizenshipDigital Citizenship
What is a Digital Citizen?What is a Digital Citizen?
Digital Citizens are people who use Digital Citizens are people who use technology often and appropriately. technology often and appropriately.
Digital Citizens abide by the laws Digital Citizens abide by the laws linked to technology.linked to technology.
What do I need to know?What do I need to know?
Netiquette On Social Media SitesNetiquette On Social Media Sites Copyright and Fair UseCopyright and Fair Use PlagiarismPlagiarism Safety On the InternetSafety On the Internet Safety On Your ComputerSafety On Your Computer
Netiquette On Social Netiquette On Social Media SitesMedia Sites
What is Netiquette?What is Netiquette?
Netiquette is the appropriate use of Netiquette is the appropriate use of conversation and dialogue when conversation and dialogue when posting on the Internet or other posting on the Internet or other computer networks.computer networks.
What NOT to do:What NOT to do:
Do notDo not put personal information in e- put personal information in e-mail or social networks…anyone can mail or social networks…anyone can see it.see it.
Do notDo not send large attachments over send large attachments over an email.an email.
Do notDo not use all capital letters when use all capital letters when writing. You do not have control on writing. You do not have control on how you “sound” on the other side.how you “sound” on the other side.
Do notDo not be rude when stating a point. be rude when stating a point.
What TO do:What TO do:
DoDo sign your e-mail messages. sign your e-mail messages. DoDo carefully choose your words carefully choose your words
before sending messages.before sending messages. DoDo check to see if attachments check to see if attachments
downloaded correctly and downloaded correctly and alwaysalways grammar check!grammar check!
Copyright and Fair UseCopyright and Fair Use
What is Copyright and Fair Use?What is Copyright and Fair Use?
Copyright: having the right to copy music, Copyright: having the right to copy music, literature, art, etc; The author has a legal literature, art, etc; The author has a legal copyright in effect until fifty years after copyright in effect until fifty years after their death.their death.
Fair Use: the freedom the society holds to Fair Use: the freedom the society holds to use parts of copyrighted materials for use parts of copyrighted materials for research, news, etc. If fair use of a research, news, etc. If fair use of a material is acted upon, the author must be material is acted upon, the author must be correctly cited.correctly cited.
Differences??Differences??
CopyrightCopyright
- Protection that an - Protection that an author or creator author or creator has on his work. has on his work.
This protection is a This protection is a legal document legal document
that prohibits the that prohibits the replication of the replication of the author’s work. author’s work.
Fair UseFair Use
- Fair Use guidelines - Fair Use guidelines allow society to use allow society to use
part of a part of a copyrighted copyrighted
material without material without the author’s the author’s
permission. This permission. This material must me material must me
cited correctly.cited correctly.
PlagiarismPlagiarism
What is Plagiarism?What is Plagiarism?
Plagiarism is the act of copying an Plagiarism is the act of copying an author’s work and not giving them author’s work and not giving them credit.credit.
How to avoid plagiarism:How to avoid plagiarism:
Always Always use quotations when using use quotations when using exact wording from an author’s work.exact wording from an author’s work.
AlwaysAlways paraphrase the text you are paraphrase the text you are taking information from. taking information from.
AlwaysAlways look over your paraphrase look over your paraphrase and make sure you have not just and make sure you have not just “replaced” words.“replaced” words.
Recognizing PlagiarismRecognizing Plagiarism
Is the student’s work a replica of how Is the student’s work a replica of how the student speaks normally?the student speaks normally?
Was the assignment completed Was the assignment completed thoroughly? thoroughly?
If plagiarism is suspected, teachers If plagiarism is suspected, teachers can use online tools to compare a can use online tools to compare a student’s work to an already student’s work to an already completed paper published online.completed paper published online.
Internet SafetyInternet Safety
Identity TheftIdentity Theft
Identity Theft: the use of someone’s Identity Theft: the use of someone’s information without their consent to information without their consent to borrow or spend money.borrow or spend money.
How to prevent?How to prevent?• Limit the use of credit/debit cards Limit the use of credit/debit cards
online. Make sure the site is secure and online. Make sure the site is secure and your information is not saved.your information is not saved.
Reputation ManagementReputation Management
Reputation Management: the act of Reputation Management: the act of monitoring and updating current monitoring and updating current information on blogs, websites and information on blogs, websites and networking media.networking media.
PasswordsPasswords
Passwords: word or code that is a Passwords: word or code that is a personal right of entry to a given personal right of entry to a given website or media source.website or media source.
How to choose a password:How to choose a password:• Use a word or code that is personal and Use a word or code that is personal and
that few would have access to.that few would have access to.• Adding symbols and numbers can make Adding symbols and numbers can make
a password discrete. a password discrete.
Cyber Bullying/StalkingCyber Bullying/Stalking
Cyber Bullying/Stalking: “picking” on Cyber Bullying/Stalking: “picking” on someone, giving harsh comments or someone, giving harsh comments or commands.commands.
How to prevent?How to prevent?• Do not give in to the abuse. If threats Do not give in to the abuse. If threats
are made, contact police or online are made, contact police or online monitor. monitor.
Computer SafetyComputer Safety
What to look for:What to look for: Viruses: program that copies and spreads itself. Viruses: program that copies and spreads itself.
Can happen through email.Can happen through email.
Phishing: the act of predators bribing internet Phishing: the act of predators bribing internet users to give personal information such as: credit users to give personal information such as: credit card information, passwords, and usernames.card information, passwords, and usernames.
Trojans: a program that is stored on computers Trojans: a program that is stored on computers that can remove personal information and send that can remove personal information and send through the internet.through the internet.
Worms: software that passes freely through Worms: software that passes freely through computers often leaving them damaged.computers often leaving them damaged.
Preventing the “bad stuff”Preventing the “bad stuff”
Install an anti-virus program the Install an anti-virus program the routinely checks your computer for routinely checks your computer for harmful applications.harmful applications.
Do not open email, messages, or web Do not open email, messages, or web pages that are not trusted.pages that are not trusted.
Work CitedWork Cited Riddle,M. (2012). Riddle,M. (2012). Digital Citizenship.Digital Citizenship. Retrieved Retrieved
from from http://http://www.digitalcitizenship.netwww.digitalcitizenship.net// Gedeborg, S. (2009). Gedeborg, S. (2009). Netiquette For Students on Netiquette For Students on
the Internet.the Internet. Retrieved from Retrieved from http://edtech2.boisestate.edu/gedeborgs/502/netihttp://edtech2.boisestate.edu/gedeborgs/502/netiquette.htmlquette.html
Leland Stanford Junior University. (2010) Leland Stanford Junior University. (2010) Fair Use.Fair Use. Retrieved from Retrieved from http://fairuse.stanford.edu/Copyright_and_Fair_Ushttp://fairuse.stanford.edu/Copyright_and_Fair_Use_Overview/chapter9/e_Overview/chapter9/
Nemours Foundation. (2012). Nemours Foundation. (2012). Cyberbullying. Cyberbullying. Retrieved from Retrieved from http://kidshealth.org/parent/positive/talk/cyberbullhttp://kidshealth.org/parent/positive/talk/cyberbullying.html ying.html
Works Cited Cont.Works Cited Cont. All Definitions came from: Online Dictionary: Dictionary.comAll Definitions came from: Online Dictionary: Dictionary.com Graphics:Graphics: Education News. (2012). Education News. (2012). Digital Citizenship.Digital Citizenship. Retrieved from Retrieved from
http://educationviews.org/2011/12/26/digital-citizenship/ http://educationviews.org/2011/12/26/digital-citizenship/ Denis, S. (2010). Denis, S. (2010). A Modern Copyright. A Modern Copyright. Retrieved from Retrieved from
http://www.personal.psu.edu/scd5059/blogs/te/2010/10/a-http://www.personal.psu.edu/scd5059/blogs/te/2010/10/a-modern-copyright.html modern-copyright.html
Meyer, J. (2004). Meyer, J. (2004). Citations, Citations. Citations, Citations. http://sociology.camden.rutgers.edu/jfm/plagiarism/plagiarihttp://sociology.camden.rutgers.edu/jfm/plagiarism/plagiarism-jfm.htmsm-jfm.htm
Wikipedia. Retrieved from Wikipedia. Retrieved from http://en.wikipedia.org/wiki/Computer_wormhttp://en.wikipedia.org/wiki/Computer_worm
http://nys-eett.wikispaces.com/Digital+Citizenship-http://nys-eett.wikispaces.com/Digital+Citizenship-+Current+Internet+Issues+for+School+Leaders +Current+Internet+Issues+for+School+Leaders