Your SlideShare is downloading. ×
Digital citizenship
Digital citizenship
Digital citizenship
Digital citizenship
Digital citizenship
Digital citizenship
Digital citizenship
Digital citizenship
Digital citizenship
Digital citizenship
Digital citizenship
Digital citizenship
Digital citizenship
Digital citizenship
Digital citizenship
Digital citizenship
Digital citizenship
Digital citizenship
Digital citizenship
Digital citizenship
Digital citizenship
Digital citizenship
Digital citizenship
Digital citizenship
Digital citizenship
Digital citizenship
Digital citizenship
Digital citizenship
Digital citizenship
Digital citizenship
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Digital citizenship

291

Published on

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
291
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Digital Citizenship By Christa Stephens
  • 2. What is Digital Citizenship?“Digital Citizenship is about usingtechnology appropriately, and not misusing or abusing technology” -http://educationaltechnology.ca
  • 3. Nine Themes of Digital Citizenship • digital etiquette • digital communication • digital literacy • digital commerce • digital law • digital rights and responsibilities • digital health and wellness • digital security (self protection)
  • 4. This project addresses:• Netiquette• Copyright and Fair Use• Plagiarism• Safety on the internet• Safety on your computer
  • 5. Digital Ettiquette or “Netiquette” - set of rules on how to behave online
  • 6. The Core Rules of Netiquette: Dos Dont Lie Sharing is caring Dont Hate Correct mistakes No cursing Share accurate info. No disrespect Everything in moderation Respect privacy Show Love Don’ts
  • 7. Copyright &Fair Use
  • 8. Copyright “a legal concept, enacted by mostgovernments, giving the creator of an original work exclusive rights to it, usually for a limited time.” - wikipedia.org
  • 9. Fair Use“a limitation and exception to the exclusive right granted by copyright law to the author of a creative work.” - wikipedia.org
  • 10. What is the difference between Copyright and Fair Use? Fair Use refers to being able to use parts of copyrighted materials without permission for educational reasons.
  • 11. Plagarism
  • 12. According to the Merriam-WebsterOnline Dictionary, to "plagiarize" means:• to steal and pass off (the ideas or words of another) as ones own• to use (anothers production) without crediting the source• to commit literary theft• to present as new and original an idea or product derived from an existing source.
  • 13. How can I avoid Plagarism?• Don’t turn in someone elses work as your own• Don’t copy words or ideas from someone else without giving credit• Don’t forget to put a quotation in quotation marks• Don’t give incorrect information about where the quotation came from• Don’t copy so many words or ideas from a source that it makes up the majority of your work, whether you give credit or not
  • 14. Remember… If the site is copyrighted, you need torequest permission from the owners of the website.It there is no clear copyright listed, besure to reference the site with the URL
  • 15. Technology Tools to help stop Plagiarism: Turnitin.com MyDropBox.com
  • 16. Safety on theInternet
  • 17. Safety on the Internet includes: • Identity Theft• Reputation management • Passwords • Cyberbullying • Cyberstalking
  • 18. Identity Theft When your personal information is stolen andthen that person pretends to be you.
  • 19. Reputation ManagementWhen a individual or a business is continuously monitored in hopes to create positive commentary and dispute the negative.
  • 20. Passwords • Dont leave your passwords lying around• Dont reveal your passwords to others • Never give your password out in an email • Dont use the default password • Change reset passwords
  • 21. CyberbullyingRefers to bullying on the internet – social networking sites, emails and texts Remember… • If its something that is going to hurt someone’s feelings, don’t do it. • Don’t fight back. • Tell an adult. • What you say online could stay there forever.
  • 22. CyberstalkingRefers to using the Internet or any other electronic device to harass an individual, a group, or an organization. This includes: • Making false accusations. • Making threats. • Stealing someone’s identity. • Causing harm to someone’s data or computer equipment.
  • 23. Safety on your computer
  • 24. Safety on your computer includes: • Viruses • Phishing • Trojan horses • Worms
  • 25. Viruses A computer virus is a type of computer program that duplicates itself and can infect and damage a computer without the person knowing.Sometimes, when the computer gets a virus it can cause the computer to “act up” and may cause the computer to be slow, or even crash. Many important documents can be lost.
  • 26. PhishingPhishing happens through e-mails and instant messages. Phishing guides computer users to enter their information on a fake website that looks just like the real website. Types of Phishing: • Whaling • Clone Phishing • Spear Phishing
  • 27. Trojan Horses can:• Retrieve passwords or credit card information • Install damaging software • Download or upload files on anyone’s computer • Delete files • Watch the computer users screen • Crash the computer
  • 28. Worms A computer worm is a damagingcomputer program that duplicates itself in order to spread to other computers through the computer network.Some worms have been created with good intentions.
  • 29. Ways to keep your computer safe: Make sure that your computer has an antivirus program installed.Never download anything off the internet without a parent’s permission.
  • 30. ReferencesDoering, A. H., & Roblyer, M. D. (2010). Integrating educational technology into teaching. (5 ed., pp. 217-222). Boston, MA: Pearson Education, Inc.http://www.wikipedia.org/http://www.surfnetparents.comwww.brainpop.comhttp://networketiquette.net/http://fairuse.stanford.eduhttp://www.educationworld.comhttp://www.plagiarism.org/http://learn-the-ropes.wikispaces.com/Digital+Citizenshiphttp://educationaltechnology.ca

×