Digital citizenship


Published on

Published in: Education, Technology
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Digital citizenship

  1. 1. Digital Citizenship By Christa Stephens
  2. 2. What isDigital Citizenship? “Digital Citizenship is about using technology appropriately, and not misusing or abusing technology” -
  3. 3. Nine Themes of Digital Citizenship • digital etiquette • digital communication • digital literacy • digital commerce • digital law • digital rights and responsibilities • digital health and wellness • digital security (self protection)
  4. 4. This Digital Citizen project addresses: 1. Netiquette 2. Copyright and Fair Use 3. Plagiarism 4. Safety on the internet5. Safety on your computer
  5. 5. “Netiquette”
  6. 6. Digital Ettiquette or “Netiquette”A set of rules on how tobehave online
  7. 7. Core Rules on Netiquette Behavior: Do’s Sharing is caring Correct mistakes Share accurate information Everything in moderation Respect privacy Show love Don’ts Don’t lie Don’t hate No cursing No disrespect
  8. 8. Copyright &Fair Use
  9. 9. Copyright “a legal concept, enacted by mostgovernments, giving the creator of an original work exclusive rights to it, usually for a limited time.” -
  10. 10. Fair Use“a limitation and exception to the exclusive right granted by copyright law to the author of a creative work.”
  11. 11. What is the difference between Copyright and Fair Use? Fair Use refers to being able to use parts of copyrighted materials without permission for educational reasons.
  12. 12. Plagarism
  13. 13. According to the Merriam-WebsterOnline Dictionary, to "plagiarize" means:• to steal and pass off (the ideas or words of another) as ones own• to use (anothers production) without crediting the source• to commit literary theft• to present as new and original an idea or product derived from an existing source.
  14. 14. How can I avoid Plagarism?• Don’t turn in someone elses work as your own• Don’t copy words or ideas from someone else without giving credit• Don’t forget to put a quotation in quotation marks• Don’t give incorrect information about where the quotation came from• Don’t copy so many words or ideas from a source that it makes up the majority of your work, whether you give credit or not
  15. 15. Remember… If the site is copyrighted, you need torequest permission from the owners of the website. It there is no clear copyright listed, be sure to reference the site with the URL.
  16. 16. Technology Tools used to help stop Plagiarism:
  17. 17. Safety on theInternet
  18. 18. Safety on the Internet includes: • Identity Theft• Reputation management • Passwords • Cyberbullying • Cyberstalking
  19. 19. Identity Theft When your personal information isstolen and then that person pretends to be you.
  20. 20. Reputation ManagementWhen a individual or a business is continuously monitored in hopes to create positive commentary and dispute the negative.
  21. 21. Passwords• Dont leave your passwords lying around • Dont reveal your passwords to others• Never give your password out in an email • Dont use the default password • Change reset passwords
  22. 22. CyberbullyingRefers to bullying on the internet through social networking sites, emails and texts Remember…•If its something that is going to hurt someone’s feelings, don’t do it. •Don’t fight back. •Tell an adult. •What you say online could stay there forever.
  23. 23. CyberstalkingRefers to using the Internet or any other electronic device to harass an individual, a group, or an organization. This includes: •Making false accusations. • Making threats. • Stealing someone’s identity.•Causing harm to someone’s data or computer equipment.
  24. 24. Safety on your computer
  25. 25. Safety on your computer includes: • Viruses • Phishing • Trojan horses • Worms
  26. 26. Viruses A computer virus is a type of computer program that duplicates itself and can infect and damage a computer without the person knowing.Sometimes, when the computer gets a virus it can cause the computer to “act up” and may cause the computer to be slow, or even crash. Many important documents can be lost.
  27. 27. PhishingPhishing guides computer users to enter their information on a fake website that looks just like the real website. Phishing happens through e-mails and instant messages. Types of Phishing: • Whaling • Clone Phishing • Spear Phishing
  28. 28. Trojan Horses can: • Retrieve passwords or credit card information • Install damaging software• Download or upload files on anyone’s computer • Delete files • Watch the computer users screen • Crash the computer
  29. 29. Worms A computer worm is a damagingcomputer program that duplicates itself in order to spread to other computers through the computer network.Some worms have been created withgood intentions, but most are harmful.
  30. 30. Make sure that your computer has an antivirus program installed.Never download anything off the internet without a parent’s permission.
  31. 31. ReferencesDoering, A. H., & Roblyer, M. D. (2010). Integrating educational technology into teaching. (5 ed., pp. 217-222). Boston, MA: Pearson Education, Inc.