3. Nine Elements
1. Digital Access – full electronic
participation in society
2. Digital Commerce – the buying and
selling of goods online
3. Digital Communication – the electronic
exchange of information
4. Digital Literacy – the capability to use
digital technology and knowing when
and how to use it
4. Nine Elements
5. Digital Etiquette– the standards of
conduct expected by other digital
technology users
6. Digital Law– the legal rights and
restrictions governing technology use
7. Digital Rights & Responsibilities– the
privileges and freedoms extended to all
digital technology users, and the
behavioral expectations that come with
them
5. Nine Elements
8. Digital Health & Wellness– the elements
of physical and psychological well-
being related to digital technology use
9. Digital Security– the precautions that all
technology users must take to
guarantee their personal safety and the
security of their network
6.
7. Digital Access
• Full electronic participation in
society
• Does everyone have equal
opportunity to digital
technology?
8. Digital Access Issues
• Access for all students
• Accommodations for students
with special needs
• Programs for increasing access
outside school
10. Digital
Commerce Issues
• Online buying through commercial
sites, auction sites, and others
• Online selling through auction sites
and others
• Media subscriptions and purchases
made through media such as iTunes
• Buying and selling “virtual
merchandise” for online games
11. What’s the risk?
• Top 3 complaints:
– Merchandise that wasn’t delivered or payment
that wasn’t received
– Internet auction fraud
– Credit/debit card fraud
12. Tips for Shopping
• Know your retailer
– Contact numbers
– Physical address (no PO boxes)
• Use secure Web sites
13. Tips for Shopping
• Be aware of phishing email
• Review privacy and security
policies
• Use antivirus and firewall software
• Check credit reports regularly
14. Digital Communication
• The electronic exchange of
information
• Cell phones, IM,
videoconferencing, e-mail,
texting, blogs, etc.
15. Formal v. Informal Writing
• Blog – an online journal made
public for others to read
• Mrs. Ashlock’s Blog
• Emoticons – emotional graphics;
visual ways to express how you feel
16. Formal v. Informal Writing
• How do you write when you are
texting or emailing or blogging?
• Emoticons/Texting
•
• <3
• 3@t
• r u
– i write in all lowercase
17. Social Networking
• Online communication where
users can interact with other
people, as well as with the
information they send, receive,
and create.
• Web 2.0 – lets people
collaborate and share
information online
18. Types of Social Media Sites
• Social Networking
• User-generated content
• File-sharing
• Entertainment
19. Examples of Social
Networking Sites
1. MySpace
2. Wikipedia
3. YouTube
4. Facebook
5. Photo Bucket
6. Craig’s List
7. Flickr
8. IMDb
9. Twitter
10. Blogspot.com
21. Digital Literacy
• The capability to use digital
technology and knowing when
and how to use it
22. Digital Literacy Issues
• Learning how to use search
engines and email
• Evaluating online resources
• Using distance education and
online learning
23.
24. Evaluating Web Sites
• Anyone can put information on
the Internet
• No regulation
• Tree Octopus
• Criteria
26. Evaluating Web Sites
• Reliable sources
– .gov (government)
– .edu (education)
– .com (commercial business)
– .org (organization; non-profit)
– .net (network)
• Blog – someone’s personal
opinion; may not be fact
27. Search Engines
• Databases that gather
information from thousands of
websites based on keywords
• Be specific – you will get better
results
• Google, Yahoo, Ask, Bing
40. Digital Etiquette Issues
• Minimize negative effects on
others
• Using technology when it is
contextually appropriate
• Respecting others online
41. Cell Phone Etiquette
• Set appropriate ringtones
• Don’t yell
• Keep it short in public
• Don’t text and drive
– InTEXTicated
• Excuse yourself
• Use cameras wisely
– Sexting
42. Privacy
• Nothing is ever private on the
Internet
• Don’t write something down if
you don’t ever want to see it
again
• Forwards…..
43. Digital Law
• The legal rules and restrictions
governing technology use
44. Digital Law Issues
• Using file-sharing sites
• Pirating software
• Hacking into systems or
networks
• Copyright
• Stealing someone’s identity
45. 3 / 4 students do not think it’s
wrong to download files without
permission
49. A Right to Earn a Living
• When another person copies an
artistic work to sell or give
away, the person who created
the work loses money.
50. A Right to Earn a Living
• The author or artist is the only
person who has the right to
make copies or to give
permission to make copies.
51. Respecting Copyrights
• If you copy a work protected by
copyright and give or sell it to
others, you are breaking the
law.
52. Respecting Copyrights
• Putting copyrighted works on
your Web site for public display
without the owner’s permission
is also illegal.
53. Intellectual Property
• Creations of the mind from new
inventions to markings that identify the
source of products or services to books,
photos, movies, and music
• Intellectual property is intangible yet it
always has value
54. How do you protect
yourself?
• Register through the
copyright process at
www.copyright.gov
• Creative Commons – work
intended to be shared
55. Fair Use
• Students can use a limited
amount of copyrighted works for
school projects without getting
permission.
• Credit must always be given to the
author.
56. Basic Guidelines - Video
• Students may use portions of
“lawfully acquired copyright works”
• 10% or 3 minutes (whichever is
less)
57. Basic Guidelines - Music
• Up to 10% OR
• Maximum of 30 seconds
• Whichever is less
59. Plagiarism
• Define Plagiarism
• Using works from someone without
giving credit is plagiarism.
• You are guilty of plagiarism even if
you paraphrase and don’t give
credit.
• www.turnitin.com
60. Digital Rights and
Responsibilities
• The privileges and freedoms
extended to all digital
technology users, and the
behavioral expectations that
come with them
61. Digital Rights and
Responsibilities Issues
• Following Acceptable Use
Policies
• Using online material ethically
• Using technology to cheat on
tests and assignments
• Reporting cyber bullies and
threats
62. Acceptable Use Policy
A set of rules set up by the owner
of a product that the user must
agree to in order to use the
product
.
63. Digital Health and
Wellness
• The elements of physical and
psychological well-being related
to digital technology use
64. Digital Health and
Wellness Issues
• Cyber bullying and predators
• Using proper ergonomics
• Becoming addicted to the
Internet or to video games and
withdrawing from society
65. Stranger Danger
Give examples of information that
is considered private and
should not be given out to
others (strangers) online.
66. Trust
• The Internet is built on trust
• Do you know who you are
talking to?
• How much information do you
give out to others online?
67. Cyber bullying
• Willful and repeated threats,
harassment or intimidation
intended to inflict harm or
emotional distress through the
medium of electronic media
69. “The rules are fairly simple.
You don’t lie. You don’t
pretend to be someone
else. You don’t use the
site to harass others.”
70. Stay Safe
• If you feel:
– Embarrassed, upset, depressed
uncomfortable, afraid
• Leave the computer/chat room
• Print the messages
• Never reply
• Report to an adult
71. Ergonomics
• Designing and arranging things
people use so that the people
and things interact most
efficiently and safely
72.
73. Internet Addiction
• Any online-related, compulsive
behavior which interferes with
normal living causing severe
stress on family, friends, and/or
work
74. Types of Addiction
• Pornography
• eBay
• Online gambling
• Multi-user role playing games
(Xbox live)
75. Are you addicted?
• How often do you stay on-line longer
than you intended?
• How often do you neglect chores,
work, or homework to spend more
time on-line?
• How often do you form new
friendships with on-line users?
76. Are you addicted?
• How often do others complain about
how much time you spend on-line?
• How often do your grades at school
suffer because of the time you
spend on-line?
• How often do you check email,
Facebook, MySpace, etc. before
you do something else?
77. Are you addicted?
• How often do you become defensive
or secretive when anyone asks you
what you do on-line?
• How often do you find yourself
anticipating when you will go on-line
again?
• How often do you fear that life
without the Internet would be boring
and empty?
78. Are you addicted?
• How often do you act annoyed of
get mad if someone bothers you
while you are on-line?
• How often do you lose sleep due to
late-night log-ins?
• How often do you fantasize about
being on-line?
• How often do you try to hide how
long you’ve been on-line?
79. Are you addicted?
• If you answered:
– Always – You may have an addiction
and need to evaluate how much time
you spend online and work on cutting
back
– Sometimes – You may be
experiencing the beginning stages of
addiction and need to be very careful
how you spend your time
– Rarely – You are an average user but
should always be aware of you begin
spending more time on-line than normal
80. What can we do?
• Treatment options are available
• Growing awareness
• Re-learn how to manage time
much like treatments of eating
disorders
• Talk to an adult
81. Digital Security
• The precautions that all
technology users must take to
guarantee their personal safety
and the security of their network
82. Digital Security Issues
• Protecting hardware and
network security
• Protecting personal security
(identity theft, phishing)
• Protecting school security
(hackers, viruses)
• Protecting community security
(terrorist threats)
86. Task 1: Install and Use
Anti-Virus Programs
• Who would you let in your
house?
• Examine the files on the
computer and warns of potential
viruses
87.
88. Task 2: Keep Your System
Patched
• Most vendors provide patches
that are supposed to fix bugs in
their products.
• Register and sign up for email
updates from vendors
89. Task 3: Use Care When Reading
Email with Attachments & Links
• Social engineering – send items to
unsuspecting recipients
• Phishing – email messages that
look valid but are tricking the
recipient to end private information
• Pharming – attack to redirect traffic
from a valid website to a bogus
website
90. Task 3: Use Care When Reading
Email with Attachments & Links
• Spam – Commercial messages that
you didn’t ask for
• Chain Letters – Messages
containing jokes, stories or warnings
that may not be true and may
contain viruses
91. Hacking
• If someone found a key to your
house, is it okay for them to go
inside?
• Getting into someone else’s
computer is hacking.
• Hacking is illegal even if it is not
meant to do damage.
92. Task 4: Use a Firewall
Program
• Works like a security guard
• Grants permission for outside
sources to enter the computer
93. Identity Theft
• Stealing someone’s identity for
the purpose of financial gain
• Various sources report
anywhere from 9 to 10 million
people will have their identity
stolen per year
Editor's Notes
Define digital citizenship.
Digital Citizenship reinforces the positive aspects of technology so that everyone can work and play in this digital world. Digital technology should benefit all; therefore we should share in the rights and responsibilities of being a digital citizen. (DC p. 7)
Define digital citizenship.
Digital Citizenship reinforces the positive aspects of technology so that everyone can work and play in this digital world. Digital technology should benefit all; therefore we should share in the rights and responsibilities of being a digital citizen. (DC p. 7)
Read the scenarios in DC p. 87-90 and have the students respond orally according to the digital compass.
Does everyone in your school have equal opportunities as far as technology use is concerned?
Do all students have the opportunity to be involved in a digital society?
What are some sites that offer digital commerce?
Have you ever bought something online?
Phishing – banks and legitimate businesses do not ask for personal information through an email
Privacy and security – make sure you know if they will sell your info to a 3rd party
Antivirus and Firewall – more in the digital security section
Credit Reports – 3 major credit bureaus and you are allowed one free report from each of them yearly (get one once every 4 months or at least once a year pull all three)
What rules of etiquette do you need to be aware of when using digital communication technologies?
Give examples of some inappropriate and appropriate ways people use digital communication technologies.
List some popular emoticons and text language.
Blog – an online journal made public for others to read
Emoticons - emotional graphics; visual ways to express how you feel
While these are acceptable when texting or emailing our peers and on Facebook and MySpace, this is not acceptable when writing professionally.
These should not appear in school assignments or in professional emails to superiors (boss) or co-workers.
Have students stand and remain standing when they can answer yes to a question:
Have you ever created an online software application?
Have you ever created an online photo slide show?
Have you ever created and uploaded a video to an online web site?
Have you ever blogged?
Do you have a page on Facebook, MySpace, Habbo, or another similar site?
Have you ever downloaded a song or video from the Internet?
Do you have more than one “friend” online?
Do you know what any of these terms mean: wiki, mash, or tag?
Have you ever watched a video on YouTube?
Have you ever used or shared content created by someone else without asking permission?
What is common about these activities? They are all social media activities. Define social media.
Web 2.0 - the second generation of the Internet; services that let people collaborate and share information online
From www.digitalcitizenshiped.com
Four Types of Social Media:
Social Networking sites – online communities of people who share friends, interests, and activities
User-generated content sites – sites where users create original content such as blogs, wikis, photos and videos
File-sharing sites – sites where users can tag and share information with other users
Entertainment sites – online communities where users play games and interact with media
Source: www.ebizmba.com
Does what you write on facebook, twitter, etc. really matter?
Video from www.wiredsafety.org/wiredlearning/bestfoot/index.htm (click on the foot picture) ~ 10 minutes long
1 computer for every 5 students; But where are these computers? Are they in students’ hands?
National Educational Technology Plan (Paige, 2004)
Digital Citizenship (p. 22)
Tree Octopus - http://zapatopi.net/treeoctopus/
Have students evaluate the website listed. Truth or fiction?
Google Tree Octopus and gather more information to determine a more informed opinion.
Criteria – video: http://www.wiredsafety.org/wiredlearning/Evaluation/evalcriteria.htm
Pay attention to the source that appears in a search engine (blog sites versus commercial sites)
Notice the web address under each source listing. These are the correct sources. Click on the link to find the complete information.
Leave out any information that is not found or included in the source information. (Some sites won’t show the author name or website title.)
Leave out any information that is not found or included in the source information. (Some sites won’t show the author name or website title.)
www.citationmachine.net – online source for automatically creating source information
Choose the format for sources, complete the web form that appears and the website will format the source information automatically.
Main focus here on cell phone usage
Respecting others online is covered more in depth in Digital Safety
Are students aware of others when they use technology? Do students realize how their use of technology affects others?
Ringtones – Let where you are determine what ringtone to set on the phone
Meetings, Movies – vibrate or silent
Outdoors, Home – higher volume, personal ringtones
Other public places – medium volume, basic ringtone
School, Tests – Off
Don’t Yell – Can you hear me now? YES!
Keep it short – No one else cares about your weekend plans or your personal history
Don’t text and drive – inTEXTicated – Oprah Winfrey’s No Phone Zone Pledge; 15 minute video clip of her show in January 2010 highlighting family’s stories of injuries/deaths related to using a phone while driving
It’s against the law in many places to use a cell phone (talk or text) in a school zone
Excuse yourself – Don’t talk on your cell phone, play games or send text messages in front of someone who expects your attention. (friend, parents, dr., cashier at store, etc.)
Use cameras wisely – make sure you have permission before taking a picture. Don’t let someone take a picture of you if you don’t want it on Facebook or MySpace later.
Sexting – sending pornographic pictures to others on your phone. Illegal! Can be charged with child pornography. Link to article on www.nbcdfw.com story of Hillwood Middle Students from Keller ISD sending pornographic pictures on their phones. Being investigated for possession of child pornography. Dec 18, 2009.
www.letstalk.com/promo/unclecell/unclecell2.htm
Remember that anyone can take an email and forward it on to anyone they want to.
Are students using technology the way it was intended?
Are students infringing on others’ rights by the way they use technology?
2003 survey by Ipsos (a market research company) for Business Software Alliance
File-sharing - making files available to others to download from the Internet
http://www.wired.com/entertainment/music/news/2003/07/59654
Have students choose a position on the question of file-sharing. Have each group create a defense with appropriate reasoning for their position. Choose one spokesperson to defend their position.
Digital Citizenship p. 126
Copyright - exclusive right to publish and sell literary or musical or artistic work
Define Intellectual Property
Discuss with students how the items posted on social media sites are actually intellectual property and also belong to the person who created it.
From www.digitalcitizenshiped.com
Registering for copyright protection through the U.S. Copyright Office (http://www.copyright.gov) establishes a public record of a copyright claim. While copyright registration is not required for copyright protection, it does provide additional legal protections in the event of litigation. Registration may be made at any time within the life of the copyright (typically for a period of 70 years after the creator's death).
You may also look at the various licensing options under Creative Commons (www.creativecommons.org/license). This is for those who are interested in protecting the originality of their work but do want to share it with others.
Worksheet on fair use guidelines
Worksheet on fair use guidelines
Worksheet on fair use guidelines
http://landmark-project.com/permission_student.php
A form email students can fill out to ask permission to use a specific work.
Define plagiarism - http://www.plagiarism.org/learning_center/what_is_plagiarism.html
(From www.digitalcitizenshiped.com)
Turnitin.com is used by many educational institutions as a fight against plagiarism. Papers are submitted to the website where it is checked against a massive database to compare patterns of text. Results are compiled into a report that can be viewed seconds after a paper is submitted.
What rights and responsibilities do students have in a digital society? Are students using digital technology appropriately?
Cyber bullying will be covered more under Digital Health & Wellness
How can students be physically affected by technology?
Are students aware of the physical dangers that can accompany the use of digital technology?
Full (first and last) name
Postal address
Name of school
School address
Email address
Phone number
Passwords
Credit card numbers
Social security number
Parent’s place of work
Photos where you can be recognized
Your schedule or parent’s work schedule
Don’t get personal – give out private information – with people you don’t personally know online. You cannot prove who that “friend” is.
How does BISD handle cyber bullying?
The same as physical bullying but it can punished whether it happens on campus or off campus.
Video: http://www.youtube.com/watch?v=gD9OUas5pDs
What has happened since this video?
On Nov. 26, the mother, Lori Drew, was convicted on 3 minor offenses of accessing computers without authorization. Each of these counts is punishable by up to one year in prison and a $100,000 fine.
She was indicted under the federal Computer Use and Fraud Act, which has been used in hacking and trademark theft cases. She was charged with consipiring to violate the fine print in MySpace’s terms-of-service agreement, which prohibits the use of phony names and harassment of other MySpace members.
Source: “Cyber bullying case nets mixed verdict.” eSchool News. January 2009. p. 6.
Quote by Mark Krause, federal prosecutor for the MySpace cyber bullying case against Lori Drew.
Source: “Cyber bullying case nets mixed verdict.” eSchool News. January 2009. p. 6.
Evaluate this picture. Have you ever thought about how your workspace affects your physical health? Do you need to rearrange anything on your desk to be more comfortable and efficient?
www.osha.gov
To evaluate classrooms OSHA provides an evaluation checklist that can be used
Internet addiction test adapted from www.netaddiction.com/resources/internet_addiction_test.htm
Ask the students to answer (silently) the questions using Rarely, Sometimes, or Always. Tell them to keep a running total of how many times they use each answer.
Internet addiction test adapted from www.netaddiction.com/resources/internet_addiction_test.htm
Internet addiction test adapted from www.netaddiction.com/resources/internet_addiction_test.htm
Internet addiction test adapted from www.netaddiction.com/resources/internet_addiction_test.htm
Internet addiction test adapted from www.netaddiction.com/resources/internet_addiction_test.htm
Security information adapted from Rogers, Lawrence R. “Home Computer Security.” 2002. www.fedcirc.gov/homeusers/HomeComputerSecurity/checklists/checklist1-9.pdf. Found on April 20, 2009.
How do students protect their technology?
How can students be taught to protect themselves and their equipment from harm?
Have you ever wondered if the addresses were valid? If the information on printed ads were correct? How would you verify it? Call the phone numbers listed? How do you know it’s not a fake phone number? How do you know the person on the other end of the line is who they say they are?
Email is the same way.
When you have a conversation in the living room, everybody within earshot can hear what you’re saying. If you talk loudly enough and have your windows open, people walking by could hear your conversation. If you want privacy you have to go to another room and make sure windows and doors are closed.
The Internet is the same way except the room is much, much bigger. Information sent across the Internet could possibly be tracked and captured as if someone were listening in on what you were doing. But, it could also be used to their benefit.
Does what you write on facebook, twitter, etc. really matter?
Video from www.wiredsafety.org/wiredlearning/geekgifts/index.htm (click on the gift picture) ~ 10 minutes long
If someone rang your doorbell and wanted to come into your house, you’d need to make a decision whether or not to let them in. You teach your children to deal with strangers.
Anti-virus programs work the same way. They look at the contents of each file, searching for patterns that match a virus or something harmful and can give you options on what to do with that file (remove it, clean it, etc.)
Norton Anti-virus is a popular program that often comes with a 30-day trial membership on new computers. Does require a renewed subscription to keep updated.
AVG is a very good free alternative. Download from www.avg.com.
Picture sources:
AVG - www.burchwords.com
Norton - www.filetransit.com
Screen shot of AVG options
Source: http://www.pcnineoneone.com/reviews/sw/avg6.html
If you buy an appliance and it breaks, you would try to have it fixed, not buy a new one.
Vendors of most hardware and software programs will provide updates or patches to fix problems that might be found in regular use.
Register your product and sign up for email updates to keep informed of what needs to be downloaded and installed.
Consider setting up a separate email address specifically for this purpose.
They disguise the danger or threat with something that would encourage you to open it. “You may have won!”
Smart, Safe, and Secure Online (worksheet from www.becybersmart.org)
They disguise the danger or threat with something that would encourage you to open it. “You may have won!”
Know – Is the email from someone that you know?
Received – Have you received email from this sender before?
Expect – Were you expecting email with an attachment from this sender? Call and verify.
Sense – Does email from the sender with the contents as described in the subject line make sense? Look for misspelled words or names you don’t recognize.
Virus – Does this email contain a virus? Scan it with your anti-virus program.
Smart, Safe, and Secure Online (worksheet from www.becybersmart.org)
Security guards check everyone who enters a building and makes sure they have permission to enter.
Firewalls work much the same way. They examine outside sources and grants permission for them to access the computer
These can be purchased and installed from various vendors. If you use Microsoft Windows, it is a part of the normal operating system. Make sure it is turned on.
Picture source: http://www.microsoft.com/windowsxp/using/networking/security/winfirewall.mspx
Identity Theft – stealing someone’s identity for the purpose of financial gain
http://www.creditreport.com/identitytheft/info/statistics.asp – good source for tips on not having your identity stolen and steps to take if it does happen