SlideShare a Scribd company logo
1 of 93
Digital
Citizenship
Digital Citizenship
Reinforces the positive
aspects of technology so
that everyone can work
and play in this digital
world.
Nine Elements
1. Digital Access – full electronic
participation in society
2. Digital Commerce – the buying and
selling of goods online
3. Digital Communication – the electronic
exchange of information
4. Digital Literacy – the capability to use
digital technology and knowing when
and how to use it
Nine Elements
5. Digital Etiquette– the standards of
conduct expected by other digital
technology users
6. Digital Law– the legal rights and
restrictions governing technology use
7. Digital Rights & Responsibilities– the
privileges and freedoms extended to all
digital technology users, and the
behavioral expectations that come with
them
Nine Elements
8. Digital Health & Wellness– the elements
of physical and psychological well-
being related to digital technology use
9. Digital Security– the precautions that all
technology users must take to
guarantee their personal safety and the
security of their network
Digital Access
• Full electronic participation in
society
• Does everyone have equal
opportunity to digital
technology?
Digital Access Issues
• Access for all students
• Accommodations for students
with special needs
• Programs for increasing access
outside school
Digital Commerce
• The buying and selling of goods
online
Digital
Commerce Issues
• Online buying through commercial
sites, auction sites, and others
• Online selling through auction sites
and others
• Media subscriptions and purchases
made through media such as iTunes
• Buying and selling “virtual
merchandise” for online games
What’s the risk?
• Top 3 complaints:
– Merchandise that wasn’t delivered or payment
that wasn’t received
– Internet auction fraud
– Credit/debit card fraud
Tips for Shopping
• Know your retailer
– Contact numbers
– Physical address (no PO boxes)
• Use secure Web sites
Tips for Shopping
• Be aware of phishing email
• Review privacy and security
policies
• Use antivirus and firewall software
• Check credit reports regularly
Digital Communication
• The electronic exchange of
information
• Cell phones, IM,
videoconferencing, e-mail,
texting, blogs, etc.
Formal v. Informal Writing
• Blog – an online journal made
public for others to read
• Mrs. Ashlock’s Blog
• Emoticons – emotional graphics;
visual ways to express how you feel
Formal v. Informal Writing
• How do you write when you are
texting or emailing or blogging?
• Emoticons/Texting
• 
• <3
• 3@t
• r u
– i write in all lowercase
Social Networking
• Online communication where
users can interact with other
people, as well as with the
information they send, receive,
and create.
• Web 2.0 – lets people
collaborate and share
information online
Types of Social Media Sites
• Social Networking
• User-generated content
• File-sharing
• Entertainment
Examples of Social
Networking Sites
1. MySpace
2. Wikipedia
3. YouTube
4. Facebook
5. Photo Bucket
6. Craig’s List
7. Flickr
8. IMDb
9. Twitter
10. Blogspot.com
Activity
Putting Your Best
Forward
Digital Literacy
• The capability to use digital
technology and knowing when
and how to use it
Digital Literacy Issues
• Learning how to use search
engines and email
• Evaluating online resources
• Using distance education and
online learning
Evaluating Web Sites
• Anyone can put information on
the Internet
• No regulation
• Tree Octopus
• Criteria
5 Evaluating Criteria?
• Accuracy
• Expertise
• Bias/Objectivity
• Currency
• Coverage
Evaluating Web Sites
• Reliable sources
– .gov (government)
– .edu (education)
– .com (commercial business)
– .org (organization; non-profit)
– .net (network)
• Blog – someone’s personal
opinion; may not be fact
Search Engines
• Databases that gather
information from thousands of
websites based on keywords
• Be specific – you will get better
results
• Google, Yahoo, Ask, Bing
Example:
Find the answer to the question:
• Who is said to have discovered
America in 1492?
Search and Results
Search and Results
Search and Results
Search and Results
Citing Sources
•Google is not a
source!
Citing Sources Format
Author. Web Site Title. Web
address. Copyright Date. Found
on (list the date you found the
information).
Citing Sources Format
Author
Web Site Title
Web address
Copyright Date
Found on (list the date you
found the information).
Sample
Roger Young. FBI History.
http://www.fib.gov/kids. 2007.
Found on April 2, 2008.
Citation Machine
Digital Etiquette
• The standards of conduct
expected by other digital
technology users
Digital Etiquette Issues
• Minimize negative effects on
others
• Using technology when it is
contextually appropriate
• Respecting others online
Cell Phone Etiquette
• Set appropriate ringtones
• Don’t yell
• Keep it short in public
• Don’t text and drive
– InTEXTicated
• Excuse yourself
• Use cameras wisely
– Sexting
Privacy
• Nothing is ever private on the
Internet
• Don’t write something down if
you don’t ever want to see it
again
• Forwards…..
Digital Law
• The legal rules and restrictions
governing technology use
Digital Law Issues
• Using file-sharing sites
• Pirating software
• Hacking into systems or
networks
• Copyright
• Stealing someone’s identity
3 / 4 students do not think it’s
wrong to download files without
permission
File-Sharing – making files
available to others to
download from the internet
Activity
Debate – File Sharing
Is it Right or Wrong?
Copyright
The exclusive right to
publish and sell literary
or musical or artistic
work
A Right to Earn a Living
• When another person copies an
artistic work to sell or give
away, the person who created
the work loses money.
A Right to Earn a Living
• The author or artist is the only
person who has the right to
make copies or to give
permission to make copies.
Respecting Copyrights
• If you copy a work protected by
copyright and give or sell it to
others, you are breaking the
law.
Respecting Copyrights
• Putting copyrighted works on
your Web site for public display
without the owner’s permission
is also illegal.
Intellectual Property
• Creations of the mind from new
inventions to markings that identify the
source of products or services to books,
photos, movies, and music
• Intellectual property is intangible yet it
always has value
How do you protect
yourself?
• Register through the
copyright process at
www.copyright.gov
• Creative Commons – work
intended to be shared
Fair Use
• Students can use a limited
amount of copyrighted works for
school projects without getting
permission.
• Credit must always be given to the
author.
Basic Guidelines - Video
• Students may use portions of
“lawfully acquired copyright works”
• 10% or 3 minutes (whichever is
less)
Basic Guidelines - Music
• Up to 10% OR
• Maximum of 30 seconds
• Whichever is less
What can you do?
• Ask for
permission.
Plagiarism
• Define Plagiarism
• Using works from someone without
giving credit is plagiarism.
• You are guilty of plagiarism even if
you paraphrase and don’t give
credit.
• www.turnitin.com
Digital Rights and
Responsibilities
• The privileges and freedoms
extended to all digital
technology users, and the
behavioral expectations that
come with them
Digital Rights and
Responsibilities Issues
• Following Acceptable Use
Policies
• Using online material ethically
• Using technology to cheat on
tests and assignments
• Reporting cyber bullies and
threats
Acceptable Use Policy
A set of rules set up by the owner
of a product that the user must
agree to in order to use the
product
.
Digital Health and
Wellness
• The elements of physical and
psychological well-being related
to digital technology use
Digital Health and
Wellness Issues
• Cyber bullying and predators
• Using proper ergonomics
• Becoming addicted to the
Internet or to video games and
withdrawing from society
Stranger Danger
Give examples of information that
is considered private and
should not be given out to
others (strangers) online.
Trust
• The Internet is built on trust
• Do you know who you are
talking to?
• How much information do you
give out to others online?
Cyber bullying
• Willful and repeated threats,
harassment or intimidation
intended to inflict harm or
emotional distress through the
medium of electronic media
MySpace Tragedy
“The rules are fairly simple.
You don’t lie. You don’t
pretend to be someone
else. You don’t use the
site to harass others.”
Stay Safe
• If you feel:
– Embarrassed, upset, depressed
uncomfortable, afraid
• Leave the computer/chat room
• Print the messages
• Never reply
• Report to an adult
Ergonomics
• Designing and arranging things
people use so that the people
and things interact most
efficiently and safely
Internet Addiction
• Any online-related, compulsive
behavior which interferes with
normal living causing severe
stress on family, friends, and/or
work
Types of Addiction
• Pornography
• eBay
• Online gambling
• Multi-user role playing games
(Xbox live)
Are you addicted?
• How often do you stay on-line longer
than you intended?
• How often do you neglect chores,
work, or homework to spend more
time on-line?
• How often do you form new
friendships with on-line users?
Are you addicted?
• How often do others complain about
how much time you spend on-line?
• How often do your grades at school
suffer because of the time you
spend on-line?
• How often do you check email,
Facebook, MySpace, etc. before
you do something else?
Are you addicted?
• How often do you become defensive
or secretive when anyone asks you
what you do on-line?
• How often do you find yourself
anticipating when you will go on-line
again?
• How often do you fear that life
without the Internet would be boring
and empty?
Are you addicted?
• How often do you act annoyed of
get mad if someone bothers you
while you are on-line?
• How often do you lose sleep due to
late-night log-ins?
• How often do you fantasize about
being on-line?
• How often do you try to hide how
long you’ve been on-line?
Are you addicted?
• If you answered:
– Always – You may have an addiction
and need to evaluate how much time
you spend online and work on cutting
back
– Sometimes – You may be
experiencing the beginning stages of
addiction and need to be very careful
how you spend your time
– Rarely – You are an average user but
should always be aware of you begin
spending more time on-line than normal
What can we do?
• Treatment options are available
• Growing awareness
• Re-learn how to manage time
much like treatments of eating
disorders
• Talk to an adult
Digital Security
• The precautions that all
technology users must take to
guarantee their personal safety
and the security of their network
Digital Security Issues
• Protecting hardware and
network security
• Protecting personal security
(identity theft, phishing)
• Protecting school security
(hackers, viruses)
• Protecting community security
(terrorist threats)
Trust
• Human beings are trusting.
• Mail from the Post Office v. Email
Information in the Clear
• Who can hear your
conversation?
Activity
Beware of Geeks
Bearing
Task 1: Install and Use
Anti-Virus Programs
• Who would you let in your
house?
• Examine the files on the
computer and warns of potential
viruses
Task 2: Keep Your System
Patched
• Most vendors provide patches
that are supposed to fix bugs in
their products.
• Register and sign up for email
updates from vendors
Task 3: Use Care When Reading
Email with Attachments & Links
• Social engineering – send items to
unsuspecting recipients
• Phishing – email messages that
look valid but are tricking the
recipient to end private information
• Pharming – attack to redirect traffic
from a valid website to a bogus
website
Task 3: Use Care When Reading
Email with Attachments & Links
• Spam – Commercial messages that
you didn’t ask for
• Chain Letters – Messages
containing jokes, stories or warnings
that may not be true and may
contain viruses
Hacking
• If someone found a key to your
house, is it okay for them to go
inside?
• Getting into someone else’s
computer is hacking.
• Hacking is illegal even if it is not
meant to do damage.
Task 4: Use a Firewall
Program
• Works like a security guard
• Grants permission for outside
sources to enter the computer
Identity Theft
• Stealing someone’s identity for
the purpose of financial gain
• Various sources report
anywhere from 9 to 10 million
people will have their identity
stolen per year

More Related Content

Similar to Digital Citizenship_Lecture.pptx

Digital Citezenship 9 Elements
Digital Citezenship 9 Elements Digital Citezenship 9 Elements
Digital Citezenship 9 Elements ayouda
 
Digital footprints & criminal investigations
Digital footprints & criminal investigationsDigital footprints & criminal investigations
Digital footprints & criminal investigationsCreepSquash
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsCreepSquash
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship ppKatie Ward
 
ICT online tools & Internet Safety
ICT online tools & Internet SafetyICT online tools & Internet Safety
ICT online tools & Internet SafetyCharina Mostierra
 
The Nine Elements
The Nine ElementsThe Nine Elements
The Nine ElementsBrodyJWU
 
Responsible Digital Citizenship
Responsible Digital CitizenshipResponsible Digital Citizenship
Responsible Digital CitizenshipAlex Noudelman
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptxsaththiyans1
 
Digiteen By Ibrahim Soltan
Digiteen By Ibrahim SoltanDigiteen By Ibrahim Soltan
Digiteen By Ibrahim Soltanibrahim
 
Internet ppt
Internet pptInternet ppt
Internet ppttej_vish
 
CST 20363 Session 6 Cyberspace
CST 20363 Session 6 CyberspaceCST 20363 Session 6 Cyberspace
CST 20363 Session 6 Cyberspaceoudesign
 
The internet-presentation
The internet-presentationThe internet-presentation
The internet-presentationarmilapratiwi
 
Telecommunication services
Telecommunication servicesTelecommunication services
Telecommunication servicesConnorJohnAdkins
 

Similar to Digital Citizenship_Lecture.pptx (20)

Digital Citezenship 9 Elements
Digital Citezenship 9 Elements Digital Citezenship 9 Elements
Digital Citezenship 9 Elements
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
Digital footprints & criminal investigations
Digital footprints & criminal investigationsDigital footprints & criminal investigations
Digital footprints & criminal investigations
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
 
ICT online tools & Internet Safety
ICT online tools & Internet SafetyICT online tools & Internet Safety
ICT online tools & Internet Safety
 
The Nine Elements
The Nine ElementsThe Nine Elements
The Nine Elements
 
Responsible Digital Citizenship
Responsible Digital CitizenshipResponsible Digital Citizenship
Responsible Digital Citizenship
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
ICT in Education
ICT in EducationICT in Education
ICT in Education
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Digiteen By Ibrahim Soltan
Digiteen By Ibrahim SoltanDigiteen By Ibrahim Soltan
Digiteen By Ibrahim Soltan
 
Internet ppt
Internet pptInternet ppt
Internet ppt
 
Safe and ethical use
Safe and ethical useSafe and ethical use
Safe and ethical use
 
13206170.ppt
13206170.ppt13206170.ppt
13206170.ppt
 
CST 20363 Session 6 Cyberspace
CST 20363 Session 6 CyberspaceCST 20363 Session 6 Cyberspace
CST 20363 Session 6 Cyberspace
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
The internet-presentation
The internet-presentationThe internet-presentation
The internet-presentation
 
Telecommunication services
Telecommunication servicesTelecommunication services
Telecommunication services
 

More from JCGonzaga1

Bridging the Gad of and between digital dividefor.ppt
Bridging the Gad of and between digital dividefor.pptBridging the Gad of and between digital dividefor.ppt
Bridging the Gad of and between digital dividefor.pptJCGonzaga1
 
Understanding Society Culture and Politics P Lesson 001.pdf
Understanding Society Culture and Politics P Lesson 001.pdfUnderstanding Society Culture and Politics P Lesson 001.pdf
Understanding Society Culture and Politics P Lesson 001.pdfJCGonzaga1
 
VIDEO BACKGROUND TEMPLATE.pptx
VIDEO BACKGROUND TEMPLATE.pptxVIDEO BACKGROUND TEMPLATE.pptx
VIDEO BACKGROUND TEMPLATE.pptxJCGonzaga1
 
Digestive System.ppt
Digestive System.pptDigestive System.ppt
Digestive System.pptJCGonzaga1
 
PPT-Nail-Structure-and-Shapes.pptx
PPT-Nail-Structure-and-Shapes.pptxPPT-Nail-Structure-and-Shapes.pptx
PPT-Nail-Structure-and-Shapes.pptxJCGonzaga1
 
mil-keyconceptsandquestionstoaskinmedialiteracy-160715150440.pptx
mil-keyconceptsandquestionstoaskinmedialiteracy-160715150440.pptxmil-keyconceptsandquestionstoaskinmedialiteracy-160715150440.pptx
mil-keyconceptsandquestionstoaskinmedialiteracy-160715150440.pptxJCGonzaga1
 
Elements of Drama.pptx
Elements of Drama.pptxElements of Drama.pptx
Elements of Drama.pptxJCGonzaga1
 
GRADE 12 WEEK 3-4.pptx
GRADE 12 WEEK 3-4.pptxGRADE 12 WEEK 3-4.pptx
GRADE 12 WEEK 3-4.pptxJCGonzaga1
 
GRADE 12 WEEK 2.pptx
GRADE 12 WEEK 2.pptxGRADE 12 WEEK 2.pptx
GRADE 12 WEEK 2.pptxJCGonzaga1
 
MIL Lesson 1.pptx
MIL Lesson 1.pptxMIL Lesson 1.pptx
MIL Lesson 1.pptxJCGonzaga1
 

More from JCGonzaga1 (11)

Bridging the Gad of and between digital dividefor.ppt
Bridging the Gad of and between digital dividefor.pptBridging the Gad of and between digital dividefor.ppt
Bridging the Gad of and between digital dividefor.ppt
 
Understanding Society Culture and Politics P Lesson 001.pdf
Understanding Society Culture and Politics P Lesson 001.pdfUnderstanding Society Culture and Politics P Lesson 001.pdf
Understanding Society Culture and Politics P Lesson 001.pdf
 
VIDEO BACKGROUND TEMPLATE.pptx
VIDEO BACKGROUND TEMPLATE.pptxVIDEO BACKGROUND TEMPLATE.pptx
VIDEO BACKGROUND TEMPLATE.pptx
 
Digestive System.ppt
Digestive System.pptDigestive System.ppt
Digestive System.ppt
 
PPT-Nail-Structure-and-Shapes.pptx
PPT-Nail-Structure-and-Shapes.pptxPPT-Nail-Structure-and-Shapes.pptx
PPT-Nail-Structure-and-Shapes.pptx
 
mil-keyconceptsandquestionstoaskinmedialiteracy-160715150440.pptx
mil-keyconceptsandquestionstoaskinmedialiteracy-160715150440.pptxmil-keyconceptsandquestionstoaskinmedialiteracy-160715150440.pptx
mil-keyconceptsandquestionstoaskinmedialiteracy-160715150440.pptx
 
Elements of Drama.pptx
Elements of Drama.pptxElements of Drama.pptx
Elements of Drama.pptx
 
DS1.ppt
DS1.pptDS1.ppt
DS1.ppt
 
GRADE 12 WEEK 3-4.pptx
GRADE 12 WEEK 3-4.pptxGRADE 12 WEEK 3-4.pptx
GRADE 12 WEEK 3-4.pptx
 
GRADE 12 WEEK 2.pptx
GRADE 12 WEEK 2.pptxGRADE 12 WEEK 2.pptx
GRADE 12 WEEK 2.pptx
 
MIL Lesson 1.pptx
MIL Lesson 1.pptxMIL Lesson 1.pptx
MIL Lesson 1.pptx
 

Recently uploaded

Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 

Recently uploaded (20)

Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 

Digital Citizenship_Lecture.pptx

  • 2. Digital Citizenship Reinforces the positive aspects of technology so that everyone can work and play in this digital world.
  • 3. Nine Elements 1. Digital Access – full electronic participation in society 2. Digital Commerce – the buying and selling of goods online 3. Digital Communication – the electronic exchange of information 4. Digital Literacy – the capability to use digital technology and knowing when and how to use it
  • 4. Nine Elements 5. Digital Etiquette– the standards of conduct expected by other digital technology users 6. Digital Law– the legal rights and restrictions governing technology use 7. Digital Rights & Responsibilities– the privileges and freedoms extended to all digital technology users, and the behavioral expectations that come with them
  • 5. Nine Elements 8. Digital Health & Wellness– the elements of physical and psychological well- being related to digital technology use 9. Digital Security– the precautions that all technology users must take to guarantee their personal safety and the security of their network
  • 6.
  • 7. Digital Access • Full electronic participation in society • Does everyone have equal opportunity to digital technology?
  • 8. Digital Access Issues • Access for all students • Accommodations for students with special needs • Programs for increasing access outside school
  • 9. Digital Commerce • The buying and selling of goods online
  • 10. Digital Commerce Issues • Online buying through commercial sites, auction sites, and others • Online selling through auction sites and others • Media subscriptions and purchases made through media such as iTunes • Buying and selling “virtual merchandise” for online games
  • 11. What’s the risk? • Top 3 complaints: – Merchandise that wasn’t delivered or payment that wasn’t received – Internet auction fraud – Credit/debit card fraud
  • 12. Tips for Shopping • Know your retailer – Contact numbers – Physical address (no PO boxes) • Use secure Web sites
  • 13. Tips for Shopping • Be aware of phishing email • Review privacy and security policies • Use antivirus and firewall software • Check credit reports regularly
  • 14. Digital Communication • The electronic exchange of information • Cell phones, IM, videoconferencing, e-mail, texting, blogs, etc.
  • 15. Formal v. Informal Writing • Blog – an online journal made public for others to read • Mrs. Ashlock’s Blog • Emoticons – emotional graphics; visual ways to express how you feel
  • 16. Formal v. Informal Writing • How do you write when you are texting or emailing or blogging? • Emoticons/Texting •  • <3 • 3@t • r u – i write in all lowercase
  • 17. Social Networking • Online communication where users can interact with other people, as well as with the information they send, receive, and create. • Web 2.0 – lets people collaborate and share information online
  • 18. Types of Social Media Sites • Social Networking • User-generated content • File-sharing • Entertainment
  • 19. Examples of Social Networking Sites 1. MySpace 2. Wikipedia 3. YouTube 4. Facebook 5. Photo Bucket 6. Craig’s List 7. Flickr 8. IMDb 9. Twitter 10. Blogspot.com
  • 21. Digital Literacy • The capability to use digital technology and knowing when and how to use it
  • 22. Digital Literacy Issues • Learning how to use search engines and email • Evaluating online resources • Using distance education and online learning
  • 23.
  • 24. Evaluating Web Sites • Anyone can put information on the Internet • No regulation • Tree Octopus • Criteria
  • 25. 5 Evaluating Criteria? • Accuracy • Expertise • Bias/Objectivity • Currency • Coverage
  • 26. Evaluating Web Sites • Reliable sources – .gov (government) – .edu (education) – .com (commercial business) – .org (organization; non-profit) – .net (network) • Blog – someone’s personal opinion; may not be fact
  • 27. Search Engines • Databases that gather information from thousands of websites based on keywords • Be specific – you will get better results • Google, Yahoo, Ask, Bing
  • 28. Example: Find the answer to the question: • Who is said to have discovered America in 1492?
  • 34.
  • 35. Citing Sources Format Author. Web Site Title. Web address. Copyright Date. Found on (list the date you found the information).
  • 36. Citing Sources Format Author Web Site Title Web address Copyright Date Found on (list the date you found the information).
  • 37. Sample Roger Young. FBI History. http://www.fib.gov/kids. 2007. Found on April 2, 2008.
  • 39. Digital Etiquette • The standards of conduct expected by other digital technology users
  • 40. Digital Etiquette Issues • Minimize negative effects on others • Using technology when it is contextually appropriate • Respecting others online
  • 41. Cell Phone Etiquette • Set appropriate ringtones • Don’t yell • Keep it short in public • Don’t text and drive – InTEXTicated • Excuse yourself • Use cameras wisely – Sexting
  • 42. Privacy • Nothing is ever private on the Internet • Don’t write something down if you don’t ever want to see it again • Forwards…..
  • 43. Digital Law • The legal rules and restrictions governing technology use
  • 44. Digital Law Issues • Using file-sharing sites • Pirating software • Hacking into systems or networks • Copyright • Stealing someone’s identity
  • 45. 3 / 4 students do not think it’s wrong to download files without permission
  • 46. File-Sharing – making files available to others to download from the internet
  • 47. Activity Debate – File Sharing Is it Right or Wrong?
  • 48. Copyright The exclusive right to publish and sell literary or musical or artistic work
  • 49. A Right to Earn a Living • When another person copies an artistic work to sell or give away, the person who created the work loses money.
  • 50. A Right to Earn a Living • The author or artist is the only person who has the right to make copies or to give permission to make copies.
  • 51. Respecting Copyrights • If you copy a work protected by copyright and give or sell it to others, you are breaking the law.
  • 52. Respecting Copyrights • Putting copyrighted works on your Web site for public display without the owner’s permission is also illegal.
  • 53. Intellectual Property • Creations of the mind from new inventions to markings that identify the source of products or services to books, photos, movies, and music • Intellectual property is intangible yet it always has value
  • 54. How do you protect yourself? • Register through the copyright process at www.copyright.gov • Creative Commons – work intended to be shared
  • 55. Fair Use • Students can use a limited amount of copyrighted works for school projects without getting permission. • Credit must always be given to the author.
  • 56. Basic Guidelines - Video • Students may use portions of “lawfully acquired copyright works” • 10% or 3 minutes (whichever is less)
  • 57. Basic Guidelines - Music • Up to 10% OR • Maximum of 30 seconds • Whichever is less
  • 58. What can you do? • Ask for permission.
  • 59. Plagiarism • Define Plagiarism • Using works from someone without giving credit is plagiarism. • You are guilty of plagiarism even if you paraphrase and don’t give credit. • www.turnitin.com
  • 60. Digital Rights and Responsibilities • The privileges and freedoms extended to all digital technology users, and the behavioral expectations that come with them
  • 61. Digital Rights and Responsibilities Issues • Following Acceptable Use Policies • Using online material ethically • Using technology to cheat on tests and assignments • Reporting cyber bullies and threats
  • 62. Acceptable Use Policy A set of rules set up by the owner of a product that the user must agree to in order to use the product .
  • 63. Digital Health and Wellness • The elements of physical and psychological well-being related to digital technology use
  • 64. Digital Health and Wellness Issues • Cyber bullying and predators • Using proper ergonomics • Becoming addicted to the Internet or to video games and withdrawing from society
  • 65. Stranger Danger Give examples of information that is considered private and should not be given out to others (strangers) online.
  • 66. Trust • The Internet is built on trust • Do you know who you are talking to? • How much information do you give out to others online?
  • 67. Cyber bullying • Willful and repeated threats, harassment or intimidation intended to inflict harm or emotional distress through the medium of electronic media
  • 69. “The rules are fairly simple. You don’t lie. You don’t pretend to be someone else. You don’t use the site to harass others.”
  • 70. Stay Safe • If you feel: – Embarrassed, upset, depressed uncomfortable, afraid • Leave the computer/chat room • Print the messages • Never reply • Report to an adult
  • 71. Ergonomics • Designing and arranging things people use so that the people and things interact most efficiently and safely
  • 72.
  • 73. Internet Addiction • Any online-related, compulsive behavior which interferes with normal living causing severe stress on family, friends, and/or work
  • 74. Types of Addiction • Pornography • eBay • Online gambling • Multi-user role playing games (Xbox live)
  • 75. Are you addicted? • How often do you stay on-line longer than you intended? • How often do you neglect chores, work, or homework to spend more time on-line? • How often do you form new friendships with on-line users?
  • 76. Are you addicted? • How often do others complain about how much time you spend on-line? • How often do your grades at school suffer because of the time you spend on-line? • How often do you check email, Facebook, MySpace, etc. before you do something else?
  • 77. Are you addicted? • How often do you become defensive or secretive when anyone asks you what you do on-line? • How often do you find yourself anticipating when you will go on-line again? • How often do you fear that life without the Internet would be boring and empty?
  • 78. Are you addicted? • How often do you act annoyed of get mad if someone bothers you while you are on-line? • How often do you lose sleep due to late-night log-ins? • How often do you fantasize about being on-line? • How often do you try to hide how long you’ve been on-line?
  • 79. Are you addicted? • If you answered: – Always – You may have an addiction and need to evaluate how much time you spend online and work on cutting back – Sometimes – You may be experiencing the beginning stages of addiction and need to be very careful how you spend your time – Rarely – You are an average user but should always be aware of you begin spending more time on-line than normal
  • 80. What can we do? • Treatment options are available • Growing awareness • Re-learn how to manage time much like treatments of eating disorders • Talk to an adult
  • 81. Digital Security • The precautions that all technology users must take to guarantee their personal safety and the security of their network
  • 82. Digital Security Issues • Protecting hardware and network security • Protecting personal security (identity theft, phishing) • Protecting school security (hackers, viruses) • Protecting community security (terrorist threats)
  • 83. Trust • Human beings are trusting. • Mail from the Post Office v. Email
  • 84. Information in the Clear • Who can hear your conversation?
  • 86. Task 1: Install and Use Anti-Virus Programs • Who would you let in your house? • Examine the files on the computer and warns of potential viruses
  • 87.
  • 88. Task 2: Keep Your System Patched • Most vendors provide patches that are supposed to fix bugs in their products. • Register and sign up for email updates from vendors
  • 89. Task 3: Use Care When Reading Email with Attachments & Links • Social engineering – send items to unsuspecting recipients • Phishing – email messages that look valid but are tricking the recipient to end private information • Pharming – attack to redirect traffic from a valid website to a bogus website
  • 90. Task 3: Use Care When Reading Email with Attachments & Links • Spam – Commercial messages that you didn’t ask for • Chain Letters – Messages containing jokes, stories or warnings that may not be true and may contain viruses
  • 91. Hacking • If someone found a key to your house, is it okay for them to go inside? • Getting into someone else’s computer is hacking. • Hacking is illegal even if it is not meant to do damage.
  • 92. Task 4: Use a Firewall Program • Works like a security guard • Grants permission for outside sources to enter the computer
  • 93. Identity Theft • Stealing someone’s identity for the purpose of financial gain • Various sources report anywhere from 9 to 10 million people will have their identity stolen per year

Editor's Notes

  1. Define digital citizenship. Digital Citizenship reinforces the positive aspects of technology so that everyone can work and play in this digital world. Digital technology should benefit all; therefore we should share in the rights and responsibilities of being a digital citizen. (DC p. 7)
  2. Define digital citizenship. Digital Citizenship reinforces the positive aspects of technology so that everyone can work and play in this digital world. Digital technology should benefit all; therefore we should share in the rights and responsibilities of being a digital citizen. (DC p. 7)
  3. Read the scenarios in DC p. 87-90 and have the students respond orally according to the digital compass.
  4. Does everyone in your school have equal opportunities as far as technology use is concerned? Do all students have the opportunity to be involved in a digital society?
  5. What are some sites that offer digital commerce? Have you ever bought something online?
  6. www.cnn.com/2009/TECH/03/30/internet.crime
  7. www.infoworld.com/article/06/02/07/75135_HNetailingslaes_1.html
  8. Phishing – banks and legitimate businesses do not ask for personal information through an email Privacy and security – make sure you know if they will sell your info to a 3rd party Antivirus and Firewall – more in the digital security section Credit Reports – 3 major credit bureaus and you are allowed one free report from each of them yearly (get one once every 4 months or at least once a year pull all three)
  9. What rules of etiquette do you need to be aware of when using digital communication technologies? Give examples of some inappropriate and appropriate ways people use digital communication technologies.
  10. List some popular emoticons and text language.
  11. Blog – an online journal made public for others to read Emoticons - emotional graphics; visual ways to express how you feel While these are acceptable when texting or emailing our peers and on Facebook and MySpace, this is not acceptable when writing professionally. These should not appear in school assignments or in professional emails to superiors (boss) or co-workers.
  12. Have students stand and remain standing when they can answer yes to a question: Have you ever created an online software application? Have you ever created an online photo slide show? Have you ever created and uploaded a video to an online web site? Have you ever blogged? Do you have a page on Facebook, MySpace, Habbo, or another similar site? Have you ever downloaded a song or video from the Internet? Do you have more than one “friend” online? Do you know what any of these terms mean: wiki, mash, or tag? Have you ever watched a video on YouTube? Have you ever used or shared content created by someone else without asking permission? What is common about these activities? They are all social media activities. Define social media. Web 2.0 - the second generation of the Internet; services that let people collaborate and share information online From www.digitalcitizenshiped.com
  13. Four Types of Social Media: Social Networking sites – online communities of people who share friends, interests, and activities User-generated content sites – sites where users create original content such as blogs, wikis, photos and videos File-sharing sites – sites where users can tag and share information with other users Entertainment sites – online communities where users play games and interact with media
  14. Source: www.ebizmba.com
  15. Does what you write on facebook, twitter, etc. really matter? Video from www.wiredsafety.org/wiredlearning/bestfoot/index.htm (click on the foot picture) ~ 10 minutes long
  16. 1 computer for every 5 students; But where are these computers? Are they in students’ hands? National Educational Technology Plan (Paige, 2004) Digital Citizenship (p. 22)
  17. Tree Octopus - http://zapatopi.net/treeoctopus/ Have students evaluate the website listed. Truth or fiction? Google Tree Octopus and gather more information to determine a more informed opinion. Criteria – video: http://www.wiredsafety.org/wiredlearning/Evaluation/evalcriteria.htm
  18. Pay attention to the source that appears in a search engine (blog sites versus commercial sites)
  19. Notice the web address under each source listing. These are the correct sources. Click on the link to find the complete information.
  20. Leave out any information that is not found or included in the source information. (Some sites won’t show the author name or website title.)
  21. Leave out any information that is not found or included in the source information. (Some sites won’t show the author name or website title.)
  22. www.citationmachine.net – online source for automatically creating source information Choose the format for sources, complete the web form that appears and the website will format the source information automatically.
  23. Main focus here on cell phone usage Respecting others online is covered more in depth in Digital Safety Are students aware of others when they use technology? Do students realize how their use of technology affects others?
  24. Ringtones – Let where you are determine what ringtone to set on the phone Meetings, Movies – vibrate or silent Outdoors, Home – higher volume, personal ringtones Other public places – medium volume, basic ringtone School, Tests – Off Don’t Yell – Can you hear me now? YES! Keep it short – No one else cares about your weekend plans or your personal history Don’t text and drive – inTEXTicated – Oprah Winfrey’s No Phone Zone Pledge; 15 minute video clip of her show in January 2010 highlighting family’s stories of injuries/deaths related to using a phone while driving It’s against the law in many places to use a cell phone (talk or text) in a school zone Excuse yourself – Don’t talk on your cell phone, play games or send text messages in front of someone who expects your attention. (friend, parents, dr., cashier at store, etc.) Use cameras wisely – make sure you have permission before taking a picture. Don’t let someone take a picture of you if you don’t want it on Facebook or MySpace later. Sexting – sending pornographic pictures to others on your phone. Illegal! Can be charged with child pornography. Link to article on www.nbcdfw.com story of Hillwood Middle Students from Keller ISD sending pornographic pictures on their phones. Being investigated for possession of child pornography. Dec 18, 2009. www.letstalk.com/promo/unclecell/unclecell2.htm
  25. Remember that anyone can take an email and forward it on to anyone they want to.
  26. Are students using technology the way it was intended? Are students infringing on others’ rights by the way they use technology?
  27. 2003 survey by Ipsos (a market research company) for Business Software Alliance
  28. File-sharing - making files available to others to download from the Internet http://www.wired.com/entertainment/music/news/2003/07/59654
  29. Have students choose a position on the question of file-sharing. Have each group create a defense with appropriate reasoning for their position. Choose one spokesperson to defend their position. Digital Citizenship p. 126
  30. Copyright - exclusive right to publish and sell literary or musical or artistic work
  31. Define Intellectual Property Discuss with students how the items posted on social media sites are actually intellectual property and also belong to the person who created it. From www.digitalcitizenshiped.com
  32. Registering for copyright protection through the U.S. Copyright Office (http://www.copyright.gov) establishes a public record of a copyright claim. While copyright registration is not required for copyright protection, it does provide additional legal protections in the event of litigation. Registration may be made at any time within the life of the copyright (typically for a period of 70 years after the creator's death). You may also look at the various licensing options under Creative Commons (www.creativecommons.org/license). This is for those who are interested in protecting the originality of their work but do want to share it with others.
  33. Worksheet on fair use guidelines
  34. Worksheet on fair use guidelines
  35. Worksheet on fair use guidelines
  36. http://landmark-project.com/permission_student.php A form email students can fill out to ask permission to use a specific work.
  37. Define plagiarism - http://www.plagiarism.org/learning_center/what_is_plagiarism.html (From www.digitalcitizenshiped.com) Turnitin.com is used by many educational institutions as a fight against plagiarism. Papers are submitted to the website where it is checked against a massive database to compare patterns of text. Results are compiled into a report that can be viewed seconds after a paper is submitted.
  38. What rights and responsibilities do students have in a digital society? Are students using digital technology appropriately? Cyber bullying will be covered more under Digital Health & Wellness
  39. How can students be physically affected by technology? Are students aware of the physical dangers that can accompany the use of digital technology?
  40. Full (first and last) name Postal address Name of school School address Email address Phone number Passwords Credit card numbers Social security number Parent’s place of work Photos where you can be recognized Your schedule or parent’s work schedule
  41. Don’t get personal – give out private information – with people you don’t personally know online. You cannot prove who that “friend” is.
  42. How does BISD handle cyber bullying? The same as physical bullying but it can punished whether it happens on campus or off campus.
  43. Video: http://www.youtube.com/watch?v=gD9OUas5pDs What has happened since this video? On Nov. 26, the mother, Lori Drew, was convicted on 3 minor offenses of accessing computers without authorization. Each of these counts is punishable by up to one year in prison and a $100,000 fine. She was indicted under the federal Computer Use and Fraud Act, which has been used in hacking and trademark theft cases. She was charged with consipiring to violate the fine print in MySpace’s terms-of-service agreement, which prohibits the use of phony names and harassment of other MySpace members. Source: “Cyber bullying case nets mixed verdict.” eSchool News. January 2009. p. 6.
  44. Quote by Mark Krause, federal prosecutor for the MySpace cyber bullying case against Lori Drew. Source: “Cyber bullying case nets mixed verdict.” eSchool News. January 2009. p. 6.
  45. http://www.merriam-webster.com/dictionary/ergonomics
  46. Evaluate this picture. Have you ever thought about how your workspace affects your physical health? Do you need to rearrange anything on your desk to be more comfortable and efficient? www.osha.gov To evaluate classrooms OSHA provides an evaluation checklist that can be used
  47. Internet addiction test adapted from www.netaddiction.com/resources/internet_addiction_test.htm Ask the students to answer (silently) the questions using Rarely, Sometimes, or Always. Tell them to keep a running total of how many times they use each answer.
  48. Internet addiction test adapted from www.netaddiction.com/resources/internet_addiction_test.htm
  49. Internet addiction test adapted from www.netaddiction.com/resources/internet_addiction_test.htm
  50. Internet addiction test adapted from www.netaddiction.com/resources/internet_addiction_test.htm
  51. Internet addiction test adapted from www.netaddiction.com/resources/internet_addiction_test.htm
  52. Security information adapted from Rogers, Lawrence R. “Home Computer Security.” 2002. www.fedcirc.gov/homeusers/HomeComputerSecurity/checklists/checklist1-9.pdf. Found on April 20, 2009.
  53. How do students protect their technology? How can students be taught to protect themselves and their equipment from harm?
  54. Have you ever wondered if the addresses were valid? If the information on printed ads were correct? How would you verify it? Call the phone numbers listed? How do you know it’s not a fake phone number? How do you know the person on the other end of the line is who they say they are? Email is the same way.
  55. When you have a conversation in the living room, everybody within earshot can hear what you’re saying. If you talk loudly enough and have your windows open, people walking by could hear your conversation. If you want privacy you have to go to another room and make sure windows and doors are closed. The Internet is the same way except the room is much, much bigger. Information sent across the Internet could possibly be tracked and captured as if someone were listening in on what you were doing. But, it could also be used to their benefit.
  56. Does what you write on facebook, twitter, etc. really matter? Video from www.wiredsafety.org/wiredlearning/geekgifts/index.htm (click on the gift picture) ~ 10 minutes long
  57. If someone rang your doorbell and wanted to come into your house, you’d need to make a decision whether or not to let them in. You teach your children to deal with strangers. Anti-virus programs work the same way. They look at the contents of each file, searching for patterns that match a virus or something harmful and can give you options on what to do with that file (remove it, clean it, etc.) Norton Anti-virus is a popular program that often comes with a 30-day trial membership on new computers. Does require a renewed subscription to keep updated. AVG is a very good free alternative. Download from www.avg.com. Picture sources: AVG - www.burchwords.com Norton - www.filetransit.com
  58. Screen shot of AVG options Source: http://www.pcnineoneone.com/reviews/sw/avg6.html
  59. If you buy an appliance and it breaks, you would try to have it fixed, not buy a new one. Vendors of most hardware and software programs will provide updates or patches to fix problems that might be found in regular use. Register your product and sign up for email updates to keep informed of what needs to be downloaded and installed. Consider setting up a separate email address specifically for this purpose.
  60. They disguise the danger or threat with something that would encourage you to open it. “You may have won!” Smart, Safe, and Secure Online (worksheet from www.becybersmart.org)
  61. They disguise the danger or threat with something that would encourage you to open it. “You may have won!” Know – Is the email from someone that you know? Received – Have you received email from this sender before? Expect – Were you expecting email with an attachment from this sender? Call and verify. Sense – Does email from the sender with the contents as described in the subject line make sense? Look for misspelled words or names you don’t recognize. Virus – Does this email contain a virus? Scan it with your anti-virus program. Smart, Safe, and Secure Online (worksheet from www.becybersmart.org)
  62. Security guards check everyone who enters a building and makes sure they have permission to enter. Firewalls work much the same way. They examine outside sources and grants permission for them to access the computer These can be purchased and installed from various vendors. If you use Microsoft Windows, it is a part of the normal operating system. Make sure it is turned on. Picture source: http://www.microsoft.com/windowsxp/using/networking/security/winfirewall.mspx
  63. Identity Theft – stealing someone’s identity for the purpose of financial gain http://www.creditreport.com/identitytheft/info/statistics.asp – good source for tips on not having your identity stolen and steps to take if it does happen