Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Your e image presentation 2


Published on

Published in: Technology, Education
  • Be the first to comment

  • Be the first to like this

Your e image presentation 2

  1. 1. Presented by:Laverne HillMedia SpecialistLowndes High SchoolWith permission from:Howie DiBlasiEmerging Technologies EvangelistDigital Journeyhowie@frontier.netwww.drhowie.comPresentation : 2012
  2. 2. DIGITAL FOOTPRINTS:DIGITAL FOOTPRINTS:WHAT DOES THAT REALLY MEAN?WHAT DOES THAT REALLY MEAN? Students shouldunderstand how to be safeand responsible onlineand how to create a digitalfootprint to be proud oftoday and tomorrow.
  3. 3. TEN COMMANDMENTS OF COMPUTER ETHICS-(K-5)USED WITH PERMISSION: COPYRIGHT: COMPUTER ETHICS INSTITUTE AUTHOR: DR. RAMON C. BARQUIN 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other peoples computer work. 3. Thou shalt not snoop around in other peoples files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for which youhave not paid. 7. Thou shalt not use other peoples computer resources withoutauthorization or proper compensation. 8. Thou shalt not appropriate other peoples intellectual output. 9. Thou shall think about the social consequences of theprogram you write or the system you design. 10. Thou shall use a computer in ways that show considerationof and respect for your fellow humans.
  4. 4. THE HIGH/UNIVERSITY CODE OF ETHICS 1) I will not use the technology/communication system toharm, slander, injure or ridicule others. 2) I will not interfere with others’ use of the technology,including opening the files of others without their permission. 3) I will not use the computer to steal. 4) I will not use the computer to misrepresent my school ormyself. 5) I will not copy software for which I have not paid. 6) I will not use equipment without authorization. 7) I will not copy text or ideas from the technology resourceswithout permission from the author or referencing source. 8) I will be responsible for any consequences that arise fromor that are a result of my computing activities.
  5. 5.  9) I will use both the equipment and the programs in ways that showconsideration, care, and respect. 10) I will be financially responsible and liable for any damages to eitherhardware or software resources that result from inappropriate orabusive behavior. 11) I will not allow another person to use my logon (ID) and password,nor will I use anyone elses ID and password. 12) I will abide by all rules and regulations of the system as changed oradded from time to time by the administration. 13) I will address all concerns regarding the use of technology first tothe supervising teacher and/or school librarian and then to theadministration. 14) I will use the technology/computer system to further my educationand will share my growing knowledge with others. 16) I recognize that all students deserve access as conditions permit. 17) I will not violate the terms and conditions of the Authorization forInternet Access as stated below. 18) I will not tamper with or change the computer settings
  6. 6. INTERNET SAFETYRules of the Road for Kids 1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny oredgy today could cost you tomorrow. 3. Nothing is private online. Anything you say or do can be copied, pasted,and sent to gazillions of people without your permission. 4. Assume everyone is watching. There’s a huge, vast audience out there. Ifsomeone is your friend’s friend, they can see everything. 5. Apply the Golden Rule. If you don’t want it done to you, don’t do it tosomeone else. 6. Watch the clock. A virtual hug never matches a real one. Balance your life. 7. Choose wisely. Not all content is appropriate. You know what we mean. 8. Dont hide. Using anonymity to cloak your actions doesn’t turn you into atrustworthy, responsible human being. 9. Think about what you see. Just because it’s online doesn’t make it true. 10. Be smart, be safe. Not everyone is who they say they are. But you knowthat.
  8. 8.  traces left by your activity in adigital environment. All of us, like it or not, arecreating these trails. All kinds of information ABOUTYOU can be found online.Digital footprints are…….
  9. 9.  Will it be insignificanttomorrow, or in five yearswhen you need to apply forcollege or seek newemployment ?.
  10. 10. WHAT DO YOU KNOW ???? Do you know how long what you put online exists?Do you know how long what you put online exists? Do you know what the standard is for appropriateDo you know what the standard is for appropriateand inappropriate online behavior?and inappropriate online behavior? Do you know what a digital footprint means?Do you know what a digital footprint means? Do you know how to take steps to have a digitalDo you know how to take steps to have a digitalfootprint that you will be proud of today andfootprint that you will be proud of today andtomorrow too?tomorrow too?
  11. 11.  If whatever you do online can beIf whatever you do online can betraced back to you and it staystraced back to you and it staysforever what should you putforever what should you putonline?online? Think: Social NetworkingThink: Social Networking