SlideShare a Scribd company logo
1 of 30
Digital Citizenship

  By Christa Stephens
What is
  Digital Citizenship?

“Digital Citizenship is about using
technology appropriately, and not
 misusing or abusing technology”

                -http://educationaltechnology.ca
Nine Themes of Digital
     Citizenship
           • digital etiquette
      • digital communication
            • digital literacy
         • digital commerce
             • digital law
  • digital rights and responsibilities
     • digital health and wellness
   • digital security (self protection)
This project addresses:

•   Netiquette
•   Copyright and Fair Use
•   Plagiarism
•   Safety on the internet
•   Safety on your computer
Digital Ettiquette
 or “Netiquette”

     - set of rules
       on how to
    behave online
The Core Rules of Netiquette:

            Dos                 Don't Lie


       Sharing is caring       Don't Hate


       Correct mistakes        No cursing


     Share accurate info.     No disrespect


   Everything in moderation

       Respect privacy

         Show Love
          Don’ts
Copyright
   &
Fair Use
Copyright

  “a legal concept, enacted by most
governments, giving the creator of an
   original work exclusive rights to
    it, usually for a limited time.”
                            - wikipedia.org
Fair Use

“a limitation and exception to the
    exclusive right granted by
 copyright law to the author of a
         creative work.”
                       -   wikipedia.org
What is the difference between
  Copyright and Fair Use?

          Fair Use refers to
       being able to use parts
      of copyrighted materials
         without permission
      for educational reasons.
Plagarism
According to the Merriam-Webster
Online Dictionary, to "plagiarize"
              means:

• to steal and pass off (the ideas or words of
  another) as one's own
• to use (another's production) without
  crediting the source
• to commit literary theft
• to present as new and original an idea or
  product derived from an existing source.
How can I avoid Plagarism?

• Don’t turn in someone else's work as your own
• Don’t copy words or ideas from someone else without
  giving credit
• Don’t forget to put a quotation in quotation marks
• Don’t give incorrect information about where the
  quotation came from
• Don’t copy so many words or ideas from a source that
  it makes up the majority of your work, whether you
  give credit or not
Remember…

 If the site is copyrighted, you need to
request permission from the owners of
                the website.

It there is no clear copyright listed, be
sure to reference the site with the URL
Technology Tools to help
    stop Plagiarism:


      Turnitin.com

    MyDropBox.com
Safety
 on the
Internet
Safety on the Internet
      includes:
    • Identity Theft
• Reputation management
      • Passwords
    • Cyberbullying
    • Cyberstalking
Identity Theft
    When your personal
  information is stolen and
then that person pretends to
           be you.
Reputation
      Management
When a individual or a business
 is continuously monitored in
    hopes to create positive
        commentary and
      dispute the negative.
Passwords
  • Don't leave your passwords lying
                 around
• Don't reveal your passwords to others
 • Never give your password out in an
                  email
   • Don't use the default password
      • Change reset passwords
Cyberbullying
Refers to bullying on the internet – social networking
                sites, emails and texts



              Remember…
 • If its something that is going to hurt someone’s
                 feelings, don’t do it.
               • Don’t fight back.
                 • Tell an adult.
  • What you say online could stay there forever.
Cyberstalking
Refers to using the Internet or any other electronic device
  to harass an individual, a group, or an organization.


                This includes:
            • Making false accusations.
                • Making threats.
          • Stealing someone’s identity.
    • Causing harm to someone’s data or computer
                      equipment.
Safety on your
  computer
Safety on your computer
        includes:

        • Viruses
       • Phishing
     • Trojan horses
        • Worms
Viruses
   A computer virus is a type of computer program that
   duplicates itself and can infect and damage a computer
                 without the person knowing.

Sometimes, when the computer gets a virus it can cause the
   computer to “act up” and may cause the computer to be
   slow, or even crash. Many important documents can be
                            lost.
Phishing
Phishing happens through e-mails and instant
 messages. Phishing guides computer users to
 enter their information on a fake website that
         looks just like the real website.


          Types of Phishing:
               • Whaling
             • Clone Phishing
             • Spear Phishing
Trojan Horses can:

• Retrieve passwords or credit card information
         • Install damaging software
   • Download or upload files on anyone’s
                    computer
                • Delete files
     • Watch the computer user's screen
            • Crash the computer
Worms
  A computer worm is a damaging
computer program that duplicates itself
 in order to spread to other computers
    through the computer network.

Some worms have been created with
         good intentions.
Ways to keep your computer
           safe:

  Make sure that your computer has an
      antivirus program installed.

Never download anything off the internet
      without a parent’s permission.
References
Doering, A. H., & Roblyer, M. D. (2010). Integrating educational
    technology into teaching. (5 ed., pp. 217-222). Boston, MA:
    Pearson Education, Inc.
http://www.wikipedia.org/
http://www.surfnetparents.com
www.brainpop.com
http://networketiquette.net/
http://fairuse.stanford.edu
http://www.educationworld.com
http://www.plagiarism.org/
http://learn-the-ropes.wikispaces.com/Digital+Citizenship
http://educationaltechnology.ca

More Related Content

What's hot

Rules on the road to netique
Rules on the road to netiqueRules on the road to netique
Rules on the road to netiqueC_Warrick
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide showBeckusq
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525chadolivard
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for childrenSaurav Jha
 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online_chimes_
 
How To Keep Safe On The Internet!
How To Keep Safe On The Internet!How To Keep Safe On The Internet!
How To Keep Safe On The Internet!alexclark-efc
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYFaMulan2
 
Social Media Marketing 04 08 10
Social Media Marketing 04 08 10Social Media Marketing 04 08 10
Social Media Marketing 04 08 10Matthew Asbell
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parentswstagnaro
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyJonathan Bacon
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online Nader Alkeinay
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centurygracestearns
 
6 8 safety ppt final copy
6 8 safety ppt final copy6 8 safety ppt final copy
6 8 safety ppt final copymarkkreiter
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 

What's hot (18)

Rules on the road to netique
Rules on the road to netiqueRules on the road to netique
Rules on the road to netique
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online
 
How To Keep Safe On The Internet!
How To Keep Safe On The Internet!How To Keep Safe On The Internet!
How To Keep Safe On The Internet!
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
Social Media Marketing 04 08 10
Social Media Marketing 04 08 10Social Media Marketing 04 08 10
Social Media Marketing 04 08 10
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Internet security
Internet securityInternet security
Internet security
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and Privacy
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_century
 
6 8 safety ppt final copy
6 8 safety ppt final copy6 8 safety ppt final copy
6 8 safety ppt final copy
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 

Viewers also liked

Trends Within Youth Delinquency
Trends Within Youth DelinquencyTrends Within Youth Delinquency
Trends Within Youth Delinquency174521
 
Real power point
Real power pointReal power point
Real power pointSilia07
 
How Recruiters Use Linked In 072312
How Recruiters Use Linked In 072312How Recruiters Use Linked In 072312
How Recruiters Use Linked In 072312JoanMalone
 
中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知
中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知
中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知ennhchen
 
Emotional Intelligence
Emotional IntelligenceEmotional Intelligence
Emotional IntelligenceJoanMalone
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Best practices for bulk mailings with CiviCRM
Best practices for bulk mailings with CiviCRMBest practices for bulk mailings with CiviCRM
Best practices for bulk mailings with CiviCRMLeyla Alieva
 
Real power point
Real power pointReal power point
Real power pointSilia07
 
Jim and lori
Jim and loriJim and lori
Jim and lorizidster
 
Emotional intelligence
Emotional intelligenceEmotional intelligence
Emotional intelligenceJoanMalone
 
Best of #PRProchat: Special Edition with Stockton University
Best of #PRProchat: Special Edition with Stockton UniversityBest of #PRProchat: Special Edition with Stockton University
Best of #PRProchat: Special Edition with Stockton UniversityCarrie Morgan
 

Viewers also liked (14)

Trends Within Youth Delinquency
Trends Within Youth DelinquencyTrends Within Youth Delinquency
Trends Within Youth Delinquency
 
Aula 8 php
Aula 8 phpAula 8 php
Aula 8 php
 
Real power point
Real power pointReal power point
Real power point
 
Web
WebWeb
Web
 
How Recruiters Use Linked In 072312
How Recruiters Use Linked In 072312How Recruiters Use Linked In 072312
How Recruiters Use Linked In 072312
 
中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知
中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知
中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知
 
Emotional Intelligence
Emotional IntelligenceEmotional Intelligence
Emotional Intelligence
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Best practices for bulk mailings with CiviCRM
Best practices for bulk mailings with CiviCRMBest practices for bulk mailings with CiviCRM
Best practices for bulk mailings with CiviCRM
 
Real power point
Real power pointReal power point
Real power point
 
Jim and lori
Jim and loriJim and lori
Jim and lori
 
Emotional intelligence
Emotional intelligenceEmotional intelligence
Emotional intelligence
 
Best of #PRProchat: Special Edition with Stockton University
Best of #PRProchat: Special Edition with Stockton UniversityBest of #PRProchat: Special Edition with Stockton University
Best of #PRProchat: Special Edition with Stockton University
 
Music of vietnam
Music of vietnamMusic of vietnam
Music of vietnam
 

Similar to Digital citizenship

IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safetyjaenjenny
 
Computer Security
Computer SecurityComputer Security
Computer Securitytonik
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxAarush59
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfExtremelyDarkness2
 
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...Egyptian Engineers Association
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxBrian Pichman
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thKartik Chhabra
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 

Similar to Digital citizenship (20)

IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer security
Computer securityComputer security
Computer security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
 
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12th
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 

Recently uploaded

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 

Recently uploaded (20)

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 

Digital citizenship

  • 1. Digital Citizenship By Christa Stephens
  • 2. What is Digital Citizenship? “Digital Citizenship is about using technology appropriately, and not misusing or abusing technology” -http://educationaltechnology.ca
  • 3. Nine Themes of Digital Citizenship • digital etiquette • digital communication • digital literacy • digital commerce • digital law • digital rights and responsibilities • digital health and wellness • digital security (self protection)
  • 4. This project addresses: • Netiquette • Copyright and Fair Use • Plagiarism • Safety on the internet • Safety on your computer
  • 5. Digital Ettiquette or “Netiquette” - set of rules on how to behave online
  • 6. The Core Rules of Netiquette: Dos Don't Lie Sharing is caring Don't Hate Correct mistakes No cursing Share accurate info. No disrespect Everything in moderation Respect privacy Show Love Don’ts
  • 7. Copyright & Fair Use
  • 8. Copyright “a legal concept, enacted by most governments, giving the creator of an original work exclusive rights to it, usually for a limited time.” - wikipedia.org
  • 9. Fair Use “a limitation and exception to the exclusive right granted by copyright law to the author of a creative work.” - wikipedia.org
  • 10. What is the difference between Copyright and Fair Use? Fair Use refers to being able to use parts of copyrighted materials without permission for educational reasons.
  • 12. According to the Merriam-Webster Online Dictionary, to "plagiarize" means: • to steal and pass off (the ideas or words of another) as one's own • to use (another's production) without crediting the source • to commit literary theft • to present as new and original an idea or product derived from an existing source.
  • 13. How can I avoid Plagarism? • Don’t turn in someone else's work as your own • Don’t copy words or ideas from someone else without giving credit • Don’t forget to put a quotation in quotation marks • Don’t give incorrect information about where the quotation came from • Don’t copy so many words or ideas from a source that it makes up the majority of your work, whether you give credit or not
  • 14. Remember… If the site is copyrighted, you need to request permission from the owners of the website. It there is no clear copyright listed, be sure to reference the site with the URL
  • 15. Technology Tools to help stop Plagiarism: Turnitin.com MyDropBox.com
  • 17. Safety on the Internet includes: • Identity Theft • Reputation management • Passwords • Cyberbullying • Cyberstalking
  • 18. Identity Theft When your personal information is stolen and then that person pretends to be you.
  • 19. Reputation Management When a individual or a business is continuously monitored in hopes to create positive commentary and dispute the negative.
  • 20. Passwords • Don't leave your passwords lying around • Don't reveal your passwords to others • Never give your password out in an email • Don't use the default password • Change reset passwords
  • 21. Cyberbullying Refers to bullying on the internet – social networking sites, emails and texts Remember… • If its something that is going to hurt someone’s feelings, don’t do it. • Don’t fight back. • Tell an adult. • What you say online could stay there forever.
  • 22. Cyberstalking Refers to using the Internet or any other electronic device to harass an individual, a group, or an organization. This includes: • Making false accusations. • Making threats. • Stealing someone’s identity. • Causing harm to someone’s data or computer equipment.
  • 23. Safety on your computer
  • 24. Safety on your computer includes: • Viruses • Phishing • Trojan horses • Worms
  • 25. Viruses A computer virus is a type of computer program that duplicates itself and can infect and damage a computer without the person knowing. Sometimes, when the computer gets a virus it can cause the computer to “act up” and may cause the computer to be slow, or even crash. Many important documents can be lost.
  • 26. Phishing Phishing happens through e-mails and instant messages. Phishing guides computer users to enter their information on a fake website that looks just like the real website. Types of Phishing: • Whaling • Clone Phishing • Spear Phishing
  • 27. Trojan Horses can: • Retrieve passwords or credit card information • Install damaging software • Download or upload files on anyone’s computer • Delete files • Watch the computer user's screen • Crash the computer
  • 28. Worms A computer worm is a damaging computer program that duplicates itself in order to spread to other computers through the computer network. Some worms have been created with good intentions.
  • 29. Ways to keep your computer safe: Make sure that your computer has an antivirus program installed. Never download anything off the internet without a parent’s permission.
  • 30. References Doering, A. H., & Roblyer, M. D. (2010). Integrating educational technology into teaching. (5 ed., pp. 217-222). Boston, MA: Pearson Education, Inc. http://www.wikipedia.org/ http://www.surfnetparents.com www.brainpop.com http://networketiquette.net/ http://fairuse.stanford.edu http://www.educationworld.com http://www.plagiarism.org/ http://learn-the-ropes.wikispaces.com/Digital+Citizenship http://educationaltechnology.ca