Digital citizenship refers to using technology appropriately and not misusing or abusing it. There are nine themes of digital citizenship: digital etiquette, communication, literacy, commerce, law, rights and responsibilities, health and wellness, and security. Some key aspects of digital citizenship discussed in the document include netiquette, copyright and fair use, plagiarism, safety on the internet and computers, and how to avoid issues like identity theft, cyberbullying, viruses, and phishing.
The presentation I created for students to make them aware and how to be more precautious to deal with day to day cyberattacks under Teach for India Volunteers.
A short presentation on Intellectual Property issues, particular related to trademark, domain name, and rights of publicity, in the use of brands in social media usernames and profiles
The Ten Commandments of Online Security and PrivacyJonathan Bacon
Slideshow for the JCCCRA TechTalk: The Ten Commandments of Online Security and Privacy (presented on Thursday, November. 29, 2018.
Description: Unless you’re tech-savvy or a member of Generation Z, knowing what can endanger your personal security and privacy online can be confusing. In this round table discussion, we’ll discuss the 10 commandments of online security and open the discussion up for attendees to share personal experiences and lessons learned regarding online security and issues related to online privacy.
See the additional document with all the notes on this presentation.
Online Security and How to Make Money Online Nader Alkeinay
Prepared by Nader Yahya Alkeinay , to learn more about how to earn up to $3000 per month contact us at zcholar.com one of the top academic social network.
in association with 2ech.com magazine and sponsored by tenrm.com
This wonderful presentation, appropriate for teens and young adults, was created by Symantec's Rayane Hazimeh for the Dubai Techfest, 2013. We thank her for generously sharing her content with the SlideShare community.
Best practices for bulk mailings with CiviCRMLeyla Alieva
Presented at the CiviCon 2013 in SF. We talked about the email infrastructure setup required for bulk mailings with CiviCRM as well as deliverability best practices: CAN-SPAM compliance, SPF, feedback loop management, bounce processing and spam traps. Deliverability best practices will be helpful to anybody who wants to start sending bulk mailings using their own SMTP server.
The presentation I created for students to make them aware and how to be more precautious to deal with day to day cyberattacks under Teach for India Volunteers.
A short presentation on Intellectual Property issues, particular related to trademark, domain name, and rights of publicity, in the use of brands in social media usernames and profiles
The Ten Commandments of Online Security and PrivacyJonathan Bacon
Slideshow for the JCCCRA TechTalk: The Ten Commandments of Online Security and Privacy (presented on Thursday, November. 29, 2018.
Description: Unless you’re tech-savvy or a member of Generation Z, knowing what can endanger your personal security and privacy online can be confusing. In this round table discussion, we’ll discuss the 10 commandments of online security and open the discussion up for attendees to share personal experiences and lessons learned regarding online security and issues related to online privacy.
See the additional document with all the notes on this presentation.
Online Security and How to Make Money Online Nader Alkeinay
Prepared by Nader Yahya Alkeinay , to learn more about how to earn up to $3000 per month contact us at zcholar.com one of the top academic social network.
in association with 2ech.com magazine and sponsored by tenrm.com
This wonderful presentation, appropriate for teens and young adults, was created by Symantec's Rayane Hazimeh for the Dubai Techfest, 2013. We thank her for generously sharing her content with the SlideShare community.
Best practices for bulk mailings with CiviCRMLeyla Alieva
Presented at the CiviCon 2013 in SF. We talked about the email infrastructure setup required for bulk mailings with CiviCRM as well as deliverability best practices: CAN-SPAM compliance, SPF, feedback loop management, bounce processing and spam traps. Deliverability best practices will be helpful to anybody who wants to start sending bulk mailings using their own SMTP server.
Best of #PRProchat: Special Edition with Stockton UniversityCarrie Morgan
How has media relations changed? Is the press release dead? What traditional PR skills are still relevant? Carrie Morgan addresses these questions with Stockton University's college students and Professer Ai Zhang.
For academic purposes only.
Sources of information are compiled and indicated in the Reference section of the presentation. Images or pictures are obtained from Google search.
50
مبادرة
#تواصل_تطوير
المحاضرة الخمسون من المبادرة مع
المهندس / أشرف صلاح الدين إبراهيم
استشاري أمن المعلومات والتحول الرقمي
بعنوان
كيف تبقى آمنا وتحمي معلوماتك في العصر الرقمي
(التحديات -الأساليب-المخاطر)
How to stay secured online
( challenges - Risks - Tools )
التاسعة مساء توقيت مكة المكرمةالإثنين31أغسطس2020
وذلك عبر تطبيق زووم من خلال الرابط
https://us02web.zoom.us/meeting/register/tZMtdeCtpj0pGtdEDxCUQAp7hw760rmy719g
علما ان هناك بث مباشر للمحاضرة على وقناة يوتيوب
https://www.youtube.com/user/EEAchannal
للتواصل مع إدارة المبادرة عبر قناة تيليجرام
الرابط
https://t.me/EEAKSA
رابط اللينكدان والمكتبة الالكترونية
www.linkedin.com/company/eeaksa-egyptian-engineers-association/
رابط التسجيل العام للمحاضرات
https://forms.gle/vVmw7L187tiATRPw9
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
Cyber Security Awareness Session conducted by Lightracers Consulting, for Management and non-IT employees. In this learning presentation, we will look at - What is Cyber Crime, Types of Cyber crime, What is Cyber Security, Types of Threats, Social Engineering techniques, Identifying legitimate and secure websites, Protection measures, Cyber Law in India followed by a small quiz.
Securing & Safeguarding Your Library Setup.pptxBrian Pichman
With all the things that go "bump" in the night, nothing worries administrators and even end users more than a security incident. This webinar will focus on building an understanding of IT Security and the tools that can help mitigate risk. Moreover, attendees will leave with a clear understanding of general informational security terms and processes that they can implement in their library same day to help safeguard and better protect their infrastructure and data. Brian Pichman of the Evolve Project will lead us through putting together components for a Security and Risk Plan and how to properly respond to threats and attacks.
Cyber security is an essential part of our digital lives today. But do you know what cyber security actually constitutes and how secure you really are? In this presentation, we help you understand:
a. The impact of cyber security on our digital lives
b. How cyber security is essential for our families
c. Cyber security in the business context
d. What Quick Heal can do to help
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
2. What is
Digital Citizenship?
“Digital Citizenship is about using
technology appropriately, and not
misusing or abusing technology”
-http://educationaltechnology.ca
3. Nine Themes of Digital
Citizenship
• digital etiquette
• digital communication
• digital literacy
• digital commerce
• digital law
• digital rights and responsibilities
• digital health and wellness
• digital security (self protection)
4. This project addresses:
• Netiquette
• Copyright and Fair Use
• Plagiarism
• Safety on the internet
• Safety on your computer
6. The Core Rules of Netiquette:
Dos Don't Lie
Sharing is caring Don't Hate
Correct mistakes No cursing
Share accurate info. No disrespect
Everything in moderation
Respect privacy
Show Love
Don’ts
8. Copyright
“a legal concept, enacted by most
governments, giving the creator of an
original work exclusive rights to
it, usually for a limited time.”
- wikipedia.org
9. Fair Use
“a limitation and exception to the
exclusive right granted by
copyright law to the author of a
creative work.”
- wikipedia.org
10. What is the difference between
Copyright and Fair Use?
Fair Use refers to
being able to use parts
of copyrighted materials
without permission
for educational reasons.
12. According to the Merriam-Webster
Online Dictionary, to "plagiarize"
means:
• to steal and pass off (the ideas or words of
another) as one's own
• to use (another's production) without
crediting the source
• to commit literary theft
• to present as new and original an idea or
product derived from an existing source.
13. How can I avoid Plagarism?
• Don’t turn in someone else's work as your own
• Don’t copy words or ideas from someone else without
giving credit
• Don’t forget to put a quotation in quotation marks
• Don’t give incorrect information about where the
quotation came from
• Don’t copy so many words or ideas from a source that
it makes up the majority of your work, whether you
give credit or not
14. Remember…
If the site is copyrighted, you need to
request permission from the owners of
the website.
It there is no clear copyright listed, be
sure to reference the site with the URL
17. Safety on the Internet
includes:
• Identity Theft
• Reputation management
• Passwords
• Cyberbullying
• Cyberstalking
18. Identity Theft
When your personal
information is stolen and
then that person pretends to
be you.
19. Reputation
Management
When a individual or a business
is continuously monitored in
hopes to create positive
commentary and
dispute the negative.
20. Passwords
• Don't leave your passwords lying
around
• Don't reveal your passwords to others
• Never give your password out in an
email
• Don't use the default password
• Change reset passwords
21. Cyberbullying
Refers to bullying on the internet – social networking
sites, emails and texts
Remember…
• If its something that is going to hurt someone’s
feelings, don’t do it.
• Don’t fight back.
• Tell an adult.
• What you say online could stay there forever.
22. Cyberstalking
Refers to using the Internet or any other electronic device
to harass an individual, a group, or an organization.
This includes:
• Making false accusations.
• Making threats.
• Stealing someone’s identity.
• Causing harm to someone’s data or computer
equipment.
24. Safety on your computer
includes:
• Viruses
• Phishing
• Trojan horses
• Worms
25. Viruses
A computer virus is a type of computer program that
duplicates itself and can infect and damage a computer
without the person knowing.
Sometimes, when the computer gets a virus it can cause the
computer to “act up” and may cause the computer to be
slow, or even crash. Many important documents can be
lost.
26. Phishing
Phishing happens through e-mails and instant
messages. Phishing guides computer users to
enter their information on a fake website that
looks just like the real website.
Types of Phishing:
• Whaling
• Clone Phishing
• Spear Phishing
27. Trojan Horses can:
• Retrieve passwords or credit card information
• Install damaging software
• Download or upload files on anyone’s
computer
• Delete files
• Watch the computer user's screen
• Crash the computer
28. Worms
A computer worm is a damaging
computer program that duplicates itself
in order to spread to other computers
through the computer network.
Some worms have been created with
good intentions.
29. Ways to keep your computer
safe:
Make sure that your computer has an
antivirus program installed.
Never download anything off the internet
without a parent’s permission.
30. References
Doering, A. H., & Roblyer, M. D. (2010). Integrating educational
technology into teaching. (5 ed., pp. 217-222). Boston, MA:
Pearson Education, Inc.
http://www.wikipedia.org/
http://www.surfnetparents.com
www.brainpop.com
http://networketiquette.net/
http://fairuse.stanford.edu
http://www.educationworld.com
http://www.plagiarism.org/
http://learn-the-ropes.wikispaces.com/Digital+Citizenship
http://educationaltechnology.ca