SlideShare a Scribd company logo
Digital Citizenship

  By Christa Stephens
What is
  Digital Citizenship?

“Digital Citizenship is about using
technology appropriately, and not
 misusing or abusing technology”

                -http://educationaltechnology.ca
Nine Themes of Digital
     Citizenship
           • digital etiquette
      • digital communication
            • digital literacy
         • digital commerce
             • digital law
  • digital rights and responsibilities
     • digital health and wellness
   • digital security (self protection)
This project addresses:

•   Netiquette
•   Copyright and Fair Use
•   Plagiarism
•   Safety on the internet
•   Safety on your computer
Digital Ettiquette
 or “Netiquette”

     - set of rules
       on how to
    behave online
The Core Rules of Netiquette:

            Dos                 Don't Lie


       Sharing is caring       Don't Hate


       Correct mistakes        No cursing


     Share accurate info.     No disrespect


   Everything in moderation

       Respect privacy

         Show Love
          Don’ts
Copyright
   &
Fair Use
Copyright

  “a legal concept, enacted by most
governments, giving the creator of an
   original work exclusive rights to
    it, usually for a limited time.”
                            - wikipedia.org
Fair Use

“a limitation and exception to the
    exclusive right granted by
 copyright law to the author of a
         creative work.”
                       -   wikipedia.org
What is the difference between
  Copyright and Fair Use?

          Fair Use refers to
       being able to use parts
      of copyrighted materials
         without permission
      for educational reasons.
Plagarism
According to the Merriam-Webster
Online Dictionary, to "plagiarize"
              means:

• to steal and pass off (the ideas or words of
  another) as one's own
• to use (another's production) without
  crediting the source
• to commit literary theft
• to present as new and original an idea or
  product derived from an existing source.
How can I avoid Plagarism?

• Don’t turn in someone else's work as your own
• Don’t copy words or ideas from someone else without
  giving credit
• Don’t forget to put a quotation in quotation marks
• Don’t give incorrect information about where the
  quotation came from
• Don’t copy so many words or ideas from a source that
  it makes up the majority of your work, whether you
  give credit or not
Remember…

 If the site is copyrighted, you need to
request permission from the owners of
                the website.

It there is no clear copyright listed, be
sure to reference the site with the URL
Technology Tools to help
    stop Plagiarism:


      Turnitin.com

    MyDropBox.com
Safety
 on the
Internet
Safety on the Internet
      includes:
    • Identity Theft
• Reputation management
      • Passwords
    • Cyberbullying
    • Cyberstalking
Identity Theft
    When your personal
  information is stolen and
then that person pretends to
           be you.
Reputation
      Management
When a individual or a business
 is continuously monitored in
    hopes to create positive
        commentary and
      dispute the negative.
Passwords
  • Don't leave your passwords lying
                 around
• Don't reveal your passwords to others
 • Never give your password out in an
                  email
   • Don't use the default password
      • Change reset passwords
Cyberbullying
Refers to bullying on the internet – social networking
                sites, emails and texts



              Remember…
 • If its something that is going to hurt someone’s
                 feelings, don’t do it.
               • Don’t fight back.
                 • Tell an adult.
  • What you say online could stay there forever.
Cyberstalking
Refers to using the Internet or any other electronic device
  to harass an individual, a group, or an organization.


                This includes:
            • Making false accusations.
                • Making threats.
          • Stealing someone’s identity.
    • Causing harm to someone’s data or computer
                      equipment.
Safety on your
  computer
Safety on your computer
        includes:

        • Viruses
       • Phishing
     • Trojan horses
        • Worms
Viruses
   A computer virus is a type of computer program that
   duplicates itself and can infect and damage a computer
                 without the person knowing.

Sometimes, when the computer gets a virus it can cause the
   computer to “act up” and may cause the computer to be
   slow, or even crash. Many important documents can be
                            lost.
Phishing
Phishing happens through e-mails and instant
 messages. Phishing guides computer users to
 enter their information on a fake website that
         looks just like the real website.


          Types of Phishing:
               • Whaling
             • Clone Phishing
             • Spear Phishing
Trojan Horses can:

• Retrieve passwords or credit card information
         • Install damaging software
   • Download or upload files on anyone’s
                    computer
                • Delete files
     • Watch the computer user's screen
            • Crash the computer
Worms
  A computer worm is a damaging
computer program that duplicates itself
 in order to spread to other computers
    through the computer network.

Some worms have been created with
         good intentions.
Ways to keep your computer
           safe:

  Make sure that your computer has an
      antivirus program installed.

Never download anything off the internet
      without a parent’s permission.
References
Doering, A. H., & Roblyer, M. D. (2010). Integrating educational
    technology into teaching. (5 ed., pp. 217-222). Boston, MA:
    Pearson Education, Inc.
http://www.wikipedia.org/
http://www.surfnetparents.com
www.brainpop.com
http://networketiquette.net/
http://fairuse.stanford.edu
http://www.educationworld.com
http://www.plagiarism.org/
http://learn-the-ropes.wikispaces.com/Digital+Citizenship
http://educationaltechnology.ca

More Related Content

What's hot

Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525chadolivard
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
SrijanMukhopadhyay1
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
Saurav Jha
 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online_chimes_
 
How To Keep Safe On The Internet!
How To Keep Safe On The Internet!How To Keep Safe On The Internet!
How To Keep Safe On The Internet!alexclark-efc
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
FaMulan2
 
Social Media Marketing 04 08 10
Social Media Marketing 04 08 10Social Media Marketing 04 08 10
Social Media Marketing 04 08 10
Matthew Asbell
 
Internet safety
Internet safetyInternet safety
Internet safety
Dan Tomlinson
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
wstagnaro
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
rainstorming23m
 
Internet security
Internet securityInternet security
Internet security
Mohammed Adam
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and Privacy
Jonathan Bacon
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
Nader Alkeinay
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_century
gracestearns
 
6 8 safety ppt final copy
6 8 safety ppt final copy6 8 safety ppt final copy
6 8 safety ppt final copymarkkreiter
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
Marian Merritt
 

What's hot (16)

Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online
 
How To Keep Safe On The Internet!
How To Keep Safe On The Internet!How To Keep Safe On The Internet!
How To Keep Safe On The Internet!
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
Social Media Marketing 04 08 10
Social Media Marketing 04 08 10Social Media Marketing 04 08 10
Social Media Marketing 04 08 10
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Internet security
Internet securityInternet security
Internet security
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and Privacy
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_century
 
6 8 safety ppt final copy
6 8 safety ppt final copy6 8 safety ppt final copy
6 8 safety ppt final copy
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 

Viewers also liked

Best practices for bulk mailings with CiviCRM
Best practices for bulk mailings with CiviCRMBest practices for bulk mailings with CiviCRM
Best practices for bulk mailings with CiviCRM
Leyla Alieva
 
Trends Within Youth Delinquency
Trends Within Youth DelinquencyTrends Within Youth Delinquency
Trends Within Youth Delinquency
174521
 
Real power point
Real power pointReal power point
Real power pointSilia07
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Emotional intelligence
Emotional intelligenceEmotional intelligence
Emotional intelligence
JoanMalone
 
Real power point
Real power pointReal power point
Real power point
Silia07
 
Web
WebWeb
Emotional Intelligence
Emotional IntelligenceEmotional Intelligence
Emotional Intelligence
JoanMalone
 
Jim and lori
Jim and loriJim and lori
Jim and lori
zidster
 
中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知
中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知
中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知ennhchen
 
How Recruiters Use Linked In 072312
How Recruiters Use Linked In 072312How Recruiters Use Linked In 072312
How Recruiters Use Linked In 072312JoanMalone
 
Best of #PRProchat: Special Edition with Stockton University
Best of #PRProchat: Special Edition with Stockton UniversityBest of #PRProchat: Special Edition with Stockton University
Best of #PRProchat: Special Edition with Stockton University
Carrie Morgan
 
Music of vietnam
Music of vietnamMusic of vietnam
Music of vietnam
raquelita_zape
 

Viewers also liked (14)

Best practices for bulk mailings with CiviCRM
Best practices for bulk mailings with CiviCRMBest practices for bulk mailings with CiviCRM
Best practices for bulk mailings with CiviCRM
 
Trends Within Youth Delinquency
Trends Within Youth DelinquencyTrends Within Youth Delinquency
Trends Within Youth Delinquency
 
Real power point
Real power pointReal power point
Real power point
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Emotional intelligence
Emotional intelligenceEmotional intelligence
Emotional intelligence
 
Real power point
Real power pointReal power point
Real power point
 
Web
WebWeb
Web
 
Aula 8 php
Aula 8 phpAula 8 php
Aula 8 php
 
Emotional Intelligence
Emotional IntelligenceEmotional Intelligence
Emotional Intelligence
 
Jim and lori
Jim and loriJim and lori
Jim and lori
 
中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知
中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知
中国人民银行办公厅关于小额贷款公司接入人民银行征信系统及相关管理工作的通知
 
How Recruiters Use Linked In 072312
How Recruiters Use Linked In 072312How Recruiters Use Linked In 072312
How Recruiters Use Linked In 072312
 
Best of #PRProchat: Special Edition with Stockton University
Best of #PRProchat: Special Edition with Stockton UniversityBest of #PRProchat: Special Edition with Stockton University
Best of #PRProchat: Special Edition with Stockton University
 
Music of vietnam
Music of vietnamMusic of vietnam
Music of vietnam
 

Similar to Digital citizenship

IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
jaenjenny
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Benjamin Sangalang
 
Computer security
Computer securityComputer security
Computer security
Univ of Salamanca
 
Computer Security
Computer SecurityComputer Security
Computer Security
tonik
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayanehaz
 
Cyber security
Cyber securityCyber security
Cyber security
SaurabhKaushik57
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
Aarush59
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
Bobby Dait
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
ExtremelyDarkness2
 
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
Egyptian Engineers Association
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
Abzetdin Adamov
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
Krishna Srikanth Manda
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
Brian Pichman
 
Online ethics
Online ethicsOnline ethics
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Quick Heal Technologies Ltd.
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12th
Kartik Chhabra
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
bcanawakadalcollege
 

Similar to Digital citizenship (20)

IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer security
Computer securityComputer security
Computer security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
 
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوما...
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12th
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 

Recently uploaded

TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 

Recently uploaded (20)

TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 

Digital citizenship

  • 1. Digital Citizenship By Christa Stephens
  • 2. What is Digital Citizenship? “Digital Citizenship is about using technology appropriately, and not misusing or abusing technology” -http://educationaltechnology.ca
  • 3. Nine Themes of Digital Citizenship • digital etiquette • digital communication • digital literacy • digital commerce • digital law • digital rights and responsibilities • digital health and wellness • digital security (self protection)
  • 4. This project addresses: • Netiquette • Copyright and Fair Use • Plagiarism • Safety on the internet • Safety on your computer
  • 5. Digital Ettiquette or “Netiquette” - set of rules on how to behave online
  • 6. The Core Rules of Netiquette: Dos Don't Lie Sharing is caring Don't Hate Correct mistakes No cursing Share accurate info. No disrespect Everything in moderation Respect privacy Show Love Don’ts
  • 7. Copyright & Fair Use
  • 8. Copyright “a legal concept, enacted by most governments, giving the creator of an original work exclusive rights to it, usually for a limited time.” - wikipedia.org
  • 9. Fair Use “a limitation and exception to the exclusive right granted by copyright law to the author of a creative work.” - wikipedia.org
  • 10. What is the difference between Copyright and Fair Use? Fair Use refers to being able to use parts of copyrighted materials without permission for educational reasons.
  • 12. According to the Merriam-Webster Online Dictionary, to "plagiarize" means: • to steal and pass off (the ideas or words of another) as one's own • to use (another's production) without crediting the source • to commit literary theft • to present as new and original an idea or product derived from an existing source.
  • 13. How can I avoid Plagarism? • Don’t turn in someone else's work as your own • Don’t copy words or ideas from someone else without giving credit • Don’t forget to put a quotation in quotation marks • Don’t give incorrect information about where the quotation came from • Don’t copy so many words or ideas from a source that it makes up the majority of your work, whether you give credit or not
  • 14. Remember… If the site is copyrighted, you need to request permission from the owners of the website. It there is no clear copyright listed, be sure to reference the site with the URL
  • 15. Technology Tools to help stop Plagiarism: Turnitin.com MyDropBox.com
  • 17. Safety on the Internet includes: • Identity Theft • Reputation management • Passwords • Cyberbullying • Cyberstalking
  • 18. Identity Theft When your personal information is stolen and then that person pretends to be you.
  • 19. Reputation Management When a individual or a business is continuously monitored in hopes to create positive commentary and dispute the negative.
  • 20. Passwords • Don't leave your passwords lying around • Don't reveal your passwords to others • Never give your password out in an email • Don't use the default password • Change reset passwords
  • 21. Cyberbullying Refers to bullying on the internet – social networking sites, emails and texts Remember… • If its something that is going to hurt someone’s feelings, don’t do it. • Don’t fight back. • Tell an adult. • What you say online could stay there forever.
  • 22. Cyberstalking Refers to using the Internet or any other electronic device to harass an individual, a group, or an organization. This includes: • Making false accusations. • Making threats. • Stealing someone’s identity. • Causing harm to someone’s data or computer equipment.
  • 23. Safety on your computer
  • 24. Safety on your computer includes: • Viruses • Phishing • Trojan horses • Worms
  • 25. Viruses A computer virus is a type of computer program that duplicates itself and can infect and damage a computer without the person knowing. Sometimes, when the computer gets a virus it can cause the computer to “act up” and may cause the computer to be slow, or even crash. Many important documents can be lost.
  • 26. Phishing Phishing happens through e-mails and instant messages. Phishing guides computer users to enter their information on a fake website that looks just like the real website. Types of Phishing: • Whaling • Clone Phishing • Spear Phishing
  • 27. Trojan Horses can: • Retrieve passwords or credit card information • Install damaging software • Download or upload files on anyone’s computer • Delete files • Watch the computer user's screen • Crash the computer
  • 28. Worms A computer worm is a damaging computer program that duplicates itself in order to spread to other computers through the computer network. Some worms have been created with good intentions.
  • 29. Ways to keep your computer safe: Make sure that your computer has an antivirus program installed. Never download anything off the internet without a parent’s permission.
  • 30. References Doering, A. H., & Roblyer, M. D. (2010). Integrating educational technology into teaching. (5 ed., pp. 217-222). Boston, MA: Pearson Education, Inc. http://www.wikipedia.org/ http://www.surfnetparents.com www.brainpop.com http://networketiquette.net/ http://fairuse.stanford.edu http://www.educationworld.com http://www.plagiarism.org/ http://learn-the-ropes.wikispaces.com/Digital+Citizenship http://educationaltechnology.ca