SlideShare a Scribd company logo
1 of 15
   Appropriate and responsible behavior with technology use
   Too often we are seeing students as well as adults misusing
    and abusing technology but not sure what to do.
    The issue is more than what the users do not know but what
    is considered appropriate technology usage.
   The topic of digital citizenship is certainly gaining momentum
    not only in the United States but around the world.
    Whether the it is called digital citizenship, digital wellness or
    digital ethics the issues are the same; how should we act
    when we are online, and what should be taught to the next
    generation is extremely important
   Etiquette: electronic         Security: electronic
    standards of conduct           precautions to
    or procedure                   guarantee safety
   Communication:                Literacy: process of
    electronic exchange            teaching and learning
    of information
                                   about technology and
   Access: full electronic        the use of technology
    participation in society
   Commerce: electronic          Law: electronic
    buying and selling of          responsibility for actions
    goods                          and deeds
   Health & Wellness:            Rights & Responsibilities:
    physical and                   those freedoms
    psychological well-            extended to everyone in
    being in a digital             a digital world
    technology world
   Typing tends to go faster for adept keyboard users,
    which many youngsters have become since they
    have essentially grown up with computers in the
    household
   This makes note taking easier. When notes and
    assignments are saved to a computer, there’s less
    likelihood of them getting lost, especially if important
    files are routinely backed up
   Data saved on a computer can easily be
    manipulated into a number of different formats,
    potentially making it easier to study
   Bodies of text can be transformed into charts or pie
    graphs with many word processing programs.
    Students can cut and paste important quotes or
    examples into essays and the like, saving time on
    homework
   The decline of penmanship is one of them
   In a digital era, people are less likely to write letters by hand or
    keep up with penmanship in other ways. Some children don’t
    know what cursive handwriting is and may never learn how to
    sign their names in “script,” which was a common lesson for
    other generations
   While digital communication does promote social interactions
    on some levels, there are some who argue that spending too
    much time staring at a screen and keyboard compromises the
    social aspect of going to school and learning in a classroom.
    Today’s youth are less likely to “talk,” choosing to “LOL” and
    “TTYL” through texting
   Digital devices may be great learning tools, but they also offer a
    number of distractions to students. When a student is supposed
    to be taking notes on a laptop in the classroom, he or she might
    be downloading music, updating social networking sites,
    streaming video, or checking celebrity gossip
   Appropriate behavior and conduct while using the
    internet and other digital tools
   Forward-thinking schools make netiquette the
    student's Internet hall pass. Here are some of the
    basics:
   Don't SHOUT in all caps
   Remember: The person on the other end of a digital
    communication can't see your expression or hear
    your tone of voice
   Cool off before responding to messages in anger
   Check messages for misspellings or misstatements
   Respect others' privacy and your own (for
    example, don't give your number to that new
    MySpace friend)
   Use a clear and understandable email subject
    line
   Adjust your tone and style to the situation (for
    example, don't use IM-speak or all lowercase
    letters in an internship application)
   Don't forward private messages to people they
    weren't intended for or copy others on replies
    to personal messages
   Remember: Email is never really private and a
    copy may exist in cyberspace . . . forever
   Keep your password secure by keeping it to yourself
   Have more than one
   Make it easy to remember but difficult to figure out
   A strong password
   Is at least eight characters long
   Does not contain your user name, real name, or
    company name
   Does not contain a complete word
   Is significantly different from previous passwords
   Contains characters from each of the following four
    categories
Character category                Examples
Uppercase letters                 A, B, C
Lowercase letters                 a, b, c
Numbers                           0, 1, 2, 3, 4, 5, 6, 7, 8, 9
Symbols found on the
keyboard (all
                                  `~!@#$%^&*()_
keyboard characters
                                  -+={}[]|:;"'<>,
not defined as letters
                                  .?/
or numerals) and
spaces


    A password might meet all the criteria above
     and still be a weak password. For example,
     Hello2U! meets all the criteria for a strong
     password listed above, but is still weak
     because it contains a complete word. H3ll0 2
     U! is a stronger alternative because it
     replaces some of the letters in the complete
     word with numbers and also includes spaces.
   Create an acronym from an easy-to-remember
    piece of information
       For example, pick a phrase that is meaningful to you, such
        as My son's birthday is 12 December, 2004. Using that
        phrase as your guide, you might use Msbi12/Dec,4 for your
        password
   Substitute numbers, symbols, and misspellings for
    letters or words in an easy-to-remember phrase
        For example, My son's birthday is 12 December, 2004
        could become Mi$un's Brthd8iz 12124 (it's OK to use
        spaces in your password)
   Relate your password to a favorite hobby or sport.
    For example, I love to play badminton could
    become ILuv2PlayB@dm1nt()n.
   Cyber bullying" is when a child, preteen or
    teen is tormented, threatened, harassed,
    humiliated, embarrassed or otherwise
    targeted by another child, preteen or teen
    using the Internet, interactive and digital
    technologies or mobile phones.
   It has to have a minor on both sides, or at
    least have been instigated by a minor
    against another minor.
   Once adults become involved, it is plain
    and simple cyber-harassment or cyber
    stalking. Adult cyber-harassment or cyber
    stalking is NEVER called cyber bullying.
   There are two kinds of cyber bullying
   Direct attacks (messages sent to kids
    directly)
   Cyber bullying by proxy (using others to help
    cyber bully the victim, either with or without
    the accomplice's knowledge)
   Because cyber bullying by proxy often gets
    adults involved in the harassment, it is much
    more dangerous.
   Preventing cyber bullying
     › Educating the kids about the consequences helps. Teaching
       them to respect others and to take a stand against bullying of all
       kinds helps too.
     › Think about what you are doing to someone and think would
       you want that done to you?

   What is the school's role in this? 
    When schools try and get involved by disciplining the student for
    cyber bullying actions that took place off-campus and outside of
    school hours, they are often sued for exceeding their authority and
    violating the student's free speech right.

   What's the parents' role in this?
    Parents need to be the one their kids can go when things go wrong
    online and offline. Yet they often are the one place kids avoid when
    things go wrong online.
Cameron was beautiful. Here's her story:

Cameron liked a senior
boy, and his girlfriend didn't like that.She texted Cameron saying
   "go kill yourself" multiple times. Finally,She couldn't take it
 anymore. Cameron ended up hanging herself in her closet. I
   miss her, and I hope that none of you will ever have to go
 through what my school and I did after her death. I love you
             Cameron. May you forever rest in peace.
   http:

//www.stopcyberbullying.org/preventi
    on/index.html
   http:

//windows.microsoft.com/en-
    US/windows-vista/Tips-for-creating-a-strong-
    password
   http:

//specialsections.suntimes.com/educa
    tion/prek12/7931047-555/pros-and-cons-to-
    learning-in-a-digital-age.html
   http:

//www.edutopia.org/whats-next-2008-
    netiquette-guidelines
   http:

//www.digitalcitizenship.net/Nine_Elem
    ents.html

More Related Content

What's hot

DIGITAL LITERACY Steps to Becoming a Digital Citizen
DIGITAL LITERACY Steps to Becoming a Digital CitizenDIGITAL LITERACY Steps to Becoming a Digital Citizen
DIGITAL LITERACY Steps to Becoming a Digital CitizenCarla Hayes
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship13amd
 
Characteristics of Digital Communication
Characteristics of Digital CommunicationCharacteristics of Digital Communication
Characteristics of Digital Communicationsakdeewik
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
CyberbullyingspecR Smith
 
Internet communication
Internet communicationInternet communication
Internet communicationKarwan Jacksi
 
Modern communication
Modern communicationModern communication
Modern communicationIrina K
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
CyberbullyingspecR Smith
 
Implications of Cyber Communication
Implications of Cyber Communication Implications of Cyber Communication
Implications of Cyber Communication Maqsood Ahmad
 
Compare contrast essay final
Compare contrast essay finalCompare contrast essay final
Compare contrast essay finalDonna Layne
 
Robs Power Point
Robs Power PointRobs Power Point
Robs Power Pointyusko1rj
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525chadolivard
 
Advantages and disantvantages of internet
Advantages and disantvantages of internetAdvantages and disantvantages of internet
Advantages and disantvantages of internetGeorge_Hleb_5
 
Internet as a communication tool - By Jnanam Shah
Internet as a communication tool - By Jnanam ShahInternet as a communication tool - By Jnanam Shah
Internet as a communication tool - By Jnanam ShahSoham
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfBryanSmile
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingmribera87
 

What's hot (20)

Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
DIGITAL LITERACY Steps to Becoming a Digital Citizen
DIGITAL LITERACY Steps to Becoming a Digital CitizenDIGITAL LITERACY Steps to Becoming a Digital Citizen
DIGITAL LITERACY Steps to Becoming a Digital Citizen
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Final reflection digital citizenship
Final reflection digital citizenshipFinal reflection digital citizenship
Final reflection digital citizenship
 
Characteristics of Digital Communication
Characteristics of Digital CommunicationCharacteristics of Digital Communication
Characteristics of Digital Communication
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Internet communication
Internet communicationInternet communication
Internet communication
 
Hamad Rabban.It
Hamad Rabban.ItHamad Rabban.It
Hamad Rabban.It
 
Modern communication
Modern communicationModern communication
Modern communication
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Implications of Cyber Communication
Implications of Cyber Communication Implications of Cyber Communication
Implications of Cyber Communication
 
Compare contrast essay final
Compare contrast essay finalCompare contrast essay final
Compare contrast essay final
 
Robs Power Point
Robs Power PointRobs Power Point
Robs Power Point
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
Advantages and disantvantages of internet
Advantages and disantvantages of internetAdvantages and disantvantages of internet
Advantages and disantvantages of internet
 
Internet as a communication tool - By Jnanam Shah
Internet as a communication tool - By Jnanam ShahInternet as a communication tool - By Jnanam Shah
Internet as a communication tool - By Jnanam Shah
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Viewers also liked

Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipaehorton0
 
Building a safer presence on the web
Building a safer presence on the webBuilding a safer presence on the web
Building a safer presence on the webjhollatz
 
Digital citizenship for Enabling e-Learning
Digital citizenship for Enabling e-LearningDigital citizenship for Enabling e-Learning
Digital citizenship for Enabling e-Learningtessagray
 
7 Principles Business Leadership
7 Principles Business Leadership7 Principles Business Leadership
7 Principles Business LeadershipDeborah Battersby
 
Professional Learning Communities Findings
Professional Learning Communities FindingsProfessional Learning Communities Findings
Professional Learning Communities Findingstessagray
 

Viewers also liked (7)

Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Building a safer presence on the web
Building a safer presence on the webBuilding a safer presence on the web
Building a safer presence on the web
 
Digital citizenship for Enabling e-Learning
Digital citizenship for Enabling e-LearningDigital citizenship for Enabling e-Learning
Digital citizenship for Enabling e-Learning
 
7 Principles Business Leadership
7 Principles Business Leadership7 Principles Business Leadership
7 Principles Business Leadership
 
Professional Learning Communities Findings
Professional Learning Communities FindingsProfessional Learning Communities Findings
Professional Learning Communities Findings
 
Case Study
Case StudyCase Study
Case Study
 
Conjunt Reductor
Conjunt ReductorConjunt Reductor
Conjunt Reductor
 

Similar to Digitalcitizenship

Alexandria School District - 21st Century Literacy
Alexandria School District - 21st Century LiteracyAlexandria School District - 21st Century Literacy
Alexandria School District - 21st Century LiteracyBarry Dahl
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingpscl
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipKermit Agbas
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette13sh
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette13sh
 
Etiquette in the Digital World
Etiquette in the Digital WorldEtiquette in the Digital World
Etiquette in the Digital Worldmgastgoodman
 
Internet 1 lesson plan
Internet 1 lesson planInternet 1 lesson plan
Internet 1 lesson planQuennith
 
Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1Quennith
 
eSmart Cybersafety
eSmart CybersafetyeSmart Cybersafety
eSmart Cybersafetytekwire
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 
Keeping Students Safe Online - NuEduSec
Keeping Students Safe Online - NuEduSecKeeping Students Safe Online - NuEduSec
Keeping Students Safe Online - NuEduSecprincemathew685
 
Sample Essay For Fellowship Applications
Sample Essay For Fellowship ApplicationsSample Essay For Fellowship Applications
Sample Essay For Fellowship ApplicationsHeather Hughes
 
Web 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesWeb 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesFrances Harris
 

Similar to Digitalcitizenship (15)

Alexandria School District - 21st Century Literacy
Alexandria School District - 21st Century LiteracyAlexandria School District - 21st Century Literacy
Alexandria School District - 21st Century Literacy
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Hungerfordnetiquette
HungerfordnetiquetteHungerfordnetiquette
Hungerfordnetiquette
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
Etiquette in the Digital World
Etiquette in the Digital WorldEtiquette in the Digital World
Etiquette in the Digital World
 
Internet 1 lesson plan
Internet 1 lesson planInternet 1 lesson plan
Internet 1 lesson plan
 
Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1
 
ETECH Q1 Wk2.pptx
ETECH Q1 Wk2.pptxETECH Q1 Wk2.pptx
ETECH Q1 Wk2.pptx
 
eSmart Cybersafety
eSmart CybersafetyeSmart Cybersafety
eSmart Cybersafety
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
Keeping Students Safe Online - NuEduSec
Keeping Students Safe Online - NuEduSecKeeping Students Safe Online - NuEduSec
Keeping Students Safe Online - NuEduSec
 
Sample Essay For Fellowship Applications
Sample Essay For Fellowship ApplicationsSample Essay For Fellowship Applications
Sample Essay For Fellowship Applications
 
Web 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesWeb 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected Consequences
 

Digitalcitizenship

  • 1.
  • 2. Appropriate and responsible behavior with technology use  Too often we are seeing students as well as adults misusing and abusing technology but not sure what to do.  The issue is more than what the users do not know but what is considered appropriate technology usage.  The topic of digital citizenship is certainly gaining momentum not only in the United States but around the world.  Whether the it is called digital citizenship, digital wellness or digital ethics the issues are the same; how should we act when we are online, and what should be taught to the next generation is extremely important
  • 3. Etiquette: electronic  Security: electronic standards of conduct precautions to or procedure guarantee safety  Communication:  Literacy: process of electronic exchange teaching and learning of information about technology and  Access: full electronic the use of technology participation in society  Commerce: electronic  Law: electronic buying and selling of responsibility for actions goods and deeds  Health & Wellness:  Rights & Responsibilities: physical and those freedoms psychological well- extended to everyone in being in a digital a digital world technology world
  • 4. Typing tends to go faster for adept keyboard users, which many youngsters have become since they have essentially grown up with computers in the household  This makes note taking easier. When notes and assignments are saved to a computer, there’s less likelihood of them getting lost, especially if important files are routinely backed up  Data saved on a computer can easily be manipulated into a number of different formats, potentially making it easier to study  Bodies of text can be transformed into charts or pie graphs with many word processing programs. Students can cut and paste important quotes or examples into essays and the like, saving time on homework
  • 5. The decline of penmanship is one of them  In a digital era, people are less likely to write letters by hand or keep up with penmanship in other ways. Some children don’t know what cursive handwriting is and may never learn how to sign their names in “script,” which was a common lesson for other generations  While digital communication does promote social interactions on some levels, there are some who argue that spending too much time staring at a screen and keyboard compromises the social aspect of going to school and learning in a classroom. Today’s youth are less likely to “talk,” choosing to “LOL” and “TTYL” through texting  Digital devices may be great learning tools, but they also offer a number of distractions to students. When a student is supposed to be taking notes on a laptop in the classroom, he or she might be downloading music, updating social networking sites, streaming video, or checking celebrity gossip
  • 6. Appropriate behavior and conduct while using the internet and other digital tools  Forward-thinking schools make netiquette the student's Internet hall pass. Here are some of the basics:  Don't SHOUT in all caps  Remember: The person on the other end of a digital communication can't see your expression or hear your tone of voice  Cool off before responding to messages in anger  Check messages for misspellings or misstatements
  • 7. Respect others' privacy and your own (for example, don't give your number to that new MySpace friend)  Use a clear and understandable email subject line  Adjust your tone and style to the situation (for example, don't use IM-speak or all lowercase letters in an internship application)  Don't forward private messages to people they weren't intended for or copy others on replies to personal messages  Remember: Email is never really private and a copy may exist in cyberspace . . . forever
  • 8. Keep your password secure by keeping it to yourself  Have more than one  Make it easy to remember but difficult to figure out  A strong password  Is at least eight characters long  Does not contain your user name, real name, or company name  Does not contain a complete word  Is significantly different from previous passwords  Contains characters from each of the following four categories
  • 9. Character category Examples Uppercase letters A, B, C Lowercase letters a, b, c Numbers 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 Symbols found on the keyboard (all `~!@#$%^&*()_ keyboard characters -+={}[]|:;"'<>, not defined as letters .?/ or numerals) and spaces  A password might meet all the criteria above and still be a weak password. For example, Hello2U! meets all the criteria for a strong password listed above, but is still weak because it contains a complete word. H3ll0 2 U! is a stronger alternative because it replaces some of the letters in the complete word with numbers and also includes spaces.
  • 10. Create an acronym from an easy-to-remember piece of information  For example, pick a phrase that is meaningful to you, such as My son's birthday is 12 December, 2004. Using that phrase as your guide, you might use Msbi12/Dec,4 for your password  Substitute numbers, symbols, and misspellings for letters or words in an easy-to-remember phrase  For example, My son's birthday is 12 December, 2004 could become Mi$un's Brthd8iz 12124 (it's OK to use spaces in your password)  Relate your password to a favorite hobby or sport. For example, I love to play badminton could become ILuv2PlayB@dm1nt()n.
  • 11. Cyber bullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones.  It has to have a minor on both sides, or at least have been instigated by a minor against another minor.  Once adults become involved, it is plain and simple cyber-harassment or cyber stalking. Adult cyber-harassment or cyber stalking is NEVER called cyber bullying.
  • 12. There are two kinds of cyber bullying  Direct attacks (messages sent to kids directly)  Cyber bullying by proxy (using others to help cyber bully the victim, either with or without the accomplice's knowledge)  Because cyber bullying by proxy often gets adults involved in the harassment, it is much more dangerous.
  • 13. Preventing cyber bullying › Educating the kids about the consequences helps. Teaching them to respect others and to take a stand against bullying of all kinds helps too. › Think about what you are doing to someone and think would you want that done to you?  What is the school's role in this?  When schools try and get involved by disciplining the student for cyber bullying actions that took place off-campus and outside of school hours, they are often sued for exceeding their authority and violating the student's free speech right.  What's the parents' role in this? Parents need to be the one their kids can go when things go wrong online and offline. Yet they often are the one place kids avoid when things go wrong online.
  • 14. Cameron was beautiful. Here's her story:

Cameron liked a senior boy, and his girlfriend didn't like that.She texted Cameron saying "go kill yourself" multiple times. Finally,She couldn't take it anymore. Cameron ended up hanging herself in her closet. I miss her, and I hope that none of you will ever have to go through what my school and I did after her death. I love you Cameron. May you forever rest in peace.
  • 15. http:

//www.stopcyberbullying.org/preventi on/index.html  http:

//windows.microsoft.com/en- US/windows-vista/Tips-for-creating-a-strong- password  http:

//specialsections.suntimes.com/educa tion/prek12/7931047-555/pros-and-cons-to- learning-in-a-digital-age.html  http:

//www.edutopia.org/whats-next-2008- netiquette-guidelines  http:

//www.digitalcitizenship.net/Nine_Elem ents.html