Digital Intelligence (DQ) is a comprehensive set of technical, cognitive, meta-cognitive, and socio-emotional competencies grounded in universal moral values that enable individuals to face the challenges of digital life and adapt to its demands. Thus, individuals equipped with DQ become wise, competent, and future-ready digital citizens who successfully use, control, and create technology to enhance humanity.
Digital Intelligence (DQ) is a comprehensive set of technical, cognitive, meta-cognitive, and socio-emotional competencies grounded in universal moral values that enable individuals to face the challenges of digital life and adapt to its demands. Thus, individuals equipped with DQ become wise, competent, and future-ready digital citizens who successfully use, control, and create technology to enhance humanity.
In these slides, I explore the concept of "interaction literacy," a potential framework for clarifying the elements of multi-mediated, participatory forms of experience. Offering a model for further development, the presentation explores how insights into the elements of human experience can be used to create new design processes.
See slide notes below for transcript.
[Slides presented at SXSW on March 10, 2013.]
2nd International Open Digital Rights Language Workshop,
Lisbon, Portugal, July 2005.
Scholarly Paper available at
http://odrl.net/workshop2005/program/paper-schull.pdf
Jonathan Schull shared his long-standing knowledge about the evolution of digital goods, i.e. the virtualisation of the world and his visions for the future. He makes the very striking connection between the virtualisation of money and now, a few years later, the virtualisation of digital goods or information products.
From his experience of the early days of superdistribution and the observation how digital rights management technology has evolved, today he encourages distribution of content and copying of content rather than locking it in with strong security means, such as some of the current DRM technology. This approach keeps customers away from digital goods, Schull stated. He suggests to track superdistribution activities and to reward users who actively redistribute content, a concept that the OMA Version 2.0 specification already offers. He also sees the need to formulate rights that are valid downstream, i.e. rights that apply to the customer’s customer. The ODRL Version 2.0 model allows for such downstream rights with the “Next Rights” concept and thus, it seems the technical means are available for a slightly different approach to DRM.
Gifts of Technology in a Gifted Learning EnvironmentTracie Hightower
The investment placed towards the integration of technology is oftened questioned. This brief presentation outlines the potential for gifted learning environments to benefit from its adoption.
Digital literacy Skills presentation repairajacobo729
Digital literacy skills encompass a broad range of abilities and knowledge that enable individuals to effectively navigate, understand, and utilize digital technologies and the digital landscape. These skills are essential in today's increasingly digital world, where technology plays a significant role in various aspects of our lives, including education, work, communication, and entertainment. Here is a more detailed description of some key digital literacy skills:
1. Basic Computer Skills: Basic computer skills entail having a fundamental understanding of computer hardware, software, and operating systems. This includes knowing how to use input devices such as keyboards and mice, navigating through different software applications, managing files and folders, and performing basic troubleshooting.
2. Internet Navigation: Internet navigation skills involve the ability to effectively use web browsers to explore and navigate the online world. This includes understanding URL structures, using search engines to find information, evaluating search results for relevance and credibility, and efficiently moving between websites and web pages.
3. Information Evaluation: Digital literacy includes the ability to critically evaluate and assess the quality, credibility, and relevance of information found online. This skill is crucial in an era of abundant information, as it enables individuals to distinguish between reliable sources and misinformation. It involves evaluating the credibility of sources, recognizing bias, verifying facts, and discerning between reliable information and false or misleading content.
4. Online Communication: Online communication skills encompass the ability to effectively communicate and interact with others through digital platforms. This includes writing clear and concise emails, using appropriate language and tone in online discussions and messaging, understanding netiquette (online etiquette), and utilizing various communication tools such as instant messaging, video conferencing, and social media platforms.
5. Digital Security: Digital literacy involves knowledge and skills related to online security practices to protect personal information and digital devices. This includes understanding the importance of creating strong and unique passwords, using two-factor authentication, recognizing and avoiding phishing attempts and other online scams, understanding the significance of software updates and antivirus protection, and being mindful of privacy settings on digital platforms.
6. Digital Privacy: Digital privacy skills involve understanding and managing one's digital footprint and personal information online. This includes being aware of data collection practices by websites and online services, understanding the implications of sharing personal information, and knowing how to protect and manage privacy settings on social media platforms and other online accounts.
7. Digital Citizenship: Digital literacy includes being a re
In these slides, I explore the concept of "interaction literacy," a potential framework for clarifying the elements of multi-mediated, participatory forms of experience. Offering a model for further development, the presentation explores how insights into the elements of human experience can be used to create new design processes.
See slide notes below for transcript.
[Slides presented at SXSW on March 10, 2013.]
2nd International Open Digital Rights Language Workshop,
Lisbon, Portugal, July 2005.
Scholarly Paper available at
http://odrl.net/workshop2005/program/paper-schull.pdf
Jonathan Schull shared his long-standing knowledge about the evolution of digital goods, i.e. the virtualisation of the world and his visions for the future. He makes the very striking connection between the virtualisation of money and now, a few years later, the virtualisation of digital goods or information products.
From his experience of the early days of superdistribution and the observation how digital rights management technology has evolved, today he encourages distribution of content and copying of content rather than locking it in with strong security means, such as some of the current DRM technology. This approach keeps customers away from digital goods, Schull stated. He suggests to track superdistribution activities and to reward users who actively redistribute content, a concept that the OMA Version 2.0 specification already offers. He also sees the need to formulate rights that are valid downstream, i.e. rights that apply to the customer’s customer. The ODRL Version 2.0 model allows for such downstream rights with the “Next Rights” concept and thus, it seems the technical means are available for a slightly different approach to DRM.
Gifts of Technology in a Gifted Learning EnvironmentTracie Hightower
The investment placed towards the integration of technology is oftened questioned. This brief presentation outlines the potential for gifted learning environments to benefit from its adoption.
Digital literacy Skills presentation repairajacobo729
Digital literacy skills encompass a broad range of abilities and knowledge that enable individuals to effectively navigate, understand, and utilize digital technologies and the digital landscape. These skills are essential in today's increasingly digital world, where technology plays a significant role in various aspects of our lives, including education, work, communication, and entertainment. Here is a more detailed description of some key digital literacy skills:
1. Basic Computer Skills: Basic computer skills entail having a fundamental understanding of computer hardware, software, and operating systems. This includes knowing how to use input devices such as keyboards and mice, navigating through different software applications, managing files and folders, and performing basic troubleshooting.
2. Internet Navigation: Internet navigation skills involve the ability to effectively use web browsers to explore and navigate the online world. This includes understanding URL structures, using search engines to find information, evaluating search results for relevance and credibility, and efficiently moving between websites and web pages.
3. Information Evaluation: Digital literacy includes the ability to critically evaluate and assess the quality, credibility, and relevance of information found online. This skill is crucial in an era of abundant information, as it enables individuals to distinguish between reliable sources and misinformation. It involves evaluating the credibility of sources, recognizing bias, verifying facts, and discerning between reliable information and false or misleading content.
4. Online Communication: Online communication skills encompass the ability to effectively communicate and interact with others through digital platforms. This includes writing clear and concise emails, using appropriate language and tone in online discussions and messaging, understanding netiquette (online etiquette), and utilizing various communication tools such as instant messaging, video conferencing, and social media platforms.
5. Digital Security: Digital literacy involves knowledge and skills related to online security practices to protect personal information and digital devices. This includes understanding the importance of creating strong and unique passwords, using two-factor authentication, recognizing and avoiding phishing attempts and other online scams, understanding the significance of software updates and antivirus protection, and being mindful of privacy settings on digital platforms.
6. Digital Privacy: Digital privacy skills involve understanding and managing one's digital footprint and personal information online. This includes being aware of data collection practices by websites and online services, understanding the implications of sharing personal information, and knowing how to protect and manage privacy settings on social media platforms and other online accounts.
7. Digital Citizenship: Digital literacy includes being a re
This deck was prepared for the 1st and 2nd cohort of the "Road to 4IR" program, initiated by EMK center in collation with 'Birshreshtha Munshi Abdur Rouf Public College'. The major attractions of both of the cohorts were, all the students/attendee of the program was from Class-07. 1st cohort was for all girls and 2nd cohort was for the all-boys batch. The session took place on 27th June, 2021.
This 'Intro to Digital Citizenship' was the 2nd class of the program. In this class, the students were able to learn different terminologies and uses of digital technologies for ensuring appropriate cybersecurity and self-defense from cyber-bullying.
The presentation on principal and learning paradigm in learning and teaching. The presentation covers the demographic of generation and complexity of current world. It also illustrate the digital intelligence.
Digital Literacy Skills in the 21st Century from the book
TECHNOLOGY FOR TEACHING AND LEARNING I BOOK
COPYRIGHT 2019
BY: PURITA P. BILBAO, ED D
MA. ASUNCION CHRISTINE V. DEQUILLA, PHD
DAISY A. ROSANO, PHD
HELEN B. BOHOLANO, LIB, ED D
An introductory presentation for the Council of Europe INGOs introducing the transversal workig group called Digital Citizen. The group will deal with Education, Humand Rights and Democracy using a forward looking approach to policy making.
Penetration testing reporting and methodologyRashad Aliyev
This paper covering information about Penetration testing methodology, standards reporting formats and comparing reports. Explained problem of Cyber Security experts when they making penetration tests. How they doing current presentations.
We will focus our work in penetration testing methodology reporting form and detailed information how to compare result and related work information.
There are more and more vulnerabilities in database of computer system about weakness of software technology. Not all of them are major or most important. Our goal in this paper is to analyze a selected four major vulnerability databases that are the most important and their collect more than 230000 vulnerabilities. In this analysis we compare databases by the number of the vulnerabilities and the CVEs implemented, to find the best vulnerability databases. From those selected vulnerability databases we have got information about the vulnerabilities and applying those details to our work in penetration tests for doing reports.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
3. IQ, EQ və DQ
• IQ – Sən nə qədər ağıllısan?
Sizin ağıllı olduğunuzu göstərmək üçün müəyyən
standart testlər.
- intelligence quotient (коэффициент )
- Zəka əmsalı
https://www.procurious.com/procurement-news/iq-eq-dq-or-smq-which-quotient-leads-to-success-at-work
4. IQ, EQ və DQ
• Ağıllı olmağın hərşey deyil
- EQ (emotional quotient)
- Digərlərini anlama, emosiyaları, motivasiyaları, tanımaq və s.
- Emosiyaları idarə etmək
5. DQ nədir, yaranması
• Rəqəmsal zəka - İnsanların rəqəmsal dünyaya
adaptasiya edilməsi üçün sosial, emosional və
idraki bacarıqlarının düzgün istifadəsidir.
• Rəqəmsal texnologiyaların düzgün istifadəsi
• İlk dəfə Digital Intelligence Quotient (DQ)
Konsepsiyası və Strukturu 2016-cı ildə Dünya
İqtisadi Forumunda təqdim edilmişdir.
6. DQ mərhələ və sahələri
• Hər biri 8 sahədən ibarət olan 3 mərhələ.
– Rəqəmsal vətəndaşlıq (Digital Citizenship)
– Rəqəmsal kreativlik (Digital Creativity)
– Rəqəmsal rəqabətlik (Digital Competitiveness)
7. Rəqəmsal vətəndaşlıq
Digital Citizenship
• Rəqəmsal texnologiyaların və medianın effektiv, təhlükəsiz və məsuliyyətlə istifadəsi
bacarıqlarıdır.
Sahələri
• Rəqəmsal İdentifikasiya (Digital Identity) - Digital Citizen Identity
The ability to build and manage a healthy identity as a digital citizen with integrity.
• Rəqəmsal İstifadə (Digital Use) - Balanced Use of Technology
The ability to manage one’s life both online and offline in a balanced way by exercising self-control
to manage screen time, multitasking, and one’s engagement with digital media and devices.
• Rəqəmsal Etibarlılıq (Digital Safety) - Behavioural Cyber-Risk Management
The ability to identify, mitigate, and manage cyber risks (e.g., cyberbullying, harassment, and
stalking) that relate to personal online behaviors.
• Rəqəmsal Təhlükəsizlik (Digital Security) - Personal Cyber Security Management
The ability to detect cyber threats (e.g., hacking, scams, and malware) against personal data and
device, and to use suitable security strategies and protection tools.
• Rəqəmsal Emosional zəka (Digital Emotional Intelligence) - Digital Empathy
The ability to be aware of, be sensitive to, and be supportive of one’s own and other’s feelings,
needs and concerns online.
• Rəqəmsal Kommunikasiya (Digital Communication) - Digital Footprint Management
The ability to understand the nature of digital footprints and their real-life consequences, to
manage them responsibly, and to actively build a positive digital reputation.
• Rəqəmsal Savadlılıq (Digital Literacy) - Media and Information Literacy
The ability to find, organize, analyze, and evaluate media and information with critical reasoning.
• Rəqəmsal Hüquqlar (Digital Rights) - Privacy Management
The ability to handle with discretion all personal information shared online to protect one’s and
others’ privacy.
8. Rəqəmsal kreativlik
Digital Creativity
• İdeaların reallaşması üçün yeni məzmun, texnoji həllər və biliklər yaradaraq rəqəmsal
ekosistemin bir hissəsi olmaq bacarıqları.
Sahələri
• Rəqəmsal İdentifikasiya (Digital Identity) - Digital Co-Creator Identity
The ability to identify and develop oneself as a co-creator of the digital ecosystem.
• Rəqəmsal İstifadə (Digital Use) - Healthy Use of Technology
The ability to understand the benefits and harms of technology on one’s mental and physical
health and to use technology use while prioritizing health and well-being.
• Rəqəmsal Etibarlılıq (Digital Safety) - Content Cyber-Risk Management
The ability to identify, mitigate, and manage content cyber risks online (e.g., harmful
usergenerated content, racist/hateful content, image-based abuse).
• Rəqəmsal Təhlükəsizlik (Digital Security) - Network Security Management
The ability to detect, avoid, and manage cyber-threats to cloud-based collaborative digital
environments.
• Rəqəmsal Emosional zəka (Digital Emotional Intelligence) - Self-Awareness and Management
The ability to recognize and manage how one’s value system and digital competencies fits with
one’s digital environment.
• Rəqəmsal Kommunikasiya (Digital Communication) - Online Communication and Collaboration
The ability to use technology effectively to communicate and collaborate collectively, including at a
distance.
• Rəqəmsal Savadlılıq (Digital Literacy) - Content Creation and Computational Literacy
The ability to synthesise, create, and produce information, media, and technology in an innovative
and creative manner.
• Rəqəmsal Hüquqlar (Digital Rights) - Intellectual Property Rights Management
The ability to understand and manage intellectual property rights (e.g., copyrights, trademarks,
and patents) when using and creating content and technology.
9. Rəqəmsal rəqabətlik
Digital Competitiveness
• Qlobal problemlərin həlli üçün rəqəmsal texnologiya və medianın istifadəsi isə yeni,
innovativ həllər yaratmaq bacarıqları.
Sahələri
• Rəqəmsal İdentifikasiya (Digital Identity) - Digital Changemaker Identity
The ability to identify and develop oneself as a competent changemaker in the digital economy.
• Rəqəmsal İstifadə (Digital Use) - Civic Use of Technology
The ability to engage in civic participation for the well-being and growth of local, national, and
global communities using technology.
• Rəqəmsal Etibarlılıq (Digital Safety) - Commercial and Community Cyber-Risk Management
The ability to understand, mitigate, and manage commercial or community cyber-risks online,
which is an organisational attempt to exploit individuals financially and/or through ideological persuasion (e.g.,
embedded marketing, online propaganda, and gambling).
• Rəqəmsal Təhlükəsizlik (Digital Security) - Organisational Cyber Security Management
The ability to recognise, plan, and implement organisational cyber security defences.
• Rəqəmsal Emosional zəka (Digital Emotional Intelligence) - Relationship Management
The ability to skilfully manage one’s online relationships through collaboration, conflict
management, and persuasion.
• Rəqəmsal Kommunikasiya (Digital Communication) - Public and Mass Communication
The ability to communicate with an online audience effectively to exchange messages, ideas, and
opinions reflecting wider business or societal discourses.
• Rəqəmsal Savadlılıq (Digital Literacy) - Data and AI Literacy
The ability to generate, process, analyze, present meaningful information from data and develop,
use, and apply artificial intelligence (AI) and related algorithmic tools and strategies in order to guide informed,
optimized, and contextually relevant decision-making processes.
• Rəqəmsal Hüquqlar (Digital Rights) - Participatory Rights Management
The ability to understand and exercise one’s powers and right to online participation (e.g., their
rights to personal data protection, freedom of expression, or to be forgotten).
10. DQ
• DQ Day
10 Oktyabr 2019 (IEEE SA)
• DQ Every Child (#DQEveryChild)
8+ yaşı uşaqların rəqəmsal vətəndaşlıq
biliklərinin gücləndirilməsi üçün planlaşdırılıb.
11. #DQEveryChild (DQ World)
Topic 1 – Screen Time Management
• Able to balance between the physical and virtual realities.
• Has the self-control to use digital technology and understands the various
excessive screen time, multi-tasking and addictive usage of digital media.
• Able to manage time and set limits on personal digital use; does not allow
take over his/her life.
Topic 2 – Privacy Management
•Has the knowledge and skills to handle personal information shared
online with discretion.
•Ensures and protects the privacy for self and his contacts.
•Aware that privacy is a basic human right.
Topic 3 – Cyber Bullying Management
•Has the personal discipline to use digital media safely and responsibly.
•Knows how to detect a cyber bullying situation and how to handle the
situation calmly.
•Knows how to handle a problem with wisdom and safely seek help
before it goes out of control.
12. #DQEveryChild (DQ World)
Topic 4 – Digital Citizen Identity
•Understands the nature of the digital world; uses digital technologies and
proficiency.
•Has the knowledge and skills to build and manage a healthy congruent
offline identities with self-efficacy.
•Aware of global citizenship in the digital space (as the digital world is
Topic 5 – Digital Footprint Management
•Understands the nature of online communication.
•Knows that everything he/she says and does online leaves trails called
digital footprints.
•Aware of the persistent nature of the digital footprints and their real-life
consequences, including creating unintended online reputation.
•Has the skills to manage digital footprints responsibly; aware of the
short- and long-term impact of his/her digital footprints.
Topic 6 – Cyber Security Management
•Is able to spot and protect oneself and others from various cyber
attacks such as spam, scams and phishing.
•Has practical skills such as creating strong passwords and keeping them
confidential.
13. #DQEveryChild (DQ World)
Topic 7 – Critical Thinking
•Has knowledge and skills to evaluate information, content and contacts
with discernment.
•Understands the harmful effects of false information, violence,
and the risks associated with online strangers.
•Uses critical thinking to distinguish true and false information, good and
content, and trustworthy and questionable contacts online.
Topic 8 – Digital Empathy
•Sensitive to the needs and feelings of self and others when online, even
without face-to-face interaction.
•Willing to lend a voice to those who need help and to speak out for
them.
•Not easily judgemental online and not swayed by online herd mentality.
•Builds good relationships with parents, teachers and friends, both on-
and off-line.
•Keeps communication honest and open with parents, teachers and
friends about his/her digital life.