SlideShare a Scribd company logo
Presented by:
Laverne Hill
Media Specialist
Lowndes High School
With permission from:
Howie DiBlasi
Emerging Technologies Evangelist
Digital Journey
howie@frontier.net
www.drhowie.com
Presentation : 2012
DIGITAL FOOTPRINTS:DIGITAL FOOTPRINTS:
WHAT DOES THAT REALLY MEAN?WHAT DOES THAT REALLY MEAN?
 Students should
understand how to be safe
and responsible online
and how to create a digital
footprint to be proud of
today and tomorrow.
TEN COMMANDMENTS OF COMPUTER ETHICS-(K-5)
USED WITH PERMISSION: COPYRIGHT: COMPUTER ETHICS INSTITUTE AUTHOR: DR. RAMON C. BARQUIN
 1. Thou shalt not use a computer to harm other people.
 2. Thou shalt not interfere with other people's computer work.
 3. Thou shalt not snoop around in other people's files.
 4. Thou shalt not use a computer to steal.
 5. Thou shalt not use a computer to bear false witness.
 6. Thou shalt not copy or use proprietary software for which you
have not paid.
 7. Thou shalt not use other people's computer resources without
authorization or proper compensation.
 8. Thou shalt not appropriate other people's intellectual output.
 9. Thou shall think about the social consequences of the
program you write or the system you design.
 10. Thou shall use a computer in ways that show consideration
of and respect for your fellow humans.
THE HIGH/UNIVERSITY CODE OF ETHICS
 1) I will not use the technology/communication system to
harm, slander, injure or ridicule others.
 2) I will not interfere with others’ use of the technology,
including opening the files of others without their permission.
 3) I will not use the computer to steal.
 4) I will not use the computer to misrepresent my school or
myself.
 5) I will not copy software for which I have not paid.
 6) I will not use equipment without authorization.
 7) I will not copy text or ideas from the technology resources
without permission from the author or referencing source.
 8) I will be responsible for any consequences that arise from
or that are a result of my computing activities.
 9) I will use both the equipment and the programs in ways that show
consideration, care, and respect.
 10) I will be financially responsible and liable for any damages to either
hardware or software resources that result from inappropriate or
abusive behavior.
 11) I will not allow another person to use my logon (ID) and password,
nor will I use anyone else's ID and password.
 12) I will abide by all rules and regulations of the system as changed or
added from time to time by the
 administration.
 13) I will address all concerns regarding the use of technology first to
the supervising teacher and/or school librarian and then to the
administration.
 14) I will use the technology/computer system to further my education
and will share my growing knowledge with others.
 16) I recognize that all students deserve access as conditions permit.
 17) I will not violate the terms and conditions of the Authorization for
Internet Access as stated below.
 18) I will not tamper with or change the computer settings
INTERNET SAFETY
Rules of the Road for Kids
 1. Guard your privacy. What people know about you is up to you.
 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or
edgy today could cost you tomorrow.
 3. Nothing is private online. Anything you say or do can be copied, pasted,
and sent to gazillions of people without your permission.
 4. Assume everyone is watching. There’s a huge, vast audience out there. If
someone is your friend’s friend, they can see everything.
 5. Apply the Golden Rule. If you don’t want it done to you, don’t do it to
someone else.
 6. Watch the clock. A virtual hug never matches a real one. Balance your life.
 7. Choose wisely. Not all content is appropriate. You know what we mean.
 8. Don't hide. Using anonymity to cloak your actions doesn’t turn you into a
trustworthy, responsible human being.
 9. Think about what you see. Just because it’s online doesn’t make it true.
 10. Be smart, be safe. Not everyone is who they say they are. But you know
that.
WHAT IS YOUR DIGITAL FOOTPRINT MOST
LIKE? BY TOM JACKSON
 traces left by your activity in a
digital environment.
 All of us, like it or not, are
creating these trails.
 All kinds of information ABOUT
YOU can be found online.
Digital footprints are…….
 Will it be insignificant
tomorrow, or in five years
when you need to apply for
college or seek new
employment ?.
WHAT DO YOU KNOW ????
 Do you know how long what you put online exists?Do you know how long what you put online exists?
 Do you know what the standard is for appropriateDo you know what the standard is for appropriate
and inappropriate online behavior?and inappropriate online behavior?
 Do you know what a digital footprint means?Do you know what a digital footprint means?
 Do you know how to take steps to have a digitalDo you know how to take steps to have a digital
footprint that you will be proud of today andfootprint that you will be proud of today and
tomorrow too?tomorrow too?
 If whatever you do online can beIf whatever you do online can be
traced back to you and it staystraced back to you and it stays
forever what should you putforever what should you put
online?online?
 Think: Social NetworkingThink: Social Networking

More Related Content

What's hot

ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
mulingoh
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
Erdo Deshiant Garnaby
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
bgmartinez1971
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students
Shubham Gupta
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
SearchLock
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
Larry Magid
 
Being A Responsible Internet User
Being A Responsible Internet UserBeing A Responsible Internet User
Being A Responsible Internet User
eneyland
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
Emmanuel Arthur
 
Angelique s Do Something Project
Angelique s Do Something ProjectAngelique s Do Something Project
Angelique s Do Something Project
jtiggs
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
KanelandSvihlik
 
Eskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ictEskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ict
Anwar Jesus Esperida
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette13sh
 
Being Responsible and Respectful Online
Being Responsible and Respectful OnlineBeing Responsible and Respectful Online
Being Responsible and Respectful Online
emilyatNIS
 
Safer Internet Day PowerPoint
Safer Internet Day PowerPointSafer Internet Day PowerPoint
Safer Internet Day PowerPoint
Webwise
 
Digital citizenship for Elementary Students
Digital citizenship for Elementary StudentsDigital citizenship for Elementary Students
Digital citizenship for Elementary Students
kgilliard13
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
timryan7
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
Larry Magid
 
Etiquette in the Digital World
Etiquette in the Digital WorldEtiquette in the Digital World
Etiquette in the Digital World
mgastgoodman
 

What's hot (20)

ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Internet safety for kids
Internet safety for kidsInternet safety for kids
Internet safety for kids
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
Being A Responsible Internet User
Being A Responsible Internet UserBeing A Responsible Internet User
Being A Responsible Internet User
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
Angelique s Do Something Project
Angelique s Do Something ProjectAngelique s Do Something Project
Angelique s Do Something Project
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
Eskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ictEskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ict
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
Being Responsible and Respectful Online
Being Responsible and Respectful OnlineBeing Responsible and Respectful Online
Being Responsible and Respectful Online
 
Safer Internet Day PowerPoint
Safer Internet Day PowerPointSafer Internet Day PowerPoint
Safer Internet Day PowerPoint
 
Digital citizenship for Elementary Students
Digital citizenship for Elementary StudentsDigital citizenship for Elementary Students
Digital citizenship for Elementary Students
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
 
Y2 l10 esafety
Y2 l10 esafetyY2 l10 esafety
Y2 l10 esafety
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Etiquette in the Digital World
Etiquette in the Digital WorldEtiquette in the Digital World
Etiquette in the Digital World
 

Viewers also liked

Signs & Lines - Expression of Interest - Designer
Signs & Lines - Expression of Interest - DesignerSigns & Lines - Expression of Interest - Designer
Signs & Lines - Expression of Interest - Designer
Josie Simmonds
 
chỉ 307tr sở hữu ngay căn hộ tại trung tâm gò vấp (50%).LH 0915 45 75 39
chỉ 307tr sở hữu ngay căn hộ tại trung tâm gò vấp (50%).LH 0915 45 75 39chỉ 307tr sở hữu ngay căn hộ tại trung tâm gò vấp (50%).LH 0915 45 75 39
chỉ 307tr sở hữu ngay căn hộ tại trung tâm gò vấp (50%).LH 0915 45 75 39
kimthoa3124
 
Seo tools
Seo toolsSeo tools
Seo tools
thegioigame
 
Connected TV -Using a Smart TV for consumer engagement Clive Dickens COO Abso...
Connected TV -Using a Smart TV for consumer engagement Clive Dickens COO Abso...Connected TV -Using a Smart TV for consumer engagement Clive Dickens COO Abso...
Connected TV -Using a Smart TV for consumer engagement Clive Dickens COO Abso...Absolute Radio
 
Can ho emerald trung tam thu duc gia 12 6tr.m2, dang nhan đat cho
Can ho emerald trung tam thu duc gia 12 6tr.m2, dang nhan đat choCan ho emerald trung tam thu duc gia 12 6tr.m2, dang nhan đat cho
Can ho emerald trung tam thu duc gia 12 6tr.m2, dang nhan đat chongothangcr
 

Viewers also liked (6)

Signs & Lines - Expression of Interest - Designer
Signs & Lines - Expression of Interest - DesignerSigns & Lines - Expression of Interest - Designer
Signs & Lines - Expression of Interest - Designer
 
chỉ 307tr sở hữu ngay căn hộ tại trung tâm gò vấp (50%).LH 0915 45 75 39
chỉ 307tr sở hữu ngay căn hộ tại trung tâm gò vấp (50%).LH 0915 45 75 39chỉ 307tr sở hữu ngay căn hộ tại trung tâm gò vấp (50%).LH 0915 45 75 39
chỉ 307tr sở hữu ngay căn hộ tại trung tâm gò vấp (50%).LH 0915 45 75 39
 
Animals
AnimalsAnimals
Animals
 
Seo tools
Seo toolsSeo tools
Seo tools
 
Connected TV -Using a Smart TV for consumer engagement Clive Dickens COO Abso...
Connected TV -Using a Smart TV for consumer engagement Clive Dickens COO Abso...Connected TV -Using a Smart TV for consumer engagement Clive Dickens COO Abso...
Connected TV -Using a Smart TV for consumer engagement Clive Dickens COO Abso...
 
Can ho emerald trung tam thu duc gia 12 6tr.m2, dang nhan đat cho
Can ho emerald trung tam thu duc gia 12 6tr.m2, dang nhan đat choCan ho emerald trung tam thu duc gia 12 6tr.m2, dang nhan đat cho
Can ho emerald trung tam thu duc gia 12 6tr.m2, dang nhan đat cho
 

Similar to Your e image presentation 2

Your e image presentation
Your e image presentationYour e image presentation
Your e image presentationlahill16
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
Oodit Jethwa
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
nitss007
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
SheejamolMathew
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
InterMediaKT
 
MIL_WEEK-3.pptx
MIL_WEEK-3.pptxMIL_WEEK-3.pptx
MIL_WEEK-3.pptx
PrincessAnnDimaano
 
Digital Citizenship
Digital Citizenship Digital Citizenship
Digital Citizenship
takahe2
 
Hannah dc keynote
Hannah dc keynoteHannah dc keynote
Hannah dc keynotetakahe2
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
takahe2
 
Hannah dc keynote
Hannah dc keynoteHannah dc keynote
Hannah dc keynote
takahe2
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
Preet Hanspal
 
Digital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for GoodDigital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for Good
MindMake - Parenting & Education
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
Mohamed ElGabry
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online SafetyDonna Murray
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
MsCCostello
 
Digital citizenship@
Digital citizenship@Digital citizenship@
Digital citizenship@
MsCCostello
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
MsCCostello
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
MsCCostello
 

Similar to Your e image presentation 2 (20)

Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
MIL_WEEK-3.pptx
MIL_WEEK-3.pptxMIL_WEEK-3.pptx
MIL_WEEK-3.pptx
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Digital Citizenship
Digital Citizenship Digital Citizenship
Digital Citizenship
 
Hannah dc keynote
Hannah dc keynoteHannah dc keynote
Hannah dc keynote
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Hannah dc keynote
Hannah dc keynoteHannah dc keynote
Hannah dc keynote
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Digital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for GoodDigital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for Good
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship@
Digital citizenship@Digital citizenship@
Digital citizenship@
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 

Recently uploaded

ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 

Recently uploaded (20)

ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 

Your e image presentation 2

  • 1. Presented by: Laverne Hill Media Specialist Lowndes High School With permission from: Howie DiBlasi Emerging Technologies Evangelist Digital Journey howie@frontier.net www.drhowie.com Presentation : 2012
  • 2. DIGITAL FOOTPRINTS:DIGITAL FOOTPRINTS: WHAT DOES THAT REALLY MEAN?WHAT DOES THAT REALLY MEAN?  Students should understand how to be safe and responsible online and how to create a digital footprint to be proud of today and tomorrow.
  • 3. TEN COMMANDMENTS OF COMPUTER ETHICS-(K-5) USED WITH PERMISSION: COPYRIGHT: COMPUTER ETHICS INSTITUTE AUTHOR: DR. RAMON C. BARQUIN  1. Thou shalt not use a computer to harm other people.  2. Thou shalt not interfere with other people's computer work.  3. Thou shalt not snoop around in other people's files.  4. Thou shalt not use a computer to steal.  5. Thou shalt not use a computer to bear false witness.  6. Thou shalt not copy or use proprietary software for which you have not paid.  7. Thou shalt not use other people's computer resources without authorization or proper compensation.  8. Thou shalt not appropriate other people's intellectual output.  9. Thou shall think about the social consequences of the program you write or the system you design.  10. Thou shall use a computer in ways that show consideration of and respect for your fellow humans.
  • 4. THE HIGH/UNIVERSITY CODE OF ETHICS  1) I will not use the technology/communication system to harm, slander, injure or ridicule others.  2) I will not interfere with others’ use of the technology, including opening the files of others without their permission.  3) I will not use the computer to steal.  4) I will not use the computer to misrepresent my school or myself.  5) I will not copy software for which I have not paid.  6) I will not use equipment without authorization.  7) I will not copy text or ideas from the technology resources without permission from the author or referencing source.  8) I will be responsible for any consequences that arise from or that are a result of my computing activities.
  • 5.  9) I will use both the equipment and the programs in ways that show consideration, care, and respect.  10) I will be financially responsible and liable for any damages to either hardware or software resources that result from inappropriate or abusive behavior.  11) I will not allow another person to use my logon (ID) and password, nor will I use anyone else's ID and password.  12) I will abide by all rules and regulations of the system as changed or added from time to time by the  administration.  13) I will address all concerns regarding the use of technology first to the supervising teacher and/or school librarian and then to the administration.  14) I will use the technology/computer system to further my education and will share my growing knowledge with others.  16) I recognize that all students deserve access as conditions permit.  17) I will not violate the terms and conditions of the Authorization for Internet Access as stated below.  18) I will not tamper with or change the computer settings
  • 6. INTERNET SAFETY Rules of the Road for Kids  1. Guard your privacy. What people know about you is up to you.  2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy today could cost you tomorrow.  3. Nothing is private online. Anything you say or do can be copied, pasted, and sent to gazillions of people without your permission.  4. Assume everyone is watching. There’s a huge, vast audience out there. If someone is your friend’s friend, they can see everything.  5. Apply the Golden Rule. If you don’t want it done to you, don’t do it to someone else.  6. Watch the clock. A virtual hug never matches a real one. Balance your life.  7. Choose wisely. Not all content is appropriate. You know what we mean.  8. Don't hide. Using anonymity to cloak your actions doesn’t turn you into a trustworthy, responsible human being.  9. Think about what you see. Just because it’s online doesn’t make it true.  10. Be smart, be safe. Not everyone is who they say they are. But you know that.
  • 7. WHAT IS YOUR DIGITAL FOOTPRINT MOST LIKE? BY TOM JACKSON
  • 8.  traces left by your activity in a digital environment.  All of us, like it or not, are creating these trails.  All kinds of information ABOUT YOU can be found online. Digital footprints are…….
  • 9.  Will it be insignificant tomorrow, or in five years when you need to apply for college or seek new employment ?.
  • 10. WHAT DO YOU KNOW ????  Do you know how long what you put online exists?Do you know how long what you put online exists?  Do you know what the standard is for appropriateDo you know what the standard is for appropriate and inappropriate online behavior?and inappropriate online behavior?  Do you know what a digital footprint means?Do you know what a digital footprint means?  Do you know how to take steps to have a digitalDo you know how to take steps to have a digital footprint that you will be proud of today andfootprint that you will be proud of today and tomorrow too?tomorrow too?
  • 11.  If whatever you do online can beIf whatever you do online can be traced back to you and it staystraced back to you and it stays forever what should you putforever what should you put online?online?  Think: Social NetworkingThink: Social Networking

Editor's Notes

  1. What happens to your footprint when you walk in the sand? What happens though if it is in concrete or even in a fossil like this? 1.5 million years old this footprint is in rock and is a fossil that was found in Africa Do you know that everytime you use your computer or phone you leave a digital footprint and it is more like the lasting print than the sand print.
  2. Use thumbs to show where people are at. Up for I know, sideways for I think I know and down for I don’t know.
  3. This can be discussed and added to the box as indicated. Remember to pull student names to solicite full participation and on task behaviour. Put names back in as students can easily be called on multiple times.