Joseph Pettaway ED505. What is Digital Citizenship? Concepts that aids individuals in learning and...

24
Digital Citizenship Project Joseph Pettaway ED505

Transcript of Joseph Pettaway ED505. What is Digital Citizenship? Concepts that aids individuals in learning and...

Digital Citizenship ProjectJoseph Pettaway

ED505

What is Digital Citizenship?Concepts that aids individuals in learning and

understanding how to use technology appropriately.

There are 5 important topics that address appropriate use and understand technology:1. Netiquette 2. Plagiarism3. Safety on the Computer 4. Safety on the Internet5. Copyright and Fair Use

NetiquetteThis term is defined as etiquette used on the

internet and social media sites. This concept includes rules for

communication via internet use for proper manners and behaviors online

3 areas to practice good netiquette:1. email2. online chat3. newsgroups

Ribble, 2012

Netiquette Do’s & Don’tsDo: Don’t:Respect others’ privacyUse computer courtesyObey copyright lawsKeep Personal

information privateWhen joining groups

observe how people communicate before opening your lines of communication

Frustrate or Annoy othersUse Bad or Obscene

LanguageShout (Use all caps)Degrade or Demoralize

anyone

Ribble, 2012

What is Plagiarism?Using language or thoughts of another

person without their authorization and representing it as your own; not giving credit to the original author

How to Avoid PlagiarismGive credit to original authors whenever you

use:1. someone else’s ideas and opinions2. Direct quotes3. Paraphrase of others’ written or spoken

words4. Charts, graphs, drawings, facts, statistics

Give credit for anything that is not common knowledge

Ribble, 2012

How does technology help teachers recognize Plagiarism?Technology can be used to submit papers to

various plagiarism cites where they can be scanned against data bases to check for authenticity.

Safety on the ComputerAlways use updated antivirus programs,

antispyware and a firewallProtect your computer, your life and identity

from:1. Viruses2. Phishing3. Trojan horses4. Worms

VirusesSpeed by emails, from computer to computer

by attaching to programs or files leaving infections as it travels.

Viruses can damage hardware, software, or files

They can run and replicate without your knowledge and use up the computer memory and slow down or even stop your computer

Beal, 2011

PhishingSending fraudulent emails to people claiming

to be established domains in order to scam users into giving up their private information

These emails can direct users to different sites asking for them to update personal information such as: credit cards, social security numbers, passwords, bank information and other pertinent information required for identity theft

Beal, 2011

Trojan HorsesCreate backdoors on your computer that

gives others’ access to operating systemDestructive program that camouflages its self

as an application that removes viruses, but instead introduces viruses that breach computer systems and cause damage to the computer

Beal, 2011

WormsA type of virus that can replicate and use

memory but can’t attach itself to other programs; can allow malicious users to control a computer

Beal, 2011

Internet SafetyAlways protect personal information, business

information, domain informationThere are 5 areas to consider when protecting

yourself on the internet:1. Identity Theft2. Reputation Management3. Passwords4. Cyber bullying5. Cyber stalking

NCJRS, 2012

Identity TheftVia viruses and other malicious applications,

people are able to gain information to pertinent files and information on your computer and impersonate others for financial gain

NCJRS, 2012

Reputation ManagementThe process of understanding or influencing

an individual or business’ reputation.

Examples:Asking sites to take down incorrect information

and using online feedback to influence sales or products.

NCJRS, 2012

PasswordsDevelop longer passwords that have both

letters, numbers, and characters. Make passwords that are only significant to

youFollow these procedures to keep hackers

from figuring out your passwords

NCJRS, 2012

Cyber bullyingOnline harassment use of internet to harm

people deliberately, repeatedly or in a hostile manner

Occurs frequently among young people

NCJRS, 2012

Cyber stalkingA form of cyber bullyingOnline harassments that includes false

accusations, monitoring others, making threats, identity theft, damage to data or equipment, and gathering information in order to harass

NCJRS, 2012

Copyright & Fair UseCopyright Fair UseProtects the originator

of a piece of work, information or ideas

Internet copyright gives the author economic incentives to create new works

Limitations placed on copyright holders rights

United States Copyright Office, 2010

Copyright & Fair Use DifferencesAs long as the copyright owner has given

permission to use their work, there is absolutely nothing wrong with reproducing, or creating a derivative of the original

When permission is not granted, on the other hand, the act of use is either considered fair use or copyright infringement, legal or illegal

United States Copyright Office, 2010

Fair Use GuidelinesThere are 4 simple universal guidelines for

fair use:1. The purpose and character of use2. The nature of the copyrighted work3. The amount & substantiality of the portion

of the work to be used4. The effect of use on the potential market for

the copyrighted work United States Copyright

Office, 2008

Fair Use Rules for MediaA chapter from a book (never the entire

book). Get permission for repeated useGet permission for commercial useNever make multiple copies without

permission

University of Maryland University College Library, 2011

Digital CitizenshipRead, learn, understand, and protect yourself

and others

Works Cited Beal, V. (2011). The Difference between a computer virus, worm, and trojan

horse. Webopedia- IT Business Edge. Retrieved from http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp

National Criminal Justice Reference Service (2012). Internet safety. Retrieved from http://wwwncjrs.gov/internetsafety

Ribble, M. (2012). Digital citizenship: using technology appropriately. Retrieved from http://digitalcitizenship.net/

University of Maryland University College. (2011). Copyright and fair use in the umuc online or face-to-face classroom. Retrieved from http://www.umuc.edu/library/libhow/copyright

United States Copyright Office. (2008). Copyright basics. (Circular 1). Retrieved from http://www.copyright.gov/circs/circ01.pdf

United States Copyright Office. (2009). Reproduction of copyrighted works by educators and librarians. (Circular 21). Retrieved from http://www.copyright.gov/circs/circ21.pdf

United States Copyright Office. (2010). Fair use. (Circular FL-102). Retrieved from http://www.copyright.gov/fls/fl102.html