Joseph Pettaway ED505. What is Digital Citizenship? Concepts that aids individuals in learning and...
-
Upload
marybeth-cooper -
Category
Documents
-
view
214 -
download
0
Transcript of Joseph Pettaway ED505. What is Digital Citizenship? Concepts that aids individuals in learning and...
What is Digital Citizenship?Concepts that aids individuals in learning and
understanding how to use technology appropriately.
There are 5 important topics that address appropriate use and understand technology:1. Netiquette 2. Plagiarism3. Safety on the Computer 4. Safety on the Internet5. Copyright and Fair Use
NetiquetteThis term is defined as etiquette used on the
internet and social media sites. This concept includes rules for
communication via internet use for proper manners and behaviors online
3 areas to practice good netiquette:1. email2. online chat3. newsgroups
Ribble, 2012
Netiquette Do’s & Don’tsDo: Don’t:Respect others’ privacyUse computer courtesyObey copyright lawsKeep Personal
information privateWhen joining groups
observe how people communicate before opening your lines of communication
Frustrate or Annoy othersUse Bad or Obscene
LanguageShout (Use all caps)Degrade or Demoralize
anyone
Ribble, 2012
What is Plagiarism?Using language or thoughts of another
person without their authorization and representing it as your own; not giving credit to the original author
How to Avoid PlagiarismGive credit to original authors whenever you
use:1. someone else’s ideas and opinions2. Direct quotes3. Paraphrase of others’ written or spoken
words4. Charts, graphs, drawings, facts, statistics
Give credit for anything that is not common knowledge
Ribble, 2012
How does technology help teachers recognize Plagiarism?Technology can be used to submit papers to
various plagiarism cites where they can be scanned against data bases to check for authenticity.
Safety on the ComputerAlways use updated antivirus programs,
antispyware and a firewallProtect your computer, your life and identity
from:1. Viruses2. Phishing3. Trojan horses4. Worms
VirusesSpeed by emails, from computer to computer
by attaching to programs or files leaving infections as it travels.
Viruses can damage hardware, software, or files
They can run and replicate without your knowledge and use up the computer memory and slow down or even stop your computer
Beal, 2011
PhishingSending fraudulent emails to people claiming
to be established domains in order to scam users into giving up their private information
These emails can direct users to different sites asking for them to update personal information such as: credit cards, social security numbers, passwords, bank information and other pertinent information required for identity theft
Beal, 2011
Trojan HorsesCreate backdoors on your computer that
gives others’ access to operating systemDestructive program that camouflages its self
as an application that removes viruses, but instead introduces viruses that breach computer systems and cause damage to the computer
Beal, 2011
WormsA type of virus that can replicate and use
memory but can’t attach itself to other programs; can allow malicious users to control a computer
Beal, 2011
Internet SafetyAlways protect personal information, business
information, domain informationThere are 5 areas to consider when protecting
yourself on the internet:1. Identity Theft2. Reputation Management3. Passwords4. Cyber bullying5. Cyber stalking
NCJRS, 2012
Identity TheftVia viruses and other malicious applications,
people are able to gain information to pertinent files and information on your computer and impersonate others for financial gain
NCJRS, 2012
Reputation ManagementThe process of understanding or influencing
an individual or business’ reputation.
Examples:Asking sites to take down incorrect information
and using online feedback to influence sales or products.
NCJRS, 2012
PasswordsDevelop longer passwords that have both
letters, numbers, and characters. Make passwords that are only significant to
youFollow these procedures to keep hackers
from figuring out your passwords
NCJRS, 2012
Cyber bullyingOnline harassment use of internet to harm
people deliberately, repeatedly or in a hostile manner
Occurs frequently among young people
NCJRS, 2012
Cyber stalkingA form of cyber bullyingOnline harassments that includes false
accusations, monitoring others, making threats, identity theft, damage to data or equipment, and gathering information in order to harass
NCJRS, 2012
Copyright & Fair UseCopyright Fair UseProtects the originator
of a piece of work, information or ideas
Internet copyright gives the author economic incentives to create new works
Limitations placed on copyright holders rights
United States Copyright Office, 2010
Copyright & Fair Use DifferencesAs long as the copyright owner has given
permission to use their work, there is absolutely nothing wrong with reproducing, or creating a derivative of the original
When permission is not granted, on the other hand, the act of use is either considered fair use or copyright infringement, legal or illegal
United States Copyright Office, 2010
Fair Use GuidelinesThere are 4 simple universal guidelines for
fair use:1. The purpose and character of use2. The nature of the copyrighted work3. The amount & substantiality of the portion
of the work to be used4. The effect of use on the potential market for
the copyrighted work United States Copyright
Office, 2008
Fair Use Rules for MediaA chapter from a book (never the entire
book). Get permission for repeated useGet permission for commercial useNever make multiple copies without
permission
University of Maryland University College Library, 2011
Works Cited Beal, V. (2011). The Difference between a computer virus, worm, and trojan
horse. Webopedia- IT Business Edge. Retrieved from http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp
National Criminal Justice Reference Service (2012). Internet safety. Retrieved from http://wwwncjrs.gov/internetsafety
Ribble, M. (2012). Digital citizenship: using technology appropriately. Retrieved from http://digitalcitizenship.net/
University of Maryland University College. (2011). Copyright and fair use in the umuc online or face-to-face classroom. Retrieved from http://www.umuc.edu/library/libhow/copyright
United States Copyright Office. (2008). Copyright basics. (Circular 1). Retrieved from http://www.copyright.gov/circs/circ01.pdf
United States Copyright Office. (2009). Reproduction of copyrighted works by educators and librarians. (Circular 21). Retrieved from http://www.copyright.gov/circs/circ21.pdf
United States Copyright Office. (2010). Fair use. (Circular FL-102). Retrieved from http://www.copyright.gov/fls/fl102.html