Digital Citizenship Project

advertisement
Joseph Pettaway
ED505
What is Digital Citizenship?
 Concepts that aids individuals in learning and
understanding how to use technology appropriately.
 There are 5 important topics that address appropriate
use and understand technology:
1. Netiquette
2. Plagiarism
3. Safety on the Computer
4. Safety on the Internet
5. Copyright and Fair Use
Netiquette
 This term is defined as etiquette used on the internet
and social media sites.
 This concept includes rules for communication via
internet use for proper manners and behaviors online
 3 areas to practice good netiquette:
 1. email
 2. online chat
 3. newsgroups
Ribble, 2012
Netiquette Do’s & Don’ts
Do:
Don’t:
 Respect others’ privacy
 Frustrate or Annoy others
 Use computer courtesy
 Use Bad or Obscene Language
 Obey copyright laws
 Shout (Use all caps)
 Keep Personal information
private
 When joining groups observe
how people communicate
before opening your lines of
communication
 Degrade or Demoralize anyone
Ribble, 2012
What is Plagiarism?
 Using language or thoughts of another person without
their authorization and representing it as your own;
not giving credit to the original author
How to Avoid Plagiarism
 Give credit to original authors whenever you use:
 1. someone else’s ideas and opinions
 2. Direct quotes
 3. Paraphrase of others’ written or spoken words
 4. Charts, graphs, drawings, facts, statistics
 Give credit for anything that is not common
knowledge
Ribble, 2012
How does technology help
teachers recognize Plagiarism?
 Technology can be used to submit papers to various
plagiarism cites where they can be scanned against
data bases to check for authenticity.
Safety on the Computer
 Always use updated antivirus programs, antispyware
and a firewall
 Protect your computer, your life and identity from:
 1. Viruses
 2. Phishing
 3. Trojan horses
 4. Worms
Viruses
 Speed by emails, from computer to computer by
attaching to programs or files leaving infections as it
travels.
 Viruses can damage hardware, software, or files
 They can run and replicate without your knowledge
and use up the computer memory and slow down or
even stop your computer
Beal, 2011
Phishing
 Sending fraudulent emails to people claiming to be
established domains in order to scam users into giving
up their private information
 These emails can direct users to different sites asking
for them to update personal information such as:
credit cards, social security numbers, passwords, bank
information and other pertinent information required
for identity theft
Beal, 2011
Trojan Horses
 Create backdoors on your computer that gives others’
access to operating system
 Destructive program that camouflages its self as an
application that removes viruses, but instead
introduces viruses that breach computer systems and
cause damage to the computer
Beal, 2011
Worms
 A type of virus that can replicate and use memory but
can’t attach itself to other programs; can allow
malicious users to control a computer
Beal, 2011
Internet Safety
 Always protect personal information, business






information, domain information
There are 5 areas to consider when protecting yourself on
the internet:
1. Identity Theft
2. Reputation Management
3. Passwords
4. Cyber bullying
5. Cyber stalking
NCJRS, 2012
Identity Theft
 Via viruses and other malicious applications, people
are able to gain information to pertinent files and
information on your computer and impersonate others
for financial gain
NCJRS, 2012
Reputation Management
 The process of understanding or influencing an
individual or business’ reputation.
 Examples:
Asking sites to take down incorrect information and
using online feedback to influence sales or products.
NCJRS, 2012
Passwords
 Develop longer passwords that have both letters,
numbers, and characters.
 Make passwords that are only significant to you
 Follow these procedures to keep hackers from figuring
out your passwords
NCJRS, 2012
Cyber bullying
 Online harassment use of internet to harm people
deliberately, repeatedly or in a hostile manner
 Occurs frequently among young people
NCJRS, 2012
Cyber stalking
 A form of cyber bullying
 Online harassments that includes false accusations,
monitoring others, making threats, identity theft,
damage to data or equipment, and gathering
information in order to harass
NCJRS, 2012
Copyright & Fair Use
Copyright
Fair Use
 Protects the originator of a
 Limitations placed on
piece of work, information or
ideas
 Internet copyright gives the
author economic incentives
to create new works
copyright holders rights
United States Copyright Office,
2010
Copyright & Fair Use Differences
 As long as the copyright owner has given permission to
use their work, there is absolutely nothing wrong with
reproducing, or creating a derivative of the original
 When permission is not granted, on the other hand,
the act of use is either considered fair use or copyright
infringement, legal or illegal
United States Copyright Office, 2010
Fair Use Guidelines
 There are 4 simple universal guidelines for fair use:
 1. The purpose and character of use
 2. The nature of the copyrighted work
 3. The amount & substantiality of the portion of the
work to be used
 4. The effect of use on the potential market for the
copyrighted work
United States Copyright Office, 2008
Fair Use Rules for Media
 A chapter from a book (never the entire book).
 Get permission for repeated use
 Get permission for commercial use
 Never make multiple copies without permission
University of Maryland University College Library, 2011
Digital Citizenship
 Read, learn, understand, and protect yourself and
others
Works Cited
 Beal, V. (2011). The Difference between a computer virus, worm, and trojan horse.
Webopedia- IT Business Edge. Retrieved from
http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp
 National Criminal Justice Reference Service (2012). Internet safety. Retrieved from
http://wwwncjrs.gov/internetsafety
 Ribble, M. (2012). Digital citizenship: using technology appropriately. Retrieved from
http://digitalcitizenship.net/
 University of Maryland University College. (2011). Copyright and fair use in the umuc
online or face-to-face classroom. Retrieved from
http://www.umuc.edu/library/libhow/copyright
 United States Copyright Office. (2008). Copyright basics. (Circular 1). Retrieved from
http://www.copyright.gov/circs/circ01.pdf
 United States Copyright Office. (2009). Reproduction of copyrighted works by educators
and librarians. (Circular 21). Retrieved from http://www.copyright.gov/circs/circ21.pdf
 United States Copyright Office. (2010). Fair use. (Circular FL-102). Retrieved from
http://www.copyright.gov/fls/fl102.html

Download