Joseph Pettaway ED505 What is Digital Citizenship? Concepts that aids individuals in learning and understanding how to use technology appropriately. There are 5 important topics that address appropriate use and understand technology: 1. Netiquette 2. Plagiarism 3. Safety on the Computer 4. Safety on the Internet 5. Copyright and Fair Use Netiquette This term is defined as etiquette used on the internet and social media sites. This concept includes rules for communication via internet use for proper manners and behaviors online 3 areas to practice good netiquette: 1. email 2. online chat 3. newsgroups Ribble, 2012 Netiquette Do’s & Don’ts Do: Don’t: Respect others’ privacy Frustrate or Annoy others Use computer courtesy Use Bad or Obscene Language Obey copyright laws Shout (Use all caps) Keep Personal information private When joining groups observe how people communicate before opening your lines of communication Degrade or Demoralize anyone Ribble, 2012 What is Plagiarism? Using language or thoughts of another person without their authorization and representing it as your own; not giving credit to the original author How to Avoid Plagiarism Give credit to original authors whenever you use: 1. someone else’s ideas and opinions 2. Direct quotes 3. Paraphrase of others’ written or spoken words 4. Charts, graphs, drawings, facts, statistics Give credit for anything that is not common knowledge Ribble, 2012 How does technology help teachers recognize Plagiarism? Technology can be used to submit papers to various plagiarism cites where they can be scanned against data bases to check for authenticity. Safety on the Computer Always use updated antivirus programs, antispyware and a firewall Protect your computer, your life and identity from: 1. Viruses 2. Phishing 3. Trojan horses 4. Worms Viruses Speed by emails, from computer to computer by attaching to programs or files leaving infections as it travels. Viruses can damage hardware, software, or files They can run and replicate without your knowledge and use up the computer memory and slow down or even stop your computer Beal, 2011 Phishing Sending fraudulent emails to people claiming to be established domains in order to scam users into giving up their private information These emails can direct users to different sites asking for them to update personal information such as: credit cards, social security numbers, passwords, bank information and other pertinent information required for identity theft Beal, 2011 Trojan Horses Create backdoors on your computer that gives others’ access to operating system Destructive program that camouflages its self as an application that removes viruses, but instead introduces viruses that breach computer systems and cause damage to the computer Beal, 2011 Worms A type of virus that can replicate and use memory but can’t attach itself to other programs; can allow malicious users to control a computer Beal, 2011 Internet Safety Always protect personal information, business information, domain information There are 5 areas to consider when protecting yourself on the internet: 1. Identity Theft 2. Reputation Management 3. Passwords 4. Cyber bullying 5. Cyber stalking NCJRS, 2012 Identity Theft Via viruses and other malicious applications, people are able to gain information to pertinent files and information on your computer and impersonate others for financial gain NCJRS, 2012 Reputation Management The process of understanding or influencing an individual or business’ reputation. Examples: Asking sites to take down incorrect information and using online feedback to influence sales or products. NCJRS, 2012 Passwords Develop longer passwords that have both letters, numbers, and characters. Make passwords that are only significant to you Follow these procedures to keep hackers from figuring out your passwords NCJRS, 2012 Cyber bullying Online harassment use of internet to harm people deliberately, repeatedly or in a hostile manner Occurs frequently among young people NCJRS, 2012 Cyber stalking A form of cyber bullying Online harassments that includes false accusations, monitoring others, making threats, identity theft, damage to data or equipment, and gathering information in order to harass NCJRS, 2012 Copyright & Fair Use Copyright Fair Use Protects the originator of a Limitations placed on piece of work, information or ideas Internet copyright gives the author economic incentives to create new works copyright holders rights United States Copyright Office, 2010 Copyright & Fair Use Differences As long as the copyright owner has given permission to use their work, there is absolutely nothing wrong with reproducing, or creating a derivative of the original When permission is not granted, on the other hand, the act of use is either considered fair use or copyright infringement, legal or illegal United States Copyright Office, 2010 Fair Use Guidelines There are 4 simple universal guidelines for fair use: 1. The purpose and character of use 2. The nature of the copyrighted work 3. The amount & substantiality of the portion of the work to be used 4. The effect of use on the potential market for the copyrighted work United States Copyright Office, 2008 Fair Use Rules for Media A chapter from a book (never the entire book). Get permission for repeated use Get permission for commercial use Never make multiple copies without permission University of Maryland University College Library, 2011 Digital Citizenship Read, learn, understand, and protect yourself and others Works Cited Beal, V. (2011). The Difference between a computer virus, worm, and trojan horse. Webopedia- IT Business Edge. Retrieved from http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp National Criminal Justice Reference Service (2012). Internet safety. Retrieved from http://wwwncjrs.gov/internetsafety Ribble, M. (2012). Digital citizenship: using technology appropriately. Retrieved from http://digitalcitizenship.net/ University of Maryland University College. (2011). Copyright and fair use in the umuc online or face-to-face classroom. Retrieved from http://www.umuc.edu/library/libhow/copyright United States Copyright Office. (2008). Copyright basics. (Circular 1). Retrieved from http://www.copyright.gov/circs/circ01.pdf United States Copyright Office. (2009). Reproduction of copyrighted works by educators and librarians. (Circular 21). Retrieved from http://www.copyright.gov/circs/circ21.pdf United States Copyright Office. (2010). Fair use. (Circular FL-102). Retrieved from http://www.copyright.gov/fls/fl102.html