Upload
morris-shields
View
221
Download
5
Embed Size (px)
Citation preview
Digital Citizenship
Presented by: Kyle Taylor
February 4, 2013
What is Digital Citizenship?• Digital citizenship is a concept which helps teachers,
technology leaders, and parents to understand how to use technology appropriately. (Ribble 2013)
• Technology is a vital part our lives in the 21st century.• Many things that we do on a daily basis centers
around technology, such as education, work, paying bills, and self-interests.
• With the growing use of technology comes the growing misuse of technology.
• What we will learn is the five basic components of being a positive digital citizen in today’s technological age.
• These components are as follows: (1) Netiquette on social media websites; (2) The importance of copyright and fair use; (3) Plagiarism; (4) Safety on the Internet; (5) Safety on your computer
Netiquette on Social Media Sites • To understand netiquette on social
media sites , one first needs to understand the definition of social media.
• Social media includes social networks, blogs, and other domains that allow you to share feedback and provide an online community. (Chiles 2013)
• Current examples of social media are Facebook, Twitter, Pinterest, and Google Blogspot.
• So what does netiquette mean?• Netiquette is just simply the way to
appropriately behave online.• So, what are the right ways of
behaving online and what are the wrong ways?
Things To Avoid When Posting on Social Media Sites
• Don’t use the same social network for professional and personal use. (Daukas, 2013)
• Don’t pretend to be someone else when posting on social media websites. (Daukas, 2013)
• Don’t post photos of other people without their permission. (Daukas, 2013)
• Don’t use inappropriate language. (Daukas, 2013)
• Don’t flame. Flaming is defined as ranting about a particular point one is trying to make. (Daukas, 2013)
• Don’t use sarcasm. People may not know you as well as others. (Daukas, 2013)
Things To Practice When Using Social Media
• Alexandra Samuel gives us some things to keep in mind when using social media. (Samuel, 2011)
• Be as brief as possible when posting.• Always cite your sources when posting
important information.• If someone asks a question, please
follow up with them if possible.• Always think before you type.• Follow the Golden Rule.• Make sure that you that you give out
information that you want people to have.
• Avoid giving out personal information like phone numbers, social security numbers, etc,.
Copyright and Fair Use• Copyright is a law that gives one ownership
over the things they create. (Bailey, 2005)• Fair Use gives scholars, researchers, and
authors permission to make limited use of the work of another without asking permission. (Bailey, 2005)
• Copyright and fair use are very similar in their meaning, but they do have one distinct difference.
• Copyright basically tells you what you can’t do, and fair use gives exceptions of what one can do dependent on the circumstances.
What Constitutes Fair Use?• In order to claim “fair use” one must only use
works for educational purposes and for a short amount of time.
• In the case of print media, one must only use up to 10% or 1000 words of a single piece of work.
• For music, one can use up to 10% or no more than 30 seconds of someone’s work.
• For poetry, one must use copies from a poem of 250 words or less that exists on two pages.
• For photos, one can use 5 or less pictures by the same photographer or illustrator.
• When using video, up to 10% or up to 3 minutes (whichever is less) of copyrighted videotapes, DVDs, etc,.
• These stats come from Power to Learn, a online guide for fair use practice.
What is Plagiarism?• Plagiarism is the act of taking
another person’s writing, conversation, song, or even idea and passing it off as your own.
• Flagler University’s library gives some ways to avoid plagiarism.
• (1) Use your own ideas.• (2) Use other ideas sparingly, only
to reinforce your argument.• (3) When taking notes, use the
complete citation for each item you use.
• (4) Use quotation marks when you are directly quoting someone’s words.
• (5) Write a short draft of your paper without using any notes. This will help you from becoming too dependent on your sources.
Using Technology to Combat Plagiarism
• Information in today’s tech age is very easy for individuals to collect.
• This also makes it very easy for people to plagiarize information.
• There are several online tools that have been developed to help fight plagiarism.
• (1) Turnitin.com• (2) DupliChecker.com• (3) AcademicPlagiarism.com • These websites allow for people to
upload their document, and the document is then cross-referenced with millions of other documents on the Internet.
• In most cases, an originality report is given, and this allows the writer to edit and remove any plagiarized material.
Safety on the Internet• One of the number one crimes today is
identity theft.• Dave Drager writes of ways to avoid identity
theft. • One of the easiest ways to steal someone’s
identity is to do it through the Internet. (Drager, 2011)
• Don’t divulge too much information through social media websites. (Drager, 2011)
• Shop only at reputable websites. (Drager, 2011)
• Secure your wireless network. This means to password protect your network so that it makes it difficult for hackers to use your IP address. (Drager, 2011)
Safety on the Internet• Another matter to pay attention to when
using the Internet is using a secure password.
• The University of Texas gives some tips when wanting to create a secure password.
• (1) Use both upper and lower case letters.• (2) Incorporate numbers and punctuation
marks.• (3) Avoid using passwords with social
security numbers, phone numbers, or birthdates.
• Having a strong password can save a person a lot of grief in the future.
Cyberbullying and Cyberstalking
• Cyberbullying is bullying that takes place using electronic technology.
• Cyberbulling is a growing problem in today’s society, especially among our students.
• Parents and school staff can prevent cyberbulling by modeling how to treat and love others.
• If you are a teacher, encourage kids to come to you if they are being cyberbullied.
• Many of these ways to prevent cyberbullying comes from the government’s website stopbullying. org.
Cyberstalking
• Cyberstalking refers to the use of the Internet, e-mail, or other telecommunication technologies to harass or stalk another person.
• Here are some ways to prevent yourself from becoming a victim of cyberstalking from Marshall University.
• (1) Never give your password to anyone, especially if someone sends you an instant message.
• (2) Don’t give your primary e-mail address out to anyone you don’t know.
• (3) Don’t respond to an e-mail from a stranger.
Reputation Management
• Content that is posted to the Internet does not go away.
• It is very important for individuals to be careful what type of information that is posted online.
• It is becoming very common for employers to check social media sites of potential employees.
• People need to be aware that items that they post on the internet, although posting years ago, may come back to damage their reputation.
Safety on the Computer
• It is always important to maintain safety when it comes to your computer.
• Computer thieves (hackers) are constantly trying to use different tactics to gain access to your PC or Mac.
• Many hackers use viruses, phishing tools, trojan horses, and worms to completely bring down your computer.
Safety on the Computer
• A computer virus is a “man made” program that is loaded onto your computer without you knowing it.
• Viruses can also attach themselves to other programs.
• Viruses can totally disrupt your computer operation and gain access to vital information.
• A worm is a special type of virus that can replicate itself and use memory, but it cannot attach to other programs.
Safety on the Computer• Securenet defines a trojan horse is a type of
virus that simply does not replicate itself.• Securenet defines phishing is a type of
Internet fraud that seeks to acquire a user’s credentials by deception.
• It includes theft of passwords, credit card numbers, bank account details, and other confidential information.
• To prevent harm to the computer by these items, one needs to install an anti-virus program on the computer and keep it updated.
• Examples of anti-virus programs: Norton Antivirus, McAfee, and Microsoft Security Essentials.
Works Citied • Bailey, J. (2005). What is copyright? Plagiarism Today. Retrieved from http://www.plagiarismtoday.com/stopping-internet-
plagiarism/your-copyrights-online/1-what-is-a-copyright/• Chiles, D. (2013). Introduction to the definition of netiquette. Retrieved from http://www.networketiquette.net/index.html• Daukas, K. (2013, January). Social media etiquette: Tips for staying out of the penalty ox – part 1. Retrieved from
http://www.atlanticwebworks.com/blog/social-media-etiquette-tips-to-stay-out-of-the-penalty-box• Drager, D. (2011, January). Nine Ways to Prevent Identity Theft From Your Online Activities. Retrieved from
http://www.makeuseof.com/tag/9-ways-prevent-identity-theft-online-activities/• Five tips for avoiding plagiarism. (2004). Flagler University Library. Retrieved from
http://www.flagler.edu/library/polaris/mod6/06-tips-plag.html• Internet smarts : A quick guide to fair use and school projects. (2013). Power to learn. Retrieved from
http://www.powertolearn.com/internet_smarts/interactive_case_studies/fair_use/quick_guide_fair_use.pdf• Photos retrieved from phillipmartin.com intended for fair use. • Reasons to avoid cyberstalking. Retrieved from http://www.marshall.edu/wpmu/wcenter/stalking/cyberstalking/• Ribble, M. (2013). Digital citizenship: Using technology appropriately. Retrieved from
http://www.digitalcitizenship.net/Home_Page.html • Samuel, A. (2011, April) 25 rules of social media netiquette. Love your life online. Retrieved from
http://www.alexandrasamuel.com/world/25-rules-of-social-media-netiquette • The importance of strong passwords. (2010, October). University of Texas. Retrieved from
http://www.utexas.edu/its/secure/articles/importance_strong_passwords.php• What is cyberbulling? Retrieved from http://www.stopbullying.gov/cyberbullying/what-is-it/index.html• What is phishing? Retrieved from http://www.securelist.com/en/threats/spam?chapter=85• What is worms and viruses? Retrieved from http://www.webopedia.com/TERM/V/virus.html