13
DIGITAL CITIZENSHIP A Guide to Digital Technologies, Products and Social Networks John Lwin

What is Digital Citizenship

Embed Size (px)

Citation preview

!

DIGITAL CITIZENSHIP

A Guide to Digital Technologies, Products and Social Networks

John Lwin

CONTENTS

• Introduction...................................................................................Page 1

• Digital Citizenship and Social Networking!!!!!!!!!!Page 2 o What is Digital Citizenship?...............................................Page 2 o What is Social Networking?...............................................Page 2 o What are some strategies for safely using Social

Networks?..........................................................................Page 3

• Cyber Bullying and Digital Footprint!!!!!!!!!!!!..Page 4 o What is Cyber Bullying?.....................................................Page 4 o What are some strategies to manage/limit Cyber

Bullying?............................................................................Page 5 o What is “Digital Footprint”?................................................Page 6

• Work/Life Balance!!!!!!!!!!!!!!!!!!!!Page 6

o Why is ensuring an appropriate work/life balance, in relation to ICT access, important?......................................................Page 6

• Rights of Content Creators - Copyright!!!!!!!!!!!.Page 7

o What are some ways of protecting the rights of content creators?............................................................................Page 7

o What are the relevant sections of the Australian Copyright Act in relation to digital technologies and products?...................Page 8

• Intellectual Property and Creative Commons!!!!!!!!..Page 8

o What is Intellectual Property?............................................Page 8 o What is Creative Commons?.............................................Page 9

• Conclusion!!!!!!!!!!!!!!!!!!!!!!!.Page 9

!"#"$%&'("$")*+,-".' /'!

INTRODUCTION The Internet is a great and wonderful thing. It enables people from around the world to connect and communicate with each other almost instantly and for a variety of purposes. The Internet is also an easy access to a wide range of information, which you can also contribute to and share. These online services and applications provide a great benefit to society, but it also has some downsides. The Internet holds many risks and dangers for users. Users are also at risk of offending others in the virtual space. This guide is to help users to understand more about the Internet, its features and how to access and utilise it more responsibly and safely for themselves and others in the virtual space.

!"#"$%&'("$")*+,-".' 0'!

DIGITAL CITIZENSHIP AND SOCIAL NETWORKING What is Digital Citizenship? Digital citizenship is the means of appropriate, sensible, and responsible use of technology. It is a tool that teaches users about technology and helps them understand the aspects and features that technology embodies. It is a way to prepare users for a society full of technology. Digital citizenship covers concepts and themes including personal safety, online etiquette, the law relating to technology and various health issues. What is Social Networking? Social networking is the use of a website, service or application, on any device that focus on facilitating the creation of social networks and relations with other people, usually those that share interests, activities, backgrounds, or have real-life connections to them. There can be social networks for virtually anything and everything. However, they can be broken down into the different categories of:

• Blogs • Forums • Microblogging • Podcasts • Image sharing sites • Video sharing sites • Social bookmarking • Community-moderated content, such as wikis • Virtual communities, such as online gaming

There are major and basic characteristics surrounding social networks, differentiating them from a normal website. These characteristics are as follows. Social networks are user-based. This means that the users build and direct them, rather than one webmaster or author updating the information in a single direction. Users populate the network with content, and the content is directed by anyone who participates in the online, making the flow of information, and the network as a whole, more dynamic. This can lead to the build-up of online communities, and eventually the network, or at least parts of the network, is community-driven, where members of that online community hold common beliefs or hobbies. They are interactive, meaning there is a two-way flow of information between the user and a computer (or in this instance, a network), where the computer (network) not only presents the information and content, but also responds to the input of the users. This makes the users feel more engaged, creating a closer relationship between them and the network, unlike those of non-interactive websites and applications.

!"#"$%&'("$")*+,-".' 1'!

There are a variety of features available in social networking. These features include:

• Video calling • Text messaging • Instant messaging • Blogging • Video and photo sharing

!Just to name a few.

What are some strategies for safely using Social Networks? Just as social networks are easy to use, it is also easy to encounter risks and make us a target for cyber-criminals when accessing and using applications and services, many of which, can be unknown to you. These are a variety of risks that users will encounter when using a social network:

• Cyber-stalking. • Bullying. • Access to age-inappropriate content. • Disclosure of private information either by yourself or friends/contacts. • Online child abuse and grooming (when someone develops a relationship with

someone else with illegal or immoral intent e.g. paedophilic relationships with unsuspecting children).

• Viruses or spyware attached to messages or photographs. • Prosecution or recrimination due to posting inappropriate or offensive content. • Phishing emails allegedly from “safe sites” like social networks, that are an

attempt at identity theft in which criminals lead users to a counterfeit website in the hope that they will disclose private information.

• Posts from friends, companies and other people encouraging you to link to counterfeit or inappropriate websites.

• People hijacking or hacking into your account or page. Users can counter these risks and dangers by following a sensible guideline:

• Learn how to use the site properly, especially the privacy features to restrict strangers’ access to your profile and private information.

• Do not allow peer pressure convince you to do something you are not

comfortable with.

• Use strong passwords (medium to long passwords with some variety of characters).

• Be aware of what people post or reply about you, particularly about your

personal details and activities.

!"#"$%&'("$")*+,-".' 2'!

• Make sure that you have effective and updated anti-virus software before

going online.

• Never post content that are inappropriate or may cause offence to others.

• Never use the same password that you use for your bank or email accounts. Having different passwords for different accounts prevent the risk of multiple accounts being stolen.

• Pick a user name that does not include any personal information e.g. your full

name in a username is not very safe.

• Keep your profile closed, and adjust the settings so that only your friends can see it.

• Don’t violate your company’s social network policies.

CYBER BULLYING AND DIGITAL FOOTPRINT What is Cyber Bullying? Cyber bullying is deliberate harassment, threatening, or embarrassment of one person by another person through the use of technology. It is not only an easy form of harassment, but it can be shared widely and quickly, which is why it is so dangerous. It can even lead to exclusion from peer groups, intimidation, extortion, and violence (or threats of violence), and in worse cases, suicide and death. This chart shows the most common cyber bullying situations. (Taken from KidsHelpline.com)

!"#"$%&'("$")*+,-".' 3'!

Types of Cyber bullying:

• Denigration, or humiliating someone by posting mean online messages through email, instant messaging, chat rooms or websites.

• Exclusion, or intentionally leaving someone out of online group activities.

• Outing, or sharing private information, pictures and videos about someone

online without their consent.

• Harassment through continuously sending malicious messages to the victim.

• Impersonation, where someone pretends to be someone else and posts inappropriate and/or false content about the victim.

• Flaming, or online fights where angry and rude comments are exchanged.

• Tricking someone into revealing personal information then sharing it with

others. What are some strategies to manage/limit Cyber Bullying? If you find yourself a victim to cyber bullying, you should:

• Block the bully and change your privacy settings.

• Report the abuse.

• Talk to someone you trust about it. This may be your family, friends or a teacher.

If you are a parent or teacher of the victim, things you can do to help are:

• Intervening as early as possible before it becomes a bigger problem.

• Be aware of the bullying, what it is, how it happens, and its impacts.

• Ensure the child is and feels safe and supported.

• Assist in reducing or stopping the bullying. If you are a friend of a victim, you should:

• Leave negative groups and conversations.

• Support your friend.

• Report the bullying to a parent or teacher.

!"#"$%&'("$")*+,-".' 4'!

What is a “Digital Footprint”? A digital footprint are the traces a user leaves online as they use or move through the Internet. Every piece of information can be traced back to you is digitally retained somewhere online. This information includes content that you actively volunteer (e.g. Facebook profiles), whilst other content is passive, such as the cookies a site stores in your browser. This data can be collected to create a profile of you and your online behaviour. The information that users unconsciously leave on the Internet (including posted comments, etc.) can always be accessed, even when deleted. Potential issues that arise from the presence of a Digital Footprint can include hackers accessing other users’ personal information from the traces they leave online. This can lead to theft, stalking, blackmail, etc. WORK/LIFE BALANCE Why is ensuring an appropriate work/life balance, in relation to ICT access, important? Nowadays, technology has enabled us to become increasingly efficient in work, as well as making it more convenient. This also relates to leisure, with technology creating new means for entertainment and maintaining social ties. Even though technology is a great thing, users must be wary not to overuse it, as well as prioritising work and lifestyle needs. The strategies provided might help maintain this balance between work and life, as well as eliminating any stress that comes from them.

• Take time off from work, and when you do, relax and enjoy the time fully. Use this time to catch up with your family, and undertake activities that rejuvenate you. This break from work is critical in restoring your mental and physical strength.

• Create a program or timetable scheduling work and leisure activities, and

follow up on it. This will help you become more committed to it and you’ll be more likely to undertake those activities.

• Make the schedule maintainable. If something is not already part of your

schedule, it isn’t realistic to expect that you’ll start to do it regularly. It is better to start off slow, and eventually make it a regular activity. This will stop you from procrastinating the activity due to overestimating your capabilities.

• Personalise your schedule and activities. Don’t get caught up in trendy

balance activities if they don’t fit your tastes. Spend time doing the things you really love to do. Doing things you love will benefit you more than doing things you dislike.

!"#"$%&'("$")*+,-".' 5'!

• Be gentle with yourself when pursuing a balanced lifestyle. You can’t expect

to achieve and maintain a fully balanced lifestyle over a day. It takes time, and you may even fail. Don’t let this put you down. Continue and try again, in little steps.

RIGHTS OF CONTENT CREATORS - COPYRIGHT What are some ways of protecting the rights of content creators? Copyright It is the exclusive and assignable legal right given to the copyright owners of media such as text, artistic works, music, computer programs, sound recordings and films, but only for a certain period of time. This enables them to reproduce the material, and gives them the right to perform or show the work to the public. They can also prevent others from reproducing or communicating their work without consent, as well as being able to sell these rights to someone else. Copyright is important as it promotes the progress of various creations, as well as preventing a risk of engaging in illegal copying by accident due to a lack of knowledge. Fair Dealing The fair dealing provisions allow limited use of copyright material for certain purposes without requiring permission from the copyright owner. Fair dealing only applies to certain purposes: research or study, criticism or review, parody or satire, news reports, court proceedings or professional advice. The work being copied must be a legal copy, although you do not need to own a copy of the material (i.e. you can borrow material from the library, etc.). The amount of work copied is limited to 10% or 1 chapter whichever is greater. Private Use It is the copying of material for your own personal and domestic use. The work copied must be legal as well. It is different from Fair Dealing, in the sense that:

• You must own a copy of the material being reproduced.

• Works can be copied in full.

• Copies can be lent or shared with anyone.

• Purpose of copying must be for your own private use. Moral Rights They are about being properly credited when your work is used and displayed. It connects the work with their creator. It requires that your name be shown with your work at all times. It also requires that your work be treated in a way that it doesn’t hurt your reputation. This means that no one can alter it without permission. Moral rights begin when a work is created, and continue for your lifetime, and up to 70 years after your death. You cannot give away your moral rights. They are for you only.

!"#"$%&'("$")*+,-".' 6'!

What are the relevant sections of the Australian Copyright Act in relation to digital technologies and products? Relevant sections (as exhibited in the 1968 Australian Copyright Act) that relate to digital technologies and products can be found in:

• ‘Part 2: Interpretation’, • ‘Part 3: Copyright in Original literary, dramatic, musical and artistic works’, • ‘Part 5: Remedies and offences’, • ‘Part 6: Copyright Tribunal of Australia’, • And ‘Part 9: Moral rights of performers and of authors of literary, dramatic,

musical or artistic works and cinematograph films’.

These parts of the Australian Copyright Act covers content concerning non-infringement, copyright, actions relating to copyright infringement, licensing, and moral rights. These parts are divided into sections with more specific detailing of the said features. They are important, as they give an in-depth description of the different aspects of digital technologies and products to give users a better understanding of them. It also outlines the various aspects of copyright, such as obtaining a licence for various creations, protecting works from infringement and how not to violate the Act. INTELLECTUAL PROPERTY AND CREATIVE COMMONS What is Intellectual Property? Intellectual property (IP) is essentially the creations of the mind, and can range from a new invention, brand, design or artistic creation. Intellectual property rights are the legally recognized exclusive rights these creations. Having these rights are important, as it gives IP owners time and opportunity to exploit their creation, with a sure safety of their potential content from infringers. There are different types of IP protection. Sometimes, IP does not need to be registered in order to be of value. Each type of IP protection provides different competitive advantages for its users: - Registered Design: Protects the visual design, shape or appearance of a product. - Trademark: A trademark identifies the particular goods or services of a trader as distinct from those of other traders. - Patent: Grants the inventor the right to exclude others from making, using, selling, offering to sell, and importing an invention for a limited period of time, in exchange for the public disclosure of the invention. - Copyright: Gives the creator of original work exclusive rights to its original expression of its ideas, but not the ideas themselves, and only for a limited time.

!"#"$%&'("$")*+,-".' 7'!

- Trade Secrets and Confidential Information: Gives creators certain rights and privileges depending on the type of IP protection. - Plant Breeder’s Rights: Protects the commercial rights of new plant varieties. What is Creative Commons? Creative Commons is a non-profit organization that works to increase the creativity (cultural, educational, and scientific) available in “the commons” — the body of work that is available to the public for free and legal sharing, use, repurposing, and remixing. CONCLUSION Users should have a good understanding of the Internet, its features, as well as potential issues that may arise, including content infringement and harassment. This report is to reinforce the knowledge of users and make them more aware of what an online space holds, and the pros and cons of its use, in order to protect themselves and their digital content as well as that of other users.

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email protected]@9HE/7D/I'EGH174R#@1&R7I1ED0&4I87/AEHL083!!"#$!%&'!#()*+!,OED0&4!T7/AEHL083!O0/71;<!U7/!O&R7!S84087!=---><!.//91?@@AAAB37/1&R7E84087BEH3@1ED0&4V87/AEHL083@1ED0&4V87/AEHL083V10/71@!!%0/D.744<!Q1.47'!"#$!%&'!#()*+!;)#!/091!REH!1&R7!1ED0&4!87/AEHL083;<!T7/AEHL!-EH4F!=---><!.//9?@@AAAB87/AEHLAEH4FBDEM@DEMMG80/'@/091VREHV1&R7V1ED0&4V87/AEHL083!!"#*!%&'!#()*+!,5'K7HKG44'083;<!5'K7H1M&H/!=---><!.//9?@@AAABD'K7H1M&H/B3ECB&G@/[email protected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`80C7H10/'!=---><!.//9?@@AAA#BE978B&DBGL@1/GF78/1@D&H77H1@_EKV177L083@F030/&4VREE/9H08/!!a.&HK&D<!%7F!"#*!%&'!#()*+!,Q!UH7&/!UG0F7!S8!\7&D.083!O/GF78/1!QKEG/!2030/&4![EE/9H08/;<!bFGD&/0E8&4!\7D.8E4E3'!&8F!%EK047!c7&H8083!=---><!.//9?@@AAAB7FGD&/EH1/7D.8E4E3'BDEM@#()$@(*@&V3H7&/V3G0F7VE8V/7&D.083V1/GF78/1B./M4!!"#*!%&'!#()*+!,\.7!dHEK47M!A0/.!-EHL@c0R7!N&4&8D7;<!QM7H0D&8!%&8&37M78/!Q11ED0&/0E8!=---><!.//9?@@AAAB&M&87/BEH3@/H&08083@&H/0D471@\.7VdHEK47MVA0/.V-EHLVc0R7VN&4&8D7B&19X!!

!"#$%&"'()*'+%,')-.*/'012'2&3"#4"53678'9:%"'1;'12'<999=8':"">?@@$$$A5>%B;"&%C5%AD3EA%B@B6F#&;"%6F56DG56"#CC#4"B%CG>&3>#&",@$:%"G5;G5>@5>G>&3"#4"536@''()*'+%,')-.*/'09:%"'1;'16"#CC#4"B%C'2&3>#&",H78'16"#CC#4"B%C'2&3>#&",'IJ>C3&#&'<999=8':"">?@@56"#CC#4"B%C>&3>#&",#J>C3&#&A43K@$:%"G5;G56"#CC#4"B%CG>&3>#&",@''()*'+%,')-.*/'02#&;36%C'L;#78'M3>,&5D:"'NOO54#'<999=8':"">?@@$$$AB65K#CPA#FBA%B@43>,&5D:"@56O3&K%"536@O%;"O56F@>#&;36%CB;#A:"KC''()*'+%,')-.*/'09:%"'1;'":#'1K>3&"%64#'3O'M3>,&5D:"H78'Q;R'<999=8':"">?@@$$$A%;RA43K@SB#;"536@$:%"G5;G":#G5K>3&"%64#G3OG43>,&5D:"''()*'+%,')-.*/'0T%5&'U#%C56D78'M3>,&5D:"'NOO54#'<999=8':"">?@@$$$AB65K#CPA#FBA%B@43>,&5D:"@56O3&K%"536@O%;"O56F@O%5&F#%C56DA:"KC''()V'+%,')-.*/'09:%"'%&#'K3&%C'&5D:";H78'Q&";'W%$'M#6"&#'3O'QB;"&%C5%'<999=8':"">?@@$$$A%&";C%$A43KA%B@C#D%C@&%$GC%$@$:%"G%&#GK3&%CG&5D:";@''()V'+%,')-.*/'0M3>,&5D:"'Q4"'.XYZ'(M":/78'[%&\#"']%F#'<999=8':"">;?@@^%F#AP%&6#"A43KA%B@]%F#A:"KC_%&"54C#`).Z)*V''()V'+%,')-.*/'09:%"'5;'M&#%"5E#'M3KK36;78'M&#%"5E#'M3KK36;'<999=8':"">?@@$5R5A4&#%"5E#43KK36;A3&D@5K%D#;@a@aV@M&#%"5E#43KK36;G$:%"G5;G4&#%"5E#G43KK36;b#6DA>FO''''