digital citizenship project technology and education ed 505 by: tina totora

36
DIGIT A L CITIZENSHIP PROJEC T TECHNOLOGY AND ED UCATION ED 505 BY: TINA T OTORA

Upload: melvin-bailey

Post on 25-Dec-2015

221 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

DIGITAL

CITIZENSHIP

PROJECT

TECHNOLOGY AND E

DUCAT ION

ED 505

BY: T

I NA

TOTO R A

Page 2: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

  Rules of etiquette that apply when communicating overcomputer networks, especially the Internet. (Dictionary.com)

 

Page 3: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

Social Media

Forms of electronic communication (as Web sites for social networking and micro-blogging) through which users create online communities to share information, ideas, personal messages, and other content (as videos). (Merriam-webster.com)

Page 4: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

Social Media Netiquette

Social Media Netiquette refers to the rules of behavior or good manners (etiquette) that apply to interactive websites.

Page 5: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

Do• Do keep messages short and sweet.• Do confirm that you have received an e-mail,

even if it’s with a simple, “thank you.”• Do remember the human connection. In other

words, what you do or say has an impact or others. Keep this in mind and use your words in a positive manner.

Page 6: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

Don’t• Don’t say something over the internet or post pictures of yourself

unless you don’t mind if the whole world sees it, even your mom.

• Don’t share personal information such as your birthday, e-mail address, address – EVER! (This one isn’t so much about netiquette as safety -don’t do it!)

• Don’t forward jokes, spam, or cute stories unless you know the receiver wants it.

• Don’t use all capital letters. It comes across as shouting.

Page 7: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

Copyright and Fair Use

Copyright: the exclusive legal right to reproduce, publish, sell, or distribute the matter and form of something (as a literary, musical, or artistic work.) (Merriam-webster.com)

Fair Use: a legal doctrine that portions of copyrighted materials may be used without permission of the copyright owner provided the use is fair and reasonable, does not substantially impair the value of the materials, and does not curtail the profits reasonably expected by the owner. (Merriam-webster.com)

Page 8: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

What’s the difference?

Copyrights protect the owner or author of original works by giving that person the right to control reproduction, distribution, changes to his/her work, public performance, and/or translation into other languages or media. Fair use allows people to use the copyrighted material without the author’s permission in limited instances. Some common examples of fair use are news reporting, research, and teaching.

Page 9: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

Things to Consider:

1.) Purpose

2.) Nature

3.) Amount

4.) Market Effect

Fair Use Rules for Media (print, music, video, photographs, poetry, etc.):

Page 10: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

1.) Purpose – What is the intended use of the media? (Is it educational?)

2.) Nature – What’s the nature of the media? (Is it readily available?)

3.) Amount – How much of the entire work will be used? (Is it just a small amount needed to emphasize or spice up your work?)

4.) Market Effect – Will the proposed use damage or affect the sales of the original product?

Page 11: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

Plagiarism The act of stealing or passing off (the ideas or words of another) as one's own : use (another's production) without crediting the source. (Merriam-webster.com).

Page 12: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

Ways to avoid plagiarism:

1.) Paraphrase – Read the information and then put it in your own words.

2.) Cite the source. There are great sites on the Internet, such as Son of Citation machine (http://citationmachine.net), which makes citing the source very easy to do.

3.) Quotations – When quoting information, write it exactly as it appears. You must also cite the quote, which usually means citing the page or paragraph number.

4.) Bibliography or Reference Page – Be sure to include a page at the end of your research paper of all works cited.

Page 13: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

There are several websites that teachers may use to recognize and stop plagiarism. Some of them are:

http://turnitin.com

www.grammarly.com

www.writecheck.com

www.dustball.com

Technological tools to help teachers recognize and stop plagiarism:

Page 14: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

Identity theft is when someone steals your personal information to use as his/her own. It is a serious crime which could ruin your good credit, finances, and reputation.

SAFETY ON THE INTERNET

Page 15: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

To prevent identity theft on the Internet:

1.) Never give out personal information over the phone, through the mail, or over the Internet unless you’re positive of the company’s identity or you made the initial contact.

2.) Make sure your browser is secure. Encryption software will scramble information sent over the Internet. There will be a lock icon on the status bar of the Internet browser when it’s safe to transmit information. Make sure the lock is on before sending personal or financial information. 3.) Use a wipe utility program to overwrite your hard drive before disposing of an old computer.

4.) Use solid passwords that are hard to crack.

Page 16: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

Reputation Management:

A person or company’s reputation can easily be damaged or ruined on the Internet. Someone could post false information and a simple Google search would display this false information for the world to see. There are numerous companies that manage this information. However, the cost of reputation management providers is not cheap, ranging from hundreds to tens of thousands of dollars.

Page 17: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

Passwords:

Use passwords that are strong. If you must write your password down, keep it in a secure location. Use a mnemonic strategy to create a strong password that you can easily remember. For example, “I love my dog, Blue,” could become 1lmdB.

Page 18: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

Cyberbullying:

When people bully others electronically, this is called cyberbullying. Examples include posting rumors, embarrassing pictures, or videos on social networking sites; sending mean emails or text messages; and creating fake profiles of the victim.

Page 19: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

Cyberbullying can have devastating consequences. There have been numerous cases in which the victim has committed suicide due to cyberbullying. The seriousness of cyberbullying needs to be addressed at an early age, and parents need to be aware of what sites their children and visiting and what they’re posting. Additionally, if someone is a victim of cyberbullying or knows of someone who is being bullied electronically, that person should speak up and tell an adult.

Page 20: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

Cyberstalking & Cyberharrassment

When someone uses the Internet or other electronic communications to repeatedly track, threaten, or harass another person, this is called cyberstalking. Cyberstalking and cyberharrassment are often used interchangeably.

Page 21: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

Harassment or harassing communications.(b)(1) HARASSING COMMUNICATIONS. A person commits the crime of harassing communications if, with intent to harass or alarm another person, he or she does any of the following:

a. Communicates with a person, anonymously or otherwise, by telephone, telegraph, mail, or any other form of written or electronic communication, in a manner likely to harass or cause alarm.

b. Makes a telephone call, whether or not a conversation ensues, with no purpose of legitimate communication.

c. Telephones another person and addresses to or about such other person any lewd or obscene words or language.

Nothing in this section shall apply to legitimate business telephone communications.(2) Harassing communications is a Class C misdemeanor.

There are laws against this behavior. In Alabama, it is Ala. Code § 13A-11-8. (http://www.ncsl.org/issues-research/telecom/cyberstalking-and-cyberharassment-laws.aspx)Section 13A-11-8

Page 22: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

There are ways to handle cyberstalking and minimize the chances of becoming a victim to this crime.

http://abcnews.go.com/Technology/We_Find_Them/ways-handle-prevent-cyber-harassment/story?id=15973742

1.) Recognize the situation for what it is and do not respond to this person.

2.) Make a copy of the message, video, or photo. Copy and paste the URL of the webpage that it’s happening on and then take a screenshot of the page.

3.) Contact the website operators to request that they take down the content immediately. Let them know that a case will be filed with the local police department and keep calling and emailing until it’s removed.

How to Handle Cyberstalking

Page 23: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

4.) Contact your local police department to file a complaint with the Internet Crime Complaint Center.

5.) Make sure that your social networking profiles are set to the maximum level of privacy.

6) Be careful about which forums or sites you visit and do not participate in sites that allow anonymous posts, such as Topix.com.

7.) Use Google Alerts, which will send you notifications by email when your name appears online.

Cyberstalking

Continued…

Page 24: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

8.) Don’t share personal information or tell stories about your personal life when using any social network or online forum.

9.) Find and remove your personal information from Spokeo.com.

http://internet-safety.yoursphere.com/2010/06/spokeo-the-internet-white-pages-for-stalkers

Cyberstalking Continued…

Page 25: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

How to remove your personal information from the Spokeo database:

• Go to Spokeo.com and search your name.• Go to the address bar at the top of your browser and copy the URL (your

name should be in the URL).• Once you’ve done that, click on the tiny “Privacy” link in the bottom right

corner.• Paste that URL into the box called “URL” and provide your email address for

the confirmation that your profile has been removed from their database.

You will find this and more information from the following website: http://internet-safety.yoursphere.com/2010/06/spokeo-the-internet-white-pages-for-stalkers

Page 26: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

Viruses: A computer virus is a program that enters a computer without the knowledge of the operator. Some viruses are mild and only cause messages to appear on the screen, but others are destructive and can wipe out the computer’s memory or cause more severe damage. (http://dictionary.reference.com)

Computer Safety

Page 27: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

Phishing: a scam by which an e-mail user is duped into revealing personal or confidential information which the scammer can use illicitly (http://www.merriam-webster.com)

Page 28: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

Trojan horses: a seemingly useful computer program that contains concealed instructions which when activated perform an illicit or malicious action (as destroying data files); also :the concealed instructions of such a program (http://www.merriam-webster.com)

Page 29: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

Worms: a usually small self-contained and self-replicating computer program that invades computers on a network and usually performs a destructive action(http://www.merriam-webster.com)

Page 30: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

2.) Do not open emails or attachments from people you do not know.

3.) Even if you do know the person, avoid opening attachments ending in .dat .exe .js .scr

Computer Safety 1.) Install an anti-virus and an anti-spyware program.

Page 31: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

4.) Never give out personal information over the Internet.

5.) Be very cautious with using another person’s USB drive, as viruses and malware can be transferred this way. (If possible, transfer files through e-mail instead.)

Page 32: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

6.) Watch out for Internet pop-ups. They often look legitimate, but when you click on it, the virus is transferred. If the pop-up looks authentic but warns you of a problem that needs immediate attention, close the warning and check it out by opening your anti-virus software to see if the warning is still there. If it’s not, then you know it was a scam. Update your anti-virus program and run a full scan.

Safety Cont…

Page 33: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

7.) Clear your browser’s cache often, as viruses can be stored in your computer’s temporary files.8.) Schedule your Windows update to download patches and upgrades automatically.

Also….

Page 34: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

Works Cited

Dictionary.com. (2012, November 13). Retrieved from http://Dictionary.reference.com

Encyclopedia britannica company. (2012). Retrieved from http://www.merriam-webster.com/dictionary

(n.d.). Retrieved from https://www.google.com/imghp?hl=en&tab=wi

Fair use: Borrowed and captured media. (n.d.). Retrieved from http://citl.indiana.edu/services/instructionalTechnology/fairuse.php

Kay, M. (2010, June 01). Spokeo – the internet white pages for stalkers. Retrieved from http://internet-safety.yoursphere.com/2010/06/spokeo-the-internet- white-pages-for-stalkers/

Page 35: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

State cyberstalking and cyberharassment laws. (2012, November 16). [0]. Retrieved from http://www.ncsl.org/issues-research/telecom/cyberstalking- and-cyberharassment-laws.aspx

Hoal, M. K. (2012, March 22). 5 ways to handle and prevent cyber-harassment. Retrieved from http://abcnews.go.com/Technology/We_Find_Them/ways- handle-prevent-cyber-harassment/story?id=15973742

Works Cited Continued…

Page 36: DIGITAL CITIZENSHIP PROJECT TECHNOLOGY AND EDUCATION ED 505 BY: TINA TOTORA

By: Tina Totora