Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
INTERNET and CODE OF CONDUCT
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Issues Raised by ICT.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Lathrop Intermediate School Cyber Savvy Week December 1 – December 5, 2014 Be RespectfulBe ResponsibleBe Safe Science Classrooms – Thursday, December 4,
Digital Citizenship Project
A Guide to Digital Citizenship
D IGITAL C ITIZENSHIP. Definition: The informal rules of behavior to be followed when using the Internet N ETIQUETTE.
Digital Citizenship By: Miranda Scorver.
Digital Citizenship Jessica L. Webb ED 505. Netiquette Netiquette Social Media- interactive dissemination of information through the internet. Netiquette-
Computer Programming I
Mrs. Jefferson Business Information Management I.
Computer Ethics for Computer Users
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
OBJECTIVE 3 ELECTRONIC COMMUNICATIONS. USES OF COMPUTING Pros Made tasks such as clerical work and computing easier and faster Buying, banking, and paying.
Digital Citizen Project Katie Goodall Educational Technology 505.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
A guide to netiquette, copyright & fair use, plagiarism, internet and computer safety By Briana Horton.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Digital Citizenship Created By: Kelli Stinson June 2011.
Digital Citizenship Project Jared Smith ED 505. Netiquette on Social Media Sites  Netiquette on Social Media Sites is “the social code of using social.
Digital Citizenship Project By Allen Naylor Ed 505.
Digital Citizenship By: Amanda Thurber. Netiquette on Social Media Sites According to networketiquette.net, netiquette is the social code of the internet.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
BRADLEY BARNES DIGITAL CITIZENSHIP. NETIQUETTE ON SOCIAL MEDIA SITES Netiquette is the etiquette guidelines that govern behavior when communicating on.
ED 505: Magen Anthony. Netiquette on Social Media site is the etiquette or guideline for posting on social media or other online sites. This helps individuals.
Digital Citizenship By Lori Gray.
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
© 2010 Pearson Education, Inc. | Publishing as Prentice Hall. Computer Literacy for IC 3 Unit 3: Living Online Chapter 2: Searching for Information.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Issues for Computer Users, Electronic Devices, Computer and Safety.
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Computers Are Your Future Twelfth Edition
Physical Safety Issues
Digital Citizenship.
DIGITAL CITIZENSHIP What You Should Know!.
IT Security  .
Physical Safety Issues
Computer Literacy – Grade 8
Electronic Communications
Internet And Online Community Week 10
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Video: Digital citizenship is defined as the norms of appropriate,
Internet Safety and Acceptable Use Policies.
BCT 2.00 Analyze Technology Issues
Internet Safety Vocabulary
Chapter 13 Security and Ethical Challenges.
Computer Programming I
HOW DO I KEEP MY COMPUTER SAFE?
Computer Literacy – Grade 8
LEGAL TERMS IN DIGITAL MEDIA
ICT Communications Lesson 3: Internet Life and Privacy
Student User Agreement and Policy 2022
Physical Safety Issues
Your Digital Footprint
What devices use the internet?
Privacy, Security, and Ethics
Presentation transcript:

Chapter 15 Digital Citizenship

Section 15.1 Communicating in a Digital Society

Copyright Goodheart-Willcox Co., Inc. May not be posted to a publicly accessible website. Objectives Describe the elements of digital communication. Explain intellectual property and what it includes. Discuss the importance of the Electronic User’s Bill of Rights.

Copyright Goodheart-Willcox Co., Inc. May not be posted to a publicly accessible website. Key Terms digital communication digital citizen digital literacy cyberbullying netiquette slander libel digital footprint intellectual property plagiarism infringement public domain open source

Copyright Goodheart-Willcox Co., Inc. May not be posted to a publicly accessible website. Essential Question How does digital citizenship impact society as a whole?

Copyright Goodheart-Willcox Co., Inc. May not be posted to a publicly accessible website. Digital Communication Digital communication is the exchange of information through electronic means. A digital citizen is someone who regularly and skillfully engages in the use of technology. Two components of digital communication: –Digital literacy –Digital citizenship

Copyright Goodheart-Willcox Co., Inc. May not be posted to a publicly accessible website. Digital Communication (continued) Digital Literacy –Digital literacy is the ability to use technology to locate, evaluate, communicate, and create information. –Digital literacy skills include using a computer or mobile device, software and applications, and the Internet; communicating online; and helping children learn to be responsible online.

Copyright Goodheart-Willcox Co., Inc. May not be posted to a publicly accessible website. Digital Communication (continued) Digital Citizenship –Digital citizenship is the standard of appropriate behavior when using technology to communicate. –People who participate in a digital society have a legal responsibility for their online actions, whether ethical or unethical. –Cyberbullying is using the Internet to harass or threaten an individual.

Copyright Goodheart-Willcox Co., Inc. May not be posted to a publicly accessible website. Digital Communication (continued) Digital Citizenship –Netiquette is etiquette used when communicating electronically. –Slander is speaking a false statement about someone that causes others to have a bad opinion of him or her. –Libel is publishing a false statement about someone that causes others to have a bad or untrue opinion of him or her. –A digital footprint is a data record of all of an individual’s online activities.

Copyright Goodheart-Willcox Co., Inc. May not be posted to a publicly accessible website. Intellectual Property Intellectual property is something that comes from a person’s mind. Plagiarism is claiming another person’s material as your own. A copyright is the exclusive right to copy, license, sell, and distribute material. Infringement is any use of copyrighted material without permission.

Copyright Goodheart-Willcox Co., Inc. May not be posted to a publicly accessible website. Intellectual Property (continued) A Creative Commons (CC) license is a specialized copyright license that allows free distribution of copyrighted work. Public domain refers to material that is not owned by anybody and can be used without permission. A patent gives a person or company the right to be the sole producer of a product for a period of time.

Copyright Goodheart-Willcox Co., Inc. May not be posted to a publicly accessible website. Intellectual Property (continued) A trademark protects taglines, slogans, names, symbols, and any unique method to identify a product or company. A service mark is similar to a trademark, but identifies a service rather than a product. Open source applies to software that has had its source code made available to the public at no charge.

Copyright Goodheart-Willcox Co., Inc. May not be posted to a publicly accessible website. Intellectual Property (continued)

Copyright Goodheart-Willcox Co., Inc. May not be posted to a publicly accessible website. Intellectual Property (continued)

Copyright Goodheart-Willcox Co., Inc. May not be posted to a publicly accessible website. Electronic User’s Bill of Rights The Electronic User’s Bill of Rights details the rights and responsibilities of both individuals and institutions regarding the treatment of digital information. –Article I: Individual Rights –Article II: Individual Responsibilities –Article III: Rights of Educational Institutions –Article IV: Institutional Responsibilities

Copyright Goodheart-Willcox Co., Inc. May not be posted to a publicly accessible website. Review 1.List the components of digital communication. Digital communication includes digital literacy and digital citizenship. 2.What actions are considered cyberbullying? Cyberbullying is using the Internet to harass or threaten an individual. It is using social media, text messages, or s to harass or scare a person with hurtful words or pictures. Even though a victim of cyberbullying cannot be physically seen or touched by the bully, this does not mean the person cannot be harmed by his or her actions.

Copyright Goodheart-Willcox Co., Inc. May not be posted to a publicly accessible website. Review 3.Name two unethical uses of another person’s intellectual property. Plagiarism is claiming another person’s material as your own, which is both unethical and illegal. Piracy is the illegal copying or downloading of software, files, or other protected material, including images, movies, and music. 4.What does a licensing agreement allow? A licensing agreement is a contract that gives one party permission to market or produce the product or service owned by another party.

Copyright Goodheart-Willcox Co., Inc. May not be posted to a publicly accessible website. Review 5.What does the Electronic User’s Bill of Rights provide? The Electronic User’s Bill of Rights details the rights and responsibilities of both individuals and institutions regarding the treatment of digital information.

Section 15.2 Internet Use in the Workplace

Copyright Goodheart-Willcox Co., Inc. May not be posted to a publicly accessible website. Objectives Explain how employers ensure appropriate use of the Internet in a professional setting. Describe the importance of digital security.

Copyright Goodheart-Willcox Co., Inc. May not be posted to a publicly accessible website. Key Terms acceptable use policy Internet protocol address cookies spyware firewall

Copyright Goodheart-Willcox Co., Inc. May not be posted to a publicly accessible website. Essential Question How can unacceptable Internet use by an employee affect a company as a whole?

Copyright Goodheart-Willcox Co., Inc. May not be posted to a publicly accessible website. Using the Internet An important part of digital citizenship is respecting your employer’s property and time. An acceptable use policy is a set of rules that explains what is and is not acceptable use of company-owned and company-operated equipment and networks. Censorship is the practice of examining material and blocking or deleting anything considered inappropriate.

Copyright Goodheart-Willcox Co., Inc. May not be posted to a publicly accessible website. Using the Internet (continued) The Internet protocol address is a number used to identify an electronic device connected to the Internet; also known as an IP address. Cookies are bits of data stored on your computer that record information about the websites you have visited. Phishing is tricking someone into giving out personal and financial information. Malware is a term given to software programs that are intended to damage, destroy, or steal data.

Copyright Goodheart-Willcox Co., Inc. May not be posted to a publicly accessible website. Using the Internet (continued) Spyware is software that spies on a computer. Trojan horses are malware disguised to appear as a useful or common application. Worms are similar to Trojan horses, except they self-replicate. A software virus is a program that negatively impacts the computer. A firewall is a program that monitors information coming into a computer.

Copyright Goodheart-Willcox Co., Inc. May not be posted to a publicly accessible website. Digital Security Identity theft is an illegal act that involves stealing someone’s personal information and using that information to commit theft or fraud. Create a security plan –Secure passwords –Security settings –Back up your computer

Copyright Goodheart-Willcox Co., Inc. May not be posted to a publicly accessible website. Digital Security (continued)

Copyright Goodheart-Willcox Co., Inc. May not be posted to a publicly accessible website. Review 1.Explain why following an acceptable use policy is an example of ethical behavior. Internet access provided by the company should be used only for business purposes. Most companies have an established acceptable use policy. An acceptable use policy is a set of rules that explains what is and is not acceptable use of company-owned and company- operated equipment and networks. Employees are typically made aware of acceptable use policies during training, before they are allowed access to the company’s computers and network.

Copyright Goodheart-Willcox Co., Inc. May not be posted to a publicly accessible website. Review 2.Why should a digital citizen be aware of his or her IP address? An IP address can reveal approximate geographic location. Any s sent from a computer or mobile device have an IP address attached to them. 3.Discuss the importance of digital security. A security plan should be in place for your computer in general and any databases you maintain, as well as any mobile devices you have. Computer technology has made identity theft through digital means the most prevalent. Maintain digital security through the use of an antivirus program and through regular computer backups.

Copyright Goodheart-Willcox Co., Inc. May not be posted to a publicly accessible website. Review 4.Explain how to protect a mobile device from theft. To protect your mobile device from use by a thief, create a password to lock it. Have the number of your mobile device in a safe place so that if the unexpected happens, you can contact your service provider. 5.Why should a computer be backed up on a regular basis? If a virus invades your computer or the hard disk crashes, it may be too late to retrieve your files and computer programs.