Download presentation
1
Communicating in a Digital Society
2
Internet Uses in the Workplace
Communicating in a Digital Society Understanding Copyright and Social Networking Social Media Sites
3
Objectives Explain how employers ensure appropriate use of the Internet in a professional setting. Describe the importance of digital society. Understand the importance of copyright and social networking in the workplace. Internet Security
4
Objectives Describe the elements of digital communication.
Explain intellectual property and what it includes. Discuss the important of the Electronic User’s Bill of Rights. Discuss use of social media, etc. In the workplace.
5
Digital Communication Digital Citizen
Is the exchange of information through electronic means. Using technology in the workplace, requires users to be responsible!!! Someone who is regularly and skillfully engaging in the use of technology, e.g., internet, computers and other digital devices. Digital communication is composted of digital literacy and digital citizenship.
6
According to the US federal government, digital literacy skills include:
Using computer or mobile devices, e.g. mouse, keyboard, icons, folders, Using software and applications. Using the Internet to conduct research, , and register on websites. Helping children learn to be responsible for making on- line decisions. . Digital Literacy The ability to use technology to locate, evaluate, communicate, and create information.
7
Good digital citizenship focuses on using technology in a positive manner rather than negative or illegal purposes. Digital Citizenship The standard of appropriate behavior when using technology to communicate.
8
Social Media
9
What is Social Media? Social media is the interaction among people in which they create, share or exchange information and ideas in virtual communities and networks
10
Ethics – are the principals of what is right and wrong that help people make decisions. .
Ethical actions are those that apply ethics and moral behavior. Unethical actions are those that involve immoral behavior, crime, or theft while online. These actions can be punishable by law.
11
Using the Internet to harass or threaten an individual
Includes social media, text messages, or e- mails to harass or scare a person with hurtful words or pictures. Victims of cyberbullying cannot be seen or touched by the bully but doesn’t mean that a person cannot be harmed by his/her actions. Cyberbullying Using the Internet to harass or threaten an individual Cyberbullying is unethical and a person can be prosecuted.
12
Flaming Spamming Unacceptable behavior; purposefully insulting someone and inciting an argument on social media. Sending unwanted s or intentionally flooding an individual’s social media site or inbox with unwanted messages.
13
Etiquette Netiquette The art of using good manners in any situation Aka. digital etiquette, is etiquette used when communicating electronically.
14
Social Media Forms of electronic communication (as Web sites for social networking and microblogging) through which users create online communities to share information, ideas, personal messages, and other content (as videos)
15
Forms include Social media technologies take on many different forms including magazines, Internet forums, weblogs, social blogs, microblogging, wikis, social networks, podcasts, photographs or pictures, video, rating and social bookmarking.
16
Social Media in the Workplace
Social media can mean many things, and includes all means of communicating or posting information or content of any sort on the Internet. This including to your own or someone else’s web log or blog, journal or diary, personal web site, social networking or affinity web site, web bulletin board or chat room, whether or not associated or affiliated with the company, as well as any other form of electronic communication. This includes but not limited to Facebook, Twitter, Tumblr, Flickr, Instagram, etc.
17
Social Media You are entirely responsible for what you post online.
Before creating online content, consider some of the risks and rewards that are involved.
18
Social Media Keep in mind that any of your conduct that adversely affects your job performance, the performance of fellow employees, or otherwise adversely affects clients, customers, vendors, suppliers, or people who work on behalf of the company’s legitimate business interests, may result in disciplinary action up to and including termination. tinnitus tinnitus
19
Social Media at Work Do not use social media while at work or on company equipment, unless it is work- related and authorized. Do not use your company to register on blogs, social networks, or other forms of social media.
20
Advantages of Social Media
Social skills. Social networking allows people to keep up with current friends and make new ones. When used in the right way, social media can increase self-esteem and help someone feel less isolated. Independence and self-expression. Creating your own “home page” allows people to express themselves and discuss their interests. They can join groups and support fan pages, and find out about other people’s interests. Digital competence. Technology is evolving faster than ever before. As teens and young adults learn to adapt to new technologies (or new applications of existing technologies), they will be better equipped to adapt to future technology.
21
Educational development
Educational development. Young adults in secondary and post-secondary education will often use social networking to discuss schoolwork and share discussions about assignments. • Research. Young adults can gather information about topics that are hard to discuss with others, such as drug use and sexual health.
22
Additional advantages for youth with disabilities: Social networking can open up a new world of communication, integration, and community participation. Young adults can express themselves, including their thoughts and feelings, more easily and without fear of the rejection or stigma they may experience in real life. May be more willing to ask for help online than in face-to-face situations. Help improve social skills by socializing anonymously.
23
Disadvantages of Social Media Use
Sharing one’s personal information with the wrong crowd. Young adults need to be aware that information given out online could also put them at risk of victimization. People looking to do harm could use posted information to identify them or gain their trust. They can also be deceptive by pretending to know a young person. Encourage young people to privatize their online social networking accounts (such as Facebook and Twitter
24
Bullying. Harassment may occur online only (cyberbullying), or it may spill over to offline bullying committed by a person who has located his victim online. Cyberbullying can cause significant emotional harm resulting in depression, anger, school avoidance, violence, and suicide. • The permanency of online profiles. Once information has been shared on the Internet, it’s out there — forever! Retrieving information that others have read and captured is nearly impossible. Inappropriate pictures, captions, and comments could come back to haunt youth as they start applying to colleges or looking for jobs.
25
Disclosure. People tend to be far bolder and less discretionary with information shared online versus in person. This means there is a greater risk of giving out information including the presence of a disability that, given a second thought, we might not have wanted to disclose.
26
• Additional potential risks for youth with disabilities: Social networking may further isolate those who may already feel isolated or not included, and can ultimately lead to depression and loneliness. Also, young adults with disabilities must make important life decisions regarding disclosure of their disability (if, how, when, and to whom). Unintended disclosure is possible by posting pictures or becoming fans of disability support groups, for example. While this might not be an issue, it makes the “disclosure” discussion even more important. For more information on disability disclosure, see The 411 on disability disclosure: A workbook for youth with disabilities (available online at: disclosure ) and Cyber Disclosure for Youth with Disabilities (available online at: ).
27
Social Media at Work Know the company rules! Be respectful!
Post honest and accurate information!! All content posted should be appropriate and respectful
28
Social Media more terminology …
Viral: Anything shared across social networks that get passed along rapidly. YouTube videos are a great example. B2B: Business to Business. B2C: Business to Consumer. Hashtag: HubSpot defines a hashtag as a "word or string of characters that starts with a number sign." Identical hashtags are then grouped into a search thread. Trending: A word, phrase or topic that is popular on Twitter at a given moment. Blog: A site updated frequently by an individual or group to record opinions or information. Social Media more terminology …
29
Having poor netiquette can have legal ramifications.
Netiquette includes accepted social and professional guidelines for Internet communication. They apply to: s, social networking, and other contact with customers and peers via the Internet during working hours. Having poor netiquette can have legal ramifications. Ex. All caps is “yelling”. This is not acceptable. Always use correct capitalization, spelling, and grammar.
30
Slander Libel Speaking false statements about someone that causes others to have a bad opinion of him or her. Publishing a false statement about someone that causes others to have a bad or untrue opinion of him/her.
31
Slander and libel can be considered crimes of defamation.
It is important to choose words carefully when making comments about others online and in person.
32
Remember: Digital Footprint
What you post on the Internet never really goes away,. Even if you delete something you have posted on the Internet, it is stored in your digital footprint. Always “THINK” before you post on social media sites, e- mails, etc. What you post on-line today could risk your future college and job opportunities. Is a data record of all an individual’s online activities.
33
Intellectual Property
34
Intellectual property… fyi
The Internet provides countless sources for obtaining text, images, video, audio, and software. Even though this material is easily obtainable, it doesn’t mean that it’s available for you to use any way you choose. Laws exist to govern the use of media and creative works. The creators or owners of this material have certain legal rights.
35
Intellectual property
Intellectual property laws protect a person’s or company’s inventions, artistic works, and other intellectual property. Intellectual property Is something that comes from a person’s mind, such as an idea, invention, or process.
36
Use standard methods for citing sources. (Modern Language Association)
Plagiarism Claiming another person’s material as your own, which is both unethical and illegal.
37
Piracy Piracy carries a heavy penalty, including fines and incarceration. The unethical and illegal copying or downloading of software, files, and other protected material. Ex. Images, movies, and music.
38
Electronic User’s Bill of Rights
Details the rights and responsibilities of both individuals and institutions regarding the treatment of digital information. Articles are not legally binding, but contain guidelines for the appropriate use of digital information.
39
Using the Internet An important aspect of digital citizenship is respecting your employer’s property and time. Internet access provided by the company should be used only for business purposes. Example: checking personal or playing a game on-line is unacceptably.
40
Acceptable Use Policy Employees are typically made aware of the acceptable use policies during training before they are allowed access to the company’s computers and network. set of rules that explains what is and is not acceptable for use of company-owned and operated equipment and networks.
41
Cloud computing makes private digital information accessible from any device.
Sometimes, your employer may have to give you permission to use it at work because of filters that prevent unauthorized Internet surfing or visiting selected websites during working hours. Cloud Computing Using remote servers to store and access data over the Internet rather than on a personal computer or local server.
42
Censorship The practice of examining material, such as online content, and blocking or deleting anything considered inappropriate. Employers are legally allowed to censor information that employees read on the Internet during work hours.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.