Cite World

download Cite World

of 21

Transcript of Cite World

  • 8/12/2019 Cite World

    1/21

    JCSD-aw

    Citizenshipin an e-World

    Johnston Community School District

  • 8/12/2019 Cite World

    2/21

    JCSD-aw

    "Character is what

    you do when no one

    is watching."

    Citizenship = Character

  • 8/12/2019 Cite World

    3/21

    JCSD-aw

    Digital Citizenship

    the responsible use of technology,

    including ethics, etiquette,

    security and responsibility

  • 8/12/2019 Cite World

    4/21

    JCSD-aw

    Establishing e-Habits

    Why would people demonstrate less

    citizenship while using technology and

    online tools?

    Online, people can feel invisible and

    capable of doing things they normally

    wouldn't do in person or in public - things

    that they know might be wrong.

  • 8/12/2019 Cite World

    5/21

    JCSD-aw

    Digital Ethics

    1. Positively communicate, share and contributeto society

    2. Use in a respectful manner

    3. Use courteously in communication4. Avoid harming others

    5. Share network resources

    6. Be honest and trustworthy

    7. Honor property rights and copyrights

    8. Give proper credit for intellectual property

  • 8/12/2019 Cite World

    6/21

    JCSD-aw

    Digital Etiquette

    Am I aware of others when I use technology?Or them of me?

    Digital Etiquette: electronic standards ofconduct or protocol

    Users need to realize how their use of

    technology affects others.

  • 8/12/2019 Cite World

    7/21

    JCSD-aw

    What do you think?

    Should people answer a cell phone while

    having a face-to-face conversation with

    someone?

    Should students use text messaging to

    send messages during class?

  • 8/12/2019 Cite World

    8/21

    JCSD-aw

    Digital Etiquette in

    Communication Am I using technology appropriately when I

    communicate with others?

    Digital Communication: electronic exchangeof information

    All users of digital technologies need to

    understand the rules and options when usingdigital communication.

  • 8/12/2019 Cite World

    9/21

    JCSD-aw

    Digital Security

    How do I protect my technology in a digitalsociety? How do I protect myself?

    Digital Security (self-protection): takingnecessary precautions to guarantee electronicdigital safety and self safety

    All users of digital technologies need tounderstand and be able to protect themselvesand equipment from harm.

  • 8/12/2019 Cite World

    10/21

    JCSD-aw

    What do you think?

    Is it OK for users to share usernames and

    passwords?

    What happens if security isnt adequate on

    a server?

  • 8/12/2019 Cite World

    11/21

    JCSD-aw

    Digital Security in Commerce

    Am I aware of the opportunities and problemsassociated with purchasing items usingtechnology.

    Digital Commerce: electronic buying andselling of goods

    Users need to be more aware of how topurchase goods and services through digitalformats.

  • 8/12/2019 Cite World

    12/21

    JCSD-aw

    What do you think?

    What safety precautions need to be in

    place when purchasing goods online?

  • 8/12/2019 Cite World

    13/21

    JCSD-aw

    Digital Responsibility

    When I use technology, am I being responsible?

    Digital Responsibility: electronic responsibility

    for actions and deeds which is either ethical orunethical

    All users of digital technologies need to beaccountable for how they use digitaltechnologies.

  • 8/12/2019 Cite World

    14/21

    JCSD-aw

    What do you think?

    What are some strategies that companies

    or schools can put in place to hold users

    accountable and responsible?

  • 8/12/2019 Cite World

    15/21

    JCSD-aw

    Computer Crime

  • 8/12/2019 Cite World

    16/21

    JCSD-aw

    Department of Justice categorizes

    computer crime in three ways:

    1. The computer as a target - attacking thecomputers of others (spreading viruses is anexample).

    2. The computer as a weapon - using a computerto commit "traditional crime" that we see in thephysical world (such as fraud or illegalgambling).

    3. The computer as an accessory - using acomputer as a "fancy filing cabinet" to storeillegal or stolen information.

  • 8/12/2019 Cite World

    17/21

    JCSD-aw

    Hackers

    Hackers invade privacy

    Hackers destroy property" in the form of

    computer files or records

    Hackers injure other computer users by

    destroying information systems

    Hackers crash systems that cause them tomalfunction and not work

  • 8/12/2019 Cite World

    18/21

    JCSD-aw

    Pirates

    Computer "Pirates" steal intellectual

    property

    Copyright violations have civil and criminal

    remedies

    Sue for money to cover loss of sales

    Jail or fine paid to the government due to

    infringement for gain

  • 8/12/2019 Cite World

    19/21

    JCSD-aw

    Copy/PasteIs it Plagiarism?

    Plagiarism refers to the taking and using of

    someone else's words or ideas and

    passing them off as your own.

    It is dishonest, unethical and can be

    illegal.

  • 8/12/2019 Cite World

    20/21

    JCSD-aw

    Copyright Laws

    Music 30 seconds or 10% of song

    Graphics

    Clipart free sites; do not alter images Audio

    10% or 30 seconds

    Text

    10% of works; exact text in a project needs to be cited

    See Brief Notes: Multimedia Copyright document (on website)

  • 8/12/2019 Cite World

    21/21

    JCSD-aw

    Presentation Citation

    Cyberethics for Teachers: A lesson plan outline.

    http://www.cybercrime.gov/rules/lessonplan1.htm October 18, 2007.

    United States Department of Justice: Computer Crime and Intellectual

    Property Section. http://www.cybercrime.gov/cyberethics.htm October 18,2007.

    The Cyber Citizen Partnership. http://www.cybercitizenship.org/October 18,

    2007.

    Digital Citizenship. http://coe.ksu.edu/digitalcitizenship/index.htmOctober 18,

    2007.

    http://www.cybercrime.gov/rules/lessonplan1.htm%20October%2018http://www.cybercrime.gov/cyberethics.htm%20October%2018http://www.cybercitizenship.org/http://coe.ksu.edu/digitalcitizenship/index.htmhttp://coe.ksu.edu/digitalcitizenship/index.htmhttp://www.cybercitizenship.org/http://www.cybercrime.gov/cyberethics.htm%20October%2018http://www.cybercrime.gov/rules/lessonplan1.htm%20October%2018