Citizenship in an e-World Johnston Community School District

Citizenship in an e-World Johnston Community School District

Citizenship in an e-World Johnston Community School District JCSD-aw Citizenship = Character "Character is what

you do when no one is watching." JCSD-aw Digital Citizenship the responsible use of technology, including ethics, etiquette, security and responsibility JCSD-aw

Establishing e-Habits Why would people demonstrate less citizenship while using technology and online tools? Online, people can feel invisible and capable of doing things they normally wouldn't do in person or in public - things that they know might be wrong. JCSD-aw

Digital Ethics 1. Positively communicate, share and contribute to society 2. Use in a respectful manner 3. Use courteously in communication 4. Avoid harming others 5. Share network resources 6. Be honest and trustworthy 7. Honor property rights and copyrights

8. Give proper credit for intellectual property JCSD-aw Digital Etiquette Am I aware of others when I use technology? Or them of me? Digital Etiquette: electronic standards of conduct or protocol Users need to realize how their use of technology affects others.

JCSD-aw What do you think? Should people answer a cell phone while having a face-to-face conversation with someone? Should students use text messaging to send messages during class?

JCSD-aw Digital Etiquette in Communication Am I using technology appropriately when I communicate with others? Digital Communication: electronic exchange of information All users of digital technologies need to understand the rules and options when using

digital communication. JCSD-aw Digital Security How do I protect my technology in a digital society? How do I protect myself? Digital Security (self-protection): taking necessary precautions to guarantee electronic digital safety and self safety All users of digital technologies need to

understand and be able to protect themselves and equipment from harm. JCSD-aw What do you think? Is it OK for users to share usernames and passwords? What happens if security isnt adequate on a server?

JCSD-aw Digital Security in Commerce Am I aware of the opportunities and problems associated with purchasing items using technology. Digital Commerce: electronic buying and selling of goods Users need to be more aware of how to purchase goods and services through digital

formats. JCSD-aw What do you think? What safety precautions need to be in place when purchasing goods online? JCSD-aw Digital Responsibility

When I use technology, am I being responsible? Digital Responsibility: electronic responsibility for actions and deeds which is either ethical or unethical All users of digital technologies need to be accountable for how they use digital technologies. JCSD-aw What do you think?

What are some strategies that companies or schools can put in place to hold users accountable and responsible? JCSD-aw Computer Crime JCSD-aw

Department of Justice categorizes computer crime in three ways: 1. The computer as a target - attacking the computers of others (spreading viruses is an example). 2. The computer as a weapon - using a computer to commit "traditional crime" that we see in the physical world (such as fraud or illegal gambling). 3. The computer as an accessory - using a

computer as a "fancy filing cabinet" to store illegal or stolen information. JCSD-aw Hackers Hackers invade privacy Hackers destroy property" in the form of computer files or records Hackers injure other computer users by destroying information systems

Hackers crash systems that cause them to malfunction and not work JCSD-aw Pirates Computer "Pirates" steal intellectual property Copyright violations have civil and criminal remedies Sue for money to cover loss of sales

Jail or fine paid to the government due to infringement for gain JCSD-aw Copy/Paste Is it Plagiarism? Plagiarism refers to the taking and using of someone else's words or ideas and passing them off as your own. It is dishonest, unethical and can be

illegal. JCSD-aw Copyright Laws Music 30 seconds or 10% of song Graphics Clipart free sites; do not alter images

Audio 10% or 30 seconds Text 10% of works; exact text in a project needs to be cited See Brief Notes: Multimedia Copyright document (on website) JCSD-aw

Presentation Citation Cyberethics for Teachers: A lesson plan outline. http://www.cybercrime.gov/rules/lessonplan1.htm October 18, 2007. United States Department of Justice: Computer Crime and Intellectual

Property Section. http://www.cybercrime.gov/cyberethics.htm October 18, 2007. The Cyber Citizen Partnership. http://www.cybercitizenship.org/ October 18, 2007. Digital Citizenship. http://coe.ksu.edu/digitalcitizenship/index.htm October 18, 2007. JCSD-aw

Recently Viewed Presentations

  • Diagnosis and Remediation of Reading Difficulties

    Diagnosis and Remediation of Reading Difficulties

    Diagnosis and Remediation of Reading Difficulties Facilitator Name & Credentials Reading 415 Week 4 Strategies for Instructional Intervention Week 4 Objectives Identify strategies for intervention in the following areas of reading: phonemic awareness, phonics, vocabulary, fluency, comprehension, and study skills.
  • Play Therapy in Schools: Directive Techniques to Use with ...

    Play Therapy in Schools: Directive Techniques to Use with ...

    Play Therapy in Schools: Directive Techniques to Use with Students. Carroll Bernard Feiling, LCSW, QSSW. ... Exploration of real-life choices. Reality of testing limits. ... Ray, Bratton, Rhine, and Jones (2001) meta-analysis of 94 research studies focusing on the efficacy...
  • AAPI Women Voices: Untold Stories Through Poetry (Grades

    AAPI Women Voices: Untold Stories Through Poetry (Grades

    As your partner shares their poem, think about whether the form shows the answers they shared with you earlier. If it does, great! If not, share what you think is missing and give suggestions on how they can add that!...
  • ENV-5022B Low Carbon Energy - 2017 Low Carbon

    ENV-5022B Low Carbon Energy - 2017 Low Carbon

    In recent years 4 educational building have been built on the campus to strenuous green design guidelines - all of which have the same construction type. EFRY - 1995. Medical School - 2001. ZICER - 2003. Nursing and Midwifery -...
  • The History of Foreign Language Teaching in the U.S.

    The History of Foreign Language Teaching in the U.S.

    What is Communicate Language Teaching? Theory: The primary function of language is communicative. ... "Today we will learn the present progressive to express preferences." ... Have students write during class note taking reinforcement after oral/choral practice Use writing as a...
  • Global Regulation & Nomenclature of Medical Devices

    Global Regulation & Nomenclature of Medical Devices

    UDI and the GMDN (Global Medical Device Nomenclature) Mark Wasmuth Secretary General GMDN Agency * * * * * * * * * * * * * * * * * Contents Background to GMDN & GHTF Development of GMDN...
  • CHET: Compiler and Runtime for Homomorphic Evaluation of ...

    CHET: Compiler and Runtime for Homomorphic Evaluation of ...

    modulus of each coefficient. ????+??−1??−1+…+?1?+?0 ... Utilization of slots in vector. Packing into a vector is a data layout. Example of Matrix Multiplication: C = A x B.
  • Acute care in pt - ptrp2014.weebly.com

    Acute care in pt - ptrp2014.weebly.com

    Be aware of the ICP value and corresponding waveform on the monitor. Sustained elevation in ICP > 5 minutes should be reported to the nurse. Position the pt with the head of the bed at 30 degrees. Position with head...