Thursday, May 21, 2015

Digital Ettiquette

Code of Conduct:


Do not post any material that can be considered vulgar, obscene or indecent, hateful.

Do not badmouth or harass others while on the net.

Be respectful of others on the net; as you would be in person.

Do not partake in activities that are racially offensive or hurtful in any way.

Respect other peoples' privacy.

Do not copy or plagiarize other people's material.

Do not be an advocate for illegal activities or even remotely discuss illegal activities with intent to commit them.

Internet users' digital footprint is recorded by a private organization, in the event of code of conduct violation; the involved user will be traced and located.

By using the net you are agreeing to this code of conduct.

Violating this code of conduct will get the user in trouble with the law; as it would be committing a crime.

Users  found guilty of the above crimes will be prosecuted and trialed in a court of law.








www.digitalstrategyconsulting.com/codeofconduct/              Digital Citizenship Module Manual 2015

m.uticaod.com/article/20120907/BLOGS/309079938

Digital Rights and Responsibilities

Acceptable Use Policy

This education institutes is now providing internet access. This Acceptable Use Policy is for users of all computers, software and internet access of this institute.

Education Purpose
1.       This network has been put in place for educational purpose only.
2.       The network hasn’t been established as a public service therefore reasonable restrictions have been placed and students are expected to follow the rules accordingly.
3.       The network may not be used for commercial purposes, meaning no one is allowed to offer or buy products or services through the network.

Internet Access
1.       Students can access the internet through the library, computer rooms or classrooms using their personal devices.
2.       Each student or staff member is provided with a login account and security key.
3.       Students should not attempt to go beyond the authorized access.
4.       Students should not deliberately attempt to spread viruses or run the network’s system.

System Security
1.       No one is allowed to use each other’s accounts under any circumstance.
2.       Each student is responsible for their own account.
3.       Any attempt to use another person’s account might get you expelled.  
                                                              
Use of Language
1.       No one is allowed to use any profane, obscene, vulgar language.
2.       Students should not partake in cyberbullying or harassment.

Plagiarism and Copyright
      No one should plagiarize works found on the internet.
      Respect the rights of copyright owners.

All users of the institute’s network should adhere to this policy.
Any violation of this policy will result in offences; which could lead to the culprit being prosecuted, or an investigation being opened.
Possible punishment, sanctions, penalties depends on the severity of the violation.
When using the network be aware that your digital footprint is left behind; which can be referred back to as evidence for the investigation in the event of any policy violation.

http://rs.ed.uiuc.edu/students/rtrieger/charterschoolpolicydraft.htm

Digital Security

When using the internet you are leaving yourself vulnerable to different security issues such as; malware, cyber-criminal lurks, cyberbullying and credit card thefts to name a few. The increased security risk has become a major concern to all globally. Most of the digital users forget to keep themselves safe on the net by forgetting not to always share all their personal details such as their address and phone numbers. Teenagers are especially more vulnerable due to bullying from their peers and them seeing the net as a safe place to just chill and forget about their life troubles; this leads them to trusting the wrong people and anyone looking to listen to them.
We never stop to think of the risks of T&C’s, we usually simply just press the agree button without even reading what we are agreeing to. Unknowingly we are giving companies the right to use our information for other purposes. We are so ignorant to the point that we don’t even realize that our data is being recorded and kept sometimes eve sold. The only way to possibly combat this issue is to set your private setting to the highest possible level and giving minimal personal information.

Types of cyber-crimes:

Phishing/Spoofing
                                                                                         
“The fraudulent practice of sending emails pretending to be from reputable companies in order to induce individuals to reveal personal information”.
Protect your computer with a firewall, spam filters, anti-virus and anti-spyware software
Be cautious of emails from unrecognized senders.
Do not click on links, download files or open attachments in emails from unknown senders
Beware of links in emails that ask for personal information.
Never email personal or financial information, even if you are close with the recipient

Copyright Infringement
 
The use of works protected by copyright law without permission.
Avoid taking anything from the internet because it almost always is copyrighted by default.
Rather always try to be creative than copying.
In case of movies or music rather always buy from trustworthy websites to be on the safe side.

Child Pornography
 
Any visual depiction of sexually explicit conduct involving a minor (someone under 18 years of age).
Sites and search results should be blocked permanently to prevent pedophiles from sharing or accessing those videos.

Identity theft
Criminals access data about someone’s bank account, credit cards, debit card and other sensitive information to withdraw money or to buy things online in the victim’s name.
When conducting online transactions, look for a sign that the site is secure such as a lock icon on the browser’s status bar or a “https:”
Cyber-bullying
                                                          
“Cyber-bullying is the harmful use of the Internet and related technologies to harm other people, in a deliberate, repeated, and hostile manner”.
Cyber bullying can be stopped by: not responding to the bully, not retaliating, keeping the evidence of the whole bullying, reporting the bully and lastly by simply blocking the bully.

Hacking
                                
When someone’s computer is broken into so that his personal or sensitive information can be accessed. The criminal uses a variety of software to enter the person’s computer and the person may not be aware that his computer is being accessed from a remote location.
Always check permissions on the apps before installing and make sure they aren’t accessing unnecessary information. Use a VPN.
Use secure website; it displays the green lock sign by it. This is otherwise known as HTTPS, and it encrypts the data that passes from your device to the internet server, meaning any hackers can’t decipher your private information.
Change all passwords regularly and not use the same passwords across many different services.


Digital Commerce


Currently e-commerce is in its infancy stage in South Africa compared to other countries. There are some issues which prevent the market from soaring such as; consumers not wanting to spend on delivery costs, consumers not wanting to take the chance of paying for something which might not work or fit properly, consumers not always trusting the site enough to take the chance of giving out their personal details due to the increased level of internet theft.

It is very important to be informed, you need to keep up to date with the changing trends so that you are not left behind while the world is moving forward. Plus keeping informed has become so easy that it’s impossible not to do so from reading newspapers to TV and the internet.

Plagiarism is a very serious offence therefore it is very important to keep these guidelines in mind:
Making sure to always citing all your sources that have helped you in doing your work.
Always paraphrasing even when you have cited the work.
Always present citation for information that can be considered general knowledge.
If not sure whether something should be cited or not; it’s always better to be safe that not by going ahead and citing it regardless.
We must all be ethical writers when borrowing other people’s work.

Safety tips for online auctions include:
Always read your T&C’s before agreeing to anything on any site.
Make sure to check the identity of your seller.
Be informed enough about the product your are buying.
Check the mode of payment safety. Is the site secure enough, does it have a lock; those are the questions you should be asking yourself.




Digital Communication

Clash of Clans is a game that requires critical thinking and planning. Players build their own village, set up defenses and create their own army. Players then collaborate with other players to form clans. The aim is to attack other players’ villages to earn points to advance in the game. This game is played globally which means it is a very social game as it allows you to connect with people worldwide. This game is highly addictive and time consuming.



Some people may say that this game is not worth the effort however it is a very pleasant game for youngsters. This game has quite a number of pros which are: being able to recover after a bad event, being able to work in teams, teamwork is key as it give you a sense of belonging and being able to analyse and keep track of a number of info at once.




I have concluded that this game is quiet educational as it gets you to analyse, plan your strategy however it is not a game kids can play without supervision because they will be in contact with quiet a massive number of strangers who could potentially be good or bad.

Digital Citizenship and Digital Access

Nine elements of digital citizenship are:
Digital access
This refers to complete electronic participation in community. We as a society are not all fortunate when it comes to technology. We must therefore all work together to balance the inequality. As digital citizens we need to help in expanding access to technology.

Digital rights and responsibilities
Refers to the privileges and responsibilities that come with using digital technologies. As digital citizens we must make sure not to partake in cyberbullying, be aware of our netiquette and report offenders.

Digital commerce
This is buying and selling products online. As a society we are increasingly moving towards online commerce. As there are perks, there are also dangers that come with it. Therefore we must be alert and learn how to be effective in this new digital economy.

Digital literacy
Refers to teaching and learning about technology and actually using the technology. As digital citizens we need to acquire information literacy skills and processing skills to be able to adapt with the emerging new technologies.

Digital communication
This refers to the way we share information or data. Nowadays we have access to many communication methods. This means that we are constantly up to date with most things going on as we are in constant contact with one another anytime and anywhere in the world.

Digital etiquette
Refers to how we should conduct ourselves online. We should be responsible digital citizens online. We should not do anything that would be inappropriate and shameful.

Digital security
Refers to measures we take to protect ourselves. As digital citizens we are responsible for our own safety. That’s why we opt for virus protections, data backups anti-theft. All this to take precautions.

Digital law
Refers to being responsible for what we do online and also following and respecting the rules set. As digital citizens we must make sure not to be unethical online. We must respect each other’s privacy, work etc.

Digital health and wellness
Refers to our physical and psychological wellbeing in the digital space. Certain digital citizens’ wellbeing is affected when some start developing an addiction to the internet, eyesight problems. All these issues can be prevented through sufficient technology education and training.


Www.digitalcitizenship.net                                         education.cu-portland.edu