Top Banner
Presented by: Laverne Hill Media Specialist Lowndes High School With permission from: Howie DiBlasi Emerging Technologies Evangelist Digital Journey [email protected] www.drhowie.com Presentation : 2012
11
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Your e image presentation 2

Presented by:

Laverne HillMedia Specialist

Lowndes High School

With permission from: Howie DiBlasi Emerging Technologies Evangelist Digital [email protected] : 2012

Page 2: Your e image presentation 2

DIGITAL FOOTPRINTS: DIGITAL FOOTPRINTS: WHAT DOES THAT REALLY MEAN?WHAT DOES THAT REALLY MEAN?

Students should understand how to be safe and responsible online and how to create a digital footprint to be proud of today and tomorrow.

Page 3: Your e image presentation 2

TEN COMMANDMENTS OF COMPUTER ETHICS-(K-5)

USED WITH PERMISSION: COPYRIGHT: COMPUTER ETHICS INSTITUTE AUTHOR: DR. RAMON C. BARQUIN

1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's

computer work. 3. Thou shalt not snoop around in other people's files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for

which you have not paid. 7. Thou shalt not use other people's computer

resources without authorization or proper compensation.

8. Thou shalt not appropriate other people's intellectual output.

9. Thou shall think about the social consequences of the program you write or the system you design.

10. Thou shall use a computer in ways that show consideration of and respect for your fellow humans.

Page 4: Your e image presentation 2

THE HIGH/UNIVERSITY CODE OF ETHICS

1) I will not use the technology/communication system to harm, slander, injure or ridicule others.

2) I will not interfere with others’ use of the technology, including opening the files of others without their permission.

3) I will not use the computer to steal. 4) I will not use the computer to misrepresent my

school or myself. 5) I will not copy software for which I have not paid. 6) I will not use equipment without authorization. 7) I will not copy text or ideas from the technology

resources without permission from the author or referencing source.

8) I will be responsible for any consequences that arise from or that are a result of my computing activities.

Page 5: Your e image presentation 2

9) I will use both the equipment and the programs in ways that show consideration, care, and respect.

10) I will be financially responsible and liable for any damages to either hardware or software resources that result from inappropriate or abusive behavior.

11) I will not allow another person to use my logon (ID) and password, nor will I use anyone else's ID and password.

12) I will abide by all rules and regulations of the system as changed or added from time to time by the

administration. 13) I will address all concerns regarding the use of

technology first to the supervising teacher and/or school librarian and then to the administration.

14) I will use the technology/computer system to further my education and will share my growing knowledge with others.

16) I recognize that all students deserve access as conditions permit.

17) I will not violate the terms and conditions of the Authorization for Internet Access as stated below.

18) I will not tamper with or change the computer settings

Page 6: Your e image presentation 2

INTERNET SAFETY

Rules of the Road for Kids

1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s

funny or edgy today could cost you tomorrow. 3. Nothing is private online. Anything you say or do can be copied,

pasted, and sent to gazillions of people without your permission. 4. Assume everyone is watching. There’s a huge, vast audience out

there. If someone is your friend’s friend, they can see everything. 5. Apply the Golden Rule. If you don’t want it done to you, don’t do it

to someone else. 6. Watch the clock. A virtual hug never matches a real one. Balance

your life. 7. Choose wisely. Not all content is appropriate. You know what we

mean. 8. Don't hide. Using anonymity to cloak your actions doesn’t turn you

into a trustworthy, responsible human being. 9. Think about what you see. Just because it’s online doesn’t make it

true. 10. Be smart, be safe. Not everyone is who they say they are. But you

know that.

Page 7: Your e image presentation 2

WHAT IS YOUR DIGITAL FOOTPRINT MOST LIKE? BY TOM JACKSON

Page 8: Your e image presentation 2

traces left by your activity in a digital environment.

All of us, like it or not, are creating these trails.

All kinds of information ABOUT YOU can be found online.

Digital footprints are…….

Page 9: Your e image presentation 2

Will it be insignificant tomorrow, or in five years when you need to apply for college or seek new employment ?.

Page 10: Your e image presentation 2

WHAT DO YOU KNOW ????

Do you know how long what you put online Do you know how long what you put online exists?exists?

Do you know what the standard is for Do you know what the standard is for appropriate and inappropriate online behavior?appropriate and inappropriate online behavior?

Do you know what a digital footprint means?Do you know what a digital footprint means?

Do you know how to take steps to have a Do you know how to take steps to have a digital footprint that you will be proud of today digital footprint that you will be proud of today and tomorrow too?and tomorrow too?

Page 11: Your e image presentation 2

If whatever you do online If whatever you do online can be traced back to you can be traced back to you and it stays forever what and it stays forever what should you put online?should you put online?

Think: Social NetworkingThink: Social Networking