+ All Categories
Home > Documents > Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.

Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.

Date post: 14-Jan-2016
Category:
Upload: erik-greene
View: 216 times
Download: 0 times
Share this document with a friend
Popular Tags:
32
Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young
Transcript
Page 1: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.

Submitted by Group Cinco

Leslie BealRebecca Shurett

Helen Young

Page 2: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.

The following presentation is an overview of three important issues involving digital citizenship.

The topics addressed are:

NetiquetteNetiquette

Digital Responsibility and RightsDigital Responsibility and Rights

Digital HealthDigital Health

The topics discussed herein may be used as an introduction to digital citizenship as it relates to the topics, and may be shared with staff and students.

Page 3: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.
Page 4: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.

Netiquette is a set of standards of behavior that should be followed by those who communicate using electronic means.

Page 5: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.

When communicating electronically, remember that the person receiving the communication can’t see you, or hear you.

Write clearly and plainly so that your message will not be misconstrued.

Refrain from writing in all capital letters…

IT’S LIKE SHOUTING!

Page 6: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.

What would you do if you, or someone you know, had been receiving electronic messages that were progressively threatening in nature?

Respond with equally threatening messages. Ignore them. Notify your service provider. Notify the police.

Page 7: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.

Cyber bullying is when one person is threatened, harassed, humiliated or otherwise targeted by another person using the Internet, interactive and digital technologies or mobile phones.

Never respond or reply to these types of messages.

Ignore the messages, if possible.

If the messages continue, notify the police and/or your service provider.

Page 8: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.

There are two kinds of cyber bullying, direct attacks and cyber bullying by proxy.

Some effects of cyber bullying include actual physical harm, emotional distress, and depression in the victim.

In some cases, the victim will become the attacker. This can create a vicious cycle where the both people continue to send increasingly hurtful messages.

Page 9: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.

Talk to children about the consequences of cyber bullying, teach them to respect others.

If you are angry at someone, don’t send them an electronic message. Sometimes we write things in a message that we would never say to the person face-to-face.

Set a good example by taking a stand against bullying of all kinds.

Page 10: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.

Don't open e-mail from unknown senders, from senders with non-standard addresses, or with unusual words in subject lines. This confirms for the sender that your e-mail address is valid and opens the door for spammers to target you.

Think before you forward e-mail. When you forward e-mail, you are giving out personal information such as the e-mail addresses of the person who sent it to you.

Sometimes you may receive emails asking for personal information. You should never reply to these types of e-mails, in most cases the person asking wants your information in order to steal your identity.

Page 11: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.

Many people are under the misconception that “private” electronic communications are “private.”

Be careful about the personal information you post on the web.

Keep in mind that perspective colleges and employers will investigate your on-line behavior. The information they find could be a deciding factor as to whether you are accepted to the college, or offered the job.

Page 12: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.

A cyber bully can be just as dangerous as someone who bullies you in person.

All electronic communications are private. It is okay to send threatening messages as a

joke. You should never open an e-mail from someone

you don’t know. Colleges and employers consider your online

behavior before acceptance or hiring.

Page 13: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.

For more information about on-line netiquette, visit the following web sites:

www.TeensHealth.org www.iKeepSafe.org www.becybersmart.org www.netsmartz.org www.getnetwise.org www.playitcybersafe.com www.staysafeonline.org www.stopcyberbullying.org

Page 14: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.

Digital Digital ResponsibilityResponsibility

Page 15: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.

Electronic responsibility for actions and deeds which is either ethical or unethical.

Page 16: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.

Information on the Internet is:

A. available for anyone to use as they want.B. easily used in documents because you are

allowed to cut and paste.C. copyrighted and should be treated as other’s

property.D. unreliable and should not be used as a

source.

Page 17: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.

Sharing musical orentertainmentfiles online among friends and family.

Page 18: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.
Page 19: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.

Digital rights are freedoms extended to every student,

administrator, teacher, parent, or

community member.

Digital Digital RightsRights

Page 20: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.

If someone puts copyrighted material on the Internet and another person wants to use it, that person should:A. use it, if is for a good purpose.B. take it, use what you want.C. not use the information because it is too much trouble.D. ask permission from the author or at least cite the source.

Page 21: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.

In schools, students should be able toaccess all information online to protect freedom of access for everyone.

Page 22: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.
Page 23: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.

Digital health refers to themany health issues that areaffecting both adults and children as a result of computer use.

Page 24: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.
Page 25: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.
Page 26: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.

CTS -Carpal Tunnel Syndrome

Eye strain Eye Irritation Headache Back ache

Page 27: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.

CTS is a painful, debilitation condition.

It is caused by several factors such as genetic predisposition, health and lifestyle, and repetitive motion. Most cases found in children are from

repetitive motion (keyboard use, game controllers, and computer mouse use)

Page 28: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.

Caused by lack of self-awareness in children.

They lock their eyes onto the computer screen for long periods of time.

The eyes become more wide open than normal.

They blink less, causing dry, red, and irritated eyes.

Page 29: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.

Caused by: Less than optimal lighting.

Staying in the same position for prolonged periods of time.

Glare on the computer screen.

Adult-sized work stations that do not fit a child’s body.

Page 30: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.

Create workstations that fit a child’s size.

Create areas with proper lighting (dimmer than normal classroom lighting).

Watch for screen glare.

Take frequent breaks to relax and stretch.

Page 31: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.
Page 32: Submitted by Group Cinco Leslie Beal Rebecca Shurett Helen Young.

1. Computers and Healthhttp://www.indiana.edu/~uitspubs/f026/Retrieved 10/11/20072. American Optometric Associationhttp://www.aoa.org/x5379.xmlRetrieved 10/11/20073. MSU-Computer Science and Engineeringwww.cse.msu.edu/facility/avoid-ct.phpRetrieved 10/17/20074. Computer Ergonomicshttp://www.leeds.ac.uk/lsmp/healthadvice/computerergonomics/computergonomics.htmRetrieved 10/17/2007


Recommended