Digital+Citizenship

When someone talks about being a digital citizen or of digital citizenry, what does this imply? What does it mean to be an American Citizen? When we get involved in a community, it is imperative that we learn the rules and norms of culture so as not only to respect the others, but to keep ourselves safe.

Digital Citizenship is a big component in the ISTE / NETS standards for both students and teachers. The main components are:

When it comes to etiquette, we are all role models and users of the same digital environment. When using technologies, it is smart to always model responsible and respectful behaviors and acceptable use standards. When using digital resources, basing your actions on these socially acceptable norms of use will show others that you respect their right to use the resources and will model correct behavior for those learning about the technologies.
 * Etiquette: **

Communication encompasses all the media that facilitate the exchange of information between individuals, whether it be textual (SMS, IM, e-Mail, etc.), graphical (MMS, photo sites, etc.), or audible (voice). Using and teaching appropriate use of communicative technologies is important. Using a cell phone (during class) to communicate plans after school to a classmate would not be acceptable use; however, using a cell phone (or PDA) to record, document, and exchange information with students pertaining to the lesson is acceptable.
 * Communication: **

Bonding technological innovations and education will always be a goal for researchers and educators. It is important to keep in mind that there are acceptable and unacceptable ways in which to do this. Letting students share vital information (such as quiz answers, etc.) would not be good; however, letting them use PDA's as described in the section above would be.
 * Education: **

The main concern with access is that we, as educators, should not perpetuate the digital divide. By assigning and working with what students can gain access to, we create an environment that offers success. On the other hand, if the students were assigned projects that required certain technologies that were not very abundant and a very short timeline, it could create unnecessary pressure and stress on the student.
 * Access: **

As the internet connects more and more people every day, online commerce grows. Many individuals (including myself) have a tendency to review at least 4 or 5 sites that I think might have either user reviews or competitive prices. While this is great and the internet allows me to do that from home (or my phone), it doesn't protect me. Educating people on using the internet safely for transactions can make a world of a difference. Being unsafe in online purchases can leave your entire life exposed (personal information, bank information, credit information, etc.) and can potentially have long-lasting effects. Using trusted and secure sights are just some of the basics of staying safe online. This can also be seen in keeping yourself safe and secure while using technologies.
 * Commerce: **

When we think about responsibility, let's focus on responsible use of materials and resources. There are many ways to find things on the internet, some are free and some require $$$. It is our responsibility to follow and demonstrate ethical behaviors. I could download a Beastie Boys album from either Limewire or Amazon? Who do you think pays royalties to the band? By exhibiting this behavior we can model appropriate use and ownership of materials and resources that are and aren't our own creations.
 * Responsibility: **

Even though we don't normally associate physical injury with technology use, it is a very real issue. Long hours of computer reading in a dark room, incorrect posture when sitting and typing and overall bad ergonomics can really be a problem in the long run. Some of these problems can arise through eye strain, muscle strain / cramping, carpel-tunnel, etc.
 * Safety: **

Security is both the responsibility of the educator and the student. Some important issues pertaining to security are:
 * Security in an Interconnected World **


 * Viruses and Malware
 * Passwords
 * Going Mobile

Viruses are computer programs (usually executed covertly) that can at least cause inconsistent running patterns or at worse take over and do as it pleases with your computer. Some of the most common types of viruses are:
 * Viruses and Malware: **

Just like with the [|Trojan Horse], Trojan viruses work the same. Under the guise of something relatively harmless, the virus contains multiple threats that will execute when the timing is right (either through clicking on the application, virus scanner checking it, a certain date, etc.) These can be dangerous due to the fact that they are unpredictable at times.
 * Trojan Horses: **

Worms can be even more dangerous than the previously mentioned virus because these search for backdoors and security vulnerabilities in the computer programming. They have the tendency to spread through networks of computers and open up a sort of [|wormhole] between host and infected computers.
 * Worms: **

Malware is normally not as threatening in terms of damage done to files or computer, but can be even more devastating in regards to information security. Some malware can copy files from your harddrive and send them to a server, others (known as Spyware) will just monitor and report on your internet and computer uses so that companies can get a better feel for what consumers do with their technologies (this is a definite breach of privacy).
 * Malware: **

Understanding what these viruses and malware can do is very important. They can easily steal identifiable information, delete important files, and spread themselves (without your knowledge) to other machines.

You can easily avoid many of these by:


 * refraining from downloading [|bootleg] software/files/music. See also // [|Warez] //.
 * not opening emails or attachments from people you don't know.
 * avoiding sites known for downloading content to the host computer.

You can avoid these by keeping your Antivirus up to date and always running. If you don't have one, the [|IT Store] offers it for free as a download.

As you sign up for, or use services on the internet, you are normally required to have a username and a password. Using the same password for everything is not advisable as it can lead to further problems if the wrong person had control of it.
 * Passwords: **

Here are some characteristics of a GOOD password:


 * Contains letters a-z
 * Contains numbers 0-9
 * Contains capitalization AaBb
 * Is NOT a dictionary word - easy for hacking programs to determine
 * Is not the same for every service you use. (i.e. your facebook password should not be your online banking password)

As technology becomes smaller and more portable, we will continue to take more with us on the move. There are many devices that people carry with them almost everywhere they go:
 * Mobility: **


 * Smart Phone
 * PDA
 * Laptop
 * IPad
 * ITouch
 * Etc.

When you think about this, we are all human - we tend to lose things.. If you were to misplace your IPhone, what kind of information would you want to keep safe?


 * Confidential Emails
 * Text Messages
 * Facebook Apps
 * Online Banking Apps

There are a few ways to make sure that this information stays somewhat safe while you try to locate your device.
 * The first one is a Login Password (can either be complex or simple for IPhone users) || [[image:steveneipt3043/IMG_0008.jpg width="256" height="384" caption="IMG_0008.jpg"]] || [[image:steveneipt3043/IMG_0007.jpg width="256" height="384" caption="IMG_0007.jpg"]] ||
 * Or you can use a Login Pattern (for jailbroken IPhones and some Android Devices) - you connect the dots - || [[image:steveneipt3043/IMG_0002.jpg width="256" height="384" align="center" caption="IMG_0002.jpg"]] ||  ||