   Appropriate and responsible behavior with technology use
   Too often we are seeing students as well as adults misusing
    and abusing technology but not sure what to do.
    The issue is more than what the users do not know but what
    is considered appropriate technology usage.
   The topic of digital citizenship is certainly gaining momentum
    not only in the United States but around the world.
    Whether the it is called digital citizenship, digital wellness or
    digital ethics the issues are the same; how should we act
    when we are online, and what should be taught to the next
    generation is extremely important
   Etiquette: electronic         Security: electronic
    standards of conduct           precautions to
    or procedure                   guarantee safety
   Communication:                Literacy: process of
    electronic exchange            teaching and learning
    of information
                                   about technology and
   Access: full electronic        the use of technology
    participation in society
   Commerce: electronic          Law: electronic
    buying and selling of          responsibility for actions
    goods                          and deeds
   Health & Wellness:            Rights & Responsibilities:
    physical and                   those freedoms
    psychological well-            extended to everyone in
    being in a digital             a digital world
    technology world
   Typing tends to go faster for adept keyboard users,
    which many youngsters have become since they
    have essentially grown up with computers in the
    household
   This makes note taking easier. When notes and
    assignments are saved to a computer, there’s less
    likelihood of them getting lost, especially if important
    files are routinely backed up
   Data saved on a computer can easily be
    manipulated into a number of different formats,
    potentially making it easier to study
   Bodies of text can be transformed into charts or pie
    graphs with many word processing programs.
    Students can cut and paste important quotes or
    examples into essays and the like, saving time on
    homework
   The decline of penmanship is one of them
   In a digital era, people are less likely to write letters by hand or
    keep up with penmanship in other ways. Some children don’t
    know what cursive handwriting is and may never learn how to
    sign their names in “script,” which was a common lesson for
    other generations
   While digital communication does promote social interactions
    on some levels, there are some who argue that spending too
    much time staring at a screen and keyboard compromises the
    social aspect of going to school and learning in a classroom.
    Today’s youth are less likely to “talk,” choosing to “LOL” and
    “TTYL” through texting
   Digital devices may be great learning tools, but they also offer a
    number of distractions to students. When a student is supposed
    to be taking notes on a laptop in the classroom, he or she might
    be downloading music, updating social networking sites,
    streaming video, or checking celebrity gossip
   Appropriate behavior and conduct while using the
    internet and other digital tools
   Forward-thinking schools make netiquette the
    student's Internet hall pass. Here are some of the
    basics:
   Don't SHOUT in all caps
   Remember: The person on the other end of a digital
    communication can't see your expression or hear
    your tone of voice
   Cool off before responding to messages in anger
   Check messages for misspellings or misstatements
   Respect others' privacy and your own (for
    example, don't give your number to that new
    MySpace friend)
   Use a clear and understandable email subject
    line
   Adjust your tone and style to the situation (for
    example, don't use IM-speak or all lowercase
    letters in an internship application)
   Don't forward private messages to people they
    weren't intended for or copy others on replies
    to personal messages
   Remember: Email is never really private and a
    copy may exist in cyberspace . . . forever
   Keep your password secure by keeping it to yourself
   Have more than one
   Make it easy to remember but difficult to figure out
   A strong password
   Is at least eight characters long
   Does not contain your user name, real name, or
    company name
   Does not contain a complete word
   Is significantly different from previous passwords
   Contains characters from each of the following four
    categories
Character category                Examples
Uppercase letters                 A, B, C
Lowercase letters                 a, b, c
Numbers                           0, 1, 2, 3, 4, 5, 6, 7, 8, 9
Symbols found on the
keyboard (all
                                  `~!@#$%^&*()_
keyboard characters
                                  -+={}[]|:;"'<>,
not defined as letters
                                  .?/
or numerals) and
spaces


    A password might meet all the criteria above
     and still be a weak password. For example,
     Hello2U! meets all the criteria for a strong
     password listed above, but is still weak
     because it contains a complete word. H3ll0 2
     U! is a stronger alternative because it
     replaces some of the letters in the complete
     word with numbers and also includes spaces.
   Create an acronym from an easy-to-remember
    piece of information
       For example, pick a phrase that is meaningful to you, such
        as My son's birthday is 12 December, 2004. Using that
        phrase as your guide, you might use Msbi12/Dec,4 for your
        password
   Substitute numbers, symbols, and misspellings for
    letters or words in an easy-to-remember phrase
        For example, My son's birthday is 12 December, 2004
        could become Mi$un's Brthd8iz 12124 (it's OK to use
        spaces in your password)
   Relate your password to a favorite hobby or sport.
    For example, I love to play badminton could
    become ILuv2PlayB@dm1nt()n.
   Cyber bullying" is when a child, preteen or
    teen is tormented, threatened, harassed,
    humiliated, embarrassed or otherwise
    targeted by another child, preteen or teen
    using the Internet, interactive and digital
    technologies or mobile phones.
   It has to have a minor on both sides, or at
    least have been instigated by a minor
    against another minor.
   Once adults become involved, it is plain
    and simple cyber-harassment or cyber
    stalking. Adult cyber-harassment or cyber
    stalking is NEVER called cyber bullying.
   There are two kinds of cyber bullying
   Direct attacks (messages sent to kids
    directly)
   Cyber bullying by proxy (using others to help
    cyber bully the victim, either with or without
    the accomplice's knowledge)
   Because cyber bullying by proxy often gets
    adults involved in the harassment, it is much
    more dangerous.
   Preventing cyber bullying
     › Educating the kids about the consequences helps. Teaching
       them to respect others and to take a stand against bullying of all
       kinds helps too.
     › Think about what you are doing to someone and think would
       you want that done to you?

   What is the school's role in this? 
    When schools try and get involved by disciplining the student for
    cyber bullying actions that took place off-campus and outside of
    school hours, they are often sued for exceeding their authority and
    violating the student's free speech right.

   What's the parents' role in this?
    Parents need to be the one their kids can go when things go wrong
    online and offline. Yet they often are the one place kids avoid when
    things go wrong online.
Cameron was beautiful. Here's her story:

Cameron liked a senior
boy, and his girlfriend didn't like that.She texted Cameron saying
   "go kill yourself" multiple times. Finally,She couldn't take it
 anymore. Cameron ended up hanging herself in her closet. I
   miss her, and I hope that none of you will ever have to go
 through what my school and I did after her death. I love you
             Cameron. May you forever rest in peace.
   http:

//www.stopcyberbullying.org/preventi
    on/index.html
   http:

//windows.microsoft.com/en-
    US/windows-vista/Tips-for-creating-a-strong-
    password
   http:

//specialsections.suntimes.com/educa
    tion/prek12/7931047-555/pros-and-cons-to-
    learning-in-a-digital-age.html
   http:

//www.edutopia.org/whats-next-2008-
    netiquette-guidelines
   http:

//www.digitalcitizenship.net/Nine_Elem
    ents.html

Digitalcitizenship

  • 2.
    Appropriate and responsible behavior with technology use  Too often we are seeing students as well as adults misusing and abusing technology but not sure what to do.  The issue is more than what the users do not know but what is considered appropriate technology usage.  The topic of digital citizenship is certainly gaining momentum not only in the United States but around the world.  Whether the it is called digital citizenship, digital wellness or digital ethics the issues are the same; how should we act when we are online, and what should be taught to the next generation is extremely important
  • 3.
    Etiquette: electronic  Security: electronic standards of conduct precautions to or procedure guarantee safety  Communication:  Literacy: process of electronic exchange teaching and learning of information about technology and  Access: full electronic the use of technology participation in society  Commerce: electronic  Law: electronic buying and selling of responsibility for actions goods and deeds  Health & Wellness:  Rights & Responsibilities: physical and those freedoms psychological well- extended to everyone in being in a digital a digital world technology world
  • 4.
    Typing tends to go faster for adept keyboard users, which many youngsters have become since they have essentially grown up with computers in the household  This makes note taking easier. When notes and assignments are saved to a computer, there’s less likelihood of them getting lost, especially if important files are routinely backed up  Data saved on a computer can easily be manipulated into a number of different formats, potentially making it easier to study  Bodies of text can be transformed into charts or pie graphs with many word processing programs. Students can cut and paste important quotes or examples into essays and the like, saving time on homework
  • 5.
    The decline of penmanship is one of them  In a digital era, people are less likely to write letters by hand or keep up with penmanship in other ways. Some children don’t know what cursive handwriting is and may never learn how to sign their names in “script,” which was a common lesson for other generations  While digital communication does promote social interactions on some levels, there are some who argue that spending too much time staring at a screen and keyboard compromises the social aspect of going to school and learning in a classroom. Today’s youth are less likely to “talk,” choosing to “LOL” and “TTYL” through texting  Digital devices may be great learning tools, but they also offer a number of distractions to students. When a student is supposed to be taking notes on a laptop in the classroom, he or she might be downloading music, updating social networking sites, streaming video, or checking celebrity gossip
  • 6.
    Appropriate behavior and conduct while using the internet and other digital tools  Forward-thinking schools make netiquette the student's Internet hall pass. Here are some of the basics:  Don't SHOUT in all caps  Remember: The person on the other end of a digital communication can't see your expression or hear your tone of voice  Cool off before responding to messages in anger  Check messages for misspellings or misstatements
  • 7.
    Respect others' privacy and your own (for example, don't give your number to that new MySpace friend)  Use a clear and understandable email subject line  Adjust your tone and style to the situation (for example, don't use IM-speak or all lowercase letters in an internship application)  Don't forward private messages to people they weren't intended for or copy others on replies to personal messages  Remember: Email is never really private and a copy may exist in cyberspace . . . forever
  • 8.
    Keep your password secure by keeping it to yourself  Have more than one  Make it easy to remember but difficult to figure out  A strong password  Is at least eight characters long  Does not contain your user name, real name, or company name  Does not contain a complete word  Is significantly different from previous passwords  Contains characters from each of the following four categories
  • 9.
    Character category Examples Uppercase letters A, B, C Lowercase letters a, b, c Numbers 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 Symbols found on the keyboard (all `~!@#$%^&*()_ keyboard characters -+={}[]|:;"'<>, not defined as letters .?/ or numerals) and spaces  A password might meet all the criteria above and still be a weak password. For example, Hello2U! meets all the criteria for a strong password listed above, but is still weak because it contains a complete word. H3ll0 2 U! is a stronger alternative because it replaces some of the letters in the complete word with numbers and also includes spaces.
  • 10.
    Create an acronym from an easy-to-remember piece of information  For example, pick a phrase that is meaningful to you, such as My son's birthday is 12 December, 2004. Using that phrase as your guide, you might use Msbi12/Dec,4 for your password  Substitute numbers, symbols, and misspellings for letters or words in an easy-to-remember phrase  For example, My son's birthday is 12 December, 2004 could become Mi$un's Brthd8iz 12124 (it's OK to use spaces in your password)  Relate your password to a favorite hobby or sport. For example, I love to play badminton could become ILuv2PlayB@dm1nt()n.
  • 11.
    Cyber bullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones.  It has to have a minor on both sides, or at least have been instigated by a minor against another minor.  Once adults become involved, it is plain and simple cyber-harassment or cyber stalking. Adult cyber-harassment or cyber stalking is NEVER called cyber bullying.
  • 12.
    There are two kinds of cyber bullying  Direct attacks (messages sent to kids directly)  Cyber bullying by proxy (using others to help cyber bully the victim, either with or without the accomplice's knowledge)  Because cyber bullying by proxy often gets adults involved in the harassment, it is much more dangerous.
  • 13.
    Preventing cyber bullying › Educating the kids about the consequences helps. Teaching them to respect others and to take a stand against bullying of all kinds helps too. › Think about what you are doing to someone and think would you want that done to you?  What is the school's role in this?  When schools try and get involved by disciplining the student for cyber bullying actions that took place off-campus and outside of school hours, they are often sued for exceeding their authority and violating the student's free speech right.  What's the parents' role in this? Parents need to be the one their kids can go when things go wrong online and offline. Yet they often are the one place kids avoid when things go wrong online.
  • 14.
    Cameron was beautiful.Here's her story:

Cameron liked a senior boy, and his girlfriend didn't like that.She texted Cameron saying "go kill yourself" multiple times. Finally,She couldn't take it anymore. Cameron ended up hanging herself in her closet. I miss her, and I hope that none of you will ever have to go through what my school and I did after her death. I love you Cameron. May you forever rest in peace.
  • 15.
    http:

//www.stopcyberbullying.org/preventi on/index.html  http:

//windows.microsoft.com/en- US/windows-vista/Tips-for-creating-a-strong- password  http:

//specialsections.suntimes.com/educa tion/prek12/7931047-555/pros-and-cons-to- learning-in-a-digital-age.html  http:

//www.edutopia.org/whats-next-2008- netiquette-guidelines  http:

//www.digitalcitizenship.net/Nine_Elem ents.html