SlideShare ist ein Scribd-Unternehmen logo
1 von 15
QUESTION 4
DIGITAL ETIQUETTE
May 20, 2017May 24, 2017 Deneilia Nadasen
Digital etiquette or netiquette,, as it is some of the time called, is a fundamental arrangement
of tenets you ought to follow keeping in mind the end goal to improve the web for others, and
better for you. It's similarly as essential to treat individuals with politeness and regard online
as it is, all things considered. When you text, visit, or email somebody over the Web, they can't
see your face to tell in case you're prodding them or saying something in delight or a joke. How
would you rehearse great Netiquette? It's straightforward. Simply regard others as you need
to be dealt with, with civility and regard. Individuals know these guidelines however normally
don't tail them when utilizing the Web. This incorporates hacking others PC, downloading
wrongfully, copyright infringement, and utilizing terrible dialect on the Web. (Bethel-Tate,
2017).
INAPPROPRIATE BEHAVIOUR
Wrong conduct in the web may brings about numerous things, things like cyberbullying,
cyberstalking, wholesale fraud, Hacking, undermining other individuals' PC and attacking
individuals' privacy.If you encounter any conduct that you find unseemly, experience hostile
material, or know about any manhandle happening on the web, you should report it to the
fitting experts You ought to likewise obstruct the culpable client or erase them from your
Contact Rundown." Web Wellbeing (2012)
Case of security and protection dangers and who they make you defenseless against:
Overlooking security settings. Security and protection dangers: demolished online notoriety,
digital stalkers, cyberbullies, and youngster predators.
*lying about your age and setting dates with outsiders disconnected. Disconnected dangers:
digital stalkers, tyke predators.
*clicking on each connection you go over. Web security dangers: malware diseases, phishing
locales.
IMPLICATIONS
Youngsters can feel humiliated and mortified. In the event that they're extremely upset this
could prompt self-damage or suicide.
Remember:
You have no control over what happens to photos and videos once they are sent.
Photos and videos can last forever
You put yourself at risk of whenever you share sexually explicit material.” Internet Safety
(2012)
Rule 1: Remember the Human
Rule 2: Adhere to the same standards of behavior online that you follow in real life
Rule 3: Know where you are in cyberspace
Rule 4: Respect other people's time and bandwidth
Rule 5: Make yourself look good online
Rule 6: Share expert knowledge
Rule 7: Help keep flame wars under control
Rule 8: Respect other people's privacy
Rule 9: Don't abuse your power
Rule 10: Be forgiving of other people's mistakes” albion(2011)
CYBERSTALKING
Is the point at which somebody is utilizing gadgets or the web to disturb or to stalk other
individual. This conduct is done for the most part by individuals who are genuine stalkers and
it can brings about other web clients feeling awkward.
CYBERBULLYING
Is a sort of harassing which is done electronically by means of cellphone, PCs and the web
might be web-based social networking, messages and instant messages. This is done for the
most part by young people. The casualties of this sort of harassing as a rule are additionally
tormented face to face. Casualties may experience the ill effects of lower confidence and as a
rule they begin utilizing/overdosing medications or alcohol.(Rouse;2012)
Data fraud
When somebody is utilizing other individuals' profiles as their own. Individuals much of the
time they utilize other individuals' profile to carry out wrongdoings again they may utilize it to
uncover false data about the genuine proprietor.
HACKING
*Getting in to somebody's record without their authorization.
Adulterating OTHER PEOPLE'S PCs
*Deleting other individuals' data without their consent.
Attacking Individuals Protection
*Sharing individuals' private information without counseling them.
CONSEQUENCES
This can prompt somebody being denied access to a specific site or online networking in light
of the fact that the is no site that is advancing misuse or tormenting. Human nobility of the can
be harmed or slighted. Casualties of this wrong conduct for the most part submits suicide since
you find that a specific data was uncovered about them and is a false. Again the separating of
connections of friends,collagues and family may happen.
LOSS OF JOB OPPORTUNITIES
•in many cases previously they procure a man they do a more profound research about that
individual I mean experiencing his/her web life suppose they locate that false data was spread
that you stole from your previous supervisors will despite everything they employ you on the
off chance that they saw that information?
MY Guidelines
•Always abstain from writing with Tops since individuals consider it as perhaps you are irate or
you are yelling.
•Always be human-recall about the individual you are sending the messages to, envision if
similar messages was send to you, in what manner will you feel - if great then you can send.
•Before posting a photo of you and your companion ask his/her authorization first-regardless
of the possibility that it's your telephone.
REFERENCE
Shea, V (1994) THE CORE RULES OF NETIQUETTE. Available
at http://www.albion.com/netiquette/corerules.html[Accessed 24 May 2017]
Inappropriate Behaviour | Internet Safety Available at http://internet-safety-
2012.info [Accessed 24 May 2017]
QUESTION 3
The “Napalm-Girl”
I think this picture is improper, on the grounds that this is a nine years of age young lady who
was stripped and escaping far from the smoke they were encountering a war in her nation.
Despite the fact that society appears to at long last be more alright with parts of life that ought
to have been acknowledged in any case, bareness is as yet an idea that flashes overwhelming
contention. The regular demonstration of breastfeeding is still observed by some as a
dishonorable thing that ought to be done in private. A lady's areola is still, in some obscure,
strange path, not quite the same as that of a man's. Also, now, a memorable narrative
photograph delineating the terrible outcome of a napalm assault amid the Vietnam War has
been seen to no end more than a photograph of an exposed youngster. Because the human
body can be related with sexual acts doesn't imply that is its sole reason. In the event that
seeing anything in connection to a bare body just starts profane musings, an inquiry in regards
to the level of development becomes possibly the most important factor. With a photo so
notable and outstanding as that of the napalm young lady, one can just ask why it was even an
inquiry regarding whether the photograph ought to have been evacuated. With the world
winding up increasingly tolerating, it appears to be just fit that we figure out how to
acknowledge the most normal and honest to goodness type of ourselves. Obviously, there are
occasions in which nakedness shouldn't be permitted or seen as fitting, however as far as such
basic and essential cases, there shouldn't be an inquiry.
REFERENCE:
https://www.theodysseyonline.com/napalm-girl
QUESTION 2
Digital Literacy & Information Fluency
Inquire:
Who was Homo-Naledi?
What is critical about the disclosure?
Secure:
Data was obtained at the accompanying site:
http://ewn.co.za/Highlights/Naledi
Break down:
A group of archeologists drove by Teacher Lee Berger embraced the Rising
Star Endeavor and they had left a mark on the world by finding and rescuing
fossils of no less than 15 people from the Dinaledi Chamber. This was a
developmental revelation since another types of hominines called Homo
Naledi was found oblivious , remote chamber.Homo Naledi have particular
physical highlights that are amazingly comparable to that of a person, for
example,
1. Curved fingers
2. Small skulls
3. Slender bodies
4. Ape-like shoulders
The intriguing realities include:
1. None of the fossils bear any imprints that could recommend that the
people were executed or that their bodies were rummaged.
2. Therewas no proof that demonstrated that the bodies were conveyed
into the chamber by something besides their kindred hominines.
3. Archaeological confirmation likewise proposes that they didn't all go
to the chamber in the meantime.
4.And out of more than 1,550 fossil components uncovered in the chamber,
just a modest bunch have a place with creatures, (for example, mice and
fowls) other than hominines.
Apply:
As indicated by the discoveries featured in the investigation Homo Naledi
could be our regular precursor thusly this proposes it could have had human
attributes both physical and mental and in addition comparative behavioral
qualities.The Dinaledi load could have been utilizedas a graveyardwherethe
newly discovered species could have performed entombment ceremonies
since none of the fossils had marks nor did they go to the chamber in the
meantime.
Evaluate:
Research was directed altogether and the data was removed from a decent
source.
REFERENCE
EWN Online (2016). Who was Homo Naledi? Accessed 09 April 2016:
http://ewn.co.za/Features/Naledi/What-Makes-Naledi-Special
QUESTION 6
6.1 Digital socialization: It is the methods for taking in the advanced standards, qualities,
conduct, and social aptitudes fitting keeping in mind the end goal to obtain a computerized
personality.
Web-based social networking can change groups and their practices and conventions through:
• Commodification:
Where our social conventions, for example, religious ceremonies, customary ethnic rights, and
so on are diminished and 'sterilized' to be exhibited to the worldwide group of onlookers;
• Staged impact:
Those exceptionally ceremonies and customs lose their esteem or reason as they turn into a
product;
• Acculturation:
This is the procedure of social and mental change that is a consequence of two societies
meeting.
• Behavior:
With quick access to data and correspondence, our conduct has changed to oblige it.
• Privacy:
In spite of the fact that the issue will be managed in the accompanying segment, the part of
protection here is managed from a socio-social perspective and not a legitimate viewpoint.
• Crime:
The Web has made it far less demanding for culprits to discover potential casualties. (The Free
Organization of Instruction (Pty) Ltd., 2016)
REFERENCE:
The Independent Institute of Education (Pty) Ltd., 2016. DIGITAL CITIZENSHIP MODULE
MANUAL 2016 (First Edition: 2015), n.p.: IIE.
6.2 Morals incorporate good decisions made by people in connection to whatever remains of
the group, norms of adequate conduct, and guidelines overseeing individuals from a calling.
The under-said moral issues are what we should know about when we take a gander at our
activities and how they can affect on society on the loose. These moral issues are extensive,
including perspectives, for example,
• Copyright access and encroachment;
• Freedoms and responsibility;
• Privacy and security;
• Cultural observations and qualities;
• Cross social correspondence;
REFERENCE:
DIGITAL CITIZENSHIP 2017 MODULE MANUAL First Edition (2015) Revised Edition 2
IIE. 2017.
QUESTION 7
There are different risks that can influence the children or kindred understudies on the web
and I will simply name and clarify the few dangers beneath:
CYBERBULLYING
The harassing occurs on both play grounds and in the computerized world, harmful words are
traded during the time spent conveying in the advanced world and furthermore gossipy tidbits
effortlessly begin and spread rapidly.
GAMING
While online you can reassure recreations and it can be exceptionally fun, instructive and
intuitive, there are additionally concealed threats. A significant part of the substance of a few
diversions contains sexual substance, savagery,andrough dialectinaddition to web associated
recreations empower children to connect with outsiders and some of which can be risky.
Obscenity
More than once seeing explicit entertainment, particularly from a youthful age can
fundamentally shape one's sexual disposition and convictions. Visit presentation to sexual
unequivocal material is firmly connected to more tolerant dispositions about sex.
PREDATORS
The web is the absolute best discussion to meet new individuals, yet some with pernicious
expectation canutilize it to become a closeacquaintence with your companion. Web predators
are expecting controllers, ready to cultivate a relationship of reliance with a young person.
YOUTUBE
YouTube is the world's biggest video sharing site, but since anybody can transfer anything to
YouTube, regularly recordings can break the group rules for YouTube, and even those that
don't can in any case be loaded with sexual insinuation, provocative substance, and foul
dialect.
My cordial cautioning to my kindred understudies is that they should be extremely cautious on
the above perils as they like utilizing web, despite the fact that it is in reality compelling on
these days to utilize innovation yet as we as a whole realize that everything that has points of
interest it has additionally impediments. In this way, to my kindred understudies please utilize
the web viably for good purposes to abstain from being addictive on some of these dangers as
it isn't useful for your age.
REFERENCE:
http://www.accessismyright.pk/aimr/?q=content/hazards-digital-security
QUESTION 9
Digital commerceis the electronic selling of buying and goods. (Ribble, 2011) According to
some estimates, digital commerce accounts for 6.5% of all global retail sales and project e-
commerce to surpass a trillion dollars annually in 2016 (Business Insider, 2013).
According to SamMallikarjunan
B2B (Business to Business)
Business-To-Business (B2B) alludes to a business (the online business retailer) offering
specifically to another business merchandise or administrations that are utilized by the
beneficiary to control their business. It might be as central to their business as pitching iron to
a development organization or as supplemental as pitching espresso to be devoured by
representatives at a promoting programming organization in Boston.
C2C (Purchaser to Buyer)
In a Purchaser To-Buyer (C2C) display, the internet business site serves to encourage the
exchange between two shoppers. Sale locales, for example, eBay (particularly when things are
sold by people, as opposed to organizations posting items available to be purchased - a
semantic refinement which in any case on a very basic level changes the connection between
the dealer and purchaser) are the great cases of C2C online business destinations. Dating sites
or locales like Etsy where people can offer specifically to different people could be viewed as
another case of C2C internet business.
C2B (Buyer to Business)
In a Buyer To-Business (C2B) demonstrate, shoppers pitch items and administrations to
organizations,rather than the a differentway. For instance, the shoppers could listoccupations
to-be-done or items they need and organizations vie for and finish the exchange through the
C2B site, or a business could have a site where customers can offer them things that they
require.
B2C (Business to Shopper)
Internet business is ordinarily thought of as a business pitching something through an online
interface to a customer - otherwise called Business to Shopper (B2C). The most generally
known web based business organizations, for example, Amazon Coordinate (which varies
from Amazon in general - which we'll address later) or Buy.com, Wal-Mart.com, Target.com,
and so forth., is one where a retailer offers straightforwardly to an end client.
References
Sam Mallikarjunan. (February 19, 2014).
X2X ECOMMERCE: A PRIMER ON 4 DIFFERENT BUSINESS MODELS.
Available: https://blog.hubspot.com/ecommerce/x2x-ecommerce-business-models.
Last accessed 6/12/2017.
Module Manual, pages 156-157, (Ribble, 2011)
QUESTION 5
Digital Bill of Rights.
The meaning of digital rights and responsibilities is having the privilege and flexibility to utilize
a wide rangeof computerized innovation whileutilizing the innovation in a worthy and suitable
way. As a client of advanced innovation, you likewise have the privilege to security and the
opportunity of personal expression. http://www.digitalcitizenship.net
The reason I picked the point of digital rights and responsibilities is on account of in spite of
the fact that we have the privilege to security and opportunity in the computerized world, we
do have a duty to utilize it carefully and regard crafted by others. With everything there are
rules; along these lines, as instructors we have to ingrain the estimations of obligation, regard,
and trustworthiness, in our understudies when obtaining material or discussing in the
computerized sense. Understudies ought to be required to take after the Adequate Utilize
Arrangementintheir school regionthat points of interest how to be carefullyawareall through
the classroom setting. There have been such a significant number of cases as of late in the
media of digital harassing through messaging,sexting, Facebook, and other online networking,
and it needs to stop. Sadly, there have been frightful results and outcomes because of this sort
of annoying correspondence. Sometimes, the tormenting was bad to the point, that
understudies have ended their lives just to put a conclusion to the badgering. Understudies
ought not just comprehend that they not acting dependable and aware, but rather unlawful.
They should know that this kind of conduct is inadmissible and they will be condemned and
arraigned if gotten.
Despite the fact that the utilization of mobile phones has expanded in our general public, so
have the issues that go with them. Messaging to undermine tests or assignments is an uprising
issue in schools. Understudies desires and results ought to be made completely clear in the
school or classroom AUP (Worthy Utilize Arrangement) concerning mobile phone utilize. It is
similarly vital to instruct our understudies how refer to crafted by others suitably. They have
to comprehend that in spite of the fact that it is adequate to utilize somebody's work as an
asset, they additionally need to understand that giving legitimate credit to that individual is
going about as a capable subject. Literary theft has been a continuous issue in schools and
universities. This sort of conduct is wrong and encroach on the privileges of others. We have
to clarify to our understudies the desires of utilizing another person's work. The unlawfully
downloading of music and recordings has additionally been a continuous issue in our general
public. Understudies need to comprehend this isn't just rude to the craftsmen and creating
organizations, yet it is illegal. As educators, we too should regard crafted by others, such an
utilizing YouTube or instructor tube recordings inside our webpage's; they should be refered
to appropriately on our website page's so credit given. Once more, we should display our
understudy desires
* Below is a list digital rights and responsibilities in the digital sense:
Digital Rights:
*Right to freedom of expression.
*Right to privacy.
*Right to credit for personal works.
*Right to digital access.
*Right to our identity.
Digital Responsibilities:
*Responsibility to report bullying, harassing, sexting, or identity theft.
*Responsibility to cite works used for resources and researching.
*Responsibility to download music, videos, and other material legally.
*Responsibility to model and teach student expectations of technology use
.
*Responsibility to keep data/information safe from hackers.
*Responsibility not to falsify our identity in any way.
REFERENCE
http://www.digitalcitizenship.net/ (A guide to the components of digital citizenship.)
nternet bill of rights. [Web]. Retrieved from http://digiteen09-
flatclassroomproject.org/file/view/edRights.png/96109334/edRights
Wikipedia, . (2010, June 14). Digital rights. Retrieved
from http://en.wikipedia.org/wiki/Digital_rights 8.
Ribble, M. (2007). Digtial citizenship using technology appropriately. Retrieved
from http://www.digitalcitizenship.net/
Cybersmart!, . (2010). Digital citizenship lessons and activities. Retrieved
from http://cybersmartcurriculum.org/digitalcitizenship/
Warlick, D. (n.d.). Son of citation machine. Retrieved from http://citationmachine.net/
QUESTION 8
https://pin.it/2IuQ2zv
QUESTION 1
Link:
https://www.surveymonkey.com/results/SM-DWCC5L6Y8/

Weitere ähnliche Inhalte

Was ist angesagt?

Social Media for Job Search
Social Media for Job SearchSocial Media for Job Search
Social Media for Job SearchCareer Maven
 
Internet safety brochure
Internet safety brochureInternet safety brochure
Internet safety brochureKdog9
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for ParentsRodolfo Salazar
 
Do fear and exaggeration increase risk?
Do fear and exaggeration increase risk?Do fear and exaggeration increase risk?
Do fear and exaggeration increase risk?Larry Magid
 
Digital Students, Digital Parents
Digital Students, Digital ParentsDigital Students, Digital Parents
Digital Students, Digital ParentsClint Hamada
 
JSCHS / Digital Citizenship Discussion
JSCHS / Digital Citizenship DiscussionJSCHS / Digital Citizenship Discussion
JSCHS / Digital Citizenship DiscussionOCHS Librarian
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Larry Magid
 
Cybersafety Preso
Cybersafety PresoCybersafety Preso
Cybersafety PresoJon Corippo
 
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakRaising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakBex Lewis
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)Pat Sine
 
Cyber-bullying
Cyber-bullyingCyber-bullying
Cyber-bullyinganwidener
 
Branding You
Branding YouBranding You
Branding Youyirvin
 
Social Media Safety For High School
Social Media Safety For High SchoolSocial Media Safety For High School
Social Media Safety For High SchoolLiftPotential
 
E safety training for foster carers by stephen carrick-davies jan 2013
E  safety training for foster carers by stephen carrick-davies jan 2013E  safety training for foster carers by stephen carrick-davies jan 2013
E safety training for foster carers by stephen carrick-davies jan 2013Stevecd
 
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...Adria Richards
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the LawSuna Gurol
 

Was ist angesagt? (20)

E-safety leaflet
E-safety leaflet E-safety leaflet
E-safety leaflet
 
Social Media for Job Search
Social Media for Job SearchSocial Media for Job Search
Social Media for Job Search
 
Internet safety brochure
Internet safety brochureInternet safety brochure
Internet safety brochure
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
 
Do fear and exaggeration increase risk?
Do fear and exaggeration increase risk?Do fear and exaggeration increase risk?
Do fear and exaggeration increase risk?
 
Digital Students, Digital Parents
Digital Students, Digital ParentsDigital Students, Digital Parents
Digital Students, Digital Parents
 
JSCHS / Digital Citizenship Discussion
JSCHS / Digital Citizenship DiscussionJSCHS / Digital Citizenship Discussion
JSCHS / Digital Citizenship Discussion
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
Cybersafety Preso
Cybersafety PresoCybersafety Preso
Cybersafety Preso
 
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakRaising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Cyber-bullying
Cyber-bullyingCyber-bullying
Cyber-bullying
 
Branding You
Branding YouBranding You
Branding You
 
Social Media Safety For High School
Social Media Safety For High SchoolSocial Media Safety For High School
Social Media Safety For High School
 
E safety training for foster carers by stephen carrick-davies jan 2013
E  safety training for foster carers by stephen carrick-davies jan 2013E  safety training for foster carers by stephen carrick-davies jan 2013
E safety training for foster carers by stephen carrick-davies jan 2013
 
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...
 
Digital literacies
Digital literaciesDigital literacies
Digital literacies
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the Law
 

Ähnlich wie POE

Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
 
How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009bermandry
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
Assignment 8 draft 3
Assignment 8   draft 3Assignment 8   draft 3
Assignment 8 draft 3ksumbland
 
DIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptx
DIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptxDIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptx
DIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptxafhkdfs
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 SoundLarry Magid
 
Cyber sex preo-rf-v5
Cyber sex preo-rf-v5Cyber sex preo-rf-v5
Cyber sex preo-rf-v5Tom Daly
 
Digital Citizenship Symposium - Slide Compilation
Digital Citizenship Symposium - Slide CompilationDigital Citizenship Symposium - Slide Compilation
Digital Citizenship Symposium - Slide CompilationAlec Couros
 
Freedom-and-Responsibility-Dan-Lohrmann (3)
Freedom-and-Responsibility-Dan-Lohrmann (3)Freedom-and-Responsibility-Dan-Lohrmann (3)
Freedom-and-Responsibility-Dan-Lohrmann (3)Dan Lohrmann
 
Social networking by jarin
Social networking by jarinSocial networking by jarin
Social networking by jarinjarin651
 
Social Media101 V5
Social Media101 V5Social Media101 V5
Social Media101 V5KimBenedict
 
Social Media 101 for Parents: Do you know where your children are?
Social Media 101 for Parents:  Do you know where your children are?Social Media 101 for Parents:  Do you know where your children are?
Social Media 101 for Parents: Do you know where your children are?Sarah Welstead
 
Expanding our Horizons by Exploring the World Wide Web
Expanding our Horizons by Exploring the World Wide WebExpanding our Horizons by Exploring the World Wide Web
Expanding our Horizons by Exploring the World Wide WebSheila Dingcong
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk ManagementConnectSafely
 

Ähnlich wie POE (20)

Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
Your Child's Digital Tattoo
Your Child's Digital TattooYour Child's Digital Tattoo
Your Child's Digital Tattoo
 
How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Assignment 8 draft 3
Assignment 8   draft 3Assignment 8   draft 3
Assignment 8 draft 3
 
DIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptx
DIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptxDIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptx
DIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptx
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 
Cyber sex preo-rf-v5
Cyber sex preo-rf-v5Cyber sex preo-rf-v5
Cyber sex preo-rf-v5
 
Digital Citizenship Symposium - Slide Compilation
Digital Citizenship Symposium - Slide CompilationDigital Citizenship Symposium - Slide Compilation
Digital Citizenship Symposium - Slide Compilation
 
Freedom-and-Responsibility-Dan-Lohrmann (3)
Freedom-and-Responsibility-Dan-Lohrmann (3)Freedom-and-Responsibility-Dan-Lohrmann (3)
Freedom-and-Responsibility-Dan-Lohrmann (3)
 
Social networking by jarin
Social networking by jarinSocial networking by jarin
Social networking by jarin
 
Social Media101 V5
Social Media101 V5Social Media101 V5
Social Media101 V5
 
Social Media 101 for Parents: Do you know where your children are?
Social Media 101 for Parents:  Do you know where your children are?Social Media 101 for Parents:  Do you know where your children are?
Social Media 101 for Parents: Do you know where your children are?
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Expanding our Horizons by Exploring the World Wide Web
Expanding our Horizons by Exploring the World Wide WebExpanding our Horizons by Exploring the World Wide Web
Expanding our Horizons by Exploring the World Wide Web
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
 
U6 lesson 8 task 7
U6 lesson 8   task 7U6 lesson 8   task 7
U6 lesson 8 task 7
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 

Kürzlich hochgeladen

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 

Kürzlich hochgeladen (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 

POE

  • 1. QUESTION 4 DIGITAL ETIQUETTE May 20, 2017May 24, 2017 Deneilia Nadasen Digital etiquette or netiquette,, as it is some of the time called, is a fundamental arrangement of tenets you ought to follow keeping in mind the end goal to improve the web for others, and better for you. It's similarly as essential to treat individuals with politeness and regard online as it is, all things considered. When you text, visit, or email somebody over the Web, they can't see your face to tell in case you're prodding them or saying something in delight or a joke. How would you rehearse great Netiquette? It's straightforward. Simply regard others as you need to be dealt with, with civility and regard. Individuals know these guidelines however normally don't tail them when utilizing the Web. This incorporates hacking others PC, downloading wrongfully, copyright infringement, and utilizing terrible dialect on the Web. (Bethel-Tate, 2017). INAPPROPRIATE BEHAVIOUR Wrong conduct in the web may brings about numerous things, things like cyberbullying, cyberstalking, wholesale fraud, Hacking, undermining other individuals' PC and attacking individuals' privacy.If you encounter any conduct that you find unseemly, experience hostile material, or know about any manhandle happening on the web, you should report it to the fitting experts You ought to likewise obstruct the culpable client or erase them from your Contact Rundown." Web Wellbeing (2012) Case of security and protection dangers and who they make you defenseless against: Overlooking security settings. Security and protection dangers: demolished online notoriety, digital stalkers, cyberbullies, and youngster predators. *lying about your age and setting dates with outsiders disconnected. Disconnected dangers: digital stalkers, tyke predators. *clicking on each connection you go over. Web security dangers: malware diseases, phishing locales. IMPLICATIONS Youngsters can feel humiliated and mortified. In the event that they're extremely upset this could prompt self-damage or suicide.
  • 2. Remember: You have no control over what happens to photos and videos once they are sent. Photos and videos can last forever You put yourself at risk of whenever you share sexually explicit material.” Internet Safety (2012) Rule 1: Remember the Human Rule 2: Adhere to the same standards of behavior online that you follow in real life Rule 3: Know where you are in cyberspace Rule 4: Respect other people's time and bandwidth Rule 5: Make yourself look good online Rule 6: Share expert knowledge Rule 7: Help keep flame wars under control Rule 8: Respect other people's privacy Rule 9: Don't abuse your power Rule 10: Be forgiving of other people's mistakes” albion(2011) CYBERSTALKING Is the point at which somebody is utilizing gadgets or the web to disturb or to stalk other individual. This conduct is done for the most part by individuals who are genuine stalkers and it can brings about other web clients feeling awkward. CYBERBULLYING Is a sort of harassing which is done electronically by means of cellphone, PCs and the web might be web-based social networking, messages and instant messages. This is done for the most part by young people. The casualties of this sort of harassing as a rule are additionally tormented face to face. Casualties may experience the ill effects of lower confidence and as a rule they begin utilizing/overdosing medications or alcohol.(Rouse;2012) Data fraud When somebody is utilizing other individuals' profiles as their own. Individuals much of the time they utilize other individuals' profile to carry out wrongdoings again they may utilize it to uncover false data about the genuine proprietor. HACKING *Getting in to somebody's record without their authorization. Adulterating OTHER PEOPLE'S PCs *Deleting other individuals' data without their consent. Attacking Individuals Protection *Sharing individuals' private information without counseling them.
  • 3. CONSEQUENCES This can prompt somebody being denied access to a specific site or online networking in light of the fact that the is no site that is advancing misuse or tormenting. Human nobility of the can be harmed or slighted. Casualties of this wrong conduct for the most part submits suicide since you find that a specific data was uncovered about them and is a false. Again the separating of connections of friends,collagues and family may happen. LOSS OF JOB OPPORTUNITIES •in many cases previously they procure a man they do a more profound research about that individual I mean experiencing his/her web life suppose they locate that false data was spread that you stole from your previous supervisors will despite everything they employ you on the off chance that they saw that information? MY Guidelines •Always abstain from writing with Tops since individuals consider it as perhaps you are irate or you are yelling. •Always be human-recall about the individual you are sending the messages to, envision if similar messages was send to you, in what manner will you feel - if great then you can send. •Before posting a photo of you and your companion ask his/her authorization first-regardless of the possibility that it's your telephone. REFERENCE Shea, V (1994) THE CORE RULES OF NETIQUETTE. Available at http://www.albion.com/netiquette/corerules.html[Accessed 24 May 2017] Inappropriate Behaviour | Internet Safety Available at http://internet-safety- 2012.info [Accessed 24 May 2017]
  • 4. QUESTION 3 The “Napalm-Girl” I think this picture is improper, on the grounds that this is a nine years of age young lady who was stripped and escaping far from the smoke they were encountering a war in her nation. Despite the fact that society appears to at long last be more alright with parts of life that ought to have been acknowledged in any case, bareness is as yet an idea that flashes overwhelming contention. The regular demonstration of breastfeeding is still observed by some as a dishonorable thing that ought to be done in private. A lady's areola is still, in some obscure, strange path, not quite the same as that of a man's. Also, now, a memorable narrative photograph delineating the terrible outcome of a napalm assault amid the Vietnam War has been seen to no end more than a photograph of an exposed youngster. Because the human body can be related with sexual acts doesn't imply that is its sole reason. In the event that seeing anything in connection to a bare body just starts profane musings, an inquiry in regards to the level of development becomes possibly the most important factor. With a photo so notable and outstanding as that of the napalm young lady, one can just ask why it was even an inquiry regarding whether the photograph ought to have been evacuated. With the world winding up increasingly tolerating, it appears to be just fit that we figure out how to acknowledge the most normal and honest to goodness type of ourselves. Obviously, there are occasions in which nakedness shouldn't be permitted or seen as fitting, however as far as such basic and essential cases, there shouldn't be an inquiry. REFERENCE: https://www.theodysseyonline.com/napalm-girl
  • 5. QUESTION 2 Digital Literacy & Information Fluency Inquire: Who was Homo-Naledi? What is critical about the disclosure? Secure: Data was obtained at the accompanying site: http://ewn.co.za/Highlights/Naledi Break down: A group of archeologists drove by Teacher Lee Berger embraced the Rising Star Endeavor and they had left a mark on the world by finding and rescuing fossils of no less than 15 people from the Dinaledi Chamber. This was a developmental revelation since another types of hominines called Homo Naledi was found oblivious , remote chamber.Homo Naledi have particular physical highlights that are amazingly comparable to that of a person, for example, 1. Curved fingers 2. Small skulls 3. Slender bodies 4. Ape-like shoulders The intriguing realities include: 1. None of the fossils bear any imprints that could recommend that the people were executed or that their bodies were rummaged. 2. Therewas no proof that demonstrated that the bodies were conveyed into the chamber by something besides their kindred hominines. 3. Archaeological confirmation likewise proposes that they didn't all go to the chamber in the meantime.
  • 6. 4.And out of more than 1,550 fossil components uncovered in the chamber, just a modest bunch have a place with creatures, (for example, mice and fowls) other than hominines. Apply: As indicated by the discoveries featured in the investigation Homo Naledi could be our regular precursor thusly this proposes it could have had human attributes both physical and mental and in addition comparative behavioral qualities.The Dinaledi load could have been utilizedas a graveyardwherethe newly discovered species could have performed entombment ceremonies since none of the fossils had marks nor did they go to the chamber in the meantime. Evaluate: Research was directed altogether and the data was removed from a decent source. REFERENCE EWN Online (2016). Who was Homo Naledi? Accessed 09 April 2016: http://ewn.co.za/Features/Naledi/What-Makes-Naledi-Special
  • 7. QUESTION 6 6.1 Digital socialization: It is the methods for taking in the advanced standards, qualities, conduct, and social aptitudes fitting keeping in mind the end goal to obtain a computerized personality. Web-based social networking can change groups and their practices and conventions through: • Commodification: Where our social conventions, for example, religious ceremonies, customary ethnic rights, and so on are diminished and 'sterilized' to be exhibited to the worldwide group of onlookers; • Staged impact: Those exceptionally ceremonies and customs lose their esteem or reason as they turn into a product; • Acculturation: This is the procedure of social and mental change that is a consequence of two societies meeting. • Behavior: With quick access to data and correspondence, our conduct has changed to oblige it. • Privacy: In spite of the fact that the issue will be managed in the accompanying segment, the part of protection here is managed from a socio-social perspective and not a legitimate viewpoint. • Crime: The Web has made it far less demanding for culprits to discover potential casualties. (The Free Organization of Instruction (Pty) Ltd., 2016) REFERENCE: The Independent Institute of Education (Pty) Ltd., 2016. DIGITAL CITIZENSHIP MODULE MANUAL 2016 (First Edition: 2015), n.p.: IIE.
  • 8. 6.2 Morals incorporate good decisions made by people in connection to whatever remains of the group, norms of adequate conduct, and guidelines overseeing individuals from a calling. The under-said moral issues are what we should know about when we take a gander at our activities and how they can affect on society on the loose. These moral issues are extensive, including perspectives, for example, • Copyright access and encroachment; • Freedoms and responsibility; • Privacy and security; • Cultural observations and qualities; • Cross social correspondence; REFERENCE: DIGITAL CITIZENSHIP 2017 MODULE MANUAL First Edition (2015) Revised Edition 2 IIE. 2017.
  • 9. QUESTION 7 There are different risks that can influence the children or kindred understudies on the web and I will simply name and clarify the few dangers beneath: CYBERBULLYING The harassing occurs on both play grounds and in the computerized world, harmful words are traded during the time spent conveying in the advanced world and furthermore gossipy tidbits effortlessly begin and spread rapidly. GAMING While online you can reassure recreations and it can be exceptionally fun, instructive and intuitive, there are additionally concealed threats. A significant part of the substance of a few diversions contains sexual substance, savagery,andrough dialectinaddition to web associated recreations empower children to connect with outsiders and some of which can be risky. Obscenity More than once seeing explicit entertainment, particularly from a youthful age can fundamentally shape one's sexual disposition and convictions. Visit presentation to sexual unequivocal material is firmly connected to more tolerant dispositions about sex. PREDATORS The web is the absolute best discussion to meet new individuals, yet some with pernicious expectation canutilize it to become a closeacquaintence with your companion. Web predators are expecting controllers, ready to cultivate a relationship of reliance with a young person. YOUTUBE YouTube is the world's biggest video sharing site, but since anybody can transfer anything to YouTube, regularly recordings can break the group rules for YouTube, and even those that don't can in any case be loaded with sexual insinuation, provocative substance, and foul dialect. My cordial cautioning to my kindred understudies is that they should be extremely cautious on the above perils as they like utilizing web, despite the fact that it is in reality compelling on these days to utilize innovation yet as we as a whole realize that everything that has points of interest it has additionally impediments. In this way, to my kindred understudies please utilize the web viably for good purposes to abstain from being addictive on some of these dangers as it isn't useful for your age. REFERENCE: http://www.accessismyright.pk/aimr/?q=content/hazards-digital-security
  • 10. QUESTION 9 Digital commerceis the electronic selling of buying and goods. (Ribble, 2011) According to some estimates, digital commerce accounts for 6.5% of all global retail sales and project e- commerce to surpass a trillion dollars annually in 2016 (Business Insider, 2013). According to SamMallikarjunan B2B (Business to Business) Business-To-Business (B2B) alludes to a business (the online business retailer) offering specifically to another business merchandise or administrations that are utilized by the beneficiary to control their business. It might be as central to their business as pitching iron to a development organization or as supplemental as pitching espresso to be devoured by representatives at a promoting programming organization in Boston. C2C (Purchaser to Buyer) In a Purchaser To-Buyer (C2C) display, the internet business site serves to encourage the exchange between two shoppers. Sale locales, for example, eBay (particularly when things are sold by people, as opposed to organizations posting items available to be purchased - a semantic refinement which in any case on a very basic level changes the connection between the dealer and purchaser) are the great cases of C2C online business destinations. Dating sites or locales like Etsy where people can offer specifically to different people could be viewed as another case of C2C internet business. C2B (Buyer to Business) In a Buyer To-Business (C2B) demonstrate, shoppers pitch items and administrations to organizations,rather than the a differentway. For instance, the shoppers could listoccupations to-be-done or items they need and organizations vie for and finish the exchange through the C2B site, or a business could have a site where customers can offer them things that they require.
  • 11. B2C (Business to Shopper) Internet business is ordinarily thought of as a business pitching something through an online interface to a customer - otherwise called Business to Shopper (B2C). The most generally known web based business organizations, for example, Amazon Coordinate (which varies from Amazon in general - which we'll address later) or Buy.com, Wal-Mart.com, Target.com, and so forth., is one where a retailer offers straightforwardly to an end client. References Sam Mallikarjunan. (February 19, 2014). X2X ECOMMERCE: A PRIMER ON 4 DIFFERENT BUSINESS MODELS. Available: https://blog.hubspot.com/ecommerce/x2x-ecommerce-business-models. Last accessed 6/12/2017. Module Manual, pages 156-157, (Ribble, 2011)
  • 12. QUESTION 5 Digital Bill of Rights. The meaning of digital rights and responsibilities is having the privilege and flexibility to utilize a wide rangeof computerized innovation whileutilizing the innovation in a worthy and suitable way. As a client of advanced innovation, you likewise have the privilege to security and the opportunity of personal expression. http://www.digitalcitizenship.net The reason I picked the point of digital rights and responsibilities is on account of in spite of the fact that we have the privilege to security and opportunity in the computerized world, we do have a duty to utilize it carefully and regard crafted by others. With everything there are rules; along these lines, as instructors we have to ingrain the estimations of obligation, regard, and trustworthiness, in our understudies when obtaining material or discussing in the computerized sense. Understudies ought to be required to take after the Adequate Utilize Arrangementintheir school regionthat points of interest how to be carefullyawareall through the classroom setting. There have been such a significant number of cases as of late in the media of digital harassing through messaging,sexting, Facebook, and other online networking, and it needs to stop. Sadly, there have been frightful results and outcomes because of this sort of annoying correspondence. Sometimes, the tormenting was bad to the point, that understudies have ended their lives just to put a conclusion to the badgering. Understudies ought not just comprehend that they not acting dependable and aware, but rather unlawful. They should know that this kind of conduct is inadmissible and they will be condemned and arraigned if gotten. Despite the fact that the utilization of mobile phones has expanded in our general public, so have the issues that go with them. Messaging to undermine tests or assignments is an uprising issue in schools. Understudies desires and results ought to be made completely clear in the school or classroom AUP (Worthy Utilize Arrangement) concerning mobile phone utilize. It is similarly vital to instruct our understudies how refer to crafted by others suitably. They have to comprehend that in spite of the fact that it is adequate to utilize somebody's work as an asset, they additionally need to understand that giving legitimate credit to that individual is going about as a capable subject. Literary theft has been a continuous issue in schools and universities. This sort of conduct is wrong and encroach on the privileges of others. We have to clarify to our understudies the desires of utilizing another person's work. The unlawfully downloading of music and recordings has additionally been a continuous issue in our general public. Understudies need to comprehend this isn't just rude to the craftsmen and creating organizations, yet it is illegal. As educators, we too should regard crafted by others, such an utilizing YouTube or instructor tube recordings inside our webpage's; they should be refered to appropriately on our website page's so credit given. Once more, we should display our understudy desires
  • 13. * Below is a list digital rights and responsibilities in the digital sense: Digital Rights: *Right to freedom of expression. *Right to privacy. *Right to credit for personal works. *Right to digital access. *Right to our identity. Digital Responsibilities: *Responsibility to report bullying, harassing, sexting, or identity theft. *Responsibility to cite works used for resources and researching. *Responsibility to download music, videos, and other material legally. *Responsibility to model and teach student expectations of technology use . *Responsibility to keep data/information safe from hackers. *Responsibility not to falsify our identity in any way. REFERENCE http://www.digitalcitizenship.net/ (A guide to the components of digital citizenship.) nternet bill of rights. [Web]. Retrieved from http://digiteen09- flatclassroomproject.org/file/view/edRights.png/96109334/edRights Wikipedia, . (2010, June 14). Digital rights. Retrieved from http://en.wikipedia.org/wiki/Digital_rights 8. Ribble, M. (2007). Digtial citizenship using technology appropriately. Retrieved from http://www.digitalcitizenship.net/ Cybersmart!, . (2010). Digital citizenship lessons and activities. Retrieved from http://cybersmartcurriculum.org/digitalcitizenship/ Warlick, D. (n.d.). Son of citation machine. Retrieved from http://citationmachine.net/