SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Presented by:
Laverne Hill
Media Specialist
Lowndes High School
With permission from:
Howie DiBlasi
Emerging Technologies Evangelist
Digital Journey
howie@frontier.net
www.drhowie.com
Presentation : 2012
DIGITAL FOOTPRINTS:DIGITAL FOOTPRINTS:
WHAT DOES THAT REALLY MEAN?WHAT DOES THAT REALLY MEAN?
 Students should
understand how to be safe
and responsible online
and how to create a digital
footprint to be proud of
today and tomorrow.
TEN COMMANDMENTS OF COMPUTER ETHICS-(K-5)
USED WITH PERMISSION: COPYRIGHT: COMPUTER ETHICS INSTITUTE AUTHOR: DR. RAMON C. BARQUIN
 1. Thou shalt not use a computer to harm other people.
 2. Thou shalt not interfere with other people's computer work.
 3. Thou shalt not snoop around in other people's files.
 4. Thou shalt not use a computer to steal.
 5. Thou shalt not use a computer to bear false witness.
 6. Thou shalt not copy or use proprietary software for which you
have not paid.
 7. Thou shalt not use other people's computer resources without
authorization or proper compensation.
 8. Thou shalt not appropriate other people's intellectual output.
 9. Thou shall think about the social consequences of the
program you write or the system you design.
 10. Thou shall use a computer in ways that show consideration
of and respect for your fellow humans.
THE HIGH/UNIVERSITY CODE OF ETHICS
 1) I will not use the technology/communication system to
harm, slander, injure or ridicule others.
 2) I will not interfere with others’ use of the technology,
including opening the files of others without their permission.
 3) I will not use the computer to steal.
 4) I will not use the computer to misrepresent my school or
myself.
 5) I will not copy software for which I have not paid.
 6) I will not use equipment without authorization.
 7) I will not copy text or ideas from the technology resources
without permission from the author or referencing source.
 8) I will be responsible for any consequences that arise from
or that are a result of my computing activities.
 9) I will use both the equipment and the programs in ways that show
consideration, care, and respect.
 10) I will be financially responsible and liable for any damages to either
hardware or software resources that result from inappropriate or
abusive behavior.
 11) I will not allow another person to use my logon (ID) and password,
nor will I use anyone else's ID and password.
 12) I will abide by all rules and regulations of the system as changed or
added from time to time by the
 administration.
 13) I will address all concerns regarding the use of technology first to
the supervising teacher and/or school librarian and then to the
administration.
 14) I will use the technology/computer system to further my education
and will share my growing knowledge with others.
 16) I recognize that all students deserve access as conditions permit.
 17) I will not violate the terms and conditions of the Authorization for
Internet Access as stated below.
 18) I will not tamper with or change the computer settings
INTERNET SAFETY
Rules of the Road for Kids
 1. Guard your privacy. What people know about you is up to you.
 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or
edgy today could cost you tomorrow.
 3. Nothing is private online. Anything you say or do can be copied, pasted,
and sent to gazillions of people without your permission.
 4. Assume everyone is watching. There’s a huge, vast audience out there. If
someone is your friend’s friend, they can see everything.
 5. Apply the Golden Rule. If you don’t want it done to you, don’t do it to
someone else.
 6. Watch the clock. A virtual hug never matches a real one. Balance your life.
 7. Choose wisely. Not all content is appropriate. You know what we mean.
 8. Don't hide. Using anonymity to cloak your actions doesn’t turn you into a
trustworthy, responsible human being.
 9. Think about what you see. Just because it’s online doesn’t make it true.
 10. Be smart, be safe. Not everyone is who they say they are. But you know
that.
WHAT IS YOUR DIGITAL FOOTPRINT MOST
LIKE? BY TOM JACKSON
 traces left by your activity in a
digital environment.
 All of us, like it or not, are
creating these trails.
 All kinds of information ABOUT
YOU can be found online.
Digital footprints are…….
 Will it be insignificant
tomorrow, or in five years
when you need to apply for
college or seek new
employment ?.
WHAT DO YOU KNOW ????
 Do you know how long what you put online exists?Do you know how long what you put online exists?
 Do you know what the standard is for appropriateDo you know what the standard is for appropriate
and inappropriate online behavior?and inappropriate online behavior?
 Do you know what a digital footprint means?Do you know what a digital footprint means?
 Do you know how to take steps to have a digitalDo you know how to take steps to have a digital
footprint that you will be proud of today andfootprint that you will be proud of today and
tomorrow too?tomorrow too?
 If whatever you do online can beIf whatever you do online can be
traced back to you and it staystraced back to you and it stays
forever what should you putforever what should you put
online?online?
 Think: Social NetworkingThink: Social Networking

Weitere ähnliche Inhalte

Was ist angesagt?

Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
13sh
 

Was ist angesagt? (20)

ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Internet safety for kids
Internet safety for kidsInternet safety for kids
Internet safety for kids
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
Being A Responsible Internet User
Being A Responsible Internet UserBeing A Responsible Internet User
Being A Responsible Internet User
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
Angelique s Do Something Project
Angelique s Do Something ProjectAngelique s Do Something Project
Angelique s Do Something Project
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
Eskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ictEskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ict
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
Being Responsible and Respectful Online
Being Responsible and Respectful OnlineBeing Responsible and Respectful Online
Being Responsible and Respectful Online
 
Safer Internet Day PowerPoint
Safer Internet Day PowerPointSafer Internet Day PowerPoint
Safer Internet Day PowerPoint
 
Digital citizenship for Elementary Students
Digital citizenship for Elementary StudentsDigital citizenship for Elementary Students
Digital citizenship for Elementary Students
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
 
Y2 l10 esafety
Y2 l10 esafetyY2 l10 esafety
Y2 l10 esafety
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Etiquette in the Digital World
Etiquette in the Digital WorldEtiquette in the Digital World
Etiquette in the Digital World
 

Andere mochten auch (6)

Signs & Lines - Expression of Interest - Designer
Signs & Lines - Expression of Interest - DesignerSigns & Lines - Expression of Interest - Designer
Signs & Lines - Expression of Interest - Designer
 
chỉ 307tr sở hữu ngay căn hộ tại trung tâm gò vấp (50%).LH 0915 45 75 39
chỉ 307tr sở hữu ngay căn hộ tại trung tâm gò vấp (50%).LH 0915 45 75 39chỉ 307tr sở hữu ngay căn hộ tại trung tâm gò vấp (50%).LH 0915 45 75 39
chỉ 307tr sở hữu ngay căn hộ tại trung tâm gò vấp (50%).LH 0915 45 75 39
 
Animals
AnimalsAnimals
Animals
 
Seo tools
Seo toolsSeo tools
Seo tools
 
Connected TV -Using a Smart TV for consumer engagement Clive Dickens COO Abso...
Connected TV -Using a Smart TV for consumer engagement Clive Dickens COO Abso...Connected TV -Using a Smart TV for consumer engagement Clive Dickens COO Abso...
Connected TV -Using a Smart TV for consumer engagement Clive Dickens COO Abso...
 
Can ho emerald trung tam thu duc gia 12 6tr.m2, dang nhan đat cho
Can ho emerald trung tam thu duc gia 12 6tr.m2, dang nhan đat choCan ho emerald trung tam thu duc gia 12 6tr.m2, dang nhan đat cho
Can ho emerald trung tam thu duc gia 12 6tr.m2, dang nhan đat cho
 

Ähnlich wie Your e image presentation 2

Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
lahill16
 
Hannah dc keynote
Hannah dc keynoteHannah dc keynote
Hannah dc keynote
takahe2
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
Donna Murray
 

Ähnlich wie Your e image presentation 2 (20)

Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
MIL_WEEK-3.pptx
MIL_WEEK-3.pptxMIL_WEEK-3.pptx
MIL_WEEK-3.pptx
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Hannah dc keynote
Hannah dc keynoteHannah dc keynote
Hannah dc keynote
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Hannah dc keynote
Hannah dc keynoteHannah dc keynote
Hannah dc keynote
 
Digital Citizenship
Digital Citizenship Digital Citizenship
Digital Citizenship
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Digital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for GoodDigital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for Good
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
 
Digital citizenship@
Digital citizenship@Digital citizenship@
Digital citizenship@
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 

Your e image presentation 2

  • 1. Presented by: Laverne Hill Media Specialist Lowndes High School With permission from: Howie DiBlasi Emerging Technologies Evangelist Digital Journey howie@frontier.net www.drhowie.com Presentation : 2012
  • 2. DIGITAL FOOTPRINTS:DIGITAL FOOTPRINTS: WHAT DOES THAT REALLY MEAN?WHAT DOES THAT REALLY MEAN?  Students should understand how to be safe and responsible online and how to create a digital footprint to be proud of today and tomorrow.
  • 3. TEN COMMANDMENTS OF COMPUTER ETHICS-(K-5) USED WITH PERMISSION: COPYRIGHT: COMPUTER ETHICS INSTITUTE AUTHOR: DR. RAMON C. BARQUIN  1. Thou shalt not use a computer to harm other people.  2. Thou shalt not interfere with other people's computer work.  3. Thou shalt not snoop around in other people's files.  4. Thou shalt not use a computer to steal.  5. Thou shalt not use a computer to bear false witness.  6. Thou shalt not copy or use proprietary software for which you have not paid.  7. Thou shalt not use other people's computer resources without authorization or proper compensation.  8. Thou shalt not appropriate other people's intellectual output.  9. Thou shall think about the social consequences of the program you write or the system you design.  10. Thou shall use a computer in ways that show consideration of and respect for your fellow humans.
  • 4. THE HIGH/UNIVERSITY CODE OF ETHICS  1) I will not use the technology/communication system to harm, slander, injure or ridicule others.  2) I will not interfere with others’ use of the technology, including opening the files of others without their permission.  3) I will not use the computer to steal.  4) I will not use the computer to misrepresent my school or myself.  5) I will not copy software for which I have not paid.  6) I will not use equipment without authorization.  7) I will not copy text or ideas from the technology resources without permission from the author or referencing source.  8) I will be responsible for any consequences that arise from or that are a result of my computing activities.
  • 5.  9) I will use both the equipment and the programs in ways that show consideration, care, and respect.  10) I will be financially responsible and liable for any damages to either hardware or software resources that result from inappropriate or abusive behavior.  11) I will not allow another person to use my logon (ID) and password, nor will I use anyone else's ID and password.  12) I will abide by all rules and regulations of the system as changed or added from time to time by the  administration.  13) I will address all concerns regarding the use of technology first to the supervising teacher and/or school librarian and then to the administration.  14) I will use the technology/computer system to further my education and will share my growing knowledge with others.  16) I recognize that all students deserve access as conditions permit.  17) I will not violate the terms and conditions of the Authorization for Internet Access as stated below.  18) I will not tamper with or change the computer settings
  • 6. INTERNET SAFETY Rules of the Road for Kids  1. Guard your privacy. What people know about you is up to you.  2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy today could cost you tomorrow.  3. Nothing is private online. Anything you say or do can be copied, pasted, and sent to gazillions of people without your permission.  4. Assume everyone is watching. There’s a huge, vast audience out there. If someone is your friend’s friend, they can see everything.  5. Apply the Golden Rule. If you don’t want it done to you, don’t do it to someone else.  6. Watch the clock. A virtual hug never matches a real one. Balance your life.  7. Choose wisely. Not all content is appropriate. You know what we mean.  8. Don't hide. Using anonymity to cloak your actions doesn’t turn you into a trustworthy, responsible human being.  9. Think about what you see. Just because it’s online doesn’t make it true.  10. Be smart, be safe. Not everyone is who they say they are. But you know that.
  • 7. WHAT IS YOUR DIGITAL FOOTPRINT MOST LIKE? BY TOM JACKSON
  • 8.  traces left by your activity in a digital environment.  All of us, like it or not, are creating these trails.  All kinds of information ABOUT YOU can be found online. Digital footprints are…….
  • 9.  Will it be insignificant tomorrow, or in five years when you need to apply for college or seek new employment ?.
  • 10. WHAT DO YOU KNOW ????  Do you know how long what you put online exists?Do you know how long what you put online exists?  Do you know what the standard is for appropriateDo you know what the standard is for appropriate and inappropriate online behavior?and inappropriate online behavior?  Do you know what a digital footprint means?Do you know what a digital footprint means?  Do you know how to take steps to have a digitalDo you know how to take steps to have a digital footprint that you will be proud of today andfootprint that you will be proud of today and tomorrow too?tomorrow too?
  • 11.  If whatever you do online can beIf whatever you do online can be traced back to you and it staystraced back to you and it stays forever what should you putforever what should you put online?online?  Think: Social NetworkingThink: Social Networking

Hinweis der Redaktion

  1. What happens to your footprint when you walk in the sand? What happens though if it is in concrete or even in a fossil like this? 1.5 million years old this footprint is in rock and is a fossil that was found in Africa Do you know that everytime you use your computer or phone you leave a digital footprint and it is more like the lasting print than the sand print.
  2. Use thumbs to show where people are at. Up for I know, sideways for I think I know and down for I don’t know.
  3. This can be discussed and added to the box as indicated. Remember to pull student names to solicite full participation and on task behaviour. Put names back in as students can easily be called on multiple times.