1 of 26

Digital Citizenship

Springfield Clark CTC 2021-2022

2 of 26

Description of Presentation

What is a Digital Citizen?

Digital Citizenship is the ability to participate in society online. (Mossberger, Tolbert, McNeal)

It is important that everyone actively participating online understands and comprehends appropriate and responsible behavior in regards to technological use. It is also important to realize that not everyone has equal use or access to those technological tools.

In this presentation the following areas will be covered: self-image and identity, relationships and communication, digital footprint and reputation, cyberbullying and digital drama, and internet safety.

3 of 26

Be a Digital Citizen

4 of 26

Self Image and Identity

Our self identity is how we define and see ourselves as unique individuals.

Self Identity Includes:

  • Personalities
  • Aptitudes and Capabilities
  • Intellectual and Physical Attributes
  • Interests
  • Relationships

We gain our self identity in two ways:

Self Awareness: Our Thoughts, Feelings, and Behaviors

Outward Awareness: Social, Academic, and Physical

NEW IDENTITY: iSelf - Technology shaping our identities

5 of 26

Self Image and Identity (continued)

Internet identity (also called IID), or internet persona is a social identity that an Internet user establishes in online communities and websites. It can also be considered as an actively constructed presentation of oneself. Although some people choose to use their real names online, some Internet users prefer to be anonymous, identifying themselves by means of pseudonyms, which reveal varying amounts of personally identifiable information. An online identity may even be determined by a user's relationship to a certain social group they are a part of online. Some can even be deceptive about their identity.

In some online contexts, including Internet forums, online chats, and massively multiplayer online role-playing games (MMORPGs), users can represent themselves visually by choosing an avatar, an icon-sized graphic image. Avatars are one way users express their online identity. Through interaction with other users, an established online identity acquires a reputation, which enables other users to decide whether the identity is worthy of trust. Online identities are associated with users through authentication, which typically requires registration and logging in. Some websites also use the user's IP address or tracking cookies to identify users.

6 of 26

Self Image and Identity

How does the Internet affect your identity?

Watch and Discuss!

If you Googled yourself...what would you find? Would you like what you saw online? How can you improve your iSelf?

...would you want Grandma to see your iSelf?

7 of 26

Digital Footprint and Reputation

Watch and Discuss

How can your digital footprint affect you…

  • At School
  • And Your Job
  • When Applying to College
  • With Family and Friends

8 of 26

Your Digital Footprint...Your Future

We’ve all heard that potential employers are going to be looking for us on social media. But why do they do it? What is it that companies want to see about our private life activities before making a professional assessment of us?

Sometimes, they’re just looking for potential passive candidates in the first place. Increasingly, networking sites are used as tools by recruiters and hiring managers to seek out sources of talent. Some 44% of employers surveyed said that they had hired a candidate through social media.

That’s an impressive number, but it pales beside the fact that almost all employers (93% to be exact) say that they will search for your social media profiles during the interview process.

9 of 26

Your Digital Footprint...Your Future

Top 3 Things Employers LOOK for in Your Social Profile

  • More than half of hiring managers (51%) say that they’re looking to see if the candidate will be a good fit with the corporate culture.
  • 45% are researching potential hires on social media to find out more about that candidate’s qualifications.
  • Almost as many, 44% of hiring managers want to see if a candidate is creative.

10 of 26

Your Digital Footprint...Your Future

42% of those surveyed say that they have changed their mind about whether or not to hire someone based on what they have found online.

What your future employer does NOT want to see in your social profile

  • 83% of employers say they are turned off by references about using illegal drugs.
  • 71% are turned off by posts of a sexual nature.
  • 65% are turned off by use of profanity.
  • 61% are turned off by bad spelling or grammar.
  • 51% are turned off by references to guns, and
  • 47% are turned off by photos of consuming alcohol.

11 of 26

Relationships and Communication

We need to establish rules…

...about appropriate use of computers, cell phones, and other technology. For example, be sure you understand what sites you can visit and what you are permitted to do when you’re online. Be safe online!

...be smart about what you post or say. Do not to share anything that could hurt or embarrass yourself or others. Once something is posted, it is out of your control whether someone else will forward it.

...think about who you want to see the information and pictures you post online. Should complete strangers see it? Real friends only? Friends of friends? Think about how people who aren’t friends could use your information!

...keep your passwords safe and do not share them with friends. Sharing passwords can compromise your control over your online identity and activity.

12 of 26

Cyberbullying and Digital Drama

Cyberbullying is bullying that takes place using electronic technology. Electronic technology includes devices and equipment such as cell phones, computers, and tablets as well as communication tools including social media sites, text messages, chat, and websites.

Examples of cyberbullying include mean text messages or emails, rumors sent by email or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles.

13 of 26

Why is Cyberbullying Different?

Kids who are being cyberbullied are often bullied in person as well. Additionally, kids who are cyberbullied have a harder time getting away from the behavior.

  • Cyberbullying can happen 24 hours a day, 7 days a week, and reach a kid even when he or she is alone. It can happen any time of the day or night.
  • Cyberbullying messages and images can be posted anonymously and distributed quickly to a very wide audience. It can be difficult and sometimes impossible to trace the source.
  • Deleting inappropriate or harassing messages, texts, and pictures is extremely difficult after they have been posted or sent.

14 of 26

Effects of Cyberbullying

Cell phones and computers themselves are not to blame for cyberbullying. Social media sites can be used for positive activities, like connecting kids with friends and family, helping students with school, and for entertainment. But these tools can also be used to hurt other people. Whether done in person or through technology, the effects of bullying are similar.

Kids who are cyberbullied are more likely to:

  • Use alcohol and drugs
  • Skip school
  • Experience in-person bullying
  • Be unwilling to attend school
  • Receive poor grades
  • Have lower self-esteem
  • Have more health problems

15 of 26

Stand Up to Cyberbullying!

Watch and Discuss!

  • How have you experienced cyberbullying?

The Facts...

The 2013-2014 School Crime Supplement (National Center for Education Statistics and Bureau of Justice Statistics) indicates that 7% of students in grades 6–12 experienced cyberbullying.

The 2013 Youth Risk Behavior Surveillance Survey finds that 15% of high school students (grades 9-12) were electronically bullied in the past year.

16 of 26

Internet Safety

Computer Security:

  • Protect your personal information. Social Security numbers, account numbers, and passwords are examples of information to keep private. Treat your personal information like cash - don’t just hand it out to anyone!
  • Watching out for "free" stuff. Free games, ring tones, or other downloads can hide malware. Do not download anything unless you trust the source and you've scanned it with security software.
  • Use strong email passwords and protect them. The longer the password, the harder it is to crack (use at least 10 characters and mix letters, numbers, and special characters). Personal information, your login name, common words, or adjacent keys on the keyboard are not safe passwords. Protect your passwords by not sharing them with anyone, including your friends and not using the same one for multiple websites.

17 of 26

Internet Safety

P2P Sharing:

Some kids share music, games, or software online. Peer-to-peer (P2P) file-sharing allows people to share these kinds of files through an informal network of computers running the same software. P2P file-sharing has risks:

  • You could accidentally provide many people with access to your private files.
  • If you download copyrighted material, you could get mired in legal issues.
  • A shared file could hide spyware, malware, or pornography.

Here are some tips to help you share files safely:

  • Install file-sharing software properly. Activate the proper settings so that nothing private is shared. If it needs updated - take it straight to the tech office!
  • Before you open or play any file you’ve downloaded, use security software to scan it. Make sure the security software is up-to-date and running when the computer is connected to the internet.

18 of 26

Internet Safety

Phishing:

Phishing is when scam artists send fake text, email, or pop-up messages to get people to share their personal and financial information. Criminals use the information to commit identity theft.

Here are a few tips to help you avoid a phishing scam:

  • Don't reply to text, email, or pop-up messages that ask for personal or financial information, and don't follow any links in the message.
  • Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them. Unexpected files may contain malware.

Apps:

Do you download "apps" to a phone or social networking page? Downloading may give the app's developers access to personal information that's not related to the purpose of the app. The developers may share the information they collect with marketers or other companies. Check the privacy policy and their privacy settings to see what information the app can access. And consider this: Is finding out which cartoon character you are really worth sharing the details of your life?

19 of 26

Internet Safety

Texting:

If you are texting, least respect others. Texting shorthand can lead to misunderstandings. Think about how a text message might be read and understood before sending it. Also, remember to:

  • ignore texts from people you don't know
  • learn how to block numbers from your cell phone
  • avoid posting your cell phone number online
  • never provide financial information in response to a text

Sexting:

Sending or forwarding sexually explicit photos, videos, or messages from a mobile phone is known as "sexting." Do not do it! In addition to risking your reputation and friendships, you could be breaking the law if you create, forward, or even save this kind of message. Educate yourself on the consequences of sexting!

20 of 26

Internet Safety

Watch and Discuss

  • Are you surprised by the any of these facts presented in the video?
  • Did you know that sexting could be considered criminal activity?
  • What could be the long term effects of sexting?

21 of 26

Final Thoughts...

Listen up and think about it…

Write a reflective paragraph about this unit. What are you thoughts concerning technology and your life? Did you learn anything new today? Is there something that we are missing? Please share your final thoughts!

22 of 26

Unit Assessment

Please go to www.kahoot.it

Log in with the number that I will put up onto the screen

Create a username

Wait patiently...then begin when the entire class is ready!

23 of 26

Digital License

You’ve Passed!

24 of 26

Springfield Clark CTC’s AUP

Click here to view the school’s acceptable use policy when it comes to technology usage on campus:

25 of 26

Works Cited

"Consumer Information." Site. N.p., n.d. Web. 13 June 2016.

Eldred, Lisa. "ISelf: How Online Identity May Indicate Bigger Problems In Your Teens." Covenant Eyes. N.p., 23 Feb. 2011. Web. 17 June 2016.

"Online Identity." Wikipedia. Wikimedia Foundation, n.d. Web. 17 June 2016.

"Prevent Cyberbullying." Home. N.p., n.d. Web. 12 June 2016.

"Technology: Is Technology Stealing Our (Self) Identities?" Psychology Today. N.p., n.d. Web. 01 July 2016.

"The Top Three Things That Employers Want to See in Your Social Media Profiles - Workopolis." Workopolis. N.p., 05 Apr. 2015. Web. 20 June 2016.

26 of 26

Documents