Digital Citizenship

Descrição

Mind Map Of Digital Citizenship
Thomas Shaw
Mapa Mental por Thomas Shaw, atualizado more than 1 year ago
Thomas Shaw
Criado por Thomas Shaw quase 4 anos atrás
8
0

Resumo de Recurso

Digital Citizenship
  1. Netiquette
    1. Nettiquette- the rules of the internet (how to act online)
      1. Remember the Human
        1. Adhere to the same standards of behaviour online that you follow in real life
          1. Know where you are in cyberspace
            1. Respect other people's time and bandwidth
              1. Make yourself look good online
                1. Share expert knowledge
                  1. Help keep flame wars under control
                    1. Respect other people's privacy
                      1. Don't abuse your power
                        1. Be forgiving of other people's mistakes
    2. Digital Footprint
      1. Digial footprint is that what ever you post online will be saved and could stop your future
        1. A digital foot print is virtual picture of you based on your online activity. Digital footprint could be permanent if companies keep your data or other screen grab your posts.
          1. You have a right to consent to what is and isn’t shared on the internet.
            1. You also have a responsibility to remember that you need permission before sharing information and pictures about other people.
          2. Before you post ask your self 5 questions
            1. If you didn’t know you, what would you think of your post?
              1. Are you happy to loose control of this post, once you post it people can share it without you knowing.
                1. Are you over sharing? Do you want people to know this about you?
                2. Do you have the person whose information or picture you are sharing’s permission to do so? Would you want it shared if it was you?
                  1. THE BILLBOARD, would you be happy for your post to be shared on a billboard for all of your school, family and friends to see.
              2. Cyber Bulleing.
                1. Cyberbullying is bullying that takes place over any digital devices.
                  1. Around half of teens have been the victims of cyber bullying. Around half of teens have been engaged in cyber bullying. Only 1 in 10 teens will tell their parents if they have been a victim of cyberbullying. More than 1 in 3 teens have experienced some form of threat. 1 in 10 teens have had an embarrassing or damaging picture taken of them without their permission. 1 in 5 teens have shared a sexually suggestive image of themselves. Gender race and social status does not affect the whether or not somebody will be a victim or bully. 10-20% of those who experience cyberbullying experience it regularly. Cyber bullying victims are more likely to have low self esteem and to consider suicide.
                2. Fake News
                  1. News that is false and often sensational, the information is circulated under the disguise of news reporting. Often for financial gain or political propaganda
                    1. 2 Types of fake news
                      1. False stories that are deliberately published or sent around, in order to make people believe something untrue or to get lots of people to visit a website. These are deliberate lies that are put online, even though the person writing them knows that they are made up.
                        1. Stories that may have some truth to them, but they're not completely accurate. This is because the people writing them - for example, journalists or bloggers - don't check all of the facts before publishing the story, or they might exaggerate some of it.

                    Semelhante

                    A level Computing Quiz
                    Zacchaeus Snape
                    Types and Components of Computer Systems
                    Jess Peason
                    Input Devices
                    Jess Peason
                    Improve your Revision with Online Flashcards
                    daniel.praecox
                    Output Devices
                    Jess Peason
                    Computing
                    Kwame Oteng-Adusei
                    Pack of playing cards answer
                    Karl Taylor
                    Code Challenge Flow Chart
                    Charlotte Hilton
                    Computer Science Revision 2
                    Hannah Styring
                    WANs and LANs
                    Josh Watkins
                    Programming Languages
                    Charlie Turner