D. Digital Citizenship

Technological advancements create societal concerns regarding the practice of safe, legal, and ethical behaviors.

Important

  • National Cyber Security Awareness Month (October)
  • National Internet Safety Month (June)

Acceptable Use Policy

POLICY DESCRIPTION

Cyber safety

Cyber security

  • “involves protecting that [your personal] information [stored on the computer or online] by preventing, detecting, and responding to attacks.”

Examples

    • “viruses erasing your entire system,
    • someone breaking into your system and altering files,
    • someone using your computer to attack others,

Cyber bullying

Examples

    • sending mean, vulgar, or threatening messages or images;
    • posting sensitive, private information about another person;
    • pretending to be someone else in order to make that person look bad;

Cyber ethics

  • “refers to a code of safe and responsible behavior for the Internet community… understanding the risks of harmful and illegal behavior online and learning how to protect ourselves”

Cyber Crimes (Computer Crimes)

FBI Definition of Cyber Crime

“The Federal Bureau of Investigations (FBI) recognizes four instances of cyber crime:

  1. Cyber crimes against children
  2. Theft of intellectual property
  3. Publication and intentional dissemination of malware
  4. National and international Internet fraud

Examples

    • downloading illegal music files
    • stealing millions of dollars from online bank accounts
    • creating and distributing viruses on other computers
    • posting confidential business information on the Internet
    • identity theft, where someone steal personal information via phishing or pharming
    • Internet fraud
      • Source:

Copyright

Fair Use

A FAIR(Y) USE TALE

Creative Commons Guidelines

http://creativecommons.org

Unauthorized Electronic Access

Filters for Censorship (Internet Censorship)

http://epic.org/free_speech/censorship/
  • “Filtering can be based on ablacklist or be dynamic.”
  • methods for censoring content are IP blocking, DNS filtering
  • “restricting private internet access to blocking searches for politically volatile keywords.”

Communications Decency Act (CDA)

  • criminalizes “indecent” speech on the Internet
Grade 3-4

8.1.4.D.1 Explain the need for each individual, as a member of the global community, to practice cyber safety, cyber security, and cyber ethics when using existing and emerging technologies.
8.1.4.D.2 Analyze the need for and use of copyrights.
8.1.4.D.3 Explain the purpose of an acceptable use policy and the consequences of inappropriate use of technology.

Grade 6-8

8.1.8.D.1 Model appropriate online behaviors related to cyber safety, cyber bullying, cyber security, and cyber ethics.
8.1.8.D.2 Summarize the application of fair use and Creative Commons guidelines.
8.1.8.D.3 Demonstrate how information on a controversial issue may be biased.

Grade 9-12

8.1.12.D.1 Evaluate policies on unauthorized electronic access (i.e., hacking) and disclosure and on dissemination of personal information.
8.1.12.D.2 Demonstrate appropriate use of copyrights as well as fair use and Creative Commons guidelines.
8.1.12.D.3 Compare and contrast international government policies on filters for censorship.
8.1.12.D.4 Explain the impact of cyber crimeson society.