{"id":576,"date":"2017-12-29T10:26:47","date_gmt":"2017-12-29T15:26:47","guid":{"rendered":"http:\/\/gmsitech.com\/ed\/?page_id=576"},"modified":"2023-08-26T10:12:24","modified_gmt":"2023-08-26T14:12:24","slug":"d-digital-citizenship","status":"publish","type":"page","link":"https:\/\/gmsitech.com\/ed\/tech-class-site\/topics\/8-1-educational-technology\/d-digital-citizenship\/","title":{"rendered":"D. Digital Citizenship"},"content":{"rendered":"<div class=\"sites-layout-tile sites-tile-name-header\">\n<div dir=\"ltr\">\n<div>\n<div dir=\"ltr\">\n<div>\n<div dir=\"ltr\">Technological advancements create societal concerns regarding the practice of safe, legal, and ethical behaviors.<\/div>\n<\/div>\n<div dir=\"ltr\"><\/div>\n<div dir=\"ltr\">\n<div>\n<h3><a name=\"TOC-Important\"><\/a>Important<\/h3>\n<ul>\n<li>National\u00a0<i>Cyber<\/i>\u00a0Security Awareness\u00a0<i>Month<\/i>\u00a0(October)<\/li>\n<li>National Internet\u00a0<i>Safety Month<\/i>\u00a0(June)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<table class=\"sites-layout-hbox\" cellspacing=\"0\">\n<tbody>\n<tr>\n<td class=\"sites-layout-tile sites-tile-name-content-1\">\n<div dir=\"ltr\">\n<div>\n<div class=\"sites-embed-align-left-wrapping-off\">\n<div class=\"sites-embed-border-off sites-embed sites-embed-full-width\">\n<div class=\"sites-embed-content sites-embed-type-toc\">\n<div class=\"goog-toc sites-embed-toc-maxdepth-1\">\n<p>CONTENTS<\/p>\n<ol class=\"goog-toc\">\n<li class=\"goog-toc\"><a href=\"https:\/\/sites.google.com\/site\/techmsi1\/units\/8-1\/81d#TOC-Important\"><strong>1 <\/strong>Important<\/a><\/li>\n<li class=\"goog-toc\"><a href=\"https:\/\/sites.google.com\/site\/techmsi1\/units\/8-1\/81d#TOC-Acceptable-Use-Policy\"><strong>2 <\/strong>Acceptable Use Policy<\/a><\/li>\n<li class=\"goog-toc\"><a href=\"https:\/\/sites.google.com\/site\/techmsi1\/units\/8-1\/81d#TOC-Cyber-safety\"><strong>3 <\/strong>Cyber safety<\/a><\/li>\n<li class=\"goog-toc\"><a href=\"https:\/\/sites.google.com\/site\/techmsi1\/units\/8-1\/81d#TOC-Cyber-security\"><strong>4 <\/strong>Cyber security<\/a><\/li>\n<li class=\"goog-toc\"><a href=\"https:\/\/sites.google.com\/site\/techmsi1\/units\/8-1\/81d#TOC-Cyber-bullying\"><strong>5 <\/strong>Cyber bullying<\/a><\/li>\n<li class=\"goog-toc\"><a href=\"https:\/\/sites.google.com\/site\/techmsi1\/units\/8-1\/81d#TOC-Cyber-ethics\"><strong>6 <\/strong>Cyber ethics<\/a><\/li>\n<li class=\"goog-toc\"><a href=\"https:\/\/sites.google.com\/site\/techmsi1\/units\/8-1\/81d#TOC-Cyber-Crimes-Computer-Crimes-\"><strong>7 <\/strong>Cyber Crimes (Computer Crimes)<\/a><\/li>\n<li class=\"goog-toc\"><a href=\"https:\/\/sites.google.com\/site\/techmsi1\/units\/8-1\/81d#TOC-Copyright\"><strong>8 <\/strong>Copyright<\/a><\/li>\n<li class=\"goog-toc\"><a href=\"https:\/\/sites.google.com\/site\/techmsi1\/units\/8-1\/81d#TOC-Unauthorized-Electronic-Access\"><strong>9 <\/strong>Unauthorized Electronic Access<\/a><\/li>\n<li class=\"goog-toc\"><a href=\"https:\/\/sites.google.com\/site\/techmsi1\/units\/8-1\/81d#TOC-Filters-for-Censorship-Internet-Censorship-\"><strong>10 <\/strong>Filters for Censorship (Internet Censorship)<\/a><\/li>\n<\/ol>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<h2><a name=\"TOC-1\"><\/a><\/h2>\n<h2><a name=\"TOC-Acceptable-Use-Policy\"><\/a>Acceptable Use Policy<\/h2>\n<ul>\n<li>a written agreement(contract) that outlines responsible behavior for technology use.<\/li>\n<li><a href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Fwww.cybercrime.gov%2Frules%2FacceptableUsePolicy.htm&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNENIfhI9tv-NhhRZ9_ArOZFprxXZg\">Model Acceptable Use Policy for IT Resources in the Schools<\/a><\/li>\n<\/ul>\n<div>\n<div class=\"sites-embed-align-left-wrapping-off\">\n<div class=\"sites-embed-border-on sites-embed\">\n<h4 class=\"sites-embed-title\">POLICY DESCRIPTION<\/h4>\n<div class=\"sites-embed-content sites-embed-type-youtube\"><iframe loading=\"lazy\" class=\"youtube-player\" title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/KQUNQZdXT5g?rel=0&amp;wmode=opaque\" width=\"425\" height=\"355\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div><\/div>\n<h2><a name=\"TOC-Cyber-safety\"><\/a>Cyber safety<\/h2>\n<ul>\n<li>&#8220;<\/li>\n<\/ul>\n<h2><a name=\"TOC-Cyber-security\"><\/a>Cyber security<\/h2>\n<ul>\n<li><span style=\"font-family: arial, geneva, helvetica;\">&#8220;involves protecting that [your personal] information [stored on the computer or online] by preventing, detecting, and responding to attacks.&#8221;<\/span><\/li>\n<\/ul>\n<h4><a name=\"TOC-Examples\"><\/a><span style=\"font-family: arial, geneva, helvetica;\">Examples<\/span><\/h4>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><span style=\"font-family: arial, geneva, helvetica;\">&#8220;viruses erasing your entire system,<\/span><\/li>\n<li><span style=\"font-family: arial, geneva, helvetica;\">someone breaking into your system and altering files,<\/span><\/li>\n<li><span style=\"font-family: arial, geneva, helvetica;\">someone using your computer to attack others,<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><span style=\"font-family: arial, geneva, helvetica;\">or someone stealing your credit card information and making unauthorized purchases&#8221; <\/span>\n<ul>\n<li>Source: <a href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Fwww.us-cert.gov%2Fcas%2Ftips%2FST04-001.html&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNFa1cL_eRz8MowQJmXB_pe-gzzmVw\">http:\/\/www.us-cert.gov\/cas\/tips\/ST04-001.html<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2><a name=\"TOC-Cyber-bullying\"><\/a>Cyber bullying<\/h2>\n<ul>\n<li>&#8220;repeated use of information technology, including e-mail, instant messaging, blogs, chat rooms, pagers, cell phones, and gaming systems, to deliberately harass, threaten or intimidate others.&#8221;\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Source: <a href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Fcriminaljustice.state.ny.us%2Fmissing%2Fi_safety%2Fcyberbullying.htm&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNHN8UXbkunKkAgK1cjfbf8ovzc_HA\">http:\/\/criminaljustice.state.ny.us\/missing\/i_safety\/cyberbullying.htm<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><span style=\"font-family: arial, geneva, helvetica;\">&#8220;practice of using technology to harass, or bully, someone else&#8221; which &#8220;<\/span><span style=\"font-family: arial, geneva, helvetica;\">can range in severity from cruel or embarrassing rumors to threats, harassment, or stalking.&#8221;<\/span>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Source: <a href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Fwww.us-cert.gov%2Fcas%2Ftips%2FST06-005.html&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNFWlSkGGXU3uHVJZznODsuvhivwCg\">http:\/\/www.us-cert.gov\/cas\/tips\/ST06-005.html<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h4><a name=\"TOC-Examples1\"><\/a>Examples<\/h4>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>sending mean, vulgar, or threatening messages or images;<\/li>\n<li>posting sensitive, private information about another person;<\/li>\n<li>pretending to be someone else in order to make that person look bad;<\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>(or) intentionally excluding someone from an online group\u201d\n<ul>\n<li>Source: <a href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Fstopbullyingnow.hrsa.gov%2Fadults%2Fcyber-bullying.aspx&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNGRE9THbbUuSCW7Z7Cj6F-vk8hP-g\">http:\/\/stopbullyingnow.hrsa.gov\/adults\/cyber-bullying.aspx<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2><a name=\"TOC-Cyber-ethics\"><\/a>Cyber ethics<\/h2>\n<ul>\n<li>&#8220;refers to a code of safe and responsible behavior for the Internet community&#8230; understanding the risks of harmful and illegal behavior online and learning how to protect ourselves&#8221;\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Source: <a href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Fwww.cybercrime.gov%2Fcyberethics.htm&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNG6bnqBzz5ZdHjqYkJpPEUq4NkJ0Q\">http:\/\/www.cybercrime.gov\/cyberethics.htm<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>\n<div>\n<div>\n<div><\/div>\n<div>\n<div>\n<h2><a name=\"TOC-Cyber-Crimes-Computer-Crimes-\"><\/a>Cyber Crimes (Computer Crimes)<\/h2>\n<ul>\n<li><a href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Fwww.fbi.gov%2Fabout-us%2Finvestigate%2Fcyber%2Fcyber&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNHEHehL5cjAbdf4t5QQhWgaQs1y-Q\">http:\/\/www.fbi.gov\/about-us\/investigate\/cyber\/cyber<\/a><\/li>\n<li><a href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Fwww.cybercitizenship.org%2Fcrime%2Fcrime.html&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNFWiKGLrmdt8bVFm_eFF8o-IXv0kA\">http:\/\/www.cybercitizenship.org\/crime\/crime.html<\/a><\/li>\n<li><a href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Fwww.techterms.com%2Fdefinition%2Fcybercrime&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNGb1u-NUSXPQ7orjZ6PynFx2fMnhA\">http:\/\/www.techterms.com\/definition\/cybercrime<\/a><\/li>\n<\/ul>\n<h4><a name=\"TOC-FBI-Definition-of-Cyber-Crime\"><\/a>FBI Definition of Cyber Crime<\/h4>\n<div>\n<p>&#8220;The Federal Bureau of Investigations (FBI) recognizes four instances of cyber crime:<\/p>\n<ol>\n<li>Cyber crimes against children<\/li>\n<li>Theft of intellectual property<\/li>\n<li>Publication and intentional dissemination of malware<\/li>\n<li>National and international Internet fraud<\/li>\n<\/ol>\n<ul>\n<li>The United States\u2019 executive branch defined a National Strategy to Secure Cyberspace, which put the FBI and the Department of Justice in charge of cyber crime investigation and prosecution.&#8221;\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Source: <a href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Fwww.brighthub.com%2Finternet%2Fsecurity-privacy%2Farticles%2F65042.aspx&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNH3hLfoPLBSm46CmalvbttL8T2wGg\">http:\/\/www.brighthub.com\/internet\/security-privacy\/articles\/65042.aspx<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>\n<h4><a name=\"TOC-Examples2\"><\/a>Examples<\/h4>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>downloading illegal music files<\/li>\n<li>stealing millions of dollars from online bank accounts<\/li>\n<li>creating and distributing viruses on other computers<\/li>\n<li>posting confidential business information on the Internet<\/li>\n<li>identity theft, where someone steal personal information via phishing or pharming<\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Internet fraud\n<ul>\n<li>Source:<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>\n<div>\n<hr size=\"2\" width=\"100%\" \/>\n<h2><a name=\"TOC-Copyright\"><\/a>Copyright<\/h2>\n<\/div>\n<div>\nFair Use<\/p>\n<ul>\n<li>the conditions under which you can use material that is copyrighted by someone else without paying royalties.\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><u>Source<\/u>:<a href=\"http:\/\/www.google.com\/url?ei=fFHCTPK9H8aqlAfMgZ0H&amp;sig2=W1joExzFlpjD1Um8Yc0zPA&amp;q=http:\/\/wordnetweb.princeton.edu\/perl\/webwn%3Fs%3Dfair+use&amp;sa=X&amp;ved=0CBkQpAMoAA&amp;usg=AFQjCNGl0vfvbLAhWFZb-FdDDk0sVhoFgA\">wordnetweb.princeton.edu\/perl\/webwn<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<div class=\"sites-embed-align-left-wrapping-off\">\n<div class=\"sites-embed-border-on sites-embed\">\n<h4 class=\"sites-embed-title\">A FAIR(Y) USE TALE<\/h4>\n<div class=\"sites-embed-content sites-embed-type-youtube\"><iframe loading=\"lazy\" class=\"youtube-player\" title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/CJn_jC4FNDo?rel=0&amp;wmode=opaque\" width=\"425\" height=\"355\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><\/div>\n<\/div>\n<\/div>\n<ul>\n<li>Professor Eric Faden of Bucknell University provides this humorous, yet informative, review of copyright principles delivered through the words of the very folks we can thank for nearly endless copyright terms.<\/li>\n<li><a href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Fcyberlaw.stanford.edu%2Fdocumentary-film-program%2Ffilm%2Fa-fair-y-use-tale&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNEwSX7lno0N8mZ_J-u_QuisvJPjKA\" rel=\"nofollow\">http:\/\/cyberlaw.stanford.edu\/documentary-film-program\/film\/a-fair-y-use-tale<\/a><\/li>\n<\/ul>\n<h3><a name=\"TOC-Creative-Commons-Guidelines\"><\/a>Creative Commons Guidelines<\/h3>\n<p><a href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Fcreativecommons.org%2F&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNHN_9nsCG3RSgaWzxBYgP4KDPEq3Q\">http:\/\/creativecommons.org<\/a><\/p>\n<h2><a name=\"TOC-Unauthorized-Electronic-Access\"><\/a>Unauthorized Electronic Access<\/h2>\n<h2><a name=\"TOC-Filters-for-Censorship-Internet-Censorship-\"><\/a>Filters for Censorship (Internet Censorship)<\/h2>\n<\/div>\n<div>http:\/\/epic.org\/free_speech\/censorship\/<\/div>\n<div><\/div>\n<div>\n<ul>\n<li>&#8220;Filtering can be based on ablacklist or be dynamic.&#8221;<\/li>\n<li>methods for censoring content are IP blocking, DNS filtering<\/li>\n<li>&#8220;restricting private internet access to blocking searches for politically volatile keywords.&#8221;<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div>\n<h3><a name=\"TOC-Communications-Decency-Act-CDA-\"><\/a>Communications Decency Act (CDA)<\/h3>\n<ul>\n<li>criminalizes &#8220;indecent&#8221; speech on the Internet<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/td>\n<td class=\"sites-layout-tile sites-tile-name-content-2 sites-canvas-sidebar\">\n<div dir=\"ltr\">\n<div>\n<div dir=\"ltr\">\n<div>\n<div dir=\"ltr\">\n<div>\n<h5><a name=\"TOC-Grade-3-4\"><\/a>Grade 3-4<\/h5>\n<p>8.1.4.D.1 Explain the need for each individual, as a member of the global community, to practice cyber safety, cyber security, and cyber ethics when using existing and emerging technologies.<br \/>\n8.1.4.D.2 Analyze the need for and use of copyrights.<br \/>\n8.1.4.D.3 Explain the purpose of an acceptable use policy and the consequences of inappropriate use of technology.<\/p>\n<h5><a name=\"TOC-Grade-6-8\"><\/a>Grade 6-8<\/h5>\n<p>8.1.8.D.1 Model appropriate online behaviors related to cyber safety, cyber bullying, cyber security, and cyber ethics.<br \/>\n8.1.8.D.2 Summarize the application of fair use and Creative Commons guidelines.<br \/>\n8.1.8.D.3 Demonstrate how information on a controversial issue may be biased.<\/p>\n<h5><a name=\"TOC-Grade-9-12\"><\/a>Grade 9-12<\/h5>\n<p>8.1.12.D.1 Evaluate policies on unauthorized electronic access (i.e., hacking) and disclosure and on dissemination of personal information.<br \/>\n8.1.12.D.2 Demonstrate appropriate use of copyrights as well as fair use and Creative Commons guidelines.<br \/>\n8.1.12.D.3 Compare and contrast international government policies on filters for censorship.<br \/>\n8.1.12.D.4 Explain the impact of cyber crimeson society.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div class=\"sites-layout-tile sites-tile-name-footer\">\n<div dir=\"ltr\">\n<h4><a name=\"TOC-Note\"><\/a><span style=\"font-size: xx-small;\">Note<\/span><\/h4>\n<ul>\n<li><span style=\"font-size: xx-small;\"><u>Current and emerging technology resources<\/u>: For example, cell phones, GPS, online communities using wikis, blogs, vlogs, and\/or Nings.<\/span><\/li>\n<li><span style=\"font-size: xx-small;\"><u>Controversial issue<\/u>: For example, 1. global warming, 2. scarcity of water, 3. alternative energy sources, 4. election campaigns<\/span><\/li>\n<li><span style=\"font-size: xx-small;\">See also <a href=\"https:\/\/sites.google.com\/site\/techmsi1\/units\/8-2\/82c\">8.2.C. Technological Citizenship, Ethics, and Society<\/a><\/span><\/li>\n<\/ul>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Technological advancements create societal concerns regarding the practice of safe, legal, and ethical behaviors. Important National\u00a0Cyber\u00a0Security Awareness\u00a0Month\u00a0(October) National Internet\u00a0Safety Month\u00a0(June) CONTENTS 1 Important 2&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":583,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"class_list":["post-576","page","type-page","status-publish","hentry"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"magaziner-small":false,"magaziner-medium":false,"magaziner-large":false,"alx-small":false,"alx-medium":false},"uagb_author_info":{"display_name":"techmsi","author_link":"https:\/\/gmsitech.com\/ed\/author\/admin\/"},"uagb_comment_info":0,"uagb_excerpt":"Technological advancements create societal concerns regarding the practice of safe, legal, and ethical behaviors. Important National\u00a0Cyber\u00a0Security Awareness\u00a0Month\u00a0(October) National Internet\u00a0Safety Month\u00a0(June) CONTENTS 1 Important 2&#46;&#46;&#46;","_links":{"self":[{"href":"https:\/\/gmsitech.com\/ed\/wp-json\/wp\/v2\/pages\/576","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gmsitech.com\/ed\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/gmsitech.com\/ed\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/gmsitech.com\/ed\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gmsitech.com\/ed\/wp-json\/wp\/v2\/comments?post=576"}],"version-history":[{"count":1,"href":"https:\/\/gmsitech.com\/ed\/wp-json\/wp\/v2\/pages\/576\/revisions"}],"predecessor-version":[{"id":697,"href":"https:\/\/gmsitech.com\/ed\/wp-json\/wp\/v2\/pages\/576\/revisions\/697"}],"up":[{"embeddable":true,"href":"https:\/\/gmsitech.com\/ed\/wp-json\/wp\/v2\/pages\/583"}],"wp:attachment":[{"href":"https:\/\/gmsitech.com\/ed\/wp-json\/wp\/v2\/media?parent=576"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}