Vous êtes sur la page 1sur 13

DIGITAL CITIZENSHIP

A Guide to Digital Technologies, Products and Social Networks




John Lwin
CONTENTS

Introduction...................................................................................Page 1

Digital Citizenship and Social Networking!!!!!!!!!!Page 2
o What is Digital Citizenship?...............................................Page 2
o What is Social Networking?...............................................Page 2
o What are some strategies for safely using Social
Networks?..........................................................................Page 3

Cyber Bullying and Digital Footprint!!!!!!!!!!!!..Page 4
o What is Cyber Bullying?.....................................................Page 4
o What are some strategies to manage/limit Cyber
Bullying?............................................................................Page 5
o What is Digital Footprint?................................................Page 6

Work/Life Balance!!!!!!!!!!!!!!!!!!!!Page 6
o Why is ensuring an appropriate work/life balance, in relation to
ICT access, important?......................................................Page 6

Rights of Content Creators - Copyright!!!!!!!!!!!.Page 7
o What are some ways of protecting the rights of content
creators?............................................................................Page 7
o What are the relevant sections of the Australian Copyright Act in
relation to digital technologies and products?...................Page 8

Intellectual Property and Creative Commons!!!!!!!!..Page 8
o What is Intellectual Property?............................................Page 8
o What is Creative Commons?.............................................Page 9

Conclusion!!!!!!!!!!!!!!!!!!!!!!!.Page 9
!"#"$%& ("$")*+,-". /

INTRODUCTION

The Internet is a great and wonderful thing. It enables people from around the world
to connect and communicate with each other almost instantly and for a variety of
purposes. The Internet is also an easy access to a wide range of information, which
you can also contribute to and share.

These online services and applications provide a great benefit to society, but it also
has some downsides. The Internet holds many risks and dangers for users. Users
are also at risk of offending others in the virtual space.

This guide is to help users to understand more about the Internet, its features and
how to access and utilise it more responsibly and safely for themselves and others in
the virtual space.












!"#"$%& ("$")*+,-". 0

DIGITAL CITIZENSHIP AND SOCIAL NETWORKING

What is Digital Citizenship?

Digital citizenship is the means of appropriate, sensible, and responsible use of
technology. It is a tool that teaches users about technology and helps them
understand the aspects and features that technology embodies. It is a way to
prepare users for a society full of technology.

Digital citizenship covers concepts and themes including personal safety, online
etiquette, the law relating to technology and various health issues.


What is Social Networking?

Social networking is the use of a website, service or application, on any device that
focus on facilitating the creation of social networks and relations with other people,
usually those that share interests, activities, backgrounds, or have real-life
connections to them.

There can be social networks for virtually anything and everything. However, they
can be broken down into the different categories of:

Blogs
Forums
Microblogging
Podcasts
Image sharing sites
Video sharing sites
Social bookmarking
Community-moderated content, such as wikis
Virtual communities, such as online gaming

There are major and basic characteristics surrounding social networks, differentiating
them from a normal website. These characteristics are as follows.

Social networks are user-based. This means that the users build and direct them,
rather than one webmaster or author updating the information in a single direction.
Users populate the network with content, and the content is directed by anyone who
participates in the online, making the flow of information, and the network as a
whole, more dynamic. This can lead to the build-up of online communities, and
eventually the network, or at least parts of the network, is community-driven, where
members of that online community hold common beliefs or hobbies.

They are interactive, meaning there is a two-way flow of information between the
user and a computer (or in this instance, a network), where the computer (network)
not only presents the information and content, but also responds to the input of the
users. This makes the users feel more engaged, creating a closer relationship
between them and the network, unlike those of non-interactive websites and
applications.
!"#"$%& ("$")*+,-". 1



There are a variety of features available in social networking. These features include:

Video calling
Text messaging
Instant messaging
Blogging
Video and photo sharing

!Just to name a few.
What are some strategies for safely using Social Networks?

Just as social networks are easy to use, it is also easy to encounter risks and make
us a target for cyber-criminals when accessing and using applications and services,
many of which, can be unknown to you.

These are a variety of risks that users will encounter when using a social network:

Cyber-stalking.
Bullying.
Access to age-inappropriate content.
Disclosure of private information either by yourself or friends/contacts.
Online child abuse and grooming (when someone develops a relationship with
someone else with illegal or immoral intent e.g. paedophilic relationships with
unsuspecting children).
Viruses or spyware attached to messages or photographs.
Prosecution or recrimination due to posting inappropriate or offensive content.
Phishing emails allegedly from safe sites like social networks, that are an
attempt at identity theft in which criminals lead users to a counterfeit website
in the hope that they will disclose private information.
Posts from friends, companies and other people encouraging you to link to
counterfeit or inappropriate websites.
People hijacking or hacking into your account or page.

Users can counter these risks and dangers by following a sensible guideline:

Learn how to use the site properly, especially the privacy features to restrict
strangers access to your profile and private information.

Do not allow peer pressure convince you to do something you are not
comfortable with.

Use strong passwords (medium to long passwords with some variety of
characters).

Be aware of what people post or reply about you, particularly about your
personal details and activities.
!"#"$%& ("$")*+,-". 2


Make sure that you have effective and updated anti-virus software before
going online.

Never post content that are inappropriate or may cause offence to others.

Never use the same password that you use for your bank or email accounts.
Having different passwords for different accounts prevent the risk of multiple
accounts being stolen.

Pick a user name that does not include any personal information e.g. your full
name in a username is not very safe.

Keep your profile closed, and adjust the settings so that only your friends can
see it.

Dont violate your companys social network policies.


CYBER BULLYING AND DIGITAL FOOTPRINT

What is Cyber Bullying?

Cyber bullying is deliberate harassment, threatening, or embarrassment of one
person by another person through the use of technology. It is not only an easy form
of harassment, but it can be shared widely and quickly, which is why it is so
dangerous. It can even lead to exclusion from peer groups, intimidation, extortion,
and violence (or threats of violence), and in worse cases, suicide and death.

This chart shows the most common cyber bullying situations.
(Taken from KidsHelpline.com)

!"#"$%& ("$")*+,-". 3

Types of Cyber bullying:

Denigration, or humiliating someone by posting mean online messages
through email, instant messaging, chat rooms or websites.

Exclusion, or intentionally leaving someone out of online group activities.

Outing, or sharing private information, pictures and videos about someone
online without their consent.

Harassment through continuously sending malicious messages to the victim.

Impersonation, where someone pretends to be someone else and posts
inappropriate and/or false content about the victim.

Flaming, or online fights where angry and rude comments are exchanged.

Tricking someone into revealing personal information then sharing it with
others.

What are some strategies to manage/limit Cyber Bullying?

If you find yourself a victim to cyber bullying, you should:

Block the bully and change your privacy settings.

Report the abuse.

Talk to someone you trust about it. This may be your family, friends or a
teacher.

If you are a parent or teacher of the victim, things you can do to help are:

Intervening as early as possible before it becomes a bigger problem.

Be aware of the bullying, what it is, how it happens, and its impacts.

Ensure the child is and feels safe and supported.

Assist in reducing or stopping the bullying.

If you are a friend of a victim, you should:

Leave negative groups and conversations.

Support your friend.

Report the bullying to a parent or teacher.

!"#"$%& ("$")*+,-". 4


What is a Digital Footprint?

A digital footprint are the traces a user leaves online as they use or move through
the Internet. Every piece of information can be traced back to you is digitally retained
somewhere online. This information includes content that you actively volunteer (e.g.
Facebook profiles), whilst other content is passive, such as the cookies a site stores
in your browser. This data can be collected to create a profile of you and your online
behaviour.

The information that users unconsciously leave on the Internet (including posted
comments, etc.) can always be accessed, even when deleted. Potential issues that
arise from the presence of a Digital Footprint can include hackers accessing other
users personal information from the traces they leave online. This can lead to theft,
stalking, blackmail, etc.



WORK/LIFE BALANCE

Why is ensuring an appropriate work/life balance, in relation to ICT access,
important?

Nowadays, technology has enabled us to become increasingly efficient in work, as
well as making it more convenient. This also relates to leisure, with technology
creating new means for entertainment and maintaining social ties. Even though
technology is a great thing, users must be wary not to overuse it, as well as
prioritising work and lifestyle needs.

The strategies provided might help maintain this balance between work and life, as
well as eliminating any stress that comes from them.

Take time off from work, and when you do, relax and enjoy the time fully. Use
this time to catch up with your family, and undertake activities that rejuvenate
you. This break from work is critical in restoring your mental and physical
strength.

Create a program or timetable scheduling work and leisure activities, and
follow up on it. This will help you become more committed to it and youll be
more likely to undertake those activities.

Make the schedule maintainable. If something is not already part of your
schedule, it isnt realistic to expect that youll start to do it regularly. It is better
to start off slow, and eventually make it a regular activity. This will stop you
from procrastinating the activity due to overestimating your capabilities.

Personalise your schedule and activities. Dont get caught up in trendy
balance activities if they dont fit your tastes. Spend time doing the things you
really love to do. Doing things you love will benefit you more than doing things
you dislike.
!"#"$%& ("$")*+,-". 5


Be gentle with yourself when pursuing a balanced lifestyle. You cant expect
to achieve and maintain a fully balanced lifestyle over a day. It takes time, and
you may even fail. Dont let this put you down. Continue and try again, in little
steps.


RIGHTS OF CONTENT CREATORS - COPYRIGHT

What are some ways of protecting the rights of content creators?

Copyright
It is the exclusive and assignable legal right given to the copyright owners of media
such as text, artistic works, music, computer programs, sound recordings and films,
but only for a certain period of time. This enables them to reproduce the material,
and gives them the right to perform or show the work to the public. They can also
prevent others from reproducing or communicating their work without consent, as
well as being able to sell these rights to someone else. Copyright is important as it
promotes the progress of various creations, as well as preventing a risk of engaging
in illegal copying by accident due to a lack of knowledge.

Fair Dealing
The fair dealing provisions allow limited use of copyright material for certain
purposes without requiring permission from the copyright owner. Fair dealing only
applies to certain purposes: research or study, criticism or review, parody or satire,
news reports, court proceedings or professional advice. The work being copied must
be a legal copy, although you do not need to own a copy of the material (i.e. you can
borrow material from the library, etc.). The amount of work copied is limited to 10%
or 1 chapter whichever is greater.

Private Use
It is the copying of material for your own personal and domestic use. The work
copied must be legal as well. It is different from Fair Dealing, in the sense that:

You must own a copy of the material being reproduced.

Works can be copied in full.

Copies can be lent or shared with anyone.

Purpose of copying must be for your own private use.

Moral Rights
They are about being properly credited when your work is used and displayed. It
connects the work with their creator. It requires that your name be shown with your
work at all times. It also requires that your work be treated in a way that it doesnt
hurt your reputation. This means that no one can alter it without permission. Moral
rights begin when a work is created, and continue for your lifetime, and up to 70
years after your death. You cannot give away your moral rights. They are for you
only.
!"#"$%& ("$")*+,-". 6


What are the relevant sections of the Australian Copyright Act in relation to
digital technologies and products?

Relevant sections (as exhibited in the 1968 Australian Copyright Act) that relate to
digital technologies and products can be found in:

Part 2: Interpretation,
Part 3: Copyright in Original literary, dramatic, musical and artistic works,
Part 5: Remedies and offences,
Part 6: Copyright Tribunal of Australia,
And Part 9: Moral rights of performers and of authors of literary, dramatic,
musical or artistic works and cinematograph films.

These parts of the Australian Copyright Act covers content concerning non-
infringement, copyright, actions relating to copyright infringement, licensing, and
moral rights. These parts are divided into sections with more specific detailing of the
said features.

They are important, as they give an in-depth description of the different aspects of
digital technologies and products to give users a better understanding of them. It
also outlines the various aspects of copyright, such as obtaining a licence for various
creations, protecting works from infringement and how not to violate the Act.

INTELLECTUAL PROPERTY AND CREATIVE COMMONS

What is Intellectual Property?

Intellectual property (IP) is essentially the creations of the mind, and can range from
a new invention, brand, design or artistic creation. Intellectual property rights are the
legally recognized exclusive rights these creations. Having these rights are
important, as it gives IP owners time and opportunity to exploit their creation, with a
sure safety of their potential content from infringers.

There are different types of IP protection. Sometimes, IP does not need to be
registered in order to be of value. Each type of IP protection provides different
competitive advantages for its users:

- Registered Design: Protects the visual design, shape or appearance of a product.

- Trademark: A trademark identifies the particular goods or services of a trader as
distinct from those of other traders.

- Patent: Grants the inventor the right to exclude others from making, using, selling,
offering to sell, and importing an invention for a limited period of time, in exchange
for the public disclosure of the invention.

- Copyright: Gives the creator of original work exclusive rights to its original
expression of its ideas, but not the ideas themselves, and only for a limited time.

!"#"$%& ("$")*+,-". 7

- Trade Secrets and Confidential Information: Gives creators certain rights and
privileges depending on the type of IP protection.

- Plant Breeders Rights: Protects the commercial rights of new plant varieties.


What is Creative Commons?

Creative Commons is a non-profit organization that works to increase the creativity
(cultural, educational, and scientific) available in the commons the body of work
that is available to the public for free and legal sharing, use, repurposing, and
remixing.


CONCLUSION

Users should have a good understanding of the Internet, its features, as well as
potential issues that may arise, including content infringement and harassment. This
report is to reinforce the knowledge of users and make them more aware of what an
online space holds, and the pros and cons of its use, in order to protect themselves
and their digital content as well as that of other users.
!"!#"$%&'()*

(2S Nay 2u14) 'What is Bigital Citizenship.', Bigital Citizenship |WWWj,
http:www.tsv.catholic.euu.auiesouice_centieuigital_citizenshipuigital_citiz
enship.php

Ribble, Nike (2S Nay 14) 'Welcome to the Bigital Citizenship Website', Bigital
Citizenship |WWWj, http:www.uigitalcitizenship.net

Boswell, Wenuy (2S Nay 14) 'Social Neuia: What Is It.', About.com |WWWj,
http:webseaich.about.comoublogsfoiumssocialsitesfsocial_web.htm

(2S Nay 2u14) 'Safe social netwoiking', Stay Smait 0nline |WWWj,
http:www.staysmaitonline.gov.auhome_useispiotect_youiself2safe_social_
netwoiking

(2S Nay 2u14) 'Social Netwoiking Sites', uet Safe 0nline |WWWj,
https:www.getsafeonline.oigsocial-netwoikingsocial-netwoiking-sites

Nitchell, Ashley (2S Nay 2u14) '12 tips foi safe social netwoiking', Netwoik
Woilu |WWWj, http:www.netwoikwoilu.comcommunitytips-foi-safe-
social-netwoiking

(24 Nay 2u14) 'Cybeibullying', Cybeismait |WWWj,
http:www.cybeismait.gov.auteenshow%2uuo%2uI%2uueal%2uwithcybe
ibullying.aspx

(24 Nay 2u14) 'Cybeibullying: what is it anu how to get help: violence,
Baiassment anu Bullying Fact sheet', Austialian Buman Rights Commission
|WWWj, https:www.humaniights.gov.aucybeibullying-what-it-anu-how-get-
help-violence-haiassment-anu-bullying-fact-sheet

(24 Nay 2u14) 'The 8 Types of Cybeibullying', }ointheupstanueis |WWWj,
https:sites.google.comsitejointheupstanueisthe-8-types-of-cybeibullying

(24 Nay 2u14) 'Bigital Footpiint', The 0pen 0niveisity |WWWj,
http:www2.open.ac.ukstuuentscaieeisjob-seekinguigital-footpiint

Khaibac, Neu (24 Nay 2u14) 'A uieat uuiue 0n Teaching Stuuents About Bigital
Footpiint', Euucational Technology anu Nobile Leaining |WWWj,
http:www.euucatoistechnology.com2u1Su4a-gieat-guiue-on-teaching-
stuuents.html

(24 Nay 2u14) 'The Pioblem with WoikLife Balance', Ameiican Nanagement
Association |WWWj, http:www.amanet.oigtiainingaiticlesThe-Pioblem-
with-Woik-Life-Balance.aspx

Stewait (24 Nay 2u14) 'IP Piotection', What Is IP |WWWj,
http:www.ipaustialia.gov.auunueistanuing-intellectual-piopeitywhat-is-
ipip-piotection

(24 Nay 2u14) 'What Is Intellectual Piopeity.', Intellectual Piopeity Exploiei
|WWWj, http:intellectualpiopeityexploiei.comwhat-is-intellectual-piopeity

(24 Nay 2u14) 'Peisonal 0se', Copyiight 0ffice |WWWj,
http:www.unimelb.euu.aucopyiightinfoimationfastfinupeisonaluse.html

(24 Nay 2u14) 'What Is the Impoitance of Copyiight.', Ask |WWWj,
http:www.ask.comquestionwhat-is-the-impoitance-of-copyiight

(24 Nay 2u14) 'Faii Bealing', Copyiight 0ffice |WWWj,
http:www.unimelb.euu.aucopyiightinfoimationfastfinufaiiuealing.html

(2S Nay 2u14) 'What aie moial iights.', Aits Law Centie of Austialia |WWWj,
http:www.aitslaw.com.aulegaliaw-lawwhat-aie-moial-iights

(2S Nay 2u14) 'Copyiight Act 1968 (Cth)', BaiNet }aue |WWWj,
https:jaue.bainet.com.au}aue.html#aiticle=21824S

(2S Nay 2u14) 'What is Cieative Commons', Cieative Commons |WWWj,
http:wiki.cieativecommons.oigimagesSSSCieativecommons-what-is-
cieative-commons_eng.puf

Vous aimerez peut-être aussi