Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.
4.5 Bringing It All Together
Transcript of 4.5 Bringing It All Together
0002103906 Nine Themes of Digital Citizenship Working on a research paper, Jason goes to the library to do some further investigating on his topic. He finds a computer that has been left open by a student who is working on the same subject matter. He doesn't see any of the other student's content but he sees that the document was left open on the references page. The only other person in the area is a librarian on the other side of the room behind the computer and Jason decides to copy the other student's reference pages for his own. Anna is hired to work in a music studio and one day she finds a digital document on the company computer that contains the names, cellphone numbers, and email addresses of quite a few famous musicians and producers that the studio owner had compiled. She decides to copy this information down to use for her own networking purposes. Denise is in the process of applying for a job at Company X. Meanwhile, she sees a Twitter post about her favorite movie by someone (that she doesn't know) whose tagline says he works for "Company X". She decides to contact this person through his Twitter handle to ask him about the job or the company. You enter a marathon race and come in third place. You win a nice trophy and your friend snaps a photo of you holding the trophy. The friend then posts the photo online with a caption saying you won the race. The photo is popular and is reposted and re-tweeted often. This photo becomes the number one searched link for the race and it declares that you are the winner. A student has been on a family trip and realizes that his assignment is due in one day. The student logs into the Full Sail library research databases and copies/pastes information without giving proper credit to the authors of the materials. You work for a club. The owner approaches you about your knowledge of Photoshop and wants you to edit some of the pictures of the club that are on the club's website. He wants you to add in equipment they don't have and famous artists who have not played there, and to add people to the crowd shots to make it look more crowded. Susan's favorite musician released a new album. Susan is struggling financially, but really wants to hear the new album. She finds someone that has the album already and makes herself a copy. Digital Access- Digital Commerce- Digital Communication- Digital Literacy- Digital Etiquette (misuse)- Digital Law- Digital Rights and Responsibilities- Digital Health and Wellness- Digital Security- Part II Part III Digital Citizenship Compass As a digital citizenship, what would you do? Creating digital audio for blind students or captioned videos for those who are hearing impaired. Purchasing name-brand products on sites such as eBay.com. Using ergonomic furniture in work spaces for individuals that spent hours at their desks each day. Scanning computers for viruses on a regular basis or setting up password protections for home computers. Posting your own religious beliefs on a public blog. Hacking into someone's computer to access financial information. Collaborating with peers using websites/web tools such as Google Docs Suite and/or Diigo. Sharing personal information on a public website/personal blog. Could be different for each person-
I personally would not take the other student's reference page, but I believe that others might. To me it can be considered a form of plagiarism because I wouldn't have put the work into find all the sources. However, I think there is a possibility some may use the sources for guidance rather than saying the references are their own, which is why I can't say it is wrong. Each student would have a different feel for this situation. Wrong-
I don't find this right at all. I do not believe Anna could change any of the factors to make it acceptable without not doing it at all. Anna should be able to network with other people just by doing her job, not by stealing contact information from her work. I believe its a violation of privacy for the musicians and producers whose information was on that document. Not comfortable with this-
I don't feel comfortable with the idea of Denise messaging a guy on the internet who claims to work for Company X. He could be lying and even if he is not lying about Company X it seems wrong to message a random employee and ask them questions. If she had questions about the company or the job she should talk to the person in charge of hiring or call the company themselves. Could be right with a few changes-
I believe this could be right with a few changes. To begin with the student should have been more well organized and prepared for their assignment. I believe that the student did the right thing by logging into the library database; however, the student shouldn't copy and paste all the information for their project. The student should write their own work and then add cited quotes to support it. A reference page would also be a good idea. Not comfortable with this-
I'm really not comfortable with the idea of a friend posting a picture of me on the internet without my permission, not even taking into account the fact they lied about me winning the marathon. I'm ridiculously not comfortable with an image of me being viral and everyone having access to my general location because of the exif. Could be different for each person-
I believe this could be different for everyone because I know some people who would burn the CD to their computer, make a hard copy on another disc, wait patiently until they could afford it, or just ask to borrow it. Susan chose the option to make a copy for herself. I personally would've chosen to wait or if I was really desperate I would've asked to borrow it. I have a friend who have chosen to burn it to his computer. I believe its different for everyone. Maybe/Maybe not-
In this situation it depends on the circumstances of the owner asking me . I would say no if the owner wanted me to falsify information to the public. However, if the club is actually getting the equipment in a few days and have scheduled the famous artists to play there I wouldn't see it as a big deal. As for adding images of more people in the club I don't see it as a wrong. Its a marketing tactic to get more people to come and they aren't the only ones to use it. You take on a freelance job to clean up and streamline a computer for a colleague. As you begin the project, you notice that this person may not be digitally native/fluent with computers. The computer they wish you to work on contains poor file management exposing financial and personal records. In addition, private photos are easily accessible. What is your responsibility to them and their information? You recently started a small company creating X. To build your new company's image, you fabricate employees, projects and a background to help your image and spur quick growth. A large corporation contacts you to work on their next big project. They decided to go with you because of your experience and knowledge of the area. Some of the details of the company's project requires the number of employees and the company background that you have fabricated but do not actually have. What do you do? Your little brother is a very active online gamer. He comes to you crying, telling you that some other gamers said strange and threatening things to him. He is now afraid to play his favorite game. You don't know who these strangers are, but you do know what time your brother was online, what game he was playing and on what network. What can you do? You see a vintage care for sale on eBay for a terrific price. You really want it, but the price seems too good to be true. The eBay ad has several photos, a list of the car's features, and the location of the seller. What steps would you take to ensure the authenticity of the offer? Your sister has a favorite scarf that she bought on a trip to Juarez, Mexico. It got damaged recently and you want to replace it for her for a birthday gift. You don't know where it was purchased and you live far away from Mexico. All you have is the scarf, vacation photos and a good internet connection. What digital tools could you use to hunt down and purchase the birthday surprise? You want to plan a party for your best friend to celebrate a recent promotion. You want to reach as many of your friend's friends as possible, but want to keep it a secret. You and your friend use almost all of the same social networks. What tools or communication methods could you use to plan and invite people to the secret event? The steps I would take to ensure the offers authenticity would start with me looking at the metadata from the picture. This would give me an idea about whether or not the seller actually took the pictures, when, and where they were uploaded from. Since the seller stated their address I could use google maps to make sure that they actually possess the car. More than likely I could see it in their driveway or yard. With the address, I could possibly find a telephone number to ask for the VIN number of the vehicle so I can check its history.
In the end I'd still go see check the car out for myself, but I could verify if it was even worth checking out and spending the money on using digital tools. I believe using these tools would make me a good digital citizen because I could help others tell if the car offer was authentic and not a scam. I'd be using the commerce, access, communication, law, and security elements of being a good digital citizen. I would inform the company about the fabrication and offer them suggestions about other companies that could help them with the project instead. I would then proceed to change the information for my company to the real facts whether it be on a website or a brochure.
I would be a terrible digital citizen if I spread the disinformation to get my business a better image and I believe I'd be breaking digital laws. My business would probably suffer from the severe defamation that the large company would bring forth, but it would be worth it because starting a company on a lie isn't the best idea. My responsibility to my colleague is to help them and explain that they need to set-up a security for their computer and their digital identity because the digital community isn't always safe. I would then help them secure their information by setting up a virus protection software like avast! and putting a password on their computer. After doing that, I would talk to my colleague and tell him about what I did and how he should back up his information.
After consulting my non-digitally native colleague on how to protect his files, I would talk to him about his pictures. I'd explain how people can use an uploaded picture to find a person's location because of the exif tags within pictures. I would show him www.verexif.com to show him how to remove the information from the pictures. If my brother came to me crying because people on his favorite game said strange and threatening him and I would notify the admins of the game. I would explain to them the situation and give them all the information I had to help them find the people who did it. I would also tell my little brother that everything would be ok and explain to him how he can set-up block/ignore for the players who said those things to him.
After getting the situation handled I would tell him that they have bad etiquette and to not act like them, "Everyone has a right to the digital world". I would then tell him to never give out personal information about himself just in case. To hunt down and purchase my sister a new scarf for her birthday I would use the exif on the pictures to find out where she went exactly in Juarez, Mexico. After getting general locations and using deductive skills on the pictures, I could figure out a timeline for when she got the scarf and what part of Juarez she was in. I would then use google maps to find store locations around the area, ruling out stores that don't sell accessories or clothes. If the remaining stores have websites I would check them out to see if they have the scarf. For the stores that don't have websites I could call them and ask if they sell scarves and see if they have it. With all that I should be able to get my sister a replacement scarf.
The tools I would have used for this venture are: Google Maps, exif viewer, phone, internet searches. To make a truly surprising party for my friend, I would use of one the social networks to plan the event and send out invitations. With most social networking sites you can change the privacy settings of events and posts. An example of this would be Facebook. You can make events private so that people who are not invited can't see it including the friend you're holding the party for. For this party, I would use the Privacy Settings option to get my information out. Part of the event would also be a disclaimer explaining not to make any posts about the event and that its supposed to be kept quite. I would set this system up on multiple social networking sites to ensure I get a good amount of my friend' friends.
I would also use email and messaging to figure out who is going to what part of the party prep like getting the beverages, food, keeping my friend preoccupied before the party. For all the people who would be helping me I'd also get phone numbers so I could ensure everyone is keeping on track with the plan for the event. Texting or emailing with a friend while in a collaborative brainstorming meeting.