Digital Communication
U.S. Department of Justice Public Service Announcement
Cyberbullying
Cyberbullying- Generally, as technology advances and changes, so does the society using it. The evolution of technology has ignited new kinds of social interactions and behaviors. For example, technology has birthed cyberbullying. Cyberbullying is a fairly new term and can be defined as harassing and/or tormenting others through electronic means such as cell phones, computers, tablets as well as communication tools including social media sites, text messages, chat, and websites. Examples of cyberbullying include mean text messages or emails, rumors sent by email or posted on social networking sites, and posting or tagging embarrassing pictures, videos, websites, or fake profiles (U.S. Department of Health & Human Services, n.d.).
Check out stopbullying.gov to learn more!
Check out stopbullying.gov to learn more!
Taking Action and Reporting Cyberbullying
(U.S. Department of Health & Human Services, n.d.).
Report Online Service Providers
|
Report to Law Enforcement
|
Report to Schools
|
Harvard University's Top 10 Security DOs and DONTs (2016).
Navigating technology can be completely complicated or entirely easy. Regardless, it's not too difficult to access something risky or troubling because of an accidental tap from a finger, a misleading advertisement, or, simply because we ignored our better judgment. Here are some general guidelines to follow when using technology and all that it has to offer.
1. Don’t be tricked into giving away confidential information
2. Don’t use an unprotected computer
3. Don’t leave sensitive information lying around
4. Lock your computer and mobile phone when not in use
5. Stay alert and report suspicious activity
6. Use password-protect sensitive files and devices
7. Always use hard-to-guess passwords
8. Be cautious of suspicious emails and links
9. Don’t plug in personal devices without permission from the technology specialist
10. Don’t install unauthorized programs on your work or school computers
2. Don’t use an unprotected computer
3. Don’t leave sensitive information lying around
4. Lock your computer and mobile phone when not in use
5. Stay alert and report suspicious activity
6. Use password-protect sensitive files and devices
7. Always use hard-to-guess passwords
8. Be cautious of suspicious emails and links
9. Don’t plug in personal devices without permission from the technology specialist
10. Don’t install unauthorized programs on your work or school computers
Digital Footprints
We all have them. There's really no escaping them.
However, we should pay close attention to where we virtually "step." According to dictionary.com, digital footprints can be defined as "one's unique set of digital activities, actions, and communications that leave a data trace on the Internet or on a computer or other digital device and can identify the particular user or device." We need to be wise and considerate when we use online communications. |
View this informative virtual Digital Footprint flyer created by Lisa Nielsen
Ribble's Four-Stage, Continuous Reflection Model
This model can be used to help students think about, understand, and practice appropriate technology use.
Awareness: focuses on helping students become technologically literate and cognizant of suitable technological use
|
Always remember to REP!
Respect yourself & others
Educate yourself & connect with others Protect yourself & others |