Digital Citizenship Flashcards
Online harassment
The blanket term covering various forms of bad online behaviour such as catfishing and Identify theft
Cyber bullying
It’s using online tools to post mean and hurtful content directed at someone,making them feel embarrassed and degraded
This often leads to isolation and depression.
What are some ways cyberbullying is done
Sending the victim private hurtful messages
Sending messages in group insulting the victim (getting the group to join in)
Posting hurtful or insulting comments on the victims social media post
Spreading false rumours about the victim
Excluding the victim when tagging people on a post
Photoshopping pictures of the victim that they posted
Sharing embarrassing pics and memes
Using the victims picture in “hot or not” votes
Impersonating the victim in a mikiko
Steps if you see cyberbullying
Tell the victim you support them
Stand up to the cyberbully and tell them what they are doing is wrong
Report the behaviour to the social media platform and to a trusted adult
Steps to take if you are the victim of cyberbullying
Message the bully once to stop so they cannot claim they “didn’t know”
Ignore the bully as best as you can
Keep proof/evidence on the bullying(screenshots,saved messages, photos
Set your accounts privacy to high and block the bully
Tell an adult
Report the bully to the social media platform
Report the bully to the police and get a protection order
What are the consequences of cyberbullying
It can give you a criminal record and up to 5 years in prison. You can be convicted with manslaughter(3rd degree murder) cause you pushed the victim to commit suicide
What is cyberstalking
It is the use of online resources to repeatedly contact another person against their wishes makin them feel annoyed or threatened
What are some examples of cyberstalking
Calling the victim constantly
Flooding the victim with messages
Finding the victims location and showing up in real life
Installing malware on the victims device *often via phishing) to spy on them
Tring to destroy the victims reputation
Eg hacking their social media accounts and posting inappropriate pictures or confessing to made up crimes or pretending to be the victim
Subscribing to social media platforms or subscriptions on the victims behalf
How to prevent cyberstalking
Set the strictest privacy settings on your social media accounts
Do not tag locations where you live
Don’t send nude or embarrassing photos of you
Practice good password policies
Block the person if a relationship turns unpleasant
Watch out for phishing attempts-do not click on suspicious links
Check how much information you can find about yourself
Consequences of cyberstalking
You can file a restraining order against the cyberstalker and if they disobey they could be charged with up to 5 years in prison
Do’s before you post
Think twice before you post or write something
Use social media privacy settings to choose the audience you share content with carefully
Delete a post if you realise you made a mistake
Online do not
Overstate cus noone like it when someone posts too much about themselves
Post when you are emotional because emotions can cloud your ability to think clearly
Be overly negative-keep unnecessary criticism to yourself
Only think of yourself-keep in mind that you are responsible for other people’s digital footprints as well
General tips to keep yourself safe on social media
Keep your account on private
Set who can tag photos of you
Specify who can send messages or communicate with you
Disable any setting which shows where you are or have been
Disable any setting which shows when you were last online
Netiquette
Netiquette is a description of what goo manners look like in the digital world
Netiquette do’s
Observe the tone of posts before you post
Consider the tone of communication (formal vs informal/ig vs linked in)
Learn how to respectfully disagree
Check posts for truthfulness before sharing
Stay on topic in a discussion
Read instructions/other people’s comments before you post something do not make people repeat themselves
Netiquette don’ts
Type in all CAPS
Have personal chats in a group chat
Insult people online
Point out people’s mistakes unless it’s necessary
Waste people’s data and time by sharing information unnecessarily
Repost other ppls content without their permission
Commit plagiarism
Share people’s personal information (eg contacts,adress) without asking for permission
Rules for communication
In emails always fill the subject line
Address the person just as you would in a formal letter and if you don’t know who will get it write “to whom it may concern “
Use correct punctuation and capitalisation
Use appropriate language (no IDK)
End off with a greeting
Ethics
The moral principles that govern or influence a person’s conduct
Ethics online do’s
Be the best person you can be online
Respect other people’s opinions
Speak up or report it when you see cyberbullying
Ethics online don’ts
Download copyrighted books,software,music and movies
Share passwords for sites in ways it was not intended- eg family plans on music sites should only be shared with family
Why do we need copyright
People make products which they use as a source of income . It could take a lot of effort to make it and someone could just steal it. It’s to help control wo makes copies
What is copyright
A law which protects anything people create which can be copied or sold. It gives you control of who can make copies of your product
Conditions for copyright
If your idea cab be seen hear read it touched it is protected by copyright
Copyright applies to
Written content
Software
Music or sound recordings
Video recordings
A wide variety of art forms
Whatvus public
A space where anyone can copy another person’s work
Why would copyright stop
The duration has ended and authors will willingly give up their copyright
What is plagiarism
using someone elses work as your own without giving them credit
Consequences of plagiarism
Warning at school or 0 on the assignment you plagiarised on
What are the consequences for plagiarism in University
Expulsion
What must you do if you use information from a source in an assignment
Refer to the source at the specific place where you used information from that source and include a description of the source in a reference list
How to reference a book
Say the surname of the author and the publication date in the body of the assignment
How to reference in the bibliography
Authors surname,year publication title of the book
How yo reference an online source
Author or name of company
Url
Year published
Titles of the website
Daye accessed
Public domain
Creative works that are copyright free
Referencing
Acknowledging the source whr you found your information
FAIR USE
The right to use copyrighted materials without permission
What do you need to prove to get a protection order
You need to prove someone is following,watching,bothering or communicating with you in a ongoing fashion. This can be done by saving evidence such as texts and emails
What do you do if you don’t know who is harassing you
You can still apply for a protection order so the court can order police to investigate
What should you do if you are being harassed
You should apply for a protection order at your local court
What happens after you apply for a protection
The court will Grant an interim protection order while they’re matters being investigated and they will see if a permanent protection order can be granted
What must be offending person know
The offending person must be informed of the interim protection order and be given a date to when the matter will be heard in court disc give the person a chance to defend themselves and forbids the offending person from contacting you or approaching you physically
What happens if someone breaks the terms of a protection order
They may be sentence for up to 5 years in jail or have to pay a fine
What does POPI stand for
Protection of personal information
Is the poppy act
A law which aims to protect the privacy of information
Who is affected by the poppy act
People or institutions who collect, store and process information
What happens if the requirements of the poppy act are not met
Someone who first to protect information can face a fine of up to 10 million
as well as have to pay damages of to those whose information was misused or made public
they can also be sending to a term in prison
What should you do if you suspect your personal information has been misused or has been leaked
You can report this to the regulator( an office or group of people appointed by the Parliament to oversee the act)
What is the r i c a act
A law which aims to control the monitoring of people’s Communications
this law set out rules about who is allowed to intercept your Communications
aka tap into your phone calls(listen to), monitor your emails etc
Who is affected by the Rica act
Everyone
What is the Rica act used for sometimes
It is used to catch criminals because they use it to plan and carry out crimes so police can apply to a judge to give them permission to monitor their Communications
What should you do to be protected by the Rica act
Make sure you provide accurate information when supplying information required by the Rica act
What is the cybercrime’s bill
It is a law which tries to define what cybercrime and cyber terrorism are and how these crimes can be fought punished and ultimately prevented
Who is affected by the cybercrimes bill
Anyone who uses a computing device whether it be a smartphone ,tablet laptop or desktop computer
What are some examples of cybercrimes in the bill
Unauthorized access to data or hardware
Unauthorized interception of Communications
fraud committed using computing devices
sending messages that incite violence or damaged to property or that threaten a person or group of persons
What penalties are laid down for breaking rules in the cybercrime bill
A person can spend up to 15 years in prison
or
up to 25 years if he slatch she commits an act of terrorism against the state
or
they have to pay for it
What should you do to protect yourself from The cybercrimes Bill or getting in trouble
Understand what can be regarded as a cybercrime and make sure you do not Commit This crimes
Variables
variables keep values that the computer must remember so that they can be used later
What is an example of a variable
Formula for calculating area of a rectangle is area = length*breath
so when you swap in numbers that is when you are giving variables a value
How do you use decomposition to solve problems
First identify the main (larger) problem by describing it in your own words
then identify the smaller problems that together make up the lodge her problem
then find solutions for all the smaller problems which will together solve the main problem as well
Describe the start/stop flowchart shape and what it does
It is a rectangle with circular edges and an indicates whether algorithm starts/stops
Describe the instruction chart flowchart shape and what it does
It is a rectangle and the actions (processing) that must take place
Describe the decision flowchart shape and its function
It is a diamond laying on its side and it has questions with a yes or no answer
Describe the input/ output shape in a flowchart and what it does
It is a parallelogram and all data given to the program (input) and the results of the processing communicated to the user( output)