1. Digital Etiquette
1.1. What is it?
1.1.1. The electronic standards of conduct or procedure by causing the least negative impact possible on others.
1.2. Uses
1.2.1. Appropriate
1.2.1.1. Students work with their teachers to understand what specific content is appropriate to share from their personal resources.
1.2.1.2. Students learn the rules of a chat group before becoming involved.
1.2.2. Inappropraite
1.2.2.1. Students using cell phones in class on unrelated topics.
1.2.2.2. Students trolling and bullying on social media.
1.3. A simple video that defines cyberbullying and how to protect yourself from it
2. Digital Rights and Responsibilties
2.1. What is it?
2.1.1. The requirements and freedoms extended to everyone in a digital world. This includes citing materials, claiming ownership for work, and reporting cyberbullies to keep the digital landscape safe.
2.2. Uses
2.2.1. Appropriate
2.2.1.1. Students cite digital information used for a class project
2.2.1.2. Educators instruct students of their rights and responsibilities for specific digital tools
2.2.2. Inappropraite
2.2.2.1. Students fail to properly cite digital resources
2.2.2.2. Students violate their school's digital rules because they view them as unfair
2.3. Why we cite resources
3. Digital Literacy
3.1. What is it?
3.1.1. The process of teaching and learning about technology and the use of technology
3.1.1.1. Learning the digital basics
3.1.1.2. Evaluating online resources for accuracy, trustworthiness, and safety.
3.1.1.3. Exploring and learning about online learning and communication modes.
3.2. Uses
3.2.1. Appropriate
3.2.1.1. Students take online courses
3.2.1.2. Teachers use digital resources and tools to create an innovative lesson that inspires and keeps students interested.
3.2.1.3. Using trustworthy email services like Gmail
3.2.2. Inappropraite
3.2.2.1. Teachers do not provide digital resources to their students
3.2.2.2. Students choose alternative educational opportunities because their school/district doesn't provide online courses.
3.3. An entry level task to being a digital citizenship is being able to "google" properly. Here's an article giving (overly) specific directions on how to.
4. Digital Security
4.1. What is it?
4.1.1. The electronic precautions to guarantee safety of hardware, identity, schools and other systems, and the community.
4.2. Uses
4.2.1. Appropriate
4.2.1.1. Users take the appropriate measures to make sure their firewalls and virus protection are active, up to date, and properly functioning.
4.2.1.2. Teachers and parents talk to students about the dangers of providing information to anyone over the internet.
4.2.2. Inappropraite
4.2.2.1. Teachers and students fail to update and/or patch security measures that protect against viruses and exploitation.
4.2.2.2. Students fail to protect their identity when using email, social media, or any program.
4.3. A news article from 2016 that goes into digital identity theft. Some users figured out security questions simply by gleaning over a facebook page.
5. Digital Access
5.1. What is it?
5.1.1. Full electronic participation in society
5.2. Uses
5.2.1. Appropriate
5.2.1.1. Teachers and administrators work towards making digital tools available to all students
5.2.1.2. Tech leaders provide tech tools (laptops, tablets, etc) to schools.
5.2.2. Inappropraite
5.2.2.1. Schools ignore or overlook the need of certain groups for digital access (i.e. being extremely racist and deciding black students don't need tech tools)
5.2.2.2. Teachers fail to accommodate students who do not have access to tech tools
5.3. An article about schools that gave laptops to their students and they saw a significant, yet modest, boost in scores and their tech skills
6. Digital Health and Wellness
6.1. What is it?
6.1.1. Physical and psychological well-being in a digital technology world
6.2. Uses
6.2.1. Appropriate
6.2.1.1. Tech leaders learn how to promote physical and mental well-being via the internet
6.2.1.2. Teachers model appropriate digital well-being by showing students stretches and the dangers of a sedentary lifestyle
6.2.2. Inappropraite
6.2.2.1. Teachers and administrators ignore the potential risks technology on the body and mind
6.2.2.2. Teachers do not model proper ergonomics when using technology
6.2.2.3. Students use a computer for hours straight without getting up or stretching
6.3. Here is a simple video that can assist with posture while on a computer for adults and kids
7. Digital Commerce
7.1. What is it?
7.1.1. The electronic buying and selling of goods
7.2. Uses
7.2.1. Appropriate
7.2.1.1. Students stay informed about safe ways to purchase and sell products and behave accordingly
7.2.1.2. Students identify "safe" sites to buy and sell from before doing so
7.2.2. Inappropraite
7.2.2.1. Students buying goods through unverified sources and risking their identity being stolen
7.2.2.2. Students failing to realize that poor online purchasing practices can lead to poor credit
7.3. An article that lists ways on how to protect your identity when shopping online
8. Digital Communication
8.1. What is it?
8.1.1. The electronic exchange of information
8.2. Uses
8.2.1. Appropriate
8.2.1.1. Students and teachers communicate through email outside the classroom
8.2.1.2. Social media is used in the classroom to host a disucssion
8.2.1.3. Teachers use blogs to inform parents and students
8.2.2. Inappropraite
8.2.2.1. Students text during class
8.2.2.2. Students using internet shorthand for class assignments that require complete answers/words
8.2.2.3. Students use text messages and other digital means to cheat on tests
8.3. This is a link to an article that shows how The International School connects more efficiently with its students and parents
9. Digital Law
9.1. What is it?
9.1.1. The electronic responsibility for actions and deeds and to use digital resources legally.
9.2. Uses
9.2.1. Appropriate
9.2.1.1. Students understand what can be downloaded for free and what is copyrighted and must be paid for. I.e. Renting a movie on YouTube.
9.2.1.2. Students notify an adult of others sharing nude or semi-nude material.
9.2.2. Inappropraite
9.2.2.1. Pirating software
9.2.2.2. Downloading copyrighted material through a file sharing site
9.2.2.3. Students scripting to bypass a firewall or other network protection
9.2.2.4. Stealing someone's (digital) identity