Beruflich Dokumente
Kultur Dokumente
1
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Objectives
In recent years digitization is no longer confined to controlled laboratory but has started addressing
real world scenarios and situations. The rising interest in the digital world stems from the fact that all
small and big tasks require digitization. Digitization is everywhere – in the car we drive, the phone we
use, the books we read etc. Everyone is keen to invent and use new technologies. But do we know
whether anyone who uses technology is a good digital citizen? Just as we know the rules of the society,
we must know the rules of the digital world, and learn how to be safe and responsible with technology.
To be a digital citizen means to follow the social guidelines of appropriate, responsible behaviour with
regard to technology use.
The main objective of Digital Citizenship and Cyber Wellness Olympiad is to make our future
generations leaders of Digital India. It aims to inculcate interest in students about working safely and
responsibly on the internet and creating a safe learning and sharing web environment for everyone.
They must know how important and crucial it is to head responsibly towards automation and
digitization.
The Olympiad is open to students of English and Hindi medium schools across India. The test
encourages students to emphasize on the logical application of their knowledge base and promotes
their move towards a digital India. This Olympiad is not about participation only from the toppers but
is open to anyone who has a knack towards technology. It does not focus on marks and ranks but is
more about promoting sustainability; it is about making each child of the school a responsible netizen.
2
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Introduction
This booklet is meant to be interesting, helpful and an educational reference material for students. It
presents an overview of digital citizenship in practice. The content of this booklet focuses on the
elements of digital citizenship which includes Cyberbullying, Digital Privacy, Digital
Rights/Responsibilities, Internet Safety, Netiquette, Online Plagiarism and many more, and how
students can be online without getting threatened or afraid of their identity theft.
This booklet also exposes students to some of the contemporary happenings in the digital world and
steps towards becoming a responsible digital citizen. This booklet is designed for students to use as a
reading material at their own leisure and understand why and how they can be safe online. This book
in no way should be considered as a course book which needs to be read to be able to take exams.
Digital citizenship helps online users including teachers, students, and professionals to understand
what they should know to use technology with the maximum safety and responsibility. It is not a
teaching tool but a way to prepare students for a society which is technology driven.
Digital citizenship is gaining momentum not only in developed countries but around the world.
Whether we call it digital citizenship, digital wellness or digital ethics, the issues are the same, how
should we behave when we are online, and what should be taught to our peer groups for them to be
safe and aware digital citizens. With the advent of one-is-to-one teaching with technology, we also
need to talk about using technology responsibly. Not only organizations, but individuals too are taking
interest in the topic and working towards making the digital world a safer place.
The world is moving into a digital age, an age of openness and transparency. The benefit is that every
citizen has access to information and each can participate in generation of knowledge.
3
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Note to the Students
Now is the time to focus using the internet and technology responsibly. Everyone should be free to
use the internet but in a manner that does not offend or hurt any other person. The handbook gives
a precise introduction to different elements of digital citizenship in the world today.
On completion of the handbook, you will be participating in the Olympiad and will be assessed on the
information provided in this booklet. After understanding the importance of Digitization, each one of
you should attempt at least one project. You can also make a group, select a topic and work on the
project. You must have a detailed project proposal before you start on the project. The project
proposal must include the calendar of activities to be undertaken. Select a teacher as your mentor
who should guide your project and monitor closely the activities associated with the project. Once you
complete the project, write a report and send it for evaluation. Project based learning would ensure
learning in the affective domain which would bring forth good, sensitive, rational citizens.
The Olympiad questionnaire will ensure that the participant is keen towards digitization and has
acquired the knowledge of components and uses of digital citizenship. The Olympiad will motivate you
to be a global learner.
We wish you all the best and thank you for your participation.
4
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Table of Contents
Objectives .......................................................................................................................................... 2
Introduction....................................................................................................................................... 3
Note to the Students ......................................................................................................................... 4
Table of Contents .............................................................................................................................. 5
Digital Citizenship ............................................................................................................................ 13
Digital Access .......................................................................................................................... 13
Digital Commerce ................................................................................................................... 14
Digital Communication ........................................................................................................... 14
Digital Literacy ........................................................................................................................ 14
Digital Etiquette ...................................................................................................................... 14
Digital Law............................................................................................................................... 14
Digital Rights and Responsibilities .......................................................................................... 14
Digital Health and Wellness .................................................................................................... 14
Digital Security ........................................................................................................................ 15
Digital Access ................................................................................................................................... 16
Chapter 1 – Public Domain.............................................................................................................. 17
1.1 Objectives ........................................................................................................................ 17
1.2 Introduction ..................................................................................................................... 17
1.3 Content Under Public Domain ......................................................................................... 18
1.3.1 Books Under Public Domain ................................................................................ 18
1.3.2 Music Under Public Domain ................................................................................ 18
1.3.3 Films Under Public Domain .................................................................................. 19
1.4 Value of Public Domain .................................................................................................... 19
1.5 Perpetual Copyright ......................................................................................................... 20
1.6 Works Not Covered By Copyright Law ............................................................................. 20
1.7 Chapter Objective Checklist ............................................................................................. 21
1.8 Let’s Recap ....................................................................................................................... 21
1.9 Did You Know? ................................................................................................................. 21
1.10 References from Internet .............................................................................................. 22
Chapter 2 – Online Presence........................................................................................................... 23
2.1 Objectives ........................................................................................................................ 23
2.2 Introduction ..................................................................................................................... 23
5
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
2.3 Importance of Online Presence ....................................................................................... 24
2.4 Modes to Make Online Presence ..................................................................................... 24
2.5 Creating a Profile.............................................................................................................. 25
2.5.1 Elements of a Successful Social Media Profile ..................................................... 25
2.6 Start Building Your Online Presence ................................................................................ 26
2.7 Tips to Enhance Your Online Presence ............................................................................ 27
2.8 Chapter Objective Checklist ............................................................................................. 27
2.9 Let’s Recap ....................................................................................................................... 28
2.10 Did You Know? ............................................................................................................... 28
2.11 References from Internet .............................................................................................. 28
Chapter 3 – Social Media ................................................................................................................ 30
3.1 Objectives ........................................................................................................................ 30
3.2 Introduction ..................................................................................................................... 30
3.3 Applications of Social Media ............................................................................................ 30
3.3.1 Social Media in Education .................................................................................... 31
3.3.2 Social Media in Learning ...................................................................................... 31
3.4 Social Media Tools/Apps .................................................................................................. 32
3.5 Social Media Warnings..................................................................................................... 34
3.6 Chapter Objective Checklist ............................................................................................. 34
3.7 Let’s Recap ....................................................................................................................... 35
3.8 Did You Know? ................................................................................................................. 35
3.9 References from Internet ................................................................................................ 35
Chapter 4 – Digital Footprint .......................................................................................................... 36
4.1 Objectives ........................................................................................................................ 36
4.2 Introduction ..................................................................................................................... 36
4.3 Types of Digit Footprints .................................................................................................. 36
4.4 What is in Your Digital Footprints .................................................................................... 37
4.5 How to Create a Positive Digital Footprint ...................................................................... 37
4.6 Manage Your Digital Footprints ....................................................................................... 38
4.7 Chapter Objective Checklist ............................................................................................. 38
4.8 Let’s Recap ....................................................................................................................... 38
4.9 Did You Know? ................................................................................................................. 39
4.10 References from Internet .............................................................................................. 39
Digital Commerce ............................................................................................................................ 40
Chapter 5 – Digital Commerce ........................................................................................................ 41
5.1 Objectives ........................................................................................................................ 41
6
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
5.2 Introduction ..................................................................................................................... 41
5.3 Concept ............................................................................................................................ 41
5.3.1 Different Types of Digital Commerce................................................................... 42
5.4 Advantages and Disadvantages of Digital Commerce ..................................................... 42
5.4.1 What is Electronic Payment System? Why is it Important? ................................ 43
5.4.2 What is E-Banking? .............................................................................................. 44
5.4.3 What is Online Publishing? .................................................................................. 44
5.5 Chapter Objective Checklist ............................................................................................. 44
5.6 Let’s Recap ....................................................................................................................... 45
5.7 Did You Know? ................................................................................................................. 45
5.8 References from Internet ................................................................................................ 46
Digital Communication ................................................................................................................... 47
Chapter 6 – Digital Communication................................................................................................ 48
6.1 Objectives ........................................................................................................................ 48
6.2 Introduction ..................................................................................................................... 48
6.3 Different Types of Digital Communication ...................................................................... 49
6.4 Advantages and Disadvantages of Digital Communication ............................................. 49
6.5 Do’s and Don’ts of Digital Communication ...................................................................... 50
6.6 Chapter Objective Checklist ............................................................................................. 51
6.7 Let’s Recap ....................................................................................................................... 51
6.8 Did You Know? ................................................................................................................. 51
6.9 References from Internet ................................................................................................ 52
Digital Literacy ................................................................................................................................. 53
Chapter 7 – Digital Search ............................................................................................................... 54
7.1 Objectives ........................................................................................................................ 54
7.2 Introduction ..................................................................................................................... 54
7.3 Search Engines ................................................................................................................. 54
7.4 How a Search Engine Works ............................................................................................ 55
7.5 Effective Search Strategies............................................................................................... 55
7.6 Tips for Effective Search................................................................................................... 56
7.7 Chapter Objective Checklist ............................................................................................. 56
7.8 Let’s Recap ....................................................................................................................... 57
7.9 Did You Know? .................................................................................................................. 57
7.10 References from Internet .............................................................................................. 57
Chapter 8 – Image Copyright .......................................................................................................... 58
8.1 Objectives ........................................................................................................................ 58
7
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
8.2 Introduction ..................................................................................................................... 58
8.3 Why Should You Care About Copyright? ......................................................................... 58
8.3.1 Work Protected by Copyright .............................................................................. 59
8.3.2 Work Not Protected by Copyright ....................................................................... 59
8.4 Copyright Infringement.................................................................................................... 59
8.4.1 When Permission is Required to Use an Image ................................................... 60
8.5 Rules You Follow for Using Any Image from the Internet ............................................... 60
8.6 Fair Use Law ..................................................................................................................... 60
8.7 Chapter Objective Checklist ............................................................................................. 60
8.8 Let’s Recap ....................................................................................................................... 61
8.9 Did You Know? ................................................................................................................. 61
8.10 References from Internet .............................................................................................. 62
Chapter 9 – Online Plagiarism ........................................................................................................ 63
9.1 Objectives ........................................................................................................................ 63
9.2 Introduction ..................................................................................................................... 63
9.3 Why Students Plagiarize?................................................................................................. 64
9.4 Categories of Plagiarism................................................................................................... 64
9.5 Consequences of Plagiarism ............................................................................................ 64
9.6 Check if You Are Supporting Plagiarism? ......................................................................... 65
9.7 Chapter Objective Checklist ............................................................................................. 65
9.8 Let’s Recap ....................................................................................................................... 65
9.9 Did You Know? ................................................................................................................. 66
9.10 References from Internet .............................................................................................. 66
Digital Etiquette .............................................................................................................................. 67
Chapter 10 - Netiquette .................................................................................................................. 68
10.1 Objectives ...................................................................................................................... 68
10.2 Introduction ................................................................................................................... 68
10.3 Why Netiquettes? .......................................................................................................... 68
10.4 Undesirable Netiquettes ................................................................................................ 69
10.5 Basic Netiquettes ........................................................................................................... 69
10.5.1 Netiquettes for Emails ....................................................................................... 70
10.5.2 Netiquettes for Discussion Groups .................................................................... 70
10.5.3 Netiquettes for Retrieving Information ............................................................. 71
10.6 Chapter Objective Checklist ........................................................................................... 71
10.7 Let’s Recap ..................................................................................................................... 71
10.8 Did You Know? ............................................................................................................... 72
8
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
10.9 References from Internet .............................................................................................. 72
Digital Law ....................................................................................................................................... 73
Chapter 11 – Digital Law ................................................................................................................. 74
11.1 Objectives ...................................................................................................................... 74
11.2 Introduction ................................................................................................................... 74
11.3 Copyright and Trademark Law ....................................................................................... 75
11.4 Trade Secrets and Patents ............................................................................................. 75
11.5 Licensing......................................................................................................................... 76
11.5.1 Consequences of Software Piracy ...................................................................... 76
11.6 Data Protection .............................................................................................................. 77
11.7 Cybercrime ..................................................................................................................... 77
11.8 Cyber Laws in India ........................................................................................................ 78
11.9 Chapter Objective Checklist ........................................................................................... 82
11.10 Let’s Recap ................................................................................................................... 82
11.11 Did You Know? ............................................................................................................. 83
11.12 References from Internet ............................................................................................ 83
Digital Rights and Responsibilities.................................................................................................. 84
Chapter 12 – Digital Rights and Responsibilities ............................................................................ 85
12.1 Objectives ...................................................................................................................... 85
12.2 Introduction ................................................................................................................... 85
12.3 Digital Disrespect ........................................................................................................... 86
12.3.1 Effects of Digital Disrespect ............................................................................... 86
12.3.2 Precautions from Digital Disrespect .................................................................. 87
12.4 Digital Rights .................................................................................................................. 87
12.5 Digital Responsibilities ................................................................................................... 88
12.6 Why are Digital Rights and Responsibilities Important?................................................ 88
12.7 Chapter Objective Checklist ........................................................................................... 89
12.8 Let’s Recap ..................................................................................................................... 89
12.9 Did You Know? ............................................................................................................... 90
12.10 References from Internet ............................................................................................ 90
Digital Health and Wellness ............................................................................................................ 91
Chapter 13 - Cyberbullying ............................................................................................................. 92
13.1 Objectives ...................................................................................................................... 92
13.2 Introduction ................................................................................................................... 92
13.3 Why do People Cyberbully ............................................................................................. 93
13.4 Different Ways of Cyberbullying .................................................................................... 93
9
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
13.5 Effects of Cyberbullying ................................................................................................. 94
13.6 Preventing Cyberbullying ............................................................................................... 94
13.7 What to do if You are Cyberbullied................................................................................ 95
13.8 Chapter Objective Checklist ........................................................................................... 95
13.9 Let’s Recap ..................................................................................................................... 95
13.10 Did You Know? ............................................................................................................. 96
13.11 References from Internet ............................................................................................ 96
Chapter 14 – Digital Privacy ............................................................................................................ 97
14.1 Objectives ...................................................................................................................... 97
14.2 Introduction ................................................................................................................... 97
14.3 Why Digital Privacy ........................................................................................................ 97
14.4 Are People Worried about Digital Privacy? ................................................................... 98
14.5 Look Here ....................................................................................................................... 99
14.6 Who Cares ...................................................................................................................... 99
14.7 Take Charge ................................................................................................................. 100
14.7.1 More About Data Blockers............................................................................... 100
14.8 Chapter Objective Checklist ......................................................................................... 101
14.9 Let’s Recap ................................................................................................................... 101
14.10 Did You Know? ........................................................................................................... 102
14.11 References from Internet .......................................................................................... 102
Chapter 15 – Internet Safety......................................................................................................... 103
15.1 Objectives .................................................................................................................... 103
15.2 Introduction ................................................................................................................. 103
15.3 Common Threats.......................................................................................................... 104
15.4 General Safety Measures ............................................................................................. 104
15.4.1 Protective Measures from Cyberbullying ........................................................ 105
15.4.2 Protective Measures from Cyber Predators .................................................... 106
15.4.3 Protective Measures from Identity Theft ........................................................ 106
15.4.4 Protective Measures from Gaming Addiction ................................................. 107
15.4.5 Protective Measures from Cyberstalking ........................................................ 107
15.4.6 Mobile Phone Safety ........................................................................................ 108
15.5 Chapter Objective Checklist ......................................................................................... 108
15.6 Let’s Recap ................................................................................................................... 108
15.7 Did You Know? ............................................................................................................. 109
15.8 References from Internet ............................................................................................ 109
Chapter 16 – Stranger Danger ...................................................................................................... 110
10
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
16.1 Objectives .................................................................................................................... 110
16.2 Introduction ................................................................................................................. 110
16.3 Types of Dangers from a Stranger ............................................................................... 110
16.3.1 Cyberbullying ................................................................................................... 111
16.3.2 Online Predators .............................................................................................. 111
16.3.3 Inappropriate Content ..................................................................................... 111
16.3.4 Damaged Reputation ....................................................................................... 112
16.3.5 Excessive Gaming ............................................................................................. 112
16.4 Precautions .................................................................................................................. 112
16.5 Chapter Objective Checklist ......................................................................................... 113
16.6 Let’s Recap ................................................................................................................... 113
16.7 Did You Know? ............................................................................................................. 113
16.8 References from Internet ............................................................................................ 114
Digital Security .............................................................................................................................. 115
Chapter 17 – Effective Passwords................................................................................................. 116
17.1 Objectives .................................................................................................................... 116
17.2 Introduction ................................................................................................................. 116
17.3 Why Do We Need Passwords....................................................................................... 116
17.4 Need For a Strong Password ........................................................................................ 117
17.4.1 Characteristics of a Strong Password............................................................... 117
17.4.2 Creating a Strong Password and Remembering It ........................................... 118
17.4.3 Looking After Your Passwords ......................................................................... 119
17.5 Chapter Objective Checklist ......................................................................................... 119
17.6 Let’s Recap ................................................................................................................... 119
17.7 Did You Know? ............................................................................................................. 120
17.8 References from Internet ............................................................................................ 120
Chapter 18 – Cyber Security.......................................................................................................... 121
18.1 Objectives .................................................................................................................... 121
18.2 Introduction ................................................................................................................. 121
18.3 What is the difference between HTTP and HTTPS? ..................................................... 121
18.4 Malware ....................................................................................................................... 122
18.4.1 How do I Get Malware on My Computer? ....................................................... 123
18.4.2 Warning Signs Your Computer Is Malware Infected ........................................ 123
18.4.3 Precautions to Keep Your Computer Safe and Clean ...................................... 124
18.4.4 What To Do If My Computer is Infected by a Malware ................................... 124
18.5 Myths about Wi-Fi ....................................................................................................... 125
11
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
18.6 Smartphone Safety ...................................................................................................... 125
18.7 Chapter Objective Checklist ......................................................................................... 126
18.8 Let’s Recap ................................................................................................................... 126
18.9 Did You Know? ............................................................................................................. 127
18.10 References from Internet .......................................................................................... 127
12
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Digital Citizenship
Digital citizenship defines how to use technology responsibly. Since schools are promoting BYOD (Bring
Your Own Device) and we are entering into a digital era, we must know the dos and don’ts of the
digital world. As per global research, Digital Citizenship comprises of the following nine elements:
1. Digital Access
2. Digital Commerce
3. Digital Communication
4. Digital Literacy
5. Digital Etiquettes
6. Digital Law
7. Digital Rights and Responsibilities
8. Digital Health and Wellness
9. Digital Security
References:
https://www.iste.org/docs/excerpts/DIGCI2-excerpt.pdf
http://www.digitalcitizenship.net/
Digital Access
Digital access is full electronic participation in society. There are people who do not have access to
information available on the internet. It can be due to lack of infrastructure, physical location, lack of
financial ability etc. It is the duty of all citizens as well as the government to provide digital access to
all the people across the world. Access of information can be given across the globe using different
ways – putting the information in public domain, using social media to publish information etc.
Chapters included in digital access are:
1. Public Domain: Information under public domain is available to everyone free of cost. There
are songs, books etc. available on internet for people to use.
2. Online Presence: This can also increase access of information to people. To make online
presence, organizations have websites with information, individuals write blogs which again
contain information. These websites and blogs are on the internet so that people can have
access to the information.
3. Social Media: Information using technology can be created and shared using Social Media. It
involves giving access to information using videos, text etc.
4. Digital Footprint: Whenever we access information on internet, we leave footprints which
forms our reputation on internet. Hence, we make sure that we access the information with
responsibility.
References:
https://en.wikipedia.org/wiki/Social_media
https://en.wikipedia.org/wiki/Online_presence_management
http://www.digitalcitizenship.net/Nine_Elements.html
13
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Digital Commerce
Digital commerce is electronic buying and selling of goods. The chapter on digital commerce gives an
idea how to purchase and sell products on internet responsibly.
Digital Communication
Digital communication is electronic exchange of information. The chapter on digital communication
talks about various ways to communicate digitally which includes email, mobile phones, texting etc.
Digital Literacy
Digital literacy is the process of teaching and learning about technology and its usage. It teaches
individuals how learning can happen anytime, anywhere. The chapters included are:
1. Digital Search: The chapter contains information on how to do effective search on any topic
on internet and get the required information.
2. Image Copyright: The chapter talks about how the work created by individuals can be
published and used by people to gather information.
3. Plagiarism: The chapter emphasizes on ethical use of work created by others. It specifies the
importance of not copying original work without the consent or approval of the author or
without giving due credit to the owner of the content.
Reference:
http://www.teachingvillage.org/2012/04/10/copyright-plagiarism-and-digital-literacy/
Digital Etiquette
Digital etiquette is electronic standard of conduct or procedure. The chapter ‘Netiquette’ guides on
how to behave while we are online, how to respect and how to be respected online.
Digital Law
Digital law is electronic responsibility for actions and deeds. The chapter ‘Digital Law’ defines the do’s
and don’ts of the digital world and the consequences one has to face on breaking the law.
1. Cyberbullying: The chapter provides information as how the internet can be used to harm
people and the precautions one can take to minimize the harm.
2. Digital Privacy: The chapter specifies how personal information of people are misused on
the internet and how to protect the information.
3. Internet Safety: It defines safe online practices and minimize the risks of being harmed by
dangerous behaviours of others.
4. Stranger Danger: The chapter defines different kind of dangers that one can experience
from online strangers and how to safeguard oneself from them.
14
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Digital Security
Digital security is electronic precautions to guarantee safety. The chapters included are:
1. Effective Passwords: The chapters informs us about the importance of passwords and how
strong passwords can save our accounts from being hacked.
2. Cyber Security: The chapter helps in securing our systems from different threats like virus
etc.
15
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Digital Access
16
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 1 – Public Domain
1.1 Objectives
After going through this chapter the students should be able to:
1.2 Introduction
A content is in public domain if it is not protected by
any copyright law. The content is available to public
and anyone can copy the content, share the content,
change the content and publish it again. An example
of content which is in public domain is the work of
Shakespeare.
Figure 1.1 – Public Domain
The Creative Commons proposed in 2010 that there should be a symbol with which people should know that the
work is under public domain. The mark is called the Public Domain Mark. It is used for very old works but is not
used with works that are in public domain under some jurisdiction. It has been noticed by Wikimedia Commons
that there are around 2.9 million works, that is, nearly 10% of the total work, which comes under Public Domain
Mark as on February 2016.
Public domain day is the day when content is no longer under copyright law and enters the public domain. It
generally happens on 1st January of each year, depending on the copyright law of the country. When any content
is made available for public free of cost, the day is called Public Domain Day. Public domain day is 1st January.
17
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
1.3 Content Under Public Domain
Although anyone can use content that is under public domain, but no one can own the content. It is not necessary
that if a content is in public domain in America, it is in public domain in other countries as well. Content in public
domain varies from country to country. Anything can be under public domain – music, films, books, artwork etc.
Source: https://www.goodreads.com/shelf/show/public-domain
18
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
6. Absence Makes The Heart Grow Fonder.
7. Alphabet Song.
8. Animals Went In Two By Two.
1. Abraham Lincoln.
2. Africa Screams.
3. The Amazing Mr. X.
4. Angel and the Badman.
5. Bird of Paradise.
Figure 1.4 – Films
Under Public Domain
6. Combat America.
7. Conspiracy.
8. The Dance of Life.
Source: http://www.imdb.com/list/ls003915205/
1. Information under public domain can be used as a building block to create or to infer new facts from
the already existing facts.
2. The new generation can get access to cultural heritage.
3. Public domain promotes nonprofit education for research, scholarship etc.
4. Public domain promotes democracy and values.
5. Social value is generated with public domain work.
6. Low-cost information is available without worrying about locating the owner and paying royalties to
use the work.
7. Societal benefits.
8. Private monopoly is removed.
19
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
1.5 Perpetual Copyright
Work that never comes under public domain entirely has perpetual
copyright. It means, that their copyright never lapses and gets extended.
This concept is not very common because in every country there is a limit
to when the copyright on a content will expire. In India, an author’s work
comes under public domain if the author has died in the year 1955 and
the work has been published before his death. If the work is published
after the author’s death, it will be under copyright only after 60 years
from the date of publication. Music comes under public domain after 50
to 75 years of the artist’s death. To give perpetual copyright to a content,
special rules are required.
There are works where the copyright has expired but given a special exception of extending. If the work has to
be used, the person needs to pay royalties to the content owner. An example of perpetual copyright is the play,
Peter Pan.
20
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
https://www.youtube.com/watch?v=KFHnRie9e9c
https://publicdomainreview.org/guide-to-finding-interesting-public-domain-works-online/
21
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
4. You can’t copyright an idea!
5. A procedure needs to be followed for registering your images/content etc. in the Copyright Office in
the Library of Congress!
6. It is not necessary to place the copyright symbol with your name and “year created” near your
published materials - but it is always better if the symbol is there!
7. It is unacceptable to post an email as it is but illuminating facts from an email is an acceptable practice!
8. It is a copyright infringement if someone digs your picture/song/video etc. from the internet and uses
it for their own purposes!
9. Copyright law allows copyright owners to control modifications of their works!
10. If you want to use content with copyright, you need to take the permission from the owner
immediately!
https://en.wikipedia.org/wiki/List_of_films_in_the_public_domain_in_the_United_States
https://en.wikipedia.org/wiki/Perpetual_copyright
jupiter.plymouth.edu/~rgkleinpeter/PowerPoint/3-Copyright.ppt
http://www.templetons.com/brad/copymyths.html
http://students.colum.edu/career-center/articles/10-facts-about-copyright.php
https://pothi.com/blog/2017/01/11/india-public-domain-2017-17-indian-authors-whose-works-
entered-public-domain-in-2017/
https://en.wikipedia.org/wiki/Public_domain_music
22
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 2 – Online Presence
2.1 Objectives
After going through this chapter the students should be able to:
2.2 Introduction
You must have seen that some of your friends get too many likes on
Facebook* while others get too less. There are websites which are
very famous while there are others which are hardly visited by users.
Online presence plays a big role in your or a website’s online visibility.
This is all because of online presence.
Figure 2.1 – Online Presence
Online presence is presenting oneself online and a measure of how much traffic do you attract, whether it’s your
personal brand or professional brand. Online presence can be made by website design and development,
blogging, using social media, search engines etc. Your online presence can be useful or harmful to you depending
on how you use it or how careful you are while being online.
23
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
2.3 Importance of Online Presence
If you are in a business, then having a huge friends circle alone cannot
help increasing your area of influence. It is equally important to
strengthen one’s online presence to promote their business. Some of
the advantages of having an online presence are:
3. If you are in business, your online presence makes it easier to showcase your products and services.
4. Online presence also improves your relationships with people around you.
5. With the help of online presence, you can reach a larger audience for your business.
6. You can get reviews of your business easily. Good reviews means more business and the credit again
goes to online presence.
7. Your online presence benefits your customers as well. They don’t have to face those pushy
salespersons. They can shop by doing research and comparing your product with other products
and get the best item for them.
3. Social Media – Use different social media like Facebook*, LinkedIn* etc. to make your presence felt.
24
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
To know more about how to make online presence, visit –
https://www.youtube.com/watch?v=cwHP8pbVDfA
https://www.youtube.com/watch?v=Kf9goWSo0w0
Every online user has a profile. Some are followed more on social
networking sites while others are followed less. You can make some
changes in your profile to make it more successful. You must
consider the following facts while creating your profile:
1. The name and username you choose to display plays a vital role
to make your online presence stronger.
2. Your profile picture reflects a lot about you and it should be
impressive enough.
Figure 2.5 – Elements of a Successful Profile
3. Small description about you plays an important role in how people perceive you and who connects
with you.
4. Your interests and background will connect you to like-minded people.
5. Your privacy settings should be such that your personal information should not be leaked. This reflects
strongly on your online presence.
6. Your website, email signature etc. strengthen your profile.
25
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
2.6 Start Building Your Online Presence
Building online presence includes a couple of things – recognizing your goals, opening your accounts on different
websites, creating your profiles on different social media etc. Following steps will help you to start building your
online presence.
1. You must know your short term and long term goals. At each step, you should analyze as for how your
online presence will go with your goals.
2. Have an attractive domain name.
3. Brand your email. In a survey, it has been noticed that people feel more secure dealing with companies
who have their email addresses rather than having an email address of yahoo or Gmail.
4. Get your website up and running so that people can come and know who you are, what you offer,
contact you easily, interact with you etc. Make sure that your website has clear content about you,
services you offer and how to contact you. Also, the content presented on your website should add
value to the people who will be visiting your website.
5. You must get Search engine optimization done for your website. This will help your website to come at
one of the top positions when someone will search products or services related to your business.
6. Don’t think that you cannot put something on the website until and unless it is perfect. Keep improving
and optimizing your website.
7. Have your profiles on social networking sites like Facebook*, Twitter*, LinkedIn* etc. If you are running
a business, make sure there is a facebook page for your business. Promote your profiles by having them
printed on brochures, visiting cards etc.
8. Be part of groups and communities to build relationships with people.
9. Keep track of your social media account - how many followers you have, how many people have visited
your page etc.
10. Encourage competitions on your website and prizes for the winners. Also, reward your loyal customers.
11. How you engage with your online friends, how you tag them and comment on their pictures says a lot
about you.
12. Do not be a silent spectator. Post your thoughts in a non-offensive way. Write in such a way that it
positively reflects your personality.
13. Create blogs; write articles and publish them on the internet.
26
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
2.7 Tips to Enhance Your Online Presence
Now that you have an online presence, it also has to be enhanced.
We cannot get stuck at the same point of having an online
presence with which we started. Some of the tips to enhance your
online presence are:
4. Your online presence should be in sync with your profession. Do a research and find out which social
media will be best suited for you.
5. Google your name and see what information is being displayed about you. Survey reveals that
applicants have been refused a job because of the information that was displayed when their name
was googled.
6. Make sure your blog is interesting. The best blog is not the one which is beautifully designed but the
one having interesting and relevant content.
7. You have just 10 seconds to capture the attention of your readers, make sure whatever you write is
clear and interesting. Try to include bulleted list, short paragraphs, sub-headings, numbers and
symbols, formatted words (bold, underline and italics) to make it easier for the readers to read your
writing.
8. Have lots of photographs on your website. A picture says a thousand words. People will get attracted
towards the same.
27
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
8. I can make use of my online presence for my professional growth.
9. I can spread awareness about online presence.
10. The links presented in the chapter are interesting and useful.
11. The information given in the chapter will help us in making our online presence.
12. I would like to explore more about online presence.
28
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
http://www.business2community.com/online-marketing/how-to-build-a-strong-online-presence-for-
your-business-part-5-01262688#7VSEJPqzSuYFmAr3.97
http://socialmouths.com/2012/11/23/7-ways-to-build-a-strong-online-presence-through-social-media/
https://www.verisign.com/en_IN/website-presence/online/online-presence/index.xhtml
http://www.blueskyresumes.com/free-resume-help/article/how-to-quickly-build-your-online-
presence/
https://collegepuzzle.stanford.edu/?p=4516
29
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 3 – Social Media
3.1 Objectives
After going through this chapter the students should be able to:
3.2 Introduction
Social media are online tools that allow people, companies, and other
organizations, to create, share, or exchange information, ideas, and/or
pictures/videos in communities and networks. Within the learning process,
it can be used to support and enhance learning.
30
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
3.3.1 Social Media in Education
The following strategies can help teachers build a passionate online community of learners:
1. Be a role model.
2. Create pages/groups.
3. Establish online guidelines.
4. Use Twitter* innovatively.
5. Use Skype*/Google Hangout* for guest speakers.
6. Get ideas from your peers.
Following can be some of the ways to leverage social media as a learning tool:
1. Create a community.
2. Continued Collaboration.
3. Organize learning resources.
4. Supplement course materials.
31
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
3.4 Social Media Tools/Apps
1. Facebook* is the largest and the most popular social network around the
world. It has 1.59 billion active users [Wikipedia], as on December 31, 2015.
2. Facebook* can be used to create groups, create discussion boards, debate
and post individual views on a topic of interest.
3. Students across geographic locations share and participate in meaningful
knowledge exchange.
1. Twitter* is a microblogging website. The word limit for a single post (called
tweet) is 140 characters.
2. After registering on twitter you will get a unique username. The username is
also called ‘handle’. Any user can be tagged in a post by typing ‘@’ followed
by his username.
3. Twitter is different from other social media platforms because there are no
‘friends’ on twitter.
4. You can follow members on twitter and vice versa.
5. In your newsfeed, you get all the tweets of the people you follow.
32
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
1.
Yammer* is a Microsoft offering which comes with Office365. Yammer offers
a socializing platform for organizations who take an Office365 subscription.
2. It is a closed community in which you can log in using your official email ID
only.
3. You can share files easily, create polls and interest based groups/teams
within a larger organization.
4. You need a Microsoft ID to login to Office365.
33
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
1. Quora* is basically a Q&A platform.
2. Users can post their queries on any subject and get answers from anyone.
3. Subject experts are available on Quora to answer your queries almost on every
topic.
4. It is a knowledge enhancing platform which can be extensively used by students
to enhance their subject knowledge.
34
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
8. I can write a mail using Gmail*.
9. I can make a video call using Skype*.
35
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 4 – Digital Footprint
4.1 Objectives
After going through this chapter the students should be able to:
4.2 Introduction
On the Internet, a digital footprint is the traces or "footprints" that people leave online.
The footprints are left while using e-mails and attachments, uploading videos or digital
images etc.
Source: - Webopedia
1. A passive digital footprint is created when data is collected without the owner
knowing about it.
2. An active digital footprint is created when users deliberately leave their personal
data in order to share their information through websites or social media.
36
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
4.4 What is in Your Digital Footprints
Following are important elements of your digital footprint:
1. Your personal information like your name, address, phone number, birthday etc.
2. Your uploads which include texts, photos etc., sites you have visited, things you say and things others
say about you online.
3. Your digital trail is the data collected about you using your TV, telephone, cell phone, internet etc.
Companies often use this data for marketing purposes. It is not necessary that your digital footprint is
always visible to you.
Do you know that your digital footprint is nothing but actually an online version of you! It might just be the only
description someone has of you.
Here are some handy tips you can use to make sure that your online information leaves a positive impression.
1. Set a google alert or Google yourself on the internet. This enables you to know if someone has posted
something using your name.
2. If any of your friend or family member is graduating this year, he/she should create a LinkedIn* account.
3. To limit who has the access to your profile, apply privacy settings on your computer.
4. You must remember that digital content can be easily accessed and changed.
5. Expand your online network. Connect online to a maximum number of people but make sure you know
them in person.
37
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
4.6 Manage Your Digital Footprints
1. Protect your personal data: Do not reveal your personal information
like your address, phone number, passwords, bank card numbers etc.
Try not using your real name, use a nickname instead.
2. Keep login info under lock and key: Your usernames and passwords
should not be shared with anyone.
3. Think before you post: Once something is posted, it is difficult to
remove it.
4. Google yourself: Search for your name every few months on google so
that you are aware of the online information about you.
5. Scale back on social media: Use only those many social networking
sites that you can handle. Delete accounts that you do not use very
often. Keep your profiles updated on the social networking sites where
you have a good online presence.
Figure 4.3 Managing your footprint
38
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
4.9 Did You Know?
1. It is advisable to have a positive digital footprint because everything you do online will never
be deleted!
2. Everything you do online is stored on a server at a different location from where you are
browsing the internet!
3. How hard you may try, your digital footprints will never be erased!
4. According to a survey, 500 of the top colleges look at senior students’ Facebook*, Twitter*,
and MySpace* before giving admission to them!
5. Any online comment about you becomes a part of your digital footprint!
6. One may lose an opportunity due to indecent pictures or posts online, no matter how specialized he/she
may be!
7. Approximately 33% of all colleges look at your digital footprint before giving admission to you!
8. 63% of hiring managers do not hire an applicant because there is something questionable about the
person on a social networking site (Cowell, 2010)!
9. In 2009, 45% of all hiring managers used search engines to research digital footprint of potential
applicants – gone up from 26% in the year 2015 (Cowell, 2010)!
39
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Digital Commerce
40
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 5 – Digital Commerce
5.1 Objectives
After going through this chapter the students should be able to:
5.2 Introduction
Digital Commerce is doing business on the internet –
buying products, selling products, transferring money
from one account to another and so on.
5.3 Concept
The difference between Digital Commerce and Traditional Commerce:
41
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
DIGITAL COMMERCE TRADITIONAL COMMERCE
1. Internet usage is there. Done through telephone or face to face.
2. The process is automated. The process is manual.
3. Marketing, advertising, customer
support – everything is at one place.
1. B2B (Business to Business) – Business between two companies, that is, when
one company sells its product to another company.
Figure 5.2 – B2B Interaction
2. B2C (Business to Consumer) – When a company sells its products to the customers or the actual users.
There is no human interaction.
3. C2B (Consumer to Business) – Consumer posts a project on the internet with his budget. The
companies submit their proposal in terms of money and the consumer chooses the company to whom
he wants to sell the product.
4. C2C (Consumer to Consumer) – A consumer posts an ad on the internet, another consumer reads the
ad and can purchase the product.
42
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
6. Consumers have the option to compare the price of the product from different companies and can
choose the best option.
7. The consumer can see what other customers are buying and can see the review of the product that he
wants to buy.
8. The consumer does not have to travel to the shop so less traffic on road.
9. Since the cost of the products is reduced, the investment is low, more people have the pocket to buy the
products.
43
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
5.4.2 What is E-Banking?
E-banking is a system where a consumer can do his financial transactions using the
internet. The consumer is provided with a username and password to access his/her
account online. The consumer can check his/her account balance, see the list of
transactions, make bill payments and transfer money to another account. The
consumer can also download a copy of bank statement.
Figure 5.5 – e-banking
with some banks, the consumer can also request for cheque book, report loss of card, stopy payment on a
cheque, request for change of address or telephone number etc.
Major advantage of e-banking is that transactions can be done 24 x 7. Customer support for banks is also available
24 x 7 in case the consumer has any query.
44
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
5. I know what electronic payment is.
6. I can tell the advantages of electronic payment.
7. I know what e-banking is.
8. I know what online publishing is.
9. The links presented in the chapter are interesting and useful.
10. The information given in the chapter will help us use digital commerce.
11. I would like to explore more about digital commerce.
45
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
5.8 References from Internet
https://www.techopedia.com/definition/23336/digital-commerce-d-commerce
http://www.engr.sjsu.edu/gaojerry/course/cmpe296z/introduction.pdf
https://electorniccommerce.wordpress.com/what-forces-are-fueling-e-
commerce/
http://www.simplynotes.in/mbabba/factors-affecting-e-commerce-key-drivers-of-
e-commerce-forces-fueling-e-commerce/
http://www.omicsonline.org/blog/2015/04/25/10359-What-forces-are-fueling-
ecommerce.html
http://www.tutorialspoint.com/e_commerce/e_commerce_advantages.htm
http://www.esalestrack.com/blog/2008/09/advantages-and-disadvantages-of.html
https://unichange.me/articles/advantages_of_electronic_payment_systems
https://en.wikipedia.org/wiki/Online_banking
https://en.wikipedia.org/wiki/Electronic_publishing
46
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Digital Communication
47
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 6 – Digital Communication
6.1 Objectives
After going through this chapter the students should be able to:
6.2 Introduction
Communicating with others using digital media like email,
instant messaging etc. is called Digital Communication.
Earlier, communication happened only through letters,
phones etc. but now we have various modes of
communication and they connect us faster.
48
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
6.3 Different Types of Digital Communication
We have the following modes of digital communication:
6. Stored data can be converted to any language in a very less time with the help of different software.
7. Phone – Discussion of ideas for a long time is feasible with less communication gap. Also, it is more
personal.
49
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
8. Email – Conversations are documented for later use. It is also easier to send files to one or more people.
It is the most common and most used form of business communication.
9. Instant Messaging – It can be seen when the other person is available and if you can get an immediate
response or not.
Don’ts:
50
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
6.6 Chapter Objective Checklist
S. No. SKILLS ACQUIRED YES NO
1. I know what digital communication is.
2. I can tell the different modes used for digital communication.
3. I know the advantages and disadvantages of digital communication.
4. I will use digital communication wisely.
5. I know the do’s and don’ts of digital communication.
6. I can use almost all modes of digital communication.
7. I can send formal emails.
8. I am an active participant on different social networking sites.
9. I know which information to be used from social networking sites.
10. I can train people on how to use digital communication effectively.
11. The information given in the chapter will help us using digital communication.
12. I would like to explore more about digital communication.
51
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
7. In 1971, the first email was sent with “@” symbol and was sent by Ray Tomlinson. “@” symbolizes that
the message was sent to a person and not to a machine!
8. The first spam message was sent to 600 recipients in 1978 by DEC System 2020!
9. First free email service was started with Hotmail in 1996!
10. Approximately 70% of bloggers talk about brands on their blogs while 38% of bloggers post brand or
product updates/reviews!
52
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Digital Literacy
53
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 7 – Digital Search
7.1 Objectives
After going through this chapter the students should be able to:
7.2 Introduction
Are you researching a topic for a school paper or project? Do you need
health information? Do you want to buy a car, a computer, a book, book
a vacation etc.?
For any online search, you need a special program called search
engine which is basically a software designed to search for
information on the World Wide Web. It is essentially an intricate
combination of computers, software, and math. Few examples
of search engines are:
1. www.google.co.in
2. www.Bing.com
3. www.Ask.com
Figure 7.2 – Search Engine 4. www.msn.com
5. www.yahoo.co.in
54
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
7.4 How a Search Engine Works
Do you know how search engines work?
Search engines are constantly building and updating their index on the
world wide web. Search engines use “spiders” that “crawl” the web and
fetch the required results. The words used in these web pages are
added to build an index which displays on the user screen.
When someone searches say for “pest control services” the search
engine already has a list of web pages that refer to “pest control
services”. The only thing left is to sort the web pages in order of
relevance. A number of key factors are taken into consideration for
doing this.
Figure 7.3 – Working of search engine
There are three basic stages for a search engine to work, that is,
Here are few search strategies that can be very useful while searching the
web effectively.
55
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
7.6 Tips for Effective Search
Looking for an information on the web? It’s time to Learn a few
tips and tricks to help you easily find information on Google.
3. Choose words carefully: When you're searching for information online, search for words that are likely to
appear on the site you're looking for. For example, instead of saying my head hurts, say headache, because
this word would likely to be available on a medical website.
4. Don’t worry about the little things:
a. Spelling: Google's spell checker automatically corrects common spelling mistakes.
b. Capitalization: You can search either for ‘New York Times’ or ‘new york times’. Both will fetch
the same results.
5. Find quick answers: For many searches, Google displays an answer to your question in the search results.
Some features, like information on sports teams, are not available for all locations.
a. Weather: Search weather to see the weather in your location or add a city name, like weather
Mumbai, to find weather for a certain place.
b. Dictionary: Put the word ‘define’ in front of any word to see its definition. Eg, to know the
definition of ‘discipline’, you can search for ‘define discipline’.
c. Calculations: Enter a math equation like 3*9123, or complex mathematical equations
including graphs.
d. Unit conversions: Enter a conversion, like 3 dollars in euros.
e. Sports: Search for the name of a team to see a schedule, game scores and more.
f. Quick facts: Search for the name of a celebrity, location, movie, song etc. to find information
related to the topic.
56
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
7.8 Let’s Recap
1. Digital Search – Searching using an electronic medium.
2. Search Engine – A special program that helps you find information on the web.
3. SEO – Search Engine Optimisation.
4. Internet – World wide communication computer network.
57
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 8 – Image Copyright
8.1 Objectives
After going through this chapter the students should be able to:
8.2 Introduction
Sure enough, most of you have to prepare reports, assignments or even a paper. For this,
you generally have to take help from the internet. Do you know that the information,
images you take from the internet are protected by copyright laws and you cannot use all
of them? You need to take permission from the owners of the content you wish to use.
Quite surprising…? But it is a fact that you need permission in advance before copying any
text or image from the internet. Figure 8.1 – Copyright
You must remember that Copyright is everywhere: we all read books and articles, watch
videos, listen to music, and use various software and hardware technologies for learning,
research, work, civic engagement, and entertainment. You use different kinds of web material
frequently for preparing course material, writing a report, creating videos etc. Hence,
knowledge about copyright would be useful for you.
58
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
8.3.1 Work Protected by Copyright
All you should know is that Copyright actually protects any "original work of authorship" which are fixed in "a
proper form of expression”.
Works that are under copyright fall into the following categories:
On the internet, not everything is protected by copyright. There are categories of things which are not protected:
1. The first category includes Ideas, procedures, methods, systems, processes, concepts, principles,
discoveries.
2. The second category includes titles, names, short phrases, and slogans; mere listings of ingredients.
3. The third category includes works that are not fixed in a tangible form of expression, such as an
improvised speech or performance that is not written down or otherwise recorded.
4. The fourth category includes works consisting entirely of information that is commonly available and
contains no originality.
5. The fifth category includes works by the United States Government.
59
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
8.4.1 When Permission is Required to Use an Image
In general, you all need to understand the process wherein, any permission is
required to use the work. There is a five-step procedure to do the same which is:
8.5 Rules You Follow for Using Any Image from the Internet
You need to:
To know more about rules for using an image from internet, visit –
https://www.youtube.com/watch?v=GtMOAaMFaPs
https://www.youtube.com/watch?v=Lnpsk4xhHqw
60
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
4. I can explain what copyright infringement is.
5. The videos/pictures used in this lesson are relevant and easy to understand.
6. I understand the cases when one needs permission to use an image.
7. I can identify the rules for using an image from the internet.
8. I have understood what Fair use is.
61
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
8.10 References from Internet
http://www.copyrightkids.org/cbasicsframes.htm
http://www.stockphotorights.com/
http://copyright.ubc.ca/guidelines-and-resources/support-guides/why-should-i-care
http://fairuse.stanford.edu/overview/introduction/getting-permission/
https://teacherchallenge.edublogs.org/step-6-images-copyright-and-creative-commons
http://www.pddoc.com/copyright/copyright_facts.htm
http://blog.kunvay.com/5-facts-you-didnt-know-about-photos-copyright/
http://www.slideshare.net/KateBailey/multiple-choice-quiz-for-copyright-laws-and-fair-use
http://highered.mheducation.com/sites/0073378828/student_view0/chapter14/multiple_choice_quiz.
html
http://whatis.techtarget.com/definition/piracy
62
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 9 – Online Plagiarism
9.1 Objectives
After going through this chapter the students should be able to:
9.2 Introduction
63
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
9.3 Why Students Plagiarize?
1. Laziness.
2. Academic Help.
3. The assignment cannot be completed in the stipulated time.
4. Lack of research skills.
5. Lack of preparation.
6. Pressure to maintain high grades.
7. Easy to do.
1. Rewriting from books or articles. 1. Not knowing when and how to cite.
2. Copying and pasting from web pages and 2. Not knowing how to paraphrase.
online resources without citing sources. 3. Not knowing about common knowledge.
3. Downloading, buying or even borrowing a 4. Recycling an old paper.
paper. 5. Poor documentation.
4. Publishing on the web without permissions
of creators.
64
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
9.6 Check if You Are Supporting Plagiarism?
65
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
9.9 Did You Know?
1. As per a study by The Centre for Academic Integrity, approximately 80% of college
students admit to cheating at least once!
2. As per a survey by the Psychological Record, 36% of undergraduates admitted that they
have plagiarized written material!
3. As per a poll conducted by US News and World Reports, 90% of students believe that
cheaters are either never caught or have never been punished!
4. As per a study conducted by Ronald M. Aaron and Robert T. Georgia, Administrator Perceptions of
Student Academic Dishonesty in Collegiate Institutions found that 257 chief student affairs officers
believe that colleges and universities have not addressed the cheating problem satisfactorily!
5. According to the Gallup Organization (October 6-9, 2000), the top two problems faced by the United
States are ‘Education’ and ‘Decline in Ethics’!
6. As per a national survey published in Education Week, 54% of students admitted to plagiarizing from
the Internet; 74% of students admitted that they were engaged in serious cheating at least once during
the past school year, and 47% of students believe their teachers sometimes choose to ignore students
who are cheating!
7. As per a survey by The Josephson Institute Center for Youth Ethics, 43,000 high school students found
that 59% of high school students admitted cheating on a test during the last year!
8. One out of three high school students admitted that the Internet has been used to plagiarize an
assignment!
9. As per a survey of 24,000 students at 70 high schools, Donald McCabe (Rutgers University) found that
95% said they participated in some form of cheating, 64% of students admitted to cheating on a test
and 58% admitted to plagiarism!
http://reviewgamezone.com/mc/candidate/test/?test_id=12762&title=Digital%20Citizenship%20Review
66
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Digital Etiquette
67
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 10 – Netiquettes
10.1 Objectives
After going through this chapter the students should be able to:
10.2 Introduction
In today’s world of technology, online communication – emails, chat, blogs etc.
have become very important. As there are rules for face to face communication,
similarly there are rules for online communication. These rules are called
netiquettes. Our online reputation depends on how we behave on the internet.
68
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
2. It makes our communication more human.
3. Netiquettes make our communication more effective.
4. It helps develop and maintain good relationships with others.
5. It makes group conversations friendly.
6. Following netiquettes make sure your reputation is reflected positively.
7. What you tweet on the internet spreads like wildfire and you should be very careful as to what you are
posting. Whatever we post or tweet can be accessed even if we delete it.
8. It helps you represent yourself correctly to a large audience.
1. Imitating others.
2. Using unlawful, abusive, harassing, defamatory, threatening, racial or unethical
words while communicating online.
3. Floating indecent images and content.
Figure 10.3 – Bad Netiquettes
4. Spamming.
5. Flaming.
1. Do not hurt other person’s feelings. Be friendly and positive. Think before
you write. Treat everyone with respect.
2. Use proper language. Choose your words carefully. Never post or mail
anything that you would not say face-to-face.
3. Be ethical and do not break any law.
4. Do not expect people to always agree with what you post, say or think.
Figure 10.4 – Netiquette Rules
69
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
5. Post appropriate messages in relevant discussion groups.
6. Always read FAQs before posting any question in a group.
7. Write clearly. Re-read your content before posting it. The posts should be professional, clear and
crisp. Don’t use emoticons or abbreviations while writing formal emails and official articles/posts.
8. Ask for clarifications and help if required.
9. Begin your message with a greeting.
10. Never use all CAPS.
11. Don’t write anything when you are angry or upset.
12. Respect other people’s privacy and do not provoke them to share their passwords and personal
information.
13. Check your spelling and grammar before you post anything.
E-mail etiquettes:
70
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
6. Disagree respectfully with other people in the group. Don’t badmouth others.
7. Answer appropriately. Do not divert from the topic or question asked.
8. If you have asked a question and you receive multiple answers. Summarize all the answers in a
paragraph and post it for everybody’s benefit.
9. Be brief in answering a question or posting a question.
10. If you are referring to an earlier discussion or point, quote that point briefly so that people do not have
to go back to refer to the point.
11. Check the most recent comments before replying to an older comment. It might be possible that the
issue has already been resolved.
12. Be forgiving. If someone has done a mistake, ignore it.
1. Don’t stay logged in when you are not doing anything. Unnecessarily getting logged in wastes bandwidth.
2. Try to use the internet during off-peak hours.
71
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
8. Protocol – Process how computers act when communicating with each other.
9. Signature - Text automatically added to the end of your e-mail messages.
10. Smiley - Smiling faces and other "emoticons" used online to indicate humor and other emotions.
72
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Digital Law
73
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 11 – Digital Law
11.1 Objectives
After going through this chapter the students should be able to:
11.2 Introduction
Digital law is to keep a check on what you are allowed to do on the
internet and what you are not allowed to do. Digital laws are made
so that citizens make use of internet responsibly.
74
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
11.3 Copyright and Trademark Law
Copyright and trademark are two different terms.
Registration with authorities is required if you would want to legally protect your content. To know more about
registration of copyright in India, please visit http://copyright.gov.in/frmCopyrightBoard.aspx.
It is a good practice to attach a copyright notice on the required material. Copyright is valid 70 years after the
author’s death and 95 years for corporates.
Trademark focusses on protecting items that are associated with the company branding – logo etc. The company
must ensure that whatever they want to trademark is not already in use. After that, the organization can register
their trademark. Registration of a trademark is done for 10 years and renewable for another 10 years. There is a
provision of indefinite renewal as well.
75
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
The Patent is like copyright for inventions. Patent holder stops others from selling or using their inventions.
11.5 Licensing
Software licensing determines how software can be used and redistributed. All software
is copyright protected except the one’s that are available in public domain.
With the perspective of copyright law, there are two categories of software:
1. Free and Open Source Software (FOSS) in which the user has the right to modify
the source code and re-use the software.
2. Proprietary Software keeps the source code hidden and the user is not able to
modify the source code.
Figure 11.4 - Licensing
1. Public Domain Software are the ones which are available to public and do not have any copyright,
ownership etc.
2. Non Distributed Non-Licensed Software are the ones which companies use as a trademark for their
internal use.
4. Users with pirated software can get caught and can have negative publicity.
5. Legal action against the person using pirated software and the user will have to pay the cost of
software.
76
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
https://www.youtube.com/watch?v=aQCrvoZ3k9c
https://www.youtube.com/watch?v=JdVPEXbc9R4
People/organizations violating data protection can end up paying monetary penalty or imprisonment.
11.7 Cybercrime
Any crime involving a device with internet access comes under the
category of cybercrime. Such a device can be used as a means to
commit a crime or it can be a target. Different cyber crimes are:
2. Credit Card Fraud: Using someone else’s credit card on the internet.
3. Debt Elimination Fraud: Emails or websites that promise the customers to free them from their debts.
4. Email Spoofing: Email header specifies the sender as someone else who is not the true sender.
5. International Lottery Type Fraud: Emails to users that they have won a lottery.
6. Internet Extortion: A computer receives virus attacks and the hackers ask for money to free the customer
from these attacks.
7. Investment Fraud: False offers about investing money.
8. Malware: Programming done to harm computers.
77
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Anyone who damages data of a computer without the permission of the owner can be sent to jail for 2 to 3 years
or with a fine of up to 5 lakhs or both.
Source: http://cis-india.org/internet-governance/blog/privacy/privacy-ita2008
78
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
9. Publishing or 67 Imprisonment upto http://cis-india.org/internet-
transmitting 5 years and fine up governance/blog/privacy/privacy-
obscene material in to Rs. 10 lakh ita2008
electronic form
10. Publishing or 67A Imprisonment upto http://cis-india.org/internet-
transmitting of 7 years and fine up governance/blog/privacy/privacy-
material containing to Rs. 10 lakh ita2008
sexually explicit act
etc. in electronic
form
11. Publishing or 67B Imprisonment upto http://cis-india.org/internet-
transmitting of 7 years and fine up governance/blog/privacy/privacy-
material depicting to Rs. 10 lakh ita2008
children in sexually
explicit act, etc. in
electronic form
12. Preservation and 67C Imprisonment upto http://cis-india.org/internet-
retention of 3 years and fine governance/blog/privacy/privacy-
information by ita2008
intermediaries
13. Powers to issue 69 Imprisonment upto http://cis-india.org/internet-
directions for 7 years and fine governance/blog/privacy/privacy-
interception or ita2008
monitoring or
decryption of any
information through
any computer
resource
14. Power to issue 69A Imprisonment upto http://www.itlaw.in/section-69a-
directions for 7 years and fine power-to-issue-directions-for-blocking-
blocking for public for-public-access-of-any-information-
access of any through-any-computer-resource/
information through
any computer
resource
15. Power to authorize 69B Imprisonment upto http://cis-india.org/internet-
to monitor and 3 years and fine governance/blog/privacy/privacy-
collect traffic data or ita2008
information through
any computer
resource for cyber
security
16. Unauthorized access 70 Imprisonment upto research.ijcaonline.org/
to protected system 10 years and fine volume58/number7/
pxc3883507.pdf
17. Penalty for 71 Imprisonment upto http://www.itlaw.in/section-71-penalty-
misrepresentation 2 years or fine up to for-misrepresentation/
Rs. 1 lakh or both
79
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
18. Breach of 72 Imprisonment upto http://cis-india.org/internet-
confidentiality and 2 years or fine up to governance/blog/privacy/privacy-
privacy Rs. 1 lakh or both ita2008
19. Publishing false 73 Imprisonment upto http://www.itlaw.in/section-73-penalty-
digital signature 2 years or fine up to for-publishing-electronic-signature-
certificates Rs. 1 lakh or both certificate-false-in-certain-particulars/
20. Publication for 74 Imprisonment upto http://www.itlaw.in/section-74-
fraudulent purpose 2 years or fine up to publication-for-fraudulent-purpose/
Rs. 1 lakh or both
21. Compensation, 77 N/A http://www.itlaw.in/section-77-
penalties or compensation-penalties-or-
confiscation not to confiscation-not-to-interfere-with-
interfere with other other-punishment/
punishment
22. Punishment for 84C Imprisonment upto http://www.itlaw.in/section-84c-
attempt to commit one half of the punishment-for-attempt-to-commit-
offences longest term offences/
provided for that
offence or fine for
that offence or both
23. Sending threatening 503 IPC Imprisonment upto www.slideshare.net/
messages by email 3 years or fine up to jayakumarpurushan/
Rs. 5 lakh or both cyber-crime-and-information-
technology-act-2998
24. Word, gesture or act 509 IPC Imprisonment upto https://indiankanoon.org/doc/
intended to insult 1 year or fine or both 68146/
the modesty of a
woman
25. Sending defamatory 499 IPC Imprisonment upto www.slideshare.net/
messages by e-mail 3 years and fine up jayakumarpurushan/
to Rs. 2 lakh cyber-crime-and-information-
technology-act-2998
26. E-mail spoofing 463 IPC Imprisonment upto www.slideshare.net/
3 years and fine up jayakumarpurushan/
to Rs. 1 lakh cyber-crime-and-information-
technology-act-2998
27. Making a false 464 IPC Imprisonment upto www.slideshare.net/
document 3 years and fine up jayakumarpurushan/
to Rs. 1 lakh cyber-crime-and-information-
technology-act-2998
28. Forgery for purpose 468 IPC Imprisonment upto www.slideshare.net/
of cheating 3 years and fine up jayakumarpurushan/
to Rs. 1 lakh cyber-crime-and-information-
technology-act-2998
29. Forgery for purpose 469 IPC Imprisonment upto www.slideshare.net/
of harming 3 years and fine up jayakumarpurushan/
reputation to Rs. 1 lakh cyber-crime-and-information-
80
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
technology-act-2998
30. Punishment for 506 IPC Imprisonment upto https://indiankanoon.org/doc/
criminal intimidation 2 years or fine or 180217/
both
31. Criminal intimidation 507 IPC Imprisonment upto https://indiankanoon.org/doc/
by an anonymous 2 years in addition to 1255223/
communication the punishment
provided for the
offence by the last
preceding section
32. When copyright 51 Imprisonment upto Copyright.gov.in/Documents/
infringed: - copyright 3 years but not less Toolkitinside.pdf
in a work shall be than 6 months and
deemed to be fine up to Rs. 2 lakh
infringed but not less than Rs.
50,000
33. Offence of 63 Imprisonment upto Copyright.gov.in/Documents/
infringement of 3 years but not less Toolkitinside.pdf
copyright or other than 6 months and
rights conferred by fine up to Rs. 2 lakh
this act but not less than Rs.
50,000
34. Enhanced penalty on 63A Imprisonment upto Copyright.gov.in/Documents/
second and 3 years but not less Toolkitinside.pdf
subsequent than 1 year and fine
convictions up to Rs. 2 lakh but
not less than Rs. 1
lakh
35. Knowing use of 63B Imprisonment not Copyright.gov.in/Documents/
infringing copy of less than 7 days or Toolkitinside.pdf
computer fine up to Rs. 50
programme to be an thousand
offence
36. Obscenity 292 IPC First conviction: https://indiankanoon.org/doc/
Imprisonment up to 1704109
2 years and fine up
to Rs. 2 thousand
Imprisonment up to
5 years and fine up
to Rs. 5 thousand
37. Printing etc. of 292A IPC Imprisonment upto http://www.lawyerservices.in/Indian-
grossly indecent or 2 years or fine or Penal-Code-1860-SECTION-292A-
scurrilous matter or both Printing-etc-of-grossly-indecent-or-
matter intended for scurrilous-matter-or-matter-intended-
blackmail for-blackmail
81
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
38. Sale etc. of obscene 293 IPC First conviction: http://devgan.in/ipc/section/293/
objects to young Imprisonment up to
person 3 years and fine
Second convition:
Imprisonment up to
7 years and fine
39. Obscene acts and 294 IPC Imprisonment up to https://indiankanoon.org/doc/594493/
songs 3 months or fine or
both
40. Punishment for theft 379 Imprisonment up to https://indiankanoon.org/doc/1101188/
3 years or fine or
both
82
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
10. Debt Elimination Fraud - Fraud where users receive emails or visit websites that promise the customers
to free them from their debts.
83
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Digital Rights and
Responsibilities
84
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 12 – Digital Rights and Responsibilities
12.1 Objectives
After going through this chapter the students should be able to:
12.2 Introduction
With rights, come great responsibility.
`
Everyone loves freedom, freedom to express their views and
its outreach. Wider our reach, happier we feel. While using the
freedom, we must be aware of the responsibilities as well so
that we do not offend anyone or make any derogatory remarks
about individuals, communities, religion etc.
Digital rights are the privileges and freedom which are given
to online users.
85
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
12.3 Digital Disrespect
Disrespect is an act of insulting others. There are ways that you can
insult – acting rude or impolite, offend someone etc. Digital
disrespect refers to insulting people online. It also involves spreading
rumours about somebody behind their back and embarrassing them.
Rumours can be spread pictorially as well.
Questions you must ask yourself to make sure you are not
disrespecting online.
1. Before posting anything online, think if you will tell the same thing to the world in person?
2. If you are spreading rumours online about somebody, will it come back to you or will it haunt you?
3. Before posting anything, keep in mind, what you say on a lighter note now, can blow up in future.
Effects of digital disrespect can be many and can be adverse. Some of them are:
1. A simple rumour can turn into an online war. You won’t be able to concentrate on studies and lose out
on opportunities.
86
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
2. There will always be some people who will not like your comments and seeing your personality, might
unfriend you from the list. You lose your social life.
3. Health issues might build up due to stress, like headache, depression etc.
We can take control and make sure we do not disrespect anyone online.
1. Unhide: Do not post anything online if you can’t say the same thing on the
person’s face.
2. Disengage: If anything has been posted about you which is untrue or maligns
your character, report it to your family members. You can also report it on the
community guidelines forum.
Figure 12.4 – Respect
3. Secure Your Stuff: Make sure the privacy settings are appropriate for any network or social media that
you use.
4. Save Everything: If you are harassed online, make sure you save the content to report abuse.
5. Use Your Voice: Report abuse to a higher authority and ask them to help you. The higher authority can
be your parents, teachers, family members etc.
3. Right to take Credit for Personal Works – If an online user publishes his/her work on the internet, he/she
has the right to take credit for the work.
4. Right to Digital Access – Every online user has the right to access the content which is there on the
internet.
87
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
5. Right to our Identity – Identity includes first name, surname, date of birth, gender, nationality etc.
Upholding right to identity encourages tolerance, mutual appreciation, and chance to happiness.
88
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
knowledge will not be available to everybody. There have been cases where people do not act responsibly online
and bully others. The after effects are extreme to the extent that the victims take their lives. Texting to cheat on
tests is an increasing trend. Until and unless we understand our responsibility, these types of activities will keep
increasing. We also need to understand that it is ok to use someone’s work but it is important to give the person
due credit. Illegally downloading music and movies is also a big problem now-a-days which leads to increase in
piracy. We must understand that these acts are punishable and we must refrain from doing so.
Until and unless we document and are aware of our digital rights and responsibilities, we will not be able to
punish the offenders.
To know more about why digital rights and responsibilities are important, visit –
https://www.youtube.com/watch?v=8CYbSjIMHNU.
89
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
12.9 Did You Know?
1. Cyberbullying, sexting, safety from online predators, social networking are all included in
digital rights & responsibilities!
2. Users have the right to protect the work that they create or publish!
3. Always be nice to people even if they are online. You don’t want to start a flame war which
is very time consuming and wasteful way to use the internet!
4. Digital rights are rights given to each individual who is in the digital world!
5. Use the internet respectfully; don't post embarrassing pictures of your friends without their
permission!
6. It is our digital right to find out about our local government officials!
7. We have the right to protect our personal information from the government or online businesses!
8. Children have lesser rights than adults while they are online!
9. There is no proof that digital rights are protected under the United States Government!
10. Many websites do not allow users to enjoy their digital Rights!
90
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Digital Health and Wellness
91
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 13 – Cyberbullying
13.1 Objectives
After going through this chapter the students should be able to:
13.2 Introduction
Using the internet or mobile technology to harm another person intentionally is
called cyber bullying. The actions are repeated to hurt or embarrass another
person.
Cyberbullying when the cyberbully is anonymous and the target does not know
the cyberbully is called digital pile-on.
Cyberbullying can happen anytime, 365 x 24 x 7 and messages spread very fast
to a very large audience.
92
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
13.3 Why do People Cyberbully
Often people who engage in cyberbullying are frustrated,
depressed, angry and revengeful. Main reasons of cyberbullying
are:
1. To become popular.
2. To feel powerful.
3. To cope up with low confidence.
4. To fit in with peers.
5. To amuse them.
6. Frustration people have in their lives.
8. Email and Cell Phone Image Dissemination – Publishing negative statements and obscene images to
make fun of target person.
93
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
13.5 Effects of Cyberbullying
1. Depression, anger, nervousness and mood swings
without reason.
2. Loss of interest in going to work place.
3. Concealing personal information on the internet.
4. Limited usage of internet followed by deleting accounts
and blocking contacts.
5. Turning anti-social.
6. Frequent complaints of stomach ache, headache, and
other health issues.
7. Loss of sound sleep and appetite.
8. Suicidal thoughts.
Figure 13.4 – Effects of Cyberbullying
5. Setup privacy Control – Check your privacy settings to ensure your information is available only to your
family and friends.
6. Google yourself – After regular intervals, google your full name to know if your personal information
gets displayed.
7. Do not open messages from unknown people – Delete messages that you receive from contacts which
are not in your contact list. It can be a virus.
8. Log out from your accounts on public computers – Do not share your passwords. Make sure you log out
from the computer you are using.
9. Don’t Respond – If someone cyberbullies you, do not respond or retaliate, talk to your family members
and block the bully. Keep evidence to take legal action.
94
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
To know more about preventing cyberbullying, visit –
https://www.youtube.com/watch?v=91euQfsYQx0
https://www.youtube.com/watch?v=Jwu_7IqWh8Y
https://www.youtube.com/watch?v=dkG00Czb4ho
95
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
13.10 Did You Know?
1. Approximately 43% of kids have been cyberbullied. 1 in 4 experienced it more than once!
2. Approximately 70% of students admitted they have seen cyberbullying!
3. Over 80% of teens use a cell phone regularly increasing the chances of being a victim of
cyber bully!
4. Approximately 68% of teens admit that cyberbullying is a serious problem!
5. Approximately 81% of young people believe they can get away easily with cyberbullying as
compared to traditional bullying!
6. Approximately 90% of teens have ignored cyberbullying after seeing it on social media!
7. Girls are prone to cyberbullying twice as much as boys!
8. Approximately 75% of students admit they have seen online - one student bashing another student!
9. Self-esteem is lower in cyberbullying victims!
10. Cyberbullying is less common than physical bullying!
96
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 14 – Digital Privacy
14.1 Objectives
After going through this chapter the students should be able to:
14.2 Introduction
It has been observed that personal information of online users is being used
without their permission and passed to third parties. Digital privacy is
protection of personal information of online users and each person is
responsible for his own digital privacy. Never post anything online that you do
not want to share with your friends or future employer. In this chapter, we will
see why digital privacy is important and what actions can we take to protect it.
Figure 14.1 – Digital Privacy
97
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
There are websites that can give information about you which are not available on search engines. Some of the
reasons to keep your personal information safe are:
1. Your identity could be stolen: When you use the internet on a device, the information that you enter
during your use simultaneously gets stored on a server. Hackers steal this information and use it to their
advantage. For example, they can use your credit card information to shop online and the bill will come
in your name. There are many similar threats like this from hackers.
2. You can get hurt: Sharing your location on social media makes all your contacts aware of your
whereabouts. Never share your location with people whom you do not know.
3. You can lose opportunities: Hiring managers and admission officers might visit your facebook page or
your Instagram photos. There might be images which are compromised and you may miss an
opportunity.
4. You could get ripped off: Nowadays, schools are also going digital. Schools use different software to
teach students. Report cards, feedbacks etc. are being uploaded on the website so that parents can
access the information. If the information is not uploaded securely, it can not only be accessed by parents
but can also be accessed by third parties who can misuse the information or use the information to sell
their products to you. You probably would not want any of the above happenings. For example, if the
feedback which is uploaded on the website is retrieved by an unknown third party they may use this
information to their advantage.
5. You could get labeled and humiliated: People might use your personal information and pictures to make
fun of you or to humiliate you.
Statistics show, only 9% of teen social media users are concerned that their data will be accessed by strangers.
Source: http://www.pewinternet.org/2013/05/21/teens-social-media-and-privacy/
98
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
14.5 Look Here
We don’t know what information about oneself is accessible to others or who
knows about our buying trends online, but we know what information about us is
available online and it is advised to keep it private.
1. Google: Google yourself. Make use of the service “Me on the Web” so that you
get a notification whenever your personal data is made available on the
internet.
2. Google Alerts: Set up google alerts so that an email is sent to you whenever
your name appears on the internet.
Figure 14.4 – Look Here
3. PeekYou*: These kinds of websites collect all the information that you fill while registering for any
website. They also collect your website interests and social habits.
4. Spokeo*: This is also a website which collects information about individuals but at a cost.
This is one of the major reasons why you must be careful while entering your personal information online.
99
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
14.7 Take Charge
There are simple steps that you can take to enhance digital
privacy:
7. Use secure wireless connections, websites etc.: When entering personal information, always make
sure you are on a secure wireless connection. Secure wireless is the one where you need to log in using
a username and password.
8. Have computer disposable procedures: Hard drive of your computer contains confidential
information. When you dispose off the computer, make sure that you have wiped off all the data from
the hard drive. There are inexpensive utility programs in the market that clean your hard drive.
9. Recognize phishing scam: You might receive emails asking for your personal details and bank account
number because you have won a lottery. These are spam emails and should not be entertained.
10. Communicate the importance of digital privacy: Talk about digital privacy amongst your friends.
11. Remove your profile: You can approach websites that collect your online personal information and ask
them to remove your profile. Examples of such websites are PeekYou*, Spokeo* etc.
There are applications that block websites which gather and store your
information. Some of them are:
100
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
3. IP Blockers: They are tools that do not let websites to capture your location. They block your IP and
you can be online without the internet knowing your location.
101
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
14.10 Did You Know?
1. Social Networks compromise your privacy to make money!
2. Some major companies intentionally installing malware on your computer to make
money!
3. Casinos are more concerned about their customer’s privacy than most of the retailers!
4. Your credit card’s magnetic strip has all your secrets!
5. Most companies are not equipped enough to protect their customer’s privacy!
6. When you use the internet, your internet history has already been saved and can be used by companies!
7. Approximately 21% of the internet users have had an email or social networking account which has been
taken over by someone else without permission!
8. Approximately 59% of the internet users do not believe that they can be completely anonymous online!
9. Approximately 68% of the internet users believe current laws are not good enough to protect people’s
online privacy!
10. Approximately 6% of the internet users have been a target of an online scam and lost money!
102
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 15 – Internet Safety
15.1 Objectives
After going through this chapter the students should be able to:
15.2 Introduction
Do you think you are safe on the internet? Have you ever
received messages which make you uncomfortable? So, here
is your answer! You are not safe on the internet but if you
take precautions, you can for sure be safe online. Internet
safety is adhering to safe practices online and minimizing the
risks of being harmed by the dangerous behaviour of others.
The behaviours include cyberbullying, cyberstalking etc.
Internet safety is not only a concern for kids but for adults as
well.
‘Safer internet day’ is celebrated in February to raise awareness about internet safety.
103
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
15.3 Common Threats
Some of the common threats to internet safety are:
3. Gaming Addiction is excessive use of online games at the cost of health, education and other day to day
activities. Gaming addiction leads to social isolation, mood swings etc.
4. Identity Theft is a threat where a person makes illegal use of someone else’s personal information.
5. Cyber Stalking includes harassing an individual, group or organization using technology. It includes false
accusations, defamation etc.
1. Don’t post any personal information on the internet. Personal information includes your address, email
address, mobile number etc.
2. Think twice before posting your photographs or videos online. Once they go online, not only can
anyone see them but anyone can download and misuse them as well.
3. Your privacy settings should be as high as possible.
4. Never give out your passwords.
5. Refrain from chatting to strangers.
6. Don’t accept friend requests or don’t be friendly with people whom you don’t know.
7. Don’t meet people in person whom you have met online.
8. Think carefully before posting online. Remember, you need to respect other people’s views as well.
9. If you see something with which you are not comfortable, report the same to your family members.
104
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
15.4.1 Protective Measures from Cyberbullying
1. If you receive any kind of unpleasant message or picture, do not respond. Report the same to your
family members.
2. If you are in a chat room and you receive inappropriate message(s), leave the chat room and refrain
from using the same chat room.
3. If you receive any kind of threat, save the conversation or picture as a written proof and inform your
family members. Take the help of police if and when needed.
4. Do not cyberbully others.
If you are being cyberbullied, it is not your fault and you can approach your family members/police without
feeling ashamed.
105
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
15.4.2 Protective Measures from Cyber Predators
7. If you receive a suspicious email that you have won a lottery, do not provide any personal information.
8. Do not open attachments from an email where the sender is not known to you.
106
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
15.4.4 Protective Measures from Gaming Addiction
7. Decide a day in a week when you will not use any electronic item, like computer, TV, mobile phone etc.
1. Make sure you are aware of the information available on the internet about you and keep that
information to the minimum.
2. Avoid sharing your information on public forums.
3. Digital devices that you use should have updated antivirus and spyware software.
4. Make sure that the security is high on your wi-fi router.
In case you are affected by cyberstalking, make sure you do the following:
107
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
15.4.6 Mobile Phone Safety
108
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
6. Circumventor Sites - Websites that allow children to access filtering software in order to access the
blocked websites.
7. Cookie - A piece of information automatically recorded on your computer by some websites about the
web pages you visited.
8. Cybercrime - Any Internet-related illegal activity.
9. Filter - Block certain types of content from appearing on the screen.
10. Gaming - Online games, which can be played individually or by multiple online users.
109
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 16 – Stranger Danger
16.1 Objectives
After going through this chapter the students should be able to:
16.2 Introduction
Sure enough, technology is an integral part of your lives.
Since you spend a lot of time on Internet, you should know the
possible threats while you are online.
Do you know what “Stranger danger” is? …. No?
The Internet is no doubt, a very vast and powerful tool helping in every aspect of your
life. However, even a simple tool like a hammer can be misused, the Internet can also be
used inappropriately.
It is, however, mandatory that every person using the Internet must be taught how to wield it effectively, or it
will end up causing more harm than good.
Following are the five most devastating potential dangers from the internet.
110
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
16.3.1 Cyberbullying
111
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
16.3.4 Damaged Reputation
Playing online games occasionally is not harmful but people are now used to
spending hours playing online games. This can be dangerous.
Do you know, excessive Gaming can be harmful for you? Again you are right. Yes,
it is harmful.
16.4 Precautions
It is our duty to know the dangers of speaking with online strangers. We must know that real world rules apply
online as well. Try to figure out why interacting with strangers online can be dangerous, what the real world
consequences can be and why we should stick with people we know in real life?
1. Take precautions while making friends on social media and gaming sites that we use on a regular
basis. Ensure they are real world friends too.
2. Delete and block any followers and friends whom we do not know.
3. Fix up ‘play dates’ for online games between you and your real friends.
4. Do not share your personal information.
112
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
16.5 Chapter Objective Checklist
S. No. SKILLS ACQUIRED YES NO
1. I have understood what stranger dangers are.
2. I understand what cyberbullying is.
3. The videos used in this lesson are truly relevant and easy to understand.
4. I understand the dos and don’ts while being online.
5. I will not support any harmful activity in my friend group.
6. I have understood the negative side of the internet too.
113
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
16.8 References from Internet
https://en.wikipedia.org/wiki/Stranger_danger
http://zeeko.ie/stranger-danger/online-stranger-danger/
www.neotericuk.co.uk
http://mamabearapp.com/internet-stranger-danger/
http://www.covenanteyes.com/2012/05/22/5-dangers-of-the-internet-for-kids/
http://www.raisesmartkid.com/3-to-6-years-old/4-articles/34-the-good-and-bad-
effects-of-video-games
https://www.dosomething.org/us/facts/11-facts-about-cyber-bullying
http://www.puresight.com/Pedophiles/Online-Predators/online-predators-statistics.html
http://www.guardchild.com/statistics/
https://www.nspcc.org.uk/preventing-abuse/child-abuse-and-neglect/online-abuse/facts-statistics/
114
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Digital Security
115
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 17 – Effective Passwords
17.1 Objectives
After going through this chapter the students should be able to:
17.2 Introduction
We use passwords to access our email addresses, our accounts on
social media, to take out money from ATM, to do internet banking,
etc. Passwords are used everywhere. What is a password? A
Password is a string or collection of characters which is used to get
access to a secret which is not open to all the people. Password
ensures that only the authorized person is accessing the
information. A password should be such that it should not be
guessed easily. Passwords are used with usernames. On some sites,
passwords are also used with 4 digit PIN.
Figure 17.1 - Passwords
1. Passwords safeguard our data. If our computer or internet account has valuable information, we must
defend that information against virus attacks, online hackers etc.
116
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
2. People want to access your bank accounts which you need to safeguard.
3. People want to purchase items with your money, which for sure, you don’t want.
4. People want to impersonate you on social networking and dating sites with which you are not
comfortable.
5. People want to send emails in your name which can cause problems for you.
To know more about the use of password and its recovery, visit –
https://www.youtube.com/watch?v=KPLgsHAdx4Q
https://www.youtube.com/watch?v=w3xuPuEQm4k
methods to steal your passwords. There are software available to hack your passwords. To protect your
password from being hacked, you need a strong password. There is no guarantee that strong passwords will not
be hacked but for sure, strong passwords take more time to get hacked. So, it is always a good practice to have
a strong password.
117
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
6. Passwords should not have consecutive identical characters.
7. While creating a password, do not use all numbers or letters.
8. Do not reuse old passwords.
5. When letters are repeating themselves in your password, do not always replace the letters with the
same digits.
6. Pick a pattern on your keyboard and type some of the letters using shift key randomly.
7. Your each account should have a different password.
8. Have two base passwords. One password should be used for your accounts which contain your credit
card information, personal information etc. The second password can be a simple one for your forums
etc.
9. Update your passwords every few weeks or months. More often you do, the better it is.
10. Use a password manager that remembers, encrypts and protects your password.
11. Make your nth letter capital while creating a password.
118
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
17.4.3 Looking After Your Passwords
Since you must keep your passwords safe, here are some tips
to take precautions so that your password does not leak out.
119
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
10. Encryption - Process of making data or messages unreadable and secret.
120
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 18 – Cyber Security
18.1 Objectives
After going through this chapter the students should be able to:
18.2 Introduction
Cyber Security is the protection of computer systems, devices and
network from any unauthorized access or misuse by others. It is of
importance as the use and our dependency on digital media is growing
day by day. There are internet, wi-fi, Bluetooth etc and they are all
prone to theft or damage. Cybersecurity includes secure passwords,
malware, internet privacy, data breaches, safe computing, online
scams and mobile protection. In this chapter, we will concentrate on
malware and smartphone safety.
121
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
18.3 What is the difference between HTTP and HTTPS?
With almost 32 lakh debit cards information is compromised in India.
Many of you may be aware of this difference, but it is worth sharing if you are not.
The main difference between http:// and https:// is all about keeping you more secure.
HTTP stands for Hyper Text Transfer Protocol. The S (big surprise) stands for "Secure". If you are visiting a Website
or web page, and look at the address in the web browser, it is likely begin with the following: http://. This means
that the website is talking to your browser using the regular unsecured language. In other words, it is possible
for someone to "spy" on your computer's conversation with the Website. If you fill out a form on the website,
someone might see the information you send to that site.
This is why you never ever enter your credit card number in an HTTP website! But if the web address begins with
https://, that means your computer is talking to the website in a secure code that no one can use on.
If a website ever asks you to enter your Credit/Debit card Information, you should automatically look to see if
the web address begins with https://. If it doesn't, you should NEVER enter sensitive Information, such as a
credit/debit card number.
While checking the name of any website, first look for the domain extension (.com or .org, .co.in, .net etc.). The
name just before this is the domain name of the website. You can similarly check for bank frauds.
Before your ebanking logins, make sure that the name just before ".com" is the name of your bank.
"Something.bankname.com" belongs to your bank, but bankname.some1else.com belongs to "some1else".
18.4 Malware
Malware, short for ‘malicious software’, is software that gets installed on
your laptop, desktop computer or smartphone and performs a multitude
of undesirable tasks such as stealing passwords, deleting files or
reformatting the hard disk. Examples of malware are:
122
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
3. Trojan horse looks to be a harmless program that you knowingly download but it allows attackers access
your system.
4. Spyware exploits infected computers for commercial gain, delivering unsolicited pop-up ads and monitor
web browsing activity, among other things.
To know more about warning signs if your computer is malware infected, visit –
https://www.youtube.com/watch?v=LKrvu-ha6tw.
123
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
18.4.3 Precautions to Keep Your Computer Safe and Clean
What to do if your computer gets infected by malware. Do not panic and do the following:
1. Disconnect your computer from the internet and start your computer in safe mode.
2. Take a backup of your files and important work.
3. Delete temporary files.
4. Download malware detectors and run them.
5. Remove all CDs, DVDs and external memory drives and restart your computer.
6. Run a full scan with another malware detection program.
7. Update your operating system, programs, applications etc.
8. Remove system restore points.
9. Reset all your passwords.
10. Reset your browser settings to default.
124
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
To know more about removing malware from your computer, visit –
https://www.youtube.com/watch?v=J66pjLEaMWk
https://www.youtube.com/watch?v=6pZdmrkBnFY
https://malwaretips.com/blogs/malware-removal-guide-for-windows/
125
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
18.7 Chapter Objective Checklist
S. No. SKILLS ACQUIRED YES NO
1. I know what cybersecurity is.
2. I know what malware is.
3. I can tell different types of malware.
4. I know how a computer gets infected by malware.
5. I can tell if a computer is malware infected.
6. I can take precautions to save my computer from malware attack.
7. I can take actions if my computer is infected by malware.
8. I know tips for smartphone safety.
9. I know the difference between spams and real emails.
10. The links presented in the chapter are interesting and useful.
11. The information given in the chapter will help us increasing cyber security.
12. I would like to explore more about cyber security.
126
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
18.9 Did You Know?
1. MyDoom, considered to be the most expensive virus in the world and in cybersecurity
history, has caused an estimated financial damage of $38.5 billion!
2. 59% of employees steal corporate data when they quit or are fired!
3. It’s not a software glitch or a virus but rather humans who are the weakest link in cyber
security!
4. There is a real-time map that shows cyber attacks in action!
5. Hacking is the main motivation that drives cyber attacks!
6. As a result of cyber attacks, 68 % of funds lost were declared unrecoverable!
7. Roughly around 80 to 90 million cyber attacks occur per year, which breaks down to about 400 new
attacks every single minute!
8. According to the Department of Communications and Arts in Australia, only 2% of SMBs have actually
secured their systems and websites with proper protection!
9. Since 2014, cybersecurity incidents have surged by 38%!
10. Malicious cyber attacks cost the US $300 Billion to $ 1Trillion a year!
127
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation