Sie sind auf Seite 1von 127

Digital Citizenship and Cyber Wellness

Olympiad – Handbook for Students


(Classes VI – XII)
Conducted by
Learning Links Foundation

1
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Objectives

In recent years digitization is no longer confined to controlled laboratory but has started addressing
real world scenarios and situations. The rising interest in the digital world stems from the fact that all
small and big tasks require digitization. Digitization is everywhere – in the car we drive, the phone we
use, the books we read etc. Everyone is keen to invent and use new technologies. But do we know
whether anyone who uses technology is a good digital citizen? Just as we know the rules of the society,
we must know the rules of the digital world, and learn how to be safe and responsible with technology.

To be a digital citizen means to follow the social guidelines of appropriate, responsible behaviour with
regard to technology use.

The main objective of Digital Citizenship and Cyber Wellness Olympiad is to make our future
generations leaders of Digital India. It aims to inculcate interest in students about working safely and
responsibly on the internet and creating a safe learning and sharing web environment for everyone.
They must know how important and crucial it is to head responsibly towards automation and
digitization.

The Olympiad is open to students of English and Hindi medium schools across India. The test
encourages students to emphasize on the logical application of their knowledge base and promotes
their move towards a digital India. This Olympiad is not about participation only from the toppers but
is open to anyone who has a knack towards technology. It does not focus on marks and ranks but is
more about promoting sustainability; it is about making each child of the school a responsible netizen.

2
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Introduction

This booklet is meant to be interesting, helpful and an educational reference material for students. It
presents an overview of digital citizenship in practice. The content of this booklet focuses on the
elements of digital citizenship which includes Cyberbullying, Digital Privacy, Digital
Rights/Responsibilities, Internet Safety, Netiquette, Online Plagiarism and many more, and how
students can be online without getting threatened or afraid of their identity theft.

This booklet also exposes students to some of the contemporary happenings in the digital world and
steps towards becoming a responsible digital citizen. This booklet is designed for students to use as a
reading material at their own leisure and understand why and how they can be safe online. This book
in no way should be considered as a course book which needs to be read to be able to take exams.

Digital citizenship helps online users including teachers, students, and professionals to understand
what they should know to use technology with the maximum safety and responsibility. It is not a
teaching tool but a way to prepare students for a society which is technology driven.

Digital citizenship is gaining momentum not only in developed countries but around the world.
Whether we call it digital citizenship, digital wellness or digital ethics, the issues are the same, how
should we behave when we are online, and what should be taught to our peer groups for them to be
safe and aware digital citizens. With the advent of one-is-to-one teaching with technology, we also
need to talk about using technology responsibly. Not only organizations, but individuals too are taking
interest in the topic and working towards making the digital world a safer place.

The world is moving into a digital age, an age of openness and transparency. The benefit is that every
citizen has access to information and each can participate in generation of knowledge.

3
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Note to the Students

Now is the time to focus using the internet and technology responsibly. Everyone should be free to
use the internet but in a manner that does not offend or hurt any other person. The handbook gives
a precise introduction to different elements of digital citizenship in the world today.

On completion of the handbook, you will be participating in the Olympiad and will be assessed on the
information provided in this booklet. After understanding the importance of Digitization, each one of
you should attempt at least one project. You can also make a group, select a topic and work on the
project. You must have a detailed project proposal before you start on the project. The project
proposal must include the calendar of activities to be undertaken. Select a teacher as your mentor
who should guide your project and monitor closely the activities associated with the project. Once you
complete the project, write a report and send it for evaluation. Project based learning would ensure
learning in the affective domain which would bring forth good, sensitive, rational citizens.

The Olympiad questionnaire will ensure that the participant is keen towards digitization and has
acquired the knowledge of components and uses of digital citizenship. The Olympiad will motivate you
to be a global learner.

We wish you all the best and thank you for your participation.

4
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Table of Contents

Objectives .......................................................................................................................................... 2
Introduction....................................................................................................................................... 3
Note to the Students ......................................................................................................................... 4
Table of Contents .............................................................................................................................. 5
Digital Citizenship ............................................................................................................................ 13
Digital Access .......................................................................................................................... 13
Digital Commerce ................................................................................................................... 14
Digital Communication ........................................................................................................... 14
Digital Literacy ........................................................................................................................ 14
Digital Etiquette ...................................................................................................................... 14
Digital Law............................................................................................................................... 14
Digital Rights and Responsibilities .......................................................................................... 14
Digital Health and Wellness .................................................................................................... 14
Digital Security ........................................................................................................................ 15
Digital Access ................................................................................................................................... 16
Chapter 1 – Public Domain.............................................................................................................. 17
1.1 Objectives ........................................................................................................................ 17
1.2 Introduction ..................................................................................................................... 17
1.3 Content Under Public Domain ......................................................................................... 18
1.3.1 Books Under Public Domain ................................................................................ 18
1.3.2 Music Under Public Domain ................................................................................ 18
1.3.3 Films Under Public Domain .................................................................................. 19
1.4 Value of Public Domain .................................................................................................... 19
1.5 Perpetual Copyright ......................................................................................................... 20
1.6 Works Not Covered By Copyright Law ............................................................................. 20
1.7 Chapter Objective Checklist ............................................................................................. 21
1.8 Let’s Recap ....................................................................................................................... 21
1.9 Did You Know? ................................................................................................................. 21
1.10 References from Internet .............................................................................................. 22
Chapter 2 – Online Presence........................................................................................................... 23
2.1 Objectives ........................................................................................................................ 23
2.2 Introduction ..................................................................................................................... 23

5
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
2.3 Importance of Online Presence ....................................................................................... 24
2.4 Modes to Make Online Presence ..................................................................................... 24
2.5 Creating a Profile.............................................................................................................. 25
2.5.1 Elements of a Successful Social Media Profile ..................................................... 25
2.6 Start Building Your Online Presence ................................................................................ 26
2.7 Tips to Enhance Your Online Presence ............................................................................ 27
2.8 Chapter Objective Checklist ............................................................................................. 27
2.9 Let’s Recap ....................................................................................................................... 28
2.10 Did You Know? ............................................................................................................... 28
2.11 References from Internet .............................................................................................. 28
Chapter 3 – Social Media ................................................................................................................ 30
3.1 Objectives ........................................................................................................................ 30
3.2 Introduction ..................................................................................................................... 30
3.3 Applications of Social Media ............................................................................................ 30
3.3.1 Social Media in Education .................................................................................... 31
3.3.2 Social Media in Learning ...................................................................................... 31
3.4 Social Media Tools/Apps .................................................................................................. 32
3.5 Social Media Warnings..................................................................................................... 34
3.6 Chapter Objective Checklist ............................................................................................. 34
3.7 Let’s Recap ....................................................................................................................... 35
3.8 Did You Know? ................................................................................................................. 35
3.9 References from Internet ................................................................................................ 35
Chapter 4 – Digital Footprint .......................................................................................................... 36
4.1 Objectives ........................................................................................................................ 36
4.2 Introduction ..................................................................................................................... 36
4.3 Types of Digit Footprints .................................................................................................. 36
4.4 What is in Your Digital Footprints .................................................................................... 37
4.5 How to Create a Positive Digital Footprint ...................................................................... 37
4.6 Manage Your Digital Footprints ....................................................................................... 38
4.7 Chapter Objective Checklist ............................................................................................. 38
4.8 Let’s Recap ....................................................................................................................... 38
4.9 Did You Know? ................................................................................................................. 39
4.10 References from Internet .............................................................................................. 39
Digital Commerce ............................................................................................................................ 40
Chapter 5 – Digital Commerce ........................................................................................................ 41
5.1 Objectives ........................................................................................................................ 41

6
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
5.2 Introduction ..................................................................................................................... 41
5.3 Concept ............................................................................................................................ 41
5.3.1 Different Types of Digital Commerce................................................................... 42
5.4 Advantages and Disadvantages of Digital Commerce ..................................................... 42
5.4.1 What is Electronic Payment System? Why is it Important? ................................ 43
5.4.2 What is E-Banking? .............................................................................................. 44
5.4.3 What is Online Publishing? .................................................................................. 44
5.5 Chapter Objective Checklist ............................................................................................. 44
5.6 Let’s Recap ....................................................................................................................... 45
5.7 Did You Know? ................................................................................................................. 45
5.8 References from Internet ................................................................................................ 46
Digital Communication ................................................................................................................... 47
Chapter 6 – Digital Communication................................................................................................ 48
6.1 Objectives ........................................................................................................................ 48
6.2 Introduction ..................................................................................................................... 48
6.3 Different Types of Digital Communication ...................................................................... 49
6.4 Advantages and Disadvantages of Digital Communication ............................................. 49
6.5 Do’s and Don’ts of Digital Communication ...................................................................... 50
6.6 Chapter Objective Checklist ............................................................................................. 51
6.7 Let’s Recap ....................................................................................................................... 51
6.8 Did You Know? ................................................................................................................. 51
6.9 References from Internet ................................................................................................ 52
Digital Literacy ................................................................................................................................. 53
Chapter 7 – Digital Search ............................................................................................................... 54
7.1 Objectives ........................................................................................................................ 54
7.2 Introduction ..................................................................................................................... 54
7.3 Search Engines ................................................................................................................. 54
7.4 How a Search Engine Works ............................................................................................ 55
7.5 Effective Search Strategies............................................................................................... 55
7.6 Tips for Effective Search................................................................................................... 56
7.7 Chapter Objective Checklist ............................................................................................. 56
7.8 Let’s Recap ....................................................................................................................... 57
7.9 Did You Know? .................................................................................................................. 57
7.10 References from Internet .............................................................................................. 57
Chapter 8 – Image Copyright .......................................................................................................... 58
8.1 Objectives ........................................................................................................................ 58

7
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
8.2 Introduction ..................................................................................................................... 58
8.3 Why Should You Care About Copyright? ......................................................................... 58
8.3.1 Work Protected by Copyright .............................................................................. 59
8.3.2 Work Not Protected by Copyright ....................................................................... 59
8.4 Copyright Infringement.................................................................................................... 59
8.4.1 When Permission is Required to Use an Image ................................................... 60
8.5 Rules You Follow for Using Any Image from the Internet ............................................... 60
8.6 Fair Use Law ..................................................................................................................... 60
8.7 Chapter Objective Checklist ............................................................................................. 60
8.8 Let’s Recap ....................................................................................................................... 61
8.9 Did You Know? ................................................................................................................. 61
8.10 References from Internet .............................................................................................. 62
Chapter 9 – Online Plagiarism ........................................................................................................ 63
9.1 Objectives ........................................................................................................................ 63
9.2 Introduction ..................................................................................................................... 63
9.3 Why Students Plagiarize?................................................................................................. 64
9.4 Categories of Plagiarism................................................................................................... 64
9.5 Consequences of Plagiarism ............................................................................................ 64
9.6 Check if You Are Supporting Plagiarism? ......................................................................... 65
9.7 Chapter Objective Checklist ............................................................................................. 65
9.8 Let’s Recap ....................................................................................................................... 65
9.9 Did You Know? ................................................................................................................. 66
9.10 References from Internet .............................................................................................. 66
Digital Etiquette .............................................................................................................................. 67
Chapter 10 - Netiquette .................................................................................................................. 68
10.1 Objectives ...................................................................................................................... 68
10.2 Introduction ................................................................................................................... 68
10.3 Why Netiquettes? .......................................................................................................... 68
10.4 Undesirable Netiquettes ................................................................................................ 69
10.5 Basic Netiquettes ........................................................................................................... 69
10.5.1 Netiquettes for Emails ....................................................................................... 70
10.5.2 Netiquettes for Discussion Groups .................................................................... 70
10.5.3 Netiquettes for Retrieving Information ............................................................. 71
10.6 Chapter Objective Checklist ........................................................................................... 71
10.7 Let’s Recap ..................................................................................................................... 71
10.8 Did You Know? ............................................................................................................... 72

8
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
10.9 References from Internet .............................................................................................. 72
Digital Law ....................................................................................................................................... 73
Chapter 11 – Digital Law ................................................................................................................. 74
11.1 Objectives ...................................................................................................................... 74
11.2 Introduction ................................................................................................................... 74
11.3 Copyright and Trademark Law ....................................................................................... 75
11.4 Trade Secrets and Patents ............................................................................................. 75
11.5 Licensing......................................................................................................................... 76
11.5.1 Consequences of Software Piracy ...................................................................... 76
11.6 Data Protection .............................................................................................................. 77
11.7 Cybercrime ..................................................................................................................... 77
11.8 Cyber Laws in India ........................................................................................................ 78
11.9 Chapter Objective Checklist ........................................................................................... 82
11.10 Let’s Recap ................................................................................................................... 82
11.11 Did You Know? ............................................................................................................. 83
11.12 References from Internet ............................................................................................ 83
Digital Rights and Responsibilities.................................................................................................. 84
Chapter 12 – Digital Rights and Responsibilities ............................................................................ 85
12.1 Objectives ...................................................................................................................... 85
12.2 Introduction ................................................................................................................... 85
12.3 Digital Disrespect ........................................................................................................... 86
12.3.1 Effects of Digital Disrespect ............................................................................... 86
12.3.2 Precautions from Digital Disrespect .................................................................. 87
12.4 Digital Rights .................................................................................................................. 87
12.5 Digital Responsibilities ................................................................................................... 88
12.6 Why are Digital Rights and Responsibilities Important?................................................ 88
12.7 Chapter Objective Checklist ........................................................................................... 89
12.8 Let’s Recap ..................................................................................................................... 89
12.9 Did You Know? ............................................................................................................... 90
12.10 References from Internet ............................................................................................ 90
Digital Health and Wellness ............................................................................................................ 91
Chapter 13 - Cyberbullying ............................................................................................................. 92
13.1 Objectives ...................................................................................................................... 92
13.2 Introduction ................................................................................................................... 92
13.3 Why do People Cyberbully ............................................................................................. 93
13.4 Different Ways of Cyberbullying .................................................................................... 93

9
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
13.5 Effects of Cyberbullying ................................................................................................. 94
13.6 Preventing Cyberbullying ............................................................................................... 94
13.7 What to do if You are Cyberbullied................................................................................ 95
13.8 Chapter Objective Checklist ........................................................................................... 95
13.9 Let’s Recap ..................................................................................................................... 95
13.10 Did You Know? ............................................................................................................. 96
13.11 References from Internet ............................................................................................ 96
Chapter 14 – Digital Privacy ............................................................................................................ 97
14.1 Objectives ...................................................................................................................... 97
14.2 Introduction ................................................................................................................... 97
14.3 Why Digital Privacy ........................................................................................................ 97
14.4 Are People Worried about Digital Privacy? ................................................................... 98
14.5 Look Here ....................................................................................................................... 99
14.6 Who Cares ...................................................................................................................... 99
14.7 Take Charge ................................................................................................................. 100
14.7.1 More About Data Blockers............................................................................... 100
14.8 Chapter Objective Checklist ......................................................................................... 101
14.9 Let’s Recap ................................................................................................................... 101
14.10 Did You Know? ........................................................................................................... 102
14.11 References from Internet .......................................................................................... 102
Chapter 15 – Internet Safety......................................................................................................... 103
15.1 Objectives .................................................................................................................... 103
15.2 Introduction ................................................................................................................. 103
15.3 Common Threats.......................................................................................................... 104
15.4 General Safety Measures ............................................................................................. 104
15.4.1 Protective Measures from Cyberbullying ........................................................ 105
15.4.2 Protective Measures from Cyber Predators .................................................... 106
15.4.3 Protective Measures from Identity Theft ........................................................ 106
15.4.4 Protective Measures from Gaming Addiction ................................................. 107
15.4.5 Protective Measures from Cyberstalking ........................................................ 107
15.4.6 Mobile Phone Safety ........................................................................................ 108
15.5 Chapter Objective Checklist ......................................................................................... 108
15.6 Let’s Recap ................................................................................................................... 108
15.7 Did You Know? ............................................................................................................. 109
15.8 References from Internet ............................................................................................ 109
Chapter 16 – Stranger Danger ...................................................................................................... 110

10
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
16.1 Objectives .................................................................................................................... 110
16.2 Introduction ................................................................................................................. 110
16.3 Types of Dangers from a Stranger ............................................................................... 110
16.3.1 Cyberbullying ................................................................................................... 111
16.3.2 Online Predators .............................................................................................. 111
16.3.3 Inappropriate Content ..................................................................................... 111
16.3.4 Damaged Reputation ....................................................................................... 112
16.3.5 Excessive Gaming ............................................................................................. 112
16.4 Precautions .................................................................................................................. 112
16.5 Chapter Objective Checklist ......................................................................................... 113
16.6 Let’s Recap ................................................................................................................... 113
16.7 Did You Know? ............................................................................................................. 113
16.8 References from Internet ............................................................................................ 114
Digital Security .............................................................................................................................. 115
Chapter 17 – Effective Passwords................................................................................................. 116
17.1 Objectives .................................................................................................................... 116
17.2 Introduction ................................................................................................................. 116
17.3 Why Do We Need Passwords....................................................................................... 116
17.4 Need For a Strong Password ........................................................................................ 117
17.4.1 Characteristics of a Strong Password............................................................... 117
17.4.2 Creating a Strong Password and Remembering It ........................................... 118
17.4.3 Looking After Your Passwords ......................................................................... 119
17.5 Chapter Objective Checklist ......................................................................................... 119
17.6 Let’s Recap ................................................................................................................... 119
17.7 Did You Know? ............................................................................................................. 120
17.8 References from Internet ............................................................................................ 120
Chapter 18 – Cyber Security.......................................................................................................... 121
18.1 Objectives .................................................................................................................... 121
18.2 Introduction ................................................................................................................. 121
18.3 What is the difference between HTTP and HTTPS? ..................................................... 121
18.4 Malware ....................................................................................................................... 122
18.4.1 How do I Get Malware on My Computer? ....................................................... 123
18.4.2 Warning Signs Your Computer Is Malware Infected ........................................ 123
18.4.3 Precautions to Keep Your Computer Safe and Clean ...................................... 124
18.4.4 What To Do If My Computer is Infected by a Malware ................................... 124
18.5 Myths about Wi-Fi ....................................................................................................... 125

11
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
18.6 Smartphone Safety ...................................................................................................... 125
18.7 Chapter Objective Checklist ......................................................................................... 126
18.8 Let’s Recap ................................................................................................................... 126
18.9 Did You Know? ............................................................................................................. 127
18.10 References from Internet .......................................................................................... 127

12
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Digital Citizenship
Digital citizenship defines how to use technology responsibly. Since schools are promoting BYOD (Bring
Your Own Device) and we are entering into a digital era, we must know the dos and don’ts of the
digital world. As per global research, Digital Citizenship comprises of the following nine elements:

1. Digital Access
2. Digital Commerce
3. Digital Communication
4. Digital Literacy
5. Digital Etiquettes
6. Digital Law
7. Digital Rights and Responsibilities
8. Digital Health and Wellness
9. Digital Security

References:
https://www.iste.org/docs/excerpts/DIGCI2-excerpt.pdf
http://www.digitalcitizenship.net/

Digital Access
Digital access is full electronic participation in society. There are people who do not have access to
information available on the internet. It can be due to lack of infrastructure, physical location, lack of
financial ability etc. It is the duty of all citizens as well as the government to provide digital access to
all the people across the world. Access of information can be given across the globe using different
ways – putting the information in public domain, using social media to publish information etc.
Chapters included in digital access are:

1. Public Domain: Information under public domain is available to everyone free of cost. There
are songs, books etc. available on internet for people to use.
2. Online Presence: This can also increase access of information to people. To make online
presence, organizations have websites with information, individuals write blogs which again
contain information. These websites and blogs are on the internet so that people can have
access to the information.
3. Social Media: Information using technology can be created and shared using Social Media. It
involves giving access to information using videos, text etc.
4. Digital Footprint: Whenever we access information on internet, we leave footprints which
forms our reputation on internet. Hence, we make sure that we access the information with
responsibility.

References:
https://en.wikipedia.org/wiki/Social_media
https://en.wikipedia.org/wiki/Online_presence_management
http://www.digitalcitizenship.net/Nine_Elements.html

13
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Digital Commerce
Digital commerce is electronic buying and selling of goods. The chapter on digital commerce gives an
idea how to purchase and sell products on internet responsibly.

Digital Communication
Digital communication is electronic exchange of information. The chapter on digital communication
talks about various ways to communicate digitally which includes email, mobile phones, texting etc.

Digital Literacy
Digital literacy is the process of teaching and learning about technology and its usage. It teaches
individuals how learning can happen anytime, anywhere. The chapters included are:

1. Digital Search: The chapter contains information on how to do effective search on any topic
on internet and get the required information.
2. Image Copyright: The chapter talks about how the work created by individuals can be
published and used by people to gather information.
3. Plagiarism: The chapter emphasizes on ethical use of work created by others. It specifies the
importance of not copying original work without the consent or approval of the author or
without giving due credit to the owner of the content.

Reference:
http://www.teachingvillage.org/2012/04/10/copyright-plagiarism-and-digital-literacy/

Digital Etiquette
Digital etiquette is electronic standard of conduct or procedure. The chapter ‘Netiquette’ guides on
how to behave while we are online, how to respect and how to be respected online.

Digital Law
Digital law is electronic responsibility for actions and deeds. The chapter ‘Digital Law’ defines the do’s
and don’ts of the digital world and the consequences one has to face on breaking the law.

Digital Rights and Responsibilities


Digital rights and responsibilities are the freedoms extended to everyone in a digital world. The
chapter ‘Digital Rights and Responsibilities’ defines the privileges enjoyed by online users and the
expectations from online users while using internet.

Digital Health and Wellness


Digital health and wellness is the physical and psychological well-being in a digital technology world.
Chapters included are:

1. Cyberbullying: The chapter provides information as how the internet can be used to harm
people and the precautions one can take to minimize the harm.
2. Digital Privacy: The chapter specifies how personal information of people are misused on
the internet and how to protect the information.
3. Internet Safety: It defines safe online practices and minimize the risks of being harmed by
dangerous behaviours of others.
4. Stranger Danger: The chapter defines different kind of dangers that one can experience
from online strangers and how to safeguard oneself from them.

14
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Digital Security
Digital security is electronic precautions to guarantee safety. The chapters included are:

1. Effective Passwords: The chapters informs us about the importance of passwords and how
strong passwords can save our accounts from being hacked.
2. Cyber Security: The chapter helps in securing our systems from different threats like virus
etc.

15
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Digital Access

16
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 1 – Public Domain

1.1 Objectives
After going through this chapter the students should be able to:

1. Know the meaning of public domain.


2. Know the public domain mark.
3. Enumerate books under public domain.
4. List examples of music under public domain.
5. List examples of films under public domain.
6. Elaborate the value of public domain.
7. Define perpetual copyright.
8. Explain works not covered by copyright law.
9. Define public domain day.
10. Spread awareness about public domain.

1.2 Introduction
A content is in public domain if it is not protected by
any copyright law. The content is available to public
and anyone can copy the content, share the content,
change the content and publish it again. An example
of content which is in public domain is the work of
Shakespeare.
Figure 1.1 – Public Domain

The Creative Commons proposed in 2010 that there should be a symbol with which people should know that the
work is under public domain. The mark is called the Public Domain Mark. It is used for very old works but is not
used with works that are in public domain under some jurisdiction. It has been noticed by Wikimedia Commons
that there are around 2.9 million works, that is, nearly 10% of the total work, which comes under Public Domain
Mark as on February 2016.

Public domain day is the day when content is no longer under copyright law and enters the public domain. It
generally happens on 1st January of each year, depending on the copyright law of the country. When any content
is made available for public free of cost, the day is called Public Domain Day. Public domain day is 1st January.

Read more at https://en.wikipedia.org/wiki/Public_Domain_Day.

To know more about public domain, visit –


https://www.youtube.com/watch?v=Nc3Dnh2JCMI
https://www.youtube.com/watch?v=SABNa2r8Ydg
http://www.dictionary.com/browse/public--domain

17
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
1.3 Content Under Public Domain
Although anyone can use content that is under public domain, but no one can own the content. It is not necessary
that if a content is in public domain in America, it is in public domain in other countries as well. Content in public
domain varies from country to country. Anything can be under public domain – music, films, books, artwork etc.

To know more about content under public domain, visit –


https://www.youtube.com/watch?v=MfnGV-mHcjw

1.3.1 Books Under Public Domain

Examples of books under the public domain are:

1. Famous Dane’s work including stories – Thumbelina, The Ugly


Duckling, The Little Mermaid etc.
2. Work by Jane Austen – Sense and Sensibility, Pride and
Prejudice, Mansfield Park, Emma, Persuasian etc.
3. Work by Charles Dickens – The Girl with the Golden Eyes, Father
Goriot etc.
4. Work by Charlotte Bronte – Jane Eyre etc.
5. Work by Emily Bronte – Wuthering Heights etc.
6. Work by Frances Hodgson Burnett – The Secret Garden, A Little
Princess etc.
7. Work by Edgar Rice Burroughs – Tarzan of the Apes, At the
Earth’s Core etc.
8. Work by Lewis Carroll – Alice’s Adventure in Wonderland,
Through the Looking Glass, The Hunting of the Snark etc.
Figure 1.2 – Books under Public Domain

Source: https://www.goodreads.com/shelf/show/public-domain

To know more about books under public domain, visit -


https://www.youtube.com/watch?v=RePOZ9Ny3s8
https://www.youtube.com/watch?v=g9LqIAH80k8
https://www.goodreads.com/shelf/show/public-domain

1.3.2 Music Under Public Domain

Examples of music under public domain


are:

1. A Hunting We Will Go.


2. A Tisket A Tasket.
3. ABC Tumble Down D.
4. Abdulla Bulbul Ameer.
Figure 1.3 – Music Under Public Domain

5. Abide With Me.

18
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
6. Absence Makes The Heart Grow Fonder.
7. Alphabet Song.
8. Animals Went In Two By Two.

To know more about music under public domain, visit –


https://www.youtube.com/watch?v=tPG_P6j5rOI
https://www.youtube.com/watch?v=jPQ20qiczaA
http://www.makeuseof.com/tag/exploring-world-public-domain-music-si/

1.3.3 Films Under Public Domain

Examples of films under public domain are:

1. Abraham Lincoln.
2. Africa Screams.
3. The Amazing Mr. X.
4. Angel and the Badman.
5. Bird of Paradise.
Figure 1.4 – Films
Under Public Domain

6. Combat America.
7. Conspiracy.
8. The Dance of Life.

Source: http://www.imdb.com/list/ls003915205/

1.4 Value of Public Domain


Although there is no monetary value associated with public domain work, its uses are invaluable to everyone
especially scholars, researchers, and librarians.

1. Information under public domain can be used as a building block to create or to infer new facts from
the already existing facts.
2. The new generation can get access to cultural heritage.
3. Public domain promotes nonprofit education for research, scholarship etc.
4. Public domain promotes democracy and values.
5. Social value is generated with public domain work.
6. Low-cost information is available without worrying about locating the owner and paying royalties to
use the work.
7. Societal benefits.
8. Private monopoly is removed.

To know more about values of public domain, visit –


https://www.youtube.com/watch?v=AahFLSnIBuk
https://www.youtube.com/watch?v=oODrh1ntaYU

19
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
1.5 Perpetual Copyright
Work that never comes under public domain entirely has perpetual
copyright. It means, that their copyright never lapses and gets extended.
This concept is not very common because in every country there is a limit
to when the copyright on a content will expire. In India, an author’s work
comes under public domain if the author has died in the year 1955 and
the work has been published before his death. If the work is published
after the author’s death, it will be under copyright only after 60 years
from the date of publication. Music comes under public domain after 50
to 75 years of the artist’s death. To give perpetual copyright to a content,
special rules are required.

Figure 1.5 – Perpetual Copyright

There are works where the copyright has expired but given a special exception of extending. If the work has to
be used, the person needs to pay royalties to the content owner. An example of perpetual copyright is the play,
Peter Pan.

To know more about perpetual copyright, visit –


https://www.youtube.com/watch?v=WqcjKubInBY
https://www.youtube.com/watch?v=tk862BbjWx4
http://www.insidecounsel.com/2011/11/01/contractual-right-to-a-perpetual-license-not-limit

1.6 Works Not Covered By Copyright Law


There are works that do not come under copyright law and
automatically considered under public domain. They include:

1. Ideas expressed in a manifestation of work are considered


under public domain. Example, mathematical formulae.
2. Work whose copyright has expired comes under public
domain automatically. Copyright might expire because the
author is dead for more then 60 years or has forgotten to
renew the copyright.
3. Works of the United States Government.
4. Work released without copyright notice.
5. Trademarks not under use.

Figure 1.6 – Works Not Under Copyright

To know more about public domain content, visit –


https://www.youtube.com/watch?v=wi9AfbYeDuE

20
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
https://www.youtube.com/watch?v=KFHnRie9e9c
https://publicdomainreview.org/guide-to-finding-interesting-public-domain-works-online/

1.7 Chapter Objective Checklist


S. No. SKILLS ACQUIRED YES NO
1. I know what public domain is.
2. I know what public domain mark is.
3. I can name books which are under public domain.
4. I can name music compositions which are under public domain.
5. I can name films which are under public domain.
6. I know the value and importance of public domain.
7. I know what perpetual copyright is.
8. I can name the works not covered by copyright law.
9. I know what public domain day is.
10. The links presented in the chapter are interesting and useful.
11. The information given in the chapter will help us in understanding and using
content which are under public domain.
12. I would like to explore more about public domain.

1.8 Let’s Recap


1. Public Domain – Content available to the public without any copyright law.
2. Public Domain Mark – Mark through which we can recognize that the content is under public
domain.
3. Public Domain Day – Day when the content is no longer under copyright law and comes under public
domain.
4. Perpetual Copyright – Content which will never come under public domain.
5. Withdrawn - Items which are no more in the library collection.
6. Revised Edition - Edition of a book where the content has been changed by the author/editor since the
book last published.
7. Reviews - Comments that includes analysis, evaluation, or interpretation of the content.
8. Repository - Location, usually within a library or archive, where historical records are stored.
9. Renew - Extend the loan period of a library.
10. Reference Materials - Resources that help users to get facts and information quickly.

1.9 Did You Know?


1. If there is nothing mentioned regarding copyright, the content is still the copyright of the
author!
2. If an employee is creating images, content etc. for a company, the copyrights to that
material belong to the company!
3. If a person generates an image, content etc. as a freelance assignment, the copyright is
with the person until and unless the persona has agreed to sell the same to a client!

21
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
4. You can’t copyright an idea!
5. A procedure needs to be followed for registering your images/content etc. in the Copyright Office in
the Library of Congress!
6. It is not necessary to place the copyright symbol with your name and “year created” near your
published materials - but it is always better if the symbol is there!
7. It is unacceptable to post an email as it is but illuminating facts from an email is an acceptable practice!
8. It is a copyright infringement if someone digs your picture/song/video etc. from the internet and uses
it for their own purposes!
9. Copyright law allows copyright owners to control modifications of their works!
10. If you want to use content with copyright, you need to take the permission from the owner
immediately!

1.10 References from Internet


http://whatis.techtarget.com/definition/public-domain
https://wiki.creativecommons.org/wiki/Public_domain
http://fairuse.stanford.edu/overview/public-domain/welcome/
http://www.pdinfo.com/pd-song-list/pd-song-list-best-a.php
https://en.wikipedia.org/wiki/Public_domain
http://www.unc.edu/~unclng/copy-corner34.htm

https://en.wikipedia.org/wiki/List_of_films_in_the_public_domain_in_the_United_States
https://en.wikipedia.org/wiki/Perpetual_copyright
jupiter.plymouth.edu/~rgkleinpeter/PowerPoint/3-Copyright.ppt
http://www.templetons.com/brad/copymyths.html
http://students.colum.edu/career-center/articles/10-facts-about-copyright.php
https://pothi.com/blog/2017/01/11/india-public-domain-2017-17-indian-authors-whose-works-
entered-public-domain-in-2017/
https://en.wikipedia.org/wiki/Public_domain_music

22
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 2 – Online Presence

2.1 Objectives
After going through this chapter the students should be able to:

1. Know the meaning of online presence.


2. Explain why an online presence is important in the digital world.
3. Enumerate different modes to make an online presence.
4. Create a profile on different social networking sites.
5. List the elements for a successful social media profile.
6. Start building their online presence.
7. Enhance their online presence.
8. Make use of their online presence for social causes.
9. Make use of their online presence for their professional growth.
10. Spread awareness about having an online presence.

2.2 Introduction
You must have seen that some of your friends get too many likes on
Facebook* while others get too less. There are websites which are
very famous while there are others which are hardly visited by users.
Online presence plays a big role in your or a website’s online visibility.
This is all because of online presence.
Figure 2.1 – Online Presence

Online presence is presenting oneself online and a measure of how much traffic do you attract, whether it’s your
personal brand or professional brand. Online presence can be made by website design and development,
blogging, using social media, search engines etc. Your online presence can be useful or harmful to you depending
on how you use it or how careful you are while being online.

To know more about online presence, visit –


https://www.youtube.com/watch?v=Zm6pKZQ5BLw
https://www.youtube.com/watch?v=8eRJbnltelU
https://onlinelearninginsights.wordpress.com/2012/01/16/what-is-online-presence/

*Other brands and names may be claimed as the property of others

23
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
2.3 Importance of Online Presence
If you are in a business, then having a huge friends circle alone cannot
help increasing your area of influence. It is equally important to
strengthen one’s online presence to promote their business. Some of
the advantages of having an online presence are:

1. If you have a strong online presence, you can be easily found on


social media. This increases opportunities for you. If you have a
web profile you will make a larger impact on the
recruiter/colleges/universities.
2. Having online presence helps you to market your brand.
Business having a website will have more traffic than the one
which does not have a website.
Figure 2.2 – Importance of Online Presence

3. If you are in business, your online presence makes it easier to showcase your products and services.
4. Online presence also improves your relationships with people around you.
5. With the help of online presence, you can reach a larger audience for your business.
6. You can get reviews of your business easily. Good reviews means more business and the credit again
goes to online presence.
7. Your online presence benefits your customers as well. They don’t have to face those pushy
salespersons. They can shop by doing research and comparing your product with other products
and get the best item for them.

To know more about importance of online presence, visit –


https://www.youtube.com/watch?v=709X6hkxp8k

2.4 Modes to Make Online Presence


It does not matter if you are a student, professional/business person,
online presence is important for all. Some of the ways to make your
online presence are:

1. Website – Create your website which must have vital information


about you.
2. Mobile App – If you have a business, it is always advisable to have a
mobile application for your business. The app should be easy to use.

Figure 2.3 – Making Your Online Presence

3. Social Media – Use different social media like Facebook*, LinkedIn* etc. to make your presence felt.

*Other brands and names may be claimed as the property of others

24
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
To know more about how to make online presence, visit –
https://www.youtube.com/watch?v=cwHP8pbVDfA
https://www.youtube.com/watch?v=Kf9goWSo0w0

2.5 Creating a Profile


A profile is the representation of personal data associated with a user.
It is a digital representation of a person’s identity. A person specifies
his/her characteristics in the profile.

There are no technical skills involved in creating your profile. Refer to


the following steps to create your profile on different social networking
sites.

1. You require a username, password, and email address.


2. For every social networking site, there are privacy settings.
Adjust your privacy settings so that you receive regular updates,
newsletters, notifications etc.
Figure 2.4 – Creating Your Profile

3. Add your close friends and colleagues.


4. Search for the people you want to interact with and add them to your circle. If you are a follower of
someone, join the community or group which is dedicated to him/her.

2.5.1 Elements of a Successful Social Media Profile

Every online user has a profile. Some are followed more on social
networking sites while others are followed less. You can make some
changes in your profile to make it more successful. You must
consider the following facts while creating your profile:

1. The name and username you choose to display plays a vital role
to make your online presence stronger.
2. Your profile picture reflects a lot about you and it should be
impressive enough.
Figure 2.5 – Elements of a Successful Profile

3. Small description about you plays an important role in how people perceive you and who connects
with you.
4. Your interests and background will connect you to like-minded people.
5. Your privacy settings should be such that your personal information should not be leaked. This reflects
strongly on your online presence.
6. Your website, email signature etc. strengthen your profile.

To know more about creating a successful social media profile, visit –


https://www.youtube.com/watch?v=oQXcZ5XKiXA
https://www.youtube.com/watch?v=nMm9WXZ3oMU
https://www.linkedin.com/pulse/10-elements-successful-social-media-profile-case-daniel

25
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
2.6 Start Building Your Online Presence
Building online presence includes a couple of things – recognizing your goals, opening your accounts on different
websites, creating your profiles on different social media etc. Following steps will help you to start building your
online presence.

1. You must know your short term and long term goals. At each step, you should analyze as for how your
online presence will go with your goals.
2. Have an attractive domain name.
3. Brand your email. In a survey, it has been noticed that people feel more secure dealing with companies
who have their email addresses rather than having an email address of yahoo or Gmail.
4. Get your website up and running so that people can come and know who you are, what you offer,
contact you easily, interact with you etc. Make sure that your website has clear content about you,
services you offer and how to contact you. Also, the content presented on your website should add
value to the people who will be visiting your website.
5. You must get Search engine optimization done for your website. This will help your website to come at
one of the top positions when someone will search products or services related to your business.
6. Don’t think that you cannot put something on the website until and unless it is perfect. Keep improving
and optimizing your website.
7. Have your profiles on social networking sites like Facebook*, Twitter*, LinkedIn* etc. If you are running
a business, make sure there is a facebook page for your business. Promote your profiles by having them
printed on brochures, visiting cards etc.
8. Be part of groups and communities to build relationships with people.
9. Keep track of your social media account - how many followers you have, how many people have visited
your page etc.
10. Encourage competitions on your website and prizes for the winners. Also, reward your loyal customers.
11. How you engage with your online friends, how you tag them and comment on their pictures says a lot
about you.
12. Do not be a silent spectator. Post your thoughts in a non-offensive way. Write in such a way that it
positively reflects your personality.
13. Create blogs; write articles and publish them on the internet.

To know more about building your online presence, visit –


https://www.youtube.com/watch?v=EJzpb2_mB8Y
https://www.youtube.com/watch?v=DgS_7BVS0rQ
http://alliworthington.com/business/5-smart-ways-to-build-a-strong-online-presence-the-right-way

*Other brands and names may be claimed as the property of others

26
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
2.7 Tips to Enhance Your Online Presence
Now that you have an online presence, it also has to be enhanced.
We cannot get stuck at the same point of having an online
presence with which we started. Some of the tips to enhance your
online presence are:

1. Have accounts on multiple social media.


2. Interconnect your social networking accounts, blogs,
websites. The content everywhere should be in sync with
each other.
3. Write at different places, not just your blogs. Add value to
other websites as well to gain strong online presence.
Figure 2.6 – Enhance Your Online Presence

4. Your online presence should be in sync with your profession. Do a research and find out which social
media will be best suited for you.
5. Google your name and see what information is being displayed about you. Survey reveals that
applicants have been refused a job because of the information that was displayed when their name
was googled.
6. Make sure your blog is interesting. The best blog is not the one which is beautifully designed but the
one having interesting and relevant content.
7. You have just 10 seconds to capture the attention of your readers, make sure whatever you write is
clear and interesting. Try to include bulleted list, short paragraphs, sub-headings, numbers and
symbols, formatted words (bold, underline and italics) to make it easier for the readers to read your
writing.
8. Have lots of photographs on your website. A picture says a thousand words. People will get attracted
towards the same.

To know more about enhancing your online presence, visit –


https://www.youtube.com/watch?v=l2yaWR4XXPg
https://www.youtube.com/watch?v=0GjAFYLh72E
http://www.blogclarity.com/grow-your-blog-improve-your-online-presence/

2.8 Chapter Objective Checklist


S. No. SKILLS ACQUIRED YES NO
1. I know what online presence is.
2. I know why an online presence is important in the digital world.
3. I know the different modes of making an online presence.
4. I can create a profile on different social networking sites.
5. I know the elements for a successful social media profile.
6. I can build and enhance my online presence.
7. I can make use of my online presence for a social cause.

27
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
8. I can make use of my online presence for my professional growth.
9. I can spread awareness about online presence.
10. The links presented in the chapter are interesting and useful.
11. The information given in the chapter will help us in making our online presence.
12. I would like to explore more about online presence.

2.9 Let’s Recap


1. Online Presence – Presenting oneself online.
2. Profile - Pictorial and textual representation of personal data associated with a user.
3. Avatar – An image or username by which a person is represented online.
4. Bio - Introductory text that explains who the user is.
5. Blog - Content updated regularly on a specific topic, descriptions of events, graphics, videos etc.
6. Comment - Answer given by a user on a blog post or message on a social networking site.
7. Engagement Rate - Social media metric describing the amount of interaction, likes, shares, comments
etc, that a piece of content receives.
8. Forums - Online discussion site.
9. Google+ - Google's social network.
10. Klout - Measure of social influence.

*Other brands and names may be claimed as the property of others

2.10 Did You Know?


1. People, when online, spend one out of every seven minutes on Facebook*!
2. Every day, approximately 340 million tweets are sent!
3. Most female users use Pinterest* as the social networking site while most of the male
users use Google+*!
4. Every day around 300 million pictures are uploaded to Facebook* via Instagram*!
5. 61% of LinkedIn* members consider it as their primary professional networking site!
6. There are more devices connected to the internet in comparison to the people on Earth!
7. 40% people socialize more online than they do face-to-face!
8. There are 1 billion facebook users out of which 552 million are daily active users!
9. Approximately 50% of smartphones connect to facebook every hour!
10. Approximately 80% of google+ users log in to their account at least once a week!

*Other brands and names may be claimed as the property of others

2.11 References from Internet


https://www.quora.com/Why-is-it-important-to-have-a-personal-online-presence
https://en.wikipedia.org/wiki/Online_presence_management
http://thinkchrysalis.com/blog/why-does-your-business-need-an-online-presence/
http://smallbusiness.chron.com/reasons-small-business-needs-online-presence-
27742.html
http://www.eofire.com/7-ways-to-build-your-online-presence/

28
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
http://www.business2community.com/online-marketing/how-to-build-a-strong-online-presence-for-
your-business-part-5-01262688#7VSEJPqzSuYFmAr3.97
http://socialmouths.com/2012/11/23/7-ways-to-build-a-strong-online-presence-through-social-media/
https://www.verisign.com/en_IN/website-presence/online/online-presence/index.xhtml
http://www.blueskyresumes.com/free-resume-help/article/how-to-quickly-build-your-online-
presence/
https://collegepuzzle.stanford.edu/?p=4516

29
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 3 – Social Media

3.1 Objectives
After going through this chapter the students should be able to:

1. Understand what social media is.


2. Know about various social media tools available today.
3. Explain the importance of social media in education.
4. Understand how to use social media.
5. Explain the advantages of using social media in education.
6. Infer the risks while using social media.
7. Understand various strategies to protect themselves online.

3.2 Introduction
Social media are online tools that allow people, companies, and other
organizations, to create, share, or exchange information, ideas, and/or
pictures/videos in communities and networks. Within the learning process,
it can be used to support and enhance learning.

Social Media, with their possibilities to communicate, reflect and


collaborate, provide means of supporting informal learning through e-
learning and technology-based learning.

Figure 3.1 – Social Media

To know more about social media, visit –


https://www.youtube.com/watch?v=yzTNein5Ios

3.3 Application of Social Media


Social media is a collaborative and sharing platform. This is the very reason social media
has been catapulted to enjoy the position it does today, be it in social engagement,
politics, economics, cultural exchange and education. It comes in as handy tool for
building an opinion, spreading information/awareness etc.

30
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
3.3.1 Social Media in Education

Teachers can use this interactive medium to its full advantage by


disseminating the required information to their students or other
faculty members. Social media, has made it easy for everyone to
collaborate with others from different countries. Not only teachers
but other users can also go ahead and form interest groups on social
media platforms. This can help them greatly in their professional
development.

Figure 3.2 – Social Media and Teaching

The following strategies can help teachers build a passionate online community of learners:

1. Be a role model.
2. Create pages/groups.
3. Establish online guidelines.
4. Use Twitter* innovatively.
5. Use Skype*/Google Hangout* for guest speakers.
6. Get ideas from your peers.

To know more about social media in education, visit –


https://www.youtube.com/watch?v=UGyCUI7H0TY

*Other brands and names may be claimed as the property of others


3.3.2 Social Media in Learning

The reason why social media is so popular is that it allows people to


personalize the way they experience and interact with the Web. Platforms like
Facebook*, Twitter* etc were earlier almost exclusively used to take a break
from academics, but they are now increasingly being leveraged as a study
tool, especially for the new tech-savvy generation.

Figure 3.3 – Learning Tools

Following can be some of the ways to leverage social media as a learning tool:

1. Create a community.
2. Continued Collaboration.
3. Organize learning resources.
4. Supplement course materials.

To know more about social media in learning, visit –


https://www.youtube.com/watch?v=rnW0ethueSo
Figure 3.4 – More Learning Tools

31
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
3.4 Social Media Tools/Apps
1. Facebook* is the largest and the most popular social network around the
world. It has 1.59 billion active users [Wikipedia], as on December 31, 2015.
2. Facebook* can be used to create groups, create discussion boards, debate
and post individual views on a topic of interest.
3. Students across geographic locations share and participate in meaningful
knowledge exchange.

To know more about Facebook, visit –


https://www.youtube.com/watch?v=c0ydZwVxb9U

*Other brands and names may be claimed as the property of others

1. Twitter* is a microblogging website. The word limit for a single post (called
tweet) is 140 characters.
2. After registering on twitter you will get a unique username. The username is
also called ‘handle’. Any user can be tagged in a post by typing ‘@’ followed
by his username.
3. Twitter is different from other social media platforms because there are no
‘friends’ on twitter.
4. You can follow members on twitter and vice versa.
5. In your newsfeed, you get all the tweets of the people you follow.

To know more about Twitter, visit –


https://www.youtube.com/watch?v=hB9a4-usOOI

*Other brands and names may be claimed as the property of others

1. LinkedIn* is a platform generally used for professional networking.


2. It can be of great help in fulfilling the professional aspirations of students.
3. Students can search for the field and the organizations that interest them
and they wish to work for.
4. Users can follow leaders in different fields/corporates and get updates
from them.
5. Users can follow companies and get to know if they have a vacancy and what are the skills that companies
require in a candidate.

To know more about Linked in, visit –


https://www.youtube.com/watch?v=ZVlUwwgOfKw

*Other brands and names may be claimed as the property of others

32
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
1.
Yammer* is a Microsoft offering which comes with Office365. Yammer offers
a socializing platform for organizations who take an Office365 subscription.
2. It is a closed community in which you can log in using your official email ID
only.
3. You can share files easily, create polls and interest based groups/teams
within a larger organization.
4. You need a Microsoft ID to login to Office365.

To know more about yammer, visit –


https://www.youtube.com/watch?v=Pbv8s09wlxI

*Other brands and names may be claimed as the property of others

1. Instagram* is an image and short video sharing platform.


2. A very good platform to showcase your photography skills to the world.
3. You can follow people and vice versa. In your newsfeed, you will get the posts
of the people you follow.
4. It also offers photo editing and video editing capabilities.
5. Your profile on Instagram can be either a private or a public profile.

To know more about instagram, visit –


https://www.youtube.com/watch?v=N92MQ9o4Fe0

*Other brands and names may be claimed as the property of others

1. Pinterest* is a free website but you need to register to use it.


2. Users can upload, save, manage images/videos and other media content through
collections called pinboards.
3. Pinterest can be considered a personalized media platform. Users can browse the
content of others in their feed, save individual pins on their board using "Pin It"
button. Pinboards are organized by a central topic or theme.
4. Users have the facility to pin items, create boards, and send a pin to other Pinterest
users and email accounts.

To know more about pinterest, visit


https://www.youtube.com/watch?v=_Nd46YgXJH0
https://www.youtube.com/watch?v=kbqmVhq6oEk

*Other brands and names may be claimed as the property of others

33
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
1. Quora* is basically a Q&A platform.
2. Users can post their queries on any subject and get answers from anyone.
3. Subject experts are available on Quora to answer your queries almost on every
topic.
4. It is a knowledge enhancing platform which can be extensively used by students
to enhance their subject knowledge.

To know more about quora, visit –


https://www.youtube.com/watch?v=W9tIgfCN6F0

*Other brands and names may be claimed as the property of others

1. Skype* enables users to communicate across the globe.


2. People can use Skype* to make free video and voice calls to a person or group.
3. People can send instant messages and share files with other people on Skype.
4. Skype can be downloaded free of cost and is easy to use.

To know more about skype, visit –


https://www.youtube.com/watch?v=u6oEEp7Ny7o

*Other brands and names may be claimed as the property of others

3.5 Social Media Warnings


1. Never cyberbully.
2. Do not perform illegal activities.
3. Never post objectionable contents.
4. Never post confidential information.
5. Never lie/cheat/plagiarize.
6. Never ignore school-specific policies.
7. Never share your personal information.

3.6 Chapter Objective Checklist


S. No. SKILLS ACQUIRED YES NO
1. I have understood what is social media and its importance in education.
2. I can explain the various tools available in social media.
3. The videos included in the book are truly relevant and up to date.
4. I can create an account on Facebook*, LinkedIn* or Google*.
5. I understand the risks of social networking sites.
6. I am able to send files using social media (Skype*/Google*).
7. I can upload/download information from Youtube*.

34
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
8. I can write a mail using Gmail*.
9. I can make a video call using Skype*.

3.7 Let’s Recap


1. Social Media - Computer-mediated online tools for social networking.
2. Facebook – The largest social networking site for people to share their updates.
3. LinkedIn - Professional networking platform that offers job options as well.
4. Quora - Platform for posting questions and getting answers on any topic.
5. Google - Search engine, chat, communication software.
6. Pinterest – Platform where users can upload, save, sort, and manage images and videos known as pins.
7. Skype - Software that enables conversations over the internet.
8. Twitter - Microblogging website.
9. Yammer – Platform to share files easily, create polls and interest based groups/teams within a larger
organization.
10. Youtube - Place where you can upload/download videos on any topic.

3.8 Did You Know?


1. In comparison to men, women use social media more!
2. Friday is the best day for engagement on Facebook*!
3. On Pinterest*, the most popular category is ‘Food and Drink’!
4. As compared to any cable network, YouTube* has greater reach for the age group 18-49!
5. Mobile is used by approximately 88% of Twitter* users!
6. It takes three minutes for you to read a blog post and 300 hours of video will be uploaded
to YouTube at the same time!
7. It took radio 38 years to reach 50 million users; while Facebook* added over 200 million users in less
than a year!
8. 74% of consumers trust social media while purchasing an item!
9. Selfie is the most retweeted tweet till date!
10. Google* will spell out the number which you enter in the search bar!

*Other brands and names may be claimed as the property of others

3.9 References from Internet


www.neotericuk.co.uk
http://60secondmarketer.com/blog/2014/11/16/50-facts-about-social-media/
www.wordstream.com/blog/ws/2015/11/13/social-media-facts
www.postplanner.com/crazy-social-media-facts-that-are-actually-true/H
www.quora.com
www.skype.com
www.facebook.com
www.microsoft.com
www.google.com

35
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 4 – Digital Footprint

4.1 Objectives
After going through this chapter the students should be able to:

1. Understand the meaning of digital footprint.


2. Explain the various components of digital footprint.
3. Explain the difference between an active and a passive footprint.
4. Understand various digital footprint patterns.
5. Understand how to create a positive digital footprint.
6. Discuss the evolution of digital footprints.
7. Know about the dos and don’ts of digital footprint.

4.2 Introduction
On the Internet, a digital footprint is the traces or "footprints" that people leave online.
The footprints are left while using e-mails and attachments, uploading videos or digital
images etc.
Source: - Webopedia

To know more about digital footprint, visit –


https://www.youtube.com/watch?v=6TUMHplBveo
Figure 4.1 – Digital Footprint

4.3 Types of Digit Footprints


Digital footprints can be classified into two main categories:

1. A passive digital footprint is created when data is collected without the owner
knowing about it.
2. An active digital footprint is created when users deliberately leave their personal
data in order to share their information through websites or social media.

To know more about types of digital footprints, visit –


https://www.emaze.com/@AOIOFZZZ/Digital-Footprint

36
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
4.4 What is in Your Digital Footprints
Following are important elements of your digital footprint:

1. Your personal information like your name, address, phone number, birthday etc.
2. Your uploads which include texts, photos etc., sites you have visited, things you say and things others
say about you online.
3. Your digital trail is the data collected about you using your TV, telephone, cell phone, internet etc.
Companies often use this data for marketing purposes. It is not necessary that your digital footprint is
always visible to you.

To know more about your digital footprint, visit –


https://www.youtube.com/watch?v=uwY6KsipuJQ

4.5 How to Create a Positive Digital Footprint

Figure 4.2 –create a positive digital footprint

Do you know that your digital footprint is nothing but actually an online version of you! It might just be the only
description someone has of you.

Here are some handy tips you can use to make sure that your online information leaves a positive impression.

1. Set a google alert or Google yourself on the internet. This enables you to know if someone has posted
something using your name.
2. If any of your friend or family member is graduating this year, he/she should create a LinkedIn* account.
3. To limit who has the access to your profile, apply privacy settings on your computer.
4. You must remember that digital content can be easily accessed and changed.
5. Expand your online network. Connect online to a maximum number of people but make sure you know
them in person.

To know more about creating a positive digital footprint, visit –


https://www.youtube.com/watch?v=DwFE25f50P4

37
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
4.6 Manage Your Digital Footprints
1. Protect your personal data: Do not reveal your personal information
like your address, phone number, passwords, bank card numbers etc.
Try not using your real name, use a nickname instead.
2. Keep login info under lock and key: Your usernames and passwords
should not be shared with anyone.
3. Think before you post: Once something is posted, it is difficult to
remove it.
4. Google yourself: Search for your name every few months on google so
that you are aware of the online information about you.
5. Scale back on social media: Use only those many social networking
sites that you can handle. Delete accounts that you do not use very
often. Keep your profiles updated on the social networking sites where
you have a good online presence.
Figure 4.3 Managing your footprint

To know more about managing your digital footprints, visit -


https://www.youtube.com/watch?v=8RLja-xY4mg

4.7 Chapter Objective Checklist


S. No. SKILLS ACQUIRED YES NO
1. I understand what digital footprints is.
2. I know about various components of a digital footprint.
3. I can explain the difference between an active and passive footprint.
4. I understand various digital footprint patterns.
5. I know how to create a positive digital footprint.
6. I can discuss the evolution of digital footprints.
7. I understand the Do’s and don’ts of digital footprint.
8. The videos included in the book are truly relevant and up to date.

4.8 Let’s Recap


1. Digital footprints - Everything on the internet about you.
2. Active Digital footprint – When a user deliberately release his/her personal data.
3. Passive Digital footprint – When data is collected about a person without his
permission.
4. Social Networking Media – Online communications channels which enhance community-based input,
interaction, content sharing, collaboration etc.
5. Internet – Another name for a world-wide communication network of computers.
6. Identity theft – Using another person's personal information to obtain credit, loans, etc.
7. Cookies - Data sent from a website and stored in the user's web browser while the user is online.
8. Privacy Policy – A legal document defining how a website gathers and uses your personal information.

38
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
4.9 Did You Know?
1. It is advisable to have a positive digital footprint because everything you do online will never
be deleted!
2. Everything you do online is stored on a server at a different location from where you are
browsing the internet!
3. How hard you may try, your digital footprints will never be erased!
4. According to a survey, 500 of the top colleges look at senior students’ Facebook*, Twitter*,
and MySpace* before giving admission to them!
5. Any online comment about you becomes a part of your digital footprint!
6. One may lose an opportunity due to indecent pictures or posts online, no matter how specialized he/she
may be!
7. Approximately 33% of all colleges look at your digital footprint before giving admission to you!
8. 63% of hiring managers do not hire an applicant because there is something questionable about the
person on a social networking site (Cowell, 2010)!
9. In 2009, 45% of all hiring managers used search engines to research digital footprint of potential
applicants – gone up from 26% in the year 2015 (Cowell, 2010)!

4.10 References from Internet


http://www.webopedia.com/TERM/D/digital_footprint.html
https://en.wikipedia.org/wiki/Digital_footprint
https://www.emaze.com/@AOIOFZZZ/Digital-Footprint
http://digitalfootprintimu.weebly.com/follow-your-footprint.html

39
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Digital Commerce

40
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 5 – Digital Commerce

5.1 Objectives
After going through this chapter the students should be able to:

1. Explain what digital commerce is.


2. Differentiate between digital commerce and traditional commerce.
3. Know the different types of digital commerce with examples.
4. List the advantages and disadvantages of digital commerce.
5. Speak on electronic payment.
6. List the advantages of electronic payment.
7. Explain the concept of e-banking.
8. Explain online publishing.
9. Purchase books using digital commerce.
10. Look for their favourite online books and read them.

5.2 Introduction
Digital Commerce is doing business on the internet –
buying products, selling products, transferring money
from one account to another and so on.

Today, everything is sold and bought via digital


commerce – shoes, books, music system, clothes,
electronic items, home appliances etc. You can have
anything at your doorstep.

Figure 5.1 – Digital Commerce

To know more about digital commerce, visit –


https://www.youtube.com/watch?v=nZIYeBnspe8
https://www.youtube.com/watch?v=AhgtoQIfuQ4
https://www.youtube.com/watch?v=QdfKXejiQdM

5.3 Concept
The difference between Digital Commerce and Traditional Commerce:

41
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
DIGITAL COMMERCE TRADITIONAL COMMERCE
1. Internet usage is there. Done through telephone or face to face.
2. The process is automated. The process is manual.
3. Marketing, advertising, customer
support – everything is at one place.

To know more about concept of digital commerce, visit


http://accountlearning.com/14-differences-between-e-commerce-and-traditional-commerce/
https://www.youtube.com/watch?v=vhSIAg6b9BU
https://www.youtube.com/watch?v=GW8gWZZsLZI

5.3.1 Different Types of Digital Commerce

Different types of digital commerce are:

1. B2B (Business to Business) – Business between two companies, that is, when
one company sells its product to another company.
Figure 5.2 – B2B Interaction

2. B2C (Business to Consumer) – When a company sells its products to the customers or the actual users.
There is no human interaction.
3. C2B (Consumer to Business) – Consumer posts a project on the internet with his budget. The
companies submit their proposal in terms of money and the consumer chooses the company to whom
he wants to sell the product.
4. C2C (Consumer to Consumer) – A consumer posts an ad on the internet, another consumer reads the
ad and can purchase the product.

To know more about different types of digital commerce, visit -


https://www.youtube.com/watch?v=0eXJ8WzNytU
https://www.youtube.com/watch?v=FAyit_s9eY0
http://bloomidea.com/en/blog/types-e-commerce
https://www.youtube.com/watch?v=QToCdwIhkb4

5.4 Advantages and Disadvantages of Digital Commerce


Advantages of digital commerce are:

1. Organizations can enter domestic as well as international market.


2. It’s easier for the organizations to locate their customers.
3. Investment is less.
4. Consumers get 24 x 7 customer support.
Figure 5.3 – Advantages of
Digital Commerce

5. The productivity of the organizations is increased as paperwork is reduced drastically.

42
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
6. Consumers have the option to compare the price of the product from different companies and can
choose the best option.
7. The consumer can see what other customers are buying and can see the review of the product that he
wants to buy.
8. The consumer does not have to travel to the shop so less traffic on road.
9. Since the cost of the products is reduced, the investment is low, more people have the pocket to buy the
products.

Disadvantages of digital commerce are:

1. No guarantee of product quality.


2. Due to dependency on technology, there can be unpredictable delays.
3. There is no consumer to company interaction; the consumer is not loyal to any particular company.
4. The consumer cannot try the product before buying it.
5. Payment might not be secure due to the presence of hackers.

To know more about advantags and disadvantages of digital commerce, visit –


https://www.youtube.com/watch?v=A9Op2KZCb88
https://www.youtube.com/watch?v=vmQ8nM7b6XQ
https://www.youtube.com/watch?v=iYjd2ok-ewQ
https://www.youtube.com/watch?v=LAxs8BsJPDE

5.4.1 What is Electronic Payment System? Why is it Important?

Electronic payment refers to making payment online. When the buyer


buys a product, pays online and the seller receives the payment in his
account online, it is called electronic payment system. The payment is
done through credit card, debit card, online money transfer through
one’s bank, electronic cheques or digital cash.

Figure 5.4 – Electronic Payment

Advantages of electronic payment are:

1. Transfer of money happens in a few minutes and is time-saving.


2. History of payment is maintained online and the consumer can check the same anytime.
3. Digital wallet cannot be robbed.
4. In case of glitches in payment, there is 24 x 7 customer support to tackle discrepancies.
5. Transactions can happen anytime so it is very convenient.

To know more about electronic payment system, visit –


https://www.youtube.com/watch?v=I3RWfRrmxDw
https://www.youtube.com/watch?v=gG5kLlfZcik

43
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
5.4.2 What is E-Banking?

E-banking is a system where a consumer can do his financial transactions using the
internet. The consumer is provided with a username and password to access his/her
account online. The consumer can check his/her account balance, see the list of
transactions, make bill payments and transfer money to another account. The
consumer can also download a copy of bank statement.
Figure 5.5 – e-banking

with some banks, the consumer can also request for cheque book, report loss of card, stopy payment on a
cheque, request for change of address or telephone number etc.

Major advantage of e-banking is that transactions can be done 24 x 7. Customer support for banks is also available
24 x 7 in case the consumer has any query.

To know more about e-banking, visit –


https://www.youtube.com/watch?v=oADxUX4STjE
https://www.youtube.com/watch?v=dXHP3qYS-dw
http://www.encyclopedia.com/doc/1G2-3401200518.html

5.4.3 What is Online Publishing?

Online publishing refers to putting content on the internet. Today


everything is published on internet – books, news, journals,
research papers etc. Students attempt online mock tests to prepare
for exams.

Online publishing differs from traditional publishing in two major


ways:

1. Printer is not required to print the final product.


2. No dedicated resource required to distribute the product.
Figure 5.6 – Online Publishing

To know more about oneline publishing, visit –


http://writing.colostate.edu/guides/page.cfm?pageid=803&guideid=37
https://www.youtube.com/watch?v=dwCv0727hbY
https://www.youtube.com/watch?v=Y7-LG0EUyR0

5.5 Chapter Objective Checklist


S. No. SKILLS ACQUIRED YES NO
1. I know what digital commerce is.
2. I can differentiate between digital commerce and traditional commerce.
3. I know the different kinds of digital commerce.
4. I can tell the advantages and disadvantages of digital commerce.

44
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
5. I know what electronic payment is.
6. I can tell the advantages of electronic payment.
7. I know what e-banking is.
8. I know what online publishing is.
9. The links presented in the chapter are interesting and useful.
10. The information given in the chapter will help us use digital commerce.
11. I would like to explore more about digital commerce.

5.6 Let’s Recap


1. Digital Commerce - Buying and selling products online.
2. B2B Digital Commerce - One company selling its products to other companies.
3. B2C Digital Commerce - Company selling its products to customers.
4. C2B Digital Commerce - Customer selling his/her products to companies.
5. C2C Digital Commerce - Customer selling his/her products to other customers.
6. Electronic Payment - Making payments online.
7. E-Banking - Doing financial transactions online.
8. Online Publishing - Putting content on the internet.
9. Chargeback – Payment given by credit/debit card and the transaction is reversed.
10. Discount Code - A series of numbers or letters that online shoppers enter at checkout so that they can
avail special offers or discounts.

5.7 Did You Know?


1. 81% of shoppers research their product online before purchasing!
2. On an average, an online shopper visits 3 websites before buying the product!
3. It is predicted that retail sales from online shopping will grow to $370 billion in 2017!
4. Mobile e-commerce has increased by 35% in the first quarter of 2014, compared to the
previous year. This includes shopping done on both mobile phones (8.2% of total) and
tablets (10.3% of total)!
5. Mobile Phone add to cart and conversion rates are much lower as compared to desktop computers!
6. More visitors abandon their shopping cart because free shipping is not offered!
7. 51% of people do not buy a product online as they do not feel comfortable entering their credit/debit
card details!
8. Conversion rate depends on the device that the user uses. In the fourth quarter of 2013, conversion
rate for desktop is 3.11%, tablet is 2.59% and smartphone is 1.01%!
9. Most of the online shoppers are in the age group 18 to 34 years!
10. 95% percent of tablet users and 72% of smartphone users buy things online at home!

45
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
5.8 References from Internet
https://www.techopedia.com/definition/23336/digital-commerce-d-commerce
http://www.engr.sjsu.edu/gaojerry/course/cmpe296z/introduction.pdf
https://electorniccommerce.wordpress.com/what-forces-are-fueling-e-
commerce/
http://www.simplynotes.in/mbabba/factors-affecting-e-commerce-key-drivers-of-
e-commerce-forces-fueling-e-commerce/
http://www.omicsonline.org/blog/2015/04/25/10359-What-forces-are-fueling-
ecommerce.html
http://www.tutorialspoint.com/e_commerce/e_commerce_advantages.htm
http://www.esalestrack.com/blog/2008/09/advantages-and-disadvantages-of.html
https://unichange.me/articles/advantages_of_electronic_payment_systems
https://en.wikipedia.org/wiki/Online_banking
https://en.wikipedia.org/wiki/Electronic_publishing

46
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Digital Communication

47
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 6 – Digital Communication

6.1 Objectives
After going through this chapter the students should be able to:

1. Define digital communication.


2. Identify different modes used for digital communication.
3. List the advantages and disadvantages of digital communication.
4. Infer how to use digital communication wisely.
5. List the do’s and don’ts of digital communication.
6. Use all kinds of digital communication.
7. Use email communication for formal use.
8. Participate actively on different networking sites.
9. Utilize the information available on different social networking sites.
10. Guide their siblings about do’s and don’ts of digital communication.

6.2 Introduction
Communicating with others using digital media like email,
instant messaging etc. is called Digital Communication.
Earlier, communication happened only through letters,
phones etc. but now we have various modes of
communication and they connect us faster.

Virtual trips are also available for us to see those places


which we have never visited or never plan to visit. We can
also learn about other cultures with the help of digital
communication.
Figure 6.1 – Digital Communication

To know more about digital communication, visit –


https://www.youtube.com/watch?v=7suEFhViOC8

48
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
6.3 Different Types of Digital Communication
We have the following modes of digital communication:

1. E-mail - Messages sent by a user through electronic


means from one computer to one or more recipients.
2. Mobile Phones – A wireless handheld device that allows
users to make calls and send text messages to another
user.
3. Video Conferencing - Live, visual connection between
two or more people at different locations for the
purpose of communication. For example, video calls
using Skype*, Viber* etc.
Figure 6.2 – Modes of Digital Communication

4. Instant Messaging - Exchange of text messages in real-time using a software application.


5. Text Messaging – Sending a message using a mobile phone.
6. Blogs - Personal online journal updated by the owner and is for general public use.
7. Wikis - Website or database developed collaboratively by users who are allowed to add and edit
content.
8. Sexting - Sending of sexually explicit photos, images, text messages, e-mails etc. with the help of a
mobile device.

To know more about different types of digital communication, visit -


https://www.youtube.com/watch?v=4lZPP8ePJbU
https://www.youtube.com/watch?v=jGLyeWQ3YVI
https://www.youtube.com/watch?v=olw92stetY8

*Other brands and names may be claimed as the property of others

6.4 Advantages and Disadvantages of Digital Communication


Advantages of digital communication are:

1. Faster and easier.


2. No paper wastage.
3. Messages are stored safely and can be accessed from anywhere.
4. People sitting at two different locations can communicate with each other.
5. Less expensive.
Figure 6.3 – Advantages of
Digital Communication

6. Stored data can be converted to any language in a very less time with the help of different software.
7. Phone – Discussion of ideas for a long time is feasible with less communication gap. Also, it is more
personal.

49
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
8. Email – Conversations are documented for later use. It is also easier to send files to one or more people.
It is the most common and most used form of business communication.
9. Instant Messaging – It can be seen when the other person is available and if you can get an immediate
response or not.

Digital communication has some disadvantages as well which are:

1. There is a dependency on technology.


2. It is faster but has a darker side. People send messages when they are feeling emotional and it might
be possible that it’s not the best time to send the message.
3. Rather than meeting people face to face, we tend to send emails or talk on the phone which might
imbalance our emotional account with the other person.
4. The environment is getting hampered. Vibes sent by the towers can kill small birds.
5. Personal life is getting compromised. To achieve more success, people bring their office work home
and have no time to relax.
6. It is being misused and introduced cybercrimes.
7. Phone – There is no record of the communication. There can also be communication gap due to
distortions in phone lines.
8. Email – There are unnecessary emails cluttering inboxes unnecessarily.

To know more about advantages and disadvantages of digital communication, visit –


https://www.youtube.com/watch?v=6eAXoF_hHkA
https://www.youtube.com/watch?v=qffuGmD8zco
http://shireen-allawati.weebly.com/advantages--disadvantages.html

6.5 Do’s and Don’ts of Digital Communication


Do’s:

1. Use blogs to publish your work.


2. Use emails as a means of communication to keep a record. Telephonic conversations should also be
backed up by emails.
3. Use ‘safe’ sites.
4. Be aware of the consequences of misusing digital communication.
5. Communicate at proper times, that is, when you are not in the classroom etc.

Don’ts:

1. Do not share your personal information.


2. Do not make strangers your online friends.
3. Do not chat or share your personal information with any stranger.
4. Do not use abusive, obscene language. Everything you post has a record. Even if you delete something,
there is a digital record of the same.

To know more about do’s and don’ts of digital communication, visit –


https://www.youtube.com/watch?v=I47ltgfkkik
https://www.youtube.com/watch?v=lLT2zu_u_8w

50
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
6.6 Chapter Objective Checklist
S. No. SKILLS ACQUIRED YES NO
1. I know what digital communication is.
2. I can tell the different modes used for digital communication.
3. I know the advantages and disadvantages of digital communication.
4. I will use digital communication wisely.
5. I know the do’s and don’ts of digital communication.
6. I can use almost all modes of digital communication.
7. I can send formal emails.
8. I am an active participant on different social networking sites.
9. I know which information to be used from social networking sites.
10. I can train people on how to use digital communication effectively.
11. The information given in the chapter will help us using digital communication.
12. I would like to explore more about digital communication.

6.7 Let’s Recap


1. Digital Communication – Communicating with others using digital media.
2. Email - Messages sent by a user through electronic means from one computer to one or more
recipients.
3. Mobile Phone – A wireless handheld device that allows users to make calls and send text messages to
another user.
4. Video Conferencing - Live, visual connection between two or more people at different locations for the
purpose of communication. For example, video calls using Skype*, Viber* etc.
5. Instant Messaging - Exchange of text messages in real-time using a software application.
6. Text Messaging - Sending a message using a mobile phone.
7. Blogs - Personal online journal updated by the owner and is for general public use.
8. Wikis - Website or database developed collaboratively by users who are allowed to add and edit content.
9. Chat – Interactive online communication between two or more people.
10. Email Bounce - E-mail not delivered to the recipient mailbox and is sent back to the sender.

6.8 Did You Know?


1. The company with the largest network of translators in the world is Google*!
2. A person reports a lost wallet in approximately 26 and which reports a lost phone in just 68
minutes!
3. There are approximately 6.8 billion people on the planet out of which 5.1 billion own a cell
phone, while only 4.2 billion own a toothbrush!
4. An average person responds to an email in approximately 90 minutes while an average
person responds to a text message in approximately 90 seconds!
5. Mobile coupons get redeemed 10 times more as compared to traditional coupons!
6. We have more mobile phones on the planet as compared to TVs!

51
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
7. In 1971, the first email was sent with “@” symbol and was sent by Ray Tomlinson. “@” symbolizes that
the message was sent to a person and not to a machine!
8. The first spam message was sent to 600 recipients in 1978 by DEC System 2020!
9. First free email service was started with Hotmail in 1996!
10. Approximately 70% of bloggers talk about brands on their blogs while 38% of bloggers post brand or
product updates/reviews!

*Other brands and names may be claimed as the property of others

6.9 References from Internet


http://becomingadigitalcitizen.weebly.com/digital-communication.html
https://sites.google.com/a/aea11.k12.ia.us/heartland-digital-
citizenship/communication
http://www.dictionary.com/browse/sexting
https://en.wikipedia.org/wiki/Wiki
http://searchwindevelopment.techtarget.com/definition/blog
http://searchunifiedcommunications.techtarget.com/definition/instant-messaging
https://in.answers.yahoo.com/question/index?qid=20071224070526AAztBBc
http://realbusiness.co.uk/article/33872-advantages-and-disadvantages-of-digital-communications-in-
the-workplace
https://sites.google.com/site/digitalcitizenshipdferris/digital-communication
https://cunedigitalcitizenship.wikispaces.com/Digital+Communication

52
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Digital Literacy

53
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 7 – Digital Search

7.1 Objectives
After going through this chapter the students should be able to:

1. Understand the meaning of digital search.


2. Know about various search engines.
3. Understand how a search engine works.
4. Identify appropriate search terminologies and query guide.
5. Understand effective search strategies.

7.2 Introduction

Are you researching a topic for a school paper or project? Do you need
health information? Do you want to buy a car, a computer, a book, book
a vacation etc.?

What do you do if you have to search something on the Internet?


Online search is searching and retrieving information interactively using
a computer/device.

To know more about digital search, please visit –


https://www.youtube.com/watch?v=BNHR6IQJGZs
Figure 7.1 – Digital Search

7.3 Search Engines

For any online search, you need a special program called search
engine which is basically a software designed to search for
information on the World Wide Web. It is essentially an intricate
combination of computers, software, and math. Few examples
of search engines are:
1. www.google.co.in
2. www.Bing.com
3. www.Ask.com
Figure 7.2 – Search Engine 4. www.msn.com
5. www.yahoo.co.in

To know more about search engines, please visit – https://www.youtube.com/watch?v=_EPcAp93T48

54
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
7.4 How a Search Engine Works
Do you know how search engines work?

Search engines are constantly building and updating their index on the
world wide web. Search engines use “spiders” that “crawl” the web and
fetch the required results. The words used in these web pages are
added to build an index which displays on the user screen.

When someone searches say for “pest control services” the search
engine already has a list of web pages that refer to “pest control
services”. The only thing left is to sort the web pages in order of
relevance. A number of key factors are taken into consideration for
doing this.
Figure 7.3 – Working of search engine

There are three basic stages for a search engine to work, that is,

1. Crawling, where content is discovered.


2. Indexing, where the content is analyzed and stored in databases.
3. Retrieval, where a user searches for content and list of relevant pages are fetched.

Instrested to know about how search engine works? Please visit –


https://www.youtube.com/watch?v=KyCYyoGusqs

7.5 Effective Search Strategies


So… are you ready for your online search on the web?

Here are few search strategies that can be very useful while searching the
web effectively.

1. Use Quote (“ ”) operator in your search.


2. Use operative Keywords like +, _.
3. Use Boolean operators like “NOT”, “AND” and “OR” while searching
your query.

Figure 7.4 –Effective Search

To know more about this, please visit –


https://www.youtube.com/watch?v=LTJygQwYV84
https://www.youtube.com/watch?v=uqxbZkBlhqo

55
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
7.6 Tips for Effective Search
Looking for an information on the web? It’s time to Learn a few
tips and tricks to help you easily find information on Google.

1. Start with the basics: Start with a simple string to search


for, for example, you can search for where is the closest
airport? It is ok to add a few descriptive words.
2. Search using your voice: Tired of typing? To search by
voice, say "Ok Google" or select the Microphone . . Learn
more about how to search by voice.
Figure 7.5 Tips for effective search

3. Choose words carefully: When you're searching for information online, search for words that are likely to
appear on the site you're looking for. For example, instead of saying my head hurts, say headache, because
this word would likely to be available on a medical website.
4. Don’t worry about the little things:
a. Spelling: Google's spell checker automatically corrects common spelling mistakes.
b. Capitalization: You can search either for ‘New York Times’ or ‘new york times’. Both will fetch
the same results.
5. Find quick answers: For many searches, Google displays an answer to your question in the search results.
Some features, like information on sports teams, are not available for all locations.
a. Weather: Search weather to see the weather in your location or add a city name, like weather
Mumbai, to find weather for a certain place.
b. Dictionary: Put the word ‘define’ in front of any word to see its definition. Eg, to know the
definition of ‘discipline’, you can search for ‘define discipline’.
c. Calculations: Enter a math equation like 3*9123, or complex mathematical equations
including graphs.
d. Unit conversions: Enter a conversion, like 3 dollars in euros.
e. Sports: Search for the name of a team to see a schedule, game scores and more.
f. Quick facts: Search for the name of a celebrity, location, movie, song etc. to find information
related to the topic.

To know more about effective search, please visit –


https://www.youtube.com/watch?v=rfGzBGDKOM8

7.7 Chapter Objective Checklist


S.NO. SKILLS ACQUIRED YES NO
1. I understand the meaning of digital search.
2. I have information on various search engines available today.
3. I have understood the working of search engines.
4. I know what is Search engine optimization and its methods.
5. I can now explain what effective search strategies are.
6. I understand useful tips for effective searching.
7. The videos included in the book are truly relevant and up to date.

56
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
7.8 Let’s Recap
1. Digital Search – Searching using an electronic medium.
2. Search Engine – A special program that helps you find information on the web.
3. SEO – Search Engine Optimisation.
4. Internet – World wide communication computer network.

7.9 Did You Know?


1. Google’s original name was ‘Backrub’!
2. A search engine can process millions of pages in a day!
3. The largest network of translators in the world is owned by Google*!
4. The name ‘Google’ was given accidentally and was a spelling mistake by the original
founders who wanted to go for the name ‘Googol’!
5. It is estimated by Google* that the Internet today contains about 5 million terabytes of data
(1TB = 1,000GB)!
6. As per Alexa (The Web Information Company), the most visited website globally is Google!
7. According to a study, without Google, the Internet would still be in its “pre-Hellenistic Age”!

7.10 References from Internet


http://www.makeuseof.com/tag/18-fun-interesting-facts-knew-internet/
http://www.hongkiat.com/blog/interesting-facts-about-google/
http://facts.randomhistory.com/interesting-facts-about-google.html
http://www.whoishostingthis.com/blog/2014/12/18/google-facts/
http://www.c4learn.com/mcq/internet-web-mcq/search-engine-basics-multiple-choice-
questions/
https://real.ucsd.edu/students/what-is-research.html
https://support.google.com/websearch/answer/134479?hl=en
http://www.makeuseof.com/tag/how-do-search-engines-work-makeuseof-explains/
http://softnik.com/download/seobasics.pdf

57
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 8 – Image Copyright

8.1 Objectives
After going through this chapter the students should be able to:

1. Understand what copyright is.


2. Know the importance of copyright.
3. Identify works which are protected by copyright.
4. Understand what copyright infringement is.
5. Identify the rules for using an image from the internet.
6. Understand the meaning of fair use.

8.2 Introduction
Sure enough, most of you have to prepare reports, assignments or even a paper. For this,
you generally have to take help from the internet. Do you know that the information,
images you take from the internet are protected by copyright laws and you cannot use all
of them? You need to take permission from the owners of the content you wish to use.

Quite surprising…? But it is a fact that you need permission in advance before copying any
text or image from the internet. Figure 8.1 – Copyright

Do you know what “Copyright” is? No?

To know more about Copyright, visit –


https://www.youtube.com/watch?v=0QiO_H0-ok8

8.3 Why Should You Care About Copyright?

You must remember that Copyright is everywhere: we all read books and articles, watch
videos, listen to music, and use various software and hardware technologies for learning,
research, work, civic engagement, and entertainment. You use different kinds of web material
frequently for preparing course material, writing a report, creating videos etc. Hence,
knowledge about copyright would be useful for you.

Figure 8.2 - Careful about copyright

To know more about the importance of copyright, visit –


https://www.youtube.com/watch?v=XES6jSAzxmk

58
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
8.3.1 Work Protected by Copyright

All you should know is that Copyright actually protects any "original work of authorship" which are fixed in "a
proper form of expression”.

Works that are under copyright fall into the following categories:

1. Any literary works (which includes computer software).


2. Musical works, dramatic works etc.
3. Pictorial and graphics works.
4. Cultural and architectural works.
5. Any motion pictures and other audio-visual works.
6. Sound recordings.

Figure 8.3 - Work protected by copyright

8.3.2 Work Not Protected by Copyright

On the internet, not everything is protected by copyright. There are categories of things which are not protected:

1. The first category includes Ideas, procedures, methods, systems, processes, concepts, principles,
discoveries.
2. The second category includes titles, names, short phrases, and slogans; mere listings of ingredients.
3. The third category includes works that are not fixed in a tangible form of expression, such as an
improvised speech or performance that is not written down or otherwise recorded.
4. The fourth category includes works consisting entirely of information that is commonly available and
contains no originality.
5. The fifth category includes works by the United States Government.

8.4 Copyright Infringement


Infringement is the violation of the copyrights of the creator or rights holder.
Examples of imagery infringement are:

1. Using an entire image or part of an image without permission.


2. Using a content beyond its scope of license or permission.
3. Art rendering.
4. Asking a photographer to identically recreate an image.

Figure 8.4 - Copyright Infringement

59
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
8.4.1 When Permission is Required to Use an Image

In general, you all need to understand the process wherein, any permission is
required to use the work. There is a five-step procedure to do the same which is:

1. Determine if permission is needed.


2. Identify the owner.
3. Identify the rights needed.
4. Ask the owner and offer him payment to use his image.
5. Get your permission agreement in writing. Figure 8.5 - Permission Required

8.5 Rules You Follow for Using Any Image from the Internet
You need to:

1. Confirm the owner of the image.


2. Get permission to use it.
3. Give due credit to the creator.
4. Buy it (If necessary).
5. Use it responsibly.

To know more about rules for using an image from internet, visit –
https://www.youtube.com/watch?v=GtMOAaMFaPs
https://www.youtube.com/watch?v=Lnpsk4xhHqw

8.6 Fair Use Law


‘Fair use’ is the right of every individual to use copyright material
responsibly. The material should be used only when you get Copyright
Owner's Permission. United States Copyright Act understands that fair
use of a copyrighted work can be used for purposes such as criticism,
comment, news reporting, teaching, scholarship, or research.

To know more about fair use law, visit –


https://www.youtube.com/watch?v=suMza6Q8J08
Figure 8.6 - Fair use

8.7 Chapter Objective Checklist


S.NO. SKILLS ACQUIRED YES NO
1. I have understood what copyright is.
2. I also know the importance of copyright.
3. I understand types of work protected by copyright laws.

60
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
4. I can explain what copyright infringement is.
5. The videos/pictures used in this lesson are relevant and easy to understand.
6. I understand the cases when one needs permission to use an image.
7. I can identify the rules for using an image from the internet.
8. I have understood what Fair use is.

8.8 Let’s Recap


1. Copyright - Legal right created by the law of a country that grants the right to
creator to protect the original work.
2. Copyright infringement - Infringement is the violation of the copyrights of the
creator or rights holder.
3. Fair use - ‘Fair use’ is the right of every individual to use copyright material responsibly. The material
should be used only when you get copyright owner's permission.
4. Intellectual Property – Creations of the mind, such as inventions, literary etc.
5. Google – Search engine, chat, and communication software.
6. Piracy - Illegal copying and distribution of a content.

8.9 Did You Know?


1. As per copyright experts, 85% of all U.S. works published between 1923 and 1963 are in
the public domain!
2. A person owns a copyright as soon as he produces the content!
3. Copyright status of a work has no relationship with the amount of time and effort put into
the work!
4. Copyright protects the originally created portions of a work!
5. Works published in any country is protected in The United States as though the works were
published in the United States!
6. Copyright protection for a work begins when the work is fixed in a "tangible form" including writing,
typing to paper, or saving it on a computer!
7. There are many incorrect statements on the internet about what is copyrighted!
8. A lot of copyright infringement is there on the internet!
9. There is a lesser infringement on genealogical websites and mailing lists than estimated because they
deal with fact-based material and old material which does not have a copyright, the copyright has
lapsed, or the material was published without a copyright notice!
10. Blogs and social media posts may not be considered Fair use!

61
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
8.10 References from Internet
http://www.copyrightkids.org/cbasicsframes.htm
http://www.stockphotorights.com/
http://copyright.ubc.ca/guidelines-and-resources/support-guides/why-should-i-care
http://fairuse.stanford.edu/overview/introduction/getting-permission/
https://teacherchallenge.edublogs.org/step-6-images-copyright-and-creative-commons
http://www.pddoc.com/copyright/copyright_facts.htm
http://blog.kunvay.com/5-facts-you-didnt-know-about-photos-copyright/
http://www.slideshare.net/KateBailey/multiple-choice-quiz-for-copyright-laws-and-fair-use
http://highered.mheducation.com/sites/0073378828/student_view0/chapter14/multiple_choice_quiz.
html
http://whatis.techtarget.com/definition/piracy

62
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 9 – Online Plagiarism

9.1 Objectives
After going through this chapter the students should be able to:

1. Understand what online plagiarism is.


2. Know the factors that lead to online plagiarism.
3. Learn the reasons behind plagiarism.
4. Check if they are plagiarizing or not.
5. Explain the categories of plagiarism.
6. Identify the possible consequences of plagiarism.
7. Understand how they can avoid plagiarism.
8. Identify Plagiarism tools available today.

9.2 Introduction

Do you know what is “Plagiarism……..” Yes or No?


No….
There are chances that you may be committing it unknowingly and therefore I will explain its meaning.

What Merriam-Webster* Online Dictionary say, "to plagiarize" is

1. To steal and pass off another person’s ideas as your one.


2. To use work of others without crediting the source.
3. To commit literary theft.
4. To take an idea or stem a product from an existing source and present it
is as original.

Figure 9.1 - Plagiarism

To know more about plagiarism, visit –


https://www.youtube.com/watch?v=wNg94ebLGzY

*Other brands and names may be claimed as property of others.

63
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
9.3 Why Students Plagiarize?
1. Laziness.
2. Academic Help.
3. The assignment cannot be completed in the stipulated time.
4. Lack of research skills.
5. Lack of preparation.
6. Pressure to maintain high grades.
7. Easy to do.

Figure 9.2 - Reason of Plagiarism

To know more about why students plagiarize, visit –


https://www.youtube.com/watch?v=J1HI0i-Br4Y

9.4 Categories of Plagiarism


Deliberate Plagiarism Accidental Plagiarism

1. Rewriting from books or articles. 1. Not knowing when and how to cite.
2. Copying and pasting from web pages and 2. Not knowing how to paraphrase.
online resources without citing sources. 3. Not knowing about common knowledge.
3. Downloading, buying or even borrowing a 4. Recycling an old paper.
paper. 5. Poor documentation.
4. Publishing on the web without permissions
of creators.

9.5 Consequences of Plagiarism

1. Get a “0” or failing grades in your assignment.


2. Loss of reputation.
3. Suspension.
4. Note on your records.
5. In some cases, legal action.

To know more about consequences of plagiarizing, visit –


https://www.youtube.com/watch?v=LV0Fy9X56FY

64
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
9.6 Check if You Are Supporting Plagiarism?

You can be a part of online plagiarism if:

1. You quote others words or ideas as yours.


2. You do not use quotes to refer to words of others.
3. You paraphrase the words of others.
4. You don’t clearly acknowledge the source of information.
5. You don’t make it clear how much you depended on your resources.
6. You copy and paste from the internet.
7. Even if you give credit to the author, your work consists mainly of
another’s ideas.

Figure 9.3 – If You Are Supporting


Plagiarism

To know if you are supporting plagiarism or not, visit –


https://www.youtube.com/watch?v=roSavDjlvxA

9.7 Chapter Objective Checklist


S. No. SKILLS ACQUIRED YES NO
1. I understood what plagiarism is.
2. I know the different categories of Plagiarism.
3. I have understood the reasons behind Online Plagiarism.
4. I can explain the impact of Plagiarism.
5. The videos used in this lesson are truly relevant and easy to understand.
6. I understood the term paraphrase.
7. I will not support any activity that leads to plagiarism.
8. I have understood the correct process of Citation.

9.8 Let’s Recap


1. Paraphrase – Tweaking other’s words to make same sense but with different words.
2. Plagiarism - An act of taking/using others work in your work.
3. Cite - A process to counter plagiarism.
4. Copyright - A legal way to protect your work.

65
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
9.9 Did You Know?
1. As per a study by The Centre for Academic Integrity, approximately 80% of college
students admit to cheating at least once!
2. As per a survey by the Psychological Record, 36% of undergraduates admitted that they
have plagiarized written material!
3. As per a poll conducted by US News and World Reports, 90% of students believe that
cheaters are either never caught or have never been punished!
4. As per a study conducted by Ronald M. Aaron and Robert T. Georgia, Administrator Perceptions of
Student Academic Dishonesty in Collegiate Institutions found that 257 chief student affairs officers
believe that colleges and universities have not addressed the cheating problem satisfactorily!
5. According to the Gallup Organization (October 6-9, 2000), the top two problems faced by the United
States are ‘Education’ and ‘Decline in Ethics’!
6. As per a national survey published in Education Week, 54% of students admitted to plagiarizing from
the Internet; 74% of students admitted that they were engaged in serious cheating at least once during
the past school year, and 47% of students believe their teachers sometimes choose to ignore students
who are cheating!
7. As per a survey by The Josephson Institute Center for Youth Ethics, 43,000 high school students found
that 59% of high school students admitted cheating on a test during the last year!
8. One out of three high school students admitted that the Internet has been used to plagiarize an
assignment!
9. As per a survey of 24,000 students at 70 high schools, Donald McCabe (Rutgers University) found that
95% said they participated in some form of cheating, 64% of students admitted to cheating on a test
and 58% admitted to plagiarism!

9.10 References from Internet


http://www.plagiarism.org/plagiarism-101/what-is-plagiarism
http://www.checkforplagiarism.net/cyber-plagiarism
http://www.business.rutgers.edu/tags/332?page=1
https://en.wikipedia.org/wiki/Plagiarism
http://eplagiarism.com/students-plagiarism-checker.html
www.slideshare.net

http://reviewgamezone.com/mc/candidate/test/?test_id=12762&title=Digital%20Citizenship%20Review

66
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Digital Etiquette

67
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 10 – Netiquettes

10.1 Objectives
After going through this chapter the students should be able to:

1. Understand the meaning of netiquette and its importance.


2. Refrain from showing bad netiquettes.
3. List the basic netiquettes.
4. Emphasize on email etiquettes.
5. Write an email following email etiquettes.
6. Know the etiquettes for online group discussions and participate accordingly.
7. Know the etiquettes for retrieving information.

10.2 Introduction
In today’s world of technology, online communication – emails, chat, blogs etc.
have become very important. As there are rules for face to face communication,
similarly there are rules for online communication. These rules are called
netiquettes. Our online reputation depends on how we behave on the internet.

The word netiquettes is a combination of two words – Internet and Etiquettes.


Netiquette is a set of rules that all of us should follow so that everyone is
comfortable and feel safe while using the internet.

To know more about netiquettes, visit –


https://www.youtube.com/watch?v=iPRfWOrKqGg
https://www.youtube.com/watch?v=8bqHkxg5lGY
http://www.bbc.co.uk/webwise/guides/about-netiquette

Figure 10.1 – Netiquettes

10.3 Why Netiquettes?


Netiquettes should be used while chatting, emailing, messaging etc because:

1. Internet communication is nonverbal. It lacks body language and facial


expressions. Thus, our written communication can be misinterpreted
easily. For the same reason, we should be very careful as what we are
writing.
Figure 10.2 – Importance of Netiquettes

68
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
2. It makes our communication more human.
3. Netiquettes make our communication more effective.
4. It helps develop and maintain good relationships with others.
5. It makes group conversations friendly.
6. Following netiquettes make sure your reputation is reflected positively.
7. What you tweet on the internet spreads like wildfire and you should be very careful as to what you are
posting. Whatever we post or tweet can be accessed even if we delete it.
8. It helps you represent yourself correctly to a large audience.

To know more about importance of netiquettes, visit –


https://www.youtube.com/watch?v=Hxt32D9VbVs
https://www.youtube.com/watch?v=gvkbDc1LiVI
https://www.reference.com/technology/netiquette-important-b65ef5542d935d43

10.4 Undesirable Netiquettes


Undesirable netiquettes are undesirable online behaviour. It includes

1. Imitating others.
2. Using unlawful, abusive, harassing, defamatory, threatening, racial or unethical
words while communicating online.
3. Floating indecent images and content.
Figure 10.3 – Bad Netiquettes

4. Spamming.
5. Flaming.

To know more about undesirable netiquettes, visit -


https://www.youtube.com/watch?v=C9hLW2xqDXs
https://www.youtube.com/watch?v=Rk5uAiCl7PM
https://answers.yahoo.com/question/index?qid=20100119080434AANJFQt

10.5 Basic Netiquettes


There are no written rules for netiquettes. Netiquettes can vary depending
upon the audience. But it is always good to behave properly and be polite.
Some of the basic rules are:

1. Do not hurt other person’s feelings. Be friendly and positive. Think before
you write. Treat everyone with respect.
2. Use proper language. Choose your words carefully. Never post or mail
anything that you would not say face-to-face.
3. Be ethical and do not break any law.
4. Do not expect people to always agree with what you post, say or think.
Figure 10.4 – Netiquette Rules

69
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
5. Post appropriate messages in relevant discussion groups.
6. Always read FAQs before posting any question in a group.
7. Write clearly. Re-read your content before posting it. The posts should be professional, clear and
crisp. Don’t use emoticons or abbreviations while writing formal emails and official articles/posts.
8. Ask for clarifications and help if required.
9. Begin your message with a greeting.
10. Never use all CAPS.
11. Don’t write anything when you are angry or upset.
12. Respect other people’s privacy and do not provoke them to share their passwords and personal
information.
13. Check your spelling and grammar before you post anything.

To know more about basic rules of netiquettes, visit -


https://www.youtube.com/watch?v=FWMk_Zv7nB8
https://www.youtube.com/watch?v=FJncZc-80GQ
http://www.uticaod.com/x1177024386/Internet-Etiquette-10-Rules-of-Netiquette

10.5.1 Netiquettes for Emails

E-mail etiquettes:

1. Keep your messages short, simple, straight and to the point.


2. If there are multiple paragraphs, give space between paragraphs and wherever
required.
Figure 10.5 - Email Etiquettes

3. Make sure the attachments are safe and virus free.


4. Send the email to only those people for whom it is meant. Do not copy people unnecessarily.
5. Do not write insulting messages.
6. Write appropriate subject line.
7. Proofread before sending.
8. Email should be properly formatted.
9. Acknowledge important communications.
10. Never divulge other person’s email address without their permission.

To know more about email etiquettes, visit –


https://www.youtube.com/watch?v=M7b5YzwcMss
https://www.youtube.com/watch?v=RFZwtkoNGrk

10.5.2 Netiquettes for Discussion Groups

Discussion group etiquettes:

1. Before you post a question in a discussion, make sure the question


has not been answered before.
2. Don’t post irrelevant thoughts or questions.
3. The message should not have all CAPS.
4. Don’t write anything offensive.
5. Always use the magic words – Please, request, sorry etc.

Figure 10.6 – Netiquettes for Discussion Groups

70
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
6. Disagree respectfully with other people in the group. Don’t badmouth others.
7. Answer appropriately. Do not divert from the topic or question asked.
8. If you have asked a question and you receive multiple answers. Summarize all the answers in a
paragraph and post it for everybody’s benefit.
9. Be brief in answering a question or posting a question.
10. If you are referring to an earlier discussion or point, quote that point briefly so that people do not have
to go back to refer to the point.
11. Check the most recent comments before replying to an older comment. It might be possible that the
issue has already been resolved.
12. Be forgiving. If someone has done a mistake, ignore it.

To know more about netiquettes for discussion board, visit -


https://www.youtube.com/watch?v=DwdqQjCfWSc

10.5.3 Netiquettes for Retrieving Information

Netiquettes for retrieving information are fairly simple:

1. Don’t stay logged in when you are not doing anything. Unnecessarily getting logged in wastes bandwidth.
2. Try to use the internet during off-peak hours.

10.6 Chapter Objective Checklist


S.NO. SKILLS ACQUIRED YES NO
1. I know what netiquette is.
2. I know why it is important to have netiquettes.
3. I know what bad netiquettes are.
4. I know the basic netiquettes.
5. I know what email etiquettes are.
6. I can write a professional email not offending anyone.
7. I know the netiquettes for group discussions.
8. I can participate in group discussions responsibly.
9. I can retrieve information from the internet responsibly.
10. The links presented in the chapter are interesting and useful.
11. The information given in the chapter will help us in understanding
netiquettes.
12. I would like to explore more about netiquettes.

10.7 Let’s Recap


1. Netiquette - Set of rules that one must follow on the internet.
2. Bad Netiquette - Undesirable online behaviour.
3. Trolls - People who creep on others on the internet.
4. Flaming - Using rude language in emails or chat sessions.
5. Cyberspace - The electronic world that can be accessible via the Internet.
6. Internet - The collection of interconnected networks in the world.
7. Newsgroup - Discussion group or bulletin board on the Internet dedicated to a specific topic.

71
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
8. Protocol – Process how computers act when communicating with each other.
9. Signature - Text automatically added to the end of your e-mail messages.
10. Smiley - Smiling faces and other "emoticons" used online to indicate humor and other emotions.

10.8 Did You Know?


1. Approximately 2.4 billion people use internet out of 7 billion people on Earth!
2. Machines connected to the internet currently are over 8.7 billion!
3. Every minute, 72 hours of YouTube* video is uploaded!
4. A grain of sand weighs more than the internet's 5 million terabytes!
5. The internet is used by over 78% of North Americans!
6. Approximately 1.7 billion of the internet's users are in Asia!
7. The cities South Korea and Japan are the countries best connected to the internet!
8. Pope John Paul II was the first Pope ever to use an email and his email address was
john_paul_ii@vatican.va!
9. You might get a response if you email Bill Gates at billg@microsoft.com!
10. Only two emails were sent by the President Bill Clinton during his entire presidency (1993–2001)!

10.9 References from Internet


https://prezi.com/byiotb_e5xkm/netiquette/
http://peopleof.oureverydaylife.com/why-do-people-use-netiquette-7357.html
http://www.reputation-inc.com/our-thinking/the-importance-of-practicing-good-
netiquette
http://safespace.qa/en/why-netiquette-important
http://netiquetteimportance.blogspot.in/
http://blog.alliedhighschool.com/2013/04/the-importance-of-netiquette.html
http://www.albion.com/bookNetiquette/0963702513p32.html
http://www.normandale.edu/assets/prebuilt/OnlineEducation/skills/netiquette.pdf
http://www.business2community.com/social-media/teaching-your-kids-the-value-of-netiquette-
0128640#Z3GrZF1JbBE8QhRc.97
http://theburnfamilyguidetonetiquette.weebly.com/netiquette.html

72
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Digital Law

73
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 11 – Digital Law

11.1 Objectives
After going through this chapter the students should be able to:

1. Explain what digital law is.


2. List different types of activities against which digital laws are made.
3. Differentiate between copyright and trademark.
4. Know the punishment for violation of copyright and trademark law.
5. Differentiate between trade secrets and patents.
6. Explain what software licensing is.
7. List the categories of software.
8. Explain the consequences of software piracy.
9. Explain why data protection is important.
10. Give examples of cyber crimes.

11.2 Introduction
Digital law is to keep a check on what you are allowed to do on the
internet and what you are not allowed to do. Digital laws are made
so that citizens make use of internet responsibly.

Digital laws are made against hacking, downloading and using


pirated software, watching pirated movies, downloading pirated
music, creating viruses etc.

It is important to abide by the law to be a responsible netizen.

Figure 11.1 – Digital Law

To know more about digital law, visit –


https://www.youtube.com/watch?v=sWM1LhKsNsM
https://www.youtube.com/watch?v=BWDhBQG73Is
http://digitalhawks.weebly.com/digital-law.html

74
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
11.3 Copyright and Trademark Law
Copyright and trademark are two different terms.

Copyright focusses on protecting the literature and artistic


work – books, music etc. Companies copyright their books,
study materials etc. Generally, the author is the person
who can claim copyright. If the work is done by an
employee, the employer is considered the owner. When
any document, book, report etc. is created, it is
automatically copyrighted at that time.
Figure 11.2 – Copyright Vs. Trademark

Registration with authorities is required if you would want to legally protect your content. To know more about
registration of copyright in India, please visit http://copyright.gov.in/frmCopyrightBoard.aspx.

It is a good practice to attach a copyright notice on the required material. Copyright is valid 70 years after the
author’s death and 95 years for corporates.

Trademark focusses on protecting items that are associated with the company branding – logo etc. The company
must ensure that whatever they want to trademark is not already in use. After that, the organization can register
their trademark. Registration of a trademark is done for 10 years and renewable for another 10 years. There is a
provision of indefinite renewal as well.

Punishment for violation of copyright and trademark law:

1. Work used illegally can be destroyed.


2. Monetary loss to the organization/person using the work illegally.
3. Possible imprisonment to the organization/person using the work illegally.

To know more about copyright, trademark and patent, visit –


https://www.youtube.com/watch?v=AQpaKJjEQR8
https://www.youtube.com/watch?v=HsTi3vD_Usw
https://www.copyrightservice.co.uk/copyright/intellectual_property

11.4 Trade Secrets and Patents


A Trade secret is any information that organizations do not want to share
because they make money with that information. E.g., recipe of coca cola. The
company coca cola is making money because of its recipe and would not want to
share the same with anyone.

Figure 11.3 – Patent

75
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
The Patent is like copyright for inventions. Patent holder stops others from selling or using their inventions.

11.5 Licensing
Software licensing determines how software can be used and redistributed. All software
is copyright protected except the one’s that are available in public domain.

With the perspective of copyright law, there are two categories of software:

1. Free and Open Source Software (FOSS) in which the user has the right to modify
the source code and re-use the software.
2. Proprietary Software keeps the source code hidden and the user is not able to
modify the source code.
Figure 11.4 - Licensing

There are unlicensed software. They are also of two types:

1. Public Domain Software are the ones which are available to public and do not have any copyright,
ownership etc.
2. Non Distributed Non-Licensed Software are the ones which companies use as a trademark for their
internal use.

To know more about software licensing visit –


http://www.techsoup.org/support/articles-and-how-tos/making-sense-of-software-licensing
https://www.youtube.com/watch?v=mr89RIX8kU4
https://www.youtube.com/watch?v=3rHWqzIOYPc
https://www.youtube.com/watch?v=a8fHgx9mE5U

11.5.1 Consequences of Software Piracy

Consequences of software piracy are:

1. Users with pirated software will not have access to support,


updates, bug fixes etc.
2. Users with pirated software are more prone to getting virus attacks
on their PCs.
3. Pirated software are not up-to-date.
Figure 11.5 – Consequences of
Software Piracy

4. Users with pirated software can get caught and can have negative publicity.
5. Legal action against the person using pirated software and the user will have to pay the cost of
software.

To know more about consequences of software piracy, visit -


https://sites.google.com/site/dontownitdontuseit/social-and-business-implications-of-software-piracy

76
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
https://www.youtube.com/watch?v=aQCrvoZ3k9c
https://www.youtube.com/watch?v=JdVPEXbc9R4

11.6 Data Protection


Data protection act specifies how your personal information
should be used by organizations, government etc.

1. Give limited personal information, which is just required


by the organization.
2. Organizations must keep the personal information
securely.
3. The personal information should be up to date.
4. Organizations must share or take your consent before
using the personal information.
Figure 11.6 – Data Protection

5. Organizations must not keep the personal information if it is no more needed.

People/organizations violating data protection can end up paying monetary penalty or imprisonment.

To know more about data protection, visit –


https://www.youtube.com/watch?v=vHvd6HaPq_s
https://www.youtube.com/watch?v=yQila5tRvek

11.7 Cybercrime
Any crime involving a device with internet access comes under the
category of cybercrime. Such a device can be used as a means to
commit a crime or it can be a target. Different cyber crimes are:

1. Auction Fraud: Customer receives products which he had not


selected. It may also be possible that the customer has paid for
the product but has not received the product.
Figure 11.7 – Cybercrime

2. Credit Card Fraud: Using someone else’s credit card on the internet.
3. Debt Elimination Fraud: Emails or websites that promise the customers to free them from their debts.
4. Email Spoofing: Email header specifies the sender as someone else who is not the true sender.
5. International Lottery Type Fraud: Emails to users that they have won a lottery.
6. Internet Extortion: A computer receives virus attacks and the hackers ask for money to free the customer
from these attacks.
7. Investment Fraud: False offers about investing money.
8. Malware: Programming done to harm computers.

77
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Anyone who damages data of a computer without the permission of the owner can be sent to jail for 2 to 3 years
or with a fine of up to 5 lakhs or both.

Source: http://cis-india.org/internet-governance/blog/privacy/privacy-ita2008

To know more about cyber crime, visit –


https://www.youtube.com/watch?v=Bo44JoIU7Qk
https://www.youtube.com/watch?v=l4aCmlB7VYc
https://www.youtube.com/watch?v=FrvFT89QV5Y

11.8 Cyber Laws in India


S.NO OFFENCES SECTION PUNISHMENT REFERENCE URL
UNDER IT
ACT
1. Tampering with 65 Imprisonment upto http://www.itlaw.in/section-65-
computer 3 years or fine up to tampering-with-computer-source-
documents Rs. 2 lakh or both documents/
2. Hacking with 66 Imprisonment upto http://cis-india.org/internet-
computer system, 2 to 3 years or fine governance/blog/privacy/privacy-
data alteration up to Rs. 5 lakh or ita2008
both
3. Sending offensive 66A Imprisonment upto http://cis-india.org/internet-
messages through 3 years and with fine governance/blog/privacy/privacy-
communication ita2008
service etc.
4. Dishonestly 66B Imprisonment upto http://cis-india.org/internet-
receiving stolen 3 years or fine up to governance/blog/privacy/privacy-
computer resource Rs. 1 lakh or both ita2008
or communication
device
5. Identity theft 66C Imprisonment upto http://cis-india.org/internet-
3 years and fine up governance/blog/privacy/privacy-
to Rs. 1 lakh ita2008
6. Cheating by 66D Imprisonment upto http://cis-india.org/internet-
personation by using 3 years and fine up governance/blog/privacy/privacy-
computer resource to Rs. 1 lakh ita2008
7. Violation of privacy 66E Imprisonment upto http://cis-india.org/internet-
3 years or fine up to governance/blog/privacy/privacy-
Rs. 2 lakh or both ita2008
8. Cyber terrorism 66F Imprisonment which http://cis-india.org/internet-
may be lifetime governance/blog/privacy/privacy-
imprisonment ita2008

78
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
9. Publishing or 67 Imprisonment upto http://cis-india.org/internet-
transmitting 5 years and fine up governance/blog/privacy/privacy-
obscene material in to Rs. 10 lakh ita2008
electronic form
10. Publishing or 67A Imprisonment upto http://cis-india.org/internet-
transmitting of 7 years and fine up governance/blog/privacy/privacy-
material containing to Rs. 10 lakh ita2008
sexually explicit act
etc. in electronic
form
11. Publishing or 67B Imprisonment upto http://cis-india.org/internet-
transmitting of 7 years and fine up governance/blog/privacy/privacy-
material depicting to Rs. 10 lakh ita2008
children in sexually
explicit act, etc. in
electronic form
12. Preservation and 67C Imprisonment upto http://cis-india.org/internet-
retention of 3 years and fine governance/blog/privacy/privacy-
information by ita2008
intermediaries
13. Powers to issue 69 Imprisonment upto http://cis-india.org/internet-
directions for 7 years and fine governance/blog/privacy/privacy-
interception or ita2008
monitoring or
decryption of any
information through
any computer
resource
14. Power to issue 69A Imprisonment upto http://www.itlaw.in/section-69a-
directions for 7 years and fine power-to-issue-directions-for-blocking-
blocking for public for-public-access-of-any-information-
access of any through-any-computer-resource/
information through
any computer
resource
15. Power to authorize 69B Imprisonment upto http://cis-india.org/internet-
to monitor and 3 years and fine governance/blog/privacy/privacy-
collect traffic data or ita2008
information through
any computer
resource for cyber
security
16. Unauthorized access 70 Imprisonment upto research.ijcaonline.org/
to protected system 10 years and fine volume58/number7/
pxc3883507.pdf
17. Penalty for 71 Imprisonment upto http://www.itlaw.in/section-71-penalty-
misrepresentation 2 years or fine up to for-misrepresentation/
Rs. 1 lakh or both

79
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
18. Breach of 72 Imprisonment upto http://cis-india.org/internet-
confidentiality and 2 years or fine up to governance/blog/privacy/privacy-
privacy Rs. 1 lakh or both ita2008
19. Publishing false 73 Imprisonment upto http://www.itlaw.in/section-73-penalty-
digital signature 2 years or fine up to for-publishing-electronic-signature-
certificates Rs. 1 lakh or both certificate-false-in-certain-particulars/
20. Publication for 74 Imprisonment upto http://www.itlaw.in/section-74-
fraudulent purpose 2 years or fine up to publication-for-fraudulent-purpose/
Rs. 1 lakh or both
21. Compensation, 77 N/A http://www.itlaw.in/section-77-
penalties or compensation-penalties-or-
confiscation not to confiscation-not-to-interfere-with-
interfere with other other-punishment/
punishment
22. Punishment for 84C Imprisonment upto http://www.itlaw.in/section-84c-
attempt to commit one half of the punishment-for-attempt-to-commit-
offences longest term offences/
provided for that
offence or fine for
that offence or both
23. Sending threatening 503 IPC Imprisonment upto www.slideshare.net/
messages by email 3 years or fine up to jayakumarpurushan/
Rs. 5 lakh or both cyber-crime-and-information-
technology-act-2998
24. Word, gesture or act 509 IPC Imprisonment upto https://indiankanoon.org/doc/
intended to insult 1 year or fine or both 68146/
the modesty of a
woman
25. Sending defamatory 499 IPC Imprisonment upto www.slideshare.net/
messages by e-mail 3 years and fine up jayakumarpurushan/
to Rs. 2 lakh cyber-crime-and-information-
technology-act-2998
26. E-mail spoofing 463 IPC Imprisonment upto www.slideshare.net/
3 years and fine up jayakumarpurushan/
to Rs. 1 lakh cyber-crime-and-information-
technology-act-2998
27. Making a false 464 IPC Imprisonment upto www.slideshare.net/
document 3 years and fine up jayakumarpurushan/
to Rs. 1 lakh cyber-crime-and-information-
technology-act-2998
28. Forgery for purpose 468 IPC Imprisonment upto www.slideshare.net/
of cheating 3 years and fine up jayakumarpurushan/
to Rs. 1 lakh cyber-crime-and-information-
technology-act-2998
29. Forgery for purpose 469 IPC Imprisonment upto www.slideshare.net/
of harming 3 years and fine up jayakumarpurushan/
reputation to Rs. 1 lakh cyber-crime-and-information-

80
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
technology-act-2998
30. Punishment for 506 IPC Imprisonment upto https://indiankanoon.org/doc/
criminal intimidation 2 years or fine or 180217/
both
31. Criminal intimidation 507 IPC Imprisonment upto https://indiankanoon.org/doc/
by an anonymous 2 years in addition to 1255223/
communication the punishment
provided for the
offence by the last
preceding section
32. When copyright 51 Imprisonment upto Copyright.gov.in/Documents/
infringed: - copyright 3 years but not less Toolkitinside.pdf
in a work shall be than 6 months and
deemed to be fine up to Rs. 2 lakh
infringed but not less than Rs.
50,000
33. Offence of 63 Imprisonment upto Copyright.gov.in/Documents/
infringement of 3 years but not less Toolkitinside.pdf
copyright or other than 6 months and
rights conferred by fine up to Rs. 2 lakh
this act but not less than Rs.
50,000
34. Enhanced penalty on 63A Imprisonment upto Copyright.gov.in/Documents/
second and 3 years but not less Toolkitinside.pdf
subsequent than 1 year and fine
convictions up to Rs. 2 lakh but
not less than Rs. 1
lakh
35. Knowing use of 63B Imprisonment not Copyright.gov.in/Documents/
infringing copy of less than 7 days or Toolkitinside.pdf
computer fine up to Rs. 50
programme to be an thousand
offence
36. Obscenity 292 IPC First conviction: https://indiankanoon.org/doc/
Imprisonment up to 1704109
2 years and fine up
to Rs. 2 thousand
Imprisonment up to
5 years and fine up
to Rs. 5 thousand
37. Printing etc. of 292A IPC Imprisonment upto http://www.lawyerservices.in/Indian-
grossly indecent or 2 years or fine or Penal-Code-1860-SECTION-292A-
scurrilous matter or both Printing-etc-of-grossly-indecent-or-
matter intended for scurrilous-matter-or-matter-intended-
blackmail for-blackmail

81
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
38. Sale etc. of obscene 293 IPC First conviction: http://devgan.in/ipc/section/293/
objects to young Imprisonment up to
person 3 years and fine
Second convition:
Imprisonment up to
7 years and fine
39. Obscene acts and 294 IPC Imprisonment up to https://indiankanoon.org/doc/594493/
songs 3 months or fine or
both
40. Punishment for theft 379 Imprisonment up to https://indiankanoon.org/doc/1101188/
3 years or fine or
both

11.9 Chapter Objective Checklist


S. No. SKILLS ACQUIRED YES NO
1. I know what digital law is and different activities against which digital laws are
made.
2. I know the difference between copyright and trademark.
3. I know the punishment for violation of copyright and trademark law.
4. I know the difference between trade secrets and patents.
5. I know what software licensing is.
6. I know the different categories of software.
7. I know the consequences of software piracy.
8. I know the importance of data protection.
9. I know different types of cyber crimes and the risks in getting involved in them.
10. The links presented in the chapter are interesting and useful.
11. The information given in the chapter will help us using digital law.
12. I would like to explore more about the digital law.

11.10 Let’s Recap


1. Digital Law - Law made to keep a check on what you are allowed to do on the internet and what
you are not allowed to do.
2. Software Licensing - Rules that determine how a software can be used and redistributed.
3. Free and Open Source Software (FOSS) - Software where users have the right to modify the source
code and re-use the software.
4. Proprietary Software - Software where the source code is hidden and the user is not able to modify
the source code.
5. Public Domain Software - Software which is available to the public and does not have any copyright,
ownership etc.
6. Non Distributed Non-Licensed Software - Software which companies use as a trademark for their
internal use.
7. Data Protection - Act that specifies how your personal information should be used by organizations,
government etc.
8. Cybercrime - Any crime involving device that has internet access.
9. Credit Card Fraud - Fraud where a person is using someone else’s credit card on the internet.

82
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
10. Debt Elimination Fraud - Fraud where users receive emails or visit websites that promise the customers
to free them from their debts.

11.11 Did You Know?


1. In the year 2015, approximately 8045 cybercrime cases were registered in India!
2. As per the Internet Crime Complaint Center, people in the age group 20 to 59 years are
more likely to be a victim of cyber crime than those 60 and older and younger than 20!
3. Maharashtra has the highest number of cybercrimes in the period 2011 to 2015!
4. As per international cyber crime complaints, Canada, the United Kingdom, Australia and
India top the list!
5. According to cybercrime Watch magazine, approximately 75 million scam emails are sent every day to
approximately 2,000 users!
6. Approximately 66% of Internet hackers are American!
7. Approximately 90% of U.S. companies admitted their organizations’ computers were breached at least
once in the last 1 year!
8. Approximately 59% of the internet users admitted they were breached more than once!
9. Companies have to bear a loss of approximately $1 trillion to digital fraud, theft of intellectual property
and damage to corporate networks!
10. Approximately 65% of internet users have been victims of cybercrime!

11.12 References from Internet


https://digiteen.wikispaces.com/Digital+Law
http://smallbusiness.chron.com/differences-between-copyright-trademark-3218.html
http://money.howstuffworks.com/question492.htm
http://www.wipo.int/sme/en/ip_business/trade_secrets/patent_trade.htm
https://en.wikipedia.org/wiki/Software_license
http://www.siia.net/Divisions/IP-Protection-Services/About/Consequences-of-Software-
Piracy
http://inspirationfeed.com/articles/technology-articles/risks-of-using-pirated-software/
https://www.gov.uk/data-protection/the-data-protection-act
https://en.wikipedia.org/wiki/Cybercrime
http://www.legalindia.com/cyber-crimes-and-the-law/
http://sflc.in/wp-content/uploads/2012/07/eBook-IT-Rules.pdf

83
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Digital Rights and
Responsibilities

84
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 12 – Digital Rights and Responsibilities

12.1 Objectives
After going through this chapter the students should be able to:

1. Know the difference between digital rights and responsibilities.


2. Understand that it is incorrect to disrespect someone online.
3. Understand the effects of showing digital disrespect.
4. Know how to avoid digital disrespect.
5. Tell one’s digital rights.
6. Understand his/her digital responsibilities.
7. Tell the importance of digital rights and responsibilities.
8. Respect the rights of every online user.
9. Hold oneself responsible if they do something unethical online.
10. Know the after effects of violating someone’s digital rights.

12.2 Introduction
With rights, come great responsibility.
`
Everyone loves freedom, freedom to express their views and
its outreach. Wider our reach, happier we feel. While using the
freedom, we must be aware of the responsibilities as well so
that we do not offend anyone or make any derogatory remarks
about individuals, communities, religion etc.

Digital rights are the privileges and freedom which are given
to online users.

Digital responsibilities are the expectations from online users


while they use digital media.

Figure 12.1 – Digital Rights and Responsibilities

To know more about digital rights and responsibilities, visit –


https://www.youtube.com/watch?v=oTf-EHOI1T0
https://www.youtube.com/watch?v=qHn5x3crBfE
https://www.youtube.com/watch?v=Qg-zniXMGGc
https://fsudigitalcitizenship.wikispaces.com/Digital+Citizenship+Rights+%26+Responsibilities

85
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
12.3 Digital Disrespect
Disrespect is an act of insulting others. There are ways that you can
insult – acting rude or impolite, offend someone etc. Digital
disrespect refers to insulting people online. It also involves spreading
rumours about somebody behind their back and embarrassing them.
Rumours can be spread pictorially as well.

Questions you must ask yourself to make sure you are not
disrespecting online.

Figure 12.2 – Digital Disrespect

1. Before posting anything online, think if you will tell the same thing to the world in person?
2. If you are spreading rumours online about somebody, will it come back to you or will it haunt you?
3. Before posting anything, keep in mind, what you say on a lighter note now, can blow up in future.

To know more about digital disrespect, visit –


https://www.youtube.com/watch?v=rJn8LO4DXzU
https://www.youtube.com/watch?v=MBb8EhVtmqA

12.3.1 Effects of Digital Disrespect

Figure 12.3 – Effect of Digital Disrespect

Effects of digital disrespect can be many and can be adverse. Some of them are:

1. A simple rumour can turn into an online war. You won’t be able to concentrate on studies and lose out
on opportunities.

86
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
2. There will always be some people who will not like your comments and seeing your personality, might
unfriend you from the list. You lose your social life.
3. Health issues might build up due to stress, like headache, depression etc.

To know more about effects of digital disrespect, visit –


https://www.youtube.com/watch?v=MBb8EhVtmqA
https://www.youtube.com/watch?v=KP9K_A1OahM
https://hottline.wordpress.com/2010/01/20/digital-disrespect/

12.3.2 Precautions from Digital Disrespect

We can take control and make sure we do not disrespect anyone online.

1. Unhide: Do not post anything online if you can’t say the same thing on the
person’s face.
2. Disengage: If anything has been posted about you which is untrue or maligns
your character, report it to your family members. You can also report it on the
community guidelines forum.
Figure 12.4 – Respect

3. Secure Your Stuff: Make sure the privacy settings are appropriate for any network or social media that
you use.
4. Save Everything: If you are harassed online, make sure you save the content to report abuse.
5. Use Your Voice: Report abuse to a higher authority and ask them to help you. The higher authority can
be your parents, teachers, family members etc.

To know more about precautions for digital disrespect, visit –


https://www.youtube.com/watch?v=eA2kDIchD_Q
https://www.youtube.com/watch?v=WegCMoQ-UNs
http://onlinesafetypa.weebly.com/digital-disrespect.html

12.4 Digital Rights


Just as there are constitutional rights defined for us, we must know
our digital rights as well. Digital rights of online users are:

1. Right to Freedom of Expression – Every online user has the


right to say what they want to in an appropriate manner and
raise their voice if something is going against them.
2. The Right to Privacy – Every online user has the right to protect
his/her data. If the data is being misused, the user can report
abuse.
Figure 12.5 – Digital Rights

3. Right to take Credit for Personal Works – If an online user publishes his/her work on the internet, he/she
has the right to take credit for the work.
4. Right to Digital Access – Every online user has the right to access the content which is there on the
internet.

87
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
5. Right to our Identity – Identity includes first name, surname, date of birth, gender, nationality etc.
Upholding right to identity encourages tolerance, mutual appreciation, and chance to happiness.

To know more about digital rights, visit –


https://www.youtube.com/watch?v=NIiWn2Nb50g
https://www.youtube.com/watch?v=6YDuSiX_gR0
https://www.youtube.com/watch?v=qHn5x3crBfE

12.5 Digital Responsibilities


Responsibility is being accountable for one’s own behaviour. Digital responsibility
is taking ownership of our online behaviour. An example of digital responsibility is
that we should play online games for a reasonable amount of time. Digital
responsibility answers the following questions:

1. What do I do to keep my stuff safe?


2. How do I keep myself safe?
3. How do I treat others?
Figure 12.6 – Digital Responsibility

Digital responsibility includes:

1. Using digital media legally, safely and with responsibility.


2. Showing positive attitude towards the technology by using it for collaboration, learning, and productivity.
3. Exhibiting leadership.
4. Reporting bullying, harassing, identity theft and other harmful online activities.
5. Mentioning references works used for resources and researching.
6. Downloading music, videos, and other material legally.
7. Keeping information safe from hackers.
8. Not to falsify our identity in any way.
9. Showing respect to others and appreciate them.
10. Helping someone who is cyber bullied or facing some problems on the internet.
11. Being honest and fair.

To know more about digital responsibility, visit –


https://www.youtube.com/watch?v=q5L-kTUtQ_c
https://www.youtube.com/watch?v=UJkA0BjGn-w
http://www.digitalresponsibility.org/risks-of-texting-while-driving

12.6 Why are Digital Rights and Responsibilities Important?


Imagine what will happen if there are no digital rights and responsibilities? There will be an online war where
people will be publishing and posting whatever they feel like. There will be chaos all around. Digital rights and
responsibilities are important because, without them, there would not be any proper communication and

88
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
knowledge will not be available to everybody. There have been cases where people do not act responsibly online
and bully others. The after effects are extreme to the extent that the victims take their lives. Texting to cheat on
tests is an increasing trend. Until and unless we understand our responsibility, these types of activities will keep
increasing. We also need to understand that it is ok to use someone’s work but it is important to give the person
due credit. Illegally downloading music and movies is also a big problem now-a-days which leads to increase in
piracy. We must understand that these acts are punishable and we must refrain from doing so.

Until and unless we document and are aware of our digital rights and responsibilities, we will not be able to
punish the offenders.

To know more about why digital rights and responsibilities are important, visit –
https://www.youtube.com/watch?v=8CYbSjIMHNU.

12.7 Chapter Objective Checklist


S. No. SKILLS ACQUIRED YES NO
1. I know the difference between digital rights and responsibilities.
2. I know it is wrong to disrespect anyone online.
3. I know the effects of showing digital disrespect to someone.
4. I know what precautions I should take to save myself from digital disrespect.
5. I know my digital rights.
6. I know my digital responsibilities.
7. I respect the right of all online users.
8. I know it is unethical to disrespect or violate someone’s digital rights.
9. I know the after effects of violating someone’s digital rights.
10. The links presented in the chapter are interesting and useful.
11. The information given in the chapter will help us understand our digital rights
and responsibilities.
12. I would like to explore more about digital rights and responsibilities.

12.8 Let’s Recap


1. Digital Rights - Freedom given to online users.
2. Digital Responsibility - Expectations from online users while they use digital media.
3. Disrespect - Act of insulting others.
4. Digital Disrespect - Insulting people online.
5. DRM (Digital Rights Management) - Technology and practices to protect digital intellectual property
from being misused or used illegally.
6. Broadcast Flag - Sequence of digital bits in a television program confirming that the program must be
protected from unauthorized redistribution.
7. Digital Watermark - A pattern of bits in a file to identify the source of illegal copies.
8. Palladium - Code name for a set of features for the Microsoft Windows operating system.
9. Hacking - Breaking into an authorized location illegally with a malicious intent.
10. Code Signing - Putting a digital signature on a piece of code to assure that it was produced by a known
entity and has not been tampered.

89
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
12.9 Did You Know?
1. Cyberbullying, sexting, safety from online predators, social networking are all included in
digital rights & responsibilities!
2. Users have the right to protect the work that they create or publish!
3. Always be nice to people even if they are online. You don’t want to start a flame war which
is very time consuming and wasteful way to use the internet!
4. Digital rights are rights given to each individual who is in the digital world!
5. Use the internet respectfully; don't post embarrassing pictures of your friends without their
permission!
6. It is our digital right to find out about our local government officials!
7. We have the right to protect our personal information from the government or online businesses!
8. Children have lesser rights than adults while they are online!
9. There is no proof that digital rights are protected under the United States Government!
10. Many websites do not allow users to enjoy their digital Rights!

12.10 References from Internet


http://moodleshare.org/mod/page/view.php?id=15016&inpopup=1
http://www.slideshare.net/JASTAL01/digital-rights-responsibilities-47194381
http://education.cu-portland.edu/blog/tech-ed/responsibilities-that-come-with-digital-
citizenship/
https://www.sophia.org/tutorials/digital-rights-and-responsibilities
https://schoolsonline.britishcouncil.org/classroom-resources/list/magna-carta-my-
digital-rights
http://areyouadigitalcitizen.weebly.com/digital-rights-and-responsibilities.html
https://sites.google.com/site/digitalcitizenshipdferris/digital-rights-and-responsibilities
http://www.athinline.org/facts/digital-disrespect
https://www.vocabulary.com/dictionary/disrespect
https://www.amnesty.org.uk/blogs/stories-and-rights/why-we-have-right-identity

90
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Digital Health and Wellness

91
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 13 – Cyberbullying

13.1 Objectives
After going through this chapter the students should be able to:

1. Know the meaning of cyberbullying.


2. Know the psychology behind cyberbullying.
3. Identify different kinds of cyberbullying.
4. Understand that cyberbullying can make people suicidal.
5. Know effects of cyberbullying.
6. Take action if one is a victim of cyberbullying.
7. Help victims of cyberbullying.
8. Spread awareness about cyberbullying.

13.2 Introduction
Using the internet or mobile technology to harm another person intentionally is
called cyber bullying. The actions are repeated to hurt or embarrass another
person.

Cyberbullying when the cyberbully is anonymous and the target does not know
the cyberbully is called digital pile-on.

Cyberbullying can happen anytime, 365 x 24 x 7 and messages spread very fast
to a very large audience.

Figure 13.1 - Cyberbullying

To know more about cyberbullying, visit -


https://www.youtube.com/watch?v=A9Op2KZCb88
https://www.youtube.com/watch?v=vmQ8nM7b6XQ
https://www.youtube.com/watch?v=JEScvcMhoj0
http://www.teensafe.com/blog/cyber-bullying-facts-and-statistics/

92
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
13.3 Why do People Cyberbully
Often people who engage in cyberbullying are frustrated,
depressed, angry and revengeful. Main reasons of cyberbullying
are:

1. To become popular.
2. To feel powerful.
3. To cope up with low confidence.
4. To fit in with peers.
5. To amuse them.
6. Frustration people have in their lives.

Figure 13.2 – Why Cyberbullying

To know more about why do people cyberbully, visit –


https://www.youtube.com/watch?v=6DkTeKMjMxU
https://www.youtube.com/watch?v=EzYgI47m8BU

13.4 Different Ways of Cyberbullying


1. Exclusion – Leaving out and targeting a person in an
online group or chat.
2. Flaming – Using rude language in emails or chat
sessions. Harsh language may be accompanied with
images to hurt the target.
3. Outing – Sharing personal information, photos, videos
of the target person online.
4. Email Threats – Sending emails to threaten the target.
5. Harassment – Sending hurtful messages to the target
multiple times.
6. Phishing – Extracting personal information from the
target forcibly and accessing his/her profile including
passwords etc.
7. Denigration – Post gossips to hamper reputation or
friendships.

Figure 13.3 – Different Ways of Cyberbullying

8. Email and Cell Phone Image Dissemination – Publishing negative statements and obscene images to
make fun of target person.

To know more about different ways of cyberbullying, visit –


https://www.youtube.com/watch?v=V2EZs7FUDEs
https://www.youtube.com/watch?v=0Xo8N9qlJtk

93
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
13.5 Effects of Cyberbullying
1. Depression, anger, nervousness and mood swings
without reason.
2. Loss of interest in going to work place.
3. Concealing personal information on the internet.
4. Limited usage of internet followed by deleting accounts
and blocking contacts.
5. Turning anti-social.
6. Frequent complaints of stomach ache, headache, and
other health issues.
7. Loss of sound sleep and appetite.
8. Suicidal thoughts.
Figure 13.4 – Effects of Cyberbullying

9. Agitated looks and stress.


10. Aggressiveness.

To know more about effects of cyberbullying, visit –


https://www.youtube.com/watch?v=DJGTccn_8us
https://www.youtube.com/watch?v=N_FFgMtyOI0
https://www.youtube.com/watch?v=0oGFh0mwrjM
http://www.bullying.co.uk/cyberbullying/effects-of-cyberbullying/

13.6 Preventing Cyberbullying


1. Educate yourself – Know what is cyberbullying, how it occurs and talk to your family
members about it.
2. Protect your password – Passwords should be strong enough so that no one can
guess them easily.
3. Review photos you post – Preview photographs before posting them.
4. Pause before you post – Always re-think before you post anything online.

Figure 13.5 – Preventing Cyberbullying

5. Setup privacy Control – Check your privacy settings to ensure your information is available only to your
family and friends.
6. Google yourself – After regular intervals, google your full name to know if your personal information
gets displayed.
7. Do not open messages from unknown people – Delete messages that you receive from contacts which
are not in your contact list. It can be a virus.
8. Log out from your accounts on public computers – Do not share your passwords. Make sure you log out
from the computer you are using.
9. Don’t Respond – If someone cyberbullies you, do not respond or retaliate, talk to your family members
and block the bully. Keep evidence to take legal action.

94
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
To know more about preventing cyberbullying, visit –
https://www.youtube.com/watch?v=91euQfsYQx0
https://www.youtube.com/watch?v=Jwu_7IqWh8Y
https://www.youtube.com/watch?v=dkG00Czb4ho

13.7 What to do if You are Cyberbullied


1. Seek help immediately and talk to your parents/family members.
2. Involve police.
3. Try to locate the culprit with the help of your internet service provider.

13.8 Chapter Objective Checklist


S.No. SKILLS ACQUIRED YES NO
1. I know what cyberbullying is.
2. I know what triggers people to cyberbully.
3. I know the different ways of cyberbullying.
4. I know the harmful effects of cyberbullying.
5. I know how to protect myself and my known ones from cyber bullying.
6. I can take action against cyberbullies.
7. I understand the risks of being a cyber bully.
8. I can help people who are victims of cyberbullying.
9. I can spread awareness about cyberbullying.
10. The links presented in the chapter are interesting and useful.
11. The information given in the chapter will help us stand against cyberbullying.
12. I would like to explore more about cyberbullying.

13.9 Let’s Recap


1. Cyberbullying – Using the internet or mobile technology to harm another person intentionally.
2. Digital Pile-On - Cyberbullying when the cyberbully is anonymous and the target does not know
the cyberbully.
3. Exclusion - Targeting a person in an online group or chat.
4. Flaming - Using rude language in emails or chat.
5. Outing - Sharing personal information, photos, videos of a person online without his/her permission.
6. Harassment - Sending hurtful messages to a person multiple times with the intention to hurt the
person.
7. Phishing – Taking out personal information from a person forcefully and accessing his/her profile.
8. Denigration - Posting gossips about a person to hamper his/her reputation.
9. Cyberbully - Person who does cyberbullying.
10. Cyberbullicide - Suicide committed by cyberbullying victims.

95
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
13.10 Did You Know?
1. Approximately 43% of kids have been cyberbullied. 1 in 4 experienced it more than once!
2. Approximately 70% of students admitted they have seen cyberbullying!
3. Over 80% of teens use a cell phone regularly increasing the chances of being a victim of
cyber bully!
4. Approximately 68% of teens admit that cyberbullying is a serious problem!
5. Approximately 81% of young people believe they can get away easily with cyberbullying as
compared to traditional bullying!
6. Approximately 90% of teens have ignored cyberbullying after seeing it on social media!
7. Girls are prone to cyberbullying twice as much as boys!
8. Approximately 75% of students admit they have seen online - one student bashing another student!
9. Self-esteem is lower in cyberbullying victims!
10. Cyberbullying is less common than physical bullying!

13.11 References from Internet


https://en.wikipedia.org/wiki/Cyberbullying
https://www.stopbullying.gov/cyberbullying/what-is-it/
https://nobullying.com/why-do-people-cyberbully/
http://www.2knowmyself.com/why_do_people_cyberbully
http://bullyproofclassroom.com/10-most-common-cyber-bullying-tactics
http://resources.uknowkids.com/blog/bid/173713/10-Signs-Your-Child-is-a-
Cyberbullying-Victim
https://www.verywell.com/what-are-the-effects-of-cyberbullying-460558
http://www.momsteam.com/health-safety/10-tips-teens-prevent-cyberbullying
http://www.safeteens.com/tips-to-stop-cyberbullying/
http://www.americanhumane.org/children/stop-child-abuse/fact-sheets/cyber-bullying-prevention-
and-intervention.html?referrer=https://www.google.co.in/

96
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 14 – Digital Privacy

14.1 Objectives
After going through this chapter the students should be able to:

1. Explain digital privacy.


2. Understand why digital privacy is needed.
3. Name the websites that collect personal information of online users.
4. Emphasize on digital privacy and take precautions.
5. Name data blockers and their functionality.
6. Know the importance of keeping their personal information private.
7. Know about the personal information which can be shared online.

14.2 Introduction
It has been observed that personal information of online users is being used
without their permission and passed to third parties. Digital privacy is
protection of personal information of online users and each person is
responsible for his own digital privacy. Never post anything online that you do
not want to share with your friends or future employer. In this chapter, we will
see why digital privacy is important and what actions can we take to protect it.
Figure 14.1 – Digital Privacy

To know more about digital privacy, visit –


https://www.youtube.com/watch?v=sYBSgL6peI0
https://www.youtube.com/watch?v=fIsIpRA31H8
http://rthk.hk/mediadigest/20090715_76_122318.html
https://www.youtube.com/watch?v=-e98hxHZiTg
https://www.youtube.com/watch?v=sIFfYxgDpRo

14.3 Why Digital Privacy


Personal information consists of name, address, date of birth etc. It is very important to
keep them safe and private so that they cannot be misused. It might be possible that
there is an email address which you haven’t used for years but your information is still
there on the internet and can be misused. It might also be possible that the person is not
very active online but has purchased something or applied for verification, this
information can also be misused.
Figure 14.2 – Why Digital Privacy

97
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
There are websites that can give information about you which are not available on search engines. Some of the
reasons to keep your personal information safe are:

1. Your identity could be stolen: When you use the internet on a device, the information that you enter
during your use simultaneously gets stored on a server. Hackers steal this information and use it to their
advantage. For example, they can use your credit card information to shop online and the bill will come
in your name. There are many similar threats like this from hackers.
2. You can get hurt: Sharing your location on social media makes all your contacts aware of your
whereabouts. Never share your location with people whom you do not know.
3. You can lose opportunities: Hiring managers and admission officers might visit your facebook page or
your Instagram photos. There might be images which are compromised and you may miss an
opportunity.
4. You could get ripped off: Nowadays, schools are also going digital. Schools use different software to
teach students. Report cards, feedbacks etc. are being uploaded on the website so that parents can
access the information. If the information is not uploaded securely, it can not only be accessed by parents
but can also be accessed by third parties who can misuse the information or use the information to sell
their products to you. You probably would not want any of the above happenings. For example, if the
feedback which is uploaded on the website is retrieved by an unknown third party they may use this
information to their advantage.
5. You could get labeled and humiliated: People might use your personal information and pictures to make
fun of you or to humiliate you.

To know more about about reasons for digital privacy, visit -


https://www.youtube.com/watch?v=VPBH1eW28mo
https://www.youtube.com/watch?v=ZBX5PKvkbXA
https://www.youtube.com/watch?v=0L0geYTJBOM
http://digitaldueprocess.org/index.cfm?objectid=37940370-2551-11DF-8E02000C296BA163

14.4 Are People Worried about Digital Privacy?


Only a few online users are worried about their
digital privacy. According to a study in the USA,
only 20% online users worry a lot about their
digital privacy, 46% worry a little and 34% do
not worry at all.

Figure 14.3 – Are People Worried about Digital Privacy

Statistics show, only 9% of teen social media users are concerned that their data will be accessed by strangers.

Source: http://www.pewinternet.org/2013/05/21/teens-social-media-and-privacy/

To know more about people worrying about digital privacy, visit –


https://www.youtube.com/watch?v=-no8VgrYY_8

98
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
14.5 Look Here
We don’t know what information about oneself is accessible to others or who
knows about our buying trends online, but we know what information about us is
available online and it is advised to keep it private.

1. Google: Google yourself. Make use of the service “Me on the Web” so that you
get a notification whenever your personal data is made available on the
internet.
2. Google Alerts: Set up google alerts so that an email is sent to you whenever
your name appears on the internet.
Figure 14.4 – Look Here

3. PeekYou*: These kinds of websites collect all the information that you fill while registering for any
website. They also collect your website interests and social habits.
4. Spokeo*: This is also a website which collects information about individuals but at a cost.

To know more about increasing digital privacy, visit –


https://www.youtube.com/watch?v=CTzxtQD5_I0
https://www.youtube.com/watch?v=nuodsxbUq2k
https://www.youtube.com/watch?v=YLRlHiP0upk
https://www.youtube.com/watch?v=oF9ePpx4vgQ
https://www.cnet.com/how-to/remove-delete-yourself-from-the-internet/

*Other brands and names may be claimed as property of others.

14.6 Who Cares


Websites make money from your personal information. Depending on
your searches and the websites you visit, your personal information is sold
to third parties. You must have noticed that you receive discount offers in
your email related to the searches that you do on the internet. These
emails are sent by these third parties.

Figure 14.5 – Who Cares

This is one of the major reasons why you must be careful while entering your personal information online.

99
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
14.7 Take Charge
There are simple steps that you can take to enhance digital
privacy:

1. Private browsing: Use private browsing by deleting the


cookies at the end of each session.
2. Keep a check on your digital identity: Use different devices,
email addresses, credit cards on different websites so that
it is difficult to have one set of your data.
3. Check private settings: Check the default settings of your
system and see if you are comfortable with them.
4. Read privacy policies: Read the privacy policies of different
websites that you visit.
5. Clear browsing history: Clean your browsing history at
regular intervals.
6. Installation of software: Install safety software and keep
your devices password protected.
Figure 14.6 – Statistics of Electronic Aggression

7. Use secure wireless connections, websites etc.: When entering personal information, always make
sure you are on a secure wireless connection. Secure wireless is the one where you need to log in using
a username and password.
8. Have computer disposable procedures: Hard drive of your computer contains confidential
information. When you dispose off the computer, make sure that you have wiped off all the data from
the hard drive. There are inexpensive utility programs in the market that clean your hard drive.
9. Recognize phishing scam: You might receive emails asking for your personal details and bank account
number because you have won a lottery. These are spam emails and should not be entertained.
10. Communicate the importance of digital privacy: Talk about digital privacy amongst your friends.
11. Remove your profile: You can approach websites that collect your online personal information and ask
them to remove your profile. Examples of such websites are PeekYou*, Spokeo* etc.

To know more about increasing digital privacy, visit –


https://www.youtube.com/watch?v=qbP1nvbpFG8
https://www.youtube.com/watch?v=g-C2tGcsrq0
https://www.youtube.com/watch?v=85mu9PLWCuI

14.7.1 More About Data Blockers

There are applications that block websites which gather and store your
information. Some of them are:

1. PrivacyFix: It scans privacy issues of your system and redirects you to


the settings needed to be fixed. It also informs when other websites
change their privacy policies.
2. DuckDuckGo: It does not save your personal information but if you
download some toolbars from the site, your browsing habits get
Figure 14.7 – Data Blockers stored.

100
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
3. IP Blockers: They are tools that do not let websites to capture your location. They block your IP and
you can be online without the internet knowing your location.

To know more about data blockers, visit –


https://www.youtube.com/watch?v=K0dM6TzN1OE
https://www.youtube.com/watch?v=Ft1imEG9Moo
https://piwik.pro/2016/08/security-measures-protect-digital-privacy/

14.8 Chapter Objective Checklist


S. No. SKILLS ACQUIRED YES NO
1. I know what digital privacy is.
2. I know why digital privacy is necessary.
3. I know whether people are worried about their digital privacy or not.
4. I can name the websites that gather personal information of online users.
5. I know the reasons why people are interested in personal information of online
users.
6. I know the precautions to protect my personal information.
7. I know what data blockers are.
8. I can give examples of data blockers.
9. I know what personal information should be shared online.
10. The links presented in the chapter are interesting and useful.
11. The information given in the chapter will help us protect our personal
information.
12. I would like to explore more about digital privacy.

14.9 Let’s Recap


1. Digital Privacy - Protection of personal information of online users.
2. Google Alerts - Alerts where email is sent to you whenever your name appears on the internet.
3. PeekYou - Website that collects personal information of online users.
4. Spokeo - Website that collects personal information of online users at a cost.
5. Private Browsing - Deleting cookies after using the internet every time.
6. Secure Wi-fi - Wi-fi which needs a username and password to get connected.
7. PrivacyFix - Scans the privacy issues of your system and redirects you to the settings that need to be
fixed.
8. IP Blockers - Applications that do not let websites capture your location.
9. COPA - Child Online Protection Act (COPA) of 1998 was implemented by the U.S. Congress. It states
that it is a crime for commercial websites to make pornographic material available to juveniles.
10. CIPA - Children’s Internet Protection Act (CIPA) of 2000 is implemented according to which public
schools and libraries who receive federal e-rate funds, should use a portion of those funds to filter their
internet access.

101
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
14.10 Did You Know?
1. Social Networks compromise your privacy to make money!
2. Some major companies intentionally installing malware on your computer to make
money!
3. Casinos are more concerned about their customer’s privacy than most of the retailers!
4. Your credit card’s magnetic strip has all your secrets!
5. Most companies are not equipped enough to protect their customer’s privacy!
6. When you use the internet, your internet history has already been saved and can be used by companies!
7. Approximately 21% of the internet users have had an email or social networking account which has been
taken over by someone else without permission!
8. Approximately 59% of the internet users do not believe that they can be completely anonymous online!
9. Approximately 68% of the internet users believe current laws are not good enough to protect people’s
online privacy!
10. Approximately 6% of the internet users have been a target of an online scam and lost money!

14.11 References from Internet


http://www.avg.com/content/dam/avg/img/campaigns/ebooks/ebooks-
documents/Digital-Privacy.pdf
https://txssc.txstate.edu/topics/digital-safety/articles/promoting-privacy
https://www.commonsensemedia.org/blog/6-reasons-why-parents-should-care-about-
kids-and-online-privacy#
http://college.usatoday.com/2015/04/03/study-millennials-indifferent-about-about-
digital-privacy/
https://www.internetsociety.org/blog/tech-matters/2015/01/four-basic-steps-protecting-your-digital-
privacy-2015
https://solutio-inc.com/digital-privacy-what-is-it-and-why-should-i-care/
http://www.igi-global.com/dictionary/digital-privacy/46799
http://www.wisegeek.com/what-is-digital-privacy.htm
https://www.americanpressinstitute.org/publications/reports/survey-research/digital-lives-of-
millennials/
http://college.usatoday.com/2015/04/03/study-millennials-indifferent-about-about-digital-privacy/

102
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 15 – Internet Safety

15.1 Objectives
After going through this chapter the students should be able to:

1. Know the meaning of internet safety.


2. Infer the common threats to online safety.
3. Know different online safety measures.
4. List precautions to be taken against cyberbullying.
5. List precautions to be taken against cyber predators.
6. List precautions to be taken against identity theft.
7. List precautions to be taken against gaming addiction.
8. List precautions to be taken against cyber stalking.
9. Know about mobile phone safety.
10. Protect oneself and family and friends from cybercrime.

15.2 Introduction
Do you think you are safe on the internet? Have you ever
received messages which make you uncomfortable? So, here
is your answer! You are not safe on the internet but if you
take precautions, you can for sure be safe online. Internet
safety is adhering to safe practices online and minimizing the
risks of being harmed by the dangerous behaviour of others.
The behaviours include cyberbullying, cyberstalking etc.
Internet safety is not only a concern for kids but for adults as
well.

Figure 15.1 – Internet Safety

‘Safer internet day’ is celebrated in February to raise awareness about internet safety.

To know more about internet safety, visit –


https://www.youtube.com/watch?v=PIRd4RMBc08
https://www.youtube.com/watch?v=armH7MckG2Q
http://safe.met.police.uk/internet_safety/get_the_facts.html

103
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
15.3 Common Threats
Some of the common threats to internet safety are:

1. Cyberbullying is harassing someone using technology by sending or


posting threatening or mean messages. Examples are abusive emails,
inappropriate image tagging, uploading of embarrassing photographs
etc.
2. Cyber Predators are adults who exploit children and teenagers with
the help of internet. They use mobile phones, chat rooms etc. to
exploit. Their main motive is sexual abuse.
Figure 15.2 – Threats to Internet Safety

3. Gaming Addiction is excessive use of online games at the cost of health, education and other day to day
activities. Gaming addiction leads to social isolation, mood swings etc.
4. Identity Theft is a threat where a person makes illegal use of someone else’s personal information.
5. Cyber Stalking includes harassing an individual, group or organization using technology. It includes false
accusations, defamation etc.

To know more about common online threats, visit –


https://www.youtube.com/watch?v=AbOGHEN5cz0
https://www.youtube.com/watch?v=qnkzH5Xkasg

15.4 General Safety Measures


We can take simple precautions and save ourselves from these internet threats. Some of them are:

1. Don’t post any personal information on the internet. Personal information includes your address, email
address, mobile number etc.
2. Think twice before posting your photographs or videos online. Once they go online, not only can
anyone see them but anyone can download and misuse them as well.
3. Your privacy settings should be as high as possible.
4. Never give out your passwords.
5. Refrain from chatting to strangers.
6. Don’t accept friend requests or don’t be friendly with people whom you don’t know.
7. Don’t meet people in person whom you have met online.
8. Think carefully before posting online. Remember, you need to respect other people’s views as well.
9. If you see something with which you are not comfortable, report the same to your family members.

To know more about general safety measures online, visit –


https://www.youtube.com/watch?v=exAnOtYk7aQ
https://www.youtube.com/watch?v=hP18GfVBUy8
https://www.youtube.com/watch?v=NqlTOOY9CIo

104
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
15.4.1 Protective Measures from Cyberbullying

Figure 15.3 - Cyberbullying on Different Social Networking Sites

1. If you receive any kind of unpleasant message or picture, do not respond. Report the same to your
family members.
2. If you are in a chat room and you receive inappropriate message(s), leave the chat room and refrain
from using the same chat room.
3. If you receive any kind of threat, save the conversation or picture as a written proof and inform your
family members. Take the help of police if and when needed.
4. Do not cyberbully others.

If you are being cyberbullied, it is not your fault and you can approach your family members/police without
feeling ashamed.

105
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
15.4.2 Protective Measures from Cyber Predators

1. Follow age limit on social networking sites.


2. If someone is harassing you sexually (virtually), do not be scared or feel
ashamed, tell your family members immediately.
3. Do not get influenced by people who say they can do palmistry or can
help you succeed in life.
4. Do not confide in a stranger. Problems can best be solved by people you
know. Best people to solve your problem are your family members.
5. Never download pictures, videos or audio files from a source you do not
trust.
6. Choose a gender-neutral nickname.

Figure 15.4 - Precautions from Online


Predators

To know more about protective measures from cyber predators, visit –


https://www.youtube.com/watch?v=196eAulgh3I
https://www.youtube.com/watch?v=cQy-Nn9QZsc
https://avoiding-online-predators.wikispaces.com/How+to+Protect+Yourself

15.4.3 Protective Measures from Identity Theft

1. Do not write your password or any other confidential details


on places like the last page of your notebook, mobile phone
notepad, diaries etc. It’s best to memorize them. In case, you
want to write it, write the hint instead of actual details.
2. Make sure your mobile is password protected.
3. Do not share your passwords even with your best of friends.
4. Use firewall and anti-virus on your computers.
5. Keep your computer password protected.
6. Never leave debit cards, credit cards etc. anywhere
unattended.
Figure 15.5 - Precautions from Identity Theft

7. If you receive a suspicious email that you have won a lottery, do not provide any personal information.
8. Do not open attachments from an email where the sender is not known to you.

To know more about protective measures from identity theft, visit


https://www.youtube.com/watch?v=UQCzTkzIypU
https://www.youtube.com/watch?v=bXxIXfa7-KI
http://www.practicalmoneyskills.com/personalfinance/creditdebt/identitytheft/protect.php

106
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
15.4.4 Protective Measures from Gaming Addiction

1. Make a daily schedule to balance your online and


offline activities.
2. Do not compromise your daily work in order to
play games.
3. If you think you are having gaming addiction, seek
help from your friends, family members, mentors
or even doctors.
4. Gaming should only be your hobby and not the
main activity of the day.
5. Keep a track on how much time you spend on
playing online games. If you notice an increase,
take appropriate action.
6. Keep reading about ill effects of indulging in
gaming addiction.
Figure 15.6 - Precautions from Gaming Addiction

7. Decide a day in a week when you will not use any electronic item, like computer, TV, mobile phone etc.

To know more about protective measures from gaming addiction, visit –


https://www.youtube.com/watch?v=7o00lcnJBik
https://www.youtube.com/watch?v=GSkA_8k0PfA
http://www.wikihow.com/Avoid-Video-Game-Addiction

15.4.5 Protective Measures from Cyberstalking

1. Make sure you are aware of the information available on the internet about you and keep that
information to the minimum.
2. Avoid sharing your information on public forums.
3. Digital devices that you use should have updated antivirus and spyware software.
4. Make sure that the security is high on your wi-fi router.

In case you are affected by cyberstalking, make sure you do the following:

1. Gather as much evidence as you can.


2. Report the incident to the police with the help of your family members.
3. Take help from relevant organizations.
4. You can report such incidents or abuse on social networking sites.

To know more about protective measures from cyber stalking, visit –


https://www.youtube.com/watch?v=A2EHLbcuk6s
https://www.youtube.com/watch?v=MMZzyRi1YaM
http://womensissues.about.com/od/violenceagainstwomen/a/CyberPrevention.htm.

107
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
15.4.6 Mobile Phone Safety

Some of the mobile safety tips are:

1. Don’t reply to any nasty messages.


2. Don’t reply to a text from an unknown number.
3. Keep the messages that you receive and the ones that you send so that you can
show it to any family member if need be.
4. Don’t answer calls from unknown numbers.
5. Block numbers of people who are sending you inappropriate messages.
Figure 15.7 - Mobile
Safety

6. Don’t give your mobile number to strangers.


7. Don’t send pictures to strangers.
8. If there is a problem, report it to the police with the consent of your family members.

To know more about mobile phone safety, visit –


https://www.youtube.com/watch?v=gOTRBGsj0B4
https://www.youtube.com/watch?v=HrllGKoh0lA
https://staysafeonline.org/stay-safe-online/mobile-and-on-the-go/mobile-devices

15.5 Chapter Objective Checklist


S. No. SKILLS ACQUIRED YES NO
1. I know what internet safety is.
2. I know common threats to online safety.
3. I know online safety measures.
4. I know precautions to be taken against cyberbullying.
5. I know precautions to be taken against cyber predators.
6. I know precautions to be taken against identity theft.
7. I know precautions to be taken against gaming addiction.
8. I know precautions to be taken against cyberstalking.
9. I know how to be safe on my mobile.
10. The links presented in the chapter are interesting and useful.
11. The information given in the chapter will help us to be safe on the internet.
12. I would like to explore more about internet safety.

15.6 Let’s Recap


1. Internet Safety - Following safe online practices thus minimizing the risk of being harmed.
2. Cyber Predators - Adults who exploit children and teenagers online.
3. Gaming Addiction - Excessive use of online games at the cost of health, education and other day
to day activities.
4. Identity Theft - Threat when a person makes illegal use of someone else’s personal information.
5. Cyberstalking – Harassing an individual, group or organization using technology.

108
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
6. Circumventor Sites - Websites that allow children to access filtering software in order to access the
blocked websites.
7. Cookie - A piece of information automatically recorded on your computer by some websites about the
web pages you visited.
8. Cybercrime - Any Internet-related illegal activity.
9. Filter - Block certain types of content from appearing on the screen.
10. Gaming - Online games, which can be played individually or by multiple online users.

15.7 Did You Know?


1. Approximately 32% of teens hide their browsing history from their parents!
2. Approximately 16% teens have email addresses and social networking accounts that they
don't want their parents to know about!
3. Approximately 11% of teens admit they know how to turn off parental control on the
internet!
4. Approximately 28% people have been contacted by a stranger they met online!
5. Approximately 18% of teens do not tell their parents that they have been contacted by a stranger online
and they chat with the stranger!
6. Child predators can be found out on social networking, gaming and chat sites trying to find their
victims!
7. Many children trust strangers whom they meet online!
8. Approximately 41% of people who play online video games confessed that they played computer
games in order to escape from reality!
9. Students addicted to video games have lower academic grades as compared to their non-addicted
friends/colleagues!
10. People who have higher levels of anxiety, aggressive behaviour etc. are at a higher risk of video game
addiction!

15.8 References from Internet


https://en.wikipedia.org/wiki/Internet_safety
https://en.wikipedia.org/wiki/Cyberstalking
http://www.safetynetkids.org.uk/personal-safety/staying-safe-online/
http://www.surveilstar.com/protect-your-children-from-online-predators.html
http://moneyning.com/credit/40-precautions-for-preventing-identity-theft/
http://www.houstontx.gov/police/crime_prevention/id_theft.htm
http://www.informationweek.com/desktop/five-ways-to-avoid-gaming-addiction/d/d-
id/1039774?
http://www.auburn.edu/citizenship/Game_addiction.html
https://www.getsafeonline.org/protecting-yourself/cyberstalking/
http://kidshealth.org/en/teens/internet-safety.html?WT.ac=t-ra

109
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 16 – Stranger Danger

16.1 Objectives
After going through this chapter the students should be able to:

1. Understand what stranger danger is.


2. Be the best judge of potential dangers and safe strangers.
3. Learn possible dangers that come from a stranger.
4. Understand how to deal with stranger danger.
5. Identify misuses of the internet.
6. Know the precautions to deal with stranger danger.

16.2 Introduction
Sure enough, technology is an integral part of your lives.

Since you spend a lot of time on Internet, you should know the
possible threats while you are online.
Do you know what “Stranger danger” is? …. No?

Stranger Danger is the danger to children and adults, presented by


online strangers.

Figure 16.1 – Stranger Dangers

To know more about stranger danger, visit –


https://youtu.be/6jMhMVEjEQg

16.3 Types of Dangers from a Stranger

The Internet is no doubt, a very vast and powerful tool helping in every aspect of your
life. However, even a simple tool like a hammer can be misused, the Internet can also be
used inappropriately.

It is, however, mandatory that every person using the Internet must be taught how to wield it effectively, or it
will end up causing more harm than good.

Following are the five most devastating potential dangers from the internet.

110
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
16.3.1 Cyberbullying

The act of harming, harassing, tormenting, threatening,


humiliating, embarrassing or otherwise targeting another
person using the Internet is called cyberbullying.

To know more about cyberbullying, please visit –


https://www.youtube.com/watch?v=UGyCUI7H0TY

Figure 16.2 Cyberbullying

16.3.2 Online Predators

Online Predators are online adults who exploit children or


adolescents for sexual or other abusive purposes. They are
sexual predators who use the Internet to locate, target and
victimize minors.

To know more about this, please visit –


https://www.youtube.com/watch?v=WA8jmgEl1YQ

Figure 16.3 – Online Predator

16.3.3 Inappropriate Content

The internet offers a chance to explore the world overcoming the


constraints that are there in the ‘real’ world. Content on the internet is
not divided age wise or area wise, it is common for all the users.
Without supervision and guidance, a young child might find content
that is not meant for him/her or inappropriate content.

Figure 16.4 Inappropriate Content

111
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
16.3.4 Damaged Reputation

Mobile devices with cameras allow sharing


images, videos, content etc. across social
networks. This means that untrained citizens
can easily post content which is not
appropriate hence resulting in a bad
reputation of the user.

The internet provides a platform for


gossiping and defamation.
Figure 16.5 Damage Reputation

16.3.5 Excessive Gaming

Playing online games occasionally is not harmful but people are now used to
spending hours playing online games. This can be dangerous.

Do you know, excessive Gaming can be harmful for you? Again you are right. Yes,
it is harmful.

Figure 16.6 Game addiction

To know more about Game Addiction,visit –


https://www.youtube.com/watch?v=AtkQtR-eGdY

16.4 Precautions
It is our duty to know the dangers of speaking with online strangers. We must know that real world rules apply
online as well. Try to figure out why interacting with strangers online can be dangerous, what the real world
consequences can be and why we should stick with people we know in real life?

1. Take precautions while making friends on social media and gaming sites that we use on a regular
basis. Ensure they are real world friends too.
2. Delete and block any followers and friends whom we do not know.
3. Fix up ‘play dates’ for online games between you and your real friends.
4. Do not share your personal information.

112
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
16.5 Chapter Objective Checklist
S. No. SKILLS ACQUIRED YES NO
1. I have understood what stranger dangers are.
2. I understand what cyberbullying is.
3. The videos used in this lesson are truly relevant and easy to understand.
4. I understand the dos and don’ts while being online.
5. I will not support any harmful activity in my friend group.
6. I have understood the negative side of the internet too.

16.6 Let’s Recap


1. Stranger - Person unknown to you.
2. Safe Stranger - Policeman, guard, a parent with kids.
3. Predators – Persons trying to contact you with bad intention.
4. Google – A search engine and a software used for communication.
5. Cyberbullying – Act of harassing a person online.

16.7 Did You Know?


1. Boys are less likely to be cyberbullied as compared to girls!
2. Approximately 5,00,000 cyber predators are there!
3. More than 11% of teens are “hyper-networkers” who spend more than three hours per
school day on social networking sites!
4. One-third of teen gamers admit playing games with people they first met online!
5. Approximately 72% of Internet-related missing children cases involve children who are 15
years or above!
6. Only 1 in 10 victims inform his/her parents about their abuse!
7. In the United States, there are approximately 799,041 registered sex offenders!
8. Approximately 33% of teens are Facebook friends with strangers!
9. Approximately 44% of teens confessed they’ve watched something online which is not appropriate
for them!
10. Very few inappropriate internet episodes are reported to authorities!

113
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
16.8 References from Internet
https://en.wikipedia.org/wiki/Stranger_danger
http://zeeko.ie/stranger-danger/online-stranger-danger/
www.neotericuk.co.uk
http://mamabearapp.com/internet-stranger-danger/
http://www.covenanteyes.com/2012/05/22/5-dangers-of-the-internet-for-kids/
http://www.raisesmartkid.com/3-to-6-years-old/4-articles/34-the-good-and-bad-
effects-of-video-games
https://www.dosomething.org/us/facts/11-facts-about-cyber-bullying
http://www.puresight.com/Pedophiles/Online-Predators/online-predators-statistics.html
http://www.guardchild.com/statistics/
https://www.nspcc.org.uk/preventing-abuse/child-abuse-and-neglect/online-abuse/facts-statistics/

114
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Digital Security

115
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 17 – Effective Passwords

17.1 Objectives
After going through this chapter the students should be able to:

1. Know what a password is.


2. Infer the importance of having a password.
3. Realize the importance of having a strong password.
4. List the characteristics of a strong password.
5. Know how to create a strong password.
6. Use software to check if their passwords are strong enough.
7. Take care of their passwords.
8. Create strong passwords for all their accounts.
9. Protect themselves from getting their passwords hacked.
10. Spread awareness about the importance of having a strong password.

17.2 Introduction
We use passwords to access our email addresses, our accounts on
social media, to take out money from ATM, to do internet banking,
etc. Passwords are used everywhere. What is a password? A
Password is a string or collection of characters which is used to get
access to a secret which is not open to all the people. Password
ensures that only the authorized person is accessing the
information. A password should be such that it should not be
guessed easily. Passwords are used with usernames. On some sites,
passwords are also used with 4 digit PIN.
Figure 17.1 - Passwords

To know more about passwords, visit –


https://www.youtube.com/watch?v=KPLgsHAdx4Q
https://www.youtube.com/watch?v=1MZIf0UOwvQ

17.3 Why Do We Need Passwords


Why do we need passwords for our accounts? You do not want everyone to look at the data that you have and
that’s the biggest reason to use a password. Other reasons why we need passwords are:

1. Passwords safeguard our data. If our computer or internet account has valuable information, we must
defend that information against virus attacks, online hackers etc.

116
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
2. People want to access your bank accounts which you need to safeguard.
3. People want to purchase items with your money, which for sure, you don’t want.
4. People want to impersonate you on social networking and dating sites with which you are not
comfortable.
5. People want to send emails in your name which can cause problems for you.

To know more about the use of password and its recovery, visit –
https://www.youtube.com/watch?v=KPLgsHAdx4Q
https://www.youtube.com/watch?v=w3xuPuEQm4k

17.4 Need For a Strong Password


Why do people need a strong password or why do
websites, not only ask but force you to create strong
passwords?

Password strength is the effectiveness of a password,


that is, how many guesses and brute-force attacks the
password can resist. Initially, there was not much
planning required to create a password. Just pick up a
word that is not very common and you had your
password ready. But today, hackers are using different
Figure 17.2 – Need of a Strong Password

methods to steal your passwords. There are software available to hack your passwords. To protect your
password from being hacked, you need a strong password. There is no guarantee that strong passwords will not
be hacked but for sure, strong passwords take more time to get hacked. So, it is always a good practice to have
a strong password.

To know more about the need of strong password, visit –


https://www.youtube.com/watch?v=7UaPL5PGywo
https://www.youtube.com/watch?v=z25UlNNHGTw
https://nakedsecurity.sophos.com/2014/10/24/do-we-really-need-strong-passwords/

17.4.1 Characteristics of a Strong Password

How do you know if the password you have created is strong or


not? Here are some characteristics of a strong password:

1. A password cannot be found in a dictionary.


2. Password must contain special characters (like @#$W%^&*
etc.) and numbers.
3. A password should be a mix of upper and lower case alphabets.
4. A password should have a minimum length of 10 characters.
5. A password should not be guessed easily based on your
personal information like name, date of birth etc.

Figure 17.3 – Characteristics of a Safe Password

117
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
6. Passwords should not have consecutive identical characters.
7. While creating a password, do not use all numbers or letters.
8. Do not reuse old passwords.

To know more about characteristics of a strong password, visit -


https://www.youtube.com/watch?v=n6dEz3YNfzI
https://www.youtube.com/watch?v=uXQBaHapfpE
https://www.youtube.com/watch?v=z25UlNNHGTw
https://its.lafayette.edu/policies/strongpasswords/

17.4.2 Creating a Strong Password and Remembering It

Since it is advisable to create a strong password, here are a few tips to do


the same:

1. Randomly replace letters with words. For example, python


becomes py1h0n.
2. Pick your favourite phrase and take the first alphabet of each word.
For example, if your favourite phrase is “Honesty is the best policy”,
you can make ‘hitbp’ as your password.
3. Take a word and reverse spell. For example, leopard becomes
‘drapoel’.
4. Don’t use common substitutions. For example, do not use 0 for o.

Figure 17.4 – Creating a Strong Password

5. When letters are repeating themselves in your password, do not always replace the letters with the
same digits.
6. Pick a pattern on your keyboard and type some of the letters using shift key randomly.
7. Your each account should have a different password.
8. Have two base passwords. One password should be used for your accounts which contain your credit
card information, personal information etc. The second password can be a simple one for your forums
etc.
9. Update your passwords every few weeks or months. More often you do, the better it is.
10. Use a password manager that remembers, encrypts and protects your password.
11. Make your nth letter capital while creating a password.

Your password strength can be checked at http://www.passwordmeter.com/.

To know more about creating a strong password, visit –


https://www.youtube.com/watch?v=aEmF3Iylvr4
https://www.youtube.com/watch?v=hYyWgPXfx9U
https://www.youtube.com/watch?v=Oc6NiSrlvVc
http://lifehacker.com/four-methods-to-create-a-secure-password-youll-actually-1601854240

118
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
17.4.3 Looking After Your Passwords

Since you must keep your passwords safe, here are some tips
to take precautions so that your password does not leak out.

1. Never tell your password to anyone.


2. Don’t enter your password when someone is looking at it.
3. If you are writing a password somewhere, make sure you
write in a way that it is hard to guess.
Figure 17.5 – Looking After Your Passwords

4. Do not send your passwords in an email.

To know more about protecting your account, visit –


https://www.youtube.com/watch?v=k8xfrgBircE
https://www.youtube.com/watch?v=hYyWgPXfx9U

17.5 Chapter Objective Checklist


S. No. SKILLS ACQUIRED YES NO
1. I know what a password is.
2. I know the use and importance of having a password.
3. I know why it is important to have strong passwords.
4. I know the characteristics of a strong password.
5. I know how to create a strong password.
6. I know software or applications that can check the strength of my password.
7. I can take care of my passwords from being hacked.
8. I have strong passwords for all my accounts.
9. I have different passwords for all my accounts.
10. The links presented in the chapter are interesting and useful.
11. The information given in the chapter will help us create strong passwords.
12. I would like to explore strong passwords.

17.6 Let’s Recap


1. Password - String or collection of characters which is used to get access to a computer system
or any device with internet.
2. Password Strength - Effectiveness of a password.
3. Attribution - Process of confirming who is behind a hack.
4. Backdoor - Bypassing authentication and diving right into the program.
5. Black Hat - Someone who hacks for personal gain or engages in illicit and illegal activities.
6. Botnet - Networks of devices or computers controlled by an attacker.
7. Brute Force Attack – A crude way of breaking into a password-protected system.
8. Cracking - Breaking into a security system, usually for criminal purposes.
9. Def Con - One of the most famous hacking conferences of the world held in Las Vegas, every summer
after 1992.

119
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
10. Encryption - Process of making data or messages unreadable and secret.

17.7 Did You Know?


1. Any device, account or file which is protected by a password is safe!
2. Your passwords remain secure when you only deal with reputable online businesses!
3. Strong passwords can not be hacked easily!
4. Hackers use sophisticated methods and latest tools to steal your password!
5. Approximately 2,000,000 accounts use 123456 as password!
6. password is used as a password nearly by 345,843 accounts!
7. adobe123 is used as a password nearly by 211,659 accounts!
8. 12345678 is used as a password nearly by 201,580 accounts!
9. Some of the worst adobe passwords include QWERTY, 111111, photoshop and 123123!
10. Albert Gonzalez has been given the longest sentence for hacking, which is 20 years!

17.8 References from Internet


https://en.wikipedia.org/wiki/Password
http://www.webopedia.com/TERM/P/password.html
https://www.getsafeonline.org/protecting-yourself/passwords/
https://paulsinternetsecurityblog.wordpress.com/2011/02/28/passwords-part-i-why-
do-we-need-them/
https://www.getsafeonline.org/protecting-yourself/passwords/
https://security.illinois.edu/content/what-makes-good-password
https://en.wikipedia.org/wiki/Password_strength
http://www.makeuseof.com/tag/create-strong-password-forget/
http://www.higheredtechdecisions.com/article/five_security_tips_for_password_effectiveness1/Networks

120
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
Chapter 18 – Cyber Security

18.1 Objectives
After going through this chapter the students should be able to:

1. Know the meaning of cyber security.


2. Know what malware is.
3. Differentiate between different types of malware.
4. Understand how malware gets on a computer.
5. Tell when a computer is infected by malware.
6. Take precautions to save the computer from malware attack.
7. Take actions if a computer is attacked by malware.
8. Know tips for their smartphone safety.
9. Identify which emails to open and which ones to ignore.
10. Know the content that they should download and the ones that they should not download.

18.2 Introduction
Cyber Security is the protection of computer systems, devices and
network from any unauthorized access or misuse by others. It is of
importance as the use and our dependency on digital media is growing
day by day. There are internet, wi-fi, Bluetooth etc and they are all
prone to theft or damage. Cybersecurity includes secure passwords,
malware, internet privacy, data breaches, safe computing, online
scams and mobile protection. In this chapter, we will concentrate on
malware and smartphone safety.

Examples of most innovative companies in cybersecurity industry are


NNT*, AT&T*, IBM Security*, Cisco*, Fortinet*, AVG*, Quick Heal* etc.
Figure 18.1 – Cyber Security

To know more about cyber security, visit –


https://www.youtube.com/watch?v=0p3787JiFgQ
https://www.youtube.com/watch?v=Ie0bRyXNrTs
https://www.techopedia.com/definition/24747/cybersecurity

*Other brands and names may be claimed as the property of others

121
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
18.3 What is the difference between HTTP and HTTPS?
With almost 32 lakh debit cards information is compromised in India.

Many of you may be aware of this difference, but it is worth sharing if you are not.

The main difference between http:// and https:// is all about keeping you more secure.

HTTP stands for Hyper Text Transfer Protocol. The S (big surprise) stands for "Secure". If you are visiting a Website
or web page, and look at the address in the web browser, it is likely begin with the following: http://. This means
that the website is talking to your browser using the regular unsecured language. In other words, it is possible
for someone to "spy" on your computer's conversation with the Website. If you fill out a form on the website,
someone might see the information you send to that site.

This is why you never ever enter your credit card number in an HTTP website! But if the web address begins with
https://, that means your computer is talking to the website in a secure code that no one can use on.

You understand why this is so important, right?

If a website ever asks you to enter your Credit/Debit card Information, you should automatically look to see if
the web address begins with https://. If it doesn't, you should NEVER enter sensitive Information, such as a
credit/debit card number.

While checking the name of any website, first look for the domain extension (.com or .org, .co.in, .net etc.). The
name just before this is the domain name of the website. You can similarly check for bank frauds.

Before your ebanking logins, make sure that the name just before ".com" is the name of your bank.
"Something.bankname.com" belongs to your bank, but bankname.some1else.com belongs to "some1else".

18.4 Malware
Malware, short for ‘malicious software’, is software that gets installed on
your laptop, desktop computer or smartphone and performs a multitude
of undesirable tasks such as stealing passwords, deleting files or
reformatting the hard disk. Examples of malware are:

1. Virus are computer program files that attach themselves to disks or


other files and replicate without the knowledge of the user.
2. Worms are programs that replicate, but do NOT infect other
computer program files. They send copies to other computers via a
network.

Figure 18.2 - Malware

122
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
3. Trojan horse looks to be a harmless program that you knowingly download but it allows attackers access
your system.
4. Spyware exploits infected computers for commercial gain, delivering unsolicited pop-up ads and monitor
web browsing activity, among other things.

To know more about malware, visit –


https://www.youtube.com/watch?v=tKZBf-WNM8Y
https://www.youtube.com/watch?v=0mLeeE8VM9U

18.4.1 How do I Get Malware on My Computer?

There are many ways by which computers can be infected by malware.


Some of them are:

1. Opening emails with unknown attachments, links or spam emails.


2. Downloading and using pirated software or applications from an
untrustworthy source.
3. Clicking on unknown links on social networking sites.
4. System not having any anti-virus or anti-spyware.
5. Computer is already infected and the malware is multiplying itself.
6. Illegal file sharing services.
Figure 18.3 – Malware Infecting Computers

7. While installing a useful software, some malware automatically gets installed.


8. Using infected removable drives such as USB, external hard disks etc.

18.4.2 Warning Signs Your Computer Is Malware Infected

Following symptoms can tell you if your computer is


malware infected:

1. Your computer has slowed down.


2. There are too many unwanted pop ups coming.
3. Your computer or program has started crashing
regularly.
4. Your hard disk is showing activity even if there is
no program running.
5. Some files have disappeared automatically or
changed their names.
6. You are not connected to the internet but still,
there are network activities observed.
7. Programs are opening and closing unexpectedly.
8. Antivirus on your computer stops working.
Figure 18.4 – Signs of Malware Infected Computers

9. New toolbars, unwanted websites coming up without your permission.


10. Your friends tell you that they are getting strange messages from you.

To know more about warning signs if your computer is malware infected, visit –
https://www.youtube.com/watch?v=LKrvu-ha6tw.

123
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
18.4.3 Precautions to Keep Your Computer Safe and Clean

Prevention is better than cure. You can take some precautions


and keep your computer safe and clean. Some of the
precautions are:

1. If you receive an email from an unknown source or if an


email seems suspicious from a known source, do not open
it.
2. Avoid opening email attachments with extension .exe,
.com, .bat or .pif.
3. If you are browsing the internet, and you get a pop up with
some warning, ignore it.
Figure 18.5 – Precautions to Keep Your Computer
Safe from Malware

4. Avoid clicking on pop-ups that look like normal window messages.


5. Do not visit pornographic sites.
6. Be cautious clicking on links that people send you in an email.
7. Do not visit or download anything from a crack.
8. Remain aware of whatever you download from the internet.
9. Do not download any software without reading its license agreement.
10. Keep windows up to date by installing updates, security releases, patches etc.
11. Use an anti-virus software.
12. Use firewall.
13. Keep all your applications updated including your browser.
14. Do not run two anti-virus or anti malware programs simultaneously.
15. Avoid using external memory drives like USB etc.
16. Do not access unknown wi-fi open networks.

To know more about precautions to keep your computer safe, visit –


https://www.youtube.com/watch?v=U4lweHnf71E
https://www.youtube.com/watch?v=XU8PHihT_P4
https://askleo.com/internet_safety_7_steps_to_keeping_your_computer_safe_on_the_internet/

18.4.4 What To Do If My Computer is Infected by a Malware

What to do if your computer gets infected by malware. Do not panic and do the following:

1. Disconnect your computer from the internet and start your computer in safe mode.
2. Take a backup of your files and important work.
3. Delete temporary files.
4. Download malware detectors and run them.
5. Remove all CDs, DVDs and external memory drives and restart your computer.
6. Run a full scan with another malware detection program.
7. Update your operating system, programs, applications etc.
8. Remove system restore points.
9. Reset all your passwords.
10. Reset your browser settings to default.

124
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
To know more about removing malware from your computer, visit –
https://www.youtube.com/watch?v=J66pjLEaMWk
https://www.youtube.com/watch?v=6pZdmrkBnFY
https://malwaretips.com/blogs/malware-removal-guide-for-windows/

18.5 Myths about Wi-Fi


Let’s explore some myths about wi-fi:

1. Nobody would want to hack my network.


2. No one should touch my router settings.
3. I can hide my network from hackers if I disable SSID.
4. There is no need to upgrade my router if it is still working.
5. WEP is safe but should only be used at home.
6. My router cannot be hacked if I am using WPA2-AES.
7. WPA2-AES slows down my connection.
8. There is no need of an encrypted connection if I am using a firewall or anti-virus software.

To know more about these myths, visit –


http://www.makeuseof.com/tag/10-unbelievable-router-myths-that-need-to-be-debunked/

18.6 Smartphone Safety


Till a few years ago, mobile phones mainly came with the traditional SMS and Call features. With the advent of
the mobile internet or the ability to access the world wide web through a phone, the risks that smartphone users
face have increased. We regularly use our smartphones for surfing the Internet, downloading music and social
networking apart from making calls. To keep our mobile phones safe, we can do the following:

1. Use security software to protect your phone from malware attacks.


2. Explore the settings on your phone and customize them for location reporting, app installation, tracking
online behaviour and Wi-Fi Networking.
3. Avoid downloading apps that are not hosted at reputed app stores.
4. Lock your phone with a PIN code or pattern lock.
5. Do not use public Wi-Fi to shop or access emails.
6. A password should be set and configured so that the phone automatically locks after a certain period
of time.
7. Log out of your accounts like email and Facebook.
8. Don’t keep ANY pictures on your phone that you wouldn’t want others to see.
9. Read the user rating BEFORE downloading or installing apps and make sure they’re from trusted
sources.

To know more about smartphone safety, visit –


https://www.youtube.com/watch?v=WSVxhECl4RQ
https://www.youtube.com/watch?v=t5gnhvwMVeA
https://community.norton.com/blogs/norton-protection-blog/cyber-security-concerns-and-smartphones

125
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
18.7 Chapter Objective Checklist
S. No. SKILLS ACQUIRED YES NO
1. I know what cybersecurity is.
2. I know what malware is.
3. I can tell different types of malware.
4. I know how a computer gets infected by malware.
5. I can tell if a computer is malware infected.
6. I can take precautions to save my computer from malware attack.
7. I can take actions if my computer is infected by malware.
8. I know tips for smartphone safety.
9. I know the difference between spams and real emails.
10. The links presented in the chapter are interesting and useful.
11. The information given in the chapter will help us increasing cyber security.
12. I would like to explore more about cyber security.

18.8 Let’s Recap


1. Cyber Security - Protection of computer systems, devices and network from any unauthorized
access or misuse by others.
2. Malware - Software that gets installed on your laptops, desktop computers or smartphones
and performs a multitude of undesirable tasks such as stealing passwords, deleting files or
reformatting the hard disk.
3. Virus - Computer program files that attach themselves to disks or other files and replicate without
the knowledge of the user.
4. Worms - Programs that replicate, but do NOT infect other computer program files. They send copies
to other computers via a network.
5. Trojan Horse - Harmless program that you knowingly download but it allows attackers access to your
system.
6. Spyware - Exploits infected computers for commercial gain, delivering unsolicited pop-up ads and
monitor web browsing activity, among other things.
7. Access Control - Controlling the access to a computer, online services and the information it stores.
8. Firewall – A network security system designed to prevent unauthorized access from sharing files over
a computer or network.
9. Hacker - Someone who breaks into computer security for malicious reasons or personal gain.
10. IPS (Intrusion Prevention System) - Intrusion detection system that also blocks unauthorized access
and monitors malicious activities.

126
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation
18.9 Did You Know?
1. MyDoom, considered to be the most expensive virus in the world and in cybersecurity
history, has caused an estimated financial damage of $38.5 billion!
2. 59% of employees steal corporate data when they quit or are fired!
3. It’s not a software glitch or a virus but rather humans who are the weakest link in cyber
security!
4. There is a real-time map that shows cyber attacks in action!
5. Hacking is the main motivation that drives cyber attacks!
6. As a result of cyber attacks, 68 % of funds lost were declared unrecoverable!
7. Roughly around 80 to 90 million cyber attacks occur per year, which breaks down to about 400 new
attacks every single minute!
8. According to the Department of Communications and Arts in Australia, only 2% of SMBs have actually
secured their systems and websites with proper protection!
9. Since 2014, cybersecurity incidents have surged by 38%!
10. Malicious cyber attacks cost the US $300 Billion to $ 1Trillion a year!

18.10 References from Internet


https://community.norton.com/en/blogs/norton-protection-blog/7-most-important-
cyber-security-topics-you-should-learn-about
http://cybersecurityventures.com/cybersecurity-500/
http://www.howtogeek.com/howto/2998/how-does-spyware-malware-or-crapware-
get-on-my-computer/
https://www.microsoft.com/security/portal/mmpc/help/infection.aspx
https://heimdalsecurity.com/blog/warning-signs-operating-system-infected-malware/
http://www.bleepingcomputer.com/forums/t/2520/how-did-i-get-infected/
https://community.norton.com/en/blogs/norton-protection-blog/how-protect-yourself-phishing-scams
http://www.pcworld.com/article/243818/security/how-to-remove-malware-from-your-windows-
pc.html
https://blog.malwarebytes.com/101/2015/06/10-easy-steps-to-clean-your-infected-computer/

127
DCCW Handbook Copyright protected October 2016 – Learning Links Foundation

Das könnte Ihnen auch gefallen