Digital citizenship is the norms of appropriate, responsible technology use
Digital Literacy
Is a term used to describe the need to learn how to use different digital tools, to create audio and visual presentations, as well as communication tools, used on a daily basis in a number of settings ( for example; school, work, etc...
digital basic training to bridge the gaps in digital literacy for job seekers
The D.C. Department of Employment Services (DOES) will provide training on basic technology tools to help ensure participating residents can develop the digital skills required for many of today's jobs. DOES will identify candidates with gaps in digital literacy and help them to close those gaps by teaching residents digital basics through Microsoft's Digital Literacy Curriculum. DOES and Microsoft will also provide residents with training on Microsoft productivity software. Upon completion of a training program, many residents will receive a certificate of technology proficiency that can be added to their resumes.
The D.C. Public Schools will partner with Microsoft to provide District teachers with increased access to technology resources to bolster their ability to teach vital technological skills to students. Students will also have the opportunity to meet technology professionals at Microsoft’s D.C. Innovation Center to explore career opportunities in the technology sector.
Digital Citizenship
is a term to describe the responsibility of technology user, as well as the respect of other user, in regards to safety, security and ethics of todays technical world of users.
Digital citizenship is the norms of appropriate, responsible technology use
Digital Identity
can be defined as a persons user identity on the web, for example; username and passwords. It is also defined as the indentity of how an web application may be created
study examines the emergence of attendant legal rights and duties including a new right to digital identity and its legal protection. Dr Sullivan argues that an individual has the right to an accurate, functional digital identity and shows that this right exists in addition to the right to privacy.
Dr Sullivan maintains that, considering the essentially public nature of identity, the right to identity provides better, and more appropriate, protection than is afforded by the right to privacy. She asserts that the importance of the right to identity in this context has been obscured by the focus on privacy in international legal scholarship and jurisprudence.
Interesting definition booked marked for my on purposes
Dogital Identitiy regarding applications
Working with identity is a critical part of what most .NET application developers do. Whether an application will be accessed within just one company, shared across different organizations, or made available on the Internet, identity has an enormous impact on how an application behaves. Who is allowed to use this application? Does the application behave differently for different users? What data can each user access, and what kind of access is allowed? Whether an application is built by using ASP.NET, Microsoft Windows Communication Foundation (WCF), or some other technology, identity affects its design and behavior in important ways.
Identity in the physical world is expressed in a variety of forms: driver’s licenses, passports, and more. For applications, however, identity typically boils down to a set of bits that are transmitted across the wire, and then used by software. Commonly known as digital identity, this concrete expression of identity is what .NET applications typically work with.
digital identity
21. From the real-life notion of identity, we develop the concept of identity as used online. At its core is the idea that individuals can express their identity in digital format. However, a "digital identity" is typically a subset of the characteristics that define a person in the real world.Footnote 14 A digital identity is the result of digital codification of characteristics and attributes in a way that is suitable for processing by computer systems.Footnote 15 It represents a particular persona when engaging in online activities, which can be accessed by electronic or technical means. Unlike real-life identity, digital identities can range from a simple username/password combination unrelated to any specific attribute or characteristic of the person to one that relies on sensitive and personally identifiable information from official credentials.
22. However, the concept of a digital identity introduces some interesting complexities and challenges. First, an individual may have more than one valid digital identity, the characteristics of which may vary according to the contextFootnote 16, application, or service in which it is used. For example, an individual may present a digital identity in order to access online services that rely on official credentials (e.g., passport, driver's licence), and another completely different digital identity for online social communities (e.g., www.facebook.com/). This spectrum or continuum of available digital identities allows different digital identities to be used depending on context that can be chosen according to the purpose or service being offered.
23. Secondly, digital identity in the networked world is not fixed but fluid; it changes over time and typically needs to be updated. For example, the attribute of age changes over time, and elements such as mailing address or telephone number need to be verified periodically. Therefore, digital identities are not necessarily unique, static or permanent.
Digital Security
is the way that online users may protect themselves, with passwords, virus protection software, etc...
"Are you who you say you are?" and "Is my data safe with you?"
Digital Security means answering those questions with solutions that protect and enhance assets and interactions.
helpful digital security info
The importance of digital security and privacy cannot be overstated.
From human rights advocates, journalists and activists to the average user, the possibility of your communications being monitored, or the threat of your personal identity or location being exposed, pose a considerable risk, especially if you are working with sensitive information or issues. A digital security strategy that is thorough and covers all angles is essential, as it will only be as strong as its weakest link. You don't want to simply lock the door to your house when all the windows are open!
What is digital security and privacy?
Signs that information rights or digital security have been compromised might include:
Critical Thinking
is not just seeing what may be considered as facts, to be black and white. Critical thinking goes beyond the black and white by researching the sources and reasoning behind the facts.
Critical thinking is the ability to think clearly and rationally. It includes the ability to engage in reflective and independent thinking. Someone with critical thinking skills is able to do the following :
Critical thinking is not a matter of accumulating information. A person with a good memory and who knows a lot of facts is not necessarily good at critical thinking. A critical thinker is able to deduce consequences from what he knows, and he knows how to make use of information to solve problems, and to seek relevant sources of information to inform himself.
Critical thinking should not be confused with being argumentative or being critical of other people. Although critical thinking skills can be used in exposing fallacies and bad reasoning, critical thinking can also play an important role in cooperative reasoning and constructive tasks. Critical thinking can help us acquire knowledge, improve our theories, and strengthen arguments. We can use critical thinking to enhance work processes and improve social institutions.
Critical thinking includes a complex combination of skills. Among the main characteristics are the following:
Plagiarism
when adding someone's words our ideas to your work, without accrediting that person's work but instead passing it off as your own
Plagiarism
In other words, plagiarism is an act of fraud. It involves both stealing someone else's work and lying about it afterward.
Plagiarism
Definition: In an instructional setting, plagiarism occurs when a writer deliberately uses someone else’s language, ideas, or other original (not common-knowledge) material without acknowledging its source.
This definition applies to texts published in print or on-line, to manuscripts, and to the work of other student writers.
Most current discussions of plagiarism fail to distinguish between:
Digital Rights and Responsibilities
the right for digital users to have access and use of the web without feeling unsafe due to cyber bulling, theft, internet scams, and etc. As well the responsibility to extend the same respect to other digital users.