"If children are going to be successful users of the Internet it is vital that they learn the 'language' of the Internet..." L. Trimble

Note to teachers:
As students learn the specialized vocabulary of Digital Citizenship, they are empowered to grasp the concepts and the principals behind the words. We especially recognize the importance of developing the academic vocabulary of our English Language Learners (ELLs / ELs).

Here's one idea to help students strengthen their DC vocabulary:

We'd like to give a shout out for students in Andrea Cascia's classes at San Diego USD's Crawford Invention Design Educational Academy in San Diego, California, for translating our glossary into Arabic (by Nasreldin Abdeliziz) and Vietnamese (by Thao Ho and Truc Nguyen). And to Lucia Hinojosa, a high school student at the American School Foundation in Monterrey, Mexico, for translating the glossary into Spanish. Thank you!!

A warm invitation to be CONTRIBUTORS!
We invite students, teachers, and community members around the world to contribute to this page, both with translations of current terminology into other languages and with additions of new terms to this very rapidly changing topic! MP3s are the recommended format for sending us audio files. In response to a request from St. Patrick's Succeed Academy (Sacramento, California) for an easily editable printout version of the Digital Citizenship Glossary, we've added this Word document.

In addition, we hope that some of you and your students will be inspired to create flashcards of these words using a web-based flashcard program such as Quizlet or StudyStack, and then share them with us on the wiki!

Digital Citizenship Glossary


Term

Definition / Example

Resources to teach the term

Digital ID Focus

A




1
anti-virus software
Software for blocking malicious (bad) programs, such as viruses or malware, from harming your computer.

A Computer Virus - 3D movie
Desktop Fight- Anti Virus Software
4
2
avatar
An avatar is a graphic (picture, image) that you use to represent yourself on the Internet.

Why Use an Avatar (video)
2
B




3
boundaries
Boundaries are physical, emotional and mental limits we set to protect ourselves from being manipulated, used, or harmed by others.

Tell a Trusted Adult (video)
If We Know, We Can Help (video)
2
4
bully
A bully is someone who acts in an aggressive, hostile, or hurtful manner toward others.

Price of Silence PSA
1
5
bystander
Bystanders are people who witness the actions of the bully and the reactions of the victim(s), without taking action.


For additional definitions of bystander, visit Eyes on Bullying: Bystander.
Define the Bully, Bystander & the Bullied(video)
Price of Silence PSA
1
C




6
citation, cite, citing
A reference which names the source of specific information which has been used.

BibMe - Quick way to cite sources
You quote it; you note it!(slideshow)
3
7
citizenship
Citizenship means being a member of and supporting your community and country. Citizens have both rights and responsibilities.

Digiteens Digital Citizenship Project(video collection)
The Good Citizen (video)
all
8
copyright
Copyright is the owner’s legal right to reproduce, display, transmit, perform, and modify a work as well as the right to publicly perform a sound recording by digital transmission. A work is automatically copyrighted at the moment of creation, as long as it exists in a fixed, tangible form. You don’t have to use the © symbol for a work to by copyrighted. (Hobbs 2011)

Copyright? What's Copyright?(video)
Copyright Kids(website)
3
9
Creative Commons
A Creative Commons license lets you decide how others may use your work. The Creative Commons license allows you to keep your copyright but also allow others to copy and distribute your work provided they give you credit and only on the conditions you specify.

Wanna Work Together?(video)
Creative Commons Licenses(video) from
Creative Commons Licenses
3
10
cyber-
bullying
Cyberbullying is the use of digital media tools such as the Internet and cell phones to deliberately and repeatedly hurt, harass, or embarrass someone else.


Detecting Lies and Staying True(video)
Stacey’s Story (video)
Talent Show - Cyberbullying PSA (video)
1
D




11
digital identity/footprint
A digital footprint is all of the information online about a person either posted by that person or others, intentionally or unintentionally.

Understanding Impact of a Digital Footprint(video)
Controlling Your Digital Identity (website)
2
12
downloading
Downloading is the process of transferring files from a website/Internet location down to your personal computer. Downloading can be either authorized or unauthorized by the content creator - and may contain malware. Beware!


4
E




13
emoticon
A simple face, sometimes animated, that expresses an emotion. Emoticons let you show someone online how you are feeling.

Use of Emoticons in Internet Communication (video)
1
14
empathy
Empathy (a top 21st century skill) is being aware of, sensitive to, and understanding what someone else is feeling or experiencing.

Change for a Dollar (video)
1
F




15
fair use
Fair use is the idea that copyright material may be quoted without the need for permission from or payment to the original source, provided that a citation is clearly given and that the material quoted is reasonably brief.

User’s Rights, Section 107(video)
3
16
firewall
A firewall is hardware or software that blocks or filters certain types of network traffic from reaching your computer.

Cybertrails - What is a firewall? (video)
4
17
flame
A deliberately mean-spirited message sent to others on the Internet.



G




18
grooming
Techniques used by child predators to try to gain your trust.

Grooming Gracie (video)
1
H




19
hacker
A hacker is someone who accesses computer information without permission.

What Is Hacking? (video)
3
20
harassment
To annoy someone repeatedly. For example, cursing at, following, or mocking someone online.

Cyberbullying Digital Harassment (video)
1
21
hardware
A term for the actual computer equipment and related machines or computer parts.

How Stuff Works - Computer Tour (video)
4
I




22
identity theft
A crime that happens when someone gets the personal information (e.g., credit card, social security number, bank account numbers) of another person, usually to steal money.

Identity Theft - What Teens Need to Know(video)
4
23
intellectual property
Intellectual property includes art, books, inventions, magazines, movies, music, performances, reports, software, stories created by you or by others.

Copyright? What’s Copyright?__(video)
What is copyright? (website)
3
J




24
jeopardize, jeopardizing
To jeopardize is to put something at risk or in danger, such as your reputation or digital footprint.


2
K

25
keyword
A word you use when looking for information on a search engine (Google, Yahoo, etc).


all
L
26
listserve
An online list that allows users to send e-mail to one address, where messages are then copied and sent to all of the people on the list.


all
M




27
malicious
Means to cause harm to someone or something on purpose.


all
28
malware
Stands for malicious software or code, which includes any harmful code—trojans, worms, spyware, adware, etc.—that is designed to damage the computer or collect information.

How to Remove Malware (video)
4
29
media literacy
Media literacy is the ability to access, analyze, evaluate and create media in a variety of forms.

Show Your Media Literacy (video)
all
N

30
netiquette
Courtesy, honesty, and polite behavior practiced on the Internet - key component of digital citizenship!

What's Netiquette? (video)
BrainPop's Digital Etiquette (video)
all
O




31
open source/
Programming code with limited or no copyright restrictions, allowing you to legally modify and share the software program.

What Is Open Source? (video)
3
P




32
password
The secret word you use when signing in to the Internet or an online service that helps to confirm your identity.

What is Personal Information? (video)
all
33
perpetrator
Perpetrator is another word for bully.

Price of Silence PSA
1
34
phishing
Phishing is a con game that scammers use to collect personal information from unsuspecting users. The false e-mails often look surprisingly legitimate, and even the Web pages where you are asked to enter your information may look real. However, the URL in the address field can tell you if the page you have been directed to is valid or not.

Phishing Scams in Plain English(video)
4
35
piracy, pirating
Piracy is theft of intellectual property - in other words, stealing what does not belong to you.

What Is Piracy?(video)
4
36
plagiarism
Plagiarism is using someone else's words or ideas and passing them off as your own.

You Quote It; You Note It(interactive slideshow)
Digital Citizenship - who will you be? (video)
3
37
precautions
Precautions are actions taken in advance to protect against possible danger, failure, or injury; a safeguard.


4
38
predator
One who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them. Usually an adult.

Grooming Gracie (video)
It's just a Game. Or Is It? (video)
1
39
privacy
Privacy is your right to determine what information you would like others to know about you.

Do You Really Have a Private Life Online? (video)
4
40
PSA
Public Service Announcement: a short 30-90 second video that seeks to inform or educate the public about an important health or safety issue.


all
Q




R




S




41
search engine
A program that searches information on the Web by looking for specific keywords.
(English)
Best Search Engines
all
42
sexting
Sexting is sending sexually suggestive or explicit text messages, photographs, or videos via cell phones.
(English)
Sexting - Don't Incite It! (video)
Sexting - Don’t Promote It!
Posting Pictures Onlin (video)
1
43
software patches
A patch can be an upgrade (adding more features), a bug fix, a new hardware driver or update to address new issues such as security or stability problems.
(English)

4
44
spyware
Spyware is software that goes on your computer without your knowledge and steals private information.
(English)
What Is Spyware?(video)
4
T




45
tolerance
Tolerance is respecting those who are different from you.
(English)
2010 Tolerance Video
1
46
trojan horse
Similar to the Greek mythology, trojan horses are software programs that hide inside regular programs, such as games, disk utilities, and even antivirus programs. But if they are run, these programs can do great harm to your computer.
(English)
Viruses, Worms, and Trojans - Oh my! (video)
How Does a Trojan Horse Virus Work? (video)
4
U




47
upload
The process by which an individual can send/post/upload a file to the Internet.
(English)

4
48
upstander
An upstander is someone who takes action to stop bullying behavior or other inappropriate behaviors.
(English)
Price of Silence PSA
1
V




49
victim
A victim is someone who is harmed by another person or persons.
(English)
Price of Silence PSA
1
50
virus
A virus is a program that duplicates itself and spreads throughout your computer destroying files, changing data, hogging all your memory, or doing anything that is possible with a computer program. Viruses only damage software, not hardware.
(English)
Viruses, Worms, and Botnet Explained(video)

UYN: Don’t Open That File(video)
4
W




51
worm
A computer worm is a type of virus that replicates itself, but does not change any files on your machine. However, worms can multiply so many times that they take up all your computer's available memory or hard disk space.
(English)
Viruses, Worms, and Trojans - Oh my! (video)
4
X




Y




Z





Questions? Comments? Suggestions? Contact us at digital.ido@gmail.com