What is your digital intelligence, your DQ™? Let’s examine this in more detail.

Digital Citizen Identity

 An online identity is a social identity that an Internet user establishes in online communities and websites. The amount of information stored can be as little as your name or pseudonym and email address to a complete bio. You should be aware of what information is stored on sites such as Facebook and the accuracy of that information.  Often applications require your bio information to run and you should be aware of this when asked for by third-party applications. Through interaction with other users, an established online identity or an avatar of that person acquires a trust which enables other users to decide if that person is worthy of trust. Would you give your name and email address to a stranger? Food for thought.

Privacy Management

I am a public person and have a public identity, I share my name, several email addresses, my home address and telephone number. I also have a semi-private email address I use for banking. For many, this level of publicity is not required so, therefore, should remain private. On the RSA Fellows’ Forum, I am an administrator and have access to private information such as email addresses. I am in a position of trust and would not give out email addresses without the permission of the owner. When I register a domain my name, address and telephone number are published. I get spammed by software companies and although a bit irksome is not so bad. You can add a privacy feature to your domain but this costs.

Critical Thinking

Fake news is a problem. I was caught. There was a news report on my Facebook feed that the Church of Scientology had had their tax exemption revoked,  This was big news. I checked the source seemed to be ABC news so I reposted it to my 469 friends, some of them were excited too. Unfortunately, it was fake news as one of my more diligent friends pointed it. I was horrified. I sent a retraction to all my friends but the damage had been done.  My credibility was damaged and I felt awful. I have also learned and I now check news stories with http://snopes.com which verifies stories.

Digital Footprint

Everywhere you go on the Internet you leave a footprint. This may be as little as your Internet Protocol (IP) address: What’s your IP address?:  It’s 54.221.76.68 We all are assigned one when we access the Internet it is our address, info like this web page is sent to for viewing. (More here) . To understand your digital footprint try this tutorial https://www.internetsociety.org/tutorials/your-digital-footprint-matters/. It may be seen as passive, where the sites we visit are stored by agencies; ever noticed that you can look up a flight somewhere then the next day an ad appears in your Facebook stream for that or similar airline? And active where you log in to a site with a username/email and password. 

Digital Empathy

This video is well worth watching it explains what empathy is and how we should go about it very well. Empathy can begin with the simple words “I hear what you are saying”

 

Cyber Security Management

The passwords you use are the first line of defense in your cybersecurity. You should have a different password for each site where it’s needed. Here are some hints:

  • Think of a word associated with the site, mix upper case and lower case
  • Think of someone’s birthday not your own
  • Add some symbols !”^&*()
  • mix up the above
  • You can establish a pattern of the above which will aid your memory, only the word associated need be changed for each password.

If you re on a public-use computer or one used by other people do NOT let the browser save your password.  Never tell anyone your password, they can gain entry to sensitive information. When entering your credit card info for shopping online make sure it is secure i.e. https://  do not use it otherwise. Never open a file from an unknown source no matter how alluring or bona fide it may appear. Any reputable financial institution will never ask you to send them your login details.

Cyberbullying Management

Anyone can be bullied – it isn’t restricted by age, race, gender, religion or sexuality. It can happen anywhere, from the classroom, street or sports field to the home, online or in the workplace. If you get hurtful messages it is best not to reply to them. You can save the images or text and talk to someone you trust. Don’t think you are being silly – cyberbullying is real. You can also report bullying to online service providers such as Facebook and Twitter. Go to ReachOut.com for more information on online and text bullying.

Screen Time Management

This is perhaps applicable to the younger generation. If you are a parent it is good to lay down some ground rules. There are apps like Screen Time that can regulate when and how much time your child can spend on their device. Research into excessive screen time in adults is here: https://www.bustle.com/articles/117838-5-things-too-much-screen-time-does-to-your-body . I am in front of a computer most of the time. I haven’t noticed any ill effects.

 

 


Leave a Reply

Your email address will not be published. Required fields are marked *

%d bloggers like this: