Week2discussion
Module 3
Getting Started With the Internet
By Kathy Sole, Ashford University
Learning Objectives
After reading this module, you should be able to
• Summarize your options for connecting to the Internet and explain how these can help you use free time
more effectively during the day.
• Explain how your browser allows you to get the most out of your Internet experience.
• Outline your options for troubleshooting computer issues.
Fancy Collection/SuperStock
sol82612_03_m03_047-062.indd 47 6/29/16 5:09 PM
© 2016 Bridgepoint Education, Inc. All rights reserved. Not for resale or redistribution.
48
Introduction:
The Internet: Get Connected and Get Going!
Now that you are set up with your computer and the software you need to do well in your
classes, let’s make sure you’re connected! Having a secure and reliable connection to the
Internet is another critical component in your success in Ashford University’s online pro-
gram. In this module, we will help you get set up with your home network and discuss how
you can take advantage of public networks. We will also look at steps you can take to trouble-
shoot any technical difficulties you encounter.
You may already be familiar with some
of the information in this module, but
it is always a good idea to be aware of
all your options in case the network
you use most often is unavailable or
you travel to a place with a different
type of connection. More importantly,
digital literacy involves developing a
general understanding of how tech-
nology works, all the way down to
the different types of connections.
As you proceed with your education
and your career, you can build on
this knowledge and keep up with the
changing technologies you will inevi-
tably encounter in the years to come.
Monkeybusinessimages/iStock/Thinkstock
Once you have a computer or laptop, the next step is
to get connected to the Internet.
sol82612_03_m03_047-062.indd 48 6/29/16 5:09 PM
© 2016 Bridgepoint Education, Inc. All rights reserved. Not for resale or redistribution.
49
©Credit Goes Here
Title Goes
Here
3.1 What Is a Network, and How Do
You Join One?
A computer network is a group of computers that connects with other computer networks
and individual electronic devices, so each computer can send and receive information to and
from other computers and peripheral devices. The Internet is a massive global computer
network of other computers and other, smaller networks.
Each time you purchase a new electronic device that connects to the Internet, you create a
new link to this worldwide community. This connection becomes a window through which
you can see and communicate with every other online user on the planet and contribute to
the world’s vast web of knowledge (Okin, 2005).
Networks are essential in the 21st century. Businesses use their own internal networks, called
intranets, to share files and information among employees, develop collaborative projects,
and share computer applications. The network also enables computers to share hardware. For
example, instead of having a printer connected to each computer, in a network all the comput-
ers can share the same printer. You can even create your own network called a local area net-
work (LAN) to connect several computers in your own home so they can communicate with
one another. (See http://www.wikihow.com/Create-a-Local-Area-Network-%28LAN%29
and additional information later in this module on how to create a LAN.) Then, when you are
off work, you can retreat to a friend’s house with your laptop and play multiplayer-networked
computer games on the world’s largest network, the Internet.
sol82612_03_m03_047-062.indd 49 6/30/16 11:20 AM
© 2016 Bridgepoint Education, Inc. All rights reserved. Not for resale or redistribution.
http://www.wikihow.com/Create-a-Local-Area-Network-%28LAN%29
50
3.1 What Is a Network, and How Do You Join One?
A 2014 Pew Research Center analysis of U.S. census data showed that 84% of U.S. households
own a computer, and 73% of U.S. households have a computer with a broadband Internet
connection. However, there is a wide variance across the country; 21% of households have
no regular Internet access at all, although they may have free access at a local library or else-
where (Rainie & Cohn, 2014). A Closer Look: Wait. The Internet and the World Wide Web Aren’t
the Same Thing? outlines the differences between what are known, respectively, as the Inter-
net and the World Wide Web.
Everywhere you go, people are connected to the Internet. This is a good indicator that getting
online is pretty quick and easy to do. To use the Internet, your computer must be Internet
ready. This means the computer must have hardware such as an Ethernet card that allows it
to connect to the Internet. The vast majority of computers available today are Internet ready.
If you have any questions about your computer, however, be sure to check with the computer
sales or service person where you purchased your device. The type of connection you have
depends, in part, on where you want to use the device: at home, at a library or coffee shop, or
even wherever you are at any given moment. Let’s take a look at your options.
Internet Access at Home
Given the sheer amount of time you will
spend working on your Ashford Uni-
versity courses, it is necessary to set
up a home network. To do so, you will
need to contact a local Internet service
provider (ISP) to set up an account. In
most instances, a technician will come
to your home and install a modem
and a router. The modem is the device
that connects with your ISP through
a telephone landline; the router con-
nects the computer to the modem, to
other computers in the home, or to
a printer and other devices to share
data and information. This connection
of devices provides you with a home
network, or LAN. The router examines
data coming into or going out of your
home network to determine where it should go and the route the data will take to get there.
The router also provides security for your network and contains a firewall to protect your
LAN from threats.
Once you have this hardware in place, you can then connect to the Internet through a wired
connection, which uses copper wires or fiber-optic cables to carry the digital signal, or
through a wireless connection, which uses radio waves or microwaves to carry the signal. It
is important to ask the Internet service technician to set up a secure connection that no one
outside your home can access. In Module 6 we will discuss more ways to ensure your privacy,
safety, and security online.
Caia Images/SuperStock
To have Internet access at home, you will need a
modem and router, both of which can be installed by
a technician.
sol82612_03_m03_047-062.indd 50 6/29/16 5:10 PM
© 2016 Bridgepoint Education, Inc. All rights reserved. Not for resale or redistribution.
51
3.1 What Is a Network, and How Do You Join One?
A Closer Look:
Wait. The Internet and the
World Wide Web Aren’t the Same Thing?
Many people use the terms Internet and World Wide Web interchangeably, but they are
different. The Internet is a gigantic global network of networks that connects millions of
computers together, so any computer can communicate with any other computer in the
world. The World Wide Web, known commonly as “the web,” is one method of accessing
and sharing information on the Internet and is probably the part of the Internet with
which people are most familiar.
The web uses software tools called browsers to access web pages that are linked to one
another via hyperlinks and web documents that contain text, graphics, video, and sound.
The web also uses a special protocol, or set of rules for sending information between
computers, called hypertext transfer protocol (HTTP). So the web address of all sites on
the World Wide Web begin with http: or https: (for secure websites).
However, you use other parts of the Internet as well. E-mail, for example, uses the Inter-
net, not the web, to send and retrieve messages between computers. E-mail uses a dif-
ferent protocol, called simple mail transfer protocol (SMTP), to send e-mail messages
and other protocols to retrieve those messages. Instant messaging and Usenet news
groups operate on still different parts of the Internet. So think of the Internet as a mas-
sive universe, with the web, e-mail, instant messaging, and other galaxies within it.
The Internet and the World Wide Web are not the same thing. The Internet is a global
system of interconnected computer networks that all use the same rules, or protocols,
to communicate with one another. The web is simply a part of the Internet that uses one
protocol to enable you to access information on web pages.
Jumpeestudio/iStock/Thinkstock filborg/iStock/Thinkstock
sol82612_03_m03_047-062.indd 51 6/29/16 5:10 PM
© 2016 Bridgepoint Education, Inc. All rights reserved. Not for resale or redistribution.
52
3.1 What Is a Network, and How Do You Join One?
Types of wired and wireless Internet services are summarized in Table 3.1. The primary dif-
ferences among these types of services are the speed at which the data can travel and the cost
of the Internet service. The choice, however, is not always up to the consumer. Not all places
in the United States, and certainly not in the world, have all these options available. You may
have none of them available in your specific area. Talk to your neighbors and friends to find
Table 3.1: Wired and wireless Internet connections
Description Pros and cons
Wired Internet services
Dial-up service Using a modem, the computer dials a
telephone number provided by your ISP
to connect to the Internet. A dial-up con-
nection occupies a phone line, and you
will not be able to use the phone for voice
communications while on the Internet.
• Slowest
• Least expensive
• Offered in remote, rural areas
• Not recommended for online course
work
Integrated
service digital
network (ISDN)
service
ISDN transmits data and phone conver-
sations together on a single telephone
wire. ISDN offers a better quality Internet
connection and faster speed than a dial-
up service. Special ISDN phone lines need
to be installed, and a phone number still
must be dialed.
• Better quality and faster speed than
dial-up
• Requires installation of an ISDN
phone line
• Being replaced in some areas by
other technology, but still offered in
places
Digital sub-
scriber line (DSL)
service
DSL uses two fiber-optic telephone
lines to give you telephone and Internet
service, so you can send and receive
telephone calls and use the Internet at
the same time.
• Typically offered by telephone
companies
• Generally faster and less expensive
than ISDN
Cable Internet
service
Cable connections use a modem to con-
nect to the Internet through fiber-optic
cable television lines.
• Typically offered by cable companies
• The fastest of the wired services
Wireless Internet services
Wireless network
service
Verizon and AT&T are the leading wire-
less Internet providers; however, Sprint
and T-Mobile also provide wireless Inter-
net networks in some geographic areas.
• High rates of data transfer with new
4G and 5G technologies, meaning
faster Internet service
• Offers greater security than earlier
wireless networks
Wi-Fi network This type of wireless network is used
in coffee shops, bookstores, and other
hotspots.
• Multiple computers and devices con-
nect simultaneously
• Limited geographic range of use
Bluetooth service Bluetooth transmits data over short
distances using short-wavelength ultra-
high-frequency radio waves and creates
a “shared” Internet connection across
devices.
• Not recommended for online course
work
• Best suited for use with mobile
devices such as smartphones, tablets,
and gaming consoles
Internet over
satellite service
Internet over satellite service allows
users to access the Internet via a satellite
that is orbiting the earth.
• Usually more expensive and slower
than most other options
• Available only in certain areas
sol82612_03_m03_047-062.indd 52 6/29/16 5:10 PM
© 2016 Bridgepoint Education, Inc. All rights reserved. Not for resale or redistribution.
53
3.1 What Is a Network, and How Do You Join One?
out which ISP companies they use and what their experiences have been. Your home network
will likely be your primary means of accessing the Internet, so make sure the service you
choose fits both your academic needs and your budget. Be sure to ask about bundling options,
too, since some providers will give you a discounted Internet rate if you sign up for a package
(for example, cable television, Internet, and phone service).
Internet Access Around Town
Every coffee shop in town these days seems to be full of people working on their laptops or
smartphones. They are taking advantage of Wi-Fi Internet service, which is a LAN that has
been established by the coffee shop. Patrons then connect to the Internet access point in the
LAN, called a hotspot. You will also create a hotspot in your home if you elect to set up Wi-Fi
for your home network. Wi-Fi is available in a growing number of establishments through-
out cities and towns, from bookstores and hotels to laundromats, airport terminals, and the
airplanes themselves. Even entire cities are starting to offer free, citywide Internet service,
which is usually supported by local advertisers (Kinney, 2006). These networks are created
by moving the digital signal from one access point to another, thereby overlapping coverage
and expanding the network. Public Wi-Fi makes accessing cellular applications—including
your Ashford apps—easy and convenient. Learn more in Strategies for Success: Getting the
Most Out of Your Ashford Apps.
Some of these places offer free Internet access, but others charge a nominal fee for connec-
tion. Getting online at a hotspot requires that you be in range of the hotspot access point. Click
the setting on your Windows or Mac operating system to view available wireless networks
in your area. If you see a network available, click its name. This action will open the hotspot
network connection site and give you information about how to connect, the terms and condi-
tions of use of the network, and the fees, if any, associated with network access.
If you are unable to use your own computer, another way to get online is by taking advantage
of shared computers at your local public library, Internet café or other local business (usually
at an hourly rate), public school computer lab, or government facility. Remember, however,
that you cannot save documents on these computers (unless you use a USB memory device/
flash drive or cloud storage), and the connection is not necessarily secure or private. With
that in mind, knowing what the options are in your community is a good idea in case you ever
need a backup plan.
Strategies for Success:
Getting the Most Out of Your Ashford Apps
Important note: Did you know you can get a free Ashford University Mobile Classroom
app and a free mobile Constellation app for both Android and iPhone devices? These
let you access your Ashford classroom and Constellation course materials from your
mobile device and do class work from a local hotspot. See http://www.ashford.edu
/student_services/ashford_mobile.htm for more information, including a list of all
the tasks you can perform with the Ashford mobile app.
sol82612_03_m03_047-062.indd 53 6/29/16 5:10 PM
© 2016 Bridgepoint Education, Inc. All rights reserved. Not for resale or redistribution.
http://www.ashford.edu/student_services/ashford_mobile.htm
http://www.ashford.edu/student_services/ashford_mobile.htm
54
3.1 What Is a Network, and How Do You Join One?
Internet Access on the Go
Another popular option is to have a
mobile or portable hotspot, which
allows you to connect digital devices
such as your computer or tablet to the
Internet—to create a traveling hotspot
you can use whenever you are in the cell
phone company’s service area. A USB
Internet device, called a USB Inter-
net stick, acts like a modem and plugs
into your laptop computer through a
USB port, giving you wireless Internet
service. In some instances, even your
smartphone can serve as the wireless
hotspot to your computer.
These services use mobile broadband
telephone services from your cellular
service provider, such as Verizon, AT&T, Sprint, T-Mobile, or U.S. Cellular, for Internet access.
A USB Internet stick looks similar to a USB memory device/USB stick/flash drive, and not
every USB Internet stick works with all cellular phone provider networks. Contact your cel-
lular phone company to obtain more information about devices that are compatible with that
company’s network.
Remember that cell company data usage fees apply, and you will use your minutes when you
use a mobile hotspot. Some hotspots can be expensive if you use them for any length of time.
When deciding whether to use a local hotspot or a mobile hotspot through your phone, con-
sider all the options available to you. In a large city where other hotspots are readily avail-
able, using your smartphone mobile hotspot may be more expensive. In a rural area, though,
a mobile hotspot may be the best option when running a wired connection would be very
expensive and there aren’t many other choices.
Sean Gallup/Getty Images News/Getty Images
USB Internet sticks give you wireless Internet
service.
sol82612_03_m03_047-062.indd 54 6/29/16 5:10 PM
© 2016 Bridgepoint Education, Inc. All rights reserved. Not for resale or redistribution.
55
3.2 Getting the Most From
Your Browser
You now know all the various ways you can access the Internet. However, you may not be
aware of the many features of the browser you use to access the World Wide Web. Your
browser lets you access your online class, keep up with the latest world news, watch videos,
play games, use social media, and more. Typically available for free, the browser is the gate-
way to everything you might want to do online.
Like the debates about which computer is best, people often have strong opinions about
which browser they like best. As we discuss later in this section, it is a good idea to have more
than one browser on your computer anyway, as a backup to your favorite one.
All browsers connect to the web in a similar way; the differences between them usually
boil down to whether you like the interface—the look and feel of the browser, how easy
it is for you to use it to navigate the web, the special features it offers, and the reliability
and speed of that browser on your computer. The article at http://articles.centennialarts
.com/2012/06/08/compar ison-on-a ll-major-web-browsers-inter net-ex plorer-safar i
-firefox-and-google-chrome discusses the opinions of one writer about different browsers.
The list on the next page shows some of the most common browsers used today. Note that
Ashford University Technology Requirements mandate that you use one of the first four
browsers on the list.
sol82612_03_m03_047-062.indd 55 6/29/16 5:10 PM
© 2016 Bridgepoint Education, Inc. All rights reserved. Not for resale or redistribution.
http://articles.centennialarts.com/2012/06/08/comparison-on-all-major-web-browsers-internet-explorer-safari-firefox-and-google-chrome
http://articles.centennialarts.com/2012/06/08/comparison-on-all-major-web-browsers-internet-explorer-safari-firefox-and-google-chrome
http://articles.centennialarts.com/2012/06/08/comparison-on-all-major-web-browsers-internet-explorer-safari-firefox-and-google-chrome
56
3.2 Getting the Most From Your Browser
• Internet Explorer: http://support.microsoft.com/Product/internet-explorer
/internet-explorer-11
• Safari: http://www.apple.com. Click on the search icon (magnifying glass)
in the upper right-hand corner of the screen and type “Safari.” Click on
“OS X – Safari – Apple.”
• Chrome: https://www.google.com/chrome/browser/features.html
• Firefox: https://www.mozilla.org/en-US/firefox/desktop
• Opera: http://www.opera.com
• Dolphin: http://dolphin-browser.com/about
Because browsers are free, download two or three of them and try them out to see if you like
the interface and the way they work with your computer. You can always uninstall a program
and install a different browser if you later decide you do not like the one you originally chose.
To experience the look and feel of the many browsers available, check out the tutorials and
information at the following links.
• Internet Explorer: “Getting Started With Internet Explorer 11” (included in tutorial
titled “Browsing the Web”) is available at http://windows.microsoft.com/en-us
/windows-8/browse-web-internet-explorer-tutorial.
• Safari: “Mac Apps Support” provides an overview of new features in Safari and help
with solving common problems and learning more about the browser on the Apple
website. Click on the search icon (magnifying glass) in the upper right-hand corner
of the screen and type “Safari support.” Click “Support” under the search bar. Click
on “Safari Support – Browse featured articles, software updates, and other helpful
resources.”
• Chrome: “Google Chrome Tutorial Index” provides a comprehensive list of
resources to learn more about using the Google Chrome browser at http://
googlechrometutorial.com/Google-chrome-tutorials.html.
• Firefox: “Get Started With Firefox: An Overview of the Main Features” (https://
support.mozilla.org/en-US/kb/get-started-firefox-overview-main-features) lists
a table of contents with links to help you get started using the Firefox browser. You
can also find links to additional articles and topics from Mozilla support at https://
www.mozilla.org/en-US/firefox/desktop.
It is a good idea, though, to have two browser programs loaded on your computer. Because
browsers all search the web a little differently, you may find information searching on one
browser that you do not find as easily on another. Browsers can also crash, and you may also
occasionally get a message that your browser is “down,” a phrase that means it is inactive
or nonoperational. When you install a browser on your computer, you will usually receive a
message asking if you want to designate it as your default, or primary, browser. Choose one
browser as your default and just leave the other browser installed as a backup. That way, if a
problem occurs with your default browser, you will still be able to access the Internet.
sol82612_03_m03_047-062.indd 56 6/30/16 11:20 AM
© 2016 Bridgepoint Education, Inc. All rights reserved. Not for resale or redistribution.
http://support.microsoft.com/Product/internet-explorer/internet-explorer-11
http://support.microsoft.com/Product/internet-explorer/internet-explorer-11
http://www.apple.com
https://www.google.com/chrome/browser/features.html
https://www.mozilla.org/en-US/firefox/desktop
http://www.opera.com
http://dolphin-browser.com/about
http://windows.microsoft.com/en-us/windows-8/browse-web-internet-explorer-tutorial
http://windows.microsoft.com/en-us/windows-8/browse-web-internet-explorer-tutorial
http://googlechrometutorial.com/Google-chrome-tutorials.html
http://googlechrometutorial.com/Google-chrome-tutorials.html
https://support.mozilla.org/en-US/kb/get-started-firefox-overview-main-features
https://support.mozilla.org/en-US/kb/get-started-firefox-overview-main-features
https://www.mozilla.org/en-US/firefox/desktop
https://www.mozilla.org/en-US/firefox/desktop
57
3.3 Troubleshooting and
Getting Help
It is nearly inevitable that at some point during your degree program, you will run into some
sort of technical difficulty. Whatever you do, don’t panic! You have a lot of resources at your
disposal, the most important of which can be found at the Ashford University Student Portal
home page. There you will find links on your home page for technical assistance with any
hardware, software, or Internet issues you may encounter. However, here are some options
to keep in mind and try before you contact the Ashford University Technical Support team.
Solving Computer Technical Problems
It is after midnight. You need help with a computer problem, and everyone in your family is
fast asleep (or you know more about the computer than others in your household). Maybe
you are in a different time zone from your instructors and fellow students. It may be 12 hours
or more before you can get a response from anyone about a technical issue you face. Or per-
haps you are just stumped or frustrated about a recurring problem in one of your software
programs that you do not know how to fix. What do you do?
sol82612_03_m03_047-062.indd 57 6/29/16 5:10 PM
© 2016 Bridgepoint Education, Inc. All rights reserved. Not for resale or redistribution.
58
3.3 Troubleshooting and Getting Help
You will be happy to know that you have 24-hours-
a-day, 7-days-a-week technical support at Ashford
University, so you are never completely on your
own. However, if you try to find the answer to the
problem first, you may have the satisfaction of solv-
ing it and may learn more in the process. Here are
some suggestions you may consider for solving
technical issues that might arise during your Ash-
ford courses:
1. Ask your classmates. Don’t be afraid to reach out to
fellow students for assistance with technical prob-
lems. Others may be having the same problem and
may benefit from your questions and answers. The
Ashford Café and its links to social media sites are
great ways to share computer technical knowledge
with others.
2. Use your software Help menu. In most software programs, you will notice a question mark
enclosed in a circle at the top of the page. Click this question mark to open the software pro-
gram’s Help menu. You will generally see a search box where you can type a word or phrase
that describes your problem, such as “indenting a paragraph in Microsoft Word.” Press the
Enter key, and the software will provide suggestions or topics that may help you solve the
problem.
3. Review software tutorials. Open your browser and search the web using the name of the
software program and the word “tutorial.” For example, you may type “PowerPoint tutorial”
and find step-by-step guides for how to navigate through a software program with which you
are unfamiliar.
4. Search the web for help. Again, open your browser and, on your home page, describe the
problem you are facing. You can type words, phrases, complete sentences, or questions. For
example, you might type: “Internet Explorer keeps giving me the message 404 file not found.
What does this mean?” Try typing these sentences on your browser home page now, and see
what happens. You should see links to websites with lists of answers and explanations from
various individuals and companies for what the problem means and how to solve it. Try their
suggestions to see if one works.
5. Use Windows Task Manager. Sometimes too many software programs or screens open on
your computer use a lot of memory, which can cause your computer to slow down, freeze, or
lock up completely, so you cannot continue to work. Use the keyboard shortcut Ctrl+Alt+Del.
A menu should appear. Click “Start Task Manager,” and the Windows Task Manager window
will open and display all the software programs that are currently running on your computer.
Right-click on the name of any program you recognize but are not using at this time, and
a drop-down menu will appear. Then, click “End Task.” Repeat this process until you have
Pashalgnatov/iStock/Thinkstock
Become familiar with your resources
for solving technical issues before a
problem occurs, so you know where to
go for help.
sol82612_03_m03_047-062.indd 58 6/29/16 5:10 PM
© 2016 Bridgepoint Education, Inc. All rights reserved. Not for resale or redistribution.
59
3.3 Troubleshooting and Getting Help
closed any programs you currently don’t need. To close the Windows Task Manager, click the
X button in the upper right corner of the window.
6. Force Quit on Mac OS. A function similar to End Task in Microsoft Windows is Force Quit,
which is available on Mac computers. There are four ways to Force Quit a software applica-
tion on the Mac OS: (a) Click the icon for any software you are not using and hold down the
left mouse button, then click “Force Quit” from the pop-up menu; (b) right-click on a software
icon and choose “Force Quit” from the pop-up menu; (c) select from a list of applications to
quit by clicking the Apple icon in the menu bar, then clicking “Force Quit”; and (d) use the
keyboard shortcut Cmd+Opt+Shift+Esc to quit a software application you are currently using.
7. Reboot your computer or modem and router. If the processes described in steps 5 or 6 do
not solve your problem, try saving any files you are working on and restarting your computer.
This action will close the open programs on your computer, shut it down, and then restart it.
Note that when you turn off a computer, all the data that has not been saved is lost. So remem-
ber to save your work regularly and save and close any open files before you shut down your
computer. If your computer is working but you cannot access the Internet, try rebooting your
modem and router. (You may need to contact your Internet service provider to do this, not the
Ashford Help Desk.)
8. Make sure you have installed all updates. Computer manufacturers issue regular updates
to correct problems with their software and to make sure it is compatible with other new
technologies. You will see a number of icons at the bottom right of the menu of your Windows
computer screen. One of these icons will let you know if there are available updates to your
software that have not yet been installed. Make sure to install them; they may correct a prob-
lem you are having. Also, run a virus and malware scan using your security protection soft-
ware. (See Module 6 for more information about this type of software.) On Mac computers, we
recommend you set your system preferences to automatically install app updates whenever
they are available.
9. Delete cookies and temporary Internet files. In Module 6 we will discuss ways in which your
activities on the Internet are tracked. This tracking results in small data files called cookies
and temporary or temp files being created and stored on your computer. If you do not delete
these files regularly, they can slow down your computer, cause it to freeze, or create other
problems. You can purchase computer cleanup or “optimizing” software programs to improve
your computer’s performance. However, research such programs and read the reviews before
purchasing them. You can also easily clean up your computer yourself and improve its perfor-
mance by deleting cookies and temporary files. Use the Help menu to search for instructions
on how to perform these tasks on your computer.
sol82612_03_m03_047-062.indd 59 6/29/16 5:10 PM
© 2016 Bridgepoint Education, Inc. All rights reserved. Not for resale or redistribution.
60
3.3 Troubleshooting and Getting Help
If the listed actions do not successfully resolve your problems, don’t hesitate to contact your
Ashford University Technical Support team for help. The following are some contact options
available to you.
Contacting Ashford Technical Support
On your Ashford University Student Portal home page, you will find the following two catego-
ries on the left navigation bar where you can access technical support:
1. Technical Support
This category gives you the following two options:
a) Contact Info displays the information you need to access the Ashford Live Chat
Help, hyperlinks for web support and Ashford support, and technical support
telephone numbers.
b) Ashford University Phone Menu displays a menu for accessing technical support
by phone for various types of technical issues you may encounter.
2. Live Chat Help
Live Chat Help is available during normal business hours (Pacific Time). If you click
this link during these hours, you will be connected to the technical support team. If
you click at a time other than normal business hours, you will receive a message to
contact your advisor by e-mail. Because e-mail responses can take up to two busi-
ness days, you may want to try some of the other technical support options outlined
earlier.
sol82612_03_m03_047-062.indd 60 6/29/16 5:10 PM
© 2016 Bridgepoint Education, Inc. All rights reserved. Not for resale or redistribution.
61
Summary & Resources
Summary & Resources
Module Summary
A critical component in your academic success is to have a secure and reliable Internet con-
nection. The Internet is the world’s largest computer network, and it allows you to connect
with any other computer on the planet. Networks are essential communication channels.
They allow individuals in businesses and other organizations to share information and files
and to collaborate, even though they may be separated by distance and time zones.
This module described the many options you have for connecting to the Internet, whether
you are at home, at a specific location in town, or on the go. We also discussed steps you can
take on your own to resolve technical problems you might encounter with your computer or
online class. If you are not able to resolve problems using these ideas, don’t worry. Your Ash-
ford University Technical Support team is available 24 hours a day, 7 days a week to guide you
through other possible solutions. We hope the information in this module and the support
available to you from your course instructors, your Ashford advisors, your classmates, and
the Ashford University Technical Support team gives you confidence that assistance is always
available to help you succeed at Ashford University. Don’t hesitate to ask for it!
Critical-Thinking Questions
1. What type of computer network do you use to gain access to the Internet and com-
plete your course work? What are your options for connecting outside a home
network?
2. Which four browsers are acceptable for completing your courses? What does your
browser enable you to do?
3. What steps should you take if you have computer problems or experience difficulty
connecting to the Internet?
Key Terms
computer network A group of computers
that connects with other computer networks
and individual electronic devices, so each
computer can send and receive information
to and from other computers and peripheral
devices.
interface The point where the user and the
device interact. The interface is represented
by the look, feel, and overall user experience
of a device, browser, or operating system.
Internet A massive global computer net-
work of other computers and other, smaller
networks.
intranets Internal networks that busi-
nesses and organizations use to share
files and information among stakeholders,
develop collaborative projects, and share
computer applications.
modem In a home or office network, the
device that connects with the Internet
through a telephone landline.
router In a home or office computer net-
work, the device that connects the computer
to the modem, other computers in the home,
and/or a printer or other devices to share
data and information.
sol82612_03_m03_047-062.indd 61 6/29/16 5:10 PM
© 2016 Bridgepoint Education, Inc. All rights reserved. Not for resale or redistribution.
62
Summary & Resources
USB Internet stick A small device that
acts like a modem, plugs into your laptop
computer through a USB port, and gives you
wireless Internet service. These services use
mobile broadband telephone services from
cellular service providers.
Wi-Fi Internet service Wireless access to
the Internet, whether in a home, business, or
public space.
World Wide Web Commonly known as
“the web,” a method of accessing and shar-
ing information on the Internet. The web
is likely the part of the Internet with which
people are most familiar.
sol82612_03_m03_047-062.indd 62 6/29/16 5:10 PM
© 2016 Bridgepoint Education, Inc. All rights reserved. Not for resale or redistribution.
By Kathy Sole, Ashford University
Learning Objectives
After reading this module, you should be able to
Explain what is required to be considered a good digital citizen.
Module 4
Your Online Social Life
Caia Images/Caia Images/SuperStock
(http://content.thuzelearning.com/books/Sole.26
05.16.2/sections/mod04intro#mod04intro)
Introduction
(http://content.thuzelearning.com/books/Sole.26
05.16.2/sections/mod4.1#mod4.1)
4.1 Digital Citizen-
ship and Etiquette
Awareness
(http://content.thuzelearning.com/books/Sole.26
05.16.2/sections/mod4.2#mod4.2)
4.2 Communicating
Through Blogs
(http://content.thuzelearning.com/books/Sole.26
05.16.2/sections/mod4.3#mod4.3)
4.3 Communicating
Through Social
Media
(http://content.thuzelearning.com/books/Sole.26
05.16.2/sections/mod4.4#mod4.4)
4.4 Sharing Per-
sonal Information
on the Internet
(http://content.thuzelearning.com/books/Sole.26
05.16.2/sections/mod04summary#mod04summar
y)
Summary &
Resources
https://content.ashford.edu/books/Sole.2605.16.2/sections/mod04intro#mod04intro
https://content.ashford.edu/books/Sole.2605.16.2/sections/mod4.1#mod4.1
https://content.ashford.edu/books/Sole.2605.16.2/sections/mod4.2#mod4.2
https://content.ashford.edu/books/Sole.2605.16.2/sections/mod4.3#mod4.3
https://content.ashford.edu/books/Sole.2605.16.2/sections/mod4.4#mod4.4
https://content.ashford.edu/books/Sole.2605.16.2/sections/mod04summary#mod04summary
Outline the potential consequences of plagiarism at Ashford University and state how you can
avoid it in your assignments and online discussions.
Describe how blogs can be used to enhance your academic, professional, and personal life, and
identify at least two precautions you can take to ensure that your blog comments are kept
private.
Describe how social media can be used to enhance your academic, professional, and personal
life, and identify at least two precautions you can take to ensure that your social media
comments are kept private.
Explain some of the ways people inadvertently share more information online than they should.
Lesia_G/iStock/Thinkstock
Being part of a digital community means
knowing and following the rules of
etiquette and good citizenship.
Introduction: What Are Your Responsibilities Online?
The digital world hosts a seemingly infinite number of possibilities and opportunities. People from all
over the world go online to seek information, take classes, conduct business, shop, socialize, and even
inspire social change. When you use a computer, smartphone, tablet, or other online device, you
become a member of this digital community.
As in any community, citizens have both rights and
responsibilities. Our society permits us to have
freedom of speech, assemble with other people, and
pursue activities that make us happy. However, with
these rights come responsibilities to obey the law,
respect our neighbors, refrain from littering, and
participate in community activities such as
Neighborhood Watch or cleanup days to keep our
community safe and pleasant. Good community
citizens accept their responsibility to help keep the
community safe and beneficial for all its members.
Like most societies, the digital community has certain
rules of etiquette and good citizenship. The
information in the following sections outlines your
rights and responsibilities as you navigate the online
world and gives you the knowledge and skills to
participate responsibly in this online society.
In the 1960s Canadian theorist Marshall McLuhan recognized that technology and media allowed
people to share ideas and interests in ways that were previously unknown. McLuhan coined the term
global village to describe how we are connected with others through technology. McLuhan, of course,
wrote long before the Internet had been invented, but he recognized the fact that when we engage with
other people, no matter the context, we have shared rights and responsibilities. A digital citizen can be
defined as a person who uses digital resources to engage in society (Mossberger, Tolbert, & McNeal,
2008).
The International Society for Technology in Education (ISTE) has developed standards for identifying a
good digital student–citizen. The society defines digital citizenship among students in the following way:
“Students understand human, cultural, and societal issues related to technology and practice legal and
ethical behavior” (ISTE, 2007, p. 2). Good digital student–citizens, in the ISTE’s (2007) view, conform to
the following four actions:
1. Advocate and practice safe, legal, and responsible use of information and technology.
2. Exhibit a positive attitude toward using technology that supports collaboration, learning, and
productivity.
3. Demonstrate personal responsibility for lifelong learning.
4. Exhibit leadership for digital citizenship. (p. 2)
What type of digital citizen are you? Do you meet the criteria listed? In what areas could you improve
to be a better digital citizen?
A Good Digital Citizen Understands and Avoids
Plagiarism
Digital citizenship translates to your online college classroom in that good digital student–citizens
practice academic integrity. They conform to the academic integrity policies and student community
standards in the university catalog available on the Student Portal home page. They avoid plagiarism,
which occurs when a writer uses someone else’s language, ideas, or other original (non-common-
knowledge) material without acknowledging its source (Council of Writing Program Administrators,
4.1 Digital Citizenship and Etiquette Awareness
Danae Munoz/Ikon Images/SuperStock
Plagiarism is a serious offense
that includes using someone
else’s language, ideas, or other
original material without
acknowledging the source.
2003). They use critical thinking to formulate responses to assignments and to develop academic
papers.
Plagiarism is a serious offense. When you represent another’s
work as your own or closely copy the language or arrangement
of a document that is not yours, you are stealing other people’s
work. Most organizations and academic institutions, including
Ashford University, have strict policies prohibiting plagiarism.
Faculty members are required to report suspected plagiarism,
and a formal investigation is conducted. If you are found guilty,
the penalties are severe and may result in a failing grade on the
assignment, a failing grade for the class, suspension from the
university, or expulsion. Such consequences are a stain on your
academic record and a blemish on your integrity and your
reputation. You must be extremely careful to give other people
credit when you use their ideas, because forgetting to give credit
to others is not a valid excuse. Some examples of actions that
would be considered plagiarism are as follows:
Submitting a paper written by someone other than
yourself, such as a friend, family member, or a previous
student.
Submitting a paper written by you for another class,
unless you have permission from your instructor and
clearly indicate that the paper was submitted previously
for another purpose. Ashford University’s policy on
recycling your assignments can be found in the “Student
Responsibilities and Policies” link in the classroom.
Submitting a paper you found online or purchased on the
Internet.
Copying partial or complete sentences or paragraphs
from the work of others without giving them credit.
Changing only a few words from another person’s work
and then passing it off as your own idea.
Forgetting to include the source of other people’s ideas
you used in your paper.
It is important to refrain from plagiarism under any circumstance, whether academic, professional, or
personal. This includes when you are writing a paper for class, making a comment in a discussion
forum, doing a presentation, or engaging in social media. It is never appropriate to present someone
else’s ideas as your own.
A Good Digital Citizen Respects Copyright Laws
To be a good digital citizen in your Ashford University classes, you will be required to understand and
respect copyright laws and make sure you do not violate them by using others’ materials either
inappropriately or without written permission. The following resource provides a brief overview of
these laws and how to observe them: http://www.whoishostingthis.com/resources/student-copyright
(http://www.whoishostingthis.com/resources/student-copyright) .
A Good Digital Citizen Practices Online Etiquette
http://www.whoishostingthis.com/resources/student-copyright
Iain Masterton/age fotostock/SuperStock
With so many new forums for social
networking, it’s important to learn the
rules for online etiquette.
In any society, having good manners and being polite
are important to ensure that people respect one
another and treat others appropriately. As a good
digital citizen, you must also practice good manners.
Over the past few years, a system of online etiquette
has evolved about what is considered polite and
professional behavior when using digital resources.
In the physical world, etiquette includes unwritten
rules of good behavior such as holding the door open
for the person entering a building behind you, not
shouting or being rude in public, and showing respect
for your colleagues. Online, similar rules are
important to maintain a positive shared environment.
Digital citizens are careful not only about what they
say online, but how they say it. One of the biggest
problems with online communication is interpreting
the writer’s tone. What we think is short, sweet, and to the point, other people might interpret as rude,
abrupt, or condescending. Always reread what you write before posting online to reduce the likelihood
that what you have written will be misunderstood.
The following is a brief list of ground rules for communicating in any online environment. In the
remainder of the module, we will look more closely at digital citizenship and etiquette in the classroom,
at work, and on social media.
Always avoid offensive language, and reread what you write so it is unlikely to be interpreted as
offensive.
Never share personal information or material about other people.
Never distribute pornographic or slanderous material.
Don’t engage in flaming, a term that describes an increasingly intense and vicious debate. If it
appears that a discussion is headed in this direction, simply stop.
Remember the Golden Rule: Treat people the way you would like to be treated.
Have you ever displayed negative etiquette online? What steps can you take to improve in this area?
Are there any tips on etiquette you would add to this list?
In addition to avoiding plagiarism and displaying appropriate etiquette, a good digital citizen protects
the online community by making sure to guard against transmitting computer viruses and other threats
by installing antivirus and security software on his or her computer. We will discuss this topic in more
detail in Module 6. A good digital citizen also exhibits a positive attitude toward the use of technology,
supports others in the community, takes personal responsibility for lifelong learning, and acts as a role
model for other students.
These rules are easy to learn and will quickly become second nature. This course is designed to make
your online experiences fun, useful, and as positive as possible.
Plagiarism
The ability to collaborate with others on the web is often called collective intelligence, and it has
created opportunities and forums for people to instantly share information with others around the
world—via online communities—that were previously impossible. This collective intelligence is open to
anyone who logs in or creates an account on the site. This means, however, that nothing you write is
private. As one observer wrote:
In the late 1990’s, the head of a large Internet computer company made the statement, “Privacy
is dead, get over it.” There’s some truth to that statement, that in order to ensure one’s privacy,
one should never make a single public utterance or statement. For absolute privacy, say
nothing online. However, that is not a realistic strategy in this day and age. The Internet is the
great communicator vehicle, and it will not be silenced simply because of privacy issues.
(Grohol, 2005, para. 11)
Simply said, if you want privacy, don’t use the web. Most would agree, however, that the web is a
wonderful tool for learning, sharing, and interacting with others. You must be aware that everything
you say and share on the web is public information. This is especially true when you post to blogs and
social media sites, which we will discuss in this section and in Section 4.3. Your college class
assignments will rarely require you to post information on a blog or on social media. However, using
these types of websites can be an excellent way to connect with your classmates and share information
with them outside of class. Some social media sites, such as LinkedIn, are also great ways to connect
with people in professional careers you may plan to pursue.
Do you remember Chantal from Module 1? She participates in several blogs and social media websites.
She follows the blogs of people in the marketing industry, where she hopes to work after she graduates.
She also uses LinkedIn to connect with people in the marketing field and is hoping to apply for an
internship through someone she met on the site. Chantal uses Facebook to keep in touch with her
friends and connects with several classmates she met in her college courses through Ashford Café.
These classmates are single moms, like herself, and they understand the difficulties of attending school
while caring for children, so they have created a type of online support system for themselves. Let’s
look at some specifics regarding blogs.
4.2 Communicating Through Blogs
g-stockstudio/iStock/Thinkstock
Blogs allow people to publish photos and
chronicle trips or life events and are
accessible to billions of people.
Blog is a word created using the b from the word web
and the term log, and refers to a discussion or
informational website where you can usually post
comments or questions and responses to the
comments or questions of others on various topics.
The first blog made its debut around the year 2000,
and by the end of 2011, a national survey firm
reported that 181 million blogs could be found on the
web. These numbers included 6.7 million people who
publish their blogs as websites, altogether known as
the blogosphere, and another 12 million people who
wrote their blogs on social networks (Nielson
Company, 2012).
Blogs are a form of social networking, where you can
connect with people who have interests similar to
your own or exchange information and learn from
others. WordPress, Blogger, Quora, and Tumblr are
four popular blog sites. These blogs often have a combination of serious and more trivial topics. Tumblr
(2016), for example, explains the content of its website this way: “Stories, photos, GIFs, TV shows, links,
quips, dumb jokes, smart jokes, Spotify tracks, mp3s, videos, fashion, art, deep stuff. Tumblr is 244
million different blogs, filled with literally whatever” (para. 2).
Some personal blogs are like a diary; people use them to chronicle a trip they are taking or to update
people about family events. Blogs are also used by political candidates and state and local governments
to reach out to constituents and gather opinions on important issues. Clubs, businesses, and other
organizations use them, as well, to report on their activities or share information they believe is
important to those who subscribe to the blog and follow it regularly.
The terms and conditions of many blogs require people to use their own names, which can open you up
to personal safety risks if others do not agree with your opinions. Other blogs allow users to remain
anonymous, which can also be dangerous because some people are willing to say things anonymously
that they would not say if their name was attached to the comment. A good rule to follow for posting
comments on any type of blog is not to say something online that you would not say if you were talking
with someone face-to-face.
Decades ago, when many people kept diaries, they poured their deepest thoughts and desires onto the
pages, but the diary had very secure privacy settings. The book had a key lock, there was only one copy,
and the copy was usually hidden somewhere, away from prying eyes. Of course, web blogging is
entirely different, since it is accessible to billions of people.
Thus, the first thing to remember is that what you write will likely be accessible by someone forever.
This means that something you might casually compose and post at a younger age might resurface
when you are looking for a job later in life. Employers often scour the web to learn about you as a
person. To make sure they do not find anything unsavory about you, keep your posts clean and
appropriate.
Second, even if you use a pseudonym for your blog, it does not mean you are completely protected or
private. If the pseudonym is ever connected to your real name in any online activity, it becomes quite
easy to match your online posts together. Similarly, any photographs of you with a pseudonym can be
associated with photographs with your real name, because photographic face recognition software is
advancing very quickly and may soon replace a password as the way you log in to a computer.
Third, by providing personal information about yourself in a post, you may inadvertently make
yourself a target. For example, let’s say your friend writes a post about his surprise 30th birthday bash
last Saturday. He posts pictures of the gorgeous decorations his friends and family put on the outside of
his house, as well as the new car he bought for himself. He has now publicly announced his birth date,
provided information about what his neighborhood looks like, and given out his license plate number,
all of which may put him at serious risk for both identity theft and robbery. Let’s hope his next post isn’t
about an upcoming vacation, because then everyone will know when he won’t be home to safeguard
his house.
Fourth, there are privacy controls you can use while blogging. For example, you can set your blog to
remain private and allow only people you know to read it (such as family or classmates). However,
keep in mind that if any of these accounts are compromised and a password is hacked, all of your posts
could suddenly become public.
Just because you have to be aware of privacy issues does not mean you cannot have fun and make
productive use of the web to connect with other people. One way to do this is through social media,
which is discussed in Section 4.3.
Think for a moment about the people in your life. They typically fall into two groups. The first are your
friends and family, with whom you share your innermost secrets, dreams, desires, and aspirations. The
second group of people you associate with are your colleagues and acquaintances at work. Of course,
many of them might become friends, too, but in general, you share different aspects of your life with
them. For most of us, these two main groups define most of our daily interactions. Today, through social
media, we can stay connected with these two primary groups. Just as in face-to-face conversations,
what we choose to share with these two groups may be very different, so you will want to ensure that
what you share on social media is appropriate for each audience.
Dozens of social media or social networking sites can be found on the web for connecting with friends
and family. Some of the most popular sites are Facebook, Twitter, Pinterest, Instagram, and Snapchat.
For expanding your business contacts, LinkedIn has become the most popular networking site. The
social media sites used most often by adults from 2012 to 2014 are shown in Figure 4.1.
Figure 4.1: Social media sites, 2012–2014
Many people use a variety of social networking sites to stay connected with friends,
family, former classmates, and colleagues.
4.3 Communicating Through Social Media
From “Social Media Update 2014,” by M. Duggan, N. B. Ellison, C. Lampe, and A. Lenhart, 2015
(http://www.pewinternet.org/2015/01/09/social-media-update-2014
(http://www.pewinternet.org/2015/01/09/social-media-update-2014) ). Copyright Pew Research Center. Reprinted
with permission. More recent data can be found at http://www.pewinternet.org/fact-sheet/social-me-
dia (http://www.pewinternet.org/fact-sheet/social-media)
Social media websites generate massive volumes of data, including text, photos, and videos. Studies
show that more than 300 million photos are uploaded daily to Facebook, 72 hours of video are uploaded
to YouTube every minute, and Twitter receives almost 400 million tweets per day (Tsukayama, 2013).
The International Data Corporation estimated that in 2011 the equivalent of 200 billion 60-minute high-
definition movies were created—a number that would take one person 47 million years to watch (as
cited in Heisterberg & Verma, 2014).
Social media is a wonderful way to stay in touch with your fellow students as you continue your degree
program. You won’t always be in the same classes with people you meet now, and you may want to stay
connected, grow your friendships, and help each other in the future. Social media can also facilitate
social learning. Some theorists believe that learning takes place in a social context, and the influence
of our peers is an important form of learning. Like all forms of communication, however, it is
important to be respectful of others on social media.
To get a general idea of how these collaborative sites operate and how they and other social networking
sites can affect your privacy, let’s look at three examples: Twitter, Facebook, and LinkedIn.
Twitter is an alternative to posting long entries on a blog and allows you to post short statements about
what you are doing or thinking at any given time of the day. You have a maximum of 280 characters for
each post, which is called a tweet. Visit http://www.twitter.com (http://www.twitter.com) to explore the
social media platform.
Given how short they are, who would care about these
tiny tweets? You may be surprised. In early 2012
http://www.pewinternet.org/2015/01/09/social-media-update-2014
http://www.pewinternet.org/fact-sheet/social-media
http://www.twitter.com/
Steven Bernard/age fotostock/SuperStock
As a registered Twitter user, you can send
280-character tweets to Ashford University
classmates, celebrities, or any of the social
media site’s millions of users.
Twitter was generating excitement over who would
become its 500 millionth user. Twitter can be used to
share interesting places you found on the web, ideas
you have, a life event (someone tweeted at the altar as
he was about to kiss his bride), a frustration, or a
question. Registered users can read and post tweets,
but unregistered users can only read them.
But Twitter is for more than just sharing personal
details. Twitter can help you connect specifically to
people who most interest you. You can follow other
people’s posts, create and participate in polls, and
track celebrity posts. (Singer Katy Perry was among
the first to have 100 million followers on Twitter.) You
might use Twitter as a way to get to know your
Ashford University classmates better outside of class.
Through the Ashford Café, many students establish
relationships and use Twitter to keep in contact
throughout their college programs.
Twitter also has a practical benefit for businesses to promote their products, for theologians to discuss
faith, and for scientists to announce their latest discoveries. Twitter has been used to organize
gatherings, sometimes called flash mobs or tweetups. If you wish, you can have conversations about
specific subjects using “hashtags.” A hashtag is a word or phrase preceded by a pound sign (#) and is
used to identify, describe, and organize messages on a certain topic. You can add hashtags to your own
tweets or click on hashtags in others’ tweets to see all the tweets on that topic. For example, if you
wanted to make a comment about the Super Bowl, you might include #SuperBowl in your tweet. If you
wanted to see what other people are saying about the Super Bowl, you might click on #SuperBowl in
someone else’s tweet (or in Twitter’s list of trending topics) or search for #SuperBowl using the search
bar. Some have used Twitter to encourage political engagement and social activism: Hashtags such as
#BlackLivesMatter, #MeToo, and #MAGA (Make America Great Again) have been used to facilitate
discussion, diatribes, and debate.
What you may not know about Twitter is that the site automatically includes location data when the
Twitter setting geotagging is enabled, which is a feature that allows a website to identify information
about your location. In 2013 a University of Southern California graduate student built an application
that analyzed more than 15 million tweets over a 1-week period. The study revealed that 20% of tweets
revealed the users’ locations, and the information was publicly available. The researchers found that
even when users chose to disable this setting, many revealed their location by name-dropping
something such as a restaurant or through metadata in photos (Gates, 2013). Metadata might be
defined as “data about other data.” For example, metadata might be information about a picture such
as who took the photograph, where it was taken, a street sign, or other identifiable information in the
photo itself. Corporations and intelligence groups use this information to create user or target profiles.
Fortunately, these researchers also developed a tool to give users the ability to review their own Twitter
accounts, view their own risk, and manage it (see Strategies for Success: Keeping Your Location Private
on Twitter). If the tweets have any location data in them, they will show up as points on a zoomable
Google map, and users can retrieve information about where they were when they revealed their
location. You can view these combined bits of location information, called your geosocial footprint, to
learn about your past sharing habits and privacy. If you have a Twitter account, you can use this free
tool at http://geosocialfootprint.com (http://geosocialfootprint.com) .
http://geosocialfootprint.com/
Strategies for Success: Keeping Your Location Private on Twitter
To avoid giving up too much information, an article in the Huffington Post, an online news
aggregator and blog, suggests the following:
Check your Twitter account security and privacy setting to see if you have checked “Add a
location to my Tweets.” If you have, uncheck that box and save changes or delete all
location information on your account.
On your Twitter settings page, view other applications you may have authorized to access
your Twitter account, such as Foursquare, a social network website that helps users find
places to connect with other people. You can revoke the authorization for individual apps,
if you wish.
Be careful when posting photos you take with your smartphone. GPS coordinates are
usually embedded in the photo metadata, unless you disable geotagging on your camera.
Be careful about tweeting an image that identifies you at a specific location (Gates, 2013).
Reflection Questions
1. What are some of the pros and cons of having GPS coordinates enabled on your camera?
2. What types of problems have you or someone you know had with unauthorized access to
your social media accounts?
3. What are some advantages of geotagging?
If you have not used Facebook, it can be difficult to understand. Using Facebook is not like transforming
a paper diary into digital text and putting it on the web, as with a blog. Instead, it is an entirely new
communication environment. Websites such as Friendster and Myspace originally defined this genre of
web applications. Friendster no longer exists, and Facebook has now trampled Myspace to become the
leading social networking site (Chaffey, 2016).
So, what is Facebook, exactly? Facebook (which can be found at http://www.facebook.com
(http://www.facebook.com) ) originated in 2004. This free web application allows you to find people you
know and request to add them as friends (“friend” them), allowing you to communicate and share
information with each other. Each user gets a personal profile and “timeline,” where she or he can post
public messages—called status updates—and share photos, videos, and web links. You can also post
public messages on a friend’s timeline, comment and “react” to posts using emojis, and “tag” your
friends in posts, which lets them know you’re posting about them. Your customizable news feed will
highlight your friends’ activities for you, as well as upcoming events and other information.
But Facebook’s features do not end there. You can use
Facebook to live chat, send private messages, organize
events, create or join groups, live stream yourself or
an event, follow pages that interest you, and blog.
Regardless, it is important to remember that almost
everything you do on Facebook is visible. If, on
Facebook, you complain about your coworkers to your
friends or disclose family secrets to your coworkers,
everyone in your network can read it. Bad behavior on
Facebook can have real-world consequences. For
example, there have been cases of colleges rejecting a
http://www.facebook.com/
Voisin/Phanie/SuperStock
Facebook is one of the leading social
networking sites; thus, knowing what is
appropriate to share and how to maintain a
sense of privacy is important.
Bloomberg/Contributor/Getty Images
LinkedIn is a great tool for connecting with
other professionals, applying for jobs, or
posting a job application through your
business profile.
student’s application based on inappropriate postings
on Facebook. Use your privacy settings to adjust what
shows up on your timeline and who can see posts that
you’re tagged in. Facebook also allows you to select
your audience when you make a post—is your post for
the broader public, only your Facebook friends, or
only a few specific friends? Even so, as a general rule,
it is good to remember that if you post something on
Facebook, there are no secrets.
LinkedIn, a business-oriented social networking
website, has become the most popular networking site
for expanding business contacts. In 2017 the website
hit 500 million users, who hail from more than 200
countries (Darrow, 2017).
On LinkedIn, users create profiles and make
connections with one another, which often represent
real-world pro fessional relationships. They then invite
people to join their network and introduce people in
their network to one another to find jobs and arrange
business opportunities. Employers also use LinkedIn to
post job listings and find employees. Potential
employees can use LinkedIn to apply for these jobs,
and employers can review applicants’ profiles much
like they would read a résumé. We will discuss how
you can use LinkedIn as an employment tool in
Module 8.
As mentioned earlier, you can sometimes take personal actions online without fully realizing the
consequences of these actions. Once you know these risks, however, you can take steps to protect
yourself. Let’s take a look at common ways many people often disclose more personal information than
they should.
It may surprise you to learn that people you have never met may know where you live and how long
you have lived there. They may also know your past residences, your phone number, your age and
income, the number of children you have, their names and those of other relatives, the products you
buy, the magazines you read, your political views, your hobbies, and the movies and games you enjoy.
Most of the people and companies who gather this information about you do not use it for fraudulent
purposes. They generally use it to create advertisements or special offers for products and services you
might like. They may also be political pollsters or campaign workers who use the information to solicit
your support for their candidate, or they may be charitable organizations that want you to contribute to
a cause you care about or supported in the past. However, they often entice you to disclose personal
information by tying that personal information to the possibility of winning a prize or helping others by
completing surveys. They may also play on your fear of not being able to return a product or obtain
service if you do not register a product.
Before you participate in a sweepstakes, survey, “free
gift,” or trial offer, make sure you know that the
company sponsoring the sweepstakes is reputable. Do
not respond to an e-mail message or click a link in the
message unless you are sure the message is legitimate.
If possible, go directly to the organization’s website to
participate, rather than responding through an e-mail
message or link. Also, read the terms and conditions of
the sweepstakes or survey to determine what the
company will do with the information it collects.
4.4 Sharing Personal Information on the Internet
Chairboy/iStock/Thinkstock
Be careful when listing your address, phone
number, or other personal information on
sweepstakes or contest forms. This
information could potentially be shared
with third parties.
Similarly, when you purchase products and the
manufacturer asks you to register your product, either
online or by mailing a registration card, determine if
registration is necessary. To do so, consider the
following three questions:
1. Is this information required for you to be
protected by the product warranty? If not, the company may want the information to inform
you of product updates or for marketing purposes. Decide if those are important enough
reasons for you to register.
2. Is the information the company requests reasonable and related to the product you purchased?
Look at the type of information you have been requested to provide and decide if you would be
willing to share this information with family or close friends.
3. Can the information you provide be shared with third parties? Read the terms and conditions
instead of just automatically clicking “I accept.” Make sure you fully understand what you are
agreeing to. If the information will be shared with others, decide if you are willing for it to
become public knowledge.
Sometimes the information we voluntarily provide online may actually be helpful to us, such as when a
company learns that we subscribe to a certain magazine and sends us a promotion to save money when
we renew our subscription. However, remember that electronic data can be permanent. We never
know where this information goes, who will obtain it, how reputable they are, and what they might do
with that information. So think carefully before clicking every sweepstakes, survey, or promotional
offer presented to you.
Note that sweepstakes, surveys, and promotional offers are not the only methods criminals try to steal
our information. Check out A Closer Look: Top Five Social Media Scams for other potential social media
scams you might see.
A Closer Look: Top Five Social Media Scams
Social media websites such as Twitter and Facebook are great ways to connect with family and
friends. However, it is important to be cautious about blindly posting on social media without
considering possible consequences of what you reveal. Ideally, by learning more about ways
your personal information can be used, you will make more informed choices about what to
share about yourself and your family and avoid being the victim of a scam. Recently, the digital
security company Symantec, makers of the Norton brand security programs, published the
following list of the top five social media scams on social media websites (ClubNorton, 2015):
1. Chain messages. You have surely seen posts like this one: “Children in foreign countries
desperately need shelter, water, or school supplies. A rich individual or large company
will donate money if you retweet the post to five of your friends.” Don’t do it! Rich
individuals do not need your support to donate, and reputable charities have their own
fund-raising efforts. Messages such as this one are often gathering names of people to
contact later for other reasons. Break the chain and don’t respond to or pass on these
messages.
2. Requests for money.You are contacted by a friend or a relative who lost his wallet on
vacation and needs money sent immediately. Or, someone “friended” you on Facebook
and now has a problem she hopes you can help her solve with a financial contribution.
Perhaps a message arrives from your bank that you must make an online deposit right
away to cover an overdraft. These are all examples of stories thieves use to solicit money
through social media. Never respond to online requests for money or information about
Trifonenko/iStock/Thinkstock
As the name suggests,
phishing requests try to get
you to take the bait and hand
over personal information.
your credit cards or other financial matters, even from people you know or companies
you think are legitimate. Unscrupulous people can infect a computer with malware
(discussed in Module 6) to steal e-mail addresses or social media contact lists by sending
these messages. Contact the person or company by phone before you send any money
based on a written message. Once you have opened a message like this, run a scan, using
the security software we discuss in Module 6, to make sure your computer is free of any
tracking cookies or other remnants of this type of scam.
3. Hidden charges. You come across a “free” personality
quiz to learn which Hollywood celebrity you most
resemble. You enter some personal information,
including your cell phone number, and your next cell
phone bill shows that you have signed up for a $9.95
monthly subscription to an online service that will send
quizzes to you every month. Trial offers for products
and services and supposedly free games and quizzes
can pressure you to purchase other goods or result in
unsolicited products arriving by mail that you did not
know you ordered. Read all the terms and conditions
carefully before you enter any personal information for
what seems to be a free or inexpensive offer on any
website.
4. Phishing requests. “You have to see these photos of you I
found on social media!” Many of us would be tempted
to click on the link in that message, which takes you to
what looks like your Facebook or Twitter log-in page.
There you enter your log-in ID and password, and a cybercriminal now has control of
your account. This type of scheme is known as phishing (pronounced “fishing”). Don’t fall
for it. Make sure you have installed Internet security software on your computer that
defends against this type of attempt to gain your personal information. We discuss such
software later in Module 6.
5. Hidden URLs. People would rather copy and paste a short URL than a long one, and some
social media sites such as Twitter limit the number of characters in links you post in
messages on the site. For these reasons, online URL shortening services are popular today.
These services allow you to input a long URL and then convert it to a much shorter one.
For example, the URL to find San Diego, California, on Google Maps is http://www.google.
com/maps/place/San+Diego,+CA/@32.7421459,-117.1435718,12z/data=!4m2!3m1!1s0x80
d9530fad921e4b:0x0d3a21fdfd15df79
(http://www.google.com/maps/place/San+Diego,+CA/@32.7421459,-117.1435718,12z/data=!4m2!3m1!1s
0x80d9530fad921e4b:0x0d3a21fdfd15df79) . Using one of these services, the URL can be
shortened to http://bit.ly/1KHhoDZ (http://bit.ly/1KHhoDZ) .
In this example, the shortened URL eliminates all the information that helps you identify the site.
For this reason, shortened URLs can be used by scammers to redirect you to an unsafe website.
You can recognize shortened or hidden URLs by the name of the shorter service (bit.ly in the
previous example) or by the seemingly random mix of letters and numbers at the end. Be careful
of clicking on these URLs, unless you trust the sender. Twitter users post these links frequently.
Learn to recognize the parts of a URL shown earlier in this module and be aware that you will
not know the actual destination of a shortened URL.
In Module 6, we will discuss the importance of installing Internet security software on your
computer to guard against accidentally installing malware on your computer if you click on a
malicious shortened URL.
Reflection Questions
http://www.google.com/maps/place/San+Diego,+CA/@32.7421459,-117.1435718,12z/data=!4m2!3m1!1s0x80d9530fad921e4b:0x0d3a21fdfd15df79
http://bit.ly/1KHhoDZ
1. Have you encountered any of these online scams? How did you react?
2. After reading about common social media scams, will you change any of your online
behaviors? If so, which ones?
Summary & Resources
Module Summary
By joining the vast global community of Internet users, you become a digital citizen. As with any
community, digital citizens have both rights and responsibilities. These include the following:
Advocate and practice safe, legal, and responsible use of information and technology.
Exhibit a positive attitude toward using technology that supports collaboration, learning, and
productivity.
Demonstrate personal responsibility for lifelong learning.
Exhibit leadership for digital citizenship. (ISTE, 2007, p. 2)
As a digital citizen, you also respect copyright laws and refrain from practicing plagiarism. Finally, you
employ online etiquette by being polite, professional, and considerate of others when using digital
resources.
While the web is a wonderful tool for learning, sharing, and interacting with others, nearly everything
you write online is public. This is especially true when you are expressing yourself in a blog or on social
media, such as Facebook, LinkedIn, Instagram, and Twitter. It is important to familiarize yourself with
the privacy settings in each platform you intend to use, understand who will be able to read your posts,
and use online etiquette when sharing your ideas and opinions.
Having an online social life also means taking responsibility for the information you share and
ensuring that it isn’t used against you. By understanding the risks of providing personal information
through sweepstakes, surveys, free offers, and product registrations, you can avoid being a victim of
identity theft or computer viruses.
Critical-Thinking Questions
1. What are your responsibilities as a digital citizen?
2. What are the consequences of committing plagiarism, and how can you avoid it?
3. How is a blog different from a personal journal or diary?
4. What are some of the positive aspects of using social media?
5. How can you ensure that your professors or future employers won’t discover anything
damaging about you online?
6. Describe a situation in which you or someone you know was a victim of an online scam or had a
problem due to something he or she posted on social media.
Key Terms
Click on each key term to see the definition.
blog
An online journal or personal writing platform.
blogosphere
The worldwide community of bloggers.
collective intelligence
The ability to collaborate with others on the web.
digital citizen
A person who participates productively, safely, and responsibly in today’s technological society.
flaming
An increasingly intense and vicious online debate.
flash mobs
Similar to tweetups, gatherings of people organized through social media.
geosocial footprint
The location information revealed by users through social media.
geotagging
A feature that allows a website to identify information about your location.
hashtag
On social media, a word or phrase preceded by a pound sign (#) and is used to identify, describe, and
organize messages on a certain topic.
global village
The shared human connection through technology.
metadata
Big-picture data that is compiled from many smaller data points; often used by corporations and
intelligence groups to create user or target profiles.
online etiquette
Polite and professional behavior that is appropriate when you use digital resources.
phishing
An attempt to obtain sensitive information from another computer user, often for malicious or
fraudulent purposes such as identity theft, by masquerading as a trustworthy source.
plagiarism
The use of someone else’s language, ideas, or other original (non-common-knowledge) material
without acknowledging its source.
recycling
The act of submitting a paper written by you for another Ashford University class. This is not
condoned unless you have permission from your instructor and clearly indicate that the paper was
submitted previously for another purpose. The university’s policy on recycling is detailed in the
“Student Responsibilities and Policies” link in the classroom.
social learning
Learning that takes place in a social context through the influence of our peers.
social networking
A method of building networks or social relationships among people who share common interests,
backgrounds, or activities.
tweetups
Similar to flash mobs, gatherings of people organized through social media or, in this case, Twitter.
Flashcards for Key Terms
An online journal or personal
writing platform
Tap card to see term ?
Choose a Study ModeView this study set
https://quizlet.com/
https://quizlet.com/144483268/fundamentals-of-digital-literacy-chapter-4-flash-cards/
Week2 – Assignment
Building Your Personal Brand PowerPoint
GEN102: WEEK TWO ASSIGNMENT
Hi. I’m Aspen McPartland, the associate vice president for Student Advisement. For last week’s assignment, you were asked to reflect on your current use of technology, different areas of digital literacy in which you would like more information, as well as the digital tools that you plan to use for your schoolwork. This week, you have explored different ways in which people connect in the online world. One of these ways is through the use of social media.
In the second discussion for the week, you discussed different ways to use social media to enhance your personal and academic life. For this week’s assignment, you will explore the use of social media in your professional life. In this digital age, social media has become a great way to promote your career or career-related product or service. You can use social media to build your own professional brand. Building your professional brand allows you to promote yourself through social media, to attract potential employers or clientele.
Now, you will complete your assignment. Your goals for this assignment are to identify a professional goal, choose a social-media platform to promote your professional goal, and discuss the challenges with using social media to promote your goal that you may encounter. For this assignment, you will create a five-slide PowerPoint presentation. On each slide, you will address the bullet points within the assignment prompt.
If you are not familiar with using PowerPoint, review the resources that are included in the assignment instructions. You are also encouraged to review the Digital Tools tab as well as the resources within the Ashford Writing Center. You will be expected to create your presentation in Microsoft PowerPoint and submit it to Waypoint. Before you submit, carefully review your presentation and make sure that each bullet point has been addressed on each of the five slides. Double-check your presentation for any errors in spelling, grammar, punctuation, and organization. When you are satisfied that your presentation is complete, you are ready to upload it to Waypoint.
Prepare: Prior to beginning work on this assignment, watch the Week 2 Assignment video (Links to an external site.) and review the Sample Building Your Professional Brand PowerPoint assignment. Read Modules 3 and 4 of your course textbook and review the Week 2 Instructor Guidance.
Reflect: Social media is an excellent platform for promoting one’s career or career-related product or service. Individuals and organizations leverage the power of social media to build clientele, advertise, and provide insight into the usefulness or popularity of a product or service. Individuals can use social media to promote themselves to build their own brand within their profession or attract potential employers or clients in a career field.
Write: Construct a five-slide PowerPoint presentation (Links to an external site.). Use the bullet points below as a guide for each of the slides.
Slide 1: Create a title slide that includes your name, your instructor’s name, assignment title, and the date.
Slide 2: Identify the career you intend to pursue after graduation or a career-related product or service that you are interested in promoting. Provide a brief description.
Slide 3: Select one social media platform (Facebook, Twitter, Instagram, Snapchat, YouTube, LinkedIn, Pinterest, etc.) and briefly explain how the social media platform you chose can be used to promote your future career field, or career-related product or service.
Slide 4: Describe at least two potential benefits of using social media to promote yourself in your future career field or career-related product or service.
Slide 5: Discuss at least two potential concerns or challenges related to using social media to promote your professional goals and how you plan to address them.
Students in order to have your work properly displayed, it must be converted to a PDF. Here are the steps to follow.
1. Save your original PowerPoint presentation.
2. Open it up again.
3. Click the File tab.
4. Click Save As.
5. In the File Name box, the name of your PowerPoint should already be there. If not, enter a file name without any special symbols.
6. In the Save as type list, click PDF (* ).
7. Click Save.
8. Upload to Waypoint for grading.
Save your work and then submit your worksheet using the Assignment Submission button. If needed watch the Introduction to Waypoint and Originality Reports (Links to an external site.) video for instructions. Verify your submission was successful.
HELPNOWlogo Watch Introduction to Waypoint and Originality Reports (Links to an external site.) for instructions.
Late policy: Written assignments are due on the specified days in the course. Written assignments will be subject to a late penalty of up to 10% per day up to three days late. If written assignments are submitted after 72 hours past the due date, instructors can give a penalty up to and including a grade of 0% for the assignment.
Carefully review the Grading Rubric (Links to an external site.) for the criteria that will be used to evaluate your assignment.