<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="fr">
		<id>https://www.netizen3.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Remilevy</id>
		<title>Wiki livre Netizenship - Contributions de l’utilisateur [fr]</title>
		<link rel="self" type="application/atom+xml" href="https://www.netizen3.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Remilevy"/>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Sp%C3%A9cial:Contributions/Remilevy"/>
		<updated>2026-05-02T09:05:20Z</updated>
		<subtitle>Contributions de l’utilisateur</subtitle>
		<generator>MediaWiki 1.30.0</generator>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Accueil_citoyens_du_net&amp;diff=13919</id>
		<title>Accueil citoyens du net</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Accueil_citoyens_du_net&amp;diff=13919"/>
				<updated>2013-05-30T07:15:42Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Télécharger ce livre en PDF ?''' &lt;br /&gt;
&lt;br /&gt;
Dernière version en date : version  Beta 1.0 (Avril 2013 - PDF, 37.08 Mo), [http://forumeculture.net/livre-citoyens-du-net/ cliquez sur l'image ci-dessous]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Contribuer ?''' Découvrez d'abord la [http://www.netizen3.org/index.php/Wiki_livre_Netizenship:Accueil Communauté des contributeurs] et l'[http://www.netizen3.org/index.php/Aide:Accueil Aide générale] wiki.&lt;br /&gt;
&lt;br /&gt;
* [[Table des matières]] du livre citoyens du net, en version wiki pour '''vos''' contributions.&lt;br /&gt;
* [[Racines de l'économie numérique]], une adaptation du chapitre 5 pour montrer ses liens avec l'Economie Sociale.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Fichier:Citoyen_du_NET_042013WEB_1.jpg‎|link=http://forumeculture.net/livre-citoyens-du-net/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Couverture'''&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Fichier:Citoyen_du_NET_042013WEB_1.jpg&amp;diff=13918</id>
		<title>Fichier:Citoyen du NET 042013WEB 1.jpg</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Fichier:Citoyen_du_NET_042013WEB_1.jpg&amp;diff=13918"/>
				<updated>2013-05-30T07:14:42Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : Page de couverture Citoyen du net V0.1&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Page de couverture Citoyen du net V0.1&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Accueil_citoyens_du_net&amp;diff=13917</id>
		<title>Accueil citoyens du net</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Accueil_citoyens_du_net&amp;diff=13917"/>
				<updated>2013-05-30T07:00:18Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Télécharger ce livre en PDF ?''' &lt;br /&gt;
&lt;br /&gt;
Dernière version en date : version  Beta 1.0 (Avril 2013 - PDF, 37.08 Mo), [http://forumeculture.net/livre-citoyens-du-net/ cliquez sur l'image ci-dessous]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Contribuer ?''' Découvrez d'abord la [http://www.netizen3.org/index.php/Wiki_livre_Netizenship:Accueil Communauté des contributeurs] et l'[http://www.netizen3.org/index.php/Aide:Accueil Aide générale] wiki.&lt;br /&gt;
&lt;br /&gt;
* [[Table des matières]] du livre citoyens du net, en version wiki pour '''vos''' contributions.&lt;br /&gt;
* [[Racines de l'économie numérique]], une adaptation du chapitre 5 pour montrer ses liens avec l'Economie Sociale.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Fichier:Livre-Citoyens-du-Net-Ynternet_org-v0_98-Raphael-Rousseau.jpg‎|link=http://forumeculture.net/livre-citoyens-du-net/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Couverture'''&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Merci&amp;diff=13916</id>
		<title>Merci</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Merci&amp;diff=13916"/>
				<updated>2013-05-30T06:54:50Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Votre inscription est confirmée ! =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A présent, nous vous tiendrons au courant de l'actualité du livre ''Citoyens du Net'', et notamment :&lt;br /&gt;
* de ses '''versions ultérieures'''&lt;br /&gt;
* des '''évènements''' organisés par ses auteurs pour en faire la promotion ou aborder les thèmes de l'eCulture&lt;br /&gt;
* des '''dérivés futurs''' qui en seront issus : films ou courts-métrages, traductions, rencontres, interviews...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Maintenant, vous pouvez :&lt;br /&gt;
* [[Accueil|'''lire''' le livre]] en ligne ou le [https://www.dropbox.com/s/9ilqua23hroie35/Citoyen_du_NET_042013WEB.pdf télécharger (version PDF)] &lt;br /&gt;
* '''intervenir''' sur les pages de ce site (la plupart d'entre elles comporte un onglet &amp;quot;modifier&amp;quot;, allez-y et soyez constructif-ve !)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Si le livre vous plait, n'hésitez pas à :&lt;br /&gt;
* le '''faire connaître''' autour de vous &lt;br /&gt;
* l''''offrir à vos proches''', vos amis et collègues&lt;br /&gt;
* nous [http://www.zen3.net/ynternet.org/contacter-les-collaborateurs-d-ynternet.org contacter] pour nous signaler des fautes, ou si vous désirez des interventions dans votre organisation, des séances de consulting, participer à des évènements relatifs à la culture de la communication électronique...&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Discussion:Les_nouveaux_mod%C3%A8les_de_l%27%C3%A9conomie_num%C3%A9rique&amp;diff=10818</id>
		<title>Discussion:Les nouveaux modèles de l'économie numérique</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Discussion:Les_nouveaux_mod%C3%A8les_de_l%27%C3%A9conomie_num%C3%A9rique&amp;diff=10818"/>
				<updated>2012-12-04T07:01:48Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Cette discussion a pour but de lister les éléments clés en 3 parties (modèles, pratiques sous l'angle producteur d'info, pratique sous l'angle client) pour ensuite les décrire dans l'article &lt;br /&gt;
&lt;br /&gt;
=== les différents modèles économiques :&lt;br /&gt;
* vente de licence d'usages (ancien paradigme)&lt;br /&gt;
* freemium , mixte gratuit et payant en Premium (versions d'évaluations, versions avec plus de fonctions, services additionnels...)&lt;br /&gt;
* Variente de freemium : gratuit pour les particuliers, payant pour les entreprises. Ex : Google&lt;br /&gt;
* donation (wikipedia mais pas seulement)&lt;br /&gt;
* affiliation : recommandation de produits tiers contre commission&lt;br /&gt;
* publicité payante : bannière adsense, sponsoring, etc.&lt;br /&gt;
* infomercial : articles rémunéré&lt;br /&gt;
&lt;br /&gt;
=== les pratiques et méthodes économiques des producteurs d'infos ===&lt;br /&gt;
* appel aux dons (crowdfunding)&lt;br /&gt;
* appel à contribution (crowdsourcing)&lt;br /&gt;
* méthode agile et sa déclinaison scrum&lt;br /&gt;
* marketing en ligne&lt;br /&gt;
* Vente de services et/ou vente de produits&lt;br /&gt;
* les fourches&lt;br /&gt;
* revente des données et habitudes clients (si c'est gratuit, c'est l'utilisateur qui devient la marchandise)&lt;br /&gt;
&lt;br /&gt;
(* externalisation alias outsourcing , notamment via l'informatique en nuage, alias le cloud computing)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Les nouveaux us et coutumes des clients === &lt;br /&gt;
* l'évaluation (appréciation sur trip-advisor etc, &amp;quot;like&amp;quot;)&lt;br /&gt;
* la curation de contenu avec dashboard (comme scoopt.it, blogs, share)&lt;br /&gt;
* la mutualisation de services et de produits (troc en ligne, co-voiturage...)&lt;br /&gt;
* le do it yourself (via forum) et sa la culture RTFM&lt;br /&gt;
* la traque aux troll &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== divers ===&lt;br /&gt;
&lt;br /&gt;
dans l'accroche (suggestion) : vous arrivez sur un site, voici les signaux reconnaissables facilement : &lt;br /&gt;
&lt;br /&gt;
Dushan suggère aussi de distinguer les pratiques sous l'angle bénéficiaire d'infos/services et l'angle fournisseurs d'infos(services.&lt;br /&gt;
&lt;br /&gt;
Théo &amp;amp; Dushan suggèret de retitrer cet article &amp;quot;pratiques &lt;br /&gt;
&lt;br /&gt;
Quelques signaux et scénarii à inclure&lt;br /&gt;
&lt;br /&gt;
[http://aful.org/ressources/fourches-forks Les fourches]&lt;br /&gt;
&lt;br /&gt;
[http://fr.wikipedia.org/wiki/Freemium Freemium]&lt;br /&gt;
&lt;br /&gt;
[http://fr.wikipedia.org/wiki/Scrum_%28m%C3%A9thode%29 Scrum et Agile]&lt;br /&gt;
&lt;br /&gt;
Classification collaborative basée sur des mots-clés choisis librement par les internautes avec le risque de bruit que cela peut générer. Le mot français est une traduction transparente de l’anglais « folksonomy&lt;br /&gt;
&lt;br /&gt;
Attention à ne pas mélanger des modèles économiques et des pratiques internes au monde du travail (fourches)&lt;br /&gt;
faut que cela reste lisible pour le lecteur, clair et limpide.--[[Utilisateur:Pryska ducoeurjoly|Pryska]] ([[Discussion utilisateur:Pryska ducoeurjoly|discussion]]) 24 novembre 2012 à 11:55 (CET)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Voir aussi ici : &lt;br /&gt;
[http://p2pfoundation.net/Category:French P2P Fondation]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
le GGG : comment s'insère-t-il ici? je ne vois pas bien...&lt;br /&gt;
--[[Utilisateur:Pryska ducoeurjoly|Pryska]] ([[Discussion utilisateur:Pryska ducoeurjoly|discussion]]) 24 novembre 2012 à 11:57 (CET)&lt;br /&gt;
Le GGG devrait un article à part je pense. Par contre un scénario c'est la revente des données utilisateurs, des centres d'intérêts, des habitudes et comportements, je l'ai mis sous &amp;quot;revente des données et habitudes clients (si c'est gratuit, c'est l'utilisateur qui devient la marchandise)&amp;quot;&lt;br /&gt;
--Théo Bondolfi 24 novembre 2012 à 12:58 (CET)&lt;br /&gt;
&lt;br /&gt;
-----&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Etude_de_march%C3%A9_Yorg_2011&amp;diff=5052</id>
		<title>Etude de marché Yorg 2011</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Etude_de_march%C3%A9_Yorg_2011&amp;diff=5052"/>
				<updated>2011-08-10T06:40:38Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Proposition d'un questionnaire dans le cadre de l'étude de marché suisse romande en besoins de formation à la culture numérique ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Vous pouvez proposer des modifications directement sur la page (SVP en mode authentifié) et en discuter dans la partie &amp;quot;discussion&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Nom de l'organisme / société'''&lt;br /&gt;
&lt;br /&gt;
URL (http://www....) : &lt;br /&gt;
&lt;br /&gt;
Type d'organisme/société : public/privé/parapublic (plus de 75% des revenus sur mandats publics)&lt;br /&gt;
&lt;br /&gt;
nombre d'employés (équivalent plein-temps)&lt;br /&gt;
3 à 10&lt;br /&gt;
11 à 50&lt;br /&gt;
51 à 200&lt;br /&gt;
+ de 200&lt;br /&gt;
&lt;br /&gt;
Personne de contact 1 [prénom] [nom] [fonction] [ Tel direct] [courriel]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Personne de contact 2 (facultatif) [prénom] [nom] [fonction] [ Tel direct] [courriel]&lt;br /&gt;
&lt;br /&gt;
================&lt;br /&gt;
&lt;br /&gt;
'''Q1 Alphabétisation numérique'''&lt;br /&gt;
A compléter&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q2. E-Réputation'''&lt;br /&gt;
''Stratégie marketing, ID numérique''&lt;br /&gt;
&lt;br /&gt;
2a) Considérez-vous que le crédit moral et la bonne image sur Internet sont importantes pour votre organisme ?&lt;br /&gt;
''&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
2b) Considérez-vous que votre organisme s'engage suffisamment pour assurer une bonne réputation sur Internet ?&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
2c) Considérez-vous que vous avez les compétences (en interne ou externalisée) pour cette activité de gestion de la e-réputation ?&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q3. Gestion de l'information numérique'''&lt;br /&gt;
''Knowledge management, workflow management''&lt;br /&gt;
&lt;br /&gt;
Messagerie : à votre avis, le degré d'efficacité de vos collaborateurs en matière de traitement des emails (courriels) répond-il aux besoins de performance et d'implication ?&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
'''Classement :''' à votre avis, les collaborateurs sont-ils globalement efficace dans le traitement des messages ?&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
'''Qualité du travail et perte de temps''' : globalement, les collaborateurs sont-ils suffisamment à l'aise pour prévenir les problèmes de spam, virus, cyberintimidation, physhing...&lt;br /&gt;
''&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q4. Travail à distance'''&lt;br /&gt;
&lt;br /&gt;
En règle général, le travail à distance pour les collaborateurs est-il considéré comme incompatible avec l'activité :&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q5. INTRANET &amp;amp; Wiki, ERP, CRM...'''&lt;br /&gt;
&lt;br /&gt;
'''Non seulement les intranet sont devenu des outils essentiels en entreprise, mais de plus, selon l'étude internationale MacKenzie 2010, 39% des entreprises utilisent un wiki pour usage interne. Notamment pour concevoir et mettre à jour ensemble des mode d'emploi, des modèles de lettre...'''&lt;br /&gt;
&lt;br /&gt;
'''Utilisez-vous dans votre entreprise :'''&lt;br /&gt;
&lt;br /&gt;
A) Un Intranet&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
B) Un Wiki&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement''.&lt;br /&gt;
&lt;br /&gt;
C) Une plate-forme de formation à distance&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
'''Usages :''' &lt;br /&gt;
&lt;br /&gt;
des formations ou hotline ont-elle été proposée ces 24 derniers mois dans votre entreprise pour accompagner à l'usage de ces outils ?&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q6. Politique et règles d'usage des ordinateurs (matériel, logiciels) et des médias sociaux'''&lt;br /&gt;
''Charte, politique, gouvernance.''&lt;br /&gt;
&lt;br /&gt;
1a) Avez-vous une charte d'utilisation des outils informatique ?&lt;br /&gt;
Qui défini les conditions d'usage, la responsabilité, les limites...&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
1b) Avez-vous consacré au moins 2-3heures pour parler des règles d'usage des outils informatiques chaque 1-2 ans entre employés ?&lt;br /&gt;
(sous forme de café-discussion, action de formation, entretiens individuels...)&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1c) Pensez-vous qu'en augmentant la conscience des droits et responsabilités d'usage des outils informatiques dans votre travail, la performance et l'implication de vos collaborateurs sera meilleure ?&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Facebook, Twitter, Youtube.'''&lt;br /&gt;
&lt;br /&gt;
Comment sont-ils considérés dans votre entreprise :&lt;br /&gt;
&lt;br /&gt;
'''A) FACEBOOK'''&lt;br /&gt;
&lt;br /&gt;
a) interdit strictement (avec contrôle&lt;br /&gt;
b) interdit modérément&lt;br /&gt;
c) autorisé sans plus&lt;br /&gt;
d) encouragé modérément&lt;br /&gt;
e) encouragé avec formation formelle à un usage approprié&lt;br /&gt;
&lt;br /&gt;
'''B) Twitter'''&lt;br /&gt;
&lt;br /&gt;
a) interdits strictement (avec contrôle)&lt;br /&gt;
&lt;br /&gt;
b) interdits modérément&lt;br /&gt;
&lt;br /&gt;
c) autorisés sans plus&lt;br /&gt;
&lt;br /&gt;
d) encouragés modérément&lt;br /&gt;
&lt;br /&gt;
e) encouragés avec formation formelle à un usage approprié&lt;br /&gt;
&lt;br /&gt;
'''C) Youtube.'''&lt;br /&gt;
&lt;br /&gt;
a) interdit strictement (avec contrôle)&lt;br /&gt;
&lt;br /&gt;
b) interdit modérément&lt;br /&gt;
&lt;br /&gt;
c) autorisé sans plus&lt;br /&gt;
&lt;br /&gt;
d) encouragé modérément&lt;br /&gt;
&lt;br /&gt;
e) encouragé avec formation formelle à un usage approprié&lt;br /&gt;
&lt;br /&gt;
'''D) MSN / Windows live'''&lt;br /&gt;
&lt;br /&gt;
a) interdit strictement (avec contrôle)&lt;br /&gt;
&lt;br /&gt;
b) interdit modérément&lt;br /&gt;
&lt;br /&gt;
c) autorisé sans plus&lt;br /&gt;
&lt;br /&gt;
d) encouragé modérément&lt;br /&gt;
&lt;br /&gt;
e) encouragé avec formation formelle à un usage approprié&lt;br /&gt;
&lt;br /&gt;
'''E) Skype'''&lt;br /&gt;
&lt;br /&gt;
a) interdit strictement (avec contrôle)&lt;br /&gt;
&lt;br /&gt;
b) interdit modérément&lt;br /&gt;
&lt;br /&gt;
c) autorisé sans plus&lt;br /&gt;
&lt;br /&gt;
d) encouragé modérément&lt;br /&gt;
&lt;br /&gt;
e) encouragé avec formation formelle à un usage approprié&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q7. Sensibilité aux logiciels libres.'''&lt;br /&gt;
''Les logiciels libres sont un des symbole de l'économie numérique et de l'éthique de la durabilité''&lt;br /&gt;
&lt;br /&gt;
Par exemple GNU/Linux pour les serveurs, OpenOffice pour la bureautique, Firefox et son plugin anti-pub pour la navigation web.&lt;br /&gt;
Les études indépendante et les décisions de gouvernements de tous bords politiques démontrent la fiabilité et l'intérêt tant économique que social des logiciels libres.&lt;br /&gt;
Y a-t-il une sensibilité, une conscience et une motivation à adopter les logiciels libres dans votre organisme ?&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q8. Green-it.'''&lt;br /&gt;
&lt;br /&gt;
Avez-vous communiqué et mis en oeuvre avec succès une politique de prévention du gaspillage et de recyclage du matériel informatique, papier inclus ?&lt;br /&gt;
Notamment durée de vie, recyclage, contrôle de la consommation électrique...&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q9. Community management'''&lt;br /&gt;
&lt;br /&gt;
Animez-vous une CoVi ? (clients, etc.)&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
'''&lt;br /&gt;
Q10. Politique formation continue en culture numérique'''&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Aimeriez-vous une séance pour approfondir ces questions ?&lt;br /&gt;
&lt;br /&gt;
Si oui, les quelles ?'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Commentaires : .....&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Etude_de_march%C3%A9_Yorg_2011&amp;diff=5051</id>
		<title>Etude de marché Yorg 2011</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Etude_de_march%C3%A9_Yorg_2011&amp;diff=5051"/>
				<updated>2011-08-10T06:39:12Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Proposition d'un questionnaire dans le cadre de l'étude de marché suisse romande en besoins de formation à la culture numérique ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Vous pouvez proposer des modifications directement sur la page (SVP en mode authentifié) et en discuter dans la partie &amp;quot;discussion&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Nom de l'organisme / société'''&lt;br /&gt;
&lt;br /&gt;
URL (http://www....) : &lt;br /&gt;
&lt;br /&gt;
Type d'organisme/société : public/privé/parapublic (plus de 75% des revenus sur mandats publics)&lt;br /&gt;
&lt;br /&gt;
nombre d'employés (équivalent plein-temps)&lt;br /&gt;
3 à 10&lt;br /&gt;
11 à 50&lt;br /&gt;
51 à 200&lt;br /&gt;
+ de 200&lt;br /&gt;
&lt;br /&gt;
Personne de contact 1 [prénom] [nom] [fonction] [ Tel direct] [courriel]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Personne de contact 2 (facultatif) [prénom] [nom] [fonction] [ Tel direct] [courriel]&lt;br /&gt;
&lt;br /&gt;
================&lt;br /&gt;
&lt;br /&gt;
'''Q1 Alphabétisation numérique'''&lt;br /&gt;
A compléter&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q2. E-Réputation'''&lt;br /&gt;
''Stratégie marketing, ID numérique''&lt;br /&gt;
&lt;br /&gt;
2a) Considérez-vous que le crédit moral et la bonne image sur Internet sont importantes pour votre organisme ?&lt;br /&gt;
''&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
2b) Considérez-vous que votre organisme s'engage suffisamment pour assurer une bonne réputation sur Internet ?&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
2c) Considérez-vous que vous avez les compétences (en interne ou externalisée) pour cette activité de gestion de la e-réputation ?&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q3. Gestion de l'information numérique'''&lt;br /&gt;
''Knowledge management, workflow management''&lt;br /&gt;
&lt;br /&gt;
Messagerie : à votre avis, le degré d'efficacité de vos collaborateurs en matière de traitement des emails (courriels) répond-il aux besoins de performance et d'implication ?&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
'''Classement :''' à votre avis, les collaborateurs sont-ils globalement efficace dans le traitement des messages ?&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
'''Qualité du travail et perte de temps''' : globalement, les collaborateurs sont-ils suffisamment à l'aise pour prévenir les problèmes de spam, virus, cyberintimidation, physhing...&lt;br /&gt;
''&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q4. Travail à distance'''&lt;br /&gt;
&lt;br /&gt;
En règle général, le travail à distance pour les collaborateurs est-il considéré comme incompatible avec l'activité :&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q5. INTRANET &amp;amp; Wiki, ERP, CRM...'''&lt;br /&gt;
&lt;br /&gt;
'''Non seulement les intranet sont devenu des outils essentiels en entreprise, mais de plus, selon l'étude internationale MacKenzie 2010, 39% des entreprises utilisent un wiki pour usage interne. Notamment pour concevoir et mettre à jour ensemble des mode d'emploi, des modèles de lettre...'''&lt;br /&gt;
&lt;br /&gt;
'''Utilisez-vous dans votre entreprise :'''&lt;br /&gt;
&lt;br /&gt;
A) Un Intranet&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
B) Un Wiki&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement''.&lt;br /&gt;
&lt;br /&gt;
C) Une plate-forme de formation à distance&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
'''Usages :''' &lt;br /&gt;
&lt;br /&gt;
des formations ou hotline ont-elle été proposée ces 24 derniers mois dans votre entreprise pour accompagner à l'usage de ces outils ?&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q6. Politique et règles d'usage des ordinateurs (matériel, logiciels) et des médias sociaux'''&lt;br /&gt;
''Charte, politique, gouvernance.''&lt;br /&gt;
&lt;br /&gt;
1a) Avez-vous une charte d'utilisation des outils informatique ?&lt;br /&gt;
Qui défini les conditions d'usage, la responsabilité, les limites...&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
1b) Avez-vous consacré au moins 2-3heures pour parler des règles d'usage des outils informatiques chaque 1-2 ans entre employés ?&lt;br /&gt;
(sous forme de café-discussion, action de formation, entretiens individuels...)&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1c) Pensez-vous qu'en augmentant la conscience des droits et responsabilités d'usage des outils informatiques dans votre travail, la performance et l'implication de vos collaborateurs sera meilleure ?&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Facebook, Twitter, Youtube.'''&lt;br /&gt;
&lt;br /&gt;
Comment sont-ils considérés dans votre entreprise :&lt;br /&gt;
&lt;br /&gt;
'''A) FACEBOOK'''&lt;br /&gt;
&lt;br /&gt;
a) interdit strictement (avec contrôle&lt;br /&gt;
b) interdit modérément&lt;br /&gt;
c) autorisé sans plus&lt;br /&gt;
d) encouragé modérément&lt;br /&gt;
e) encouragé avec formation formelle à un usage approprié&lt;br /&gt;
&lt;br /&gt;
'''B) Twitter'''&lt;br /&gt;
&lt;br /&gt;
a) interdits strictement (avec contrôle)&lt;br /&gt;
b) interdits modérément&lt;br /&gt;
c) autorisés sans plus&lt;br /&gt;
d) encouragés modérément&lt;br /&gt;
e) encouragés avec formation formelle à un usage approprié&lt;br /&gt;
&lt;br /&gt;
'''C) Youtube.'''&lt;br /&gt;
&lt;br /&gt;
a) interdit strictement (avec contrôle)&lt;br /&gt;
b) interdit modérément&lt;br /&gt;
c) autorisé sans plus&lt;br /&gt;
d) encouragé modérément&lt;br /&gt;
e) encouragé avec formation formelle à un usage approprié&lt;br /&gt;
&lt;br /&gt;
'''D) MSN / Windows live'''&lt;br /&gt;
&lt;br /&gt;
a) interdit strictement (avec contrôle)&lt;br /&gt;
b) interdit modérément&lt;br /&gt;
c) autorisé sans plus&lt;br /&gt;
d) encouragé modérément&lt;br /&gt;
e) encouragé avec formation formelle à un usage approprié&lt;br /&gt;
&lt;br /&gt;
'''E) Skype'''&lt;br /&gt;
&lt;br /&gt;
a) interdit strictement (avec contrôle)&lt;br /&gt;
b) interdit modérément&lt;br /&gt;
c) autorisé sans plus&lt;br /&gt;
d) encouragé modérément&lt;br /&gt;
e) encouragé avec formation formelle à un usage approprié&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q7. Sensibilité aux logiciels libres.'''&lt;br /&gt;
''Les logiciels libres sont un des symbole de l'économie numérique et de l'éthique de la durabilité''&lt;br /&gt;
&lt;br /&gt;
Par exemple GNU/Linux pour les serveurs, OpenOffice pour la bureautique, Firefox et son plugin anti-pub pour la navigation web.&lt;br /&gt;
Les études indépendante et les décisions de gouvernements de tous bords politiques démontrent la fiabilité et l'intérêt tant économique que social des logiciels libres.&lt;br /&gt;
Y a-t-il une sensibilité, une conscience et une motivation à adopter les logiciels libres dans votre organisme ?&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q8. Green-it.'''&lt;br /&gt;
&lt;br /&gt;
Avez-vous communiqué et mis en oeuvre avec succès une politique de prévention du gaspillage et de recyclage du matériel informatique, papier inclus ?&lt;br /&gt;
Notamment durée de vie, recyclage, contrôle de la consommation électrique...&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q9. Community management'''&lt;br /&gt;
&lt;br /&gt;
Animez-vous une CoVi ? (clients, etc.)&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
'''&lt;br /&gt;
Q10. Politique formation continue en culture numérique'''&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Aimeriez-vous une séance pour approfondir ces questions ?&lt;br /&gt;
&lt;br /&gt;
Si oui, les quelles ?'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Commentaires : .....&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Etude_de_march%C3%A9_Yorg_2011&amp;diff=5050</id>
		<title>Etude de marché Yorg 2011</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Etude_de_march%C3%A9_Yorg_2011&amp;diff=5050"/>
				<updated>2011-08-10T06:36:51Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Proposition d'un questionnaire dans le cadre de l'étude de marché suisse romande en besoins de formation à la culture numérique ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Vous pouvez proposer des modifications directement sur la page (SVP en mode authentifié) et en discuter dans la partie &amp;quot;discussion&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Nom de l'organisme / société'''&lt;br /&gt;
&lt;br /&gt;
URL (http://www....) : &lt;br /&gt;
&lt;br /&gt;
Type d'organisme/société : public/privé/parapublic (plus de 75% des revenus sur mandats publics)&lt;br /&gt;
&lt;br /&gt;
nombre d'employés (équivalent plein-temps)&lt;br /&gt;
3 à 10&lt;br /&gt;
11 à 50&lt;br /&gt;
51 à 200&lt;br /&gt;
+ de 200&lt;br /&gt;
&lt;br /&gt;
Personne de contact 1 [prénom] [nom] [fonction] [ Tel direct] [courriel]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Personne de contact 2 (facultatif) [prénom] [nom] [fonction] [ Tel direct] [courriel]&lt;br /&gt;
&lt;br /&gt;
================&lt;br /&gt;
&lt;br /&gt;
'''Q1 Alphabétisation numérique'''&lt;br /&gt;
A compléter&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q2. E-Réputation'''&lt;br /&gt;
''Stratégie marketing, ID numérique''&lt;br /&gt;
&lt;br /&gt;
2a) Considérez-vous que le crédit moral et la bonne image sur Internet sont importantes pour votre organisme ?&lt;br /&gt;
''&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
2b) Considérez-vous que votre organisme s'engage suffisamment pour assurer une bonne réputation sur Internet ?&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
2c) Considérez-vous que vous avez les compétences (en interne ou externalisée) pour cette activité de gestion de la e-réputation ?&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q3. Gestion de l'information numérique'''&lt;br /&gt;
''Knowledge management, workflow management''&lt;br /&gt;
&lt;br /&gt;
Messagerie : à votre avis, le degré d'efficacité de vos collaborateurs en matière de traitement des emails (courriels) répond-il aux besoins de performance et d'implication ?&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
'''Classement :''' à votre avis, les collaborateurs sont-ils globalement efficace dans le traitement des messages ?&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
'''Qualité du travail et perte de temps''' : globalement, les collaborateurs sont-ils suffisamment à l'aise pour prévenir les problèmes de spam, virus, cyberintimidation, physhing...&lt;br /&gt;
''&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q4. Travail à distance'''&lt;br /&gt;
&lt;br /&gt;
En règle général, le travail à distance pour les collaborateurs est-il considéré comme incompatible avec l'activité :&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q5. INTRANET &amp;amp; Wiki, ERP, CRM...'''&lt;br /&gt;
&lt;br /&gt;
'''Non seulement les intranet sont devenu des outils essentiels en entreprise, mais de plus, selon l'étude internationale MacKenzie 2010, 39% des entreprises utilisent un wiki pour usage interne. Notamment pour concevoir et mettre à jour ensemble des mode d'emploi, des modèles de lettre...'''&lt;br /&gt;
&lt;br /&gt;
'''Utilisez-vous dans votre entreprise :'''&lt;br /&gt;
&lt;br /&gt;
A) Un Intranet&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
B) Un Wiki&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement''.&lt;br /&gt;
&lt;br /&gt;
C) Une plate-forme de formation à distance&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
'''Usages :''' &lt;br /&gt;
&lt;br /&gt;
des formations ou hotline ont-elle été proposée ces 24 derniers mois dans votre entreprise pour accompagner à l'usage de ces outils ?&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q6. Politique et règles d'usage des ordinateurs (matériel, logiciels) et des médias sociaux'''&lt;br /&gt;
''Charte, politique, gouvernance.''&lt;br /&gt;
&lt;br /&gt;
1a) Avez-vous une charte d'utilisation des outils informatique ?&lt;br /&gt;
Qui défini les conditions d'usage, la responsabilité, les limites...&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
1b) Avez-vous consacré au moins 2-3heures pour parler des règles d'usage des outils informatiques chaque 1-2 ans entre employés ?&lt;br /&gt;
(sous forme de café-discussion, action de formation, entretiens individuels...)&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1c) Pensez-vous qu'en augmentant la conscience des droits et responsabilités d'usage des outils informatiques dans votre travail, la performance et l'implication de vos collaborateurs sera meilleure ?&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Facebook, Twitter, Youtube.'''&lt;br /&gt;
&lt;br /&gt;
Comment sont-ils considérés dans votre entreprise :&lt;br /&gt;
&lt;br /&gt;
'''A) FACEBOOK'''&lt;br /&gt;
&lt;br /&gt;
a) interdit strictement (avec contrôle)&lt;br /&gt;
b) interdit modérément&lt;br /&gt;
c) autorisé sans plus&lt;br /&gt;
d) encouragé modérément&lt;br /&gt;
e) encouragé avec formation formelle à un usage approprié&lt;br /&gt;
&lt;br /&gt;
'''B) Twitter'''&lt;br /&gt;
&lt;br /&gt;
a) interdits strictement (avec contrôle)&lt;br /&gt;
b) interdits modérément&lt;br /&gt;
c) autorisés sans plus&lt;br /&gt;
d) encouragés modérément&lt;br /&gt;
e) encouragés avec formation formelle à un usage approprié&lt;br /&gt;
&lt;br /&gt;
'''C) Youtube.'''&lt;br /&gt;
&lt;br /&gt;
a) interdit strictement (avec contrôle)&lt;br /&gt;
b) interdit modérément&lt;br /&gt;
c) autorisé sans plus&lt;br /&gt;
d) encouragé modérément&lt;br /&gt;
e) encouragé avec formation formelle à un usage approprié&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
D) MSN / Windows live'''&lt;br /&gt;
&lt;br /&gt;
a) interdit strictement (avec contrôle)&lt;br /&gt;
b) interdit modérément&lt;br /&gt;
c) autorisé sans plus&lt;br /&gt;
d) encouragé modérément&lt;br /&gt;
e) encouragé avec formation formelle à un usage approprié&lt;br /&gt;
&lt;br /&gt;
'''E) Skype'''&lt;br /&gt;
&lt;br /&gt;
a) interdit strictement (avec contrôle)&lt;br /&gt;
b) interdit modérément&lt;br /&gt;
c) autorisé sans plus&lt;br /&gt;
d) encouragé modérément&lt;br /&gt;
e) encouragé avec formation formelle à un usage approprié&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q7. Sensibilité aux logiciels libres.'''&lt;br /&gt;
''Les logiciels libres sont un des symbole de l'économie numérique et de l'éthique de la durabilité''&lt;br /&gt;
&lt;br /&gt;
Par exemple GNU/Linux pour les serveurs, OpenOffice pour la bureautique, Firefox et son plugin anti-pub pour la navigation web.&lt;br /&gt;
Les études indépendante et les décisions de gouvernements de tous bords politiques démontrent la fiabilité et l'intérêt tant économique que social des logiciels libres.&lt;br /&gt;
Y a-t-il une sensibilité, une conscience et une motivation à adopter les logiciels libres dans votre organisme ?&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q8. Green-it.'''&lt;br /&gt;
&lt;br /&gt;
Avez-vous communiqué et mis en oeuvre avec succès une politique de prévention du gaspillage et de recyclage du matériel informatique, papier inclus ?&lt;br /&gt;
Notamment durée de vie, recyclage, contrôle de la consommation électrique...&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q9. Community management'''&lt;br /&gt;
&lt;br /&gt;
Animez-vous une CoVi ? (clients, etc.)&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
'''&lt;br /&gt;
Q10. Politique formation continue en culture numérique'''&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Aimeriez-vous une séance pour approfondir ces questions ?&lt;br /&gt;
&lt;br /&gt;
Si oui, les quelles ?'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Commentaires : .....&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Etude_de_march%C3%A9_Yorg_2011&amp;diff=5049</id>
		<title>Etude de marché Yorg 2011</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Etude_de_march%C3%A9_Yorg_2011&amp;diff=5049"/>
				<updated>2011-08-10T06:34:36Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Proposition d'un questionnaire dans le cadre de l'étude de marché suisse romande en besoins de formation à la culture numérique ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Vous pouvez proposer des modifications directement sur la page (SVP en mode authentifié) et en discuter dans la partie &amp;quot;discussion&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Nom de l'organisme / société'''&lt;br /&gt;
&lt;br /&gt;
URL (http://www....) : &lt;br /&gt;
&lt;br /&gt;
Type d'organisme/société : public/privé/parapublic (plus de 75% des revenus sur mandats publics)&lt;br /&gt;
&lt;br /&gt;
nombre d'employés (équivalent plein-temps)&lt;br /&gt;
3 à 10&lt;br /&gt;
11 à 50&lt;br /&gt;
51 à 200&lt;br /&gt;
+ de 200&lt;br /&gt;
&lt;br /&gt;
Personne de contact 1 [prénom] [nom] [fonction] [ Tel direct] [courriel]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Personne de contact 2 (facultatif) [prénom] [nom] [fonction] [ Tel direct] [courriel]&lt;br /&gt;
&lt;br /&gt;
================&lt;br /&gt;
&lt;br /&gt;
'''Q1 Alphabétisation numérique'''&lt;br /&gt;
A compléter&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q2. E-Réputation'''&lt;br /&gt;
''Stratégie marketing, ID numérique''&lt;br /&gt;
&lt;br /&gt;
2a) Considérez-vous que le crédit moral et la bonne image sur Internet sont importantes pour votre organisme ?&lt;br /&gt;
''&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
2b) Considérez-vous que votre organisme s'engage suffisamment pour assurer une bonne réputation sur Internet ?&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
2c) Considérez-vous que vous avez les compétences (en interne ou externalisée) pour cette activité de gestion de la e-réputation ?&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q3. Gestion de l'information numérique'''&lt;br /&gt;
''Knowledge management, workflow management''&lt;br /&gt;
&lt;br /&gt;
Messagerie : à votre avis, le degré d'efficacité de vos collaborateurs en matière de traitement des emails (courriels) répond-il aux besoins de performance et d'implication ?&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
'''Classement :''' à votre avis, les collaborateurs sont-ils globalement efficace dans le traitement des messages ?&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
'''Qualité du travail et perte de temps''' : globalement, les collaborateurs sont-ils suffisamment à l'aise pour prévenir les problèmes de spam, virus, cyberintimidation, physhing...&lt;br /&gt;
''&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q4. Travail à distance'''&lt;br /&gt;
&lt;br /&gt;
En règle général, le travail à distance pour les collaborateurs est-il considéré comme incompatible avec l'activité :&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q5. INTRANET &amp;amp; Wiki, ERP, CRM...'''&lt;br /&gt;
&lt;br /&gt;
'''Non seulement les intranet sont devenu des outils essentiels en entreprise, mais de plus, selon l'étude internationale MacKenzie 2010, 39% des entreprises utilisent un wiki pour usage interne. Notamment pour concevoir et mettre à jour ensemble des mode d'emploi, des modèles de lettre...'''&lt;br /&gt;
&lt;br /&gt;
'''Utilisez-vous dans votre entreprise :'''&lt;br /&gt;
&lt;br /&gt;
A) Un Intranet&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
B) Un Wiki&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement''.&lt;br /&gt;
&lt;br /&gt;
C) Une plate-forme de formation à distance&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
'''Usages :''' &lt;br /&gt;
&lt;br /&gt;
des formations ou hotline ont-elle été proposée ces 24 derniers mois dans votre entreprise pour accompagner à l'usage de ces outils ?&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q6. Politique et règles d'usage des ordinateurs (matériel, logiciels) et des médias sociaux'''&lt;br /&gt;
''Charte, politique, gouvernance.''&lt;br /&gt;
&lt;br /&gt;
1a) Avez-vous une charte d'utilisation des outils informatique ?&lt;br /&gt;
Qui défini les conditions d'usage, la responsabilité, les limites...&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
1b) Avez-vous consacré au moins 2-3heures pour parler des règles d'usage des outils informatiques chaque 1-2 ans entre employés ?&lt;br /&gt;
(sous forme de café-discussion, action de formation, entretiens individuels...)&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1c) Pensez-vous qu'en augmentant la conscience des droits et responsabilités d'usage des outils informatiques dans votre travail, la performance et l'implication de vos collaborateurs sera meilleure ?&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Facebook, Twitter, Youtube.'''&lt;br /&gt;
&lt;br /&gt;
Comment sont-ils considérés dans votre entreprise :&lt;br /&gt;
&lt;br /&gt;
'''A) FACEBOOK'''&lt;br /&gt;
&lt;br /&gt;
a) interdit strictement (avec contrôle)&lt;br /&gt;
b) interdit modérément&lt;br /&gt;
c) autorisé sans plus&lt;br /&gt;
d) encouragé modérément&lt;br /&gt;
e) encouragé avec formation formelle à un usage approprié&lt;br /&gt;
&lt;br /&gt;
'''B) Twitter'''&lt;br /&gt;
&lt;br /&gt;
a) interdits strictement (avec contrôle)&lt;br /&gt;
b) interdits modérément&lt;br /&gt;
c) autorisés sans plus&lt;br /&gt;
d) encouragés modérément&lt;br /&gt;
e) encouragés avec formation formelle à un usage approprié&lt;br /&gt;
&lt;br /&gt;
'''C) Youtube.'''&lt;br /&gt;
&lt;br /&gt;
a) interdit strictement (avec contrôle)&lt;br /&gt;
b) interdit modérément&lt;br /&gt;
c) autorisé sans plus&lt;br /&gt;
d) encouragé modérément&lt;br /&gt;
e) encouragé avec formation formelle à un usage approprié&lt;br /&gt;
'''&lt;br /&gt;
D) MSN / Windows live'''&lt;br /&gt;
&lt;br /&gt;
a) interdit strictement (avec contrôle)&lt;br /&gt;
b) interdit modérément&lt;br /&gt;
c) autorisé sans plus&lt;br /&gt;
d) encouragé modérément&lt;br /&gt;
e) encouragé avec formation formelle à un usage approprié&lt;br /&gt;
&lt;br /&gt;
'''E) Skype'''&lt;br /&gt;
&lt;br /&gt;
a) interdit strictement (avec contrôle)&lt;br /&gt;
b) interdit modérément&lt;br /&gt;
c) autorisé sans plus&lt;br /&gt;
d) encouragé modérément&lt;br /&gt;
e) encouragé avec formation formelle à un usage approprié&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q7. Sensibilité aux logiciels libres.'''&lt;br /&gt;
''Les logiciels libres sont un des symbole de l'économie numérique et de l'éthique de la durabilité''&lt;br /&gt;
&lt;br /&gt;
Par exemple GNU/Linux pour les serveurs, OpenOffice pour la bureautique, Firefox et son plugin anti-pub pour la navigation web.&lt;br /&gt;
Les études indépendante et les décisions de gouvernements de tous bords politiques démontrent la fiabilité et l'intérêt tant économique que social des logiciels libres.&lt;br /&gt;
Y a-t-il une sensibilité, une conscience et une motivation à adopter les logiciels libres dans votre organisme ?&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q8. Green-it.'''&lt;br /&gt;
&lt;br /&gt;
Avez-vous communiqué et mis en oeuvre avec succès une politique de prévention du gaspillage et de recyclage du matériel informatique, papier inclus ?&lt;br /&gt;
Notamment durée de vie, recyclage, contrôle de la consommation électrique...&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q9. Community management'''&lt;br /&gt;
&lt;br /&gt;
Animez-vous une CoVi ? (clients, etc.)&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
'''&lt;br /&gt;
Q10. Politique formation continue en culture numérique'''&lt;br /&gt;
&lt;br /&gt;
''(Réponse type A) = Pas du tout, un peu, passablement, entièrement.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Aimeriez-vous une séance pour approfondir ces questions ?&lt;br /&gt;
&lt;br /&gt;
Si oui, les quelles ?'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Commentaires : .....&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Etude_de_march%C3%A9_Yorg_2011&amp;diff=5048</id>
		<title>Etude de marché Yorg 2011</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Etude_de_march%C3%A9_Yorg_2011&amp;diff=5048"/>
				<updated>2011-08-10T06:27:41Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Proposition d'un questionnaire dans le cadre de l'étude de marché suisse romande en besoins de formation à la culture numérique ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Vous pouvez proposer des modifications directement sur la page (SVP en mode authentifié) et en discuter dans la partie &amp;quot;discussion&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Nom de l'organisme / société'''&lt;br /&gt;
&lt;br /&gt;
URL (http://www....) : &lt;br /&gt;
&lt;br /&gt;
Type d'organisme/société : public/privé/parapublic (plus de 75% des revenus sur mandats publics)&lt;br /&gt;
&lt;br /&gt;
nombre d'employés (équivalent plein-temps)&lt;br /&gt;
3 à 10&lt;br /&gt;
11 à 50&lt;br /&gt;
51 à 200&lt;br /&gt;
+ de 200&lt;br /&gt;
&lt;br /&gt;
Personne de contact 1 [prénom] [nom] [fonction] [ Tel direct] [courriel]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Personne de contact 2 (facultatif) [prénom] [nom] [fonction] [ Tel direct] [courriel]&lt;br /&gt;
&lt;br /&gt;
================&lt;br /&gt;
&lt;br /&gt;
'''Q1 Alphabétisation numérique'''&lt;br /&gt;
A compléter&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q2. E-Réputation'''&lt;br /&gt;
''Stratégie marketing, ID numérique''&lt;br /&gt;
&lt;br /&gt;
2a) Considérez-vous que le crédit moral et la bonne image sur Internet sont importantes pour votre organisme ?&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
2b) Considérez-vous que votre organisme s'engage suffisamment pour assurer une bonne réputation sur Internet ?&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
2c) Considérez-vous que vous avez les compétences (en interne ou externalisée) pour cette activité de gestion de la e-réputation ?&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q3. Gestion de l'information numérique'''&lt;br /&gt;
''Knowledge management, workflow management''&lt;br /&gt;
&lt;br /&gt;
Messagerie : à votre avis, le degré d'efficacité de vos collaborateurs en matière de traitement des emails (courriels) répond-il aux besoins de performance et d'implication ?&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
Classement : à votre avis, les collaborateurs sont-ils globalement efficace dans le traitement des messages ?&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
Qualité du travail et perte de temps : globalement, les collaborateurs sont-ils suffisamment à l'aise pour prévenir les problèmes de spam, virus, cyberintimidation, physhing...&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q4. Travail à distance'''&lt;br /&gt;
&lt;br /&gt;
En règle général, le travail à distance pour les collaborateurs est-il considéré comme incompatible avec l'activité :&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q5. INTRANET &amp;amp; Wiki, ERP, CRM...'''&lt;br /&gt;
&lt;br /&gt;
Non seulement les intranet sont devenu des outils essentiels en entreprise, mais de plus, selon l'étude internationale MacKenzie 2010, 39% des entreprises utilisent un wiki pour usage interne. Notamment pour concevoir et mettre à jour ensemble des mode d'emploi, des modèles de lettre...&lt;br /&gt;
&lt;br /&gt;
Utilisez-vous dans votre entreprise :&lt;br /&gt;
&lt;br /&gt;
A) Un Intranet&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
B) Un Wiki&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
C) Une plate-forme de formation à distance&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
Usages : des formations ou hotline ont-elle été proposée ces 24 derniers mois dans votre entreprise pour accompagner à l'usage de ces outils ?&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q6. Politique et règles d'usage des ordinateurs (matériel, logiciels) et des médias sociaux'''&lt;br /&gt;
''Charte, politique, gouvernance.''&lt;br /&gt;
&lt;br /&gt;
1a) Avez-vous une charte d'utilisation des outils informatique ?&lt;br /&gt;
Qui défini les conditions d'usage, la responsabilité, les limites...&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
1b) Avez-vous consacré au moins 2-3heures pour parler des règles d'usage des outils informatiques chaque 1-2 ans entre employés ?&lt;br /&gt;
(sous forme de café-discussion, action de formation, entretiens individuels...)&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1c) Pensez-vous qu'en augmentant la conscience des droits et responsabilités d'usage des outils informatiques dans votre travail, la performance et l'implication de vos collaborateurs sera meilleure ?&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Facebook, Twitter, Youtube.&lt;br /&gt;
&lt;br /&gt;
Comment sont-ils considérés dans votre entreprise :&lt;br /&gt;
&lt;br /&gt;
A) FACEBOOK&lt;br /&gt;
&lt;br /&gt;
a) interdit strictement (avec contrôle)&lt;br /&gt;
b) interdit modérément&lt;br /&gt;
c) autorisé sans plus&lt;br /&gt;
d) encouragé modérément&lt;br /&gt;
e) encouragé avec formation formelle à un usage approprié&lt;br /&gt;
&lt;br /&gt;
B) Twitter&lt;br /&gt;
&lt;br /&gt;
a) interdits strictement (avec contrôle)&lt;br /&gt;
b) interdits modérément&lt;br /&gt;
c) autorisés sans plus&lt;br /&gt;
d) encouragés modérément&lt;br /&gt;
e) encouragés avec formation formelle à un usage approprié&lt;br /&gt;
&lt;br /&gt;
C) Youtube.&lt;br /&gt;
&lt;br /&gt;
a) interdit strictement (avec contrôle)&lt;br /&gt;
b) interdit modérément&lt;br /&gt;
c) autorisé sans plus&lt;br /&gt;
d) encouragé modérément&lt;br /&gt;
e) encouragé avec formation formelle à un usage approprié&lt;br /&gt;
&lt;br /&gt;
D) MSN / Windows live&lt;br /&gt;
&lt;br /&gt;
a) interdit strictement (avec contrôle)&lt;br /&gt;
b) interdit modérément&lt;br /&gt;
c) autorisé sans plus&lt;br /&gt;
d) encouragé modérément&lt;br /&gt;
e) encouragé avec formation formelle à un usage approprié&lt;br /&gt;
&lt;br /&gt;
E) Skype&lt;br /&gt;
&lt;br /&gt;
a) interdit strictement (avec contrôle)&lt;br /&gt;
b) interdit modérément&lt;br /&gt;
c) autorisé sans plus&lt;br /&gt;
d) encouragé modérément&lt;br /&gt;
e) encouragé avec formation formelle à un usage approprié&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q7. Sensibilité aux logiciels libres.'''&lt;br /&gt;
''Les logiciels libres sont un des symbole de l'économie numérique et de l'éthique de la durabilité''&lt;br /&gt;
&lt;br /&gt;
Par exemple GNU/Linux pour les serveurs, OpenOffice pour la bureautique, Firefox et son plugin anti-pub pour la navigation web.&lt;br /&gt;
Les études indépendante et les décisions de gouvernements de tous bords politiques démontrent la fiabilité et l'intérêt tant économique que social des logiciels libres.&lt;br /&gt;
Y a-t-il une sensibilité, une conscience et une motivation à adopter les logiciels libres dans votre organisme ?&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q8. Green-it.'''&lt;br /&gt;
&lt;br /&gt;
Avez-vous communiqué et mis en oeuvre avec succès une politique de prévention du gaspillage et de recyclage du matériel informatique, papier inclus ?&lt;br /&gt;
Notamment durée de vie, recyclage, contrôle de la consommation électrique...&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q9. Community management'''&lt;br /&gt;
&lt;br /&gt;
Animez-vous une CoVi ? (clients,&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
'''&lt;br /&gt;
Q10. Politique formation continue en culture numérique'''&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aimeriez-vous une séance pour approfondir ces questions ?&lt;br /&gt;
&lt;br /&gt;
Si oui, les quelles ?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Commentaires : .....&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Etude_de_march%C3%A9_Yorg_2011&amp;diff=5047</id>
		<title>Etude de marché Yorg 2011</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Etude_de_march%C3%A9_Yorg_2011&amp;diff=5047"/>
				<updated>2011-08-10T06:25:51Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : Page créée avec «  == Proposition d'un questionnaire dans le cadre de l'étude de marché suisse romande en besoins de formation à la culture numérique ==    Vous pouvez proposer des modific… »&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Proposition d'un questionnaire dans le cadre de l'étude de marché suisse romande en besoins de formation à la culture numérique ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Vous pouvez proposer des modifications directement sur la page (SVP en mode authentifié) et en discuter dans la partie &amp;quot;discussion&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Nom de l'organisme / société'''&lt;br /&gt;
&lt;br /&gt;
URL [http://www.   ]&lt;br /&gt;
&lt;br /&gt;
Type d'organisme/société : public/privé/parapublic (plus de 75% des revenus sur mandats publics)&lt;br /&gt;
&lt;br /&gt;
nombre d'employés (équivalent plein-temps)&lt;br /&gt;
3 à 10&lt;br /&gt;
10 à 50&lt;br /&gt;
50 à 200&lt;br /&gt;
+ de 200&lt;br /&gt;
&lt;br /&gt;
Personne de contact 1 [prénom] [nom] [fonction] [ Tel direct] [courriel]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Personne de contact 2 (facultatif) [prénom] [nom] [fonction] [ Tel direct] [courriel]&lt;br /&gt;
&lt;br /&gt;
================&lt;br /&gt;
&lt;br /&gt;
'''Q1 Alphabétisation numérique'''&lt;br /&gt;
A compléter&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q2. E-Réputation'''&lt;br /&gt;
Stratégie marketing, ID numérique&lt;br /&gt;
&lt;br /&gt;
2a) Considérez-vous que le crédit moral et la bonne image sur Internet sont importantes pour votre organisme ?&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
2b) Considérez-vous que votre organisme s'engage suffisamment pour assurer une bonne réputation sur Internet ?&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
2c) Considérez-vous que vous avez les compétences (en interne ou externalisée) pour cette activité de gestion de la e-réputation ?&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q3. Gestion de l'information numérique'''&lt;br /&gt;
Knowledge management, workflow management&lt;br /&gt;
&lt;br /&gt;
Messagerie : à votre avis, le degré d'efficacité de vos collaborateurs en matière de traitement des emails (courriels) répond-il aux besoins de performance et d'implication ?&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
Classement : à votre avis, les collaborateurs sont-ils globalement efficace dans le traitement des messages ?&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
Qualité du travail et perte de temps : globalement, les collaborateurs sont-ils suffisamment à l'aise pour prévenir les problèmes de spam, virus, cyberintimidation, physhing...&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q4. Travail à distance'''&lt;br /&gt;
&lt;br /&gt;
En règle général, le travail à distance pour les collaborateurs est-il considéré comme incompatible avec l'activité :&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q5. INTRANET &amp;amp; Wiki, ERP, CRM...'''&lt;br /&gt;
&lt;br /&gt;
Non seulement les intranet sont devenu des outils essentiels en entreprise, mais de plus, selon l'étude internationale MacKenzie 2010, 39% des entreprises utilisent un wiki pour usage interne. Notamment pour concevoir et mettre à jour ensemble des mode d'emploi, des modèles de lettre...&lt;br /&gt;
&lt;br /&gt;
Utilisez-vous dans votre entreprise :&lt;br /&gt;
&lt;br /&gt;
A) Un Intranet&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
B) Un Wiki&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
C) Une plate-forme de formation à distance&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
Usages : des formations ou hotline ont-elle été proposée ces 24 derniers mois dans votre entreprise pour accompagner à l'usage de ces outils ?&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q6. Politique et règles d'usage des ordinateurs (matériel, logiciels) et des médias sociaux'''&lt;br /&gt;
''Charte, politique, gouvernance.''&lt;br /&gt;
&lt;br /&gt;
1a) Avez-vous une charte d'utilisation des outils informatique ?&lt;br /&gt;
Qui défini les conditions d'usage, la responsabilité, les limites...&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
1b) Avez-vous consacré au moins 2-3heures pour parler des règles d'usage des outils informatiques chaque 1-2 ans entre employés ?&lt;br /&gt;
(sous forme de café-discussion, action de formation, entretiens individuels...)&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1c) Pensez-vous qu'en augmentant la conscience des droits et responsabilités d'usage des outils informatiques dans votre travail, la performance et l'implication de vos collaborateurs sera meilleure ?&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Facebook, Twitter, Youtube.&lt;br /&gt;
&lt;br /&gt;
Comment sont-ils considérés dans votre entreprise :&lt;br /&gt;
&lt;br /&gt;
A) FACEBOOK&lt;br /&gt;
&lt;br /&gt;
a) interdit strictement (avec contrôle)&lt;br /&gt;
b) interdit modérément&lt;br /&gt;
c) autorisé sans plus&lt;br /&gt;
d) encouragé modérément&lt;br /&gt;
e) encouragé avec formation formelle à un usage approprié&lt;br /&gt;
&lt;br /&gt;
B) Twitter&lt;br /&gt;
&lt;br /&gt;
a) interdits strictement (avec contrôle)&lt;br /&gt;
b) interdits modérément&lt;br /&gt;
c) autorisés sans plus&lt;br /&gt;
d) encouragés modérément&lt;br /&gt;
e) encouragés avec formation formelle à un usage approprié&lt;br /&gt;
&lt;br /&gt;
C) Youtube.&lt;br /&gt;
&lt;br /&gt;
a) interdit strictement (avec contrôle)&lt;br /&gt;
b) interdit modérément&lt;br /&gt;
c) autorisé sans plus&lt;br /&gt;
d) encouragé modérément&lt;br /&gt;
e) encouragé avec formation formelle à un usage approprié&lt;br /&gt;
&lt;br /&gt;
D) MSN / Windows live&lt;br /&gt;
&lt;br /&gt;
a) interdit strictement (avec contrôle)&lt;br /&gt;
b) interdit modérément&lt;br /&gt;
c) autorisé sans plus&lt;br /&gt;
d) encouragé modérément&lt;br /&gt;
e) encouragé avec formation formelle à un usage approprié&lt;br /&gt;
&lt;br /&gt;
E) Skype&lt;br /&gt;
&lt;br /&gt;
a) interdit strictement (avec contrôle)&lt;br /&gt;
b) interdit modérément&lt;br /&gt;
c) autorisé sans plus&lt;br /&gt;
d) encouragé modérément&lt;br /&gt;
e) encouragé avec formation formelle à un usage approprié&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q7. Sensibilité aux logiciels libres.'''&lt;br /&gt;
''Les logiciels libres sont un des symbole de l'économie numérique et de l'éthique de la durabilité''&lt;br /&gt;
&lt;br /&gt;
Par exemple GNU/Linux pour les serveurs, OpenOffice pour la bureautique, Firefox et son plugin anti-pub pour la navigation web.&lt;br /&gt;
Les études indépendante et les décisions de gouvernements de tous bords politiques démontrent la fiabilité et l'intérêt tant économique que social des logiciels libres.&lt;br /&gt;
Y a-t-il une sensibilité, une conscience et une motivation à adopter les logiciels libres dans votre organisme ?&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q8. Green-it.'''&lt;br /&gt;
&lt;br /&gt;
Avez-vous communiqué et mis en oeuvre avec succès une politique de prévention du gaspillage et de recyclage du matériel informatique, papier inclus ?&lt;br /&gt;
Notamment durée de vie, recyclage, contrôle de la consommation électrique...&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
&lt;br /&gt;
'''Q9. Community management'''&lt;br /&gt;
&lt;br /&gt;
Animez-vous une CoVi ? (clients,&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
_________________________________________________________&lt;br /&gt;
'''&lt;br /&gt;
Q10. Politique formation continue en culture numérique'''&lt;br /&gt;
&lt;br /&gt;
(Réponse type A) = Pas du tout, un peu, passablement, entièrement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aimeriez-vous une séance pour approfondir ces questions ?&lt;br /&gt;
&lt;br /&gt;
Si oui, les quelles ?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Commentaires : .....&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4868</id>
		<title>Syllabus e-safety</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4868"/>
				<updated>2011-06-24T13:46:13Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : /* CHAPTER 2 SYLLABUS - Privacy and data management */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''e-GUARDIAN - Syllabus V.2.x&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
== Introduction : aims &amp;amp; resources ==&lt;br /&gt;
&lt;br /&gt;
=== Criteria, which are important by developing e-GUARDIAN questions ===&lt;br /&gt;
&lt;br /&gt;
•There should be two types of questions:&lt;br /&gt;
&lt;br /&gt;
 • question with four answers, of which one is correct,&lt;br /&gt;
 • question with image (hotspot questions), where answer could be marked in the picture.&lt;br /&gt;
&lt;br /&gt;
•It is important to create four questions for each syllabus item&lt;br /&gt;
&lt;br /&gt;
•It is advisable to create equal length answers (for example, if there would be three long answers and one short, which is correct, test taker could have a clue about correct answer)&lt;br /&gt;
&lt;br /&gt;
•It is advisable not to use specific software in the questions (exceptions may be possible, the information about this software must be in the educational material).&lt;br /&gt;
&lt;br /&gt;
--[[Utilisateur:Donarena|Renata (Lithuania Team)]] 20 juin 2011 à 07:47 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== Aims ===&lt;br /&gt;
&lt;br /&gt;
This wiki page aims at facilitating a collaborative synergic process for defining the syllabus on netsafety of the EU LdV e-Guardian project.&lt;br /&gt;
Participants are delegates of partner's institutions from Lithuania, Latvia, Germany and Switzerland.&lt;br /&gt;
&lt;br /&gt;
The resources are : &lt;br /&gt;
&lt;br /&gt;
=== A web-based social bookmarking working group === &lt;br /&gt;
on [http://groups.diigo.com/group/e_safety here on Diigo],  we can post all related useful information on netsafety, such as : &lt;br /&gt;
&lt;br /&gt;
- definition of key-words&lt;br /&gt;
&lt;br /&gt;
- examples of quizz, pedagogical scenarios and other pedagogical resources&lt;br /&gt;
&lt;br /&gt;
- related scientific articles &lt;br /&gt;
&lt;br /&gt;
- other relevant initiatives&lt;br /&gt;
&lt;br /&gt;
=== Guidelines for the syllabus === &lt;br /&gt;
They wwere provided by the project's team coordinated by the LIA organisation, and specially the syllabus workpackage leader, ecdl.lt, represented by Eugenijus Telesius and his team composed of Renata Danieliene &amp;amp; Tomas Lygutas, which is complemented by partner's delegate Algimantas Merkys (LIA, the coordinator's team), Dennis Krannich (Bremen Univbersity), Théo Bondolfi &amp;amp; Rémi Lévy (APTES Switzerland). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
These guidelines are : &lt;br /&gt;
&lt;br /&gt;
1. Focus on [[e-safety]] [[offline]] as well as [[online]], therefore always taking into account basic needs (such as password storage) as well as complex needs (such as behaviour in [[web2]] environments).&lt;br /&gt;
&lt;br /&gt;
2. Taking into account all key-points in this initial version, and considering these key-point as &amp;quot;objects&amp;quot; whcih can be replaced in other forms but which must stay available.&lt;br /&gt;
&lt;br /&gt;
3. respecting the steps of user point of view (example : 1 start computer, 2 launch application...)&lt;br /&gt;
&lt;br /&gt;
4. restructuring with categories and sets like in the policies of ECDL [http://www.ecdl.org/programmes/media/ECDL_ICDL_Module_12_-_Syllabus_-_V1.0.pdf]&lt;br /&gt;
&lt;br /&gt;
5. keeping as much as possible the existing phrases and formulations, only changing (merging, repositioning, pionderating) when it suits the next step of test/scenarios&lt;br /&gt;
&lt;br /&gt;
6. Keeping in mind the final intention of '''equity between risks &amp;amp; opportunities''' proposing positive practices (opportunities, in an educative perspective) and preventing bad practices (risks, which creates fear), based on the vision of the slide 10 of [http://www.slideshare.net/Bernajean/ne-3440462 this presentation of Anne Collier], which says that netsafety3.0 should be : &lt;br /&gt;
&lt;br /&gt;
- research-based, not fearbased, therefore relevant&lt;br /&gt;
&lt;br /&gt;
- flexible &amp;amp; layered, instead of &amp;quot;one-size-fits-all&amp;quot;&lt;br /&gt;
&lt;br /&gt;
- respectful of learning culture : stakeholders in positive experience, not just potential victims&lt;br /&gt;
&lt;br /&gt;
- positive, empowering : not just safety from, but safety for...&lt;br /&gt;
&lt;br /&gt;
- full, constructive engagement in participatory society (that's the context of the construction of this syllabus)&lt;br /&gt;
&lt;br /&gt;
=== Mind mapping for the key-notions of the syllabus ===&lt;br /&gt;
&lt;br /&gt;
In addition, Rémi Levy from APTES has produced a [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea mind mapping image] to represent all the notions for the e-safety syllabus. You can access to [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea the interactive map] - You can modify it directly because we keep a copy of the precedent contribution.&lt;br /&gt;
&lt;br /&gt;
== Other possible structure of the syllabus - A.P.T.E.S proposition ==&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Proposition access to the page]&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 1 SYLLABUS - Basic knowledge on e-safety ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;NOTICE IT IS BETTER IF COMMENTS AND DISCUSSIONS ARE MADE ON THE DISCUSSION PAGE &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:28 (UTC)&lt;br /&gt;
&lt;br /&gt;
1.1. Understand the differences of information [[contents]] (open, private, business, etc.).&lt;br /&gt;
&lt;br /&gt;
1.2. Be aware of '''[[privacy protection]] legal act''' (be aware of the responsibility for own actions on the Internet: when publishing, writing comments, downloading,etc)&lt;br /&gt;
&lt;br /&gt;
1.3. Know about '''[[equity between opportunities &amp;amp; risks]]''' of [[web2]]&lt;br /&gt;
&lt;br /&gt;
1.4. Understand the notion of '''[[identity]]'''. &lt;br /&gt;
&lt;br /&gt;
1.5. Be aware of '''different identity for authorization theft methods''' (skimming, pretexting, shoulder surfing, information diving).&lt;br /&gt;
&lt;br /&gt;
1.6. Know about '''[[social engineering]]''' and its methods. &lt;br /&gt;
&lt;br /&gt;
1.7. Be aware of cyber crime, online predators, financial scams, harms and who to contact when  discovering illegal data.&lt;br /&gt;
&lt;br /&gt;
1.8. Understand computer infection threats (viruses, Trojan horses, spyware, dishonest adware, etc.). Know when and how malicious software can get into computer system.&lt;br /&gt;
&lt;br /&gt;
1.9. Know about organizational [[security]]: school security, usage of school web pages, content publishing, access, etc. &lt;br /&gt;
&lt;br /&gt;
1.10. Know about '''[[netiquette]] and other basic codes''' of conduct in the cyberspace (RFC 1855)&lt;br /&gt;
&lt;br /&gt;
1.11. Understand what is [[Online Safety 3.0]] and why [[digital citizenship]] is protective.&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 2 SYLLABUS - Privacy and data management ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June &amp;lt;/span&amp;gt; --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:35 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2.1. [[Distinguish between data and information]].&lt;br /&gt;
&lt;br /&gt;
2.2. Understand the opportunities and risks of digital '''[[data management]]''' from fully collaborative to full privacy. &lt;br /&gt;
&lt;br /&gt;
2.3. Know about multi-layer '''[[password]]''', changing and keeping password policies. &lt;br /&gt;
&lt;br /&gt;
2.4. Know about '''safe computer [[login]] methods''' &lt;br /&gt;
&lt;br /&gt;
2.5. Know why to use multiple user accounts (#or password ? --[[Utilisateur:Remilevy|Rémi LEVY]] 24 juin 2011 à 13:46 (UTC)) on various digital environments. Understand the meaning and importance of access rights (what a personal user account is and how data of different users is separated). &lt;br /&gt;
&lt;br /&gt;
2.6. Be aware of '''data encryption''', decryption and password protected files. &lt;br /&gt;
&lt;br /&gt;
2.7. Understand what [[intellectual property]] on Internet is. &lt;br /&gt;
&lt;br /&gt;
2.8. Understand the benefits and purpose of data '''backups''' and be able to restore lost data.&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 3 SYLLABUS - Security tools and network security ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:24 (UTC)&lt;br /&gt;
&lt;br /&gt;
3.1. Know computer '''network types''' : local area network (LAN), wide area network (WAN), virtual private network (VPN) and why protection is needed. &lt;br /&gt;
&lt;br /&gt;
3.2. Know different network '''connection methods''' (Cable, Wireless, Mobile networks). &lt;br /&gt;
&lt;br /&gt;
3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network. &lt;br /&gt;
&lt;br /&gt;
3.4. '''Sharing and accessing resources''' over a network (files, printer, desktop). &lt;br /&gt;
&lt;br /&gt;
3.5. Understand safety means of computer networks (airewall, antivirus, anti-spyware, spam blocker, password protection, connection encryption – wireless). &lt;br /&gt;
&lt;br /&gt;
3.6. Be able to use standard OS integrated protection tools. &lt;br /&gt;
&lt;br /&gt;
3.7. Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.). Distinguish different modes of antivirus protection (active, passive).&lt;br /&gt;
&lt;br /&gt;
3.8. Know what has to be done and in what order, if you suspect that your computer system is infected. Distinguish between infected files deletion, quarantining and curing.&lt;br /&gt;
&lt;br /&gt;
3.9. Know how to '''follow, download and use updates for your operating system''', software and importance of antivirus definition files. Understand the benefits of these updates.&lt;br /&gt;
&lt;br /&gt;
3.10. Be able to run informal and formal periodic [[external checkup]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 4 SYLLABUS - Minors and newcomers on the net == &lt;br /&gt;
&lt;br /&gt;
New Syllabus version discussed on Thursday 16th June - --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:53 (UTC)&lt;br /&gt;
&lt;br /&gt;
4.1. Understand the impact of communication with minors and new users about safety in IT World.&lt;br /&gt;
&lt;br /&gt;
4.2 Understand the purpose of monitoring, filtering and controlling tools for safer internet use of minors&lt;br /&gt;
&lt;br /&gt;
4.3. Be aware of different ways to educate, monitor and control usage of social networking and other web sites.&lt;br /&gt;
&lt;br /&gt;
4.4. Be able to develop policies and applicate methods for children’s use of the computer and the Internet (depending on age and socio-cultural situation). &lt;br /&gt;
&lt;br /&gt;
4.5. Understanding advantages and limitations with protection software&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 5 SYLLABUS - Social networks and safe usage of the Internet ==&lt;br /&gt;
&lt;br /&gt;
New Syllabus version as discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:05 (UTC) - &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5.1. Know how to '''start and finish safe browsing session''' (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing. &lt;br /&gt;
&lt;br /&gt;
5.2. Know about'''advantages, disadvantages and dangers of Internet cookies''' and ActiveX control. Know about tools that ensure safety when browsing the Internet.  &lt;br /&gt;
&lt;br /&gt;
5.3. Be able to manage: temporary Internet files, browser history, passwords, cookies and autocomplete data. &lt;br /&gt;
&lt;br /&gt;
5.4. Be able to safely '''connect to e-Services and secure environments'''– connecting and using, recover lost passwords.&lt;br /&gt;
&lt;br /&gt;
5.5. Know when and in which cases personal '''information can be published on the Internet''' (i.e. status publishing about leaving home).&lt;br /&gt;
&lt;br /&gt;
5.6. Know who you should contact if you discovered inappropriate information about you or your related digital identities.&lt;br /&gt;
&lt;br /&gt;
5.7. Understand that it is necessary to exercise critical thinking about content and identities on the internet. (i.e. blogs, Wikipedia, social networks, forums, etc). #reformulated by --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:22 (UTC)&lt;br /&gt;
&lt;br /&gt;
5.8. Understand 'threats of inappropriate content for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on) &lt;br /&gt;
&lt;br /&gt;
5.9. Understand what an online social network is, what are opportunities and risks of social network. Age groups of using social networks. Options and parameters for information disclosure. Understand what is the fascination to disclose private information on the internet&lt;br /&gt;
&lt;br /&gt;
5.10. Know different '''social network types''' (Friendship-driven and Interest-driven) and be able to use them harmless and safe (appropriate account privacy settings). &lt;br /&gt;
&lt;br /&gt;
5.11. Know what type of information recommended to be published on social network, be responsible for published content, and know impacts &lt;br /&gt;
&lt;br /&gt;
5.12. Understand that online socializing reflects &amp;quot;real life&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
5.13. Be able to send/receive e-mail securely: know how to reject email from specific email addresses. Know how to treat email messages from unknown senders, classified as spam and email messages infected with malware. Know about scam, hoax, chain letters.&lt;br /&gt;
&lt;br /&gt;
5.14. Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information, etc.&lt;br /&gt;
&lt;br /&gt;
5.15. Understand threats of online communication: virtual dating, bullying, commenting. &lt;br /&gt;
&lt;br /&gt;
5.16. Understand dependency and addiction to the Internet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Another Mind mapping=&lt;br /&gt;
&lt;br /&gt;
[[Fichier:notions-and-concepts.png|1100px|]]&lt;br /&gt;
&lt;br /&gt;
You can access to the dynamic mapp here [http://www.mindomo.com/edit.htm?m=64bf626021b940d99dd9576283c833bf notions and concepts]&lt;br /&gt;
&lt;br /&gt;
[[Proposition]]&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Social_engineering&amp;diff=4866</id>
		<title>Social engineering</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Social_engineering&amp;diff=4866"/>
				<updated>2011-06-24T09:03:37Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;definition : &lt;br /&gt;
&lt;br /&gt;
L'ingénierie sociale (ou social engineering en anglais) est une forme d'acquisition déloyale d'information et d'escroquerie, utilisée en informatique pour obtenir d'autrui, un bien, un service ou des informations clefs. Cette pratique exploite les failles humaines et sociales de la structure cible, à laquelle est lié le système informatique visé. Utilisant ses connaissances, son charisme, l'imposture ou le culot, le hacker abuse de la confiance, de l'ignorance ou de la crédulité des personnes possédant ce qu'il tente d'obtenir. Dans son ouvrage L'art de la supercherie, Kevin Mitnick a théorisé et popularisé cette pratique de manipulation qui utilise principalement les &amp;quot;failles humaines&amp;quot; d'un système informatique comme &amp;quot;effet de levier&amp;quot;, pour briser ses barrières de sécurité.&lt;br /&gt;
&lt;br /&gt;
[http://fr.wikipedia.org/wiki/Ing%C3%A9nierie_sociale_(s%C3%A9curit%C3%A9_de_l%27information)]&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Distinguish_between_data_and_information&amp;diff=4865</id>
		<title>Distinguish between data and information</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Distinguish_between_data_and_information&amp;diff=4865"/>
				<updated>2011-06-24T08:58:42Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : Page créée avec «  Culture des médias ? »&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
Culture des médias ?&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Proposition&amp;diff=4864</id>
		<title>Proposition</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Proposition&amp;diff=4864"/>
				<updated>2011-06-24T08:25:21Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''The APTES syllabus option''' &lt;br /&gt;
&lt;br /&gt;
'''&amp;quot;Being a Responsible Citizen of the Digital World&amp;quot;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Challenge : adopt a very clear structure with 3 to 5 chapters, to be fulfilled with '''about 30 notions''' &lt;br /&gt;
&lt;br /&gt;
We could structure the curriculum around the three literacies that make up citizenship in the digital age.&lt;br /&gt;
&lt;br /&gt;
Notice : ''There is lots of overlap among these, for example, what we post and produce online is behavior as much as content, so there's a social aspect to media literacy now. And file-sharing technology, which is both a tech and media skill, also has social and therefore ethical aspects.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Chap 0 - Introduction==&lt;br /&gt;
''Define and distinguish the three (e.g., establish the difference between media and technology, human vs. tech security,&lt;br /&gt;
etc.); help users see that, now that media are social and digital, content is both user-produced and behavioral and power for good or ill is increasingly users' hands. &amp;quot;With great power comes great responsibility,&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Chap 1 - Technical Literacy==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2.0 Establish the difference between technology and media&lt;br /&gt;
&lt;br /&gt;
2.1 Understanding how to use technology and devices in constructive ways that are not harmful to either the device/environment or the user (including computer and network security, ID theft)&lt;br /&gt;
&lt;br /&gt;
==Chap 2 - Media Literacy==&lt;br /&gt;
&lt;br /&gt;
Traditional (developing critical thinking and literacy concerning what we read, consume, download) and new media&lt;br /&gt;
literacy (developing critical thinking and literacy about what we post, share, produce, and upload); copyrights/IP, plagiarism&lt;br /&gt;
&lt;br /&gt;
==Chap 3 - Social Literacy==&lt;br /&gt;
&lt;br /&gt;
3.1 Etiquette &amp;amp; netizenship (social norms)&lt;br /&gt;
3.2 psychological safety (cyberbullying)&lt;br /&gt;
3.3 Pysical safety (predation, etc.)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
New media literacies :&lt;br /&gt;
&lt;br /&gt;
• Networking : the ability to search for, synthesize, and disseminate information.&lt;br /&gt;
&lt;br /&gt;
• Judgment—the ability to evaluate the reliability and credibility of different information sources.&lt;br /&gt;
&lt;br /&gt;
• Collective intelligence—evidence that participants in knowledge communities pool&lt;br /&gt;
knowledge and compare notes with others toward a common goal&lt;br /&gt;
&lt;br /&gt;
ref : CREDIBILITY - Unit Overview - [http://www.goodworkproject.org/practice/our-space/]&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
&lt;br /&gt;
Thanks to [http://www.netfamilynews.org/bio.html Anne Collier]&lt;br /&gt;
&lt;br /&gt;
[http://www.goodworkproject.org/practice/our-space Our Space: Being a Responsible Citizen of the Digital World ]&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Proposition&amp;diff=4863</id>
		<title>Proposition</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Proposition&amp;diff=4863"/>
				<updated>2011-06-24T08:19:24Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : /* Chap 3 - Social Literacy */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''The APTES syllabus option''' &lt;br /&gt;
&lt;br /&gt;
'''&amp;quot;Being a Responsible Citizen of the Digital World&amp;quot;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Challenge : adopt a very clear structure with 3 to 5 chapters, to be fulfilled with '''about 30 notions''' &lt;br /&gt;
&lt;br /&gt;
We could structure the curriculum around the three literacies that make up citizenship in the digital age.&lt;br /&gt;
&lt;br /&gt;
Notice : ''There is lots of overlap among these, for example, what we post and produce online is behavior as much as content, so there's a social aspect to media literacy now. And file-sharing technology, which is both a tech and media skill, also has social and therefore ethical aspects.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Chap 1 - Introduction==&lt;br /&gt;
''Define and distinguish the three (e.g., establish the difference between media and technology, human vs. tech security,&lt;br /&gt;
etc.); help users see that, now that media are social and digital, content is both user-produced and behavioral and power for good or ill is increasingly users' hands. &amp;quot;With great power comes great responsibility,&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Chap 2 - Technical Literacy==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2.0 Establish the difference between technology and media&lt;br /&gt;
&lt;br /&gt;
2.1 Understanding how to use technology and devices in constructive ways that are not harmful to either the device/environment or the user (including computer and network security, ID theft)&lt;br /&gt;
&lt;br /&gt;
==Chap 3 - Social Literacy==&lt;br /&gt;
&lt;br /&gt;
3.1 Etiquette &amp;amp; netizenship (social norms)&lt;br /&gt;
3.2 psychological safety (cyberbullying)&lt;br /&gt;
3.3 Pysical safety (predation, etc.)&lt;br /&gt;
&lt;br /&gt;
==Chap 4 - Media Literacy==&lt;br /&gt;
&lt;br /&gt;
Traditional (developing critical thinking and literacy concerning what we read, consume, download) and new media&lt;br /&gt;
literacy (developing critical thinking and literacy about what we post, share, produce, and upload); copyrights/IP, plagiarism&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
New media literacies :&lt;br /&gt;
&lt;br /&gt;
• Networking : the ability to search for, synthesize, and disseminate information.&lt;br /&gt;
&lt;br /&gt;
• Judgment—the ability to evaluate the reliability and credibility of different information sources.&lt;br /&gt;
&lt;br /&gt;
• Collective intelligence—evidence that participants in knowledge communities pool&lt;br /&gt;
knowledge and compare notes with others toward a common goal&lt;br /&gt;
&lt;br /&gt;
ref : CREDIBILITY - Unit Overview - [http://www.goodworkproject.org/practice/our-space/]&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
&lt;br /&gt;
Thanks to [http://www.netfamilynews.org/bio.html Anne Collier]&lt;br /&gt;
&lt;br /&gt;
[http://www.goodworkproject.org/practice/our-space Our Space: Being a Responsible Citizen of the Digital World ]&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Proposition&amp;diff=4862</id>
		<title>Proposition</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Proposition&amp;diff=4862"/>
				<updated>2011-06-24T08:18:51Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : /* Chap 2 - Technical Literacy */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''The APTES syllabus option''' &lt;br /&gt;
&lt;br /&gt;
'''&amp;quot;Being a Responsible Citizen of the Digital World&amp;quot;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Challenge : adopt a very clear structure with 3 to 5 chapters, to be fulfilled with '''about 30 notions''' &lt;br /&gt;
&lt;br /&gt;
We could structure the curriculum around the three literacies that make up citizenship in the digital age.&lt;br /&gt;
&lt;br /&gt;
Notice : ''There is lots of overlap among these, for example, what we post and produce online is behavior as much as content, so there's a social aspect to media literacy now. And file-sharing technology, which is both a tech and media skill, also has social and therefore ethical aspects.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Chap 1 - Introduction==&lt;br /&gt;
''Define and distinguish the three (e.g., establish the difference between media and technology, human vs. tech security,&lt;br /&gt;
etc.); help users see that, now that media are social and digital, content is both user-produced and behavioral and power for good or ill is increasingly users' hands. &amp;quot;With great power comes great responsibility,&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Chap 2 - Technical Literacy==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2.0 Establish the difference between technology and media&lt;br /&gt;
&lt;br /&gt;
2.1 Understanding how to use technology and devices in constructive ways that are not harmful to either the device/environment or the user (including computer and network security, ID theft)&lt;br /&gt;
&lt;br /&gt;
==Chap 3 - Social Literacy==&lt;br /&gt;
&lt;br /&gt;
2.1 Etiquette &amp;amp; netizenship (social norms)&lt;br /&gt;
2.2 psychological safety (cyberbullying)&lt;br /&gt;
2.3 Pysical safety (predation, etc.)&lt;br /&gt;
&lt;br /&gt;
==Chap 4 - Media Literacy==&lt;br /&gt;
&lt;br /&gt;
Traditional (developing critical thinking and literacy concerning what we read, consume, download) and new media&lt;br /&gt;
literacy (developing critical thinking and literacy about what we post, share, produce, and upload); copyrights/IP, plagiarism&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
New media literacies :&lt;br /&gt;
&lt;br /&gt;
• Networking : the ability to search for, synthesize, and disseminate information.&lt;br /&gt;
&lt;br /&gt;
• Judgment—the ability to evaluate the reliability and credibility of different information sources.&lt;br /&gt;
&lt;br /&gt;
• Collective intelligence—evidence that participants in knowledge communities pool&lt;br /&gt;
knowledge and compare notes with others toward a common goal&lt;br /&gt;
&lt;br /&gt;
ref : CREDIBILITY - Unit Overview - [http://www.goodworkproject.org/practice/our-space/]&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
&lt;br /&gt;
Thanks to [http://www.netfamilynews.org/bio.html Anne Collier]&lt;br /&gt;
&lt;br /&gt;
[http://www.goodworkproject.org/practice/our-space Our Space: Being a Responsible Citizen of the Digital World ]&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Proposition&amp;diff=4861</id>
		<title>Proposition</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Proposition&amp;diff=4861"/>
				<updated>2011-06-24T08:17:51Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : /* Chap 3 - Social Literacy */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''The APTES syllabus option''' &lt;br /&gt;
&lt;br /&gt;
'''&amp;quot;Being a Responsible Citizen of the Digital World&amp;quot;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Challenge : adopt a very clear structure with 3 to 5 chapters, to be fulfilled with '''about 30 notions''' &lt;br /&gt;
&lt;br /&gt;
We could structure the curriculum around the three literacies that make up citizenship in the digital age.&lt;br /&gt;
&lt;br /&gt;
Notice : ''There is lots of overlap among these, for example, what we post and produce online is behavior as much as content, so there's a social aspect to media literacy now. And file-sharing technology, which is both a tech and media skill, also has social and therefore ethical aspects.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Chap 1 - Introduction==&lt;br /&gt;
''Define and distinguish the three (e.g., establish the difference between media and technology, human vs. tech security,&lt;br /&gt;
etc.); help users see that, now that media are social and digital, content is both user-produced and behavioral and power for good or ill is increasingly users' hands. &amp;quot;With great power comes great responsibility,&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Chap 2 - Technical Literacy==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.0 Establish the difference between technology and media&lt;br /&gt;
&lt;br /&gt;
1.1 Understanding how to use technology and devices in constructive ways that are not harmful to either the device/environment or the user (including computer and network security, ID theft)&lt;br /&gt;
&lt;br /&gt;
==Chap 3 - Social Literacy==&lt;br /&gt;
&lt;br /&gt;
2.1 Etiquette &amp;amp; netizenship (social norms)&lt;br /&gt;
2.2 psychological safety (cyberbullying)&lt;br /&gt;
2.3 Pysical safety (predation, etc.)&lt;br /&gt;
&lt;br /&gt;
==Chap 4 - Media Literacy==&lt;br /&gt;
&lt;br /&gt;
Traditional (developing critical thinking and literacy concerning what we read, consume, download) and new media&lt;br /&gt;
literacy (developing critical thinking and literacy about what we post, share, produce, and upload); copyrights/IP, plagiarism&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
New media literacies :&lt;br /&gt;
&lt;br /&gt;
• Networking : the ability to search for, synthesize, and disseminate information.&lt;br /&gt;
&lt;br /&gt;
• Judgment—the ability to evaluate the reliability and credibility of different information sources.&lt;br /&gt;
&lt;br /&gt;
• Collective intelligence—evidence that participants in knowledge communities pool&lt;br /&gt;
knowledge and compare notes with others toward a common goal&lt;br /&gt;
&lt;br /&gt;
ref : CREDIBILITY - Unit Overview - [http://www.goodworkproject.org/practice/our-space/]&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
&lt;br /&gt;
Thanks to [http://www.netfamilynews.org/bio.html Anne Collier]&lt;br /&gt;
&lt;br /&gt;
[http://www.goodworkproject.org/practice/our-space Our Space: Being a Responsible Citizen of the Digital World ]&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Proposition&amp;diff=4860</id>
		<title>Proposition</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Proposition&amp;diff=4860"/>
				<updated>2011-06-24T08:11:35Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : /* Chap 2 - Technical Literacy */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''The APTES syllabus option''' &lt;br /&gt;
&lt;br /&gt;
'''&amp;quot;Being a Responsible Citizen of the Digital World&amp;quot;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Challenge : adopt a very clear structure with 3 to 5 chapters, to be fulfilled with '''about 30 notions''' &lt;br /&gt;
&lt;br /&gt;
We could structure the curriculum around the three literacies that make up citizenship in the digital age.&lt;br /&gt;
&lt;br /&gt;
Notice : ''There is lots of overlap among these, for example, what we post and produce online is behavior as much as content, so there's a social aspect to media literacy now. And file-sharing technology, which is both a tech and media skill, also has social and therefore ethical aspects.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Chap 1 - Introduction==&lt;br /&gt;
''Define and distinguish the three (e.g., establish the difference between media and technology, human vs. tech security,&lt;br /&gt;
etc.); help users see that, now that media are social and digital, content is both user-produced and behavioral and power for good or ill is increasingly users' hands. &amp;quot;With great power comes great responsibility,&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Chap 2 - Technical Literacy==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.0 Establish the difference between technology and media&lt;br /&gt;
&lt;br /&gt;
1.1 Understanding how to use technology and devices in constructive ways that are not harmful to either the device/environment or the user (including computer and network security, ID theft)&lt;br /&gt;
&lt;br /&gt;
==Chap 3 - Social Literacy==&lt;br /&gt;
&lt;br /&gt;
Etiquette &amp;amp; netizenship (social norms), psychological safety (cyberbullying), and physical safety (predation, etc.)&lt;br /&gt;
&lt;br /&gt;
==Chap 4 - Media Literacy==&lt;br /&gt;
&lt;br /&gt;
Traditional (developing critical thinking and literacy concerning what we read, consume, download) and new media&lt;br /&gt;
literacy (developing critical thinking and literacy about what we post, share, produce, and upload); copyrights/IP, plagiarism&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
New media literacies :&lt;br /&gt;
&lt;br /&gt;
• Networking : the ability to search for, synthesize, and disseminate information.&lt;br /&gt;
&lt;br /&gt;
• Judgment—the ability to evaluate the reliability and credibility of different information sources.&lt;br /&gt;
&lt;br /&gt;
• Collective intelligence—evidence that participants in knowledge communities pool&lt;br /&gt;
knowledge and compare notes with others toward a common goal&lt;br /&gt;
&lt;br /&gt;
ref : CREDIBILITY - Unit Overview - [http://www.goodworkproject.org/practice/our-space/]&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
&lt;br /&gt;
Thanks to [http://www.netfamilynews.org/bio.html Anne Collier]&lt;br /&gt;
&lt;br /&gt;
[http://www.goodworkproject.org/practice/our-space Our Space: Being a Responsible Citizen of the Digital World ]&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4859</id>
		<title>Syllabus e-safety</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4859"/>
				<updated>2011-06-23T14:44:56Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : /* CHAPTER 3 SYLLABUS - Security tools and network security */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''e-GUARDIAN - Syllabus V.2.x&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
== Introduction : aims &amp;amp; resources ==&lt;br /&gt;
&lt;br /&gt;
=== Criteria, which are important by developing e-GUARDIAN questions ===&lt;br /&gt;
&lt;br /&gt;
•There should be two types of questions:&lt;br /&gt;
&lt;br /&gt;
 • question with four answers, of which one is correct,&lt;br /&gt;
 • question with image (hotspot questions), where answer could be marked in the picture.&lt;br /&gt;
&lt;br /&gt;
•It is important to create four questions for each syllabus item&lt;br /&gt;
&lt;br /&gt;
•It is advisable to create equal length answers (for example, if there would be three long answers and one short, which is correct, test taker could have a clue about correct answer)&lt;br /&gt;
&lt;br /&gt;
•It is advisable not to use specific software in the questions (exceptions may be possible, the information about this software must be in the educational material).&lt;br /&gt;
&lt;br /&gt;
--[[Utilisateur:Donarena|Renata (Lithuania Team)]] 20 juin 2011 à 07:47 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== Aims ===&lt;br /&gt;
&lt;br /&gt;
This wiki page aims at facilitating a collaborative synergic process for defining the syllabus on netsafety of the EU LdV e-Guardian project.&lt;br /&gt;
Participants are delegates of partner's institutions from Lithuania, Latvia, Germany and Switzerland.&lt;br /&gt;
&lt;br /&gt;
The resources are : &lt;br /&gt;
&lt;br /&gt;
=== A web-based social bookmarking working group === &lt;br /&gt;
on [http://groups.diigo.com/group/e_safety here on Diigo],  we can post all related useful information on netsafety, such as : &lt;br /&gt;
&lt;br /&gt;
- definition of key-words&lt;br /&gt;
&lt;br /&gt;
- examples of quizz, pedagogical scenarios and other pedagogical resources&lt;br /&gt;
&lt;br /&gt;
- related scientific articles &lt;br /&gt;
&lt;br /&gt;
- other relevant initiatives&lt;br /&gt;
&lt;br /&gt;
=== Guidelines for the syllabus === &lt;br /&gt;
They wwere provided by the project's team coordinated by the LIA organisation, and specially the syllabus workpackage leader, ecdl.lt, represented by Eugenijus Telesius and his team composed of Renata Danieliene &amp;amp; Tomas Lygutas, which is complemented by partner's delegate Algimantas Merkys (LIA, the coordinator's team), Dennis Krannich (Bremen Univbersity), Théo Bondolfi &amp;amp; Rémi Lévy (APTES Switzerland). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
These guidelines are : &lt;br /&gt;
&lt;br /&gt;
1. Focus on [[e-safety]] [[offline]] as well as [[online]], therefore always taking into account basic needs (such as password storage) as well as complex needs (such as behaviour in [[web2]] environments).&lt;br /&gt;
&lt;br /&gt;
2. Taking into account all key-points in this initial version, and considering these key-point as &amp;quot;objects&amp;quot; whcih can be replaced in other forms but which must stay available.&lt;br /&gt;
&lt;br /&gt;
3. respecting the steps of user point of view (example : 1 start computer, 2 launch application...)&lt;br /&gt;
&lt;br /&gt;
4. restructuring with categories and sets like in the policies of ECDL [http://www.ecdl.org/programmes/media/ECDL_ICDL_Module_12_-_Syllabus_-_V1.0.pdf]&lt;br /&gt;
&lt;br /&gt;
5. keeping as much as possible the existing phrases and formulations, only changing (merging, repositioning, pionderating) when it suits the next step of test/scenarios&lt;br /&gt;
&lt;br /&gt;
6. Keeping in mind the final intention of '''equity between risks &amp;amp; opportunities''' proposing positive practices (opportunities, in an educative perspective) and preventing bad practices (risks, which creates fear), based on the vision of the slide 10 of [http://www.slideshare.net/Bernajean/ne-3440462 this presentation of Anne Collier], which says that netsafety3.0 should be : &lt;br /&gt;
&lt;br /&gt;
- research-based, not fearbased, therefore relevant&lt;br /&gt;
&lt;br /&gt;
- flexible &amp;amp; layered, instead of &amp;quot;one-size-fits-all&amp;quot;&lt;br /&gt;
&lt;br /&gt;
- respectful of learning culture : stakeholders in positive experience, not just potential victims&lt;br /&gt;
&lt;br /&gt;
- positive, empowering : not just safety from, but safety for...&lt;br /&gt;
&lt;br /&gt;
- full, constructive engagement in participatory society (that's the context of the construction of this syllabus)&lt;br /&gt;
&lt;br /&gt;
=== Mind mapping for the key-notions of the syllabus ===&lt;br /&gt;
&lt;br /&gt;
In addition, Rémi Levy from APTES has produced a [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea mind mapping image] to represent all the notions for the e-safety syllabus. You can access to [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea the interactive map] - You can modify it directly because we keep a copy of the precedent contribution.&lt;br /&gt;
&lt;br /&gt;
== Other possible structure of the syllabus - A.P.T.E.S proposition ==&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Proposition access to the page]&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 1 SYLLABUS - Basic knowledge on e-safety ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;NOTICE IT IS BETTER IF COMMENTS AND DISCUSSIONS ARE MADE ON THE DISCUSSION PAGE &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:28 (UTC)&lt;br /&gt;
&lt;br /&gt;
1.1. Understand the differences of information [[contents]] (open, private, business, etc.).&lt;br /&gt;
&lt;br /&gt;
1.2. Be aware of '''[[privacy protection]] legal act''' (be aware of the responsibility for own actions on the Internet: when publishing, writing comments, downloading,etc)&lt;br /&gt;
&lt;br /&gt;
1.3. Know about '''[[equity between opportunities &amp;amp; risks]]''' of [[web2]]&lt;br /&gt;
&lt;br /&gt;
1.4. Understand the notion of '''[[identity]]'''. &lt;br /&gt;
&lt;br /&gt;
1.5. Be aware of '''different identity for authorization theft methods''' (skimming, pretexting, shoulder surfing, information diving).&lt;br /&gt;
&lt;br /&gt;
1.6. Know about '''[[social engineering]]''' and its methods. &lt;br /&gt;
&lt;br /&gt;
1.7. Be aware of cyber crime, online predators, financial scams, harms and who to contact when  discovering illegal data.&lt;br /&gt;
&lt;br /&gt;
1.8. Understand computer infection threats (viruses, Trojan horses, spyware, dishonest adware, etc.). Know when and how malicious software can get into computer system.&lt;br /&gt;
&lt;br /&gt;
1.9. Know about organizational [[security]]: school security, usage of school web pages, content publishing, access, etc. &lt;br /&gt;
&lt;br /&gt;
1.10. Know about '''[[netiquette]] and other basic codes''' of conduct in the cyberspace (RFC 1855)&lt;br /&gt;
&lt;br /&gt;
1.11. Understand what is [[Online Safety 3.0]] and why [[digital citizenship]] is protective.&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 2 SYLLABUS - Privacy and data management ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June &amp;lt;/span&amp;gt; --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:35 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2.1. [[Distinguish between data and information]].&lt;br /&gt;
&lt;br /&gt;
2.2. Understand the opportunities and risks of digital '''[[data management]]''' from fully collaborative to full privacy. &lt;br /&gt;
&lt;br /&gt;
2.3. Know about multi-layer '''[[password]]''', changing and keeping password policies. &lt;br /&gt;
&lt;br /&gt;
2.4. Know about '''safe computer [[login]] methods''' &lt;br /&gt;
&lt;br /&gt;
2.5. Know why to use multiple user accounts on various digital environments. Understand the meaning and importance of access rights (what a personal user account is and how data of different users is separated). &lt;br /&gt;
&lt;br /&gt;
2.6. Be aware of '''data encryption''', decryption and password protected files. &lt;br /&gt;
&lt;br /&gt;
2.7. Understand what [[intellectual property]] on Internet is. &lt;br /&gt;
&lt;br /&gt;
2.8. Understand the benefits and purpose of data '''backups''' and be able to restore lost data.&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 3 SYLLABUS - Security tools and network security ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:24 (UTC)&lt;br /&gt;
&lt;br /&gt;
3.1. Know computer '''network types''' : local area network (LAN), wide area network (WAN), virtual private network (VPN) and why protection is needed. &lt;br /&gt;
&lt;br /&gt;
3.2. Know different network '''connection methods''' (Cable, Wireless, Mobile networks). &lt;br /&gt;
&lt;br /&gt;
3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network. &lt;br /&gt;
&lt;br /&gt;
3.4. '''Sharing and accessing resources''' over a network (files, printer, desktop). &lt;br /&gt;
&lt;br /&gt;
3.5. Understand safety means of computer networks (airewall, antivirus, anti-spyware, spam blocker, password protection, connection encryption – wireless). &lt;br /&gt;
&lt;br /&gt;
3.6. Be able to use standard OS integrated protection tools. &lt;br /&gt;
&lt;br /&gt;
3.7. Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.). Distinguish different modes of antivirus protection (active, passive).&lt;br /&gt;
&lt;br /&gt;
3.8. Know what has to be done and in what order, if you suspect that your computer system is infected. Distinguish between infected files deletion, quarantining and curing.&lt;br /&gt;
&lt;br /&gt;
3.9. Know how to '''follow, download and use updates for your operating system''', software and importance of antivirus definition files. Understand the benefits of these updates.&lt;br /&gt;
&lt;br /&gt;
3.10. Be able to run informal and formal periodic [[external checkup]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 4 SYLLABUS - Minors and newcomers on the net == &lt;br /&gt;
&lt;br /&gt;
New Syllabus version discussed on Thursday 16th June - --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:53 (UTC)&lt;br /&gt;
&lt;br /&gt;
4.1. Understand the impact of communication with minors and new users about safety in IT World.&lt;br /&gt;
&lt;br /&gt;
4.2 Understand the purpose of monitoring, filtering and controlling tools for safer internet use of minors&lt;br /&gt;
&lt;br /&gt;
4.3. Be aware of different ways to educate, monitor and control usage of social networking and other web sites.&lt;br /&gt;
&lt;br /&gt;
4.4. Be able to develop policies and applicate methods for children’s use of the computer and the Internet (depending on age and socio-cultural situation). &lt;br /&gt;
&lt;br /&gt;
4.5. Understanding advantages and limitations with protection software&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 5 SYLLABUS - Social networks and safe usage of the Internet ==&lt;br /&gt;
&lt;br /&gt;
New Syllabus version as discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:05 (UTC) - &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5.1. Know how to '''start and finish safe browsing session''' (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing. &lt;br /&gt;
&lt;br /&gt;
5.2. Know about'''advantages, disadvantages and dangers of Internet cookies''' and ActiveX control. Know about tools that ensure safety when browsing the Internet.  &lt;br /&gt;
&lt;br /&gt;
5.3. Be able to manage: temporary Internet files, browser history, passwords, cookies and autocomplete data. &lt;br /&gt;
&lt;br /&gt;
5.4. Be able to safely '''connect to e-Services and secure environments'''– connecting and using, recover lost passwords.&lt;br /&gt;
&lt;br /&gt;
5.5. Know when and in which cases personal '''information can be published on the Internet''' (i.e. status publishing about leaving home).&lt;br /&gt;
&lt;br /&gt;
5.6. Know who you should contact if you discovered inappropriate information about you or your related digital identities.&lt;br /&gt;
&lt;br /&gt;
5.7. Understand that it is necessary to exercise critical thinking about content and identities on the internet. (i.e. blogs, Wikipedia, social networks, forums, etc). #reformulated by --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:22 (UTC)&lt;br /&gt;
&lt;br /&gt;
5.8. Understand 'threats of inappropriate content for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on) &lt;br /&gt;
&lt;br /&gt;
5.9. Understand what an online social network is, what are opportunities and risks of social network. Age groups of using social networks. Options and parameters for information disclosure. Understand what is the fascination to disclose private information on the internet&lt;br /&gt;
&lt;br /&gt;
5.10. Know different '''social network types''' (Friendship-driven and Interest-driven) and be able to use them harmless and safe (appropriate account privacy settings). &lt;br /&gt;
&lt;br /&gt;
5.11. Know what type of information recommended to be published on social network, be responsible for published content, and know impacts &lt;br /&gt;
&lt;br /&gt;
5.12. Understand that online socializing reflects &amp;quot;real life&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
5.13. Be able to send/receive e-mail securely: know how to reject email from specific email addresses. Know how to treat email messages from unknown senders, classified as spam and email messages infected with malware. Know about scam, hoax, chain letters.&lt;br /&gt;
&lt;br /&gt;
5.14. Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information, etc.&lt;br /&gt;
&lt;br /&gt;
5.15. Understand threats of online communication: virtual dating, bullying, commenting. &lt;br /&gt;
&lt;br /&gt;
5.16. Understand dependency and addiction to the Internet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Another Mind mapping=&lt;br /&gt;
&lt;br /&gt;
[[Fichier:notions-and-concepts.png|1100px|]]&lt;br /&gt;
&lt;br /&gt;
You can access to the dynamic mapp here [http://www.mindomo.com/edit.htm?m=64bf626021b940d99dd9576283c833bf notions and concepts]&lt;br /&gt;
&lt;br /&gt;
[[Proposition]]&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4858</id>
		<title>Syllabus e-safety</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4858"/>
				<updated>2011-06-23T14:28:30Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : /* CHAPTER 3 SYLLABUS - Security tools and network security */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''e-GUARDIAN - Syllabus V.2.x&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
== Introduction : aims &amp;amp; resources ==&lt;br /&gt;
&lt;br /&gt;
=== Criteria, which are important by developing e-GUARDIAN questions ===&lt;br /&gt;
&lt;br /&gt;
•There should be two types of questions:&lt;br /&gt;
&lt;br /&gt;
 • question with four answers, of which one is correct,&lt;br /&gt;
 • question with image (hotspot questions), where answer could be marked in the picture.&lt;br /&gt;
&lt;br /&gt;
•It is important to create four questions for each syllabus item&lt;br /&gt;
&lt;br /&gt;
•It is advisable to create equal length answers (for example, if there would be three long answers and one short, which is correct, test taker could have a clue about correct answer)&lt;br /&gt;
&lt;br /&gt;
•It is advisable not to use specific software in the questions (exceptions may be possible, the information about this software must be in the educational material).&lt;br /&gt;
&lt;br /&gt;
--[[Utilisateur:Donarena|Renata (Lithuania Team)]] 20 juin 2011 à 07:47 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== Aims ===&lt;br /&gt;
&lt;br /&gt;
This wiki page aims at facilitating a collaborative synergic process for defining the syllabus on netsafety of the EU LdV e-Guardian project.&lt;br /&gt;
Participants are delegates of partner's institutions from Lithuania, Latvia, Germany and Switzerland.&lt;br /&gt;
&lt;br /&gt;
The resources are : &lt;br /&gt;
&lt;br /&gt;
=== A web-based social bookmarking working group === &lt;br /&gt;
on [http://groups.diigo.com/group/e_safety here on Diigo],  we can post all related useful information on netsafety, such as : &lt;br /&gt;
&lt;br /&gt;
- definition of key-words&lt;br /&gt;
&lt;br /&gt;
- examples of quizz, pedagogical scenarios and other pedagogical resources&lt;br /&gt;
&lt;br /&gt;
- related scientific articles &lt;br /&gt;
&lt;br /&gt;
- other relevant initiatives&lt;br /&gt;
&lt;br /&gt;
=== Guidelines for the syllabus === &lt;br /&gt;
They wwere provided by the project's team coordinated by the LIA organisation, and specially the syllabus workpackage leader, ecdl.lt, represented by Eugenijus Telesius and his team composed of Renata Danieliene &amp;amp; Tomas Lygutas, which is complemented by partner's delegate Algimantas Merkys (LIA, the coordinator's team), Dennis Krannich (Bremen Univbersity), Théo Bondolfi &amp;amp; Rémi Lévy (APTES Switzerland). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
These guidelines are : &lt;br /&gt;
&lt;br /&gt;
1. Focus on [[e-safety]] [[offline]] as well as [[online]], therefore always taking into account basic needs (such as password storage) as well as complex needs (such as behaviour in [[web2]] environments).&lt;br /&gt;
&lt;br /&gt;
2. Taking into account all key-points in this initial version, and considering these key-point as &amp;quot;objects&amp;quot; whcih can be replaced in other forms but which must stay available.&lt;br /&gt;
&lt;br /&gt;
3. respecting the steps of user point of view (example : 1 start computer, 2 launch application...)&lt;br /&gt;
&lt;br /&gt;
4. restructuring with categories and sets like in the policies of ECDL [http://www.ecdl.org/programmes/media/ECDL_ICDL_Module_12_-_Syllabus_-_V1.0.pdf]&lt;br /&gt;
&lt;br /&gt;
5. keeping as much as possible the existing phrases and formulations, only changing (merging, repositioning, pionderating) when it suits the next step of test/scenarios&lt;br /&gt;
&lt;br /&gt;
6. Keeping in mind the final intention of '''equity between risks &amp;amp; opportunities''' proposing positive practices (opportunities, in an educative perspective) and preventing bad practices (risks, which creates fear), based on the vision of the slide 10 of [http://www.slideshare.net/Bernajean/ne-3440462 this presentation of Anne Collier], which says that netsafety3.0 should be : &lt;br /&gt;
&lt;br /&gt;
- research-based, not fearbased, therefore relevant&lt;br /&gt;
&lt;br /&gt;
- flexible &amp;amp; layered, instead of &amp;quot;one-size-fits-all&amp;quot;&lt;br /&gt;
&lt;br /&gt;
- respectful of learning culture : stakeholders in positive experience, not just potential victims&lt;br /&gt;
&lt;br /&gt;
- positive, empowering : not just safety from, but safety for...&lt;br /&gt;
&lt;br /&gt;
- full, constructive engagement in participatory society (that's the context of the construction of this syllabus)&lt;br /&gt;
&lt;br /&gt;
=== Mind mapping for the key-notions of the syllabus ===&lt;br /&gt;
&lt;br /&gt;
In addition, Rémi Levy from APTES has produced a [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea mind mapping image] to represent all the notions for the e-safety syllabus. You can access to [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea the interactive map] - You can modify it directly because we keep a copy of the precedent contribution.&lt;br /&gt;
&lt;br /&gt;
== Other possible structure of the syllabus - A.P.T.E.S proposition ==&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Proposition access to the page]&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 1 SYLLABUS - Basic knowledge on e-safety ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;NOTICE IT IS BETTER IF COMMENTS AND DISCUSSIONS ARE MADE ON THE DISCUSSION PAGE &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:28 (UTC)&lt;br /&gt;
&lt;br /&gt;
1.1. Understand the differences of information [[contents]] (open, private, business, etc.).&lt;br /&gt;
&lt;br /&gt;
1.2. Be aware of '''[[privacy protection]] legal act''' (be aware of the responsibility for own actions on the Internet: when publishing, writing comments, downloading,etc)&lt;br /&gt;
&lt;br /&gt;
1.3. Know about '''[[equity between opportunities &amp;amp; risks]]''' of [[web2]]&lt;br /&gt;
&lt;br /&gt;
1.4. Understand the notion of '''[[identity]]'''. &lt;br /&gt;
&lt;br /&gt;
1.5. Be aware of '''different identity for authorization theft methods''' (skimming, pretexting, shoulder surfing, information diving).&lt;br /&gt;
&lt;br /&gt;
1.6. Know about '''[[social engineering]]''' and its methods. &lt;br /&gt;
&lt;br /&gt;
1.7. Be aware of cyber crime, online predators, financial scams, harms and who to contact when  discovering illegal data.&lt;br /&gt;
&lt;br /&gt;
1.8. Understand computer infection threats (viruses, Trojan horses, spyware, dishonest adware, etc.). Know when and how malicious software can get into computer system.&lt;br /&gt;
&lt;br /&gt;
1.9. Know about organizational [[security]]: school security, usage of school web pages, content publishing, access, etc. &lt;br /&gt;
&lt;br /&gt;
1.10. Know about '''[[netiquette]] and other basic codes''' of conduct in the cyberspace (RFC 1855)&lt;br /&gt;
&lt;br /&gt;
1.11. Understand what is [[Online Safety 3.0]] and why [[digital citizenship]] is protective.&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 2 SYLLABUS - Privacy and data management ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June &amp;lt;/span&amp;gt; --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:35 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2.1. [[Distinguish between data and information]].&lt;br /&gt;
&lt;br /&gt;
2.2. Understand the opportunities and risks of digital '''[[data management]]''' from fully collaborative to full privacy. &lt;br /&gt;
&lt;br /&gt;
2.3. Know about multi-layer '''[[password]]''', changing and keeping password policies. &lt;br /&gt;
&lt;br /&gt;
2.4. Know about '''safe computer [[login]] methods''' &lt;br /&gt;
&lt;br /&gt;
2.5. Know why to use multiple user accounts on various digital environments. Understand the meaning and importance of access rights (what a personal user account is and how data of different users is separated). &lt;br /&gt;
&lt;br /&gt;
2.6. Be aware of '''data encryption''', decryption and password protected files. &lt;br /&gt;
&lt;br /&gt;
2.7. Understand what [[intellectual property]] on Internet is. &lt;br /&gt;
&lt;br /&gt;
2.8. Understand the benefits and purpose of data '''backups''' and be able to restore lost data.&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 3 SYLLABUS - Security tools and network security ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:24 (UTC)&lt;br /&gt;
&lt;br /&gt;
3.1. Know computer '''network types''' : local area network (LAN), wide area network (WAN), virtual private network (VPN) and why protection is needed. &lt;br /&gt;
&lt;br /&gt;
3.2. Know different network '''connection methods''' (Cable, Wireless, Mobile networks). &lt;br /&gt;
&lt;br /&gt;
3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network. &lt;br /&gt;
&lt;br /&gt;
3.4. '''Sharing and accessing resources''' over a network (files, printer, desktop). &lt;br /&gt;
&lt;br /&gt;
3.5. Understand safety means of computer networks (airewall, antivirus, anti-spyware, spam blocker, password protection, connection encryption – wireless). &lt;br /&gt;
&lt;br /&gt;
3.6. Be able to use standard OS integrated protection tools. &lt;br /&gt;
&lt;br /&gt;
3.7. Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.). Distinguish different modes of antivirus protection (active, passive).&lt;br /&gt;
&lt;br /&gt;
3.8. Know what has to be done and in what order, if you suspect that your computer system is infected. Distinguish between infected files deletion, quarantining and curing.&lt;br /&gt;
&lt;br /&gt;
3.9. Know how to '''follow, download and use updates for your operating system''', software and importance of antivirus definition files. Understand the benefits of these updates.&lt;br /&gt;
&lt;br /&gt;
3.10. Informal and formal periodic [[external checkup]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 4 SYLLABUS - Minors and newcomers on the net == &lt;br /&gt;
&lt;br /&gt;
New Syllabus version discussed on Thursday 16th June - --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:53 (UTC)&lt;br /&gt;
&lt;br /&gt;
4.1. Understand the impact of communication with minors and new users about safety in IT World.&lt;br /&gt;
&lt;br /&gt;
4.2 Understand the purpose of monitoring, filtering and controlling tools for safer internet use of minors&lt;br /&gt;
&lt;br /&gt;
4.3. Be aware of different ways to educate, monitor and control usage of social networking and other web sites.&lt;br /&gt;
&lt;br /&gt;
4.4. Be able to develop policies and applicate methods for children’s use of the computer and the Internet (depending on age and socio-cultural situation). &lt;br /&gt;
&lt;br /&gt;
4.5. Understanding advantages and limitations with protection software&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 5 SYLLABUS - Social networks and safe usage of the Internet ==&lt;br /&gt;
&lt;br /&gt;
New Syllabus version as discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:05 (UTC) - &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5.1. Know how to '''start and finish safe browsing session''' (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing. &lt;br /&gt;
&lt;br /&gt;
5.2. Know about'''advantages, disadvantages and dangers of Internet cookies''' and ActiveX control. Know about tools that ensure safety when browsing the Internet.  &lt;br /&gt;
&lt;br /&gt;
5.3. Be able to manage: temporary Internet files, browser history, passwords, cookies and autocomplete data. &lt;br /&gt;
&lt;br /&gt;
5.4. Be able to safely '''connect to e-Services and secure environments'''– connecting and using, recover lost passwords.&lt;br /&gt;
&lt;br /&gt;
5.5. Know when and in which cases personal '''information can be published on the Internet''' (i.e. status publishing about leaving home).&lt;br /&gt;
&lt;br /&gt;
5.6. Know who you should contact if you discovered inappropriate information about you or your related digital identities.&lt;br /&gt;
&lt;br /&gt;
5.7. Understand that it is necessary to exercise critical thinking about content and identities on the internet. (i.e. blogs, Wikipedia, social networks, forums, etc). #reformulated by --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:22 (UTC)&lt;br /&gt;
&lt;br /&gt;
5.8. Understand 'threats of inappropriate content for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on) &lt;br /&gt;
&lt;br /&gt;
5.9. Understand what an online social network is, what are opportunities and risks of social network. Age groups of using social networks. Options and parameters for information disclosure. Understand what is the fascination to disclose private information on the internet&lt;br /&gt;
&lt;br /&gt;
5.10. Know different '''social network types''' (Friendship-driven and Interest-driven) and be able to use them harmless and safe (appropriate account privacy settings). &lt;br /&gt;
&lt;br /&gt;
5.11. Know what type of information recommended to be published on social network, be responsible for published content, and know impacts &lt;br /&gt;
&lt;br /&gt;
5.12. Understand that online socializing reflects &amp;quot;real life&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
5.13. Be able to send/receive e-mail securely: know how to reject email from specific email addresses. Know how to treat email messages from unknown senders, classified as spam and email messages infected with malware. Know about scam, hoax, chain letters.&lt;br /&gt;
&lt;br /&gt;
5.14. Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information, etc.&lt;br /&gt;
&lt;br /&gt;
5.15. Understand threats of online communication: virtual dating, bullying, commenting. &lt;br /&gt;
&lt;br /&gt;
5.16. Understand dependency and addiction to the Internet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Another Mind mapping=&lt;br /&gt;
&lt;br /&gt;
[[Fichier:notions-and-concepts.png|1100px|]]&lt;br /&gt;
&lt;br /&gt;
You can access to the dynamic mapp here [http://www.mindomo.com/edit.htm?m=64bf626021b940d99dd9576283c833bf notions and concepts]&lt;br /&gt;
&lt;br /&gt;
[[Proposition]]&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4857</id>
		<title>Syllabus e-safety</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4857"/>
				<updated>2011-06-23T14:22:39Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : /* CHAPTER 2 SYLLABUS - Privacy and data management */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''e-GUARDIAN - Syllabus V.2.x&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
== Introduction : aims &amp;amp; resources ==&lt;br /&gt;
&lt;br /&gt;
=== Criteria, which are important by developing e-GUARDIAN questions ===&lt;br /&gt;
&lt;br /&gt;
•There should be two types of questions:&lt;br /&gt;
&lt;br /&gt;
 • question with four answers, of which one is correct,&lt;br /&gt;
 • question with image (hotspot questions), where answer could be marked in the picture.&lt;br /&gt;
&lt;br /&gt;
•It is important to create four questions for each syllabus item&lt;br /&gt;
&lt;br /&gt;
•It is advisable to create equal length answers (for example, if there would be three long answers and one short, which is correct, test taker could have a clue about correct answer)&lt;br /&gt;
&lt;br /&gt;
•It is advisable not to use specific software in the questions (exceptions may be possible, the information about this software must be in the educational material).&lt;br /&gt;
&lt;br /&gt;
--[[Utilisateur:Donarena|Renata (Lithuania Team)]] 20 juin 2011 à 07:47 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== Aims ===&lt;br /&gt;
&lt;br /&gt;
This wiki page aims at facilitating a collaborative synergic process for defining the syllabus on netsafety of the EU LdV e-Guardian project.&lt;br /&gt;
Participants are delegates of partner's institutions from Lithuania, Latvia, Germany and Switzerland.&lt;br /&gt;
&lt;br /&gt;
The resources are : &lt;br /&gt;
&lt;br /&gt;
=== A web-based social bookmarking working group === &lt;br /&gt;
on [http://groups.diigo.com/group/e_safety here on Diigo],  we can post all related useful information on netsafety, such as : &lt;br /&gt;
&lt;br /&gt;
- definition of key-words&lt;br /&gt;
&lt;br /&gt;
- examples of quizz, pedagogical scenarios and other pedagogical resources&lt;br /&gt;
&lt;br /&gt;
- related scientific articles &lt;br /&gt;
&lt;br /&gt;
- other relevant initiatives&lt;br /&gt;
&lt;br /&gt;
=== Guidelines for the syllabus === &lt;br /&gt;
They wwere provided by the project's team coordinated by the LIA organisation, and specially the syllabus workpackage leader, ecdl.lt, represented by Eugenijus Telesius and his team composed of Renata Danieliene &amp;amp; Tomas Lygutas, which is complemented by partner's delegate Algimantas Merkys (LIA, the coordinator's team), Dennis Krannich (Bremen Univbersity), Théo Bondolfi &amp;amp; Rémi Lévy (APTES Switzerland). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
These guidelines are : &lt;br /&gt;
&lt;br /&gt;
1. Focus on [[e-safety]] [[offline]] as well as [[online]], therefore always taking into account basic needs (such as password storage) as well as complex needs (such as behaviour in [[web2]] environments).&lt;br /&gt;
&lt;br /&gt;
2. Taking into account all key-points in this initial version, and considering these key-point as &amp;quot;objects&amp;quot; whcih can be replaced in other forms but which must stay available.&lt;br /&gt;
&lt;br /&gt;
3. respecting the steps of user point of view (example : 1 start computer, 2 launch application...)&lt;br /&gt;
&lt;br /&gt;
4. restructuring with categories and sets like in the policies of ECDL [http://www.ecdl.org/programmes/media/ECDL_ICDL_Module_12_-_Syllabus_-_V1.0.pdf]&lt;br /&gt;
&lt;br /&gt;
5. keeping as much as possible the existing phrases and formulations, only changing (merging, repositioning, pionderating) when it suits the next step of test/scenarios&lt;br /&gt;
&lt;br /&gt;
6. Keeping in mind the final intention of '''equity between risks &amp;amp; opportunities''' proposing positive practices (opportunities, in an educative perspective) and preventing bad practices (risks, which creates fear), based on the vision of the slide 10 of [http://www.slideshare.net/Bernajean/ne-3440462 this presentation of Anne Collier], which says that netsafety3.0 should be : &lt;br /&gt;
&lt;br /&gt;
- research-based, not fearbased, therefore relevant&lt;br /&gt;
&lt;br /&gt;
- flexible &amp;amp; layered, instead of &amp;quot;one-size-fits-all&amp;quot;&lt;br /&gt;
&lt;br /&gt;
- respectful of learning culture : stakeholders in positive experience, not just potential victims&lt;br /&gt;
&lt;br /&gt;
- positive, empowering : not just safety from, but safety for...&lt;br /&gt;
&lt;br /&gt;
- full, constructive engagement in participatory society (that's the context of the construction of this syllabus)&lt;br /&gt;
&lt;br /&gt;
=== Mind mapping for the key-notions of the syllabus ===&lt;br /&gt;
&lt;br /&gt;
In addition, Rémi Levy from APTES has produced a [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea mind mapping image] to represent all the notions for the e-safety syllabus. You can access to [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea the interactive map] - You can modify it directly because we keep a copy of the precedent contribution.&lt;br /&gt;
&lt;br /&gt;
== Other possible structure of the syllabus - A.P.T.E.S proposition ==&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Proposition access to the page]&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 1 SYLLABUS - Basic knowledge on e-safety ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;NOTICE IT IS BETTER IF COMMENTS AND DISCUSSIONS ARE MADE ON THE DISCUSSION PAGE &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:28 (UTC)&lt;br /&gt;
&lt;br /&gt;
1.1. Understand the differences of information [[contents]] (open, private, business, etc.).&lt;br /&gt;
&lt;br /&gt;
1.2. Be aware of '''[[privacy protection]] legal act''' (be aware of the responsibility for own actions on the Internet: when publishing, writing comments, downloading,etc)&lt;br /&gt;
&lt;br /&gt;
1.3. Know about '''[[equity between opportunities &amp;amp; risks]]''' of [[web2]]&lt;br /&gt;
&lt;br /&gt;
1.4. Understand the notion of '''[[identity]]'''. &lt;br /&gt;
&lt;br /&gt;
1.5. Be aware of '''different identity for authorization theft methods''' (skimming, pretexting, shoulder surfing, information diving).&lt;br /&gt;
&lt;br /&gt;
1.6. Know about '''[[social engineering]]''' and its methods. &lt;br /&gt;
&lt;br /&gt;
1.7. Be aware of cyber crime, online predators, financial scams, harms and who to contact when  discovering illegal data.&lt;br /&gt;
&lt;br /&gt;
1.8. Understand computer infection threats (viruses, Trojan horses, spyware, dishonest adware, etc.). Know when and how malicious software can get into computer system.&lt;br /&gt;
&lt;br /&gt;
1.9. Know about organizational [[security]]: school security, usage of school web pages, content publishing, access, etc. &lt;br /&gt;
&lt;br /&gt;
1.10. Know about '''[[netiquette]] and other basic codes''' of conduct in the cyberspace (RFC 1855)&lt;br /&gt;
&lt;br /&gt;
1.11. Understand what is [[Online Safety 3.0]] and why [[digital citizenship]] is protective.&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 2 SYLLABUS - Privacy and data management ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June &amp;lt;/span&amp;gt; --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:35 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2.1. [[Distinguish between data and information]].&lt;br /&gt;
&lt;br /&gt;
2.2. Understand the opportunities and risks of digital '''[[data management]]''' from fully collaborative to full privacy. &lt;br /&gt;
&lt;br /&gt;
2.3. Know about multi-layer '''[[password]]''', changing and keeping password policies. &lt;br /&gt;
&lt;br /&gt;
2.4. Know about '''safe computer [[login]] methods''' &lt;br /&gt;
&lt;br /&gt;
2.5. Know why to use multiple user accounts on various digital environments. Understand the meaning and importance of access rights (what a personal user account is and how data of different users is separated). &lt;br /&gt;
&lt;br /&gt;
2.6. Be aware of '''data encryption''', decryption and password protected files. &lt;br /&gt;
&lt;br /&gt;
2.7. Understand what [[intellectual property]] on Internet is. &lt;br /&gt;
&lt;br /&gt;
2.8. Understand the benefits and purpose of data '''backups''' and be able to restore lost data.&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 3 SYLLABUS - Security tools and network security ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:24 (UTC)&lt;br /&gt;
&lt;br /&gt;
3.1. Know computer '''network types''' (local area network (LAN), wide area network (WAN), virtual private network (VPN)) and why protection is needed. &lt;br /&gt;
&lt;br /&gt;
3.2. Know different network '''connection methods''' (Cable, Wireless, Mobile networks). &lt;br /&gt;
&lt;br /&gt;
3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network. &lt;br /&gt;
&lt;br /&gt;
3.4. '''Sharing and accessing resources''' over network (Files, Printer, Desktop). &lt;br /&gt;
&lt;br /&gt;
3.5. Understand safety means of computer networks (Firewall, Antivirus, Anti-spyware, Spam blocker Password protection, Connection encryption – wireless). &lt;br /&gt;
&lt;br /&gt;
3.6. Be able to use standard OS integrated protection tools. &lt;br /&gt;
&lt;br /&gt;
3.7. Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.). Distinguish different modes of antivirus protection (active, passive).&lt;br /&gt;
&lt;br /&gt;
3.8. Know what has to be done and in what order, if you suspect that computer system is infected. Distinguish infected files deletion, quarantining and curing.&lt;br /&gt;
&lt;br /&gt;
3.9. Know how to '''follow, download and use updates for your operating system''', software and importance of antivirus definition files. Understand the benefits of these updates.&lt;br /&gt;
&lt;br /&gt;
3.10. Informal and formal periodic [[external checkup]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 4 SYLLABUS - Minors and newcomers on the net == &lt;br /&gt;
&lt;br /&gt;
New Syllabus version discussed on Thursday 16th June - --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:53 (UTC)&lt;br /&gt;
&lt;br /&gt;
4.1. Understand the impact of communication with minors and new users about safety in IT World.&lt;br /&gt;
&lt;br /&gt;
4.2 Understand the purpose of monitoring, filtering and controlling tools for safer internet use of minors&lt;br /&gt;
&lt;br /&gt;
4.3. Be aware of different ways to educate, monitor and control usage of social networking and other web sites.&lt;br /&gt;
&lt;br /&gt;
4.4. Be able to develop policies and applicate methods for children’s use of the computer and the Internet (depending on age and socio-cultural situation). &lt;br /&gt;
&lt;br /&gt;
4.5. Understanding advantages and limitations with protection software&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 5 SYLLABUS - Social networks and safe usage of the Internet ==&lt;br /&gt;
&lt;br /&gt;
New Syllabus version as discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:05 (UTC) - &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5.1. Know how to '''start and finish safe browsing session''' (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing. &lt;br /&gt;
&lt;br /&gt;
5.2. Know about'''advantages, disadvantages and dangers of Internet cookies''' and ActiveX control. Know about tools that ensure safety when browsing the Internet.  &lt;br /&gt;
&lt;br /&gt;
5.3. Be able to manage: temporary Internet files, browser history, passwords, cookies and autocomplete data. &lt;br /&gt;
&lt;br /&gt;
5.4. Be able to safely '''connect to e-Services and secure environments'''– connecting and using, recover lost passwords.&lt;br /&gt;
&lt;br /&gt;
5.5. Know when and in which cases personal '''information can be published on the Internet''' (i.e. status publishing about leaving home).&lt;br /&gt;
&lt;br /&gt;
5.6. Know who you should contact if you discovered inappropriate information about you or your related digital identities.&lt;br /&gt;
&lt;br /&gt;
5.7. Understand that it is necessary to exercise critical thinking about content and identities on the internet. (i.e. blogs, Wikipedia, social networks, forums, etc). #reformulated by --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:22 (UTC)&lt;br /&gt;
&lt;br /&gt;
5.8. Understand 'threats of inappropriate content for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on) &lt;br /&gt;
&lt;br /&gt;
5.9. Understand what an online social network is, what are opportunities and risks of social network. Age groups of using social networks. Options and parameters for information disclosure. Understand what is the fascination to disclose private information on the internet&lt;br /&gt;
&lt;br /&gt;
5.10. Know different '''social network types''' (Friendship-driven and Interest-driven) and be able to use them harmless and safe (appropriate account privacy settings). &lt;br /&gt;
&lt;br /&gt;
5.11. Know what type of information recommended to be published on social network, be responsible for published content, and know impacts &lt;br /&gt;
&lt;br /&gt;
5.12. Understand that online socializing reflects &amp;quot;real life&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
5.13. Be able to send/receive e-mail securely: know how to reject email from specific email addresses. Know how to treat email messages from unknown senders, classified as spam and email messages infected with malware. Know about scam, hoax, chain letters.&lt;br /&gt;
&lt;br /&gt;
5.14. Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information, etc.&lt;br /&gt;
&lt;br /&gt;
5.15. Understand threats of online communication: virtual dating, bullying, commenting. &lt;br /&gt;
&lt;br /&gt;
5.16. Understand dependency and addiction to the Internet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Another Mind mapping=&lt;br /&gt;
&lt;br /&gt;
[[Fichier:notions-and-concepts.png|1100px|]]&lt;br /&gt;
&lt;br /&gt;
You can access to the dynamic mapp here [http://www.mindomo.com/edit.htm?m=64bf626021b940d99dd9576283c833bf notions and concepts]&lt;br /&gt;
&lt;br /&gt;
[[Proposition]]&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4856</id>
		<title>Syllabus e-safety</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4856"/>
				<updated>2011-06-23T14:19:58Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : /* CHAPTER 1 SYLLABUS - Basic knowledge on e-safety */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''e-GUARDIAN - Syllabus V.2.x&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
== Introduction : aims &amp;amp; resources ==&lt;br /&gt;
&lt;br /&gt;
=== Criteria, which are important by developing e-GUARDIAN questions ===&lt;br /&gt;
&lt;br /&gt;
•There should be two types of questions:&lt;br /&gt;
&lt;br /&gt;
 • question with four answers, of which one is correct,&lt;br /&gt;
 • question with image (hotspot questions), where answer could be marked in the picture.&lt;br /&gt;
&lt;br /&gt;
•It is important to create four questions for each syllabus item&lt;br /&gt;
&lt;br /&gt;
•It is advisable to create equal length answers (for example, if there would be three long answers and one short, which is correct, test taker could have a clue about correct answer)&lt;br /&gt;
&lt;br /&gt;
•It is advisable not to use specific software in the questions (exceptions may be possible, the information about this software must be in the educational material).&lt;br /&gt;
&lt;br /&gt;
--[[Utilisateur:Donarena|Renata (Lithuania Team)]] 20 juin 2011 à 07:47 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== Aims ===&lt;br /&gt;
&lt;br /&gt;
This wiki page aims at facilitating a collaborative synergic process for defining the syllabus on netsafety of the EU LdV e-Guardian project.&lt;br /&gt;
Participants are delegates of partner's institutions from Lithuania, Latvia, Germany and Switzerland.&lt;br /&gt;
&lt;br /&gt;
The resources are : &lt;br /&gt;
&lt;br /&gt;
=== A web-based social bookmarking working group === &lt;br /&gt;
on [http://groups.diigo.com/group/e_safety here on Diigo],  we can post all related useful information on netsafety, such as : &lt;br /&gt;
&lt;br /&gt;
- definition of key-words&lt;br /&gt;
&lt;br /&gt;
- examples of quizz, pedagogical scenarios and other pedagogical resources&lt;br /&gt;
&lt;br /&gt;
- related scientific articles &lt;br /&gt;
&lt;br /&gt;
- other relevant initiatives&lt;br /&gt;
&lt;br /&gt;
=== Guidelines for the syllabus === &lt;br /&gt;
They wwere provided by the project's team coordinated by the LIA organisation, and specially the syllabus workpackage leader, ecdl.lt, represented by Eugenijus Telesius and his team composed of Renata Danieliene &amp;amp; Tomas Lygutas, which is complemented by partner's delegate Algimantas Merkys (LIA, the coordinator's team), Dennis Krannich (Bremen Univbersity), Théo Bondolfi &amp;amp; Rémi Lévy (APTES Switzerland). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
These guidelines are : &lt;br /&gt;
&lt;br /&gt;
1. Focus on [[e-safety]] [[offline]] as well as [[online]], therefore always taking into account basic needs (such as password storage) as well as complex needs (such as behaviour in [[web2]] environments).&lt;br /&gt;
&lt;br /&gt;
2. Taking into account all key-points in this initial version, and considering these key-point as &amp;quot;objects&amp;quot; whcih can be replaced in other forms but which must stay available.&lt;br /&gt;
&lt;br /&gt;
3. respecting the steps of user point of view (example : 1 start computer, 2 launch application...)&lt;br /&gt;
&lt;br /&gt;
4. restructuring with categories and sets like in the policies of ECDL [http://www.ecdl.org/programmes/media/ECDL_ICDL_Module_12_-_Syllabus_-_V1.0.pdf]&lt;br /&gt;
&lt;br /&gt;
5. keeping as much as possible the existing phrases and formulations, only changing (merging, repositioning, pionderating) when it suits the next step of test/scenarios&lt;br /&gt;
&lt;br /&gt;
6. Keeping in mind the final intention of '''equity between risks &amp;amp; opportunities''' proposing positive practices (opportunities, in an educative perspective) and preventing bad practices (risks, which creates fear), based on the vision of the slide 10 of [http://www.slideshare.net/Bernajean/ne-3440462 this presentation of Anne Collier], which says that netsafety3.0 should be : &lt;br /&gt;
&lt;br /&gt;
- research-based, not fearbased, therefore relevant&lt;br /&gt;
&lt;br /&gt;
- flexible &amp;amp; layered, instead of &amp;quot;one-size-fits-all&amp;quot;&lt;br /&gt;
&lt;br /&gt;
- respectful of learning culture : stakeholders in positive experience, not just potential victims&lt;br /&gt;
&lt;br /&gt;
- positive, empowering : not just safety from, but safety for...&lt;br /&gt;
&lt;br /&gt;
- full, constructive engagement in participatory society (that's the context of the construction of this syllabus)&lt;br /&gt;
&lt;br /&gt;
=== Mind mapping for the key-notions of the syllabus ===&lt;br /&gt;
&lt;br /&gt;
In addition, Rémi Levy from APTES has produced a [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea mind mapping image] to represent all the notions for the e-safety syllabus. You can access to [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea the interactive map] - You can modify it directly because we keep a copy of the precedent contribution.&lt;br /&gt;
&lt;br /&gt;
== Other possible structure of the syllabus - A.P.T.E.S proposition ==&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Proposition access to the page]&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 1 SYLLABUS - Basic knowledge on e-safety ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;NOTICE IT IS BETTER IF COMMENTS AND DISCUSSIONS ARE MADE ON THE DISCUSSION PAGE &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:28 (UTC)&lt;br /&gt;
&lt;br /&gt;
1.1. Understand the differences of information [[contents]] (open, private, business, etc.).&lt;br /&gt;
&lt;br /&gt;
1.2. Be aware of '''[[privacy protection]] legal act''' (be aware of the responsibility for own actions on the Internet: when publishing, writing comments, downloading,etc)&lt;br /&gt;
&lt;br /&gt;
1.3. Know about '''[[equity between opportunities &amp;amp; risks]]''' of [[web2]]&lt;br /&gt;
&lt;br /&gt;
1.4. Understand the notion of '''[[identity]]'''. &lt;br /&gt;
&lt;br /&gt;
1.5. Be aware of '''different identity for authorization theft methods''' (skimming, pretexting, shoulder surfing, information diving).&lt;br /&gt;
&lt;br /&gt;
1.6. Know about '''[[social engineering]]''' and its methods. &lt;br /&gt;
&lt;br /&gt;
1.7. Be aware of cyber crime, online predators, financial scams, harms and who to contact when  discovering illegal data.&lt;br /&gt;
&lt;br /&gt;
1.8. Understand computer infection threats (viruses, Trojan horses, spyware, dishonest adware, etc.). Know when and how malicious software can get into computer system.&lt;br /&gt;
&lt;br /&gt;
1.9. Know about organizational [[security]]: school security, usage of school web pages, content publishing, access, etc. &lt;br /&gt;
&lt;br /&gt;
1.10. Know about '''[[netiquette]] and other basic codes''' of conduct in the cyberspace (RFC 1855)&lt;br /&gt;
&lt;br /&gt;
1.11. Understand what is [[Online Safety 3.0]] and why [[digital citizenship]] is protective.&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 2 SYLLABUS - Privacy and data management ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June &amp;lt;/span&amp;gt; --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:35 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2.1. [[Distinguish between data and information]].&lt;br /&gt;
&lt;br /&gt;
2.2. Understand the opportunities and risks of digital '''[[data management]]''' from fully collaborative to full privacy. &lt;br /&gt;
&lt;br /&gt;
2.3. Know about multi-layer '''[[password]]''', changing and keeping password policies. &lt;br /&gt;
&lt;br /&gt;
2.4. Know about '''safe computer [[login]] methods''' &lt;br /&gt;
&lt;br /&gt;
2.5. Know multiple user accounts on various digital environments. Understand the meaning and importance of access rights (what a personal user account is and how data of different users is separated). &lt;br /&gt;
&lt;br /&gt;
2.6. Be aware of '''data encryption''', decryption and password protected files. &lt;br /&gt;
&lt;br /&gt;
2.7. Understand what [[intellectual property]] on Internet is. &lt;br /&gt;
&lt;br /&gt;
2.8. Understand the benefits and purpose of data '''backups''' and be able to restore lost data.&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 3 SYLLABUS - Security tools and network security ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:24 (UTC)&lt;br /&gt;
&lt;br /&gt;
3.1. Know computer '''network types''' (local area network (LAN), wide area network (WAN), virtual private network (VPN)) and why protection is needed. &lt;br /&gt;
&lt;br /&gt;
3.2. Know different network '''connection methods''' (Cable, Wireless, Mobile networks). &lt;br /&gt;
&lt;br /&gt;
3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network. &lt;br /&gt;
&lt;br /&gt;
3.4. '''Sharing and accessing resources''' over network (Files, Printer, Desktop). &lt;br /&gt;
&lt;br /&gt;
3.5. Understand safety means of computer networks (Firewall, Antivirus, Anti-spyware, Spam blocker Password protection, Connection encryption – wireless). &lt;br /&gt;
&lt;br /&gt;
3.6. Be able to use standard OS integrated protection tools. &lt;br /&gt;
&lt;br /&gt;
3.7. Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.). Distinguish different modes of antivirus protection (active, passive).&lt;br /&gt;
&lt;br /&gt;
3.8. Know what has to be done and in what order, if you suspect that computer system is infected. Distinguish infected files deletion, quarantining and curing.&lt;br /&gt;
&lt;br /&gt;
3.9. Know how to '''follow, download and use updates for your operating system''', software and importance of antivirus definition files. Understand the benefits of these updates.&lt;br /&gt;
&lt;br /&gt;
3.10. Informal and formal periodic [[external checkup]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 4 SYLLABUS - Minors and newcomers on the net == &lt;br /&gt;
&lt;br /&gt;
New Syllabus version discussed on Thursday 16th June - --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:53 (UTC)&lt;br /&gt;
&lt;br /&gt;
4.1. Understand the impact of communication with minors and new users about safety in IT World.&lt;br /&gt;
&lt;br /&gt;
4.2 Understand the purpose of monitoring, filtering and controlling tools for safer internet use of minors&lt;br /&gt;
&lt;br /&gt;
4.3. Be aware of different ways to educate, monitor and control usage of social networking and other web sites.&lt;br /&gt;
&lt;br /&gt;
4.4. Be able to develop policies and applicate methods for children’s use of the computer and the Internet (depending on age and socio-cultural situation). &lt;br /&gt;
&lt;br /&gt;
4.5. Understanding advantages and limitations with protection software&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 5 SYLLABUS - Social networks and safe usage of the Internet ==&lt;br /&gt;
&lt;br /&gt;
New Syllabus version as discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:05 (UTC) - &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5.1. Know how to '''start and finish safe browsing session''' (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing. &lt;br /&gt;
&lt;br /&gt;
5.2. Know about'''advantages, disadvantages and dangers of Internet cookies''' and ActiveX control. Know about tools that ensure safety when browsing the Internet.  &lt;br /&gt;
&lt;br /&gt;
5.3. Be able to manage: temporary Internet files, browser history, passwords, cookies and autocomplete data. &lt;br /&gt;
&lt;br /&gt;
5.4. Be able to safely '''connect to e-Services and secure environments'''– connecting and using, recover lost passwords.&lt;br /&gt;
&lt;br /&gt;
5.5. Know when and in which cases personal '''information can be published on the Internet''' (i.e. status publishing about leaving home).&lt;br /&gt;
&lt;br /&gt;
5.6. Know who you should contact if you discovered inappropriate information about you or your related digital identities.&lt;br /&gt;
&lt;br /&gt;
5.7. Understand that it is necessary to exercise critical thinking about content and identities on the internet. (i.e. blogs, Wikipedia, social networks, forums, etc). #reformulated by --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:22 (UTC)&lt;br /&gt;
&lt;br /&gt;
5.8. Understand 'threats of inappropriate content for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on) &lt;br /&gt;
&lt;br /&gt;
5.9. Understand what an online social network is, what are opportunities and risks of social network. Age groups of using social networks. Options and parameters for information disclosure. Understand what is the fascination to disclose private information on the internet&lt;br /&gt;
&lt;br /&gt;
5.10. Know different '''social network types''' (Friendship-driven and Interest-driven) and be able to use them harmless and safe (appropriate account privacy settings). &lt;br /&gt;
&lt;br /&gt;
5.11. Know what type of information recommended to be published on social network, be responsible for published content, and know impacts &lt;br /&gt;
&lt;br /&gt;
5.12. Understand that online socializing reflects &amp;quot;real life&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
5.13. Be able to send/receive e-mail securely: know how to reject email from specific email addresses. Know how to treat email messages from unknown senders, classified as spam and email messages infected with malware. Know about scam, hoax, chain letters.&lt;br /&gt;
&lt;br /&gt;
5.14. Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information, etc.&lt;br /&gt;
&lt;br /&gt;
5.15. Understand threats of online communication: virtual dating, bullying, commenting. &lt;br /&gt;
&lt;br /&gt;
5.16. Understand dependency and addiction to the Internet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Another Mind mapping=&lt;br /&gt;
&lt;br /&gt;
[[Fichier:notions-and-concepts.png|1100px|]]&lt;br /&gt;
&lt;br /&gt;
You can access to the dynamic mapp here [http://www.mindomo.com/edit.htm?m=64bf626021b940d99dd9576283c833bf notions and concepts]&lt;br /&gt;
&lt;br /&gt;
[[Proposition]]&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4845</id>
		<title>Syllabus e-safety</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4845"/>
				<updated>2011-06-20T08:24:09Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : /* CHAPTER 1 SYLLABUS - Basic knowledge on e-safety */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''e-GUARDIAN - Syllabus V.2.x&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
== Introduction : aims &amp;amp; resources ==&lt;br /&gt;
&lt;br /&gt;
=== Criteria, which are important by developing e-GUARDIAN questions ===&lt;br /&gt;
&lt;br /&gt;
•There should be two types of questions:&lt;br /&gt;
&lt;br /&gt;
 • question with four answers, of which one is correct,&lt;br /&gt;
 • question with image (hotspot questions), where answer could be marked in the picture.&lt;br /&gt;
&lt;br /&gt;
•It is important to create four questions for each syllabus item&lt;br /&gt;
&lt;br /&gt;
•It is advisable to create equal length answers (for example, if there would be three long answers and one short, which is correct, test taker could have a clue about correct answer)&lt;br /&gt;
&lt;br /&gt;
•It is advisable not to use specific software in the questions (exceptions may be possible, the information about this software must be in the educational material).&lt;br /&gt;
&lt;br /&gt;
--[[Utilisateur:Donarena|Renata (Lithuania Team)]] 20 juin 2011 à 07:47 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== Aims ===&lt;br /&gt;
&lt;br /&gt;
This wiki page aims at facilitating a collaborative synergic process for defining the syllabus on netsafety of the EU LdV e-Guardian project.&lt;br /&gt;
Participants are delegates of partner's institutions from Lithuania, Latvia, Germany and Switzerland.&lt;br /&gt;
&lt;br /&gt;
The resources are : &lt;br /&gt;
&lt;br /&gt;
=== A web-based social bookmarking working group === &lt;br /&gt;
on [http://groups.diigo.com/group/e_safety here on Diigo],  we can post all related useful information on netsafety, such as : &lt;br /&gt;
&lt;br /&gt;
- definition of key-words&lt;br /&gt;
&lt;br /&gt;
- examples of quizz, pedagogical scenarios and other pedagogical resources&lt;br /&gt;
&lt;br /&gt;
- related scientific articles &lt;br /&gt;
&lt;br /&gt;
- other relevant initiatives&lt;br /&gt;
&lt;br /&gt;
=== Guidelines for the syllabus === &lt;br /&gt;
They wwere provided by the project's team coordinated by the LIA organisation, and specially the syllabus workpackage leader, ecdl.lt, represented by Eugenijus Telesius and his team composed of Renata Danieliene &amp;amp; Tomas Lygutas, which is complemented by partner's delegate Algimantas Merkys (LIA, the coordinator's team), Dennis Krannich (Bremen Univbersity), Théo Bondolfi &amp;amp; Rémi Lévy (APTES Switzerland). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
These guidelines are : &lt;br /&gt;
&lt;br /&gt;
1. Focus on [[e-safety]] [[offline]] as well as [[online]], therefore always taking into account basic needs (such as password storage) as well as complex needs (such as behaviour in [[web2]] environments).&lt;br /&gt;
&lt;br /&gt;
2. Taking into account all key-points in this initial version, and considering these key-point as &amp;quot;objects&amp;quot; whcih can be replaced in other forms but which must stay available.&lt;br /&gt;
&lt;br /&gt;
3. respecting the steps of user point of view (example : 1 start computer, 2 launch application...)&lt;br /&gt;
&lt;br /&gt;
4. restructuring with categories and sets like in the policies of ECDL [http://www.ecdl.org/programmes/media/ECDL_ICDL_Module_12_-_Syllabus_-_V1.0.pdf]&lt;br /&gt;
&lt;br /&gt;
5. keeping as much as possible the existing phrases and formulations, only changing (merging, repositioning, pionderating) when it suits the next step of test/scenarios&lt;br /&gt;
&lt;br /&gt;
6. Keeping in mind the final intention of '''equity between risks &amp;amp; opportunities''' proposing positive practices (opportunities, in an educative perspective) and preventing bad practices (risks, which creates fear), based on the vision of the slide 10 of [http://www.slideshare.net/Bernajean/ne-3440462 this presentation of Anne Collier], which says that netsafety3.0 should be : &lt;br /&gt;
&lt;br /&gt;
- research-based, not fearbased, therefore relevant&lt;br /&gt;
&lt;br /&gt;
- flexible &amp;amp; layered, instead of &amp;quot;one-size-fits-all&amp;quot;&lt;br /&gt;
&lt;br /&gt;
- respectful of learning culture : stakeholders in positive experience, not just potential victims&lt;br /&gt;
&lt;br /&gt;
- positive, empowering : not just safety from, but safety for...&lt;br /&gt;
&lt;br /&gt;
- full, constructive engagement in participatory society (that's the context of the construction of this syllabus)&lt;br /&gt;
&lt;br /&gt;
=== Mind mapping for the key-notions of the syllabus ===&lt;br /&gt;
&lt;br /&gt;
In addition, Rémi Levy from APTES has produced a [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea mind mapping image] to represent all the notions for the e-safety syllabus. You can access to [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea the interactive map] - You can modify it directly because we keep a copy of the precedent contribution.&lt;br /&gt;
&lt;br /&gt;
== Other possible structure of the syllabus - A.P.T.E.S proposition ==&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Proposition access to the page]&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 1 SYLLABUS - Basic knowledge on e-safety ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;NOTICE IT IS BETTER IF COMMENTS AND DISCUSSIONS ARE MADE ON THE DISCUSSION PAGE &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:28 (UTC)&lt;br /&gt;
&lt;br /&gt;
1.1. Understand the differences of information [[contents]] (open, private, business, etc.).&lt;br /&gt;
&lt;br /&gt;
1.2. Be aware of '''[[privacy protection]] legal act''' (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies, etc)&lt;br /&gt;
&lt;br /&gt;
1.3. Know about '''[[equity between opportunities &amp;amp; risks]]''' of [[web2]]&lt;br /&gt;
&lt;br /&gt;
1.4. Understand the notion of '''[[identity]]'''. &lt;br /&gt;
&lt;br /&gt;
1.5. Be aware of '''different identity for authorization theft methods''' (skimming, pretexting, shoulder surfing, information diving).&lt;br /&gt;
&lt;br /&gt;
1.6. Know about '''[[social engineering]]''' and it’s methods. &lt;br /&gt;
&lt;br /&gt;
1.7. Be aware of cyber crime, online predators, financial scams, harm and who to contact if discovered illegal data.&lt;br /&gt;
&lt;br /&gt;
1.8. Understand computer infection threats (viruses, Trojan horses, spyware, dishonest adware, etc.). Know when and how malicious software can get into computer system.&lt;br /&gt;
&lt;br /&gt;
1.9. Know about organizational [[security]]: school security, usage of school web pages, content publishing, access, etc. &lt;br /&gt;
&lt;br /&gt;
1.10. Know about '''[[netiquette]] and other basic codes''' of conducts in the cyberspace (RFC 1855)&lt;br /&gt;
&lt;br /&gt;
1.11. Understand what is [[Online Safety 3.0]] and why [[digital citizenship]] is protective.&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 2 SYLLABUS - Privacy and data management ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June &amp;lt;/span&amp;gt; --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:35 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2.1. [[Distinguish between data and information]].&lt;br /&gt;
&lt;br /&gt;
2.2. Understand the opportunities and risks of digital '''[[data management]]''' from fully collaborative to full privacy. &lt;br /&gt;
&lt;br /&gt;
2.3. Know about multi-layer '''[[password]]''', changing and keeping password policies. &lt;br /&gt;
&lt;br /&gt;
2.4. Know about '''safe computer [[login]] methods''' &lt;br /&gt;
&lt;br /&gt;
2.5. Know multiple user accounts on various digital environments. Understand the meaning and importance of access rights (what a personal user account is and how data of different users is separated). &lt;br /&gt;
&lt;br /&gt;
2.6. Be aware of '''data encryption''', decryption and password protected files. &lt;br /&gt;
&lt;br /&gt;
2.7. Understand what [[intellectual property]] on Internet is. &lt;br /&gt;
&lt;br /&gt;
2.8. Understand the benefits and purpose of data '''backups''' and be able to restore lost data.&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 3 SYLLABUS - Security tools and network security ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:24 (UTC)&lt;br /&gt;
&lt;br /&gt;
3.1. Know computer '''network types''' (local area network (LAN), wide area network (WAN), virtual private network (VPN)) and why protection is needed. &lt;br /&gt;
&lt;br /&gt;
3.2. Know different network '''connection methods''' (Cable, Wireless, Mobile networks). &lt;br /&gt;
&lt;br /&gt;
3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network. &lt;br /&gt;
&lt;br /&gt;
3.4. '''Sharing and accessing resources''' over network (Files, Printer, Desktop). &lt;br /&gt;
&lt;br /&gt;
3.5. Understand safety means of computer networks (Firewall, Antivirus, Anti-spyware, Spam blocker Password protection, Connection encryption – wireless). &lt;br /&gt;
&lt;br /&gt;
3.6. Be able to use standard OS integrated protection tools. &lt;br /&gt;
&lt;br /&gt;
3.7. Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.). Distinguish different modes of antivirus protection (active, passive).&lt;br /&gt;
&lt;br /&gt;
3.8. Know what has to be done and in what order, if you suspect that computer system is infected. Distinguish infected files deletion, quarantining and curing.&lt;br /&gt;
&lt;br /&gt;
3.9. Know how to '''follow, download and use updates for your operating system''', software and importance of antivirus definition files. Understand the benefits of these updates.&lt;br /&gt;
&lt;br /&gt;
3.10. Informal and formal periodic [[external checkup]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 4 SYLLABUS - Minors and newcomers on the net == &lt;br /&gt;
&lt;br /&gt;
New Syllabus version discussed on Thursday 16th June - --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:53 (UTC)&lt;br /&gt;
&lt;br /&gt;
4.1. Understand the impact of communication with minors and new users about safety in IT World.&lt;br /&gt;
&lt;br /&gt;
4.2 Understand the purpose of monitoring, filtering and controlling tools for safer internet use of minors&lt;br /&gt;
&lt;br /&gt;
4.3. Be aware of different ways to educate, monitor and control usage of social networking and other web sites.&lt;br /&gt;
&lt;br /&gt;
4.4. Be able to develop policies and applicate methods for children’s use of the computer and the Internet (depending on age and socio-cultural situation). &lt;br /&gt;
&lt;br /&gt;
4.5. Understanding advantages and limitations with protection software&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 5 SYLLABUS - Social networks and safe usage of the Internet ==&lt;br /&gt;
&lt;br /&gt;
New Syllabus version as discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:05 (UTC) - &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5.1. Know how to '''start and finish safe browsing session''' (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing. &lt;br /&gt;
&lt;br /&gt;
5.2. Know about'''advantages, disadvantages and dangers of Internet cookies''' and ActiveX control. Know about tools that ensure safety when browsing the Internet.  &lt;br /&gt;
&lt;br /&gt;
5.3. Be able to manage: temporary Internet files, browser history, passwords, cookies and autocomplete data. &lt;br /&gt;
&lt;br /&gt;
5.4. Be able to safely '''connect to e-Services and secure environments'''– connecting and using, recover lost passwords.&lt;br /&gt;
&lt;br /&gt;
5.5. Know when and in which cases personal '''information can be published on the Internet''' (i.e. status publishing about leaving home).&lt;br /&gt;
&lt;br /&gt;
5.6. Know who you should contact if you discovered inappropriate information about you or your related digital identities.&lt;br /&gt;
&lt;br /&gt;
5.7. Understand that it is necessary to exercise critical thinking about content and identities on the internet. (i.e. blogs, Wikipedia, social networks, forums, etc). #reformulated by --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:22 (UTC)&lt;br /&gt;
&lt;br /&gt;
5.8. Understand 'threats of inappropriate content for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on) &lt;br /&gt;
&lt;br /&gt;
5.9. Understand what an online social network is, what are opportunities and risks of social network. Age groups of using social networks. Options and parameters for information disclosure. Understand what is the fascination to disclose private information on the internet&lt;br /&gt;
&lt;br /&gt;
5.10. Know different '''social network types''' (Friendship-driven and Interest-driven) and be able to use them harmless and safe (appropriate account privacy settings). &lt;br /&gt;
&lt;br /&gt;
5.11. Know what type of information recommended to be published on social network, be responsible for published content, and know impacts &lt;br /&gt;
&lt;br /&gt;
5.12. Understand that online socializing reflects &amp;quot;real life&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
5.13. Be able to send/receive e-mail securely: know how to reject email from specific email addresses. Know how to treat email messages from unknown senders, classified as spam and email messages infected with malware. Know about scam, hoax, chain letters.&lt;br /&gt;
&lt;br /&gt;
5.14. Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information, etc.&lt;br /&gt;
&lt;br /&gt;
5.15. Understand threats of online communication: virtual dating, bullying, commenting. &lt;br /&gt;
&lt;br /&gt;
5.16. Understand dependency and addiction to the Internet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Another Mind mapping=&lt;br /&gt;
&lt;br /&gt;
[[Fichier:notions-and-concepts.png|1100px|]]&lt;br /&gt;
&lt;br /&gt;
You can access to the dynamic mapp here [http://www.mindomo.com/edit.htm?m=64bf626021b940d99dd9576283c833bf notions and concepts]&lt;br /&gt;
&lt;br /&gt;
[[Proposition]]&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4844</id>
		<title>Syllabus e-safety</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4844"/>
				<updated>2011-06-20T08:19:22Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''e-GUARDIAN - Syllabus V.2.x&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
== Introduction : aims &amp;amp; resources ==&lt;br /&gt;
&lt;br /&gt;
=== Criteria, which are important by developing e-GUARDIAN questions ===&lt;br /&gt;
&lt;br /&gt;
•There should be two types of questions:&lt;br /&gt;
&lt;br /&gt;
 • question with four answers, of which one is correct,&lt;br /&gt;
 • question with image (hotspot questions), where answer could be marked in the picture.&lt;br /&gt;
&lt;br /&gt;
•It is important to create four questions for each syllabus item&lt;br /&gt;
&lt;br /&gt;
•It is advisable to create equal length answers (for example, if there would be three long answers and one short, which is correct, test taker could have a clue about correct answer)&lt;br /&gt;
&lt;br /&gt;
•It is advisable not to use specific software in the questions (exceptions may be possible, the information about this software must be in the educational material).&lt;br /&gt;
&lt;br /&gt;
--[[Utilisateur:Donarena|Renata (Lithuania Team)]] 20 juin 2011 à 07:47 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== Aims ===&lt;br /&gt;
&lt;br /&gt;
This wiki page aims at facilitating a collaborative synergic process for defining the syllabus on netsafety of the EU LdV e-Guardian project.&lt;br /&gt;
Participants are delegates of partner's institutions from Lithuania, Latvia, Germany and Switzerland.&lt;br /&gt;
&lt;br /&gt;
The resources are : &lt;br /&gt;
&lt;br /&gt;
=== A web-based social bookmarking working group === &lt;br /&gt;
on [http://groups.diigo.com/group/e_safety here on Diigo],  we can post all related useful information on netsafety, such as : &lt;br /&gt;
&lt;br /&gt;
- definition of key-words&lt;br /&gt;
&lt;br /&gt;
- examples of quizz, pedagogical scenarios and other pedagogical resources&lt;br /&gt;
&lt;br /&gt;
- related scientific articles &lt;br /&gt;
&lt;br /&gt;
- other relevant initiatives&lt;br /&gt;
&lt;br /&gt;
=== Guidelines for the syllabus === &lt;br /&gt;
They wwere provided by the project's team coordinated by the LIA organisation, and specially the syllabus workpackage leader, ecdl.lt, represented by Eugenijus Telesius and his team composed of Renata Danieliene &amp;amp; Tomas Lygutas, which is complemented by partner's delegate Algimantas Merkys (LIA, the coordinator's team), Dennis Krannich (Bremen Univbersity), Théo Bondolfi &amp;amp; Rémi Lévy (APTES Switzerland). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
These guidelines are : &lt;br /&gt;
&lt;br /&gt;
1. Focus on [[e-safety]] [[offline]] as well as [[online]], therefore always taking into account basic needs (such as password storage) as well as complex needs (such as behaviour in [[web2]] environments).&lt;br /&gt;
&lt;br /&gt;
2. Taking into account all key-points in this initial version, and considering these key-point as &amp;quot;objects&amp;quot; whcih can be replaced in other forms but which must stay available.&lt;br /&gt;
&lt;br /&gt;
3. respecting the steps of user point of view (example : 1 start computer, 2 launch application...)&lt;br /&gt;
&lt;br /&gt;
4. restructuring with categories and sets like in the policies of ECDL [http://www.ecdl.org/programmes/media/ECDL_ICDL_Module_12_-_Syllabus_-_V1.0.pdf]&lt;br /&gt;
&lt;br /&gt;
5. keeping as much as possible the existing phrases and formulations, only changing (merging, repositioning, pionderating) when it suits the next step of test/scenarios&lt;br /&gt;
&lt;br /&gt;
6. Keeping in mind the final intention of '''equity between risks &amp;amp; opportunities''' proposing positive practices (opportunities, in an educative perspective) and preventing bad practices (risks, which creates fear), based on the vision of the slide 10 of [http://www.slideshare.net/Bernajean/ne-3440462 this presentation of Anne Collier], which says that netsafety3.0 should be : &lt;br /&gt;
&lt;br /&gt;
- research-based, not fearbased, therefore relevant&lt;br /&gt;
&lt;br /&gt;
- flexible &amp;amp; layered, instead of &amp;quot;one-size-fits-all&amp;quot;&lt;br /&gt;
&lt;br /&gt;
- respectful of learning culture : stakeholders in positive experience, not just potential victims&lt;br /&gt;
&lt;br /&gt;
- positive, empowering : not just safety from, but safety for...&lt;br /&gt;
&lt;br /&gt;
- full, constructive engagement in participatory society (that's the context of the construction of this syllabus)&lt;br /&gt;
&lt;br /&gt;
=== Mind mapping for the key-notions of the syllabus ===&lt;br /&gt;
&lt;br /&gt;
In addition, Rémi Levy from APTES has produced a [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea mind mapping image] to represent all the notions for the e-safety syllabus. You can access to [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea the interactive map] - You can modify it directly because we keep a copy of the precedent contribution.&lt;br /&gt;
&lt;br /&gt;
== Other possible structure of the syllabus - A.P.T.E.S proposition ==&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Proposition access to the page]&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 1 SYLLABUS - Basic knowledge on e-safety ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;NOTICE IT IS BETTER IF COMMENTS AND DISCUSSIONS ARE MADE ON THE DISCUSSION PAGE &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:28 (UTC)&lt;br /&gt;
&lt;br /&gt;
1.1. Understand the differences of information [[contents]] (open, private, business, etc.).&lt;br /&gt;
&lt;br /&gt;
1.2. Be aware of '''[[privacy protection]] legal act''' (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies, etc)&lt;br /&gt;
&lt;br /&gt;
1.3. Know about '''[[equity between opportunities &amp;amp; risks]]''' of [[web2]]&lt;br /&gt;
&lt;br /&gt;
1.4. Understand the notion of '''[[identity]]'''. &lt;br /&gt;
&lt;br /&gt;
1.5. Be aware of '''different identity for authorization theft methods''' (skimming, pretexting, shoulder surfing, information diving).&lt;br /&gt;
&lt;br /&gt;
1.6. Know about '''[[social engineering]]''' and it’s methods. &lt;br /&gt;
&lt;br /&gt;
1.7. Be aware of cyber crime, online predators, financial scams, harm and who to contact if discovered illegal data.&lt;br /&gt;
&lt;br /&gt;
1.8. Understand computer infection threats (viruses, Trojan horses, spyware, dishonest adware, etc.). Know when and how malicious software can get into computer system.&lt;br /&gt;
&lt;br /&gt;
1.9. Know about organizational [[security]]: school security, usage of school web pages, content publishing, access, etc. &lt;br /&gt;
&lt;br /&gt;
1.10. Know about '''[[netiquette]] and other basic codes''' of conducts in the cyberspace (RFC 1855)&lt;br /&gt;
&lt;br /&gt;
1.11. Understand what is [[Online Safety 3.0]] and why [[digital citizenship]] is protective and is the best filter ever : pre-installed, free of charge, improve with use...&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 2 SYLLABUS - Privacy and data management ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June &amp;lt;/span&amp;gt; --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:35 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2.1. [[Distinguish between data and information]].&lt;br /&gt;
&lt;br /&gt;
2.2. Understand the opportunities and risks of digital '''[[data management]]''' from fully collaborative to full privacy. &lt;br /&gt;
&lt;br /&gt;
2.3. Know about multi-layer '''[[password]]''', changing and keeping password policies. &lt;br /&gt;
&lt;br /&gt;
2.4. Know about '''safe computer [[login]] methods''' &lt;br /&gt;
&lt;br /&gt;
2.5. Know multiple user accounts on various digital environments. Understand the meaning and importance of access rights (what a personal user account is and how data of different users is separated). &lt;br /&gt;
&lt;br /&gt;
2.6. Be aware of '''data encryption''', decryption and password protected files. &lt;br /&gt;
&lt;br /&gt;
2.7. Understand what [[intellectual property]] on Internet is. &lt;br /&gt;
&lt;br /&gt;
2.8. Understand the benefits and purpose of data '''backups''' and be able to restore lost data.&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 3 SYLLABUS - Security tools and network security ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:24 (UTC)&lt;br /&gt;
&lt;br /&gt;
3.1. Know computer '''network types''' (local area network (LAN), wide area network (WAN), virtual private network (VPN)) and why protection is needed. &lt;br /&gt;
&lt;br /&gt;
3.2. Know different network '''connection methods''' (Cable, Wireless, Mobile networks). &lt;br /&gt;
&lt;br /&gt;
3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network. &lt;br /&gt;
&lt;br /&gt;
3.4. '''Sharing and accessing resources''' over network (Files, Printer, Desktop). &lt;br /&gt;
&lt;br /&gt;
3.5. Understand safety means of computer networks (Firewall, Antivirus, Anti-spyware, Spam blocker Password protection, Connection encryption – wireless). &lt;br /&gt;
&lt;br /&gt;
3.6. Be able to use standard OS integrated protection tools. &lt;br /&gt;
&lt;br /&gt;
3.7. Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.). Distinguish different modes of antivirus protection (active, passive).&lt;br /&gt;
&lt;br /&gt;
3.8. Know what has to be done and in what order, if you suspect that computer system is infected. Distinguish infected files deletion, quarantining and curing.&lt;br /&gt;
&lt;br /&gt;
3.9. Know how to '''follow, download and use updates for your operating system''', software and importance of antivirus definition files. Understand the benefits of these updates.&lt;br /&gt;
&lt;br /&gt;
3.10. Informal and formal periodic [[external checkup]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 4 SYLLABUS - Minors and newcomers on the net == &lt;br /&gt;
&lt;br /&gt;
New Syllabus version discussed on Thursday 16th June - --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:53 (UTC)&lt;br /&gt;
&lt;br /&gt;
4.1. Understand the impact of communication with minors and new users about safety in IT World.&lt;br /&gt;
&lt;br /&gt;
4.2 Understand the purpose of monitoring, filtering and controlling tools for safer internet use of minors&lt;br /&gt;
&lt;br /&gt;
4.3. Be aware of different ways to educate, monitor and control usage of social networking and other web sites.&lt;br /&gt;
&lt;br /&gt;
4.4. Be able to develop policies and applicate methods for children’s use of the computer and the Internet (depending on age and socio-cultural situation). &lt;br /&gt;
&lt;br /&gt;
4.5. Understanding advantages and limitations with protection software&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 5 SYLLABUS - Social networks and safe usage of the Internet ==&lt;br /&gt;
&lt;br /&gt;
New Syllabus version as discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:05 (UTC) - &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5.1. Know how to '''start and finish safe browsing session''' (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing. &lt;br /&gt;
&lt;br /&gt;
5.2. Know about'''advantages, disadvantages and dangers of Internet cookies''' and ActiveX control. Know about tools that ensure safety when browsing the Internet.  &lt;br /&gt;
&lt;br /&gt;
5.3. Be able to manage: temporary Internet files, browser history, passwords, cookies and autocomplete data. &lt;br /&gt;
&lt;br /&gt;
5.4. Be able to safely '''connect to e-Services and secure environments'''– connecting and using, recover lost passwords.&lt;br /&gt;
&lt;br /&gt;
5.5. Know when and in which cases personal '''information can be published on the Internet''' (i.e. status publishing about leaving home).&lt;br /&gt;
&lt;br /&gt;
5.6. Know who you should contact if you discovered inappropriate information about you or your related digital identities.&lt;br /&gt;
&lt;br /&gt;
5.7. Understand that it is necessary to exercise critical thinking about content and identities on the internet. (i.e. blogs, Wikipedia, social networks, forums, etc). #reformulated by --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:22 (UTC)&lt;br /&gt;
&lt;br /&gt;
5.8. Understand 'threats of inappropriate content for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on) &lt;br /&gt;
&lt;br /&gt;
5.9. Understand what an online social network is, what are opportunities and risks of social network. Age groups of using social networks. Options and parameters for information disclosure. Understand what is the fascination to disclose private information on the internet&lt;br /&gt;
&lt;br /&gt;
5.10. Know different '''social network types''' (Friendship-driven and Interest-driven) and be able to use them harmless and safe (appropriate account privacy settings). &lt;br /&gt;
&lt;br /&gt;
5.11. Know what type of information recommended to be published on social network, be responsible for published content, and know impacts &lt;br /&gt;
&lt;br /&gt;
5.12. Understand that online socializing reflects &amp;quot;real life&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
5.13. Be able to send/receive e-mail securely: know how to reject email from specific email addresses. Know how to treat email messages from unknown senders, classified as spam and email messages infected with malware. Know about scam, hoax, chain letters.&lt;br /&gt;
&lt;br /&gt;
5.14. Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information, etc.&lt;br /&gt;
&lt;br /&gt;
5.15. Understand threats of online communication: virtual dating, bullying, commenting. &lt;br /&gt;
&lt;br /&gt;
5.16. Understand dependency and addiction to the Internet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Another Mind mapping=&lt;br /&gt;
&lt;br /&gt;
[[Fichier:notions-and-concepts.png|1100px|]]&lt;br /&gt;
&lt;br /&gt;
You can access to the dynamic mapp here [http://www.mindomo.com/edit.htm?m=64bf626021b940d99dd9576283c833bf notions and concepts]&lt;br /&gt;
&lt;br /&gt;
[[Proposition]]&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Discussion:Syllabus_e-safety&amp;diff=4837</id>
		<title>Discussion:Syllabus e-safety</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Discussion:Syllabus_e-safety&amp;diff=4837"/>
				<updated>2011-06-17T09:36:07Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Discussions'''&lt;br /&gt;
&lt;br /&gt;
Here is the place to make comments on the Syllabus. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Todo list =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- Focus map&lt;br /&gt;
&lt;br /&gt;
- Define number of chapters&lt;br /&gt;
&lt;br /&gt;
- Organise Items and Notions&lt;br /&gt;
&lt;br /&gt;
- Find Quiz&lt;br /&gt;
&lt;br /&gt;
- Discuss about chapter 4 --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 09:04 (UTC)&lt;br /&gt;
&lt;br /&gt;
- Give the rights on Mindomo --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 09:18 (UTC)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= General considerations =&lt;br /&gt;
&lt;br /&gt;
- One should avoid the term ''virtual'' since it deludes into thinking that things are not real. ''Electronic'' or ''online'' should be preferred&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Discussed on Thursday 16th skype meeting== &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[16/06/2011 11:04:49] Antje Moebus :  Internet use of minors - Risks and opportunities - Recommendations for peadagogues, educators and parents&lt;br /&gt;
&lt;br /&gt;
4.1 Understand the impact of communication with minors about safety in IT world 4.2 Be able to develop policies and applicate methods for minor´s use of the computer and the internet ( depending on age and on the responsibility for the minor ( school, public institution, family) 4.3 Understand the purpose of monitoring, filtering and controlling tools for safer internet use of minors 4.4 Understanding advantages and limitations with protection software&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[16/06/2011 10:53:12] Algis M.: how computer user could switch on/off integrated protection? it is administrator's job&lt;br /&gt;
teachers are not pc administrators, teacher must know the fact but not technics&lt;br /&gt;
&lt;br /&gt;
[16/06/2011 11:17:59] Algis M.: 4.3. Be aware of different ways to control usage of social networking and other web sites.  &amp;quot;block&amp;quot; -&amp;gt; &amp;quot;control&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[16/06/2011 11:28:52] Algis M.: In my oppinion, it is not necessary to make Chapter 5 such particular.  Every knowledge in details could be put in Syllabus Guide that have to be prepared later. It is no need to include everything in the Syllabus, - it’s enough topics be more common or connected together.&lt;br /&gt;
&lt;br /&gt;
=About Items=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Other contributions==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- Understand what are the good conditions for using online medias at home: computer in a common area (not in the child's room), clear time and circumstances for using it, having a parental filter installed and properly configured, a grown-up person at hand...&lt;br /&gt;
&lt;br /&gt;
- Understand that it is best to have a person of contact (can be a relative, an educator or a teacher) for online medias concerns (offending contents, technical issues...)&lt;br /&gt;
&lt;br /&gt;
- Be able to evaluate resources on Internet (source, references, date, obious and hidden motivations, style, orthographic correctness, reputation...)&lt;br /&gt;
&lt;br /&gt;
- Knowing how to behave and use the implicit and explicit code of conducts of each media (1- search explicit ones, 2- observe if they are respected and how 3- participate appropriately when appropriate)&lt;br /&gt;
&lt;br /&gt;
- Be aware of private e-mail address publication and alternatives (contact forms, social network or forums &amp;quot;direct messages&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Chapter 1 - Basic knowledge on e-safety===&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Syllabus_e-safety#Basic_knowledge_on_e-safety see the chapter]&lt;br /&gt;
&lt;br /&gt;
1.1. History : from static '''web1 to''' dynamic '''web2''' environments &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --''(What are those web1, web2 and web3 environments? Is it necessary? &amp;lt;/span&amp;gt;[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 14:58 (UTC))''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.2. Intention : '''[[web3]]''' proposing constructive engagement in participatory society (or : [[security]] through light instead of old model of [[security]] through obscurity), &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;  --''(same here - we actually do not understand what is it about&amp;lt;/span&amp;gt;[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:11 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
here is a reference about obscurity: http://en.wikipedia.org/wiki/Security_through_obscurity&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.3. Know about '''equity between opportunities &amp;amp; risks''' since [[web2]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --''(if speaking about opportunities &amp;amp; risks it should be clarified - do we mean Internet? if so - it should be mentioned.[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:11 (UTC))'' &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.4. Know about '''[[netiquette]] and other basic codes''' of conducts in the cyberspace (RFC 1855) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --''(what do you mean by &amp;quot;basic codes&amp;quot;?[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:11 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.5. Know about '''[[social engineering]]''' and it’s methods, including participative culture and abuses if you don't understand/respect them, for example having your password stolen (to be reformulated) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --'')what is &amp;quot;participative culture and abuses&amp;quot;? We think that it is already included in the definition of social engineerging. We recommend to stick to version &amp;quot;Know about '''[[social engineering]]''' and it’s methods&amp;quot;.[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:23 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.6. Understand the differences of '''[[contents]]''' (functional, factual, creative) of information (I don't understand this item --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 07:51 (UTC) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --''(needs to be clarified with Theo. This item could be moved to syllabus chapter 2 - after 2.0. [[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:31 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.7. Understand the differences of '''[[formats]]''' (open, privative) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --''(there is no such word &amp;quot;privative&amp;quot;. We recommend &amp;quot;Understand the differences of data formats (open, private, business, etc.)&amp;quot; This item could be moved to syllabus chapter 2 - after 2.0. [[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:36 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.8. Understand the notion of '''[[identity]]''' &lt;br /&gt;
&lt;br /&gt;
maybe to be repositioned in some other chapter --[[Utilisateur:Remilevy|Rémi LEVY]] 9 juin 2011 à 19:49 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.9.  '''[[eTools]]''' : Product versus function &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Should be clarified--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:48 (UTC) )''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.10. Be aware of '''different identity for authorization theft methods''' (skimming, pretexting, shoulder surfing, information diving…) &lt;br /&gt;
&lt;br /&gt;
#must be repositioned into the scam/hoax (chapter 5 or 6) ?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''( We recommend to leave in this chapter--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:00 (UTC) )''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.11. Be aware of '''[[privacy protection]] legal act''' (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies and so on).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.12. '''Organizational [[security]]''' (school security) – or [[social engineering]]?, usage of school web pages, content publishing, access &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''( social engineering is already mentioned in 1.5. We recommend &amp;quot;Know about '''Organizational [[security]]''': school security, usage of school web pages, content publishing, access, etc.&amp;quot;--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:56 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Privacy and data management===&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Syllabus_e-safety#Privacy_and_data_management see the chapter]&lt;br /&gt;
&lt;br /&gt;
I suggest : to begin with &amp;quot;Distinguish between data and information&amp;quot; --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 07:49 (UTC)&lt;br /&gt;
&lt;br /&gt;
(...)&lt;br /&gt;
&lt;br /&gt;
2.7. Understand what '''[[intellectual property]]''' on Internet is and be aware of [[privacy protection]] legal act. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Privacy protection legal act is already mentioned in 1.11. Lets make this one only &amp;quot;Understand what '''[[intellectual property]]''' on Internet is.&amp;quot;--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:11 (UTC) )''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
(...)&lt;br /&gt;
&lt;br /&gt;
2.9. '''Privacy Management''' : Know how to '''start and finish safe browsing session''' (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing.&lt;br /&gt;
&lt;br /&gt;
# 2.9 to 2.11 to me merged ? --[[Utilisateur:Remilevy|Rémi LEVY]] 10 juin 2011 à 07:49 (UTC)&lt;br /&gt;
&lt;br /&gt;
: 2.10. Know how to browse the Web securable. Know about advantages, disadvantages and dangers of Internet '''cookies'''. Know about tools that ensure safety when browsing the Internet (blocking of cookies, ActiveX control, etc.)&lt;br /&gt;
&lt;br /&gt;
: 2.11. [#Privacy-RL] Be able to manage, clear temporary Internet files, browser history, passwords, cookies, and autocomplete data.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(2.9 , 2.10 , 2.11 may be consolidated and must be moved to chapter 5 --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:17 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
: ''As it is technical, I don't see why to put this on chapter 5 which is more about behaviour in social network''--[[Utilisateur:Remilevy|Rémi LEVY]] 10 juin 2011 à 07:53 (UTC)&lt;br /&gt;
&lt;br /&gt;
===Security tools and network security===&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Syllabus_e-safety#Security_tools_and_network_security see the chapter]&lt;br /&gt;
&lt;br /&gt;
see how integrate from 3.5 to 2.11 --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 07:52 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3.1. Know computer '''network types''' , &lt;br /&gt;
&lt;br /&gt;
''&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;(local area network (LAN), wide area network (WAN), virtual private network (VPN))&amp;lt;/span&amp;gt; ''and why protection is needed.--[[Utilisateur:Donarena|Renata (Lithuania Team)]] 8 juin 2011 à 16:19 (UTC)&lt;br /&gt;
&lt;br /&gt;
3.2. Know different network '''connection methods''' (Mobile networks, Wireless, Cable).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network.&amp;lt;/span&amp;gt;--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:30 (UTC)&lt;br /&gt;
&lt;br /&gt;
3.3. '''Sharing and accessing resources''' over network (Files, Printer, Screen).&lt;br /&gt;
&lt;br /&gt;
3.4. Understand '''safety means of computer networks''' (Firewall, Antivirus, Password protection, Connection encryption – wireless). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Firewall, Antivirus, Password protection, Connection encryption are all already mentioned in other items and fit there by content and integrity better. We recommend to cross this 3.4. out at all)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:36 (UTC)''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
3.5. Be able to use standard '''OS integrated protection tools'''. &lt;br /&gt;
&lt;br /&gt;
3.6. [[#see how integrate 3.5 to 2.11 : &amp;quot;'''All about  [[malware]] and intrusion protection tools'''&amp;quot; - RL]] Know what a quality anti-virus, anti-spyware, spam blocker, and personal [[firewall]] is and how to use it. (Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.), know that it is unsafe to turn [[antivirus]] software off and know consequences). Distinguish different modes of antivirus protection (active, passive…).&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.7.[#Updating operating system- RL]. Know how to follow, download and use updates for your operating system, software and importance of antivirus definition files. Understand the benefits of these updates. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.8. Distinguish different modes of antivirus protection (active, passive…).[# see also 3.6]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.9. Know what has to be done and in what order, if you suspect that computer system is infected. &lt;br /&gt;
&lt;br /&gt;
: 3.10. Distinguish infected files deletion, quarantining and curing. &lt;br /&gt;
&lt;br /&gt;
: 3.11. Informal and formal periodic external checkup. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(what do you mean by &amp;quot;checkup&amp;quot;)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:30 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Children, newcomers in schools and workplaces : means of safe use for socio-digital inclusion===&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Syllabus_e-safety#Children.2C_newcomers_in_schools_and_workplaces_:_means_of_safe_use_for_socio-digital_inclusion see the chapter]&lt;br /&gt;
&lt;br /&gt;
Have discussion.....--[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 09:05 (UTC)&lt;br /&gt;
&lt;br /&gt;
to discuss new topic :&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(what is a socio-digital inclusion? Maybe we can shorten this chapter name to &amp;quot;Children, newcomers in schools and workplaces&amp;quot;?--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:49 (UTC) )''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4.1. Understand '''the impact of communication''' with new users '''about safety''' in IT World, &lt;br /&gt;
&lt;br /&gt;
4.2. Policy : Be able to '''develop policies and applicate methods''' for children’s use of the computer and the Internet (depending on age and socio-cultural situation) &lt;br /&gt;
&lt;br /&gt;
4.3. Understand the purpose of '''monitoring, filtering and controlling tools''' against children computer usage and web browsing.&lt;br /&gt;
&lt;br /&gt;
4.4. Understanding '''advantages and limitations with protection software'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Need more items in this chapter. After consolidation in Latvia this chapter has become even shorter than it was. And it was already short :). Maybe we can try to expand again to look more like the previous version, but less stick to children, as you mentioned in Latvia)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:49 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter 5 ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
5.1. Know when and in which cases '''personal information''' can be published on the Internet, i.e. status publishing about leaving home,.&lt;br /&gt;
&lt;br /&gt;
5.2. Understand what a social network is, what are '''opportunities and risks of social network'''. Age groups of using social networks. Options and parameters for information disclosure. Understand that it is not safe to disclose information about user accounts, passwords and so on.&lt;br /&gt;
&lt;br /&gt;
5.3. Know different '''social network types''' and be able to use them harmless and safe (appropriate '''account privacy settings''').&lt;br /&gt;
&lt;br /&gt;
5.4. ('''Publishing content''')Know what type of information recommended to be published on social network, be responsible for published content, know impacts &lt;br /&gt;
&lt;br /&gt;
5.5. Be able to safely '''connect to e-Services and secure environments'''– connecting and using, recover lost passwords. &lt;br /&gt;
&lt;br /&gt;
5.6. (Emails)Be able to '''send/receive e-mail securely'''. Know how to reject email from specific email addresses. Know how to treat email messages from unknown senders&lt;br /&gt;
&lt;br /&gt;
5.7. (Spam and malware) Be able (understand) to use '''network resource controlling software and hardware'''. Know about email that is classified as spam, and email messages infected with malware. &lt;br /&gt;
&lt;br /&gt;
5.8. Be aware of network resource controlling software and hardware. Know how to reject email from specific email addresses.Know about scam, hoax, chain letters...[5.7 &amp;amp; 5.8 to be merged - RL]&lt;br /&gt;
&lt;br /&gt;
5.9. Understand threats of '''virtual communication''': virtual dating, bullying, commenting, &lt;br /&gt;
&lt;br /&gt;
5.10. '''Dependency and addiction to the Internet'''. [# to be develop - TL]&lt;br /&gt;
&lt;br /&gt;
5.11. Understand ''''threats of inappropriate content''' for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on)&lt;br /&gt;
&lt;br /&gt;
5.12. '''Reliability of information''' (Understand that it is not safe to disclose information about user accounts, passwords and so on. can not fully trust content and identities on the internet. (i.e. blogs, Wikipedia, etc).&lt;br /&gt;
&lt;br /&gt;
5.13. '''Reputation management'''. Know who you should contact if you discovered inappropriate information about you or your related digital identities. .&lt;br /&gt;
&lt;br /&gt;
5.14. '''Abuse management''', cyber bullying, cyber-mobbing, when is it possible to remove, when to put additional correct information.&lt;br /&gt;
&lt;br /&gt;
5.15. Understand that online socializing reflects &amp;quot;real life&amp;quot;&lt;br /&gt;
&lt;br /&gt;
5.16. Know about the 2 types of [[social networking]] : [[Friendship-driven]] and [[Interest-driven]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Social networks types are already mentioned in 5.3. &lt;br /&gt;
&lt;br /&gt;
Maybe it can be consolidated or is it different at all?)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 17:03 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
5.17. Understand what is [[Online Safety 3.0]] : research-based, Flexible, layered, Respectful, Positive, empowering, contextual....&lt;br /&gt;
&lt;br /&gt;
5.18. Know reputation and legal safety&lt;br /&gt;
&lt;br /&gt;
5.19. Know about identity, property and community safety&lt;br /&gt;
&lt;br /&gt;
5.20. Understand why [[digital citizenship]] is protective and is the best filter ever : pre-installed, free of charge, improve with use...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(In previous version before Latvia meeting there were items:&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information and etc.&amp;lt;br&amp;gt; &lt;br /&gt;
Know about social viruses, chain letters.&amp;lt;br&amp;gt; &lt;br /&gt;
Know threats of virtual communication (social networks, IM, e-mail and ect.): virtual dating, bullying, commenting, and dependence on the Internet.&amp;lt;br&amp;gt; &lt;br /&gt;
We could consolidate those, but we think that safe IM and social threats are important too and should be included)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:56 (UTC)''&amp;lt;/span&amp;gt;&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Discussion:Syllabus_e-safety&amp;diff=4836</id>
		<title>Discussion:Syllabus e-safety</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Discussion:Syllabus_e-safety&amp;diff=4836"/>
				<updated>2011-06-17T09:26:53Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : /* Discussed on Thursday 16th skype meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Discussions'''&lt;br /&gt;
&lt;br /&gt;
Here is the place to make comments on the Syllabus. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Todo list =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- Focus map&lt;br /&gt;
&lt;br /&gt;
- Define number of chapters&lt;br /&gt;
&lt;br /&gt;
- Organise Items and Notions&lt;br /&gt;
&lt;br /&gt;
- Find Quiz&lt;br /&gt;
&lt;br /&gt;
- Discuss about chapter 4 --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 09:04 (UTC)&lt;br /&gt;
&lt;br /&gt;
- Give the rights on Mindomo --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 09:18 (UTC)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= General considerations =&lt;br /&gt;
&lt;br /&gt;
- One should avoid the term ''virtual'' since it deludes into thinking that things are not real. ''Electronic'' or ''online'' should be preferred&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Discussed on Thursday 16th skype meeting== &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[16/06/2011 11:04:49] Antje Moebus :  Internet use of minors - Risks and opportunities - Recommendations for peadagogues, educators and parents&lt;br /&gt;
&lt;br /&gt;
4.1 Understand the impact of communication with minors about safety in IT world 4.2 Be able to develop policies and applicate methods for minor´s use of the computer and the internet ( depending on age and on the responsibility for the minor ( school, public institution, family) 4.3 Understand the purpose of monitoring, filtering and controlling tools for safer internet use of minors 4.4 Understanding advantages and limitations with protection software&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[16/06/2011 10:53:12] Algis M.: how computer user could switch on/off integrated protection? it is administrator's job&lt;br /&gt;
teachers are not pc administrators, teacher must know the fact but not technics&lt;br /&gt;
&lt;br /&gt;
[16/06/2011 11:17:59] Algis M.: 4.3. Be aware of different ways to control usage of social networking and other web sites.  &amp;quot;block&amp;quot; -&amp;gt; &amp;quot;control&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[16/06/2011 11:28:52] Algis M.: In my oppinion, it is not necessary to make Chapter 5 such particular.  Every knowledge in details could be put in Syllabus Guide that have to be prepared later. It is no need to include everything in the Syllabus, - it’s enough topics be more common or connected together.&lt;br /&gt;
&lt;br /&gt;
=About Items=&lt;br /&gt;
&lt;br /&gt;
===Chapter 1 - Basic knowledge on e-safety===&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Syllabus_e-safety#Basic_knowledge_on_e-safety see the chapter]&lt;br /&gt;
&lt;br /&gt;
1.1. History : from static '''web1 to''' dynamic '''web2''' environments &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --''(What are those web1, web2 and web3 environments? Is it necessary? &amp;lt;/span&amp;gt;[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 14:58 (UTC))''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.2. Intention : '''[[web3]]''' proposing constructive engagement in participatory society (or : [[security]] through light instead of old model of [[security]] through obscurity), &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;  --''(same here - we actually do not understand what is it about&amp;lt;/span&amp;gt;[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:11 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
here is a reference about obscurity: http://en.wikipedia.org/wiki/Security_through_obscurity&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.3. Know about '''equity between opportunities &amp;amp; risks''' since [[web2]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --''(if speaking about opportunities &amp;amp; risks it should be clarified - do we mean Internet? if so - it should be mentioned.[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:11 (UTC))'' &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.4. Know about '''[[netiquette]] and other basic codes''' of conducts in the cyberspace (RFC 1855) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --''(what do you mean by &amp;quot;basic codes&amp;quot;?[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:11 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.5. Know about '''[[social engineering]]''' and it’s methods, including participative culture and abuses if you don't understand/respect them, for example having your password stolen (to be reformulated) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --'')what is &amp;quot;participative culture and abuses&amp;quot;? We think that it is already included in the definition of social engineerging. We recommend to stick to version &amp;quot;Know about '''[[social engineering]]''' and it’s methods&amp;quot;.[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:23 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.6. Understand the differences of '''[[contents]]''' (functional, factual, creative) of information (I don't understand this item --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 07:51 (UTC) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --''(needs to be clarified with Theo. This item could be moved to syllabus chapter 2 - after 2.0. [[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:31 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.7. Understand the differences of '''[[formats]]''' (open, privative) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --''(there is no such word &amp;quot;privative&amp;quot;. We recommend &amp;quot;Understand the differences of data formats (open, private, business, etc.)&amp;quot; This item could be moved to syllabus chapter 2 - after 2.0. [[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:36 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.8. Understand the notion of '''[[identity]]''' &lt;br /&gt;
&lt;br /&gt;
maybe to be repositioned in some other chapter --[[Utilisateur:Remilevy|Rémi LEVY]] 9 juin 2011 à 19:49 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.9.  '''[[eTools]]''' : Product versus function &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Should be clarified--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:48 (UTC) )''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.10. Be aware of '''different identity for authorization theft methods''' (skimming, pretexting, shoulder surfing, information diving…) &lt;br /&gt;
&lt;br /&gt;
#must be repositioned into the scam/hoax (chapter 5 or 6) ?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''( We recommend to leave in this chapter--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:00 (UTC) )''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.11. Be aware of '''[[privacy protection]] legal act''' (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies and so on).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.12. '''Organizational [[security]]''' (school security) – or [[social engineering]]?, usage of school web pages, content publishing, access &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''( social engineering is already mentioned in 1.5. We recommend &amp;quot;Know about '''Organizational [[security]]''': school security, usage of school web pages, content publishing, access, etc.&amp;quot;--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:56 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Privacy and data management===&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Syllabus_e-safety#Privacy_and_data_management see the chapter]&lt;br /&gt;
&lt;br /&gt;
I suggest : to begin with &amp;quot;Distinguish between data and information&amp;quot; --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 07:49 (UTC)&lt;br /&gt;
&lt;br /&gt;
(...)&lt;br /&gt;
&lt;br /&gt;
2.7. Understand what '''[[intellectual property]]''' on Internet is and be aware of [[privacy protection]] legal act. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Privacy protection legal act is already mentioned in 1.11. Lets make this one only &amp;quot;Understand what '''[[intellectual property]]''' on Internet is.&amp;quot;--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:11 (UTC) )''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
(...)&lt;br /&gt;
&lt;br /&gt;
2.9. '''Privacy Management''' : Know how to '''start and finish safe browsing session''' (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing.&lt;br /&gt;
&lt;br /&gt;
# 2.9 to 2.11 to me merged ? --[[Utilisateur:Remilevy|Rémi LEVY]] 10 juin 2011 à 07:49 (UTC)&lt;br /&gt;
&lt;br /&gt;
: 2.10. Know how to browse the Web securable. Know about advantages, disadvantages and dangers of Internet '''cookies'''. Know about tools that ensure safety when browsing the Internet (blocking of cookies, ActiveX control, etc.)&lt;br /&gt;
&lt;br /&gt;
: 2.11. [#Privacy-RL] Be able to manage, clear temporary Internet files, browser history, passwords, cookies, and autocomplete data.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(2.9 , 2.10 , 2.11 may be consolidated and must be moved to chapter 5 --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:17 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
: ''As it is technical, I don't see why to put this on chapter 5 which is more about behaviour in social network''--[[Utilisateur:Remilevy|Rémi LEVY]] 10 juin 2011 à 07:53 (UTC)&lt;br /&gt;
&lt;br /&gt;
===Security tools and network security===&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Syllabus_e-safety#Security_tools_and_network_security see the chapter]&lt;br /&gt;
&lt;br /&gt;
see how integrate from 3.5 to 2.11 --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 07:52 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3.1. Know computer '''network types''' , &lt;br /&gt;
&lt;br /&gt;
''&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;(local area network (LAN), wide area network (WAN), virtual private network (VPN))&amp;lt;/span&amp;gt; ''and why protection is needed.--[[Utilisateur:Donarena|Renata (Lithuania Team)]] 8 juin 2011 à 16:19 (UTC)&lt;br /&gt;
&lt;br /&gt;
3.2. Know different network '''connection methods''' (Mobile networks, Wireless, Cable).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network.&amp;lt;/span&amp;gt;--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:30 (UTC)&lt;br /&gt;
&lt;br /&gt;
3.3. '''Sharing and accessing resources''' over network (Files, Printer, Screen).&lt;br /&gt;
&lt;br /&gt;
3.4. Understand '''safety means of computer networks''' (Firewall, Antivirus, Password protection, Connection encryption – wireless). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Firewall, Antivirus, Password protection, Connection encryption are all already mentioned in other items and fit there by content and integrity better. We recommend to cross this 3.4. out at all)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:36 (UTC)''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
3.5. Be able to use standard '''OS integrated protection tools'''. &lt;br /&gt;
&lt;br /&gt;
3.6. [[#see how integrate 3.5 to 2.11 : &amp;quot;'''All about  [[malware]] and intrusion protection tools'''&amp;quot; - RL]] Know what a quality anti-virus, anti-spyware, spam blocker, and personal [[firewall]] is and how to use it. (Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.), know that it is unsafe to turn [[antivirus]] software off and know consequences). Distinguish different modes of antivirus protection (active, passive…).&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.7.[#Updating operating system- RL]. Know how to follow, download and use updates for your operating system, software and importance of antivirus definition files. Understand the benefits of these updates. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.8. Distinguish different modes of antivirus protection (active, passive…).[# see also 3.6]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.9. Know what has to be done and in what order, if you suspect that computer system is infected. &lt;br /&gt;
&lt;br /&gt;
: 3.10. Distinguish infected files deletion, quarantining and curing. &lt;br /&gt;
&lt;br /&gt;
: 3.11. Informal and formal periodic external checkup. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(what do you mean by &amp;quot;checkup&amp;quot;)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:30 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Children, newcomers in schools and workplaces : means of safe use for socio-digital inclusion===&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Syllabus_e-safety#Children.2C_newcomers_in_schools_and_workplaces_:_means_of_safe_use_for_socio-digital_inclusion see the chapter]&lt;br /&gt;
&lt;br /&gt;
Have discussion.....--[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 09:05 (UTC)&lt;br /&gt;
&lt;br /&gt;
to discuss new topic :&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(what is a socio-digital inclusion? Maybe we can shorten this chapter name to &amp;quot;Children, newcomers in schools and workplaces&amp;quot;?--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:49 (UTC) )''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4.1. Understand '''the impact of communication''' with new users '''about safety''' in IT World, &lt;br /&gt;
&lt;br /&gt;
4.2. Policy : Be able to '''develop policies and applicate methods''' for children’s use of the computer and the Internet (depending on age and socio-cultural situation) &lt;br /&gt;
&lt;br /&gt;
4.3. Understand the purpose of '''monitoring, filtering and controlling tools''' against children computer usage and web browsing.&lt;br /&gt;
&lt;br /&gt;
4.4. Understanding '''advantages and limitations with protection software'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Need more items in this chapter. After consolidation in Latvia this chapter has become even shorter than it was. And it was already short :). Maybe we can try to expand again to look more like the previous version, but less stick to children, as you mentioned in Latvia)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:49 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter 5 ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
5.1. Know when and in which cases '''personal information''' can be published on the Internet, i.e. status publishing about leaving home,.&lt;br /&gt;
&lt;br /&gt;
5.2. Understand what a social network is, what are '''opportunities and risks of social network'''. Age groups of using social networks. Options and parameters for information disclosure. Understand that it is not safe to disclose information about user accounts, passwords and so on.&lt;br /&gt;
&lt;br /&gt;
5.3. Know different '''social network types''' and be able to use them harmless and safe (appropriate '''account privacy settings''').&lt;br /&gt;
&lt;br /&gt;
5.4. ('''Publishing content''')Know what type of information recommended to be published on social network, be responsible for published content, know impacts &lt;br /&gt;
&lt;br /&gt;
5.5. Be able to safely '''connect to e-Services and secure environments'''– connecting and using, recover lost passwords. &lt;br /&gt;
&lt;br /&gt;
5.6. (Emails)Be able to '''send/receive e-mail securely'''. Know how to reject email from specific email addresses. Know how to treat email messages from unknown senders&lt;br /&gt;
&lt;br /&gt;
5.7. (Spam and malware) Be able (understand) to use '''network resource controlling software and hardware'''. Know about email that is classified as spam, and email messages infected with malware. &lt;br /&gt;
&lt;br /&gt;
5.8. Be aware of network resource controlling software and hardware. Know how to reject email from specific email addresses.Know about scam, hoax, chain letters...[5.7 &amp;amp; 5.8 to be merged - RL]&lt;br /&gt;
&lt;br /&gt;
5.9. Understand threats of '''virtual communication''': virtual dating, bullying, commenting, &lt;br /&gt;
&lt;br /&gt;
5.10. '''Dependency and addiction to the Internet'''. [# to be develop - TL]&lt;br /&gt;
&lt;br /&gt;
5.11. Understand ''''threats of inappropriate content''' for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on)&lt;br /&gt;
&lt;br /&gt;
5.12. '''Reliability of information''' (Understand that it is not safe to disclose information about user accounts, passwords and so on. can not fully trust content and identities on the internet. (i.e. blogs, Wikipedia, etc).&lt;br /&gt;
&lt;br /&gt;
5.13. '''Reputation management'''. Know who you should contact if you discovered inappropriate information about you or your related digital identities. .&lt;br /&gt;
&lt;br /&gt;
5.14. '''Abuse management''', cyber bullying, cyber-mobbing, when is it possible to remove, when to put additional correct information.&lt;br /&gt;
&lt;br /&gt;
5.15. Understand that online socializing reflects &amp;quot;real life&amp;quot;&lt;br /&gt;
&lt;br /&gt;
5.16. Know about the 2 types of [[social networking]] : [[Friendship-driven]] and [[Interest-driven]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Social networks types are already mentioned in 5.3. &lt;br /&gt;
&lt;br /&gt;
Maybe it can be consolidated or is it different at all?)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 17:03 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
5.17. Understand what is [[Online Safety 3.0]] : research-based, Flexible, layered, Respectful, Positive, empowering, contextual....&lt;br /&gt;
&lt;br /&gt;
5.18. Know reputation and legal safety&lt;br /&gt;
&lt;br /&gt;
5.19. Know about identity, property and community safety&lt;br /&gt;
&lt;br /&gt;
5.20. Understand why [[digital citizenship]] is protective and is the best filter ever : pre-installed, free of charge, improve with use...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(In previous version before Latvia meeting there were items:&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information and etc.&amp;lt;br&amp;gt; &lt;br /&gt;
Know about social viruses, chain letters.&amp;lt;br&amp;gt; &lt;br /&gt;
Know threats of virtual communication (social networks, IM, e-mail and ect.): virtual dating, bullying, commenting, and dependence on the Internet.&amp;lt;br&amp;gt; &lt;br /&gt;
We could consolidate those, but we think that safe IM and social threats are important too and should be included)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:56 (UTC)''&amp;lt;/span&amp;gt;&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4835</id>
		<title>Syllabus e-safety</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4835"/>
				<updated>2011-06-17T09:25:38Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : /* CHAPTER 5 SYLLABUS - Social networks and safe usage of the Internet */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''e-GUARDIAN - Syllabus V.2.x&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
== Introduction : aims &amp;amp; resources ==&lt;br /&gt;
&lt;br /&gt;
=== Aims ===&lt;br /&gt;
This wiki page aims at facilitating a collaborative synergic process for defining the syllabus on netsafety of the EU LdV e-Guardian project.&lt;br /&gt;
Participants are delegates of partner's institutions from Lithuania, Latvia, Germany and Switzerland.&lt;br /&gt;
&lt;br /&gt;
The resources are : &lt;br /&gt;
&lt;br /&gt;
=== A web-based social bookmarking working group === &lt;br /&gt;
on [http://groups.diigo.com/group/e_safety here on Diigo],  we can post all related useful information on netsafety, such as : &lt;br /&gt;
&lt;br /&gt;
- definition of key-words&lt;br /&gt;
&lt;br /&gt;
- examples of quizz, pedagogical scenarios and other pedagogical resources&lt;br /&gt;
&lt;br /&gt;
- related scientific articles &lt;br /&gt;
&lt;br /&gt;
- other relevant initiatives&lt;br /&gt;
&lt;br /&gt;
=== Guidelines for the syllabus === &lt;br /&gt;
They wwere provided by the project's team coordinated by the LIA organisation, and specially the syllabus workpackage leader, ecdl.lt, represented by Eugenijus Telesius and his team composed of Renata Danieliene &amp;amp; Tomas Lygutas, which is complemented by partner's delegate Algimantas Merkys (LIA, the coordinator's team), Dennis Krannich (Bremen Univbersity), Théo Bondolfi &amp;amp; Rémi Lévy (APTES Switzerland). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
These guidelines are : &lt;br /&gt;
&lt;br /&gt;
1. Focus on [[e-safety]] [[offline]] as well as [[online]], therefore always taking into account basic needs (such as password storage) as well as complex needs (such as behaviour in [[web2]] environments).&lt;br /&gt;
&lt;br /&gt;
2. Taking into account all key-points in this initial version, and considering these key-point as &amp;quot;objects&amp;quot; whcih can be replaced in other forms but which must stay available.&lt;br /&gt;
&lt;br /&gt;
3. respecting the steps of user point of view (example : 1 start computer, 2 launch application...)&lt;br /&gt;
&lt;br /&gt;
4. restructuring with categories and sets like in the policies of ECDL [http://www.ecdl.org/programmes/media/ECDL_ICDL_Module_12_-_Syllabus_-_V1.0.pdf]&lt;br /&gt;
&lt;br /&gt;
5. keeping as much as possible the existing phrases and formulations, only changing (merging, repositioning, pionderating) when it suits the next step of test/scenarios&lt;br /&gt;
&lt;br /&gt;
6. Keeping in mind the final intention of '''equity between risks &amp;amp; opportunities''' proposing positive practices (opportunities, in an educative perspective) and preventing bad practices (risks, which creates fear), based on the vision of the slide 10 of [http://www.slideshare.net/Bernajean/ne-3440462 this presentation of Anne Collier], which says that netsafety3.0 should be : &lt;br /&gt;
&lt;br /&gt;
- research-based, not fearbased, therefore relevant&lt;br /&gt;
&lt;br /&gt;
- flexible &amp;amp; layered, instead of &amp;quot;one-size-fits-all&amp;quot;&lt;br /&gt;
&lt;br /&gt;
- respectful of learning culture : stakeholders in positive experience, not just potential victims&lt;br /&gt;
&lt;br /&gt;
- positive, empowering : not just safety from, but safety for...&lt;br /&gt;
&lt;br /&gt;
- full, constructive engagement in participatory society (that's the context of the construction of this syllabus)&lt;br /&gt;
&lt;br /&gt;
=== Mind mapping for the key-notions of the syllabus ===&lt;br /&gt;
&lt;br /&gt;
In addition, Rémi Levy from APTES has produced a [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea mind mapping image] to represent all the notions for the e-safety syllabus. You can access to [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea the interactive map] - You can modify it directly because we keep a copy of the precedent contribution.&lt;br /&gt;
&lt;br /&gt;
== Other possible structure of the syllabus - A.P.T.E.S proposition ==&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Proposition access to the page]&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 1 SYLLABUS - Basic knowledge on e-safety ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;NOTICE IT IS BETTER IF COMMENTS AND DISCUSSIONS ARE MADE ON THE DISCUSSION PAGE &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:28 (UTC)&lt;br /&gt;
&lt;br /&gt;
1.1. Understand the differences of information [[contents]] (open, private, business, etc.).&lt;br /&gt;
&lt;br /&gt;
1.2. Be aware of '''[[privacy protection]] legal act''' (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies, etc)&lt;br /&gt;
&lt;br /&gt;
1.3. Know about '''[[equity between opportunities &amp;amp; risks]]''' of [[web2]]&lt;br /&gt;
&lt;br /&gt;
1.4. Understand the notion of '''[[identity]]'''. &lt;br /&gt;
&lt;br /&gt;
1.5. Be aware of '''different identity for authorization theft methods''' (skimming, pretexting, shoulder surfing, information diving).&lt;br /&gt;
&lt;br /&gt;
1.6. Know about '''[[social engineering]]''' and it’s methods. &lt;br /&gt;
&lt;br /&gt;
1.7. Be aware of cyber crime, online predators, financial scams, harm and who to contact if discovered illegal data.&lt;br /&gt;
&lt;br /&gt;
1.8. Understand computer infection threats (viruses, Trojan horses, spyware, dishonest adware, etc.). Know when and how malicious software can get into computer system.&lt;br /&gt;
&lt;br /&gt;
1.9. Know about organizational [[security]]: school security, usage of school web pages, content publishing, access, etc. &lt;br /&gt;
&lt;br /&gt;
1.10. Know about '''[[netiquette]] and other basic codes''' of conducts in the cyberspace (RFC 1855)&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 2 SYLLABUS - Privacy and data management ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June &amp;lt;/span&amp;gt; --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:35 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2.1. [[Distinguish between data and information]].&lt;br /&gt;
&lt;br /&gt;
2.2. Understand the opportunities and risks of digital '''[[data management]]''' from fully collaborative to full privacy. &lt;br /&gt;
&lt;br /&gt;
2.3. Know about multi-layer '''[[password]]''', changing and keeping password policies. &lt;br /&gt;
&lt;br /&gt;
2.4. Know about '''safe computer [[login]] methods''' &lt;br /&gt;
&lt;br /&gt;
2.5. Know multiple user accounts on various digital environments. Understand the meaning and importance of access rights (what a personal user account is and how data of different users is separated). &lt;br /&gt;
&lt;br /&gt;
2.6. Be aware of '''data encryption''', decryption and password protected files. &lt;br /&gt;
&lt;br /&gt;
2.7. Understand what [[intellectual property]] on Internet is. &lt;br /&gt;
&lt;br /&gt;
2.8. Understand the benefits and purpose of data '''backups''' and be able to restore lost data.&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 3 SYLLABUS - Security tools and network security ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:24 (UTC)&lt;br /&gt;
&lt;br /&gt;
3.1. Know computer '''network types''' (local area network (LAN), wide area network (WAN), virtual private network (VPN)) and why protection is needed. &lt;br /&gt;
&lt;br /&gt;
3.2. Know different network '''connection methods''' (Cable, Wireless, Mobile networks). &lt;br /&gt;
&lt;br /&gt;
3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network. &lt;br /&gt;
&lt;br /&gt;
3.4. '''Sharing and accessing resources''' over network (Files, Printer, Desktop). &lt;br /&gt;
&lt;br /&gt;
3.5. Understand safety means of computer networks (Firewall, Antivirus, Anti-spyware, Spam blocker Password protection, Connection encryption – wireless). &lt;br /&gt;
&lt;br /&gt;
3.6. Be able to use standard OS integrated protection tools. &lt;br /&gt;
&lt;br /&gt;
3.7. Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.). Distinguish different modes of antivirus protection (active, passive).&lt;br /&gt;
&lt;br /&gt;
3.8. Know what has to be done and in what order, if you suspect that computer system is infected. Distinguish infected files deletion, quarantining and curing.&lt;br /&gt;
&lt;br /&gt;
3.9. Know how to '''follow, download and use updates for your operating system''', software and importance of antivirus definition files. Understand the benefits of these updates.&lt;br /&gt;
&lt;br /&gt;
3.10. Informal and formal periodic [[external checkup]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 4 SYLLABUS - Minors and newcomers on the net == &lt;br /&gt;
&lt;br /&gt;
New Syllabus version discussed on Thursday 16th June - --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:53 (UTC)&lt;br /&gt;
&lt;br /&gt;
4.1. Understand the impact of communication with minors and new users about safety in IT World.&lt;br /&gt;
&lt;br /&gt;
4.2 Understand the purpose of monitoring, filtering and controlling tools for safer internet use of minors&lt;br /&gt;
&lt;br /&gt;
4.3. Be aware of different ways to educate, monitor and control usage of social networking and other web sites.&lt;br /&gt;
&lt;br /&gt;
4.4. Be able to develop policies and applicate methods for children’s use of the computer and the Internet (depending on age and socio-cultural situation). &lt;br /&gt;
&lt;br /&gt;
4.5. Understanding advantages and limitations with protection software&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 5 SYLLABUS - Social networks and safe usage of the Internet ==&lt;br /&gt;
&lt;br /&gt;
New Syllabus version as discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:05 (UTC) - &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5.1. Know how to '''start and finish safe browsing session''' (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing. &lt;br /&gt;
&lt;br /&gt;
5.2. Know about'''advantages, disadvantages and dangers of Internet cookies''' and ActiveX control. Know about tools that ensure safety when browsing the Internet.  &lt;br /&gt;
&lt;br /&gt;
5.3. Be able to manage: temporary Internet files, browser history, passwords, cookies and autocomplete data. &lt;br /&gt;
&lt;br /&gt;
5.4. Be able to safely '''connect to e-Services and secure environments'''– connecting and using, recover lost passwords.&lt;br /&gt;
&lt;br /&gt;
5.5. Know when and in which cases personal '''information can be published on the Internet''' (i.e. status publishing about leaving home).&lt;br /&gt;
&lt;br /&gt;
5.6. Know who you should contact if you discovered inappropriate information about you or your related digital identities.&lt;br /&gt;
&lt;br /&gt;
5.7. Understand that it is necessary to exercise critical thinking about content and identities on the internet. (i.e. blogs, Wikipedia, social networks, forums, etc). #reformulated by --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:22 (UTC)&lt;br /&gt;
&lt;br /&gt;
5.8. Understand 'threats of inappropriate content for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on) &lt;br /&gt;
&lt;br /&gt;
5.9. Understand what an online social network is, what are opportunities and risks of social network. Age groups of using social networks. Options and parameters for information disclosure. Understand what is the fascination to disclose private information on the internet&lt;br /&gt;
&lt;br /&gt;
5.10. Know different '''social network types''' (Friendship-driven and Interest-driven) and be able to use them harmless and safe (appropriate account privacy settings). &lt;br /&gt;
&lt;br /&gt;
5.11. Know what type of information recommended to be published on social network, be responsible for published content, and know impacts &lt;br /&gt;
&lt;br /&gt;
5.12. Understand that online socializing reflects &amp;quot;real life&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
5.13. Be able to send/receive e-mail securely: know how to reject email from specific email addresses. Know how to treat email messages from unknown senders, classified as spam and email messages infected with malware. Know about scam, hoax, chain letters.&lt;br /&gt;
&lt;br /&gt;
5.14. Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information, etc.&lt;br /&gt;
&lt;br /&gt;
5.15. Understand threats of online communication: virtual dating, bullying, commenting. &lt;br /&gt;
&lt;br /&gt;
5.16. Understand dependency and addiction to the Internet.&lt;br /&gt;
&lt;br /&gt;
5.17. Understand what is [[Online Safety 3.0]] and why [[digital citizenship]] is protective and is the best filter ever : pre-installed, free of charge, improve with use...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Another Mind mapping=&lt;br /&gt;
&lt;br /&gt;
[[Fichier:notions-and-concepts.png|1100px|]]&lt;br /&gt;
&lt;br /&gt;
You can access to the dynamic mapp here [http://www.mindomo.com/edit.htm?m=64bf626021b940d99dd9576283c833bf notions and concepts]&lt;br /&gt;
&lt;br /&gt;
[[Proposition]]&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4834</id>
		<title>Syllabus e-safety</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4834"/>
				<updated>2011-06-17T09:24:53Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : /* CHAPTER 3 SYLLABUS - Security tools and network security */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''e-GUARDIAN - Syllabus V.2.x&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
== Introduction : aims &amp;amp; resources ==&lt;br /&gt;
&lt;br /&gt;
=== Aims ===&lt;br /&gt;
This wiki page aims at facilitating a collaborative synergic process for defining the syllabus on netsafety of the EU LdV e-Guardian project.&lt;br /&gt;
Participants are delegates of partner's institutions from Lithuania, Latvia, Germany and Switzerland.&lt;br /&gt;
&lt;br /&gt;
The resources are : &lt;br /&gt;
&lt;br /&gt;
=== A web-based social bookmarking working group === &lt;br /&gt;
on [http://groups.diigo.com/group/e_safety here on Diigo],  we can post all related useful information on netsafety, such as : &lt;br /&gt;
&lt;br /&gt;
- definition of key-words&lt;br /&gt;
&lt;br /&gt;
- examples of quizz, pedagogical scenarios and other pedagogical resources&lt;br /&gt;
&lt;br /&gt;
- related scientific articles &lt;br /&gt;
&lt;br /&gt;
- other relevant initiatives&lt;br /&gt;
&lt;br /&gt;
=== Guidelines for the syllabus === &lt;br /&gt;
They wwere provided by the project's team coordinated by the LIA organisation, and specially the syllabus workpackage leader, ecdl.lt, represented by Eugenijus Telesius and his team composed of Renata Danieliene &amp;amp; Tomas Lygutas, which is complemented by partner's delegate Algimantas Merkys (LIA, the coordinator's team), Dennis Krannich (Bremen Univbersity), Théo Bondolfi &amp;amp; Rémi Lévy (APTES Switzerland). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
These guidelines are : &lt;br /&gt;
&lt;br /&gt;
1. Focus on [[e-safety]] [[offline]] as well as [[online]], therefore always taking into account basic needs (such as password storage) as well as complex needs (such as behaviour in [[web2]] environments).&lt;br /&gt;
&lt;br /&gt;
2. Taking into account all key-points in this initial version, and considering these key-point as &amp;quot;objects&amp;quot; whcih can be replaced in other forms but which must stay available.&lt;br /&gt;
&lt;br /&gt;
3. respecting the steps of user point of view (example : 1 start computer, 2 launch application...)&lt;br /&gt;
&lt;br /&gt;
4. restructuring with categories and sets like in the policies of ECDL [http://www.ecdl.org/programmes/media/ECDL_ICDL_Module_12_-_Syllabus_-_V1.0.pdf]&lt;br /&gt;
&lt;br /&gt;
5. keeping as much as possible the existing phrases and formulations, only changing (merging, repositioning, pionderating) when it suits the next step of test/scenarios&lt;br /&gt;
&lt;br /&gt;
6. Keeping in mind the final intention of '''equity between risks &amp;amp; opportunities''' proposing positive practices (opportunities, in an educative perspective) and preventing bad practices (risks, which creates fear), based on the vision of the slide 10 of [http://www.slideshare.net/Bernajean/ne-3440462 this presentation of Anne Collier], which says that netsafety3.0 should be : &lt;br /&gt;
&lt;br /&gt;
- research-based, not fearbased, therefore relevant&lt;br /&gt;
&lt;br /&gt;
- flexible &amp;amp; layered, instead of &amp;quot;one-size-fits-all&amp;quot;&lt;br /&gt;
&lt;br /&gt;
- respectful of learning culture : stakeholders in positive experience, not just potential victims&lt;br /&gt;
&lt;br /&gt;
- positive, empowering : not just safety from, but safety for...&lt;br /&gt;
&lt;br /&gt;
- full, constructive engagement in participatory society (that's the context of the construction of this syllabus)&lt;br /&gt;
&lt;br /&gt;
=== Mind mapping for the key-notions of the syllabus ===&lt;br /&gt;
&lt;br /&gt;
In addition, Rémi Levy from APTES has produced a [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea mind mapping image] to represent all the notions for the e-safety syllabus. You can access to [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea the interactive map] - You can modify it directly because we keep a copy of the precedent contribution.&lt;br /&gt;
&lt;br /&gt;
== Other possible structure of the syllabus - A.P.T.E.S proposition ==&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Proposition access to the page]&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 1 SYLLABUS - Basic knowledge on e-safety ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;NOTICE IT IS BETTER IF COMMENTS AND DISCUSSIONS ARE MADE ON THE DISCUSSION PAGE &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:28 (UTC)&lt;br /&gt;
&lt;br /&gt;
1.1. Understand the differences of information [[contents]] (open, private, business, etc.).&lt;br /&gt;
&lt;br /&gt;
1.2. Be aware of '''[[privacy protection]] legal act''' (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies, etc)&lt;br /&gt;
&lt;br /&gt;
1.3. Know about '''[[equity between opportunities &amp;amp; risks]]''' of [[web2]]&lt;br /&gt;
&lt;br /&gt;
1.4. Understand the notion of '''[[identity]]'''. &lt;br /&gt;
&lt;br /&gt;
1.5. Be aware of '''different identity for authorization theft methods''' (skimming, pretexting, shoulder surfing, information diving).&lt;br /&gt;
&lt;br /&gt;
1.6. Know about '''[[social engineering]]''' and it’s methods. &lt;br /&gt;
&lt;br /&gt;
1.7. Be aware of cyber crime, online predators, financial scams, harm and who to contact if discovered illegal data.&lt;br /&gt;
&lt;br /&gt;
1.8. Understand computer infection threats (viruses, Trojan horses, spyware, dishonest adware, etc.). Know when and how malicious software can get into computer system.&lt;br /&gt;
&lt;br /&gt;
1.9. Know about organizational [[security]]: school security, usage of school web pages, content publishing, access, etc. &lt;br /&gt;
&lt;br /&gt;
1.10. Know about '''[[netiquette]] and other basic codes''' of conducts in the cyberspace (RFC 1855)&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 2 SYLLABUS - Privacy and data management ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June &amp;lt;/span&amp;gt; --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:35 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2.1. [[Distinguish between data and information]].&lt;br /&gt;
&lt;br /&gt;
2.2. Understand the opportunities and risks of digital '''[[data management]]''' from fully collaborative to full privacy. &lt;br /&gt;
&lt;br /&gt;
2.3. Know about multi-layer '''[[password]]''', changing and keeping password policies. &lt;br /&gt;
&lt;br /&gt;
2.4. Know about '''safe computer [[login]] methods''' &lt;br /&gt;
&lt;br /&gt;
2.5. Know multiple user accounts on various digital environments. Understand the meaning and importance of access rights (what a personal user account is and how data of different users is separated). &lt;br /&gt;
&lt;br /&gt;
2.6. Be aware of '''data encryption''', decryption and password protected files. &lt;br /&gt;
&lt;br /&gt;
2.7. Understand what [[intellectual property]] on Internet is. &lt;br /&gt;
&lt;br /&gt;
2.8. Understand the benefits and purpose of data '''backups''' and be able to restore lost data.&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 3 SYLLABUS - Security tools and network security ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:24 (UTC)&lt;br /&gt;
&lt;br /&gt;
3.1. Know computer '''network types''' (local area network (LAN), wide area network (WAN), virtual private network (VPN)) and why protection is needed. &lt;br /&gt;
&lt;br /&gt;
3.2. Know different network '''connection methods''' (Cable, Wireless, Mobile networks). &lt;br /&gt;
&lt;br /&gt;
3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network. &lt;br /&gt;
&lt;br /&gt;
3.4. '''Sharing and accessing resources''' over network (Files, Printer, Desktop). &lt;br /&gt;
&lt;br /&gt;
3.5. Understand safety means of computer networks (Firewall, Antivirus, Anti-spyware, Spam blocker Password protection, Connection encryption – wireless). &lt;br /&gt;
&lt;br /&gt;
3.6. Be able to use standard OS integrated protection tools. &lt;br /&gt;
&lt;br /&gt;
3.7. Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.). Distinguish different modes of antivirus protection (active, passive).&lt;br /&gt;
&lt;br /&gt;
3.8. Know what has to be done and in what order, if you suspect that computer system is infected. Distinguish infected files deletion, quarantining and curing.&lt;br /&gt;
&lt;br /&gt;
3.9. Know how to '''follow, download and use updates for your operating system''', software and importance of antivirus definition files. Understand the benefits of these updates.&lt;br /&gt;
&lt;br /&gt;
3.10. Informal and formal periodic [[external checkup]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 4 SYLLABUS - Minors and newcomers on the net == &lt;br /&gt;
&lt;br /&gt;
New Syllabus version discussed on Thursday 16th June - --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:53 (UTC)&lt;br /&gt;
&lt;br /&gt;
4.1. Understand the impact of communication with minors and new users about safety in IT World.&lt;br /&gt;
&lt;br /&gt;
4.2 Understand the purpose of monitoring, filtering and controlling tools for safer internet use of minors&lt;br /&gt;
&lt;br /&gt;
4.3. Be aware of different ways to educate, monitor and control usage of social networking and other web sites.&lt;br /&gt;
&lt;br /&gt;
4.4. Be able to develop policies and applicate methods for children’s use of the computer and the Internet (depending on age and socio-cultural situation). &lt;br /&gt;
&lt;br /&gt;
4.5. Understanding advantages and limitations with protection software&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 5 SYLLABUS - Social networks and safe usage of the Internet ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;lt;b&amp;gt;We recommend change chapter name to: &amp;quot;CHAPTER 5 SYLLABUS - Social networks and safe virtual communication----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:32 (UTC)&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
New Syllabus version as discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:05 (UTC) - &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5.1. Know how to '''start and finish safe browsing session''' (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing. &lt;br /&gt;
&lt;br /&gt;
5.2. Know about'''advantages, disadvantages and dangers of Internet cookies''' and ActiveX control. Know about tools that ensure safety when browsing the Internet.  &lt;br /&gt;
&lt;br /&gt;
5.3. Be able to manage: temporary Internet files, browser history, passwords, cookies and autocomplete data. &lt;br /&gt;
&lt;br /&gt;
5.4. Be able to safely '''connect to e-Services and secure environments'''– connecting and using, recover lost passwords.&lt;br /&gt;
&lt;br /&gt;
5.5. Know when and in which cases personal '''information can be published on the Internet''' (i.e. status publishing about leaving home).&lt;br /&gt;
&lt;br /&gt;
5.6. Know who you should contact if you discovered inappropriate information about you or your related digital identities.&lt;br /&gt;
&lt;br /&gt;
5.7. Understand that it is necessary to exercise critical thinking about content and identities on the internet. (i.e. blogs, Wikipedia, social networks, forums, etc). #reformulated by --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:22 (UTC)&lt;br /&gt;
&lt;br /&gt;
5.8. Understand 'threats of inappropriate content for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on) &lt;br /&gt;
&lt;br /&gt;
5.9. Understand what an online social network is, what are opportunities and risks of social network. Age groups of using social networks. Options and parameters for information disclosure. Understand what is the fascination to disclose private information on the internet&lt;br /&gt;
&lt;br /&gt;
5.10. Know different '''social network types''' (Friendship-driven and Interest-driven) and be able to use them harmless and safe (appropriate account privacy settings). &lt;br /&gt;
&lt;br /&gt;
5.11. Know what type of information recommended to be published on social network, be responsible for published content, and know impacts &lt;br /&gt;
&lt;br /&gt;
5.12. Understand that online socializing reflects &amp;quot;real life&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
5.13. Be able to send/receive e-mail securely: know how to reject email from specific email addresses. Know how to treat email messages from unknown senders, classified as spam and email messages infected with malware. Know about scam, hoax, chain letters.&lt;br /&gt;
&lt;br /&gt;
5.14. Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information, etc.&lt;br /&gt;
&lt;br /&gt;
5.15. Understand threats of online communication: virtual dating, bullying, commenting. &lt;br /&gt;
&lt;br /&gt;
5.16. Understand dependency and addiction to the Internet.&lt;br /&gt;
&lt;br /&gt;
5.17. Understand what is [[Online Safety 3.0]] and why [[digital citizenship]] is protective and is the best filter ever : pre-installed, free of charge, improve with use...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Another Mind mapping=&lt;br /&gt;
&lt;br /&gt;
[[Fichier:notions-and-concepts.png|1100px|]]&lt;br /&gt;
&lt;br /&gt;
You can access to the dynamic mapp here [http://www.mindomo.com/edit.htm?m=64bf626021b940d99dd9576283c833bf notions and concepts]&lt;br /&gt;
&lt;br /&gt;
[[Proposition]]&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4833</id>
		<title>Syllabus e-safety</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4833"/>
				<updated>2011-06-17T09:24:21Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : /* CHAPTER 1 SYLLABUS - Basic knowledge on e-safety */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''e-GUARDIAN - Syllabus V.2.x&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
== Introduction : aims &amp;amp; resources ==&lt;br /&gt;
&lt;br /&gt;
=== Aims ===&lt;br /&gt;
This wiki page aims at facilitating a collaborative synergic process for defining the syllabus on netsafety of the EU LdV e-Guardian project.&lt;br /&gt;
Participants are delegates of partner's institutions from Lithuania, Latvia, Germany and Switzerland.&lt;br /&gt;
&lt;br /&gt;
The resources are : &lt;br /&gt;
&lt;br /&gt;
=== A web-based social bookmarking working group === &lt;br /&gt;
on [http://groups.diigo.com/group/e_safety here on Diigo],  we can post all related useful information on netsafety, such as : &lt;br /&gt;
&lt;br /&gt;
- definition of key-words&lt;br /&gt;
&lt;br /&gt;
- examples of quizz, pedagogical scenarios and other pedagogical resources&lt;br /&gt;
&lt;br /&gt;
- related scientific articles &lt;br /&gt;
&lt;br /&gt;
- other relevant initiatives&lt;br /&gt;
&lt;br /&gt;
=== Guidelines for the syllabus === &lt;br /&gt;
They wwere provided by the project's team coordinated by the LIA organisation, and specially the syllabus workpackage leader, ecdl.lt, represented by Eugenijus Telesius and his team composed of Renata Danieliene &amp;amp; Tomas Lygutas, which is complemented by partner's delegate Algimantas Merkys (LIA, the coordinator's team), Dennis Krannich (Bremen Univbersity), Théo Bondolfi &amp;amp; Rémi Lévy (APTES Switzerland). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
These guidelines are : &lt;br /&gt;
&lt;br /&gt;
1. Focus on [[e-safety]] [[offline]] as well as [[online]], therefore always taking into account basic needs (such as password storage) as well as complex needs (such as behaviour in [[web2]] environments).&lt;br /&gt;
&lt;br /&gt;
2. Taking into account all key-points in this initial version, and considering these key-point as &amp;quot;objects&amp;quot; whcih can be replaced in other forms but which must stay available.&lt;br /&gt;
&lt;br /&gt;
3. respecting the steps of user point of view (example : 1 start computer, 2 launch application...)&lt;br /&gt;
&lt;br /&gt;
4. restructuring with categories and sets like in the policies of ECDL [http://www.ecdl.org/programmes/media/ECDL_ICDL_Module_12_-_Syllabus_-_V1.0.pdf]&lt;br /&gt;
&lt;br /&gt;
5. keeping as much as possible the existing phrases and formulations, only changing (merging, repositioning, pionderating) when it suits the next step of test/scenarios&lt;br /&gt;
&lt;br /&gt;
6. Keeping in mind the final intention of '''equity between risks &amp;amp; opportunities''' proposing positive practices (opportunities, in an educative perspective) and preventing bad practices (risks, which creates fear), based on the vision of the slide 10 of [http://www.slideshare.net/Bernajean/ne-3440462 this presentation of Anne Collier], which says that netsafety3.0 should be : &lt;br /&gt;
&lt;br /&gt;
- research-based, not fearbased, therefore relevant&lt;br /&gt;
&lt;br /&gt;
- flexible &amp;amp; layered, instead of &amp;quot;one-size-fits-all&amp;quot;&lt;br /&gt;
&lt;br /&gt;
- respectful of learning culture : stakeholders in positive experience, not just potential victims&lt;br /&gt;
&lt;br /&gt;
- positive, empowering : not just safety from, but safety for...&lt;br /&gt;
&lt;br /&gt;
- full, constructive engagement in participatory society (that's the context of the construction of this syllabus)&lt;br /&gt;
&lt;br /&gt;
=== Mind mapping for the key-notions of the syllabus ===&lt;br /&gt;
&lt;br /&gt;
In addition, Rémi Levy from APTES has produced a [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea mind mapping image] to represent all the notions for the e-safety syllabus. You can access to [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea the interactive map] - You can modify it directly because we keep a copy of the precedent contribution.&lt;br /&gt;
&lt;br /&gt;
== Other possible structure of the syllabus - A.P.T.E.S proposition ==&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Proposition access to the page]&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 1 SYLLABUS - Basic knowledge on e-safety ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;NOTICE IT IS BETTER IF COMMENTS AND DISCUSSIONS ARE MADE ON THE DISCUSSION PAGE &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:28 (UTC)&lt;br /&gt;
&lt;br /&gt;
1.1. Understand the differences of information [[contents]] (open, private, business, etc.).&lt;br /&gt;
&lt;br /&gt;
1.2. Be aware of '''[[privacy protection]] legal act''' (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies, etc)&lt;br /&gt;
&lt;br /&gt;
1.3. Know about '''[[equity between opportunities &amp;amp; risks]]''' of [[web2]]&lt;br /&gt;
&lt;br /&gt;
1.4. Understand the notion of '''[[identity]]'''. &lt;br /&gt;
&lt;br /&gt;
1.5. Be aware of '''different identity for authorization theft methods''' (skimming, pretexting, shoulder surfing, information diving).&lt;br /&gt;
&lt;br /&gt;
1.6. Know about '''[[social engineering]]''' and it’s methods. &lt;br /&gt;
&lt;br /&gt;
1.7. Be aware of cyber crime, online predators, financial scams, harm and who to contact if discovered illegal data.&lt;br /&gt;
&lt;br /&gt;
1.8. Understand computer infection threats (viruses, Trojan horses, spyware, dishonest adware, etc.). Know when and how malicious software can get into computer system.&lt;br /&gt;
&lt;br /&gt;
1.9. Know about organizational [[security]]: school security, usage of school web pages, content publishing, access, etc. &lt;br /&gt;
&lt;br /&gt;
1.10. Know about '''[[netiquette]] and other basic codes''' of conducts in the cyberspace (RFC 1855)&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 2 SYLLABUS - Privacy and data management ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June &amp;lt;/span&amp;gt; --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:35 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2.1. [[Distinguish between data and information]].&lt;br /&gt;
&lt;br /&gt;
2.2. Understand the opportunities and risks of digital '''[[data management]]''' from fully collaborative to full privacy. &lt;br /&gt;
&lt;br /&gt;
2.3. Know about multi-layer '''[[password]]''', changing and keeping password policies. &lt;br /&gt;
&lt;br /&gt;
2.4. Know about '''safe computer [[login]] methods''' &lt;br /&gt;
&lt;br /&gt;
2.5. Know multiple user accounts on various digital environments. Understand the meaning and importance of access rights (what a personal user account is and how data of different users is separated). &lt;br /&gt;
&lt;br /&gt;
2.6. Be aware of '''data encryption''', decryption and password protected files. &lt;br /&gt;
&lt;br /&gt;
2.7. Understand what [[intellectual property]] on Internet is. &lt;br /&gt;
&lt;br /&gt;
2.8. Understand the benefits and purpose of data '''backups''' and be able to restore lost data.&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 3 SYLLABUS - Security tools and network security ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version of Lithuania Team - 2011-06-15----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:30 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3.1. Know computer '''network types''' (local area network (LAN), wide area network (WAN), virtual private network (VPN)) and why protection is needed. &lt;br /&gt;
&lt;br /&gt;
3.2. Know different network '''connection methods''' (Cable, Wireless, Mobile networks). &lt;br /&gt;
&lt;br /&gt;
3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network. &lt;br /&gt;
&lt;br /&gt;
3.4. '''Sharing and accessing resources''' over network (Files, Printer, Desktop). &lt;br /&gt;
&lt;br /&gt;
3.5. Understand safety means of computer networks (Firewall, Antivirus, Anti-spyware, Spam blocker Password protection, Connection encryption – wireless). &lt;br /&gt;
&lt;br /&gt;
3.6. Be able to use standard OS integrated protection tools. &lt;br /&gt;
&lt;br /&gt;
3.7. Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.). Distinguish different modes of antivirus protection (active, passive).&lt;br /&gt;
&lt;br /&gt;
3.8. Know what has to be done and in what order, if you suspect that computer system is infected. Distinguish infected files deletion, quarantining and curing.&lt;br /&gt;
&lt;br /&gt;
3.9. Know how to '''follow, download and use updates for your operating system''', software and importance of antivirus definition files. Understand the benefits of these updates.&lt;br /&gt;
&lt;br /&gt;
3.10. Informal and formal periodic [[external checkup]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 4 SYLLABUS - Minors and newcomers on the net == &lt;br /&gt;
&lt;br /&gt;
New Syllabus version discussed on Thursday 16th June - --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:53 (UTC)&lt;br /&gt;
&lt;br /&gt;
4.1. Understand the impact of communication with minors and new users about safety in IT World.&lt;br /&gt;
&lt;br /&gt;
4.2 Understand the purpose of monitoring, filtering and controlling tools for safer internet use of minors&lt;br /&gt;
&lt;br /&gt;
4.3. Be aware of different ways to educate, monitor and control usage of social networking and other web sites.&lt;br /&gt;
&lt;br /&gt;
4.4. Be able to develop policies and applicate methods for children’s use of the computer and the Internet (depending on age and socio-cultural situation). &lt;br /&gt;
&lt;br /&gt;
4.5. Understanding advantages and limitations with protection software&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 5 SYLLABUS - Social networks and safe usage of the Internet ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;lt;b&amp;gt;We recommend change chapter name to: &amp;quot;CHAPTER 5 SYLLABUS - Social networks and safe virtual communication----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:32 (UTC)&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
New Syllabus version as discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:05 (UTC) - &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5.1. Know how to '''start and finish safe browsing session''' (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing. &lt;br /&gt;
&lt;br /&gt;
5.2. Know about'''advantages, disadvantages and dangers of Internet cookies''' and ActiveX control. Know about tools that ensure safety when browsing the Internet.  &lt;br /&gt;
&lt;br /&gt;
5.3. Be able to manage: temporary Internet files, browser history, passwords, cookies and autocomplete data. &lt;br /&gt;
&lt;br /&gt;
5.4. Be able to safely '''connect to e-Services and secure environments'''– connecting and using, recover lost passwords.&lt;br /&gt;
&lt;br /&gt;
5.5. Know when and in which cases personal '''information can be published on the Internet''' (i.e. status publishing about leaving home).&lt;br /&gt;
&lt;br /&gt;
5.6. Know who you should contact if you discovered inappropriate information about you or your related digital identities.&lt;br /&gt;
&lt;br /&gt;
5.7. Understand that it is necessary to exercise critical thinking about content and identities on the internet. (i.e. blogs, Wikipedia, social networks, forums, etc). #reformulated by --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:22 (UTC)&lt;br /&gt;
&lt;br /&gt;
5.8. Understand 'threats of inappropriate content for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on) &lt;br /&gt;
&lt;br /&gt;
5.9. Understand what an online social network is, what are opportunities and risks of social network. Age groups of using social networks. Options and parameters for information disclosure. Understand what is the fascination to disclose private information on the internet&lt;br /&gt;
&lt;br /&gt;
5.10. Know different '''social network types''' (Friendship-driven and Interest-driven) and be able to use them harmless and safe (appropriate account privacy settings). &lt;br /&gt;
&lt;br /&gt;
5.11. Know what type of information recommended to be published on social network, be responsible for published content, and know impacts &lt;br /&gt;
&lt;br /&gt;
5.12. Understand that online socializing reflects &amp;quot;real life&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
5.13. Be able to send/receive e-mail securely: know how to reject email from specific email addresses. Know how to treat email messages from unknown senders, classified as spam and email messages infected with malware. Know about scam, hoax, chain letters.&lt;br /&gt;
&lt;br /&gt;
5.14. Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information, etc.&lt;br /&gt;
&lt;br /&gt;
5.15. Understand threats of online communication: virtual dating, bullying, commenting. &lt;br /&gt;
&lt;br /&gt;
5.16. Understand dependency and addiction to the Internet.&lt;br /&gt;
&lt;br /&gt;
5.17. Understand what is [[Online Safety 3.0]] and why [[digital citizenship]] is protective and is the best filter ever : pre-installed, free of charge, improve with use...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Another Mind mapping=&lt;br /&gt;
&lt;br /&gt;
[[Fichier:notions-and-concepts.png|1100px|]]&lt;br /&gt;
&lt;br /&gt;
You can access to the dynamic mapp here [http://www.mindomo.com/edit.htm?m=64bf626021b940d99dd9576283c833bf notions and concepts]&lt;br /&gt;
&lt;br /&gt;
[[Proposition]]&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4832</id>
		<title>Syllabus e-safety</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4832"/>
				<updated>2011-06-17T09:23:19Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : /* CHAPTER 5 SYLLABUS - Social networks and safe usage of the Internet */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''e-GUARDIAN - Syllabus V.2.x&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
== Introduction : aims &amp;amp; resources ==&lt;br /&gt;
&lt;br /&gt;
=== Aims ===&lt;br /&gt;
This wiki page aims at facilitating a collaborative synergic process for defining the syllabus on netsafety of the EU LdV e-Guardian project.&lt;br /&gt;
Participants are delegates of partner's institutions from Lithuania, Latvia, Germany and Switzerland.&lt;br /&gt;
&lt;br /&gt;
The resources are : &lt;br /&gt;
&lt;br /&gt;
=== A web-based social bookmarking working group === &lt;br /&gt;
on [http://groups.diigo.com/group/e_safety here on Diigo],  we can post all related useful information on netsafety, such as : &lt;br /&gt;
&lt;br /&gt;
- definition of key-words&lt;br /&gt;
&lt;br /&gt;
- examples of quizz, pedagogical scenarios and other pedagogical resources&lt;br /&gt;
&lt;br /&gt;
- related scientific articles &lt;br /&gt;
&lt;br /&gt;
- other relevant initiatives&lt;br /&gt;
&lt;br /&gt;
=== Guidelines for the syllabus === &lt;br /&gt;
They wwere provided by the project's team coordinated by the LIA organisation, and specially the syllabus workpackage leader, ecdl.lt, represented by Eugenijus Telesius and his team composed of Renata Danieliene &amp;amp; Tomas Lygutas, which is complemented by partner's delegate Algimantas Merkys (LIA, the coordinator's team), Dennis Krannich (Bremen Univbersity), Théo Bondolfi &amp;amp; Rémi Lévy (APTES Switzerland). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
These guidelines are : &lt;br /&gt;
&lt;br /&gt;
1. Focus on [[e-safety]] [[offline]] as well as [[online]], therefore always taking into account basic needs (such as password storage) as well as complex needs (such as behaviour in [[web2]] environments).&lt;br /&gt;
&lt;br /&gt;
2. Taking into account all key-points in this initial version, and considering these key-point as &amp;quot;objects&amp;quot; whcih can be replaced in other forms but which must stay available.&lt;br /&gt;
&lt;br /&gt;
3. respecting the steps of user point of view (example : 1 start computer, 2 launch application...)&lt;br /&gt;
&lt;br /&gt;
4. restructuring with categories and sets like in the policies of ECDL [http://www.ecdl.org/programmes/media/ECDL_ICDL_Module_12_-_Syllabus_-_V1.0.pdf]&lt;br /&gt;
&lt;br /&gt;
5. keeping as much as possible the existing phrases and formulations, only changing (merging, repositioning, pionderating) when it suits the next step of test/scenarios&lt;br /&gt;
&lt;br /&gt;
6. Keeping in mind the final intention of '''equity between risks &amp;amp; opportunities''' proposing positive practices (opportunities, in an educative perspective) and preventing bad practices (risks, which creates fear), based on the vision of the slide 10 of [http://www.slideshare.net/Bernajean/ne-3440462 this presentation of Anne Collier], which says that netsafety3.0 should be : &lt;br /&gt;
&lt;br /&gt;
- research-based, not fearbased, therefore relevant&lt;br /&gt;
&lt;br /&gt;
- flexible &amp;amp; layered, instead of &amp;quot;one-size-fits-all&amp;quot;&lt;br /&gt;
&lt;br /&gt;
- respectful of learning culture : stakeholders in positive experience, not just potential victims&lt;br /&gt;
&lt;br /&gt;
- positive, empowering : not just safety from, but safety for...&lt;br /&gt;
&lt;br /&gt;
- full, constructive engagement in participatory society (that's the context of the construction of this syllabus)&lt;br /&gt;
&lt;br /&gt;
=== Mind mapping for the key-notions of the syllabus ===&lt;br /&gt;
&lt;br /&gt;
In addition, Rémi Levy from APTES has produced a [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea mind mapping image] to represent all the notions for the e-safety syllabus. You can access to [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea the interactive map] - You can modify it directly because we keep a copy of the precedent contribution.&lt;br /&gt;
&lt;br /&gt;
== Other possible structure of the syllabus - A.P.T.E.S proposition ==&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Proposition access to the page]&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 1 SYLLABUS - Basic knowledge on e-safety ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;NOTICE IT IS BETTER IF COMMENTS AND DISCUSSIONS ARE MADE THE DISCUSSION PAGE &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:28 (UTC)&lt;br /&gt;
&lt;br /&gt;
1.1. Understand the differences of information [[contents]] (open, private, business, etc.).&lt;br /&gt;
&lt;br /&gt;
1.2. Be aware of '''[[privacy protection]] legal act''' (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies, etc)&lt;br /&gt;
&lt;br /&gt;
1.3. Know about '''[[equity between opportunities &amp;amp; risks]]''' of [[web2]]&lt;br /&gt;
&lt;br /&gt;
1.4. Understand the notion of '''[[identity]]'''. &lt;br /&gt;
&lt;br /&gt;
1.5. Be aware of '''different identity for authorization theft methods''' (skimming, pretexting, shoulder surfing, information diving).&lt;br /&gt;
&lt;br /&gt;
1.6. Know about '''[[social engineering]]''' and it’s methods. &lt;br /&gt;
&lt;br /&gt;
1.7. Be aware of cyber crime, online predators, financial scams, harm and who to contact if discovered illegal data.&lt;br /&gt;
&lt;br /&gt;
1.8. Understand computer infection threats (viruses, Trojan horses, spyware, dishonest adware, etc.). Know when and how malicious software can get into computer system.&lt;br /&gt;
&lt;br /&gt;
1.9. Know about organizational [[security]]: school security, usage of school web pages, content publishing, access, etc. &lt;br /&gt;
&lt;br /&gt;
1.10. Know about '''[[netiquette]] and other basic codes''' of conducts in the cyberspace (RFC 1855)&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 2 SYLLABUS - Privacy and data management ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June &amp;lt;/span&amp;gt; --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:35 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2.1. [[Distinguish between data and information]].&lt;br /&gt;
&lt;br /&gt;
2.2. Understand the opportunities and risks of digital '''[[data management]]''' from fully collaborative to full privacy. &lt;br /&gt;
&lt;br /&gt;
2.3. Know about multi-layer '''[[password]]''', changing and keeping password policies. &lt;br /&gt;
&lt;br /&gt;
2.4. Know about '''safe computer [[login]] methods''' &lt;br /&gt;
&lt;br /&gt;
2.5. Know multiple user accounts on various digital environments. Understand the meaning and importance of access rights (what a personal user account is and how data of different users is separated). &lt;br /&gt;
&lt;br /&gt;
2.6. Be aware of '''data encryption''', decryption and password protected files. &lt;br /&gt;
&lt;br /&gt;
2.7. Understand what [[intellectual property]] on Internet is. &lt;br /&gt;
&lt;br /&gt;
2.8. Understand the benefits and purpose of data '''backups''' and be able to restore lost data.&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 3 SYLLABUS - Security tools and network security ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version of Lithuania Team - 2011-06-15----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:30 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3.1. Know computer '''network types''' (local area network (LAN), wide area network (WAN), virtual private network (VPN)) and why protection is needed. &lt;br /&gt;
&lt;br /&gt;
3.2. Know different network '''connection methods''' (Cable, Wireless, Mobile networks). &lt;br /&gt;
&lt;br /&gt;
3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network. &lt;br /&gt;
&lt;br /&gt;
3.4. '''Sharing and accessing resources''' over network (Files, Printer, Desktop). &lt;br /&gt;
&lt;br /&gt;
3.5. Understand safety means of computer networks (Firewall, Antivirus, Anti-spyware, Spam blocker Password protection, Connection encryption – wireless). &lt;br /&gt;
&lt;br /&gt;
3.6. Be able to use standard OS integrated protection tools. &lt;br /&gt;
&lt;br /&gt;
3.7. Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.). Distinguish different modes of antivirus protection (active, passive).&lt;br /&gt;
&lt;br /&gt;
3.8. Know what has to be done and in what order, if you suspect that computer system is infected. Distinguish infected files deletion, quarantining and curing.&lt;br /&gt;
&lt;br /&gt;
3.9. Know how to '''follow, download and use updates for your operating system''', software and importance of antivirus definition files. Understand the benefits of these updates.&lt;br /&gt;
&lt;br /&gt;
3.10. Informal and formal periodic [[external checkup]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 4 SYLLABUS - Minors and newcomers on the net == &lt;br /&gt;
&lt;br /&gt;
New Syllabus version discussed on Thursday 16th June - --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:53 (UTC)&lt;br /&gt;
&lt;br /&gt;
4.1. Understand the impact of communication with minors and new users about safety in IT World.&lt;br /&gt;
&lt;br /&gt;
4.2 Understand the purpose of monitoring, filtering and controlling tools for safer internet use of minors&lt;br /&gt;
&lt;br /&gt;
4.3. Be aware of different ways to educate, monitor and control usage of social networking and other web sites.&lt;br /&gt;
&lt;br /&gt;
4.4. Be able to develop policies and applicate methods for children’s use of the computer and the Internet (depending on age and socio-cultural situation). &lt;br /&gt;
&lt;br /&gt;
4.5. Understanding advantages and limitations with protection software&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 5 SYLLABUS - Social networks and safe usage of the Internet ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;lt;b&amp;gt;We recommend change chapter name to: &amp;quot;CHAPTER 5 SYLLABUS - Social networks and safe virtual communication----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:32 (UTC)&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
New Syllabus version as discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:05 (UTC) - &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5.1. Know how to '''start and finish safe browsing session''' (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing. &lt;br /&gt;
&lt;br /&gt;
5.2. Know about'''advantages, disadvantages and dangers of Internet cookies''' and ActiveX control. Know about tools that ensure safety when browsing the Internet.  &lt;br /&gt;
&lt;br /&gt;
5.3. Be able to manage: temporary Internet files, browser history, passwords, cookies and autocomplete data. &lt;br /&gt;
&lt;br /&gt;
5.4. Be able to safely '''connect to e-Services and secure environments'''– connecting and using, recover lost passwords.&lt;br /&gt;
&lt;br /&gt;
5.5. Know when and in which cases personal '''information can be published on the Internet''' (i.e. status publishing about leaving home).&lt;br /&gt;
&lt;br /&gt;
5.6. Know who you should contact if you discovered inappropriate information about you or your related digital identities.&lt;br /&gt;
&lt;br /&gt;
5.7. Understand that it is necessary to exercise critical thinking about content and identities on the internet. (i.e. blogs, Wikipedia, social networks, forums, etc). #reformulated by --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:22 (UTC)&lt;br /&gt;
&lt;br /&gt;
5.8. Understand 'threats of inappropriate content for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on) &lt;br /&gt;
&lt;br /&gt;
5.9. Understand what an online social network is, what are opportunities and risks of social network. Age groups of using social networks. Options and parameters for information disclosure. Understand what is the fascination to disclose private information on the internet&lt;br /&gt;
&lt;br /&gt;
5.10. Know different '''social network types''' (Friendship-driven and Interest-driven) and be able to use them harmless and safe (appropriate account privacy settings). &lt;br /&gt;
&lt;br /&gt;
5.11. Know what type of information recommended to be published on social network, be responsible for published content, and know impacts &lt;br /&gt;
&lt;br /&gt;
5.12. Understand that online socializing reflects &amp;quot;real life&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
5.13. Be able to send/receive e-mail securely: know how to reject email from specific email addresses. Know how to treat email messages from unknown senders, classified as spam and email messages infected with malware. Know about scam, hoax, chain letters.&lt;br /&gt;
&lt;br /&gt;
5.14. Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information, etc.&lt;br /&gt;
&lt;br /&gt;
5.15. Understand threats of online communication: virtual dating, bullying, commenting. &lt;br /&gt;
&lt;br /&gt;
5.16. Understand dependency and addiction to the Internet.&lt;br /&gt;
&lt;br /&gt;
5.17. Understand what is [[Online Safety 3.0]] and why [[digital citizenship]] is protective and is the best filter ever : pre-installed, free of charge, improve with use...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Another Mind mapping=&lt;br /&gt;
&lt;br /&gt;
[[Fichier:notions-and-concepts.png|1100px|]]&lt;br /&gt;
&lt;br /&gt;
You can access to the dynamic mapp here [http://www.mindomo.com/edit.htm?m=64bf626021b940d99dd9576283c833bf notions and concepts]&lt;br /&gt;
&lt;br /&gt;
[[Proposition]]&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4831</id>
		<title>Syllabus e-safety</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4831"/>
				<updated>2011-06-17T09:22:41Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : /* CHAPTER 5 SYLLABUS - Social networks and safe usage of the Internet */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''e-GUARDIAN - Syllabus V.2.x&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
== Introduction : aims &amp;amp; resources ==&lt;br /&gt;
&lt;br /&gt;
=== Aims ===&lt;br /&gt;
This wiki page aims at facilitating a collaborative synergic process for defining the syllabus on netsafety of the EU LdV e-Guardian project.&lt;br /&gt;
Participants are delegates of partner's institutions from Lithuania, Latvia, Germany and Switzerland.&lt;br /&gt;
&lt;br /&gt;
The resources are : &lt;br /&gt;
&lt;br /&gt;
=== A web-based social bookmarking working group === &lt;br /&gt;
on [http://groups.diigo.com/group/e_safety here on Diigo],  we can post all related useful information on netsafety, such as : &lt;br /&gt;
&lt;br /&gt;
- definition of key-words&lt;br /&gt;
&lt;br /&gt;
- examples of quizz, pedagogical scenarios and other pedagogical resources&lt;br /&gt;
&lt;br /&gt;
- related scientific articles &lt;br /&gt;
&lt;br /&gt;
- other relevant initiatives&lt;br /&gt;
&lt;br /&gt;
=== Guidelines for the syllabus === &lt;br /&gt;
They wwere provided by the project's team coordinated by the LIA organisation, and specially the syllabus workpackage leader, ecdl.lt, represented by Eugenijus Telesius and his team composed of Renata Danieliene &amp;amp; Tomas Lygutas, which is complemented by partner's delegate Algimantas Merkys (LIA, the coordinator's team), Dennis Krannich (Bremen Univbersity), Théo Bondolfi &amp;amp; Rémi Lévy (APTES Switzerland). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
These guidelines are : &lt;br /&gt;
&lt;br /&gt;
1. Focus on [[e-safety]] [[offline]] as well as [[online]], therefore always taking into account basic needs (such as password storage) as well as complex needs (such as behaviour in [[web2]] environments).&lt;br /&gt;
&lt;br /&gt;
2. Taking into account all key-points in this initial version, and considering these key-point as &amp;quot;objects&amp;quot; whcih can be replaced in other forms but which must stay available.&lt;br /&gt;
&lt;br /&gt;
3. respecting the steps of user point of view (example : 1 start computer, 2 launch application...)&lt;br /&gt;
&lt;br /&gt;
4. restructuring with categories and sets like in the policies of ECDL [http://www.ecdl.org/programmes/media/ECDL_ICDL_Module_12_-_Syllabus_-_V1.0.pdf]&lt;br /&gt;
&lt;br /&gt;
5. keeping as much as possible the existing phrases and formulations, only changing (merging, repositioning, pionderating) when it suits the next step of test/scenarios&lt;br /&gt;
&lt;br /&gt;
6. Keeping in mind the final intention of '''equity between risks &amp;amp; opportunities''' proposing positive practices (opportunities, in an educative perspective) and preventing bad practices (risks, which creates fear), based on the vision of the slide 10 of [http://www.slideshare.net/Bernajean/ne-3440462 this presentation of Anne Collier], which says that netsafety3.0 should be : &lt;br /&gt;
&lt;br /&gt;
- research-based, not fearbased, therefore relevant&lt;br /&gt;
&lt;br /&gt;
- flexible &amp;amp; layered, instead of &amp;quot;one-size-fits-all&amp;quot;&lt;br /&gt;
&lt;br /&gt;
- respectful of learning culture : stakeholders in positive experience, not just potential victims&lt;br /&gt;
&lt;br /&gt;
- positive, empowering : not just safety from, but safety for...&lt;br /&gt;
&lt;br /&gt;
- full, constructive engagement in participatory society (that's the context of the construction of this syllabus)&lt;br /&gt;
&lt;br /&gt;
=== Mind mapping for the key-notions of the syllabus ===&lt;br /&gt;
&lt;br /&gt;
In addition, Rémi Levy from APTES has produced a [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea mind mapping image] to represent all the notions for the e-safety syllabus. You can access to [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea the interactive map] - You can modify it directly because we keep a copy of the precedent contribution.&lt;br /&gt;
&lt;br /&gt;
== Other possible structure of the syllabus - A.P.T.E.S proposition ==&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Proposition access to the page]&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 1 SYLLABUS - Basic knowledge on e-safety ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;NOTICE IT IS BETTER IF COMMENTS AND DISCUSSIONS ARE MADE THE DISCUSSION PAGE &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:28 (UTC)&lt;br /&gt;
&lt;br /&gt;
1.1. Understand the differences of information [[contents]] (open, private, business, etc.).&lt;br /&gt;
&lt;br /&gt;
1.2. Be aware of '''[[privacy protection]] legal act''' (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies, etc)&lt;br /&gt;
&lt;br /&gt;
1.3. Know about '''[[equity between opportunities &amp;amp; risks]]''' of [[web2]]&lt;br /&gt;
&lt;br /&gt;
1.4. Understand the notion of '''[[identity]]'''. &lt;br /&gt;
&lt;br /&gt;
1.5. Be aware of '''different identity for authorization theft methods''' (skimming, pretexting, shoulder surfing, information diving).&lt;br /&gt;
&lt;br /&gt;
1.6. Know about '''[[social engineering]]''' and it’s methods. &lt;br /&gt;
&lt;br /&gt;
1.7. Be aware of cyber crime, online predators, financial scams, harm and who to contact if discovered illegal data.&lt;br /&gt;
&lt;br /&gt;
1.8. Understand computer infection threats (viruses, Trojan horses, spyware, dishonest adware, etc.). Know when and how malicious software can get into computer system.&lt;br /&gt;
&lt;br /&gt;
1.9. Know about organizational [[security]]: school security, usage of school web pages, content publishing, access, etc. &lt;br /&gt;
&lt;br /&gt;
1.10. Know about '''[[netiquette]] and other basic codes''' of conducts in the cyberspace (RFC 1855)&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 2 SYLLABUS - Privacy and data management ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June &amp;lt;/span&amp;gt; --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:35 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2.1. [[Distinguish between data and information]].&lt;br /&gt;
&lt;br /&gt;
2.2. Understand the opportunities and risks of digital '''[[data management]]''' from fully collaborative to full privacy. &lt;br /&gt;
&lt;br /&gt;
2.3. Know about multi-layer '''[[password]]''', changing and keeping password policies. &lt;br /&gt;
&lt;br /&gt;
2.4. Know about '''safe computer [[login]] methods''' &lt;br /&gt;
&lt;br /&gt;
2.5. Know multiple user accounts on various digital environments. Understand the meaning and importance of access rights (what a personal user account is and how data of different users is separated). &lt;br /&gt;
&lt;br /&gt;
2.6. Be aware of '''data encryption''', decryption and password protected files. &lt;br /&gt;
&lt;br /&gt;
2.7. Understand what [[intellectual property]] on Internet is. &lt;br /&gt;
&lt;br /&gt;
2.8. Understand the benefits and purpose of data '''backups''' and be able to restore lost data.&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 3 SYLLABUS - Security tools and network security ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version of Lithuania Team - 2011-06-15----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:30 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3.1. Know computer '''network types''' (local area network (LAN), wide area network (WAN), virtual private network (VPN)) and why protection is needed. &lt;br /&gt;
&lt;br /&gt;
3.2. Know different network '''connection methods''' (Cable, Wireless, Mobile networks). &lt;br /&gt;
&lt;br /&gt;
3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network. &lt;br /&gt;
&lt;br /&gt;
3.4. '''Sharing and accessing resources''' over network (Files, Printer, Desktop). &lt;br /&gt;
&lt;br /&gt;
3.5. Understand safety means of computer networks (Firewall, Antivirus, Anti-spyware, Spam blocker Password protection, Connection encryption – wireless). &lt;br /&gt;
&lt;br /&gt;
3.6. Be able to use standard OS integrated protection tools. &lt;br /&gt;
&lt;br /&gt;
3.7. Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.). Distinguish different modes of antivirus protection (active, passive).&lt;br /&gt;
&lt;br /&gt;
3.8. Know what has to be done and in what order, if you suspect that computer system is infected. Distinguish infected files deletion, quarantining and curing.&lt;br /&gt;
&lt;br /&gt;
3.9. Know how to '''follow, download and use updates for your operating system''', software and importance of antivirus definition files. Understand the benefits of these updates.&lt;br /&gt;
&lt;br /&gt;
3.10. Informal and formal periodic [[external checkup]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 4 SYLLABUS - Minors and newcomers on the net == &lt;br /&gt;
&lt;br /&gt;
New Syllabus version discussed on Thursday 16th June - --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:53 (UTC)&lt;br /&gt;
&lt;br /&gt;
4.1. Understand the impact of communication with minors and new users about safety in IT World.&lt;br /&gt;
&lt;br /&gt;
4.2 Understand the purpose of monitoring, filtering and controlling tools for safer internet use of minors&lt;br /&gt;
&lt;br /&gt;
4.3. Be aware of different ways to educate, monitor and control usage of social networking and other web sites.&lt;br /&gt;
&lt;br /&gt;
4.4. Be able to develop policies and applicate methods for children’s use of the computer and the Internet (depending on age and socio-cultural situation). &lt;br /&gt;
&lt;br /&gt;
4.5. Understanding advantages and limitations with protection software&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 5 SYLLABUS - Social networks and safe usage of the Internet ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;lt;b&amp;gt;We recommend change chapter name to: &amp;quot;CHAPTER 5 SYLLABUS - Social networks and safe virtual communication----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:32 (UTC)&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
New Syllabus version as discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:05 (UTC) - &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5.1. Know how to '''start and finish safe browsing session''' (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing. &lt;br /&gt;
&lt;br /&gt;
5.2. Know about'''advantages, disadvantages and dangers of Internet cookies''' and ActiveX control. Know about tools that ensure safety when browsing the Internet.  &lt;br /&gt;
&lt;br /&gt;
5.3. Be able to manage: temporary Internet files, browser history, passwords, cookies and autocomplete data. &lt;br /&gt;
&lt;br /&gt;
5.4. Be able to safely '''connect to e-Services and secure environments'''– connecting and using, recover lost passwords.&lt;br /&gt;
&lt;br /&gt;
5.5. Know when and in which cases personal '''information can be published on the Internet''' (i.e. status publishing about leaving home).&lt;br /&gt;
&lt;br /&gt;
5.6. Know who you should contact if you discovered inappropriate information about you or your related digital identities.&lt;br /&gt;
&lt;br /&gt;
5.7. Understand that it is necessary to exercise critical thinking about content and identities on the internet. (i.e. blogs, Wikipedia, social networks, forums, etc). #reformulated by Rémi --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:22 (UTC)&lt;br /&gt;
&lt;br /&gt;
5.8. Understand 'threats of inappropriate content for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on) &lt;br /&gt;
&lt;br /&gt;
5.9. Understand what an online social network is, what are opportunities and risks of social network. Age groups of using social networks. Options and parameters for information disclosure. Understand what is the fascination to disclose private information on the internet&lt;br /&gt;
&lt;br /&gt;
5.10. Know different '''social network types''' (Friendship-driven and Interest-driven) and be able to use them harmless and safe (appropriate account privacy settings). &lt;br /&gt;
&lt;br /&gt;
5.11. Know what type of information recommended to be published on social network, be responsible for published content, and know impacts &lt;br /&gt;
&lt;br /&gt;
5.12. Understand that online socializing reflects &amp;quot;real life&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
5.13. Be able to send/receive e-mail securely: know how to reject email from specific email addresses. Know how to treat email messages from unknown senders, classified as spam and email messages infected with malware. Know about scam, hoax, chain letters.&lt;br /&gt;
&lt;br /&gt;
5.14. Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information, etc.&lt;br /&gt;
&lt;br /&gt;
5.15. Understand threats of online communication: virtual dating, bullying, commenting. &lt;br /&gt;
&lt;br /&gt;
5.16. Understand dependency and addiction to the Internet.&lt;br /&gt;
&lt;br /&gt;
5.17. Understand what is [[Online Safety 3.0]] and why [[digital citizenship]] is protective and is the best filter ever : pre-installed, free of charge, improve with use...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Another Mind mapping=&lt;br /&gt;
&lt;br /&gt;
[[Fichier:notions-and-concepts.png|1100px|]]&lt;br /&gt;
&lt;br /&gt;
You can access to the dynamic mapp here [http://www.mindomo.com/edit.htm?m=64bf626021b940d99dd9576283c833bf notions and concepts]&lt;br /&gt;
&lt;br /&gt;
[[Proposition]]&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Online_Safety_3.0&amp;diff=4830</id>
		<title>Online Safety 3.0</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Online_Safety_3.0&amp;diff=4830"/>
				<updated>2011-06-17T09:06:41Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : Page créée avec «    Online Safety 3 : research-based, Flexible, layered, Respectful, Positive, empowering, contextual.... »&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Online Safety 3 : research-based, Flexible, layered, Respectful, Positive, empowering, contextual....&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4829</id>
		<title>Syllabus e-safety</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4829"/>
				<updated>2011-06-17T09:05:58Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : /* CHAPTER 5 SYLLABUS - Social networks and safe usage of the Internet */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''e-GUARDIAN - Syllabus V.2.x&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
== Introduction : aims &amp;amp; resources ==&lt;br /&gt;
&lt;br /&gt;
=== Aims ===&lt;br /&gt;
This wiki page aims at facilitating a collaborative synergic process for defining the syllabus on netsafety of the EU LdV e-Guardian project.&lt;br /&gt;
Participants are delegates of partner's institutions from Lithuania, Latvia, Germany and Switzerland.&lt;br /&gt;
&lt;br /&gt;
The resources are : &lt;br /&gt;
&lt;br /&gt;
=== A web-based social bookmarking working group === &lt;br /&gt;
on [http://groups.diigo.com/group/e_safety here on Diigo],  we can post all related useful information on netsafety, such as : &lt;br /&gt;
&lt;br /&gt;
- definition of key-words&lt;br /&gt;
&lt;br /&gt;
- examples of quizz, pedagogical scenarios and other pedagogical resources&lt;br /&gt;
&lt;br /&gt;
- related scientific articles &lt;br /&gt;
&lt;br /&gt;
- other relevant initiatives&lt;br /&gt;
&lt;br /&gt;
=== Guidelines for the syllabus === &lt;br /&gt;
They wwere provided by the project's team coordinated by the LIA organisation, and specially the syllabus workpackage leader, ecdl.lt, represented by Eugenijus Telesius and his team composed of Renata Danieliene &amp;amp; Tomas Lygutas, which is complemented by partner's delegate Algimantas Merkys (LIA, the coordinator's team), Dennis Krannich (Bremen Univbersity), Théo Bondolfi &amp;amp; Rémi Lévy (APTES Switzerland). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
These guidelines are : &lt;br /&gt;
&lt;br /&gt;
1. Focus on [[e-safety]] [[offline]] as well as [[online]], therefore always taking into account basic needs (such as password storage) as well as complex needs (such as behaviour in [[web2]] environments).&lt;br /&gt;
&lt;br /&gt;
2. Taking into account all key-points in this initial version, and considering these key-point as &amp;quot;objects&amp;quot; whcih can be replaced in other forms but which must stay available.&lt;br /&gt;
&lt;br /&gt;
3. respecting the steps of user point of view (example : 1 start computer, 2 launch application...)&lt;br /&gt;
&lt;br /&gt;
4. restructuring with categories and sets like in the policies of ECDL [http://www.ecdl.org/programmes/media/ECDL_ICDL_Module_12_-_Syllabus_-_V1.0.pdf]&lt;br /&gt;
&lt;br /&gt;
5. keeping as much as possible the existing phrases and formulations, only changing (merging, repositioning, pionderating) when it suits the next step of test/scenarios&lt;br /&gt;
&lt;br /&gt;
6. Keeping in mind the final intention of '''equity between risks &amp;amp; opportunities''' proposing positive practices (opportunities, in an educative perspective) and preventing bad practices (risks, which creates fear), based on the vision of the slide 10 of [http://www.slideshare.net/Bernajean/ne-3440462 this presentation of Anne Collier], which says that netsafety3.0 should be : &lt;br /&gt;
&lt;br /&gt;
- research-based, not fearbased, therefore relevant&lt;br /&gt;
&lt;br /&gt;
- flexible &amp;amp; layered, instead of &amp;quot;one-size-fits-all&amp;quot;&lt;br /&gt;
&lt;br /&gt;
- respectful of learning culture : stakeholders in positive experience, not just potential victims&lt;br /&gt;
&lt;br /&gt;
- positive, empowering : not just safety from, but safety for...&lt;br /&gt;
&lt;br /&gt;
- full, constructive engagement in participatory society (that's the context of the construction of this syllabus)&lt;br /&gt;
&lt;br /&gt;
=== Mind mapping for the key-notions of the syllabus ===&lt;br /&gt;
&lt;br /&gt;
In addition, Rémi Levy from APTES has produced a [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea mind mapping image] to represent all the notions for the e-safety syllabus. You can access to [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea the interactive map] - You can modify it directly because we keep a copy of the precedent contribution.&lt;br /&gt;
&lt;br /&gt;
== Other possible structure of the syllabus - A.P.T.E.S proposition ==&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Proposition access to the page]&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 1 SYLLABUS - Basic knowledge on e-safety ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;NOTICE IT IS BETTER IF COMMENTS AND DISCUSSIONS ARE MADE THE DISCUSSION PAGE &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:28 (UTC)&lt;br /&gt;
&lt;br /&gt;
1.1. Understand the differences of information [[contents]] (open, private, business, etc.).&lt;br /&gt;
&lt;br /&gt;
1.2. Be aware of '''[[privacy protection]] legal act''' (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies, etc)&lt;br /&gt;
&lt;br /&gt;
1.3. Know about '''[[equity between opportunities &amp;amp; risks]]''' of [[web2]]&lt;br /&gt;
&lt;br /&gt;
1.4. Understand the notion of '''[[identity]]'''. &lt;br /&gt;
&lt;br /&gt;
1.5. Be aware of '''different identity for authorization theft methods''' (skimming, pretexting, shoulder surfing, information diving).&lt;br /&gt;
&lt;br /&gt;
1.6. Know about '''[[social engineering]]''' and it’s methods. &lt;br /&gt;
&lt;br /&gt;
1.7. Be aware of cyber crime, online predators, financial scams, harm and who to contact if discovered illegal data.&lt;br /&gt;
&lt;br /&gt;
1.8. Understand computer infection threats (viruses, Trojan horses, spyware, dishonest adware, etc.). Know when and how malicious software can get into computer system.&lt;br /&gt;
&lt;br /&gt;
1.9. Know about organizational [[security]]: school security, usage of school web pages, content publishing, access, etc. &lt;br /&gt;
&lt;br /&gt;
1.10. Know about '''[[netiquette]] and other basic codes''' of conducts in the cyberspace (RFC 1855)&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 2 SYLLABUS - Privacy and data management ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June &amp;lt;/span&amp;gt; --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:35 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2.1. [[Distinguish between data and information]].&lt;br /&gt;
&lt;br /&gt;
2.2. Understand the opportunities and risks of digital '''[[data management]]''' from fully collaborative to full privacy. &lt;br /&gt;
&lt;br /&gt;
2.3. Know about multi-layer '''[[password]]''', changing and keeping password policies. &lt;br /&gt;
&lt;br /&gt;
2.4. Know about '''safe computer [[login]] methods''' &lt;br /&gt;
&lt;br /&gt;
2.5. Know multiple user accounts on various digital environments. Understand the meaning and importance of access rights (what a personal user account is and how data of different users is separated). &lt;br /&gt;
&lt;br /&gt;
2.6. Be aware of '''data encryption''', decryption and password protected files. &lt;br /&gt;
&lt;br /&gt;
2.7. Understand what [[intellectual property]] on Internet is. &lt;br /&gt;
&lt;br /&gt;
2.8. Understand the benefits and purpose of data '''backups''' and be able to restore lost data.&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 3 SYLLABUS - Security tools and network security ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version of Lithuania Team - 2011-06-15----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:30 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3.1. Know computer '''network types''' (local area network (LAN), wide area network (WAN), virtual private network (VPN)) and why protection is needed. &lt;br /&gt;
&lt;br /&gt;
3.2. Know different network '''connection methods''' (Cable, Wireless, Mobile networks). &lt;br /&gt;
&lt;br /&gt;
3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network. &lt;br /&gt;
&lt;br /&gt;
3.4. '''Sharing and accessing resources''' over network (Files, Printer, Desktop). &lt;br /&gt;
&lt;br /&gt;
3.5. Understand safety means of computer networks (Firewall, Antivirus, Anti-spyware, Spam blocker Password protection, Connection encryption – wireless). &lt;br /&gt;
&lt;br /&gt;
3.6. Be able to use standard OS integrated protection tools. &lt;br /&gt;
&lt;br /&gt;
3.7. Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.). Distinguish different modes of antivirus protection (active, passive).&lt;br /&gt;
&lt;br /&gt;
3.8. Know what has to be done and in what order, if you suspect that computer system is infected. Distinguish infected files deletion, quarantining and curing.&lt;br /&gt;
&lt;br /&gt;
3.9. Know how to '''follow, download and use updates for your operating system''', software and importance of antivirus definition files. Understand the benefits of these updates.&lt;br /&gt;
&lt;br /&gt;
3.10. Informal and formal periodic [[external checkup]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 4 SYLLABUS - Minors and newcomers on the net == &lt;br /&gt;
&lt;br /&gt;
New Syllabus version discussed on Thursday 16th June - --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:53 (UTC)&lt;br /&gt;
&lt;br /&gt;
4.1. Understand the impact of communication with minors and new users about safety in IT World.&lt;br /&gt;
&lt;br /&gt;
4.2 Understand the purpose of monitoring, filtering and controlling tools for safer internet use of minors&lt;br /&gt;
&lt;br /&gt;
4.3. Be aware of different ways to educate, monitor and control usage of social networking and other web sites.&lt;br /&gt;
&lt;br /&gt;
4.4. Be able to develop policies and applicate methods for children’s use of the computer and the Internet (depending on age and socio-cultural situation). &lt;br /&gt;
&lt;br /&gt;
4.5. Understanding advantages and limitations with protection software&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 5 SYLLABUS - Social networks and safe usage of the Internet ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;lt;b&amp;gt;We recommend change chapter name to: &amp;quot;CHAPTER 5 SYLLABUS - Social networks and safe virtual communication----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:32 (UTC)&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
New Syllabus version as discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:05 (UTC) - &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5.1. Know how to start and finish safe browsing session (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing. &lt;br /&gt;
&lt;br /&gt;
5.2. Know about advantages, disadvantages and dangers of Internet cookies and ActiveX control. Know about tools that ensure safety when browsing the Internet.  &lt;br /&gt;
&lt;br /&gt;
5.3. Be able to manage: temporary Internet files, browser history, passwords, cookies and autocomplete data. &lt;br /&gt;
&lt;br /&gt;
5.4. Be able to safely connect to e-Services and secure environments– connecting and using, recover lost passwords.&lt;br /&gt;
&lt;br /&gt;
5.5. Know when and in which cases personal information can be published on the Internet (i.e. status publishing about leaving home).&lt;br /&gt;
&lt;br /&gt;
5.6. Know who you should contact if you discovered inappropriate information about you or your related digital identities.&lt;br /&gt;
&lt;br /&gt;
5.7. Understand that you cannot fully trust content and identities on the internet. (i.e. blogs, Wikipedia, social networks, forums, etc). &lt;br /&gt;
&lt;br /&gt;
5.8. Understand 'threats of inappropriate content for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on) &lt;br /&gt;
&lt;br /&gt;
5.9. Understand what a social network is, what are opportunities and risks of social network. Age groups of using social networks. Options and parameters for information disclosure. Understand what is the fascination to disclose private information on the internet&lt;br /&gt;
&lt;br /&gt;
5.10. Know different social network types (Friendship-driven and Interest-driven) and be able to use them harmless and safe (appropriate account privacy settings). &lt;br /&gt;
&lt;br /&gt;
5.11. Know what type of information recommended to be published on social network, be responsible for published content, and know impacts &lt;br /&gt;
&lt;br /&gt;
5.12. Understand that online socializing reflects &amp;quot;real life&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
5.13. Be able to send/receive e-mail securely: know how to reject email from specific email addresses. Know how to treat email messages from unknown senders, classified as spam and email messages infected with malware. Know about scam, hoax, chain letters.&lt;br /&gt;
&lt;br /&gt;
5.14. Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information, etc.&lt;br /&gt;
&lt;br /&gt;
5.15. Understand threats of virtual communication: virtual dating, bullying, commenting. &lt;br /&gt;
&lt;br /&gt;
5.16. Understand dependency and addiction to the Internet.&lt;br /&gt;
&lt;br /&gt;
5.17. Understand what is [[Online Safety 3.0]] and why [[digital citizenship]] is protective and is the best filter ever : pre-installed, free of charge, improve with use...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Another Mind mapping=&lt;br /&gt;
&lt;br /&gt;
[[Fichier:notions-and-concepts.png|1100px|]]&lt;br /&gt;
&lt;br /&gt;
You can access to the dynamic mapp here [http://www.mindomo.com/edit.htm?m=64bf626021b940d99dd9576283c833bf notions and concepts]&lt;br /&gt;
&lt;br /&gt;
[[Proposition]]&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Discussion:Syllabus_e-safety&amp;diff=4828</id>
		<title>Discussion:Syllabus e-safety</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Discussion:Syllabus_e-safety&amp;diff=4828"/>
				<updated>2011-06-17T08:59:27Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Discussions'''&lt;br /&gt;
&lt;br /&gt;
Here is the place to make comments on the Syllabus. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Todo list =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- Focus map&lt;br /&gt;
&lt;br /&gt;
- Define number of chapters&lt;br /&gt;
&lt;br /&gt;
- Organise Items and Notions&lt;br /&gt;
&lt;br /&gt;
- Find Quiz&lt;br /&gt;
&lt;br /&gt;
- Discuss about chapter 4 --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 09:04 (UTC)&lt;br /&gt;
&lt;br /&gt;
- Give the rights on Mindomo --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 09:18 (UTC)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= General considerations =&lt;br /&gt;
&lt;br /&gt;
- One should avoid the term ''virtual'' since it deludes into thinking that things are not real. ''Electronic'' or ''online'' should be preferred&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Discussed on Thursday 16th skype meeting== &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[16/06/2011 11:04:49] Antje Moebus :  Internet use of minors - Risks and opportunities - Recommendations for peadagogues, educators and parents&lt;br /&gt;
&lt;br /&gt;
4.1 Understand the impact of communication with minors about safety in IT world 4.2 Be able to develop policies and applicate methods for minor´s use of the computer and the internet ( depending on age and on the responsibility for the minor ( school, public institution, family) 4.3 Understand the purpose of monitoring, filtering and controlling tools for safer internet use of minors 4.4 Understanding advantages and limitations with protection software&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[16/06/2011 10:53:12] Algis M.: how computer user could switch on/off integrated protection? it is administrator's job&lt;br /&gt;
teachers are not pc administrators, teacher must know the fact but not technics&lt;br /&gt;
&lt;br /&gt;
[16/06/2011 11:17:59] Algis M.: 4.3. Be aware of different ways to control usage of social networking and other web sites.  ??&lt;br /&gt;
 &amp;quot;block&amp;quot; -&amp;gt; &amp;quot;control&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[16/06/2011 11:28:52] Algis M.: In my oppinion, it is not necessary to make Chapter 5 such particular.  Every knowledge in details could be put in Syllabus Guide that have to be prepared later. It is no need to include everything in the Syllabus, - it’s enough topics be more common or connected together.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=About Items=&lt;br /&gt;
&lt;br /&gt;
===Chapter 1 - Basic knowledge on e-safety===&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Syllabus_e-safety#Basic_knowledge_on_e-safety see the chapter]&lt;br /&gt;
&lt;br /&gt;
1.1. History : from static '''web1 to''' dynamic '''web2''' environments &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --''(What are those web1, web2 and web3 environments? Is it necessary? &amp;lt;/span&amp;gt;[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 14:58 (UTC))''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.2. Intention : '''[[web3]]''' proposing constructive engagement in participatory society (or : [[security]] through light instead of old model of [[security]] through obscurity), &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;  --''(same here - we actually do not understand what is it about&amp;lt;/span&amp;gt;[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:11 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
here is a reference about obscurity: http://en.wikipedia.org/wiki/Security_through_obscurity&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.3. Know about '''equity between opportunities &amp;amp; risks''' since [[web2]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --''(if speaking about opportunities &amp;amp; risks it should be clarified - do we mean Internet? if so - it should be mentioned.[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:11 (UTC))'' &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.4. Know about '''[[netiquette]] and other basic codes''' of conducts in the cyberspace (RFC 1855) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --''(what do you mean by &amp;quot;basic codes&amp;quot;?[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:11 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.5. Know about '''[[social engineering]]''' and it’s methods, including participative culture and abuses if you don't understand/respect them, for example having your password stolen (to be reformulated) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --'')what is &amp;quot;participative culture and abuses&amp;quot;? We think that it is already included in the definition of social engineerging. We recommend to stick to version &amp;quot;Know about '''[[social engineering]]''' and it’s methods&amp;quot;.[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:23 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.6. Understand the differences of '''[[contents]]''' (functional, factual, creative) of information (I don't understand this item --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 07:51 (UTC) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --''(needs to be clarified with Theo. This item could be moved to syllabus chapter 2 - after 2.0. [[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:31 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.7. Understand the differences of '''[[formats]]''' (open, privative) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --''(there is no such word &amp;quot;privative&amp;quot;. We recommend &amp;quot;Understand the differences of data formats (open, private, business, etc.)&amp;quot; This item could be moved to syllabus chapter 2 - after 2.0. [[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:36 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.8. Understand the notion of '''[[identity]]''' &lt;br /&gt;
&lt;br /&gt;
maybe to be repositioned in some other chapter --[[Utilisateur:Remilevy|Rémi LEVY]] 9 juin 2011 à 19:49 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.9.  '''[[eTools]]''' : Product versus function &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Should be clarified--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:48 (UTC) )''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.10. Be aware of '''different identity for authorization theft methods''' (skimming, pretexting, shoulder surfing, information diving…) &lt;br /&gt;
&lt;br /&gt;
#must be repositioned into the scam/hoax (chapter 5 or 6) ?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''( We recommend to leave in this chapter--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:00 (UTC) )''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.11. Be aware of '''[[privacy protection]] legal act''' (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies and so on).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.12. '''Organizational [[security]]''' (school security) – or [[social engineering]]?, usage of school web pages, content publishing, access &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''( social engineering is already mentioned in 1.5. We recommend &amp;quot;Know about '''Organizational [[security]]''': school security, usage of school web pages, content publishing, access, etc.&amp;quot;--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:56 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Privacy and data management===&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Syllabus_e-safety#Privacy_and_data_management see the chapter]&lt;br /&gt;
&lt;br /&gt;
I suggest : to begin with &amp;quot;Distinguish between data and information&amp;quot; --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 07:49 (UTC)&lt;br /&gt;
&lt;br /&gt;
(...)&lt;br /&gt;
&lt;br /&gt;
2.7. Understand what '''[[intellectual property]]''' on Internet is and be aware of [[privacy protection]] legal act. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Privacy protection legal act is already mentioned in 1.11. Lets make this one only &amp;quot;Understand what '''[[intellectual property]]''' on Internet is.&amp;quot;--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:11 (UTC) )''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
(...)&lt;br /&gt;
&lt;br /&gt;
2.9. '''Privacy Management''' : Know how to '''start and finish safe browsing session''' (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing.&lt;br /&gt;
&lt;br /&gt;
# 2.9 to 2.11 to me merged ? --[[Utilisateur:Remilevy|Rémi LEVY]] 10 juin 2011 à 07:49 (UTC)&lt;br /&gt;
&lt;br /&gt;
: 2.10. Know how to browse the Web securable. Know about advantages, disadvantages and dangers of Internet '''cookies'''. Know about tools that ensure safety when browsing the Internet (blocking of cookies, ActiveX control, etc.)&lt;br /&gt;
&lt;br /&gt;
: 2.11. [#Privacy-RL] Be able to manage, clear temporary Internet files, browser history, passwords, cookies, and autocomplete data.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(2.9 , 2.10 , 2.11 may be consolidated and must be moved to chapter 5 --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:17 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
: ''As it is technical, I don't see why to put this on chapter 5 which is more about behaviour in social network''--[[Utilisateur:Remilevy|Rémi LEVY]] 10 juin 2011 à 07:53 (UTC)&lt;br /&gt;
&lt;br /&gt;
===Security tools and network security===&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Syllabus_e-safety#Security_tools_and_network_security see the chapter]&lt;br /&gt;
&lt;br /&gt;
see how integrate from 3.5 to 2.11 --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 07:52 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3.1. Know computer '''network types''' , &lt;br /&gt;
&lt;br /&gt;
''&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;(local area network (LAN), wide area network (WAN), virtual private network (VPN))&amp;lt;/span&amp;gt; ''and why protection is needed.--[[Utilisateur:Donarena|Renata (Lithuania Team)]] 8 juin 2011 à 16:19 (UTC)&lt;br /&gt;
&lt;br /&gt;
3.2. Know different network '''connection methods''' (Mobile networks, Wireless, Cable).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network.&amp;lt;/span&amp;gt;--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:30 (UTC)&lt;br /&gt;
&lt;br /&gt;
3.3. '''Sharing and accessing resources''' over network (Files, Printer, Screen).&lt;br /&gt;
&lt;br /&gt;
3.4. Understand '''safety means of computer networks''' (Firewall, Antivirus, Password protection, Connection encryption – wireless). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Firewall, Antivirus, Password protection, Connection encryption are all already mentioned in other items and fit there by content and integrity better. We recommend to cross this 3.4. out at all)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:36 (UTC)''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
3.5. Be able to use standard '''OS integrated protection tools'''. &lt;br /&gt;
&lt;br /&gt;
3.6. [[#see how integrate 3.5 to 2.11 : &amp;quot;'''All about  [[malware]] and intrusion protection tools'''&amp;quot; - RL]] Know what a quality anti-virus, anti-spyware, spam blocker, and personal [[firewall]] is and how to use it. (Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.), know that it is unsafe to turn [[antivirus]] software off and know consequences). Distinguish different modes of antivirus protection (active, passive…).&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.7.[#Updating operating system- RL]. Know how to follow, download and use updates for your operating system, software and importance of antivirus definition files. Understand the benefits of these updates. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.8. Distinguish different modes of antivirus protection (active, passive…).[# see also 3.6]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.9. Know what has to be done and in what order, if you suspect that computer system is infected. &lt;br /&gt;
&lt;br /&gt;
: 3.10. Distinguish infected files deletion, quarantining and curing. &lt;br /&gt;
&lt;br /&gt;
: 3.11. Informal and formal periodic external checkup. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(what do you mean by &amp;quot;checkup&amp;quot;)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:30 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Children, newcomers in schools and workplaces : means of safe use for socio-digital inclusion===&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Syllabus_e-safety#Children.2C_newcomers_in_schools_and_workplaces_:_means_of_safe_use_for_socio-digital_inclusion see the chapter]&lt;br /&gt;
&lt;br /&gt;
Have discussion.....--[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 09:05 (UTC)&lt;br /&gt;
&lt;br /&gt;
to discuss new topic :&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(what is a socio-digital inclusion? Maybe we can shorten this chapter name to &amp;quot;Children, newcomers in schools and workplaces&amp;quot;?--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:49 (UTC) )''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4.1. Understand '''the impact of communication''' with new users '''about safety''' in IT World, &lt;br /&gt;
&lt;br /&gt;
4.2. Policy : Be able to '''develop policies and applicate methods''' for children’s use of the computer and the Internet (depending on age and socio-cultural situation) &lt;br /&gt;
&lt;br /&gt;
4.3. Understand the purpose of '''monitoring, filtering and controlling tools''' against children computer usage and web browsing.&lt;br /&gt;
&lt;br /&gt;
4.4. Understanding '''advantages and limitations with protection software'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Need more items in this chapter. After consolidation in Latvia this chapter has become even shorter than it was. And it was already short :). Maybe we can try to expand again to look more like the previous version, but less stick to children, as you mentioned in Latvia)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:49 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter 5 ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
5.1. Know when and in which cases '''personal information''' can be published on the Internet, i.e. status publishing about leaving home,.&lt;br /&gt;
&lt;br /&gt;
5.2. Understand what a social network is, what are '''opportunities and risks of social network'''. Age groups of using social networks. Options and parameters for information disclosure. Understand that it is not safe to disclose information about user accounts, passwords and so on.&lt;br /&gt;
&lt;br /&gt;
5.3. Know different '''social network types''' and be able to use them harmless and safe (appropriate '''account privacy settings''').&lt;br /&gt;
&lt;br /&gt;
5.4. ('''Publishing content''')Know what type of information recommended to be published on social network, be responsible for published content, know impacts &lt;br /&gt;
&lt;br /&gt;
5.5. Be able to safely '''connect to e-Services and secure environments'''– connecting and using, recover lost passwords. &lt;br /&gt;
&lt;br /&gt;
5.6. (Emails)Be able to '''send/receive e-mail securely'''. Know how to reject email from specific email addresses. Know how to treat email messages from unknown senders&lt;br /&gt;
&lt;br /&gt;
5.7. (Spam and malware) Be able (understand) to use '''network resource controlling software and hardware'''. Know about email that is classified as spam, and email messages infected with malware. &lt;br /&gt;
&lt;br /&gt;
5.8. Be aware of network resource controlling software and hardware. Know how to reject email from specific email addresses.Know about scam, hoax, chain letters...[5.7 &amp;amp; 5.8 to be merged - RL]&lt;br /&gt;
&lt;br /&gt;
5.9. Understand threats of '''virtual communication''': virtual dating, bullying, commenting, &lt;br /&gt;
&lt;br /&gt;
5.10. '''Dependency and addiction to the Internet'''. [# to be develop - TL]&lt;br /&gt;
&lt;br /&gt;
5.11. Understand ''''threats of inappropriate content''' for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on)&lt;br /&gt;
&lt;br /&gt;
5.12. '''Reliability of information''' (Understand that it is not safe to disclose information about user accounts, passwords and so on. can not fully trust content and identities on the internet. (i.e. blogs, Wikipedia, etc).&lt;br /&gt;
&lt;br /&gt;
5.13. '''Reputation management'''. Know who you should contact if you discovered inappropriate information about you or your related digital identities. .&lt;br /&gt;
&lt;br /&gt;
5.14. '''Abuse management''', cyber bullying, cyber-mobbing, when is it possible to remove, when to put additional correct information.&lt;br /&gt;
&lt;br /&gt;
5.15. Understand that online socializing reflects &amp;quot;real life&amp;quot;&lt;br /&gt;
&lt;br /&gt;
5.16. Know about the 2 types of [[social networking]] : [[Friendship-driven]] and [[Interest-driven]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Social networks types are already mentioned in 5.3. &lt;br /&gt;
&lt;br /&gt;
Maybe it can be consolidated or is it different at all?)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 17:03 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
5.17. Understand what is [[Online Safety 3.0]] : research-based, Flexible, layered, Respectful, Positive, empowering, contextual....&lt;br /&gt;
&lt;br /&gt;
5.18. Know reputation and legal safety&lt;br /&gt;
&lt;br /&gt;
5.19. Know about identity, property and community safety&lt;br /&gt;
&lt;br /&gt;
5.20. Understand why [[digital citizenship]] is protective and is the best filter ever : pre-installed, free of charge, improve with use...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(In previous version before Latvia meeting there were items:&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information and etc.&amp;lt;br&amp;gt; &lt;br /&gt;
Know about social viruses, chain letters.&amp;lt;br&amp;gt; &lt;br /&gt;
Know threats of virtual communication (social networks, IM, e-mail and ect.): virtual dating, bullying, commenting, and dependence on the Internet.&amp;lt;br&amp;gt; &lt;br /&gt;
We could consolidate those, but we think that safe IM and social threats are important too and should be included)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:56 (UTC)''&amp;lt;/span&amp;gt;&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4827</id>
		<title>Syllabus e-safety</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4827"/>
				<updated>2011-06-17T08:53:27Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : /* CHAPTER 4 SYLLABUS - Children, newcomers in schools and workplaces : means of safe use for socio-digital inclusion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''e-GUARDIAN - Syllabus V.2.x&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
== Introduction : aims &amp;amp; resources ==&lt;br /&gt;
&lt;br /&gt;
=== Aims ===&lt;br /&gt;
This wiki page aims at facilitating a collaborative synergic process for defining the syllabus on netsafety of the EU LdV e-Guardian project.&lt;br /&gt;
Participants are delegates of partner's institutions from Lithuania, Latvia, Germany and Switzerland.&lt;br /&gt;
&lt;br /&gt;
The resources are : &lt;br /&gt;
&lt;br /&gt;
=== A web-based social bookmarking working group === &lt;br /&gt;
on [http://groups.diigo.com/group/e_safety here on Diigo],  we can post all related useful information on netsafety, such as : &lt;br /&gt;
&lt;br /&gt;
- definition of key-words&lt;br /&gt;
&lt;br /&gt;
- examples of quizz, pedagogical scenarios and other pedagogical resources&lt;br /&gt;
&lt;br /&gt;
- related scientific articles &lt;br /&gt;
&lt;br /&gt;
- other relevant initiatives&lt;br /&gt;
&lt;br /&gt;
=== Guidelines for the syllabus === &lt;br /&gt;
They wwere provided by the project's team coordinated by the LIA organisation, and specially the syllabus workpackage leader, ecdl.lt, represented by Eugenijus Telesius and his team composed of Renata Danieliene &amp;amp; Tomas Lygutas, which is complemented by partner's delegate Algimantas Merkys (LIA, the coordinator's team), Dennis Krannich (Bremen Univbersity), Théo Bondolfi &amp;amp; Rémi Lévy (APTES Switzerland). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
These guidelines are : &lt;br /&gt;
&lt;br /&gt;
1. Focus on [[e-safety]] [[offline]] as well as [[online]], therefore always taking into account basic needs (such as password storage) as well as complex needs (such as behaviour in [[web2]] environments).&lt;br /&gt;
&lt;br /&gt;
2. Taking into account all key-points in this initial version, and considering these key-point as &amp;quot;objects&amp;quot; whcih can be replaced in other forms but which must stay available.&lt;br /&gt;
&lt;br /&gt;
3. respecting the steps of user point of view (example : 1 start computer, 2 launch application...)&lt;br /&gt;
&lt;br /&gt;
4. restructuring with categories and sets like in the policies of ECDL [http://www.ecdl.org/programmes/media/ECDL_ICDL_Module_12_-_Syllabus_-_V1.0.pdf]&lt;br /&gt;
&lt;br /&gt;
5. keeping as much as possible the existing phrases and formulations, only changing (merging, repositioning, pionderating) when it suits the next step of test/scenarios&lt;br /&gt;
&lt;br /&gt;
6. Keeping in mind the final intention of '''equity between risks &amp;amp; opportunities''' proposing positive practices (opportunities, in an educative perspective) and preventing bad practices (risks, which creates fear), based on the vision of the slide 10 of [http://www.slideshare.net/Bernajean/ne-3440462 this presentation of Anne Collier], which says that netsafety3.0 should be : &lt;br /&gt;
&lt;br /&gt;
- research-based, not fearbased, therefore relevant&lt;br /&gt;
&lt;br /&gt;
- flexible &amp;amp; layered, instead of &amp;quot;one-size-fits-all&amp;quot;&lt;br /&gt;
&lt;br /&gt;
- respectful of learning culture : stakeholders in positive experience, not just potential victims&lt;br /&gt;
&lt;br /&gt;
- positive, empowering : not just safety from, but safety for...&lt;br /&gt;
&lt;br /&gt;
- full, constructive engagement in participatory society (that's the context of the construction of this syllabus)&lt;br /&gt;
&lt;br /&gt;
=== Mind mapping for the key-notions of the syllabus ===&lt;br /&gt;
&lt;br /&gt;
In addition, Rémi Levy from APTES has produced a [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea mind mapping image] to represent all the notions for the e-safety syllabus. You can access to [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea the interactive map] - You can modify it directly because we keep a copy of the precedent contribution.&lt;br /&gt;
&lt;br /&gt;
== Other possible structure of the syllabus - A.P.T.E.S proposition ==&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Proposition access to the page]&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 1 SYLLABUS - Basic knowledge on e-safety ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;NOTICE IT IS BETTER IF COMMENTS AND DISCUSSIONS ARE MADE THE DISCUSSION PAGE &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:28 (UTC)&lt;br /&gt;
&lt;br /&gt;
1.1. Understand the differences of information [[contents]] (open, private, business, etc.).&lt;br /&gt;
&lt;br /&gt;
1.2. Be aware of '''[[privacy protection]] legal act''' (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies, etc)&lt;br /&gt;
&lt;br /&gt;
1.3. Know about '''[[equity between opportunities &amp;amp; risks]]''' of [[web2]]&lt;br /&gt;
&lt;br /&gt;
1.4. Understand the notion of '''[[identity]]'''. &lt;br /&gt;
&lt;br /&gt;
1.5. Be aware of '''different identity for authorization theft methods''' (skimming, pretexting, shoulder surfing, information diving).&lt;br /&gt;
&lt;br /&gt;
1.6. Know about '''[[social engineering]]''' and it’s methods. &lt;br /&gt;
&lt;br /&gt;
1.7. Be aware of cyber crime, online predators, financial scams, harm and who to contact if discovered illegal data.&lt;br /&gt;
&lt;br /&gt;
1.8. Understand computer infection threats (viruses, Trojan horses, spyware, dishonest adware, etc.). Know when and how malicious software can get into computer system.&lt;br /&gt;
&lt;br /&gt;
1.9. Know about organizational [[security]]: school security, usage of school web pages, content publishing, access, etc. &lt;br /&gt;
&lt;br /&gt;
1.10. Know about '''[[netiquette]] and other basic codes''' of conducts in the cyberspace (RFC 1855)&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 2 SYLLABUS - Privacy and data management ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June &amp;lt;/span&amp;gt; --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:35 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2.1. [[Distinguish between data and information]].&lt;br /&gt;
&lt;br /&gt;
2.2. Understand the opportunities and risks of digital '''[[data management]]''' from fully collaborative to full privacy. &lt;br /&gt;
&lt;br /&gt;
2.3. Know about multi-layer '''[[password]]''', changing and keeping password policies. &lt;br /&gt;
&lt;br /&gt;
2.4. Know about '''safe computer [[login]] methods''' &lt;br /&gt;
&lt;br /&gt;
2.5. Know multiple user accounts on various digital environments. Understand the meaning and importance of access rights (what a personal user account is and how data of different users is separated). &lt;br /&gt;
&lt;br /&gt;
2.6. Be aware of '''data encryption''', decryption and password protected files. &lt;br /&gt;
&lt;br /&gt;
2.7. Understand what [[intellectual property]] on Internet is. &lt;br /&gt;
&lt;br /&gt;
2.8. Understand the benefits and purpose of data '''backups''' and be able to restore lost data.&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 3 SYLLABUS - Security tools and network security ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version of Lithuania Team - 2011-06-15----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:30 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3.1. Know computer '''network types''' (local area network (LAN), wide area network (WAN), virtual private network (VPN)) and why protection is needed. &lt;br /&gt;
&lt;br /&gt;
3.2. Know different network '''connection methods''' (Cable, Wireless, Mobile networks). &lt;br /&gt;
&lt;br /&gt;
3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network. &lt;br /&gt;
&lt;br /&gt;
3.4. '''Sharing and accessing resources''' over network (Files, Printer, Desktop). &lt;br /&gt;
&lt;br /&gt;
3.5. Understand safety means of computer networks (Firewall, Antivirus, Anti-spyware, Spam blocker Password protection, Connection encryption – wireless). &lt;br /&gt;
&lt;br /&gt;
3.6. Be able to use standard OS integrated protection tools. &lt;br /&gt;
&lt;br /&gt;
3.7. Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.). Distinguish different modes of antivirus protection (active, passive).&lt;br /&gt;
&lt;br /&gt;
3.8. Know what has to be done and in what order, if you suspect that computer system is infected. Distinguish infected files deletion, quarantining and curing.&lt;br /&gt;
&lt;br /&gt;
3.9. Know how to '''follow, download and use updates for your operating system''', software and importance of antivirus definition files. Understand the benefits of these updates.&lt;br /&gt;
&lt;br /&gt;
3.10. Informal and formal periodic [[external checkup]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 4 SYLLABUS - Minors and newcomers on the net == &lt;br /&gt;
&lt;br /&gt;
New Syllabus version discussed on Thursday 16th June - --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:53 (UTC)&lt;br /&gt;
&lt;br /&gt;
4.1. Understand the impact of communication with minors and new users about safety in IT World.&lt;br /&gt;
&lt;br /&gt;
4.2 Understand the purpose of monitoring, filtering and controlling tools for safer internet use of minors&lt;br /&gt;
&lt;br /&gt;
4.3. Be aware of different ways to educate, monitor and control usage of social networking and other web sites.&lt;br /&gt;
&lt;br /&gt;
4.4. Be able to develop policies and applicate methods for children’s use of the computer and the Internet (depending on age and socio-cultural situation). &lt;br /&gt;
&lt;br /&gt;
4.5. Understanding advantages and limitations with protection software&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 5 SYLLABUS - Social networks and safe usage of the Internet ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;lt;b&amp;gt;We recommend change chapter name to: &amp;quot;CHAPTER 5 SYLLABUS - Social networks and safe virtual communication----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:32 (UTC)&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
New Syllabus version of Lithuania Team - 2011-06-15----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:31 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5.1. Know how to start and finish safe browsing session (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing. &lt;br /&gt;
&lt;br /&gt;
5.2. Know about advantages, disadvantages and dangers of Internet cookies and ActiveX control. Know about tools that ensure safety when browsing the Internet.  &lt;br /&gt;
&lt;br /&gt;
5.3. Be able to manage: temporary Internet files, browser history, passwords, cookies and autocomplete data. &lt;br /&gt;
&lt;br /&gt;
5.4. Be able to safely connect to e-Services and secure environments– connecting and using, recover lost passwords.&lt;br /&gt;
&lt;br /&gt;
5.5. Know when and in which cases personal information can be published on the Internet (i.e. status publishing about leaving home).&lt;br /&gt;
&lt;br /&gt;
5.6. Know who you should contact if you discovered inappropriate information about you or your related digital identities.&lt;br /&gt;
&lt;br /&gt;
5.7. Understand that you cannot fully trust content and identities on the internet. (i.e. blogs, Wikipedia, social networks, forums, etc). &lt;br /&gt;
&lt;br /&gt;
5.8. Understand 'threats of inappropriate content for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on) &lt;br /&gt;
&lt;br /&gt;
5.9. Understand what a social network is, what are opportunities and risks of social network. Age groups of using social networks. Options and parameters for information disclosure. Understand that it is not safe to disclose information about user accounts, passwords and so on. &lt;br /&gt;
&lt;br /&gt;
5.10. Know different social network types (Friendship-driven and Interest-driven) and be able to use them harmless and safe (appropriate account privacy settings). &lt;br /&gt;
&lt;br /&gt;
5.11. Know what type of information recommended to be published on social network, be responsible for published content, and know impacts &lt;br /&gt;
&lt;br /&gt;
5.12. Understand that online socializing reflects &amp;quot;real life&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
5.13. Be able to send/receive e-mail securely: know how to reject email from specific email addresses. Know how to treat email messages from unknown senders, classified as spam and email messages infected with malware. Know about scam, hoax, chain letters.&lt;br /&gt;
&lt;br /&gt;
5.14. Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information, etc.&lt;br /&gt;
&lt;br /&gt;
5.15. Understand threats of virtual communication: virtual dating, bullying, commenting. &lt;br /&gt;
&lt;br /&gt;
5.16. Understand dependency and addiction to the Internet.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
5.1. Know when and in which cases '''personal information''' can be published on the Internet, i.e. status publishing about leaving home,.&lt;br /&gt;
&lt;br /&gt;
5.2. Understand what a social network is, what are '''opportunities and risks of social network'''. Age groups of using social networks. Options and parameters for information disclosure. Understand that it is not safe to disclose information about user accounts, passwords and so on.&lt;br /&gt;
&lt;br /&gt;
5.3. Know different '''social network types''' and be able to use them harmless and safe (appropriate '''account privacy settings''').&lt;br /&gt;
&lt;br /&gt;
5.4. ('''Publishing content''')Know what type of information recommended to be published on social network, be responsible for published content, know impacts &lt;br /&gt;
&lt;br /&gt;
5.5. Be able to safely '''connect to e-Services and secure environments'''– connecting and using, recover lost passwords. &lt;br /&gt;
&lt;br /&gt;
5.6. (Emails)Be able to '''send/receive e-mail securely'''. Know how to reject email from specific email addresses. Know how to treat email messages from unknown senders&lt;br /&gt;
&lt;br /&gt;
5.7. (Spam and malware) Be able (understand) to use '''network resource controlling software and hardware'''. Know about email that is classified as spam, and email messages infected with malware. &lt;br /&gt;
&lt;br /&gt;
5.8. Be aware of network resource controlling software and hardware. Know how to reject email from specific email addresses.Know about scam, hoax, chain letters...[5.7 &amp;amp; 5.8 to be merged - RL]&lt;br /&gt;
&lt;br /&gt;
5.9. Understand threats of '''virtual communication''': virtual dating, bullying, commenting, &lt;br /&gt;
&lt;br /&gt;
5.10. '''Dependency and addiction to the Internet'''. [# to be develop - TL]&lt;br /&gt;
&lt;br /&gt;
5.11. Understand ''''threats of inappropriate content''' for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on)&lt;br /&gt;
&lt;br /&gt;
5.12. '''Reliability of information''' (Understand that it is not safe to disclose information about user accounts, passwords and so on. can not fully trust content and identities on the internet. (i.e. blogs, Wikipedia, etc).&lt;br /&gt;
&lt;br /&gt;
5.13. '''Reputation management'''. Know who you should contact if you discovered inappropriate information about you or your related digital identities. .&lt;br /&gt;
&lt;br /&gt;
5.14. '''Abuse management''', cyber bullying, cyber-mobbing, when is it possible to remove, when to put additional correct information.&lt;br /&gt;
&lt;br /&gt;
5.15. Understand that online socializing reflects &amp;quot;real life&amp;quot;&lt;br /&gt;
&lt;br /&gt;
5.16. Know about the 2 types of [[social networking]] : [[Friendship-driven]] and [[Interest-driven]] &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Social networks types are already mentioned in 5.3. Maybe it can be consolidated or is it different at all?)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 17:03 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
5.17. Understand what is [[Online Safety 3.0]] : research-based, Flexible, layered, Respectful, Positive, empowering, contextual....&lt;br /&gt;
&lt;br /&gt;
5.18. Know reputation and legal safety&lt;br /&gt;
&lt;br /&gt;
5.19. Know about identity, property and community safety&lt;br /&gt;
&lt;br /&gt;
5.20. Understand why [[digital citizenship]] is protective and is the best filter ever : pre-installed, free of charge, improve with use...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(In previous version before Latvia meeting there were items:&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information and etc.&amp;lt;br&amp;gt; &lt;br /&gt;
Know about social viruses, chain letters.&amp;lt;br&amp;gt; &lt;br /&gt;
Know threats of virtual communication (social networks, IM, e-mail and ect.): virtual dating, bullying, commenting, and dependence on the Internet.&amp;lt;br&amp;gt; &lt;br /&gt;
We could consolidate those, but we think that safe IM and social threats are important too and should be included)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:56 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Another Mind mapping=&lt;br /&gt;
&lt;br /&gt;
[[Fichier:notions-and-concepts.png|1100px|]]&lt;br /&gt;
&lt;br /&gt;
You can access to the dynamic mapp here [http://www.mindomo.com/edit.htm?m=64bf626021b940d99dd9576283c833bf notions and concepts]&lt;br /&gt;
&lt;br /&gt;
[[Proposition]]&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4826</id>
		<title>Syllabus e-safety</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4826"/>
				<updated>2011-06-17T08:42:26Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : /* CHAPTER 3 SYLLABUS - Security tools and network security */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''e-GUARDIAN - Syllabus V.2.x&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
== Introduction : aims &amp;amp; resources ==&lt;br /&gt;
&lt;br /&gt;
=== Aims ===&lt;br /&gt;
This wiki page aims at facilitating a collaborative synergic process for defining the syllabus on netsafety of the EU LdV e-Guardian project.&lt;br /&gt;
Participants are delegates of partner's institutions from Lithuania, Latvia, Germany and Switzerland.&lt;br /&gt;
&lt;br /&gt;
The resources are : &lt;br /&gt;
&lt;br /&gt;
=== A web-based social bookmarking working group === &lt;br /&gt;
on [http://groups.diigo.com/group/e_safety here on Diigo],  we can post all related useful information on netsafety, such as : &lt;br /&gt;
&lt;br /&gt;
- definition of key-words&lt;br /&gt;
&lt;br /&gt;
- examples of quizz, pedagogical scenarios and other pedagogical resources&lt;br /&gt;
&lt;br /&gt;
- related scientific articles &lt;br /&gt;
&lt;br /&gt;
- other relevant initiatives&lt;br /&gt;
&lt;br /&gt;
=== Guidelines for the syllabus === &lt;br /&gt;
They wwere provided by the project's team coordinated by the LIA organisation, and specially the syllabus workpackage leader, ecdl.lt, represented by Eugenijus Telesius and his team composed of Renata Danieliene &amp;amp; Tomas Lygutas, which is complemented by partner's delegate Algimantas Merkys (LIA, the coordinator's team), Dennis Krannich (Bremen Univbersity), Théo Bondolfi &amp;amp; Rémi Lévy (APTES Switzerland). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
These guidelines are : &lt;br /&gt;
&lt;br /&gt;
1. Focus on [[e-safety]] [[offline]] as well as [[online]], therefore always taking into account basic needs (such as password storage) as well as complex needs (such as behaviour in [[web2]] environments).&lt;br /&gt;
&lt;br /&gt;
2. Taking into account all key-points in this initial version, and considering these key-point as &amp;quot;objects&amp;quot; whcih can be replaced in other forms but which must stay available.&lt;br /&gt;
&lt;br /&gt;
3. respecting the steps of user point of view (example : 1 start computer, 2 launch application...)&lt;br /&gt;
&lt;br /&gt;
4. restructuring with categories and sets like in the policies of ECDL [http://www.ecdl.org/programmes/media/ECDL_ICDL_Module_12_-_Syllabus_-_V1.0.pdf]&lt;br /&gt;
&lt;br /&gt;
5. keeping as much as possible the existing phrases and formulations, only changing (merging, repositioning, pionderating) when it suits the next step of test/scenarios&lt;br /&gt;
&lt;br /&gt;
6. Keeping in mind the final intention of '''equity between risks &amp;amp; opportunities''' proposing positive practices (opportunities, in an educative perspective) and preventing bad practices (risks, which creates fear), based on the vision of the slide 10 of [http://www.slideshare.net/Bernajean/ne-3440462 this presentation of Anne Collier], which says that netsafety3.0 should be : &lt;br /&gt;
&lt;br /&gt;
- research-based, not fearbased, therefore relevant&lt;br /&gt;
&lt;br /&gt;
- flexible &amp;amp; layered, instead of &amp;quot;one-size-fits-all&amp;quot;&lt;br /&gt;
&lt;br /&gt;
- respectful of learning culture : stakeholders in positive experience, not just potential victims&lt;br /&gt;
&lt;br /&gt;
- positive, empowering : not just safety from, but safety for...&lt;br /&gt;
&lt;br /&gt;
- full, constructive engagement in participatory society (that's the context of the construction of this syllabus)&lt;br /&gt;
&lt;br /&gt;
=== Mind mapping for the key-notions of the syllabus ===&lt;br /&gt;
&lt;br /&gt;
In addition, Rémi Levy from APTES has produced a [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea mind mapping image] to represent all the notions for the e-safety syllabus. You can access to [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea the interactive map] - You can modify it directly because we keep a copy of the precedent contribution.&lt;br /&gt;
&lt;br /&gt;
== Other possible structure of the syllabus - A.P.T.E.S proposition ==&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Proposition access to the page]&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 1 SYLLABUS - Basic knowledge on e-safety ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;NOTICE IT IS BETTER IF COMMENTS AND DISCUSSIONS ARE MADE THE DISCUSSION PAGE &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:28 (UTC)&lt;br /&gt;
&lt;br /&gt;
1.1. Understand the differences of information [[contents]] (open, private, business, etc.).&lt;br /&gt;
&lt;br /&gt;
1.2. Be aware of '''[[privacy protection]] legal act''' (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies, etc)&lt;br /&gt;
&lt;br /&gt;
1.3. Know about '''[[equity between opportunities &amp;amp; risks]]''' of [[web2]]&lt;br /&gt;
&lt;br /&gt;
1.4. Understand the notion of '''[[identity]]'''. &lt;br /&gt;
&lt;br /&gt;
1.5. Be aware of '''different identity for authorization theft methods''' (skimming, pretexting, shoulder surfing, information diving).&lt;br /&gt;
&lt;br /&gt;
1.6. Know about '''[[social engineering]]''' and it’s methods. &lt;br /&gt;
&lt;br /&gt;
1.7. Be aware of cyber crime, online predators, financial scams, harm and who to contact if discovered illegal data.&lt;br /&gt;
&lt;br /&gt;
1.8. Understand computer infection threats (viruses, Trojan horses, spyware, dishonest adware, etc.). Know when and how malicious software can get into computer system.&lt;br /&gt;
&lt;br /&gt;
1.9. Know about organizational [[security]]: school security, usage of school web pages, content publishing, access, etc. &lt;br /&gt;
&lt;br /&gt;
1.10. Know about '''[[netiquette]] and other basic codes''' of conducts in the cyberspace (RFC 1855)&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 2 SYLLABUS - Privacy and data management ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June &amp;lt;/span&amp;gt; --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:35 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2.1. [[Distinguish between data and information]].&lt;br /&gt;
&lt;br /&gt;
2.2. Understand the opportunities and risks of digital '''[[data management]]''' from fully collaborative to full privacy. &lt;br /&gt;
&lt;br /&gt;
2.3. Know about multi-layer '''[[password]]''', changing and keeping password policies. &lt;br /&gt;
&lt;br /&gt;
2.4. Know about '''safe computer [[login]] methods''' &lt;br /&gt;
&lt;br /&gt;
2.5. Know multiple user accounts on various digital environments. Understand the meaning and importance of access rights (what a personal user account is and how data of different users is separated). &lt;br /&gt;
&lt;br /&gt;
2.6. Be aware of '''data encryption''', decryption and password protected files. &lt;br /&gt;
&lt;br /&gt;
2.7. Understand what [[intellectual property]] on Internet is. &lt;br /&gt;
&lt;br /&gt;
2.8. Understand the benefits and purpose of data '''backups''' and be able to restore lost data.&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 3 SYLLABUS - Security tools and network security ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version of Lithuania Team - 2011-06-15----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:30 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3.1. Know computer '''network types''' (local area network (LAN), wide area network (WAN), virtual private network (VPN)) and why protection is needed. &lt;br /&gt;
&lt;br /&gt;
3.2. Know different network '''connection methods''' (Cable, Wireless, Mobile networks). &lt;br /&gt;
&lt;br /&gt;
3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network. &lt;br /&gt;
&lt;br /&gt;
3.4. '''Sharing and accessing resources''' over network (Files, Printer, Desktop). &lt;br /&gt;
&lt;br /&gt;
3.5. Understand safety means of computer networks (Firewall, Antivirus, Anti-spyware, Spam blocker Password protection, Connection encryption – wireless). &lt;br /&gt;
&lt;br /&gt;
3.6. Be able to use standard OS integrated protection tools. &lt;br /&gt;
&lt;br /&gt;
3.7. Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.). Distinguish different modes of antivirus protection (active, passive).&lt;br /&gt;
&lt;br /&gt;
3.8. Know what has to be done and in what order, if you suspect that computer system is infected. Distinguish infected files deletion, quarantining and curing.&lt;br /&gt;
&lt;br /&gt;
3.9. Know how to '''follow, download and use updates for your operating system''', software and importance of antivirus definition files. Understand the benefits of these updates.&lt;br /&gt;
&lt;br /&gt;
3.10. Informal and formal periodic [[external checkup]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 4 SYLLABUS - Children, newcomers in schools and workplaces : means of safe use for socio-digital inclusion == &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;--We recommend to shorten chapter name: CHAPTER 4 SYLLABUS - Children, newcomers in schools and workplaces&amp;lt;/b&amp;gt; ----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:32 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
New Syllabus version of Lithuania Team - 2011-06-15----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:30 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
4.1. Understand the impact of communication with new users about safety in IT World.&lt;br /&gt;
&lt;br /&gt;
4.2. Understand the purpose of monitoring, filtering and controlling tools against children computer usage and web browsing. &lt;br /&gt;
&lt;br /&gt;
4.3. Be aware of different ways to block social networking and other web sites.&lt;br /&gt;
&lt;br /&gt;
4.4. Be able to develop policies and applicate methods for children’s use of the computer and the Internet (depending on age and socio-cultural situation). &lt;br /&gt;
&lt;br /&gt;
4.5.Understanding advantages and limitations of protection software. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(what is a socio-digital inclusion? Maybe we can shorten this chapter name to &amp;quot;Children, newcomers in schools and workplaces&amp;quot;?--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:49 (UTC) )''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4.1. Understand '''the impact of communication''' with new users '''about safety''' in IT World, &lt;br /&gt;
&lt;br /&gt;
4.2. Policy : Be able to '''develop policies and applicate methods''' for children’s use of the computer and the Internet (depending on age and socio-cultural situation) &lt;br /&gt;
&lt;br /&gt;
4.3. Understand the purpose of '''monitoring, filtering and controlling tools''' against children computer usage and web browsing.&lt;br /&gt;
&lt;br /&gt;
4.4. Understanding '''advantages and limitations with protection software'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Need more items in this chapter. After consolidation in Latvia this chapter has become even shorter than it was. And it was already short :). Maybe we can try to expand again to look more like the previous version, but less stick to children, as you mentioned in Latvia)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:49 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 5 SYLLABUS - Social networks and safe usage of the Internet ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;lt;b&amp;gt;We recommend change chapter name to: &amp;quot;CHAPTER 5 SYLLABUS - Social networks and safe virtual communication----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:32 (UTC)&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
New Syllabus version of Lithuania Team - 2011-06-15----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:31 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5.1. Know how to start and finish safe browsing session (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing. &lt;br /&gt;
&lt;br /&gt;
5.2. Know about advantages, disadvantages and dangers of Internet cookies and ActiveX control. Know about tools that ensure safety when browsing the Internet.  &lt;br /&gt;
&lt;br /&gt;
5.3. Be able to manage: temporary Internet files, browser history, passwords, cookies and autocomplete data. &lt;br /&gt;
&lt;br /&gt;
5.4. Be able to safely connect to e-Services and secure environments– connecting and using, recover lost passwords.&lt;br /&gt;
&lt;br /&gt;
5.5. Know when and in which cases personal information can be published on the Internet (i.e. status publishing about leaving home).&lt;br /&gt;
&lt;br /&gt;
5.6. Know who you should contact if you discovered inappropriate information about you or your related digital identities.&lt;br /&gt;
&lt;br /&gt;
5.7. Understand that you cannot fully trust content and identities on the internet. (i.e. blogs, Wikipedia, social networks, forums, etc). &lt;br /&gt;
&lt;br /&gt;
5.8. Understand 'threats of inappropriate content for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on) &lt;br /&gt;
&lt;br /&gt;
5.9. Understand what a social network is, what are opportunities and risks of social network. Age groups of using social networks. Options and parameters for information disclosure. Understand that it is not safe to disclose information about user accounts, passwords and so on. &lt;br /&gt;
&lt;br /&gt;
5.10. Know different social network types (Friendship-driven and Interest-driven) and be able to use them harmless and safe (appropriate account privacy settings). &lt;br /&gt;
&lt;br /&gt;
5.11. Know what type of information recommended to be published on social network, be responsible for published content, and know impacts &lt;br /&gt;
&lt;br /&gt;
5.12. Understand that online socializing reflects &amp;quot;real life&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
5.13. Be able to send/receive e-mail securely: know how to reject email from specific email addresses. Know how to treat email messages from unknown senders, classified as spam and email messages infected with malware. Know about scam, hoax, chain letters.&lt;br /&gt;
&lt;br /&gt;
5.14. Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information, etc.&lt;br /&gt;
&lt;br /&gt;
5.15. Understand threats of virtual communication: virtual dating, bullying, commenting. &lt;br /&gt;
&lt;br /&gt;
5.16. Understand dependency and addiction to the Internet.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
5.1. Know when and in which cases '''personal information''' can be published on the Internet, i.e. status publishing about leaving home,.&lt;br /&gt;
&lt;br /&gt;
5.2. Understand what a social network is, what are '''opportunities and risks of social network'''. Age groups of using social networks. Options and parameters for information disclosure. Understand that it is not safe to disclose information about user accounts, passwords and so on.&lt;br /&gt;
&lt;br /&gt;
5.3. Know different '''social network types''' and be able to use them harmless and safe (appropriate '''account privacy settings''').&lt;br /&gt;
&lt;br /&gt;
5.4. ('''Publishing content''')Know what type of information recommended to be published on social network, be responsible for published content, know impacts &lt;br /&gt;
&lt;br /&gt;
5.5. Be able to safely '''connect to e-Services and secure environments'''– connecting and using, recover lost passwords. &lt;br /&gt;
&lt;br /&gt;
5.6. (Emails)Be able to '''send/receive e-mail securely'''. Know how to reject email from specific email addresses. Know how to treat email messages from unknown senders&lt;br /&gt;
&lt;br /&gt;
5.7. (Spam and malware) Be able (understand) to use '''network resource controlling software and hardware'''. Know about email that is classified as spam, and email messages infected with malware. &lt;br /&gt;
&lt;br /&gt;
5.8. Be aware of network resource controlling software and hardware. Know how to reject email from specific email addresses.Know about scam, hoax, chain letters...[5.7 &amp;amp; 5.8 to be merged - RL]&lt;br /&gt;
&lt;br /&gt;
5.9. Understand threats of '''virtual communication''': virtual dating, bullying, commenting, &lt;br /&gt;
&lt;br /&gt;
5.10. '''Dependency and addiction to the Internet'''. [# to be develop - TL]&lt;br /&gt;
&lt;br /&gt;
5.11. Understand ''''threats of inappropriate content''' for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on)&lt;br /&gt;
&lt;br /&gt;
5.12. '''Reliability of information''' (Understand that it is not safe to disclose information about user accounts, passwords and so on. can not fully trust content and identities on the internet. (i.e. blogs, Wikipedia, etc).&lt;br /&gt;
&lt;br /&gt;
5.13. '''Reputation management'''. Know who you should contact if you discovered inappropriate information about you or your related digital identities. .&lt;br /&gt;
&lt;br /&gt;
5.14. '''Abuse management''', cyber bullying, cyber-mobbing, when is it possible to remove, when to put additional correct information.&lt;br /&gt;
&lt;br /&gt;
5.15. Understand that online socializing reflects &amp;quot;real life&amp;quot;&lt;br /&gt;
&lt;br /&gt;
5.16. Know about the 2 types of [[social networking]] : [[Friendship-driven]] and [[Interest-driven]] &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Social networks types are already mentioned in 5.3. Maybe it can be consolidated or is it different at all?)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 17:03 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
5.17. Understand what is [[Online Safety 3.0]] : research-based, Flexible, layered, Respectful, Positive, empowering, contextual....&lt;br /&gt;
&lt;br /&gt;
5.18. Know reputation and legal safety&lt;br /&gt;
&lt;br /&gt;
5.19. Know about identity, property and community safety&lt;br /&gt;
&lt;br /&gt;
5.20. Understand why [[digital citizenship]] is protective and is the best filter ever : pre-installed, free of charge, improve with use...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(In previous version before Latvia meeting there were items:&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information and etc.&amp;lt;br&amp;gt; &lt;br /&gt;
Know about social viruses, chain letters.&amp;lt;br&amp;gt; &lt;br /&gt;
Know threats of virtual communication (social networks, IM, e-mail and ect.): virtual dating, bullying, commenting, and dependence on the Internet.&amp;lt;br&amp;gt; &lt;br /&gt;
We could consolidate those, but we think that safe IM and social threats are important too and should be included)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:56 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Another Mind mapping=&lt;br /&gt;
&lt;br /&gt;
[[Fichier:notions-and-concepts.png|1100px|]]&lt;br /&gt;
&lt;br /&gt;
You can access to the dynamic mapp here [http://www.mindomo.com/edit.htm?m=64bf626021b940d99dd9576283c833bf notions and concepts]&lt;br /&gt;
&lt;br /&gt;
[[Proposition]]&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4825</id>
		<title>Syllabus e-safety</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4825"/>
				<updated>2011-06-17T08:35:55Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : /* CHAPTER 2 SYLLABUS - Privacy and data management */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''e-GUARDIAN - Syllabus V.2.x&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
== Introduction : aims &amp;amp; resources ==&lt;br /&gt;
&lt;br /&gt;
=== Aims ===&lt;br /&gt;
This wiki page aims at facilitating a collaborative synergic process for defining the syllabus on netsafety of the EU LdV e-Guardian project.&lt;br /&gt;
Participants are delegates of partner's institutions from Lithuania, Latvia, Germany and Switzerland.&lt;br /&gt;
&lt;br /&gt;
The resources are : &lt;br /&gt;
&lt;br /&gt;
=== A web-based social bookmarking working group === &lt;br /&gt;
on [http://groups.diigo.com/group/e_safety here on Diigo],  we can post all related useful information on netsafety, such as : &lt;br /&gt;
&lt;br /&gt;
- definition of key-words&lt;br /&gt;
&lt;br /&gt;
- examples of quizz, pedagogical scenarios and other pedagogical resources&lt;br /&gt;
&lt;br /&gt;
- related scientific articles &lt;br /&gt;
&lt;br /&gt;
- other relevant initiatives&lt;br /&gt;
&lt;br /&gt;
=== Guidelines for the syllabus === &lt;br /&gt;
They wwere provided by the project's team coordinated by the LIA organisation, and specially the syllabus workpackage leader, ecdl.lt, represented by Eugenijus Telesius and his team composed of Renata Danieliene &amp;amp; Tomas Lygutas, which is complemented by partner's delegate Algimantas Merkys (LIA, the coordinator's team), Dennis Krannich (Bremen Univbersity), Théo Bondolfi &amp;amp; Rémi Lévy (APTES Switzerland). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
These guidelines are : &lt;br /&gt;
&lt;br /&gt;
1. Focus on [[e-safety]] [[offline]] as well as [[online]], therefore always taking into account basic needs (such as password storage) as well as complex needs (such as behaviour in [[web2]] environments).&lt;br /&gt;
&lt;br /&gt;
2. Taking into account all key-points in this initial version, and considering these key-point as &amp;quot;objects&amp;quot; whcih can be replaced in other forms but which must stay available.&lt;br /&gt;
&lt;br /&gt;
3. respecting the steps of user point of view (example : 1 start computer, 2 launch application...)&lt;br /&gt;
&lt;br /&gt;
4. restructuring with categories and sets like in the policies of ECDL [http://www.ecdl.org/programmes/media/ECDL_ICDL_Module_12_-_Syllabus_-_V1.0.pdf]&lt;br /&gt;
&lt;br /&gt;
5. keeping as much as possible the existing phrases and formulations, only changing (merging, repositioning, pionderating) when it suits the next step of test/scenarios&lt;br /&gt;
&lt;br /&gt;
6. Keeping in mind the final intention of '''equity between risks &amp;amp; opportunities''' proposing positive practices (opportunities, in an educative perspective) and preventing bad practices (risks, which creates fear), based on the vision of the slide 10 of [http://www.slideshare.net/Bernajean/ne-3440462 this presentation of Anne Collier], which says that netsafety3.0 should be : &lt;br /&gt;
&lt;br /&gt;
- research-based, not fearbased, therefore relevant&lt;br /&gt;
&lt;br /&gt;
- flexible &amp;amp; layered, instead of &amp;quot;one-size-fits-all&amp;quot;&lt;br /&gt;
&lt;br /&gt;
- respectful of learning culture : stakeholders in positive experience, not just potential victims&lt;br /&gt;
&lt;br /&gt;
- positive, empowering : not just safety from, but safety for...&lt;br /&gt;
&lt;br /&gt;
- full, constructive engagement in participatory society (that's the context of the construction of this syllabus)&lt;br /&gt;
&lt;br /&gt;
=== Mind mapping for the key-notions of the syllabus ===&lt;br /&gt;
&lt;br /&gt;
In addition, Rémi Levy from APTES has produced a [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea mind mapping image] to represent all the notions for the e-safety syllabus. You can access to [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea the interactive map] - You can modify it directly because we keep a copy of the precedent contribution.&lt;br /&gt;
&lt;br /&gt;
== Other possible structure of the syllabus - A.P.T.E.S proposition ==&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Proposition access to the page]&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 1 SYLLABUS - Basic knowledge on e-safety ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;NOTICE IT IS BETTER IF COMMENTS AND DISCUSSIONS ARE MADE THE DISCUSSION PAGE &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:28 (UTC)&lt;br /&gt;
&lt;br /&gt;
1.1. Understand the differences of information [[contents]] (open, private, business, etc.).&lt;br /&gt;
&lt;br /&gt;
1.2. Be aware of '''[[privacy protection]] legal act''' (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies, etc)&lt;br /&gt;
&lt;br /&gt;
1.3. Know about '''[[equity between opportunities &amp;amp; risks]]''' of [[web2]]&lt;br /&gt;
&lt;br /&gt;
1.4. Understand the notion of '''[[identity]]'''. &lt;br /&gt;
&lt;br /&gt;
1.5. Be aware of '''different identity for authorization theft methods''' (skimming, pretexting, shoulder surfing, information diving).&lt;br /&gt;
&lt;br /&gt;
1.6. Know about '''[[social engineering]]''' and it’s methods. &lt;br /&gt;
&lt;br /&gt;
1.7. Be aware of cyber crime, online predators, financial scams, harm and who to contact if discovered illegal data.&lt;br /&gt;
&lt;br /&gt;
1.8. Understand computer infection threats (viruses, Trojan horses, spyware, dishonest adware, etc.). Know when and how malicious software can get into computer system.&lt;br /&gt;
&lt;br /&gt;
1.9. Know about organizational [[security]]: school security, usage of school web pages, content publishing, access, etc. &lt;br /&gt;
&lt;br /&gt;
1.10. Know about '''[[netiquette]] and other basic codes''' of conducts in the cyberspace (RFC 1855)&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 2 SYLLABUS - Privacy and data management ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June &amp;lt;/span&amp;gt; --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:35 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2.1. [[Distinguish between data and information]].&lt;br /&gt;
&lt;br /&gt;
2.2. Understand the opportunities and risks of digital '''[[data management]]''' from fully collaborative to full privacy. &lt;br /&gt;
&lt;br /&gt;
2.3. Know about multi-layer '''[[password]]''', changing and keeping password policies. &lt;br /&gt;
&lt;br /&gt;
2.4. Know about '''safe computer [[login]] methods''' &lt;br /&gt;
&lt;br /&gt;
2.5. Know multiple user accounts on various digital environments. Understand the meaning and importance of access rights (what a personal user account is and how data of different users is separated). &lt;br /&gt;
&lt;br /&gt;
2.6. Be aware of '''data encryption''', decryption and password protected files. &lt;br /&gt;
&lt;br /&gt;
2.7. Understand what [[intellectual property]] on Internet is. &lt;br /&gt;
&lt;br /&gt;
2.8. Understand the benefits and purpose of data '''backups''' and be able to restore lost data.&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 3 SYLLABUS - Security tools and network security ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version of Lithuania Team - 2011-06-15----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:30 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3.1. Know computer network types (local area network (LAN), wide area network (WAN), virtual private network (VPN)) and why protection is needed. &lt;br /&gt;
&lt;br /&gt;
3.2. Know different network connection methods (Cable, Wireless, Mobile networks). &lt;br /&gt;
&lt;br /&gt;
3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network. &lt;br /&gt;
&lt;br /&gt;
3.4. Sharing and accessing resources over network (Files, Printer, Desktop). &lt;br /&gt;
&lt;br /&gt;
3.5. Understand safety means of computer networks (Firewall, Antivirus, Anti-spyware, Spam blocker Password protection, Connection encryption – wireless). &lt;br /&gt;
&lt;br /&gt;
3.6. Be able to use standard OS integrated protection tools. &lt;br /&gt;
&lt;br /&gt;
3.7. Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.). Distinguish different modes of antivirus protection (active, passive).&lt;br /&gt;
&lt;br /&gt;
3.8. Know what has to be done and in what order, if you suspect that computer system is infected. Distinguish infected files deletion, quarantining and curing.&lt;br /&gt;
&lt;br /&gt;
3.9. Know how to follow, download and use updates for your operating system, software and importance of antivirus definition files. Understand the benefits of these updates.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
3.1. Know computer '''network types''' , ''&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;(local area network (LAN), wide area network (WAN), virtual private network (VPN))&amp;lt;/span&amp;gt; ''and why protection is needed.--[[Utilisateur:Donarena|Renata (Lithuania Team)]] 8 juin 2011 à 16:19 (UTC)&lt;br /&gt;
&lt;br /&gt;
3.2. Know different network '''connection methods''' (Mobile networks, Wireless, Cable).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network.&amp;lt;/span&amp;gt;--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:30 (UTC)&lt;br /&gt;
&lt;br /&gt;
3.3. '''Sharing and accessing resources''' over network (Files, Printer, Screen).&lt;br /&gt;
&lt;br /&gt;
3.4. Understand '''safety means of computer networks''' (Firewall, Antivirus, Password protection, Connection encryption – wireless). &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Firewall, Antivirus, Password protection, Connection encryption are all already mentioned in other items and fit there by content and integrity better. We recommend to cross this 3.4. out at all)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:36 (UTC)''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
3.5. Be able to use standard '''OS integrated protection tools'''. &lt;br /&gt;
&lt;br /&gt;
3.6. [[#see how integrate 3.5 to 2.11 : &amp;quot;'''All about  [[malware]] and intrusion protection tools'''&amp;quot; - RL]] Know what a quality anti-virus, anti-spyware, spam blocker, and personal [[firewall]] is and how to use it. (Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.), know that it is unsafe to turn [[antivirus]] software off and know consequences). Distinguish different modes of antivirus protection (active, passive…). &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.7.[#Updating operating system- RL]. Know how to follow, download and use updates for your operating system, software and importance of antivirus definition files. Understand the benefits of these updates. &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.8. Distinguish different modes of antivirus protection (active, passive…).[# see also 3.6]&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.9. Know what has to be done and in what order, if you suspect that computer system is infected. &lt;br /&gt;
&lt;br /&gt;
: 3.10. Distinguish infected files deletion, quarantining and curing. &lt;br /&gt;
&lt;br /&gt;
: 3.11. Informal and formal periodic external checkup. &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(what do you mean by &amp;quot;checkup&amp;quot;)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:30 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 4 SYLLABUS - Children, newcomers in schools and workplaces : means of safe use for socio-digital inclusion == &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;--We recommend to shorten chapter name: CHAPTER 4 SYLLABUS - Children, newcomers in schools and workplaces&amp;lt;/b&amp;gt; ----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:32 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
New Syllabus version of Lithuania Team - 2011-06-15----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:30 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
4.1. Understand the impact of communication with new users about safety in IT World.&lt;br /&gt;
&lt;br /&gt;
4.2. Understand the purpose of monitoring, filtering and controlling tools against children computer usage and web browsing. &lt;br /&gt;
&lt;br /&gt;
4.3. Be aware of different ways to block social networking and other web sites.&lt;br /&gt;
&lt;br /&gt;
4.4. Be able to develop policies and applicate methods for children’s use of the computer and the Internet (depending on age and socio-cultural situation). &lt;br /&gt;
&lt;br /&gt;
4.5.Understanding advantages and limitations of protection software. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(what is a socio-digital inclusion? Maybe we can shorten this chapter name to &amp;quot;Children, newcomers in schools and workplaces&amp;quot;?--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:49 (UTC) )''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4.1. Understand '''the impact of communication''' with new users '''about safety''' in IT World, &lt;br /&gt;
&lt;br /&gt;
4.2. Policy : Be able to '''develop policies and applicate methods''' for children’s use of the computer and the Internet (depending on age and socio-cultural situation) &lt;br /&gt;
&lt;br /&gt;
4.3. Understand the purpose of '''monitoring, filtering and controlling tools''' against children computer usage and web browsing.&lt;br /&gt;
&lt;br /&gt;
4.4. Understanding '''advantages and limitations with protection software'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Need more items in this chapter. After consolidation in Latvia this chapter has become even shorter than it was. And it was already short :). Maybe we can try to expand again to look more like the previous version, but less stick to children, as you mentioned in Latvia)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:49 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 5 SYLLABUS - Social networks and safe usage of the Internet ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;lt;b&amp;gt;We recommend change chapter name to: &amp;quot;CHAPTER 5 SYLLABUS - Social networks and safe virtual communication----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:32 (UTC)&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
New Syllabus version of Lithuania Team - 2011-06-15----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:31 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5.1. Know how to start and finish safe browsing session (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing. &lt;br /&gt;
&lt;br /&gt;
5.2. Know about advantages, disadvantages and dangers of Internet cookies and ActiveX control. Know about tools that ensure safety when browsing the Internet.  &lt;br /&gt;
&lt;br /&gt;
5.3. Be able to manage: temporary Internet files, browser history, passwords, cookies and autocomplete data. &lt;br /&gt;
&lt;br /&gt;
5.4. Be able to safely connect to e-Services and secure environments– connecting and using, recover lost passwords.&lt;br /&gt;
&lt;br /&gt;
5.5. Know when and in which cases personal information can be published on the Internet (i.e. status publishing about leaving home).&lt;br /&gt;
&lt;br /&gt;
5.6. Know who you should contact if you discovered inappropriate information about you or your related digital identities.&lt;br /&gt;
&lt;br /&gt;
5.7. Understand that you cannot fully trust content and identities on the internet. (i.e. blogs, Wikipedia, social networks, forums, etc). &lt;br /&gt;
&lt;br /&gt;
5.8. Understand 'threats of inappropriate content for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on) &lt;br /&gt;
&lt;br /&gt;
5.9. Understand what a social network is, what are opportunities and risks of social network. Age groups of using social networks. Options and parameters for information disclosure. Understand that it is not safe to disclose information about user accounts, passwords and so on. &lt;br /&gt;
&lt;br /&gt;
5.10. Know different social network types (Friendship-driven and Interest-driven) and be able to use them harmless and safe (appropriate account privacy settings). &lt;br /&gt;
&lt;br /&gt;
5.11. Know what type of information recommended to be published on social network, be responsible for published content, and know impacts &lt;br /&gt;
&lt;br /&gt;
5.12. Understand that online socializing reflects &amp;quot;real life&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
5.13. Be able to send/receive e-mail securely: know how to reject email from specific email addresses. Know how to treat email messages from unknown senders, classified as spam and email messages infected with malware. Know about scam, hoax, chain letters.&lt;br /&gt;
&lt;br /&gt;
5.14. Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information, etc.&lt;br /&gt;
&lt;br /&gt;
5.15. Understand threats of virtual communication: virtual dating, bullying, commenting. &lt;br /&gt;
&lt;br /&gt;
5.16. Understand dependency and addiction to the Internet.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
5.1. Know when and in which cases '''personal information''' can be published on the Internet, i.e. status publishing about leaving home,.&lt;br /&gt;
&lt;br /&gt;
5.2. Understand what a social network is, what are '''opportunities and risks of social network'''. Age groups of using social networks. Options and parameters for information disclosure. Understand that it is not safe to disclose information about user accounts, passwords and so on.&lt;br /&gt;
&lt;br /&gt;
5.3. Know different '''social network types''' and be able to use them harmless and safe (appropriate '''account privacy settings''').&lt;br /&gt;
&lt;br /&gt;
5.4. ('''Publishing content''')Know what type of information recommended to be published on social network, be responsible for published content, know impacts &lt;br /&gt;
&lt;br /&gt;
5.5. Be able to safely '''connect to e-Services and secure environments'''– connecting and using, recover lost passwords. &lt;br /&gt;
&lt;br /&gt;
5.6. (Emails)Be able to '''send/receive e-mail securely'''. Know how to reject email from specific email addresses. Know how to treat email messages from unknown senders&lt;br /&gt;
&lt;br /&gt;
5.7. (Spam and malware) Be able (understand) to use '''network resource controlling software and hardware'''. Know about email that is classified as spam, and email messages infected with malware. &lt;br /&gt;
&lt;br /&gt;
5.8. Be aware of network resource controlling software and hardware. Know how to reject email from specific email addresses.Know about scam, hoax, chain letters...[5.7 &amp;amp; 5.8 to be merged - RL]&lt;br /&gt;
&lt;br /&gt;
5.9. Understand threats of '''virtual communication''': virtual dating, bullying, commenting, &lt;br /&gt;
&lt;br /&gt;
5.10. '''Dependency and addiction to the Internet'''. [# to be develop - TL]&lt;br /&gt;
&lt;br /&gt;
5.11. Understand ''''threats of inappropriate content''' for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on)&lt;br /&gt;
&lt;br /&gt;
5.12. '''Reliability of information''' (Understand that it is not safe to disclose information about user accounts, passwords and so on. can not fully trust content and identities on the internet. (i.e. blogs, Wikipedia, etc).&lt;br /&gt;
&lt;br /&gt;
5.13. '''Reputation management'''. Know who you should contact if you discovered inappropriate information about you or your related digital identities. .&lt;br /&gt;
&lt;br /&gt;
5.14. '''Abuse management''', cyber bullying, cyber-mobbing, when is it possible to remove, when to put additional correct information.&lt;br /&gt;
&lt;br /&gt;
5.15. Understand that online socializing reflects &amp;quot;real life&amp;quot;&lt;br /&gt;
&lt;br /&gt;
5.16. Know about the 2 types of [[social networking]] : [[Friendship-driven]] and [[Interest-driven]] &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Social networks types are already mentioned in 5.3. Maybe it can be consolidated or is it different at all?)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 17:03 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
5.17. Understand what is [[Online Safety 3.0]] : research-based, Flexible, layered, Respectful, Positive, empowering, contextual....&lt;br /&gt;
&lt;br /&gt;
5.18. Know reputation and legal safety&lt;br /&gt;
&lt;br /&gt;
5.19. Know about identity, property and community safety&lt;br /&gt;
&lt;br /&gt;
5.20. Understand why [[digital citizenship]] is protective and is the best filter ever : pre-installed, free of charge, improve with use...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(In previous version before Latvia meeting there were items:&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information and etc.&amp;lt;br&amp;gt; &lt;br /&gt;
Know about social viruses, chain letters.&amp;lt;br&amp;gt; &lt;br /&gt;
Know threats of virtual communication (social networks, IM, e-mail and ect.): virtual dating, bullying, commenting, and dependence on the Internet.&amp;lt;br&amp;gt; &lt;br /&gt;
We could consolidate those, but we think that safe IM and social threats are important too and should be included)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:56 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Another Mind mapping=&lt;br /&gt;
&lt;br /&gt;
[[Fichier:notions-and-concepts.png|1100px|]]&lt;br /&gt;
&lt;br /&gt;
You can access to the dynamic mapp here [http://www.mindomo.com/edit.htm?m=64bf626021b940d99dd9576283c833bf notions and concepts]&lt;br /&gt;
&lt;br /&gt;
[[Proposition]]&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4824</id>
		<title>Syllabus e-safety</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4824"/>
				<updated>2011-06-17T08:28:42Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : /* CHAPTER 1 SYLLABUS - Basic knowledge on e-safety */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''e-GUARDIAN - Syllabus V.2.x&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
== Introduction : aims &amp;amp; resources ==&lt;br /&gt;
&lt;br /&gt;
=== Aims ===&lt;br /&gt;
This wiki page aims at facilitating a collaborative synergic process for defining the syllabus on netsafety of the EU LdV e-Guardian project.&lt;br /&gt;
Participants are delegates of partner's institutions from Lithuania, Latvia, Germany and Switzerland.&lt;br /&gt;
&lt;br /&gt;
The resources are : &lt;br /&gt;
&lt;br /&gt;
=== A web-based social bookmarking working group === &lt;br /&gt;
on [http://groups.diigo.com/group/e_safety here on Diigo],  we can post all related useful information on netsafety, such as : &lt;br /&gt;
&lt;br /&gt;
- definition of key-words&lt;br /&gt;
&lt;br /&gt;
- examples of quizz, pedagogical scenarios and other pedagogical resources&lt;br /&gt;
&lt;br /&gt;
- related scientific articles &lt;br /&gt;
&lt;br /&gt;
- other relevant initiatives&lt;br /&gt;
&lt;br /&gt;
=== Guidelines for the syllabus === &lt;br /&gt;
They wwere provided by the project's team coordinated by the LIA organisation, and specially the syllabus workpackage leader, ecdl.lt, represented by Eugenijus Telesius and his team composed of Renata Danieliene &amp;amp; Tomas Lygutas, which is complemented by partner's delegate Algimantas Merkys (LIA, the coordinator's team), Dennis Krannich (Bremen Univbersity), Théo Bondolfi &amp;amp; Rémi Lévy (APTES Switzerland). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
These guidelines are : &lt;br /&gt;
&lt;br /&gt;
1. Focus on [[e-safety]] [[offline]] as well as [[online]], therefore always taking into account basic needs (such as password storage) as well as complex needs (such as behaviour in [[web2]] environments).&lt;br /&gt;
&lt;br /&gt;
2. Taking into account all key-points in this initial version, and considering these key-point as &amp;quot;objects&amp;quot; whcih can be replaced in other forms but which must stay available.&lt;br /&gt;
&lt;br /&gt;
3. respecting the steps of user point of view (example : 1 start computer, 2 launch application...)&lt;br /&gt;
&lt;br /&gt;
4. restructuring with categories and sets like in the policies of ECDL [http://www.ecdl.org/programmes/media/ECDL_ICDL_Module_12_-_Syllabus_-_V1.0.pdf]&lt;br /&gt;
&lt;br /&gt;
5. keeping as much as possible the existing phrases and formulations, only changing (merging, repositioning, pionderating) when it suits the next step of test/scenarios&lt;br /&gt;
&lt;br /&gt;
6. Keeping in mind the final intention of '''equity between risks &amp;amp; opportunities''' proposing positive practices (opportunities, in an educative perspective) and preventing bad practices (risks, which creates fear), based on the vision of the slide 10 of [http://www.slideshare.net/Bernajean/ne-3440462 this presentation of Anne Collier], which says that netsafety3.0 should be : &lt;br /&gt;
&lt;br /&gt;
- research-based, not fearbased, therefore relevant&lt;br /&gt;
&lt;br /&gt;
- flexible &amp;amp; layered, instead of &amp;quot;one-size-fits-all&amp;quot;&lt;br /&gt;
&lt;br /&gt;
- respectful of learning culture : stakeholders in positive experience, not just potential victims&lt;br /&gt;
&lt;br /&gt;
- positive, empowering : not just safety from, but safety for...&lt;br /&gt;
&lt;br /&gt;
- full, constructive engagement in participatory society (that's the context of the construction of this syllabus)&lt;br /&gt;
&lt;br /&gt;
=== Mind mapping for the key-notions of the syllabus ===&lt;br /&gt;
&lt;br /&gt;
In addition, Rémi Levy from APTES has produced a [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea mind mapping image] to represent all the notions for the e-safety syllabus. You can access to [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea the interactive map] - You can modify it directly because we keep a copy of the precedent contribution.&lt;br /&gt;
&lt;br /&gt;
== Other possible structure of the syllabus - A.P.T.E.S proposition ==&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Proposition access to the page]&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 1 SYLLABUS - Basic knowledge on e-safety ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;NOTICE IT IS BETTER IF COMMENTS AND DISCUSSIONS ARE MADE THE DISCUSSION PAGE &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:28 (UTC)&lt;br /&gt;
&lt;br /&gt;
1.1. Understand the differences of information [[contents]] (open, private, business, etc.).&lt;br /&gt;
&lt;br /&gt;
1.2. Be aware of '''[[privacy protection]] legal act''' (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies, etc)&lt;br /&gt;
&lt;br /&gt;
1.3. Know about '''[[equity between opportunities &amp;amp; risks]]''' of [[web2]]&lt;br /&gt;
&lt;br /&gt;
1.4. Understand the notion of '''[[identity]]'''. &lt;br /&gt;
&lt;br /&gt;
1.5. Be aware of '''different identity for authorization theft methods''' (skimming, pretexting, shoulder surfing, information diving).&lt;br /&gt;
&lt;br /&gt;
1.6. Know about '''[[social engineering]]''' and it’s methods. &lt;br /&gt;
&lt;br /&gt;
1.7. Be aware of cyber crime, online predators, financial scams, harm and who to contact if discovered illegal data.&lt;br /&gt;
&lt;br /&gt;
1.8. Understand computer infection threats (viruses, Trojan horses, spyware, dishonest adware, etc.). Know when and how malicious software can get into computer system.&lt;br /&gt;
&lt;br /&gt;
1.9. Know about organizational [[security]]: school security, usage of school web pages, content publishing, access, etc. &lt;br /&gt;
&lt;br /&gt;
1.10. Know about '''[[netiquette]] and other basic codes''' of conducts in the cyberspace (RFC 1855)&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 2 SYLLABUS - Privacy and data management ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version of Lithuania Team - 2011-06-15----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:30 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2.1. Distinguish between data and information.&lt;br /&gt;
&lt;br /&gt;
2.2. Understand the opportunities and risks of digital data management from fully collaborative to full privacy. &lt;br /&gt;
&lt;br /&gt;
2.3. Know about multi-layer password creation, changing and keeping password policies. &lt;br /&gt;
&lt;br /&gt;
2.4. Know about safe computer login methods. &lt;br /&gt;
&lt;br /&gt;
2.5. Know multiple user accounts on various digital environments. Understand the meaning and importance of access rights (what a personal user account is and how data of different users is separated). &lt;br /&gt;
&lt;br /&gt;
2.6. Be aware of data encryption, decryption and password protected files. &lt;br /&gt;
&lt;br /&gt;
2.7. Understand what intellectual property on Internet is. &lt;br /&gt;
&lt;br /&gt;
2.8. Understand the benefits and purpose of data backups and be able to restore lost data. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
2.0. [[Distinguish between data and information (RL)]]&lt;br /&gt;
&lt;br /&gt;
2.1. Understand the opportunities and risks of digital '''[[data management]]''' from fully collaborative to full privacy.&lt;br /&gt;
&lt;br /&gt;
2.2. Know about  multi-layer '''[[password]]''' creation, changing and keeping password policies.&lt;br /&gt;
&lt;br /&gt;
2.3. Know about '''safe computer [[login]] methods'''.&lt;br /&gt;
&lt;br /&gt;
2.4. Understand the meaning and importance of '''access rights'''.&lt;br /&gt;
&lt;br /&gt;
2.5. Know multiple user accounts on various digital environments. Understand what a '''[[personal user account]]''' is and how [[data]] of different users is separated.&lt;br /&gt;
&lt;br /&gt;
2.6. Be aware of '''data encryption''', decryption and password protected files, transfer?&lt;br /&gt;
&lt;br /&gt;
2.7. Understand what '''[[intellectual property]]''' on Internet is and be aware of [[privacy protection]] legal act. &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Privacy protection legal act is already mentioned in 1.11. Lets make this one only &amp;quot;Understand what '''[[intellectual property]]''' on Internet is.&amp;quot;--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:11 (UTC) )''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
2.8. Understand the benefits and purpose of data and '''backups''' and be able to restore lost data.&lt;br /&gt;
&lt;br /&gt;
2.9. [2.9 to 2.11 to me merged &amp;quot;'''Privacy Management'''&amp;quot;- [[RL]] Know how to '''start and finish safe browsing session''' (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing.&lt;br /&gt;
&lt;br /&gt;
: 2.10. Know how to browse the Web securable. Know about advantages, disadvantages and dangers of Internet '''cookies'''. Know about tools that ensure safety when browsing the Internet (blocking of cookies, ActiveX control, etc.)&lt;br /&gt;
&lt;br /&gt;
: 2.11. [#Privacy-RL] Be able to manage, clear temporary Internet files, browser history, passwords, cookies, and autocomplete data.&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(2.9 , 2.10 , 2.11 may be consolidated and must be moved to chapter 5 --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:17 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 3 SYLLABUS - Security tools and network security ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version of Lithuania Team - 2011-06-15----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:30 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3.1. Know computer network types (local area network (LAN), wide area network (WAN), virtual private network (VPN)) and why protection is needed. &lt;br /&gt;
&lt;br /&gt;
3.2. Know different network connection methods (Cable, Wireless, Mobile networks). &lt;br /&gt;
&lt;br /&gt;
3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network. &lt;br /&gt;
&lt;br /&gt;
3.4. Sharing and accessing resources over network (Files, Printer, Desktop). &lt;br /&gt;
&lt;br /&gt;
3.5. Understand safety means of computer networks (Firewall, Antivirus, Anti-spyware, Spam blocker Password protection, Connection encryption – wireless). &lt;br /&gt;
&lt;br /&gt;
3.6. Be able to use standard OS integrated protection tools. &lt;br /&gt;
&lt;br /&gt;
3.7. Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.). Distinguish different modes of antivirus protection (active, passive).&lt;br /&gt;
&lt;br /&gt;
3.8. Know what has to be done and in what order, if you suspect that computer system is infected. Distinguish infected files deletion, quarantining and curing.&lt;br /&gt;
&lt;br /&gt;
3.9. Know how to follow, download and use updates for your operating system, software and importance of antivirus definition files. Understand the benefits of these updates.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
3.1. Know computer '''network types''' , ''&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;(local area network (LAN), wide area network (WAN), virtual private network (VPN))&amp;lt;/span&amp;gt; ''and why protection is needed.--[[Utilisateur:Donarena|Renata (Lithuania Team)]] 8 juin 2011 à 16:19 (UTC)&lt;br /&gt;
&lt;br /&gt;
3.2. Know different network '''connection methods''' (Mobile networks, Wireless, Cable).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network.&amp;lt;/span&amp;gt;--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:30 (UTC)&lt;br /&gt;
&lt;br /&gt;
3.3. '''Sharing and accessing resources''' over network (Files, Printer, Screen).&lt;br /&gt;
&lt;br /&gt;
3.4. Understand '''safety means of computer networks''' (Firewall, Antivirus, Password protection, Connection encryption – wireless). &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Firewall, Antivirus, Password protection, Connection encryption are all already mentioned in other items and fit there by content and integrity better. We recommend to cross this 3.4. out at all)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:36 (UTC)''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
3.5. Be able to use standard '''OS integrated protection tools'''. &lt;br /&gt;
&lt;br /&gt;
3.6. [[#see how integrate 3.5 to 2.11 : &amp;quot;'''All about  [[malware]] and intrusion protection tools'''&amp;quot; - RL]] Know what a quality anti-virus, anti-spyware, spam blocker, and personal [[firewall]] is and how to use it. (Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.), know that it is unsafe to turn [[antivirus]] software off and know consequences). Distinguish different modes of antivirus protection (active, passive…). &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.7.[#Updating operating system- RL]. Know how to follow, download and use updates for your operating system, software and importance of antivirus definition files. Understand the benefits of these updates. &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.8. Distinguish different modes of antivirus protection (active, passive…).[# see also 3.6]&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.9. Know what has to be done and in what order, if you suspect that computer system is infected. &lt;br /&gt;
&lt;br /&gt;
: 3.10. Distinguish infected files deletion, quarantining and curing. &lt;br /&gt;
&lt;br /&gt;
: 3.11. Informal and formal periodic external checkup. &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(what do you mean by &amp;quot;checkup&amp;quot;)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:30 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 4 SYLLABUS - Children, newcomers in schools and workplaces : means of safe use for socio-digital inclusion == &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;--We recommend to shorten chapter name: CHAPTER 4 SYLLABUS - Children, newcomers in schools and workplaces&amp;lt;/b&amp;gt; ----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:32 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
New Syllabus version of Lithuania Team - 2011-06-15----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:30 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
4.1. Understand the impact of communication with new users about safety in IT World.&lt;br /&gt;
&lt;br /&gt;
4.2. Understand the purpose of monitoring, filtering and controlling tools against children computer usage and web browsing. &lt;br /&gt;
&lt;br /&gt;
4.3. Be aware of different ways to block social networking and other web sites.&lt;br /&gt;
&lt;br /&gt;
4.4. Be able to develop policies and applicate methods for children’s use of the computer and the Internet (depending on age and socio-cultural situation). &lt;br /&gt;
&lt;br /&gt;
4.5.Understanding advantages and limitations of protection software. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(what is a socio-digital inclusion? Maybe we can shorten this chapter name to &amp;quot;Children, newcomers in schools and workplaces&amp;quot;?--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:49 (UTC) )''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4.1. Understand '''the impact of communication''' with new users '''about safety''' in IT World, &lt;br /&gt;
&lt;br /&gt;
4.2. Policy : Be able to '''develop policies and applicate methods''' for children’s use of the computer and the Internet (depending on age and socio-cultural situation) &lt;br /&gt;
&lt;br /&gt;
4.3. Understand the purpose of '''monitoring, filtering and controlling tools''' against children computer usage and web browsing.&lt;br /&gt;
&lt;br /&gt;
4.4. Understanding '''advantages and limitations with protection software'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Need more items in this chapter. After consolidation in Latvia this chapter has become even shorter than it was. And it was already short :). Maybe we can try to expand again to look more like the previous version, but less stick to children, as you mentioned in Latvia)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:49 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 5 SYLLABUS - Social networks and safe usage of the Internet ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;lt;b&amp;gt;We recommend change chapter name to: &amp;quot;CHAPTER 5 SYLLABUS - Social networks and safe virtual communication----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:32 (UTC)&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
New Syllabus version of Lithuania Team - 2011-06-15----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:31 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5.1. Know how to start and finish safe browsing session (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing. &lt;br /&gt;
&lt;br /&gt;
5.2. Know about advantages, disadvantages and dangers of Internet cookies and ActiveX control. Know about tools that ensure safety when browsing the Internet.  &lt;br /&gt;
&lt;br /&gt;
5.3. Be able to manage: temporary Internet files, browser history, passwords, cookies and autocomplete data. &lt;br /&gt;
&lt;br /&gt;
5.4. Be able to safely connect to e-Services and secure environments– connecting and using, recover lost passwords.&lt;br /&gt;
&lt;br /&gt;
5.5. Know when and in which cases personal information can be published on the Internet (i.e. status publishing about leaving home).&lt;br /&gt;
&lt;br /&gt;
5.6. Know who you should contact if you discovered inappropriate information about you or your related digital identities.&lt;br /&gt;
&lt;br /&gt;
5.7. Understand that you cannot fully trust content and identities on the internet. (i.e. blogs, Wikipedia, social networks, forums, etc). &lt;br /&gt;
&lt;br /&gt;
5.8. Understand 'threats of inappropriate content for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on) &lt;br /&gt;
&lt;br /&gt;
5.9. Understand what a social network is, what are opportunities and risks of social network. Age groups of using social networks. Options and parameters for information disclosure. Understand that it is not safe to disclose information about user accounts, passwords and so on. &lt;br /&gt;
&lt;br /&gt;
5.10. Know different social network types (Friendship-driven and Interest-driven) and be able to use them harmless and safe (appropriate account privacy settings). &lt;br /&gt;
&lt;br /&gt;
5.11. Know what type of information recommended to be published on social network, be responsible for published content, and know impacts &lt;br /&gt;
&lt;br /&gt;
5.12. Understand that online socializing reflects &amp;quot;real life&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
5.13. Be able to send/receive e-mail securely: know how to reject email from specific email addresses. Know how to treat email messages from unknown senders, classified as spam and email messages infected with malware. Know about scam, hoax, chain letters.&lt;br /&gt;
&lt;br /&gt;
5.14. Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information, etc.&lt;br /&gt;
&lt;br /&gt;
5.15. Understand threats of virtual communication: virtual dating, bullying, commenting. &lt;br /&gt;
&lt;br /&gt;
5.16. Understand dependency and addiction to the Internet.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
5.1. Know when and in which cases '''personal information''' can be published on the Internet, i.e. status publishing about leaving home,.&lt;br /&gt;
&lt;br /&gt;
5.2. Understand what a social network is, what are '''opportunities and risks of social network'''. Age groups of using social networks. Options and parameters for information disclosure. Understand that it is not safe to disclose information about user accounts, passwords and so on.&lt;br /&gt;
&lt;br /&gt;
5.3. Know different '''social network types''' and be able to use them harmless and safe (appropriate '''account privacy settings''').&lt;br /&gt;
&lt;br /&gt;
5.4. ('''Publishing content''')Know what type of information recommended to be published on social network, be responsible for published content, know impacts &lt;br /&gt;
&lt;br /&gt;
5.5. Be able to safely '''connect to e-Services and secure environments'''– connecting and using, recover lost passwords. &lt;br /&gt;
&lt;br /&gt;
5.6. (Emails)Be able to '''send/receive e-mail securely'''. Know how to reject email from specific email addresses. Know how to treat email messages from unknown senders&lt;br /&gt;
&lt;br /&gt;
5.7. (Spam and malware) Be able (understand) to use '''network resource controlling software and hardware'''. Know about email that is classified as spam, and email messages infected with malware. &lt;br /&gt;
&lt;br /&gt;
5.8. Be aware of network resource controlling software and hardware. Know how to reject email from specific email addresses.Know about scam, hoax, chain letters...[5.7 &amp;amp; 5.8 to be merged - RL]&lt;br /&gt;
&lt;br /&gt;
5.9. Understand threats of '''virtual communication''': virtual dating, bullying, commenting, &lt;br /&gt;
&lt;br /&gt;
5.10. '''Dependency and addiction to the Internet'''. [# to be develop - TL]&lt;br /&gt;
&lt;br /&gt;
5.11. Understand ''''threats of inappropriate content''' for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on)&lt;br /&gt;
&lt;br /&gt;
5.12. '''Reliability of information''' (Understand that it is not safe to disclose information about user accounts, passwords and so on. can not fully trust content and identities on the internet. (i.e. blogs, Wikipedia, etc).&lt;br /&gt;
&lt;br /&gt;
5.13. '''Reputation management'''. Know who you should contact if you discovered inappropriate information about you or your related digital identities. .&lt;br /&gt;
&lt;br /&gt;
5.14. '''Abuse management''', cyber bullying, cyber-mobbing, when is it possible to remove, when to put additional correct information.&lt;br /&gt;
&lt;br /&gt;
5.15. Understand that online socializing reflects &amp;quot;real life&amp;quot;&lt;br /&gt;
&lt;br /&gt;
5.16. Know about the 2 types of [[social networking]] : [[Friendship-driven]] and [[Interest-driven]] &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Social networks types are already mentioned in 5.3. Maybe it can be consolidated or is it different at all?)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 17:03 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
5.17. Understand what is [[Online Safety 3.0]] : research-based, Flexible, layered, Respectful, Positive, empowering, contextual....&lt;br /&gt;
&lt;br /&gt;
5.18. Know reputation and legal safety&lt;br /&gt;
&lt;br /&gt;
5.19. Know about identity, property and community safety&lt;br /&gt;
&lt;br /&gt;
5.20. Understand why [[digital citizenship]] is protective and is the best filter ever : pre-installed, free of charge, improve with use...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(In previous version before Latvia meeting there were items:&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information and etc.&amp;lt;br&amp;gt; &lt;br /&gt;
Know about social viruses, chain letters.&amp;lt;br&amp;gt; &lt;br /&gt;
Know threats of virtual communication (social networks, IM, e-mail and ect.): virtual dating, bullying, commenting, and dependence on the Internet.&amp;lt;br&amp;gt; &lt;br /&gt;
We could consolidate those, but we think that safe IM and social threats are important too and should be included)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:56 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Another Mind mapping=&lt;br /&gt;
&lt;br /&gt;
[[Fichier:notions-and-concepts.png|1100px|]]&lt;br /&gt;
&lt;br /&gt;
You can access to the dynamic mapp here [http://www.mindomo.com/edit.htm?m=64bf626021b940d99dd9576283c833bf notions and concepts]&lt;br /&gt;
&lt;br /&gt;
[[Proposition]]&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4823</id>
		<title>Syllabus e-safety</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4823"/>
				<updated>2011-06-17T08:10:13Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''e-GUARDIAN - Syllabus V.2.x&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
== Introduction : aims &amp;amp; resources ==&lt;br /&gt;
&lt;br /&gt;
=== Aims ===&lt;br /&gt;
This wiki page aims at facilitating a collaborative synergic process for defining the syllabus on netsafety of the EU LdV e-Guardian project.&lt;br /&gt;
Participants are delegates of partner's institutions from Lithuania, Latvia, Germany and Switzerland.&lt;br /&gt;
&lt;br /&gt;
The resources are : &lt;br /&gt;
&lt;br /&gt;
=== A web-based social bookmarking working group === &lt;br /&gt;
on [http://groups.diigo.com/group/e_safety here on Diigo],  we can post all related useful information on netsafety, such as : &lt;br /&gt;
&lt;br /&gt;
- definition of key-words&lt;br /&gt;
&lt;br /&gt;
- examples of quizz, pedagogical scenarios and other pedagogical resources&lt;br /&gt;
&lt;br /&gt;
- related scientific articles &lt;br /&gt;
&lt;br /&gt;
- other relevant initiatives&lt;br /&gt;
&lt;br /&gt;
=== Guidelines for the syllabus === &lt;br /&gt;
They wwere provided by the project's team coordinated by the LIA organisation, and specially the syllabus workpackage leader, ecdl.lt, represented by Eugenijus Telesius and his team composed of Renata Danieliene &amp;amp; Tomas Lygutas, which is complemented by partner's delegate Algimantas Merkys (LIA, the coordinator's team), Dennis Krannich (Bremen Univbersity), Théo Bondolfi &amp;amp; Rémi Lévy (APTES Switzerland). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
These guidelines are : &lt;br /&gt;
&lt;br /&gt;
1. Focus on [[e-safety]] [[offline]] as well as [[online]], therefore always taking into account basic needs (such as password storage) as well as complex needs (such as behaviour in [[web2]] environments).&lt;br /&gt;
&lt;br /&gt;
2. Taking into account all key-points in this initial version, and considering these key-point as &amp;quot;objects&amp;quot; whcih can be replaced in other forms but which must stay available.&lt;br /&gt;
&lt;br /&gt;
3. respecting the steps of user point of view (example : 1 start computer, 2 launch application...)&lt;br /&gt;
&lt;br /&gt;
4. restructuring with categories and sets like in the policies of ECDL [http://www.ecdl.org/programmes/media/ECDL_ICDL_Module_12_-_Syllabus_-_V1.0.pdf]&lt;br /&gt;
&lt;br /&gt;
5. keeping as much as possible the existing phrases and formulations, only changing (merging, repositioning, pionderating) when it suits the next step of test/scenarios&lt;br /&gt;
&lt;br /&gt;
6. Keeping in mind the final intention of '''equity between risks &amp;amp; opportunities''' proposing positive practices (opportunities, in an educative perspective) and preventing bad practices (risks, which creates fear), based on the vision of the slide 10 of [http://www.slideshare.net/Bernajean/ne-3440462 this presentation of Anne Collier], which says that netsafety3.0 should be : &lt;br /&gt;
&lt;br /&gt;
- research-based, not fearbased, therefore relevant&lt;br /&gt;
&lt;br /&gt;
- flexible &amp;amp; layered, instead of &amp;quot;one-size-fits-all&amp;quot;&lt;br /&gt;
&lt;br /&gt;
- respectful of learning culture : stakeholders in positive experience, not just potential victims&lt;br /&gt;
&lt;br /&gt;
- positive, empowering : not just safety from, but safety for...&lt;br /&gt;
&lt;br /&gt;
- full, constructive engagement in participatory society (that's the context of the construction of this syllabus)&lt;br /&gt;
&lt;br /&gt;
=== Mind mapping for the key-notions of the syllabus ===&lt;br /&gt;
&lt;br /&gt;
In addition, Rémi Levy from APTES has produced a [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea mind mapping image] to represent all the notions for the e-safety syllabus. You can access to [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea the interactive map] - You can modify it directly because we keep a copy of the precedent contribution.&lt;br /&gt;
&lt;br /&gt;
== Other possible structure of the syllabus - A.P.T.E.S proposition ==&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Proposition access to the page]&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 1 SYLLABUS - Basic knowledge on e-safety ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version of Lithuania Team - 2011-06-15----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:30 (UTC)&lt;br /&gt;
&lt;br /&gt;
1.1. Understand the differences of information contents (open, private, business, etc.).&lt;br /&gt;
&lt;br /&gt;
1.2. Be aware of privacy protection legal act (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies, etc). &lt;br /&gt;
&lt;br /&gt;
1.3. Know about '''equity between opportunities &amp;amp; risks''' of web2&lt;br /&gt;
&lt;br /&gt;
1.4. Understand the notion of identity. &lt;br /&gt;
&lt;br /&gt;
1.5. Be aware of different identity for authorization theft methods (skimming, pretexting, shoulder surfing, information diving).&lt;br /&gt;
&lt;br /&gt;
1.6. Know about social engineering and it’s methods. &lt;br /&gt;
&lt;br /&gt;
1.7. Be aware of cyber crime, online predators, financial scams, harm and who to contact if discovered illegal data.&lt;br /&gt;
&lt;br /&gt;
1.8. Understand computer infection threats (viruses, Trojan horses, spyware, dishonest adware, etc.). Know when and how malicious software can get into computer system.&lt;br /&gt;
&lt;br /&gt;
1.9. Know about organizational security: school security, usage of school web pages, content publishing, access, etc. &lt;br /&gt;
&lt;br /&gt;
1.10. Know about netiquette and other basic codes of conducts in the cyberspace (RFC 1855).&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;IT IS BETTER IF COMMENTS AND DISCUSSIONS ARE MADE THE DISCUSSION PAGE &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
1.1. History : from static '''web1 to''' dynamic '''web2''' environments &lt;br /&gt;
&lt;br /&gt;
1.2. Intention : '''[[web3]]''' proposing constructive engagement in participatory society (or : [[security]] through light instead of old model of [[security]] through obscurity.&lt;br /&gt;
&lt;br /&gt;
1.3. Know about '''equity between opportunities &amp;amp; risks''' since [[web2]]&lt;br /&gt;
&lt;br /&gt;
1.4. Know about '''[[netiquette]] and other basic codes''' of conducts in the cyberspace (RFC 1855) &lt;br /&gt;
&lt;br /&gt;
1.5. Know about '''[[social engineering]]''' and it’s methods, including participative culture and abuses if you don't understand/respect them, for example having your password stolen (to be reformulated) &lt;br /&gt;
&lt;br /&gt;
1.6. Understand the differences of '''[[contents]]''' (functional, factual, creative) of information &lt;br /&gt;
&lt;br /&gt;
1.7. Understand the differences of '''[[formats]]''' (open, privative) &lt;br /&gt;
&lt;br /&gt;
1.8. Understand the notion of '''[[identity]]''' (maybe to be repositioned in some other chapter)&lt;br /&gt;
&lt;br /&gt;
1.9.  '''[[eTools]]''' : Product versus function &lt;br /&gt;
&lt;br /&gt;
1.10. Be aware of '''different identity for authorization theft methods''' (skimming, pretexting, shoulder surfing, information diving…) &lt;br /&gt;
&lt;br /&gt;
1.11. Be aware of '''[[privacy protection]] legal act''' (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies and so on).&lt;br /&gt;
&lt;br /&gt;
1.12. '''Organizational [[security]]''' (school security) – or [[social engineering]]?, usage of school web pages, content publishing, access&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 2 SYLLABUS - Privacy and data management ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version of Lithuania Team - 2011-06-15----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:30 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2.1. Distinguish between data and information.&lt;br /&gt;
&lt;br /&gt;
2.2. Understand the opportunities and risks of digital data management from fully collaborative to full privacy. &lt;br /&gt;
&lt;br /&gt;
2.3. Know about multi-layer password creation, changing and keeping password policies. &lt;br /&gt;
&lt;br /&gt;
2.4. Know about safe computer login methods. &lt;br /&gt;
&lt;br /&gt;
2.5. Know multiple user accounts on various digital environments. Understand the meaning and importance of access rights (what a personal user account is and how data of different users is separated). &lt;br /&gt;
&lt;br /&gt;
2.6. Be aware of data encryption, decryption and password protected files. &lt;br /&gt;
&lt;br /&gt;
2.7. Understand what intellectual property on Internet is. &lt;br /&gt;
&lt;br /&gt;
2.8. Understand the benefits and purpose of data backups and be able to restore lost data. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
2.0. [[Distinguish between data and information (RL)]]&lt;br /&gt;
&lt;br /&gt;
2.1. Understand the opportunities and risks of digital '''[[data management]]''' from fully collaborative to full privacy.&lt;br /&gt;
&lt;br /&gt;
2.2. Know about  multi-layer '''[[password]]''' creation, changing and keeping password policies.&lt;br /&gt;
&lt;br /&gt;
2.3. Know about '''safe computer [[login]] methods'''.&lt;br /&gt;
&lt;br /&gt;
2.4. Understand the meaning and importance of '''access rights'''.&lt;br /&gt;
&lt;br /&gt;
2.5. Know multiple user accounts on various digital environments. Understand what a '''[[personal user account]]''' is and how [[data]] of different users is separated.&lt;br /&gt;
&lt;br /&gt;
2.6. Be aware of '''data encryption''', decryption and password protected files, transfer?&lt;br /&gt;
&lt;br /&gt;
2.7. Understand what '''[[intellectual property]]''' on Internet is and be aware of [[privacy protection]] legal act. &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Privacy protection legal act is already mentioned in 1.11. Lets make this one only &amp;quot;Understand what '''[[intellectual property]]''' on Internet is.&amp;quot;--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:11 (UTC) )''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
2.8. Understand the benefits and purpose of data and '''backups''' and be able to restore lost data.&lt;br /&gt;
&lt;br /&gt;
2.9. [2.9 to 2.11 to me merged &amp;quot;'''Privacy Management'''&amp;quot;- [[RL]] Know how to '''start and finish safe browsing session''' (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing.&lt;br /&gt;
&lt;br /&gt;
: 2.10. Know how to browse the Web securable. Know about advantages, disadvantages and dangers of Internet '''cookies'''. Know about tools that ensure safety when browsing the Internet (blocking of cookies, ActiveX control, etc.)&lt;br /&gt;
&lt;br /&gt;
: 2.11. [#Privacy-RL] Be able to manage, clear temporary Internet files, browser history, passwords, cookies, and autocomplete data.&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(2.9 , 2.10 , 2.11 may be consolidated and must be moved to chapter 5 --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:17 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 3 SYLLABUS - Security tools and network security ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version of Lithuania Team - 2011-06-15----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:30 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3.1. Know computer network types (local area network (LAN), wide area network (WAN), virtual private network (VPN)) and why protection is needed. &lt;br /&gt;
&lt;br /&gt;
3.2. Know different network connection methods (Cable, Wireless, Mobile networks). &lt;br /&gt;
&lt;br /&gt;
3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network. &lt;br /&gt;
&lt;br /&gt;
3.4. Sharing and accessing resources over network (Files, Printer, Desktop). &lt;br /&gt;
&lt;br /&gt;
3.5. Understand safety means of computer networks (Firewall, Antivirus, Anti-spyware, Spam blocker Password protection, Connection encryption – wireless). &lt;br /&gt;
&lt;br /&gt;
3.6. Be able to use standard OS integrated protection tools. &lt;br /&gt;
&lt;br /&gt;
3.7. Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.). Distinguish different modes of antivirus protection (active, passive).&lt;br /&gt;
&lt;br /&gt;
3.8. Know what has to be done and in what order, if you suspect that computer system is infected. Distinguish infected files deletion, quarantining and curing.&lt;br /&gt;
&lt;br /&gt;
3.9. Know how to follow, download and use updates for your operating system, software and importance of antivirus definition files. Understand the benefits of these updates.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
3.1. Know computer '''network types''' , ''&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;(local area network (LAN), wide area network (WAN), virtual private network (VPN))&amp;lt;/span&amp;gt; ''and why protection is needed.--[[Utilisateur:Donarena|Renata (Lithuania Team)]] 8 juin 2011 à 16:19 (UTC)&lt;br /&gt;
&lt;br /&gt;
3.2. Know different network '''connection methods''' (Mobile networks, Wireless, Cable).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network.&amp;lt;/span&amp;gt;--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:30 (UTC)&lt;br /&gt;
&lt;br /&gt;
3.3. '''Sharing and accessing resources''' over network (Files, Printer, Screen).&lt;br /&gt;
&lt;br /&gt;
3.4. Understand '''safety means of computer networks''' (Firewall, Antivirus, Password protection, Connection encryption – wireless). &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Firewall, Antivirus, Password protection, Connection encryption are all already mentioned in other items and fit there by content and integrity better. We recommend to cross this 3.4. out at all)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:36 (UTC)''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
3.5. Be able to use standard '''OS integrated protection tools'''. &lt;br /&gt;
&lt;br /&gt;
3.6. [[#see how integrate 3.5 to 2.11 : &amp;quot;'''All about  [[malware]] and intrusion protection tools'''&amp;quot; - RL]] Know what a quality anti-virus, anti-spyware, spam blocker, and personal [[firewall]] is and how to use it. (Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.), know that it is unsafe to turn [[antivirus]] software off and know consequences). Distinguish different modes of antivirus protection (active, passive…). &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.7.[#Updating operating system- RL]. Know how to follow, download and use updates for your operating system, software and importance of antivirus definition files. Understand the benefits of these updates. &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.8. Distinguish different modes of antivirus protection (active, passive…).[# see also 3.6]&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.9. Know what has to be done and in what order, if you suspect that computer system is infected. &lt;br /&gt;
&lt;br /&gt;
: 3.10. Distinguish infected files deletion, quarantining and curing. &lt;br /&gt;
&lt;br /&gt;
: 3.11. Informal and formal periodic external checkup. &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(what do you mean by &amp;quot;checkup&amp;quot;)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:30 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 4 SYLLABUS - Children, newcomers in schools and workplaces : means of safe use for socio-digital inclusion == &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;--We recommend to shorten chapter name: CHAPTER 4 SYLLABUS - Children, newcomers in schools and workplaces&amp;lt;/b&amp;gt; ----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:32 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
New Syllabus version of Lithuania Team - 2011-06-15----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:30 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
4.1. Understand the impact of communication with new users about safety in IT World.&lt;br /&gt;
&lt;br /&gt;
4.2. Understand the purpose of monitoring, filtering and controlling tools against children computer usage and web browsing. &lt;br /&gt;
&lt;br /&gt;
4.3. Be aware of different ways to block social networking and other web sites.&lt;br /&gt;
&lt;br /&gt;
4.4. Be able to develop policies and applicate methods for children’s use of the computer and the Internet (depending on age and socio-cultural situation). &lt;br /&gt;
&lt;br /&gt;
4.5.Understanding advantages and limitations of protection software. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(what is a socio-digital inclusion? Maybe we can shorten this chapter name to &amp;quot;Children, newcomers in schools and workplaces&amp;quot;?--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:49 (UTC) )''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4.1. Understand '''the impact of communication''' with new users '''about safety''' in IT World, &lt;br /&gt;
&lt;br /&gt;
4.2. Policy : Be able to '''develop policies and applicate methods''' for children’s use of the computer and the Internet (depending on age and socio-cultural situation) &lt;br /&gt;
&lt;br /&gt;
4.3. Understand the purpose of '''monitoring, filtering and controlling tools''' against children computer usage and web browsing.&lt;br /&gt;
&lt;br /&gt;
4.4. Understanding '''advantages and limitations with protection software'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Need more items in this chapter. After consolidation in Latvia this chapter has become even shorter than it was. And it was already short :). Maybe we can try to expand again to look more like the previous version, but less stick to children, as you mentioned in Latvia)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:49 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 5 SYLLABUS - Social networks and safe usage of the Internet ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;lt;b&amp;gt;We recommend change chapter name to: &amp;quot;CHAPTER 5 SYLLABUS - Social networks and safe virtual communication----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:32 (UTC)&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
New Syllabus version of Lithuania Team - 2011-06-15----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:31 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5.1. Know how to start and finish safe browsing session (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing. &lt;br /&gt;
&lt;br /&gt;
5.2. Know about advantages, disadvantages and dangers of Internet cookies and ActiveX control. Know about tools that ensure safety when browsing the Internet.  &lt;br /&gt;
&lt;br /&gt;
5.3. Be able to manage: temporary Internet files, browser history, passwords, cookies and autocomplete data. &lt;br /&gt;
&lt;br /&gt;
5.4. Be able to safely connect to e-Services and secure environments– connecting and using, recover lost passwords.&lt;br /&gt;
&lt;br /&gt;
5.5. Know when and in which cases personal information can be published on the Internet (i.e. status publishing about leaving home).&lt;br /&gt;
&lt;br /&gt;
5.6. Know who you should contact if you discovered inappropriate information about you or your related digital identities.&lt;br /&gt;
&lt;br /&gt;
5.7. Understand that you cannot fully trust content and identities on the internet. (i.e. blogs, Wikipedia, social networks, forums, etc). &lt;br /&gt;
&lt;br /&gt;
5.8. Understand 'threats of inappropriate content for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on) &lt;br /&gt;
&lt;br /&gt;
5.9. Understand what a social network is, what are opportunities and risks of social network. Age groups of using social networks. Options and parameters for information disclosure. Understand that it is not safe to disclose information about user accounts, passwords and so on. &lt;br /&gt;
&lt;br /&gt;
5.10. Know different social network types (Friendship-driven and Interest-driven) and be able to use them harmless and safe (appropriate account privacy settings). &lt;br /&gt;
&lt;br /&gt;
5.11. Know what type of information recommended to be published on social network, be responsible for published content, and know impacts &lt;br /&gt;
&lt;br /&gt;
5.12. Understand that online socializing reflects &amp;quot;real life&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
5.13. Be able to send/receive e-mail securely: know how to reject email from specific email addresses. Know how to treat email messages from unknown senders, classified as spam and email messages infected with malware. Know about scam, hoax, chain letters.&lt;br /&gt;
&lt;br /&gt;
5.14. Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information, etc.&lt;br /&gt;
&lt;br /&gt;
5.15. Understand threats of virtual communication: virtual dating, bullying, commenting. &lt;br /&gt;
&lt;br /&gt;
5.16. Understand dependency and addiction to the Internet.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
5.1. Know when and in which cases '''personal information''' can be published on the Internet, i.e. status publishing about leaving home,.&lt;br /&gt;
&lt;br /&gt;
5.2. Understand what a social network is, what are '''opportunities and risks of social network'''. Age groups of using social networks. Options and parameters for information disclosure. Understand that it is not safe to disclose information about user accounts, passwords and so on.&lt;br /&gt;
&lt;br /&gt;
5.3. Know different '''social network types''' and be able to use them harmless and safe (appropriate '''account privacy settings''').&lt;br /&gt;
&lt;br /&gt;
5.4. ('''Publishing content''')Know what type of information recommended to be published on social network, be responsible for published content, know impacts &lt;br /&gt;
&lt;br /&gt;
5.5. Be able to safely '''connect to e-Services and secure environments'''– connecting and using, recover lost passwords. &lt;br /&gt;
&lt;br /&gt;
5.6. (Emails)Be able to '''send/receive e-mail securely'''. Know how to reject email from specific email addresses. Know how to treat email messages from unknown senders&lt;br /&gt;
&lt;br /&gt;
5.7. (Spam and malware) Be able (understand) to use '''network resource controlling software and hardware'''. Know about email that is classified as spam, and email messages infected with malware. &lt;br /&gt;
&lt;br /&gt;
5.8. Be aware of network resource controlling software and hardware. Know how to reject email from specific email addresses.Know about scam, hoax, chain letters...[5.7 &amp;amp; 5.8 to be merged - RL]&lt;br /&gt;
&lt;br /&gt;
5.9. Understand threats of '''virtual communication''': virtual dating, bullying, commenting, &lt;br /&gt;
&lt;br /&gt;
5.10. '''Dependency and addiction to the Internet'''. [# to be develop - TL]&lt;br /&gt;
&lt;br /&gt;
5.11. Understand ''''threats of inappropriate content''' for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on)&lt;br /&gt;
&lt;br /&gt;
5.12. '''Reliability of information''' (Understand that it is not safe to disclose information about user accounts, passwords and so on. can not fully trust content and identities on the internet. (i.e. blogs, Wikipedia, etc).&lt;br /&gt;
&lt;br /&gt;
5.13. '''Reputation management'''. Know who you should contact if you discovered inappropriate information about you or your related digital identities. .&lt;br /&gt;
&lt;br /&gt;
5.14. '''Abuse management''', cyber bullying, cyber-mobbing, when is it possible to remove, when to put additional correct information.&lt;br /&gt;
&lt;br /&gt;
5.15. Understand that online socializing reflects &amp;quot;real life&amp;quot;&lt;br /&gt;
&lt;br /&gt;
5.16. Know about the 2 types of [[social networking]] : [[Friendship-driven]] and [[Interest-driven]] &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Social networks types are already mentioned in 5.3. Maybe it can be consolidated or is it different at all?)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 17:03 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
5.17. Understand what is [[Online Safety 3.0]] : research-based, Flexible, layered, Respectful, Positive, empowering, contextual....&lt;br /&gt;
&lt;br /&gt;
5.18. Know reputation and legal safety&lt;br /&gt;
&lt;br /&gt;
5.19. Know about identity, property and community safety&lt;br /&gt;
&lt;br /&gt;
5.20. Understand why [[digital citizenship]] is protective and is the best filter ever : pre-installed, free of charge, improve with use...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(In previous version before Latvia meeting there were items:&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information and etc.&amp;lt;br&amp;gt; &lt;br /&gt;
Know about social viruses, chain letters.&amp;lt;br&amp;gt; &lt;br /&gt;
Know threats of virtual communication (social networks, IM, e-mail and ect.): virtual dating, bullying, commenting, and dependence on the Internet.&amp;lt;br&amp;gt; &lt;br /&gt;
We could consolidate those, but we think that safe IM and social threats are important too and should be included)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:56 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Another Mind mapping=&lt;br /&gt;
&lt;br /&gt;
[[Fichier:notions-and-concepts.png|1100px|]]&lt;br /&gt;
&lt;br /&gt;
You can access to the dynamic mapp here [http://www.mindomo.com/edit.htm?m=64bf626021b940d99dd9576283c833bf notions and concepts]&lt;br /&gt;
&lt;br /&gt;
[[Proposition]]&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Discussion:Syllabus_e-safety&amp;diff=4822</id>
		<title>Discussion:Syllabus e-safety</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Discussion:Syllabus_e-safety&amp;diff=4822"/>
				<updated>2011-06-17T08:08:01Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Discussions'''&lt;br /&gt;
&lt;br /&gt;
Here is the place to make comments on the Syllabus. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Todo list =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- Focus map&lt;br /&gt;
&lt;br /&gt;
- Define number of chapters&lt;br /&gt;
&lt;br /&gt;
- Organise Items and Notions&lt;br /&gt;
&lt;br /&gt;
- Find Quiz&lt;br /&gt;
&lt;br /&gt;
- Discuss about chapter 4 --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 09:04 (UTC)&lt;br /&gt;
&lt;br /&gt;
- Give the rights on Mindomo --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 09:18 (UTC)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= General considerations =&lt;br /&gt;
&lt;br /&gt;
- One should avoid the term ''virtual'' since it deludes into thinking that things are not real. ''Electronic'' or ''online'' should be preferred&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=About Items=&lt;br /&gt;
&lt;br /&gt;
===Chapter 1 - Basic knowledge on e-safety===&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Syllabus_e-safety#Basic_knowledge_on_e-safety see the chapter]&lt;br /&gt;
&lt;br /&gt;
1.1. History : from static '''web1 to''' dynamic '''web2''' environments &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --''(What are those web1, web2 and web3 environments? Is it necessary? &amp;lt;/span&amp;gt;[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 14:58 (UTC))''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.2. Intention : '''[[web3]]''' proposing constructive engagement in participatory society (or : [[security]] through light instead of old model of [[security]] through obscurity), &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;  --''(same here - we actually do not understand what is it about&amp;lt;/span&amp;gt;[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:11 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
here is a reference about obscurity: http://en.wikipedia.org/wiki/Security_through_obscurity&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.3. Know about '''equity between opportunities &amp;amp; risks''' since [[web2]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --''(if speaking about opportunities &amp;amp; risks it should be clarified - do we mean Internet? if so - it should be mentioned.[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:11 (UTC))'' &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.4. Know about '''[[netiquette]] and other basic codes''' of conducts in the cyberspace (RFC 1855) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --''(what do you mean by &amp;quot;basic codes&amp;quot;?[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:11 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.5. Know about '''[[social engineering]]''' and it’s methods, including participative culture and abuses if you don't understand/respect them, for example having your password stolen (to be reformulated) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --'')what is &amp;quot;participative culture and abuses&amp;quot;? We think that it is already included in the definition of social engineerging. We recommend to stick to version &amp;quot;Know about '''[[social engineering]]''' and it’s methods&amp;quot;.[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:23 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.6. Understand the differences of '''[[contents]]''' (functional, factual, creative) of information (I don't understand this item --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 07:51 (UTC) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --''(needs to be clarified with Theo. This item could be moved to syllabus chapter 2 - after 2.0. [[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:31 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.7. Understand the differences of '''[[formats]]''' (open, privative) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --''(there is no such word &amp;quot;privative&amp;quot;. We recommend &amp;quot;Understand the differences of data formats (open, private, business, etc.)&amp;quot; This item could be moved to syllabus chapter 2 - after 2.0. [[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:36 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.8. Understand the notion of '''[[identity]]''' &lt;br /&gt;
&lt;br /&gt;
maybe to be repositioned in some other chapter --[[Utilisateur:Remilevy|Rémi LEVY]] 9 juin 2011 à 19:49 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.9.  '''[[eTools]]''' : Product versus function &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Should be clarified--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:48 (UTC) )''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.10. Be aware of '''different identity for authorization theft methods''' (skimming, pretexting, shoulder surfing, information diving…) &lt;br /&gt;
&lt;br /&gt;
#must be repositioned into the scam/hoax (chapter 5 or 6) ?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''( We recommend to leave in this chapter--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:00 (UTC) )''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.11. Be aware of '''[[privacy protection]] legal act''' (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies and so on).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.12. '''Organizational [[security]]''' (school security) – or [[social engineering]]?, usage of school web pages, content publishing, access &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''( social engineering is already mentioned in 1.5. We recommend &amp;quot;Know about '''Organizational [[security]]''': school security, usage of school web pages, content publishing, access, etc.&amp;quot;--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:56 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Privacy and data management===&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Syllabus_e-safety#Privacy_and_data_management see the chapter]&lt;br /&gt;
&lt;br /&gt;
I suggest : to begin with &amp;quot;Distinguish between data and information&amp;quot; --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 07:49 (UTC)&lt;br /&gt;
&lt;br /&gt;
(...)&lt;br /&gt;
&lt;br /&gt;
2.7. Understand what '''[[intellectual property]]''' on Internet is and be aware of [[privacy protection]] legal act. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Privacy protection legal act is already mentioned in 1.11. Lets make this one only &amp;quot;Understand what '''[[intellectual property]]''' on Internet is.&amp;quot;--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:11 (UTC) )''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
(...)&lt;br /&gt;
&lt;br /&gt;
2.9. '''Privacy Management''' : Know how to '''start and finish safe browsing session''' (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing.&lt;br /&gt;
&lt;br /&gt;
# 2.9 to 2.11 to me merged ? --[[Utilisateur:Remilevy|Rémi LEVY]] 10 juin 2011 à 07:49 (UTC)&lt;br /&gt;
&lt;br /&gt;
: 2.10. Know how to browse the Web securable. Know about advantages, disadvantages and dangers of Internet '''cookies'''. Know about tools that ensure safety when browsing the Internet (blocking of cookies, ActiveX control, etc.)&lt;br /&gt;
&lt;br /&gt;
: 2.11. [#Privacy-RL] Be able to manage, clear temporary Internet files, browser history, passwords, cookies, and autocomplete data.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(2.9 , 2.10 , 2.11 may be consolidated and must be moved to chapter 5 --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:17 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
: ''As it is technical, I don't see why to put this on chapter 5 which is more about behaviour in social network''--[[Utilisateur:Remilevy|Rémi LEVY]] 10 juin 2011 à 07:53 (UTC)&lt;br /&gt;
&lt;br /&gt;
===Security tools and network security===&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Syllabus_e-safety#Security_tools_and_network_security see the chapter]&lt;br /&gt;
&lt;br /&gt;
see how integrate from 3.5 to 2.11 --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 07:52 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3.1. Know computer '''network types''' , &lt;br /&gt;
&lt;br /&gt;
''&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;(local area network (LAN), wide area network (WAN), virtual private network (VPN))&amp;lt;/span&amp;gt; ''and why protection is needed.--[[Utilisateur:Donarena|Renata (Lithuania Team)]] 8 juin 2011 à 16:19 (UTC)&lt;br /&gt;
&lt;br /&gt;
3.2. Know different network '''connection methods''' (Mobile networks, Wireless, Cable).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network.&amp;lt;/span&amp;gt;--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:30 (UTC)&lt;br /&gt;
&lt;br /&gt;
3.3. '''Sharing and accessing resources''' over network (Files, Printer, Screen).&lt;br /&gt;
&lt;br /&gt;
3.4. Understand '''safety means of computer networks''' (Firewall, Antivirus, Password protection, Connection encryption – wireless). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Firewall, Antivirus, Password protection, Connection encryption are all already mentioned in other items and fit there by content and integrity better. We recommend to cross this 3.4. out at all)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:36 (UTC)''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
3.5. Be able to use standard '''OS integrated protection tools'''. &lt;br /&gt;
&lt;br /&gt;
3.6. [[#see how integrate 3.5 to 2.11 : &amp;quot;'''All about  [[malware]] and intrusion protection tools'''&amp;quot; - RL]] Know what a quality anti-virus, anti-spyware, spam blocker, and personal [[firewall]] is and how to use it. (Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.), know that it is unsafe to turn [[antivirus]] software off and know consequences). Distinguish different modes of antivirus protection (active, passive…).&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.7.[#Updating operating system- RL]. Know how to follow, download and use updates for your operating system, software and importance of antivirus definition files. Understand the benefits of these updates. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.8. Distinguish different modes of antivirus protection (active, passive…).[# see also 3.6]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.9. Know what has to be done and in what order, if you suspect that computer system is infected. &lt;br /&gt;
&lt;br /&gt;
: 3.10. Distinguish infected files deletion, quarantining and curing. &lt;br /&gt;
&lt;br /&gt;
: 3.11. Informal and formal periodic external checkup. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(what do you mean by &amp;quot;checkup&amp;quot;)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:30 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Children, newcomers in schools and workplaces : means of safe use for socio-digital inclusion===&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Syllabus_e-safety#Children.2C_newcomers_in_schools_and_workplaces_:_means_of_safe_use_for_socio-digital_inclusion see the chapter]&lt;br /&gt;
&lt;br /&gt;
Have discussion.....--[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 09:05 (UTC)&lt;br /&gt;
&lt;br /&gt;
to discuss new topic :&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(what is a socio-digital inclusion? Maybe we can shorten this chapter name to &amp;quot;Children, newcomers in schools and workplaces&amp;quot;?--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:49 (UTC) )''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4.1. Understand '''the impact of communication''' with new users '''about safety''' in IT World, &lt;br /&gt;
&lt;br /&gt;
4.2. Policy : Be able to '''develop policies and applicate methods''' for children’s use of the computer and the Internet (depending on age and socio-cultural situation) &lt;br /&gt;
&lt;br /&gt;
4.3. Understand the purpose of '''monitoring, filtering and controlling tools''' against children computer usage and web browsing.&lt;br /&gt;
&lt;br /&gt;
4.4. Understanding '''advantages and limitations with protection software'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Need more items in this chapter. After consolidation in Latvia this chapter has become even shorter than it was. And it was already short :). Maybe we can try to expand again to look more like the previous version, but less stick to children, as you mentioned in Latvia)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:49 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter 5 ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
5.1. Know when and in which cases '''personal information''' can be published on the Internet, i.e. status publishing about leaving home,.&lt;br /&gt;
&lt;br /&gt;
5.2. Understand what a social network is, what are '''opportunities and risks of social network'''. Age groups of using social networks. Options and parameters for information disclosure. Understand that it is not safe to disclose information about user accounts, passwords and so on.&lt;br /&gt;
&lt;br /&gt;
5.3. Know different '''social network types''' and be able to use them harmless and safe (appropriate '''account privacy settings''').&lt;br /&gt;
&lt;br /&gt;
5.4. ('''Publishing content''')Know what type of information recommended to be published on social network, be responsible for published content, know impacts &lt;br /&gt;
&lt;br /&gt;
5.5. Be able to safely '''connect to e-Services and secure environments'''– connecting and using, recover lost passwords. &lt;br /&gt;
&lt;br /&gt;
5.6. (Emails)Be able to '''send/receive e-mail securely'''. Know how to reject email from specific email addresses. Know how to treat email messages from unknown senders&lt;br /&gt;
&lt;br /&gt;
5.7. (Spam and malware) Be able (understand) to use '''network resource controlling software and hardware'''. Know about email that is classified as spam, and email messages infected with malware. &lt;br /&gt;
&lt;br /&gt;
5.8. Be aware of network resource controlling software and hardware. Know how to reject email from specific email addresses.Know about scam, hoax, chain letters...[5.7 &amp;amp; 5.8 to be merged - RL]&lt;br /&gt;
&lt;br /&gt;
5.9. Understand threats of '''virtual communication''': virtual dating, bullying, commenting, &lt;br /&gt;
&lt;br /&gt;
5.10. '''Dependency and addiction to the Internet'''. [# to be develop - TL]&lt;br /&gt;
&lt;br /&gt;
5.11. Understand ''''threats of inappropriate content''' for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on)&lt;br /&gt;
&lt;br /&gt;
5.12. '''Reliability of information''' (Understand that it is not safe to disclose information about user accounts, passwords and so on. can not fully trust content and identities on the internet. (i.e. blogs, Wikipedia, etc).&lt;br /&gt;
&lt;br /&gt;
5.13. '''Reputation management'''. Know who you should contact if you discovered inappropriate information about you or your related digital identities. .&lt;br /&gt;
&lt;br /&gt;
5.14. '''Abuse management''', cyber bullying, cyber-mobbing, when is it possible to remove, when to put additional correct information.&lt;br /&gt;
&lt;br /&gt;
5.15. Understand that online socializing reflects &amp;quot;real life&amp;quot;&lt;br /&gt;
&lt;br /&gt;
5.16. Know about the 2 types of [[social networking]] : [[Friendship-driven]] and [[Interest-driven]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Social networks types are already mentioned in 5.3. &lt;br /&gt;
&lt;br /&gt;
Maybe it can be consolidated or is it different at all?)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 17:03 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
5.17. Understand what is [[Online Safety 3.0]] : research-based, Flexible, layered, Respectful, Positive, empowering, contextual....&lt;br /&gt;
&lt;br /&gt;
5.18. Know reputation and legal safety&lt;br /&gt;
&lt;br /&gt;
5.19. Know about identity, property and community safety&lt;br /&gt;
&lt;br /&gt;
5.20. Understand why [[digital citizenship]] is protective and is the best filter ever : pre-installed, free of charge, improve with use...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(In previous version before Latvia meeting there were items:&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information and etc.&amp;lt;br&amp;gt; &lt;br /&gt;
Know about social viruses, chain letters.&amp;lt;br&amp;gt; &lt;br /&gt;
Know threats of virtual communication (social networks, IM, e-mail and ect.): virtual dating, bullying, commenting, and dependence on the Internet.&amp;lt;br&amp;gt; &lt;br /&gt;
We could consolidate those, but we think that safe IM and social threats are important too and should be included)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:56 (UTC)''&amp;lt;/span&amp;gt;&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Discussion:Syllabus_e-safety&amp;diff=4821</id>
		<title>Discussion:Syllabus e-safety</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Discussion:Syllabus_e-safety&amp;diff=4821"/>
				<updated>2011-06-17T07:06:09Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Discussions'''&lt;br /&gt;
&lt;br /&gt;
Here is the place to make comments on the Syllabus. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Todo list =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- Focus map&lt;br /&gt;
&lt;br /&gt;
- Define number of chapters&lt;br /&gt;
&lt;br /&gt;
- Organise Items and Notions&lt;br /&gt;
&lt;br /&gt;
- Find Quiz&lt;br /&gt;
&lt;br /&gt;
- Discuss about chapter 4 --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 09:04 (UTC)&lt;br /&gt;
&lt;br /&gt;
- Give the rights on Mindomo --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 09:18 (UTC)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= General considerations =&lt;br /&gt;
&lt;br /&gt;
- One should avoid the term ''virtual'' since it deludes into thinking that things are not real. ''Electronic'' or ''online'' should be preferred&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=About Items=&lt;br /&gt;
&lt;br /&gt;
===Chapter 1 - Basic knowledge on e-safety===&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Syllabus_e-safety#Basic_knowledge_on_e-safety see the chapter]&lt;br /&gt;
&lt;br /&gt;
1.1. History : from static '''web1 to''' dynamic '''web2''' environments &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --''(What are those web1, web2 and web3 environments? Is it necessary? &amp;lt;/span&amp;gt;[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 14:58 (UTC))''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.2. Intention : '''[[web3]]''' proposing constructive engagement in participatory society (or : [[security]] through light instead of old model of [[security]] through obscurity), &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;  --''(same here - we actually do not understand what is it about&amp;lt;/span&amp;gt;[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:11 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
here is a reference about obscurity: http://en.wikipedia.org/wiki/Security_through_obscurity&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.3. Know about '''equity between opportunities &amp;amp; risks''' since [[web2]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --''(if speaking about opportunities &amp;amp; risks it should be clarified - do we mean Internet? if so - it should be mentioned.[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:11 (UTC))'' &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.4. Know about '''[[netiquette]] and other basic codes''' of conducts in the cyberspace (RFC 1855) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --''(what do you mean by &amp;quot;basic codes&amp;quot;?[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:11 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.5. Know about '''[[social engineering]]''' and it’s methods, including participative culture and abuses if you don't understand/respect them, for example having your password stolen (to be reformulated) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --'')what is &amp;quot;participative culture and abuses&amp;quot;? We think that it is already included in the definition of social engineerging. We recommend to stick to version &amp;quot;Know about '''[[social engineering]]''' and it’s methods&amp;quot;.[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:23 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.6. Understand the differences of '''[[contents]]''' (functional, factual, creative) of information (I don't understand this item --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 07:51 (UTC) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --''(needs to be clarified with Theo. This item could be moved to syllabus chapter 2 - after 2.0. [[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:31 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.7. Understand the differences of '''[[formats]]''' (open, privative) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --''(there is no such word &amp;quot;privative&amp;quot;. We recommend &amp;quot;Understand the differences of data formats (open, private, business, etc.)&amp;quot; This item could be moved to syllabus chapter 2 - after 2.0. [[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:36 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.8. Understand the notion of '''[[identity]]''' &lt;br /&gt;
&lt;br /&gt;
maybe to be repositioned in some other chapter --[[Utilisateur:Remilevy|Rémi LEVY]] 9 juin 2011 à 19:49 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.9.  '''[[eTools]]''' : Product versus function &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Should be clarified--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:48 (UTC) )''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.10. Be aware of '''different identity for authorization theft methods''' (skimming, pretexting, shoulder surfing, information diving…) &lt;br /&gt;
&lt;br /&gt;
#must be repositioned into the scam/hoax (chapter 5 or 6) ?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''( We recommend to leave in this chapter--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:00 (UTC) )''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.11. Be aware of '''[[privacy protection]] legal act''' (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies and so on).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.12. '''Organizational [[security]]''' (school security) – or [[social engineering]]?, usage of school web pages, content publishing, access &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''( social engineering is already mentioned in 1.5. We recommend &amp;quot;Know about '''Organizational [[security]]''': school security, usage of school web pages, content publishing, access, etc.&amp;quot;--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:56 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Privacy and data management===&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Syllabus_e-safety#Privacy_and_data_management see the chapter]&lt;br /&gt;
&lt;br /&gt;
I suggest : to begin with &amp;quot;Distinguish between data and information&amp;quot; --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 07:49 (UTC)&lt;br /&gt;
&lt;br /&gt;
(...)&lt;br /&gt;
&lt;br /&gt;
2.7. Understand what '''[[intellectual property]]''' on Internet is and be aware of [[privacy protection]] legal act. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Privacy protection legal act is already mentioned in 1.11. Lets make this one only &amp;quot;Understand what '''[[intellectual property]]''' on Internet is.&amp;quot;--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:11 (UTC) )''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
(...)&lt;br /&gt;
&lt;br /&gt;
2.9. '''Privacy Management''' : Know how to '''start and finish safe browsing session''' (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing.&lt;br /&gt;
&lt;br /&gt;
# 2.9 to 2.11 to me merged ? --[[Utilisateur:Remilevy|Rémi LEVY]] 10 juin 2011 à 07:49 (UTC)&lt;br /&gt;
&lt;br /&gt;
: 2.10. Know how to browse the Web securable. Know about advantages, disadvantages and dangers of Internet '''cookies'''. Know about tools that ensure safety when browsing the Internet (blocking of cookies, ActiveX control, etc.)&lt;br /&gt;
&lt;br /&gt;
: 2.11. [#Privacy-RL] Be able to manage, clear temporary Internet files, browser history, passwords, cookies, and autocomplete data.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(2.9 , 2.10 , 2.11 may be consolidated and must be moved to chapter 5 --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:17 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
: ''As it is technical, I don't see why to put this on chapter 5 which is more about behaviour in social network''--[[Utilisateur:Remilevy|Rémi LEVY]] 10 juin 2011 à 07:53 (UTC)&lt;br /&gt;
&lt;br /&gt;
===Security tools and network security===&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Syllabus_e-safety#Security_tools_and_network_security see the chapter]&lt;br /&gt;
&lt;br /&gt;
see how integrate from 3.5 to 2.11 --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 07:52 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3.1. Know computer '''network types''' , &lt;br /&gt;
&lt;br /&gt;
''&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;(local area network (LAN), wide area network (WAN), virtual private network (VPN))&amp;lt;/span&amp;gt; ''and why protection is needed.--[[Utilisateur:Donarena|Renata (Lithuania Team)]] 8 juin 2011 à 16:19 (UTC)&lt;br /&gt;
&lt;br /&gt;
3.2. Know different network '''connection methods''' (Mobile networks, Wireless, Cable).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network.&amp;lt;/span&amp;gt;--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:30 (UTC)&lt;br /&gt;
&lt;br /&gt;
3.3. '''Sharing and accessing resources''' over network (Files, Printer, Screen).&lt;br /&gt;
&lt;br /&gt;
3.4. Understand '''safety means of computer networks''' (Firewall, Antivirus, Password protection, Connection encryption – wireless). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Firewall, Antivirus, Password protection, Connection encryption are all already mentioned in other items and fit there by content and integrity better. We recommend to cross this 3.4. out at all)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:36 (UTC)''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
3.5. Be able to use standard '''OS integrated protection tools'''. &lt;br /&gt;
&lt;br /&gt;
3.6. [[#see how integrate 3.5 to 2.11 : &amp;quot;'''All about  [[malware]] and intrusion protection tools'''&amp;quot; - RL]] Know what a quality anti-virus, anti-spyware, spam blocker, and personal [[firewall]] is and how to use it. (Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.), know that it is unsafe to turn [[antivirus]] software off and know consequences). Distinguish different modes of antivirus protection (active, passive…).&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.7.[#Updating operating system- RL]. Know how to follow, download and use updates for your operating system, software and importance of antivirus definition files. Understand the benefits of these updates. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.8. Distinguish different modes of antivirus protection (active, passive…).[# see also 3.6]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.9. Know what has to be done and in what order, if you suspect that computer system is infected. &lt;br /&gt;
&lt;br /&gt;
: 3.10. Distinguish infected files deletion, quarantining and curing. &lt;br /&gt;
&lt;br /&gt;
: 3.11. Informal and formal periodic external checkup. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(what do you mean by &amp;quot;checkup&amp;quot;)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:30 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Children, newcomers in schools and workplaces : means of safe use for socio-digital inclusion===&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Syllabus_e-safety#Children.2C_newcomers_in_schools_and_workplaces_:_means_of_safe_use_for_socio-digital_inclusion see the chapter]&lt;br /&gt;
&lt;br /&gt;
Have discussion.....--[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 09:05 (UTC)&lt;br /&gt;
&lt;br /&gt;
to discuss new topic :&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(what is a socio-digital inclusion? Maybe we can shorten this chapter name to &amp;quot;Children, newcomers in schools and workplaces&amp;quot;?--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:49 (UTC) )''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4.1. Understand '''the impact of communication''' with new users '''about safety''' in IT World, &lt;br /&gt;
&lt;br /&gt;
4.2. Policy : Be able to '''develop policies and applicate methods''' for children’s use of the computer and the Internet (depending on age and socio-cultural situation) &lt;br /&gt;
&lt;br /&gt;
4.3. Understand the purpose of '''monitoring, filtering and controlling tools''' against children computer usage and web browsing.&lt;br /&gt;
&lt;br /&gt;
4.4. Understanding '''advantages and limitations with protection software'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Need more items in this chapter. After consolidation in Latvia this chapter has become even shorter than it was. And it was already short :). Maybe we can try to expand again to look more like the previous version, but less stick to children, as you mentioned in Latvia)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:49 (UTC)''&amp;lt;/span&amp;gt;&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Discussion:Syllabus_e-safety&amp;diff=4820</id>
		<title>Discussion:Syllabus e-safety</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Discussion:Syllabus_e-safety&amp;diff=4820"/>
				<updated>2011-06-17T07:04:31Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : /* Children, newcomers in schools and workplaces : means of safe use for socio-digital inclusion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Discussions'''&lt;br /&gt;
&lt;br /&gt;
Here is the place to make comments on the Syllabus. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Todo list =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- Focus map&lt;br /&gt;
&lt;br /&gt;
- Define number of chapters&lt;br /&gt;
&lt;br /&gt;
- Organise Items and Notions&lt;br /&gt;
&lt;br /&gt;
- Find Quiz&lt;br /&gt;
&lt;br /&gt;
- Discuss about chapter 4 --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 09:04 (UTC)&lt;br /&gt;
&lt;br /&gt;
- Give the rights on Mindomo --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 09:18 (UTC)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= General considerations =&lt;br /&gt;
&lt;br /&gt;
- One should avoid the term ''virtual'' since it deludes into thinking that things are not real. ''Electronic'' or ''online'' should be preferred&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=About Items=&lt;br /&gt;
&lt;br /&gt;
===Chapter 1 - Basic knowledge on e-safety===&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Syllabus_e-safety#Basic_knowledge_on_e-safety see the chapter]&lt;br /&gt;
&lt;br /&gt;
1.1. History : from static '''web1 to''' dynamic '''web2''' environments &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --''(What are those web1, web2 and web3 environments? Is it necessary? &amp;lt;/span&amp;gt;[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 14:58 (UTC))''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.2. Intention : '''[[web3]]''' proposing constructive engagement in participatory society (or : [[security]] through light instead of old model of [[security]] through obscurity), &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;  --''(same here - we actually do not understand what is it about&amp;lt;/span&amp;gt;[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:11 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
here is a reference about obscurity: http://en.wikipedia.org/wiki/Security_through_obscurity&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.3. Know about '''equity between opportunities &amp;amp; risks''' since [[web2]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --''(if speaking about opportunities &amp;amp; risks it should be clarified - do we mean Internet? if so - it should be mentioned.[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:11 (UTC))'' &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.4. Know about '''[[netiquette]] and other basic codes''' of conducts in the cyberspace (RFC 1855) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --''(what do you mean by &amp;quot;basic codes&amp;quot;?[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:11 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.5. Know about '''[[social engineering]]''' and it’s methods, including participative culture and abuses if you don't understand/respect them, for example having your password stolen (to be reformulated) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --'')what is &amp;quot;participative culture and abuses&amp;quot;? We think that it is already included in the definition of social engineerging. We recommend to stick to version &amp;quot;Know about '''[[social engineering]]''' and it’s methods&amp;quot;.[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:23 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.6. Understand the differences of '''[[contents]]''' (functional, factual, creative) of information (I don't understand this item --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 07:51 (UTC) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --''(needs to be clarified with Theo. This item could be moved to syllabus chapter 2 - after 2.0. [[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:31 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.7. Understand the differences of '''[[formats]]''' (open, privative) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt; --''(there is no such word &amp;quot;privative&amp;quot;. We recommend &amp;quot;Understand the differences of data formats (open, private, business, etc.)&amp;quot; This item could be moved to syllabus chapter 2 - after 2.0. [[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:36 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.8. Understand the notion of '''[[identity]]''' &lt;br /&gt;
&lt;br /&gt;
maybe to be repositioned in some other chapter --[[Utilisateur:Remilevy|Rémi LEVY]] 9 juin 2011 à 19:49 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.9.  '''[[eTools]]''' : Product versus function &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Should be clarified--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:48 (UTC) )''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.10. Be aware of '''different identity for authorization theft methods''' (skimming, pretexting, shoulder surfing, information diving…) &lt;br /&gt;
&lt;br /&gt;
#must be repositioned into the scam/hoax (chapter 5 or 6) ?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''( We recommend to leave in this chapter--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:00 (UTC) )''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.11. Be aware of '''[[privacy protection]] legal act''' (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies and so on).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.12. '''Organizational [[security]]''' (school security) – or [[social engineering]]?, usage of school web pages, content publishing, access &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''( social engineering is already mentioned in 1.5. We recommend &amp;quot;Know about '''Organizational [[security]]''': school security, usage of school web pages, content publishing, access, etc.&amp;quot;--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:56 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Privacy and data management===&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Syllabus_e-safety#Privacy_and_data_management see the chapter]&lt;br /&gt;
&lt;br /&gt;
I suggest : to begin with &amp;quot;Distinguish between data and information&amp;quot; --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 07:49 (UTC)&lt;br /&gt;
&lt;br /&gt;
(...)&lt;br /&gt;
&lt;br /&gt;
2.7. Understand what '''[[intellectual property]]''' on Internet is and be aware of [[privacy protection]] legal act. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Privacy protection legal act is already mentioned in 1.11. Lets make this one only &amp;quot;Understand what '''[[intellectual property]]''' on Internet is.&amp;quot;--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:11 (UTC) )''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
(...)&lt;br /&gt;
&lt;br /&gt;
2.9. '''Privacy Management''' : Know how to '''start and finish safe browsing session''' (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing.&lt;br /&gt;
&lt;br /&gt;
# 2.9 to 2.11 to me merged ? --[[Utilisateur:Remilevy|Rémi LEVY]] 10 juin 2011 à 07:49 (UTC)&lt;br /&gt;
&lt;br /&gt;
: 2.10. Know how to browse the Web securable. Know about advantages, disadvantages and dangers of Internet '''cookies'''. Know about tools that ensure safety when browsing the Internet (blocking of cookies, ActiveX control, etc.)&lt;br /&gt;
&lt;br /&gt;
: 2.11. [#Privacy-RL] Be able to manage, clear temporary Internet files, browser history, passwords, cookies, and autocomplete data.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(2.9 , 2.10 , 2.11 may be consolidated and must be moved to chapter 5 --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:17 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
: ''As it is technical, I don't see why to put this on chapter 5 which is more about behaviour in social network''--[[Utilisateur:Remilevy|Rémi LEVY]] 10 juin 2011 à 07:53 (UTC)&lt;br /&gt;
&lt;br /&gt;
===Security tools and network security===&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Syllabus_e-safety#Security_tools_and_network_security see the chapter]&lt;br /&gt;
&lt;br /&gt;
see how integrate from 3.5 to 2.11 --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 07:52 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3.1. Know computer '''network types''' , &lt;br /&gt;
&lt;br /&gt;
''&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;(local area network (LAN), wide area network (WAN), virtual private network (VPN))&amp;lt;/span&amp;gt; ''and why protection is needed.--[[Utilisateur:Donarena|Renata (Lithuania Team)]] 8 juin 2011 à 16:19 (UTC)&lt;br /&gt;
&lt;br /&gt;
3.2. Know different network '''connection methods''' (Mobile networks, Wireless, Cable).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network.&amp;lt;/span&amp;gt;--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:30 (UTC)&lt;br /&gt;
&lt;br /&gt;
3.3. '''Sharing and accessing resources''' over network (Files, Printer, Screen).&lt;br /&gt;
&lt;br /&gt;
3.4. Understand '''safety means of computer networks''' (Firewall, Antivirus, Password protection, Connection encryption – wireless). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Firewall, Antivirus, Password protection, Connection encryption are all already mentioned in other items and fit there by content and integrity better. We recommend to cross this 3.4. out at all)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:36 (UTC)''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
3.5. Be able to use standard '''OS integrated protection tools'''. &lt;br /&gt;
&lt;br /&gt;
3.6. [[#see how integrate 3.5 to 2.11 : &amp;quot;'''All about  [[malware]] and intrusion protection tools'''&amp;quot; - RL]] Know what a quality anti-virus, anti-spyware, spam blocker, and personal [[firewall]] is and how to use it. (Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.), know that it is unsafe to turn [[antivirus]] software off and know consequences). Distinguish different modes of antivirus protection (active, passive…).&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.7.[#Updating operating system- RL]. Know how to follow, download and use updates for your operating system, software and importance of antivirus definition files. Understand the benefits of these updates. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.8. Distinguish different modes of antivirus protection (active, passive…).[# see also 3.6]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.9. Know what has to be done and in what order, if you suspect that computer system is infected. &lt;br /&gt;
&lt;br /&gt;
: 3.10. Distinguish infected files deletion, quarantining and curing. &lt;br /&gt;
&lt;br /&gt;
: 3.11. Informal and formal periodic external checkup. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(what do you mean by &amp;quot;checkup&amp;quot;)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:30 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Children, newcomers in schools and workplaces : means of safe use for socio-digital inclusion===&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Syllabus_e-safety#Children.2C_newcomers_in_schools_and_workplaces_:_means_of_safe_use_for_socio-digital_inclusion see the chapter]&lt;br /&gt;
&lt;br /&gt;
Have discussion.....--[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 09:05 (UTC)&lt;br /&gt;
&lt;br /&gt;
to discuss new topic :&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(what is a socio-digital inclusion? Maybe we can shorten this chapter name to &amp;quot;Children, newcomers in schools and workplaces&amp;quot;?--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:49 (UTC) )''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4.1. Understand '''the impact of communication''' with new users '''about safety''' in IT World, &lt;br /&gt;
&lt;br /&gt;
4.2. Policy : Be able to '''develop policies and applicate methods''' for children’s use of the computer and the Internet (depending on age and socio-cultural situation) &lt;br /&gt;
&lt;br /&gt;
4.3. Understand the purpose of '''monitoring, filtering and controlling tools''' against children computer usage and web browsing.&lt;br /&gt;
&lt;br /&gt;
4.4. Understanding '''advantages and limitations with protection software'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Need more items in this chapter. After consolidation in Latvia this chapter has become even shorter than it was. And it was already short :). Maybe we can try to expand again to look more like the previous version, but less stick to children, as you mentioned in Latvia)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:49 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Internet use of minors - Risks and opportunities - Recommendations for peadagogues, educators and parents ==&lt;br /&gt;
&lt;br /&gt;
4.1 Understand the impact of communication with minors about safety in IT world &lt;br /&gt;
4.2 Be able to develop policies and applicate methods for minor´s use of the computer and the internet ( depending on age and on the responsibility for the minor ( school, public institution, family)&lt;br /&gt;
4.3 Understand the purpose of monitoring, filtering and controlling tools for safer internet use of minors&lt;br /&gt;
4.4 Understanding advantages and limitations with protection software&lt;br /&gt;
&lt;br /&gt;
===Social networks and safe usage of the Internet===&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Syllabus_e-safety#Social_networks_and_safe_usage_of_the_Internet see the chapter]&lt;br /&gt;
&lt;br /&gt;
I suggest &amp;quot;5.10. Dependency and addiction to the Internet&amp;quot; to be develop --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 07:46 (UTC)&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4819</id>
		<title>Syllabus e-safety</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4819"/>
				<updated>2011-06-17T07:02:11Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : /* Mind mapping for the key-notions of the syllabus */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''e-GUARDIAN - Syllabus V.2.x&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
== Introduction : aims &amp;amp; resources ==&lt;br /&gt;
&lt;br /&gt;
=== Aims ===&lt;br /&gt;
This wiki page aims at facilitating a collaborative synergic process for defining the syllabus on netsafety of the EU LdV e-Guardian project.&lt;br /&gt;
Participants are delegates of partner's institutions from Lithuania, Latvia, Germany and Switzerland.&lt;br /&gt;
&lt;br /&gt;
The resources are : &lt;br /&gt;
&lt;br /&gt;
=== A web-based social bookmarking working group === &lt;br /&gt;
on [http://groups.diigo.com/group/e_safety here on Diigo],  we can post all related useful information on netsafety, such as : &lt;br /&gt;
&lt;br /&gt;
- definition of key-words&lt;br /&gt;
&lt;br /&gt;
- examples of quizz, pedagogical scenarios and other pedagogical resources&lt;br /&gt;
&lt;br /&gt;
- related scientific articles &lt;br /&gt;
&lt;br /&gt;
- other relevant initiatives&lt;br /&gt;
&lt;br /&gt;
=== Guidelines for the syllabus === &lt;br /&gt;
They wwere provided by the project's team coordinated by the LIA organisation, and specially the syllabus workpackage leader, ecdl.lt, represented by Eugenijus Telesius and his team composed of Renata Danieliene &amp;amp; Tomas Lygutas, which is complemented by partner's delegate Algimantas Merkys (LIA, the coordinator's team), Dennis Krannich (Bremen Univbersity), Théo Bondolfi &amp;amp; Rémi Lévy (APTES Switzerland). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
These guidelines are : &lt;br /&gt;
&lt;br /&gt;
1. Focus on [[e-safety]] [[offline]] as well as [[online]], therefore always taking into account basic needs (such as password storage) as well as complex needs (such as behaviour in [[web2]] environments).&lt;br /&gt;
&lt;br /&gt;
2. Taking into account all key-points in this initial version, and considering these key-point as &amp;quot;objects&amp;quot; whcih can be replaced in other forms but which must stay available.&lt;br /&gt;
&lt;br /&gt;
3. respecting the steps of user point of view (example : 1 start computer, 2 launch application...)&lt;br /&gt;
&lt;br /&gt;
4. restructuring with categories and sets like in the policies of ECDL [http://www.ecdl.org/programmes/media/ECDL_ICDL_Module_12_-_Syllabus_-_V1.0.pdf]&lt;br /&gt;
&lt;br /&gt;
5. keeping as much as possible the existing phrases and formulations, only changing (merging, repositioning, pionderating) when it suits the next step of test/scenarios&lt;br /&gt;
&lt;br /&gt;
6. Keeping in mind the final intention of '''equity between risks &amp;amp; opportunities''' proposing positive practices (opportunities, in an educative perspective) and preventing bad practices (risks, which creates fear), based on the vision of the slide 10 of [http://www.slideshare.net/Bernajean/ne-3440462 this presentation of Anne Collier], which says that netsafety3.0 should be : &lt;br /&gt;
&lt;br /&gt;
- research-based, not fearbased, therefore relevant&lt;br /&gt;
&lt;br /&gt;
- flexible &amp;amp; layered, instead of &amp;quot;one-size-fits-all&amp;quot;&lt;br /&gt;
&lt;br /&gt;
- respectful of learning culture : stakeholders in positive experience, not just potential victims&lt;br /&gt;
&lt;br /&gt;
- positive, empowering : not just safety from, but safety for...&lt;br /&gt;
&lt;br /&gt;
- full, constructive engagement in participatory society (that's the context of the construction of this syllabus)&lt;br /&gt;
&lt;br /&gt;
=== Mind mapping for the key-notions of the syllabus ===&lt;br /&gt;
&lt;br /&gt;
In addition, Rémi Levy from APTES has produced a [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea mind mapping image] to represent all the notions for the e-safety syllabus. You can access to [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea the interactive map] - You can modify it directly because we keep a copy of the precedent contribution.&lt;br /&gt;
&lt;br /&gt;
== Other possible structure of the syllabus - A.P.T.E.S proposition ==&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Proposition access to the page]&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 1 SYLLABUS - Basic knowledge on e-safety ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version of Lithuania Team - 2011-06-15----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:30 (UTC)&lt;br /&gt;
=======================================&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.1. Understand the differences of information contents (open, private, business, etc.).&lt;br /&gt;
&lt;br /&gt;
1.2. Be aware of privacy protection legal act (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies, etc). &lt;br /&gt;
&lt;br /&gt;
1.3. Know about '''equity between opportunities &amp;amp; risks''' of web2&lt;br /&gt;
&lt;br /&gt;
1.4. Understand the notion of identity. &lt;br /&gt;
&lt;br /&gt;
1.5. Be aware of different identity for authorization theft methods (skimming, pretexting, shoulder surfing, information diving).&lt;br /&gt;
&lt;br /&gt;
1.6. Know about social engineering and it’s methods. &lt;br /&gt;
&lt;br /&gt;
1.7. Be aware of cyber crime, online predators, financial scams, harm and who to contact if discovered illegal data.&lt;br /&gt;
&lt;br /&gt;
1.8. Understand computer infection threats (viruses, Trojan horses, spyware, dishonest adware, etc.). Know when and how malicious software can get into computer system.&lt;br /&gt;
&lt;br /&gt;
1.9. Know about organizational security: school security, usage of school web pages, content publishing, access, etc. &lt;br /&gt;
&lt;br /&gt;
1.10. Know about netiquette and other basic codes of conducts in the cyberspace (RFC 1855).&lt;br /&gt;
&lt;br /&gt;
=======================================&lt;br /&gt;
 &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;IT IS BETTER IF COMMENTS AND DISCUSSIONS ARE MADE THE DISCUSSION PAGE &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
1.1. History : from static '''web1 to''' dynamic '''web2''' environments &lt;br /&gt;
&lt;br /&gt;
1.2. Intention : '''[[web3]]''' proposing constructive engagement in participatory society (or : [[security]] through light instead of old model of [[security]] through obscurity.&lt;br /&gt;
&lt;br /&gt;
1.3. Know about '''equity between opportunities &amp;amp; risks''' since [[web2]]&lt;br /&gt;
&lt;br /&gt;
1.4. Know about '''[[netiquette]] and other basic codes''' of conducts in the cyberspace (RFC 1855) &lt;br /&gt;
&lt;br /&gt;
1.5. Know about '''[[social engineering]]''' and it’s methods, including participative culture and abuses if you don't understand/respect them, for example having your password stolen (to be reformulated) &lt;br /&gt;
&lt;br /&gt;
1.6. Understand the differences of '''[[contents]]''' (functional, factual, creative) of information &lt;br /&gt;
&lt;br /&gt;
1.7. Understand the differences of '''[[formats]]''' (open, privative) &lt;br /&gt;
&lt;br /&gt;
1.8. Understand the notion of '''[[identity]]''' (maybe to be repositioned in some other chapter)&lt;br /&gt;
&lt;br /&gt;
1.9.  '''[[eTools]]''' : Product versus function &lt;br /&gt;
&lt;br /&gt;
1.10. Be aware of '''different identity for authorization theft methods''' (skimming, pretexting, shoulder surfing, information diving…) &lt;br /&gt;
&lt;br /&gt;
1.11. Be aware of '''[[privacy protection]] legal act''' (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies and so on).&lt;br /&gt;
&lt;br /&gt;
1.12. '''Organizational [[security]]''' (school security) – or [[social engineering]]?, usage of school web pages, content publishing, access&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 2 SYLLABUS - Privacy and data management ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version of Lithuania Team - 2011-06-15----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:30 (UTC)&lt;br /&gt;
=======================================&lt;br /&gt;
&lt;br /&gt;
2.1. Distinguish between data and information.&lt;br /&gt;
&lt;br /&gt;
2.2. Understand the opportunities and risks of digital data management from fully collaborative to full privacy. &lt;br /&gt;
&lt;br /&gt;
2.3. Know about multi-layer password creation, changing and keeping password policies. &lt;br /&gt;
&lt;br /&gt;
2.4. Know about safe computer login methods. &lt;br /&gt;
&lt;br /&gt;
2.5. Know multiple user accounts on various digital environments. Understand the meaning and importance of access rights (what a personal user account is and how data of different users is separated). &lt;br /&gt;
&lt;br /&gt;
2.6. Be aware of data encryption, decryption and password protected files. &lt;br /&gt;
&lt;br /&gt;
2.7. Understand what intellectual property on Internet is. &lt;br /&gt;
&lt;br /&gt;
2.8. Understand the benefits and purpose of data backups and be able to restore lost data. &lt;br /&gt;
&lt;br /&gt;
=======================================&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
2.0. [[Distinguish between data and information (RL)]]&lt;br /&gt;
&lt;br /&gt;
2.1. Understand the opportunities and risks of digital '''[[data management]]''' from fully collaborative to full privacy.&lt;br /&gt;
&lt;br /&gt;
2.2. Know about  multi-layer '''[[password]]''' creation, changing and keeping password policies.&lt;br /&gt;
&lt;br /&gt;
2.3. Know about '''safe computer [[login]] methods'''.&lt;br /&gt;
&lt;br /&gt;
2.4. Understand the meaning and importance of '''access rights'''.&lt;br /&gt;
&lt;br /&gt;
2.5. Know multiple user accounts on various digital environments. Understand what a '''[[personal user account]]''' is and how [[data]] of different users is separated.&lt;br /&gt;
&lt;br /&gt;
2.6. Be aware of '''data encryption''', decryption and password protected files, transfer?&lt;br /&gt;
&lt;br /&gt;
2.7. Understand what '''[[intellectual property]]''' on Internet is and be aware of [[privacy protection]] legal act. &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Privacy protection legal act is already mentioned in 1.11. Lets make this one only &amp;quot;Understand what '''[[intellectual property]]''' on Internet is.&amp;quot;--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:11 (UTC) )''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
2.8. Understand the benefits and purpose of data and '''backups''' and be able to restore lost data.&lt;br /&gt;
&lt;br /&gt;
2.9. [2.9 to 2.11 to me merged &amp;quot;'''Privacy Management'''&amp;quot;- [[RL]] Know how to '''start and finish safe browsing session''' (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing.&lt;br /&gt;
&lt;br /&gt;
: 2.10. Know how to browse the Web securable. Know about advantages, disadvantages and dangers of Internet '''cookies'''. Know about tools that ensure safety when browsing the Internet (blocking of cookies, ActiveX control, etc.)&lt;br /&gt;
&lt;br /&gt;
: 2.11. [#Privacy-RL] Be able to manage, clear temporary Internet files, browser history, passwords, cookies, and autocomplete data.&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(2.9 , 2.10 , 2.11 may be consolidated and must be moved to chapter 5 --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:17 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 3 SYLLABUS - Security tools and network security ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version of Lithuania Team - 2011-06-15----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:30 (UTC)&lt;br /&gt;
=======================================&lt;br /&gt;
3.1. Know computer network types (local area network (LAN), wide area network (WAN), virtual private network (VPN)) and why protection is needed. &lt;br /&gt;
&lt;br /&gt;
3.2. Know different network connection methods (Cable, Wireless, Mobile networks). &lt;br /&gt;
&lt;br /&gt;
3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network. &lt;br /&gt;
&lt;br /&gt;
3.4. Sharing and accessing resources over network (Files, Printer, Desktop). &lt;br /&gt;
&lt;br /&gt;
3.5. Understand safety means of computer networks (Firewall, Antivirus, Anti-spyware, Spam blocker Password protection, Connection encryption – wireless). &lt;br /&gt;
&lt;br /&gt;
3.6. Be able to use standard OS integrated protection tools. &lt;br /&gt;
&lt;br /&gt;
3.7. Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.). Distinguish different modes of antivirus protection (active, passive).&lt;br /&gt;
&lt;br /&gt;
3.8. Know what has to be done and in what order, if you suspect that computer system is infected. Distinguish infected files deletion, quarantining and curing.&lt;br /&gt;
&lt;br /&gt;
3.9. Know how to follow, download and use updates for your operating system, software and importance of antivirus definition files. Understand the benefits of these updates.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=======================================&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
3.1. Know computer '''network types''' , ''&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;(local area network (LAN), wide area network (WAN), virtual private network (VPN))&amp;lt;/span&amp;gt; ''and why protection is needed.--[[Utilisateur:Donarena|Renata (Lithuania Team)]] 8 juin 2011 à 16:19 (UTC)&lt;br /&gt;
&lt;br /&gt;
3.2. Know different network '''connection methods''' (Mobile networks, Wireless, Cable).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network.&amp;lt;/span&amp;gt;--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:30 (UTC)&lt;br /&gt;
&lt;br /&gt;
3.3. '''Sharing and accessing resources''' over network (Files, Printer, Screen).&lt;br /&gt;
&lt;br /&gt;
3.4. Understand '''safety means of computer networks''' (Firewall, Antivirus, Password protection, Connection encryption – wireless). &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Firewall, Antivirus, Password protection, Connection encryption are all already mentioned in other items and fit there by content and integrity better. We recommend to cross this 3.4. out at all)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:36 (UTC)''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
3.5. Be able to use standard '''OS integrated protection tools'''. &lt;br /&gt;
&lt;br /&gt;
3.6. [[#see how integrate 3.5 to 2.11 : &amp;quot;'''All about  [[malware]] and intrusion protection tools'''&amp;quot; - RL]] Know what a quality anti-virus, anti-spyware, spam blocker, and personal [[firewall]] is and how to use it. (Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.), know that it is unsafe to turn [[antivirus]] software off and know consequences). Distinguish different modes of antivirus protection (active, passive…). &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.7.[#Updating operating system- RL]. Know how to follow, download and use updates for your operating system, software and importance of antivirus definition files. Understand the benefits of these updates. &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.8. Distinguish different modes of antivirus protection (active, passive…).[# see also 3.6]&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.9. Know what has to be done and in what order, if you suspect that computer system is infected. &lt;br /&gt;
&lt;br /&gt;
: 3.10. Distinguish infected files deletion, quarantining and curing. &lt;br /&gt;
&lt;br /&gt;
: 3.11. Informal and formal periodic external checkup. &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(what do you mean by &amp;quot;checkup&amp;quot;)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:30 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 4 SYLLABUS - Children, newcomers in schools and workplaces : means of safe use for socio-digital inclusion == &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;--We recommend to shorten chapter name: CHAPTER 4 SYLLABUS - Children, newcomers in schools and workplaces&amp;lt;/b&amp;gt; ----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:32 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
New Syllabus version of Lithuania Team - 2011-06-15----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:30 (UTC)&lt;br /&gt;
=======================================&lt;br /&gt;
&lt;br /&gt;
4.1. Understand the impact of communication with new users about safety in IT World.&lt;br /&gt;
&lt;br /&gt;
4.2. Understand the purpose of monitoring, filtering and controlling tools against children computer usage and web browsing. &lt;br /&gt;
&lt;br /&gt;
4.3. Be aware of different ways to block social networking and other web sites.&lt;br /&gt;
&lt;br /&gt;
4.4. Be able to develop policies and applicate methods for children’s use of the computer and the Internet (depending on age and socio-cultural situation). &lt;br /&gt;
&lt;br /&gt;
4.5.Understanding advantages and limitations of protection software. &lt;br /&gt;
&lt;br /&gt;
=======================================&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(what is a socio-digital inclusion? Maybe we can shorten this chapter name to &amp;quot;Children, newcomers in schools and workplaces&amp;quot;?--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:49 (UTC) )''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4.1. Understand '''the impact of communication''' with new users '''about safety''' in IT World, &lt;br /&gt;
&lt;br /&gt;
4.2. Policy : Be able to '''develop policies and applicate methods''' for children’s use of the computer and the Internet (depending on age and socio-cultural situation) &lt;br /&gt;
&lt;br /&gt;
4.3. Understand the purpose of '''monitoring, filtering and controlling tools''' against children computer usage and web browsing.&lt;br /&gt;
&lt;br /&gt;
4.4. Understanding '''advantages and limitations with protection software'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Need more items in this chapter. After consolidation in Latvia this chapter has become even shorter than it was. And it was already short :). Maybe we can try to expand again to look more like the previous version, but less stick to children, as you mentioned in Latvia)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:49 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 5 SYLLABUS - Social networks and safe usage of the Internet ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;lt;b&amp;gt;We recommend change chapter name to: &amp;quot;CHAPTER 5 SYLLABUS - Social networks and safe virtual communication----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:32 (UTC)&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
New Syllabus version of Lithuania Team - 2011-06-15----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:31 (UTC)&lt;br /&gt;
=======================================&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5.1. Know how to start and finish safe browsing session (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing. &lt;br /&gt;
&lt;br /&gt;
5.2. Know about advantages, disadvantages and dangers of Internet cookies and ActiveX control. Know about tools that ensure safety when browsing the Internet.  &lt;br /&gt;
&lt;br /&gt;
5.3. Be able to manage: temporary Internet files, browser history, passwords, cookies and autocomplete data. &lt;br /&gt;
&lt;br /&gt;
5.4. Be able to safely connect to e-Services and secure environments– connecting and using, recover lost passwords.&lt;br /&gt;
&lt;br /&gt;
5.5. Know when and in which cases personal information can be published on the Internet (i.e. status publishing about leaving home).&lt;br /&gt;
&lt;br /&gt;
5.6. Know who you should contact if you discovered inappropriate information about you or your related digital identities.&lt;br /&gt;
&lt;br /&gt;
5.7. Understand that you cannot fully trust content and identities on the internet. (i.e. blogs, Wikipedia, social networks, forums, etc). &lt;br /&gt;
&lt;br /&gt;
5.8. Understand 'threats of inappropriate content for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on) &lt;br /&gt;
&lt;br /&gt;
5.9. Understand what a social network is, what are opportunities and risks of social network. Age groups of using social networks. Options and parameters for information disclosure. Understand that it is not safe to disclose information about user accounts, passwords and so on. &lt;br /&gt;
&lt;br /&gt;
5.10. Know different social network types (Friendship-driven and Interest-driven) and be able to use them harmless and safe (appropriate account privacy settings). &lt;br /&gt;
&lt;br /&gt;
5.11. Know what type of information recommended to be published on social network, be responsible for published content, and know impacts &lt;br /&gt;
&lt;br /&gt;
5.12. Understand that online socializing reflects &amp;quot;real life&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
5.13. Be able to send/receive e-mail securely: know how to reject email from specific email addresses. Know how to treat email messages from unknown senders, classified as spam and email messages infected with malware. Know about scam, hoax, chain letters.&lt;br /&gt;
&lt;br /&gt;
5.14. Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information, etc.&lt;br /&gt;
&lt;br /&gt;
5.15. Understand threats of virtual communication: virtual dating, bullying, commenting. &lt;br /&gt;
&lt;br /&gt;
5.16. Understand dependency and addiction to the Internet.&lt;br /&gt;
&lt;br /&gt;
=======================================&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
5.1. Know when and in which cases '''personal information''' can be published on the Internet, i.e. status publishing about leaving home,.&lt;br /&gt;
&lt;br /&gt;
5.2. Understand what a social network is, what are '''opportunities and risks of social network'''. Age groups of using social networks. Options and parameters for information disclosure. Understand that it is not safe to disclose information about user accounts, passwords and so on.&lt;br /&gt;
&lt;br /&gt;
5.3. Know different '''social network types''' and be able to use them harmless and safe (appropriate '''account privacy settings''').&lt;br /&gt;
&lt;br /&gt;
5.4. ('''Publishing content''')Know what type of information recommended to be published on social network, be responsible for published content, know impacts &lt;br /&gt;
&lt;br /&gt;
5.5. Be able to safely '''connect to e-Services and secure environments'''– connecting and using, recover lost passwords. &lt;br /&gt;
&lt;br /&gt;
5.6. (Emails)Be able to '''send/receive e-mail securely'''. Know how to reject email from specific email addresses. Know how to treat email messages from unknown senders&lt;br /&gt;
&lt;br /&gt;
5.7. (Spam and malware) Be able (understand) to use '''network resource controlling software and hardware'''. Know about email that is classified as spam, and email messages infected with malware. &lt;br /&gt;
&lt;br /&gt;
5.8. Be aware of network resource controlling software and hardware. Know how to reject email from specific email addresses.Know about scam, hoax, chain letters...[5.7 &amp;amp; 5.8 to be merged - RL]&lt;br /&gt;
&lt;br /&gt;
5.9. Understand threats of '''virtual communication''': virtual dating, bullying, commenting, &lt;br /&gt;
&lt;br /&gt;
5.10. '''Dependency and addiction to the Internet'''. [# to be develop - TL]&lt;br /&gt;
&lt;br /&gt;
5.11. Understand ''''threats of inappropriate content''' for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on)&lt;br /&gt;
&lt;br /&gt;
5.12. '''Reliability of information''' (Understand that it is not safe to disclose information about user accounts, passwords and so on. can not fully trust content and identities on the internet. (i.e. blogs, Wikipedia, etc).&lt;br /&gt;
&lt;br /&gt;
5.13. '''Reputation management'''. Know who you should contact if you discovered inappropriate information about you or your related digital identities. .&lt;br /&gt;
&lt;br /&gt;
5.14. '''Abuse management''', cyber bullying, cyber-mobbing, when is it possible to remove, when to put additional correct information.&lt;br /&gt;
&lt;br /&gt;
5.15. Understand that online socializing reflects &amp;quot;real life&amp;quot;&lt;br /&gt;
&lt;br /&gt;
5.16. Know about the 2 types of [[social networking]] : [[Friendship-driven]] and [[Interest-driven]] &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Social networks types are already mentioned in 5.3. Maybe it can be consolidated or is it different at all?)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 17:03 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
5.17. Understand what is [[Online Safety 3.0]] : research-based, Flexible, layered, Respectful, Positive, empowering, contextual....&lt;br /&gt;
&lt;br /&gt;
5.18. Know reputation and legal safety&lt;br /&gt;
&lt;br /&gt;
5.19. Know about identity, property and community safety&lt;br /&gt;
&lt;br /&gt;
5.20. Understand why [[digital citizenship]] is protective and is the best filter ever : pre-installed, free of charge, improve with use...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(In previous version before Latvia meeting there were items:&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information and etc.&amp;lt;br&amp;gt; &lt;br /&gt;
Know about social viruses, chain letters.&amp;lt;br&amp;gt; &lt;br /&gt;
Know threats of virtual communication (social networks, IM, e-mail and ect.): virtual dating, bullying, commenting, and dependence on the Internet.&amp;lt;br&amp;gt; &lt;br /&gt;
We could consolidate those, but we think that safe IM and social threats are important too and should be included)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:56 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Another Mind mapping=&lt;br /&gt;
&lt;br /&gt;
[[Fichier:notions-and-concepts.png|1100px|]]&lt;br /&gt;
&lt;br /&gt;
You can access to the dynamic mapp here [http://www.mindomo.com/edit.htm?m=64bf626021b940d99dd9576283c833bf notions and concepts]&lt;br /&gt;
&lt;br /&gt;
[[Proposition]]&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Proposition&amp;diff=4808</id>
		<title>Proposition</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Proposition&amp;diff=4808"/>
				<updated>2011-06-15T19:31:48Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''The APTES syllabus option''' &lt;br /&gt;
&lt;br /&gt;
'''&amp;quot;Being a Responsible Citizen of the Digital World&amp;quot;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Challenge : adopt a very clear structure with 3 to 5 chapters, to be fulfilled with '''about 30 notions''' &lt;br /&gt;
&lt;br /&gt;
We could structure the curriculum around the three literacies that make up citizenship in the digital age.&lt;br /&gt;
&lt;br /&gt;
Notice : ''There is lots of overlap among these, for example, what we post and produce online is behavior as much as content, so there's a social aspect to media literacy now. And file-sharing technology, which is both a tech and media skill, also has social and therefore ethical aspects.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Chap 1 - Introduction==&lt;br /&gt;
''Define and distinguish the three (e.g., establish the difference between media and technology, human vs. tech security,&lt;br /&gt;
etc.); help users see that, now that media are social and digital, content is both user-produced and behavioral and power for good or ill is increasingly users' hands. &amp;quot;With great power comes great responsibility,&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Chap 2 - Technical Literacy==&lt;br /&gt;
&lt;br /&gt;
Understanding how to use technology and devices in constructive ways that are not harmful to either the device/environment or the user (including computer and network security, ID theft); in the introduction, need to establish the difference between technology and media&lt;br /&gt;
&lt;br /&gt;
==Chap 3 - Social Literacy==&lt;br /&gt;
&lt;br /&gt;
Etiquette &amp;amp; netizenship (social norms), psychological safety (cyberbullying), and physical safety (predation, etc.)&lt;br /&gt;
&lt;br /&gt;
==Chap 4 - Media Literacy==&lt;br /&gt;
&lt;br /&gt;
Traditional (developing critical thinking and literacy concerning what we read, consume, download) and new media&lt;br /&gt;
literacy (developing critical thinking and literacy about what we post, share, produce, and upload); copyrights/IP, plagiarism&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
New media literacies :&lt;br /&gt;
&lt;br /&gt;
• Networking : the ability to search for, synthesize, and disseminate information.&lt;br /&gt;
&lt;br /&gt;
• Judgment—the ability to evaluate the reliability and credibility of different information sources.&lt;br /&gt;
&lt;br /&gt;
• Collective intelligence—evidence that participants in knowledge communities pool&lt;br /&gt;
knowledge and compare notes with others toward a common goal&lt;br /&gt;
&lt;br /&gt;
ref : CREDIBILITY - Unit Overview - [http://www.goodworkproject.org/practice/our-space/]&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
&lt;br /&gt;
Thanks to [http://www.netfamilynews.org/bio.html Anne Collier]&lt;br /&gt;
&lt;br /&gt;
[http://www.goodworkproject.org/practice/our-space Our Space: Being a Responsible Citizen of the Digital World ]&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Proposition&amp;diff=4807</id>
		<title>Proposition</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Proposition&amp;diff=4807"/>
				<updated>2011-06-15T19:31:17Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''The APTES syllabus option''' &lt;br /&gt;
&lt;br /&gt;
== &lt;br /&gt;
&amp;quot;Being a Responsible Citizen of the Digital World&amp;quot; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Challenge : adopt a very clear structure with 3 to 5 chapters, to be fulfilled with '''about 30 notions''' &lt;br /&gt;
&lt;br /&gt;
We could structure the curriculum around the three literacies that make up citizenship in the digital age.&lt;br /&gt;
&lt;br /&gt;
Notice : ''There is lots of overlap among these, for example, what we post and produce online is behavior as much as content, so there's a social aspect to media literacy now. And file-sharing technology, which is both a tech and media skill, also has social and therefore ethical aspects.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Chap 1 - Introduction==&lt;br /&gt;
''Define and distinguish the three (e.g., establish the difference between media and technology, human vs. tech security,&lt;br /&gt;
etc.); help users see that, now that media are social and digital, content is both user-produced and behavioral and power for good or ill is increasingly users' hands. &amp;quot;With great power comes great responsibility,&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Chap 2 - Technical Literacy==&lt;br /&gt;
&lt;br /&gt;
Understanding how to use technology and devices in constructive ways that are not harmful to either the device/environment or the user (including computer and network security, ID theft); in the introduction, need to establish the difference between technology and media&lt;br /&gt;
&lt;br /&gt;
==Chap 3 - Social Literacy==&lt;br /&gt;
&lt;br /&gt;
Etiquette &amp;amp; netizenship (social norms), psychological safety (cyberbullying), and physical safety (predation, etc.)&lt;br /&gt;
&lt;br /&gt;
==Chap 4 - Media Literacy==&lt;br /&gt;
&lt;br /&gt;
Traditional (developing critical thinking and literacy concerning what we read, consume, download) and new media&lt;br /&gt;
literacy (developing critical thinking and literacy about what we post, share, produce, and upload); copyrights/IP, plagiarism&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
New media literacies :&lt;br /&gt;
&lt;br /&gt;
• Networking : the ability to search for, synthesize, and disseminate information.&lt;br /&gt;
&lt;br /&gt;
• Judgment—the ability to evaluate the reliability and credibility of different information sources.&lt;br /&gt;
&lt;br /&gt;
• Collective intelligence—evidence that participants in knowledge communities pool&lt;br /&gt;
knowledge and compare notes with others toward a common goal&lt;br /&gt;
&lt;br /&gt;
ref : CREDIBILITY - Unit Overview - [http://www.goodworkproject.org/practice/our-space/]&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
&lt;br /&gt;
Thanks to [http://www.netfamilynews.org/bio.html Anne Collier]&lt;br /&gt;
&lt;br /&gt;
[http://www.goodworkproject.org/practice/our-space Our Space: Being a Responsible Citizen of the Digital World ]&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4806</id>
		<title>Syllabus e-safety</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Syllabus_e-safety&amp;diff=4806"/>
				<updated>2011-06-15T19:28:47Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : /* Other possible structure of the chapters of the syllabus - A.P.T.E.S */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''e-GUARDIAN - Syllabus V.2.x&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
== Introduction : aims &amp;amp; resources ==&lt;br /&gt;
&lt;br /&gt;
=== Aims ===&lt;br /&gt;
This wiki page aims at facilitating a collaborative synergic process for defining the syllabus on netsafety of the EU LdV e-Guardian project.&lt;br /&gt;
Participants are delegates of partner's institutions from Lithuania, Latvia, Germany and Switzerland.&lt;br /&gt;
&lt;br /&gt;
The resources are : &lt;br /&gt;
&lt;br /&gt;
=== A web-based social bookmarking working group === &lt;br /&gt;
on [http://groups.diigo.com/group/e_safety here on Diigo],  we can post all related useful information on netsafety, such as : &lt;br /&gt;
&lt;br /&gt;
- definition of key-words&lt;br /&gt;
&lt;br /&gt;
- examples of quizz, pedagogical scenarios and other pedagogical resources&lt;br /&gt;
&lt;br /&gt;
- related scientific articles &lt;br /&gt;
&lt;br /&gt;
- other relevant initiatives&lt;br /&gt;
&lt;br /&gt;
=== Guidelines for the syllabus === &lt;br /&gt;
They wwere provided by the project's team coordinated by the LIA organisation, and specially the syllabus workpackage leader, ecdl.lt, represented by Eugenijus Telesius and his team composed of Renata Danieliene &amp;amp; Tomas Lygutas, which is complemented by partner's delegate Algimantas Merkys (LIA, the coordinator's team), Dennis Krannich (Bremen Univbersity), Théo Bondolfi &amp;amp; Rémi Lévy (APTES Switzerland). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
These guidelines are : &lt;br /&gt;
&lt;br /&gt;
1. Focus on [[e-safety]] [[offline]] as well as [[online]], therefore always taking into account basic needs (such as password storage) as well as complex needs (such as behaviour in [[web2]] environments).&lt;br /&gt;
&lt;br /&gt;
2. Taking into account all key-points in this initial version, and considering these key-point as &amp;quot;objects&amp;quot; whcih can be replaced in other forms but which must stay available.&lt;br /&gt;
&lt;br /&gt;
3. respecting the steps of user point of view (example : 1 start computer, 2 launch application...)&lt;br /&gt;
&lt;br /&gt;
4. restructuring with categories and sets like in the policies of ECDL [http://www.ecdl.org/programmes/media/ECDL_ICDL_Module_12_-_Syllabus_-_V1.0.pdf]&lt;br /&gt;
&lt;br /&gt;
5. keeping as much as possible the existing phrases and formulations, only changing (merging, repositioning, pionderating) when it suits the next step of test/scenarios&lt;br /&gt;
&lt;br /&gt;
6. Keeping in mind the final intention of '''equity between risks &amp;amp; opportunities''' proposing positive practices (opportunities, in an educative perspective) and preventing bad practices (risks, which creates fear), based on the vision of the slide 10 of [http://www.slideshare.net/Bernajean/ne-3440462 this presentation of Anne Collier], which says that netsafety3.0 should be : &lt;br /&gt;
&lt;br /&gt;
- research-based, not fearbased, therefore relevant&lt;br /&gt;
&lt;br /&gt;
- flexible &amp;amp; layered, instead of &amp;quot;one-size-fits-all&amp;quot;&lt;br /&gt;
&lt;br /&gt;
- respectful of learning culture : stakeholders in positive experience, not just potential victims&lt;br /&gt;
&lt;br /&gt;
- positive, empowering : not just safety from, but safety for...&lt;br /&gt;
&lt;br /&gt;
- full, constructive engagement in participatory society (that's the context of the construction of this syllabus)&lt;br /&gt;
&lt;br /&gt;
=== Mind mapping for the key-notions of the syllabus ===&lt;br /&gt;
&lt;br /&gt;
[[Fichier:e-safety.png|1050px|]]&lt;br /&gt;
&lt;br /&gt;
In addition, Rémi Levy from APTES has produced a [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea mind mapping image] to represent all the notions for the e-safety syllabus. You can access to [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea the interactive map] - You can modify it directly because we keep a copy of the precedent contribution.&lt;br /&gt;
&lt;br /&gt;
== Other possible structure of the syllabus - A.P.T.E.S proposition ==&lt;br /&gt;
&lt;br /&gt;
[http://netizen3.org/index.php/Proposition access to the page]&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 1 SYLLABUS - Basic knowledge on e-safety ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version of Lithuania Team - 2011-06-15----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:30 (UTC)&lt;br /&gt;
=======================================&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.1. Understand the differences of information contents (open, private, business, etc.).&lt;br /&gt;
&lt;br /&gt;
1.2. Be aware of privacy protection legal act (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies, etc). &lt;br /&gt;
&lt;br /&gt;
1.3. Understand the notion of identity. &lt;br /&gt;
&lt;br /&gt;
1.4. Be aware of different identity for authorization theft methods (skimming, pretexting, shoulder surfing, information diving).&lt;br /&gt;
&lt;br /&gt;
1.5. Know about social engineering and it’s methods. &lt;br /&gt;
&lt;br /&gt;
1.6. Be aware of cyber crime, online predators, financial scams, harm and who to contact if discovered illegal data.&lt;br /&gt;
&lt;br /&gt;
1.7. Understand computer infection threats (viruses, Trojan horses, spyware, dishonest adware, etc.). Know when and how malicious software can get into computer system.&lt;br /&gt;
&lt;br /&gt;
1.8. Know about organizational security: school security, usage of school web pages, content publishing, access, etc. &lt;br /&gt;
&lt;br /&gt;
1.9. Know about netiquette and other basic codes of conducts in the cyberspace (RFC 1855).&lt;br /&gt;
&lt;br /&gt;
=======================================&lt;br /&gt;
 &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;IT IS BETTER IF COMMENTS AND DISCUSSIONS ARE MADE THE DISCUSSION PAGE &amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
1.1. History : from static '''web1 to''' dynamic '''web2''' environments &lt;br /&gt;
&lt;br /&gt;
1.2. Intention : '''[[web3]]''' proposing constructive engagement in participatory society (or : [[security]] through light instead of old model of [[security]] through obscurity.&lt;br /&gt;
&lt;br /&gt;
1.3. Know about '''equity between opportunities &amp;amp; risks''' since [[web2]]&lt;br /&gt;
&lt;br /&gt;
1.4. Know about '''[[netiquette]] and other basic codes''' of conducts in the cyberspace (RFC 1855) &lt;br /&gt;
&lt;br /&gt;
1.5. Know about '''[[social engineering]]''' and it’s methods, including participative culture and abuses if you don't understand/respect them, for example having your password stolen (to be reformulated) &lt;br /&gt;
&lt;br /&gt;
1.6. Understand the differences of '''[[contents]]''' (functional, factual, creative) of information &lt;br /&gt;
&lt;br /&gt;
1.7. Understand the differences of '''[[formats]]''' (open, privative) &lt;br /&gt;
&lt;br /&gt;
1.8. Understand the notion of '''[[identity]]''' (maybe to be repositioned in some other chapter)&lt;br /&gt;
&lt;br /&gt;
1.9.  '''[[eTools]]''' : Product versus function &lt;br /&gt;
&lt;br /&gt;
1.10. Be aware of '''different identity for authorization theft methods''' (skimming, pretexting, shoulder surfing, information diving…) &lt;br /&gt;
&lt;br /&gt;
1.11. Be aware of '''[[privacy protection]] legal act''' (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies and so on).&lt;br /&gt;
&lt;br /&gt;
1.12. '''Organizational [[security]]''' (school security) – or [[social engineering]]?, usage of school web pages, content publishing, access&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 2 SYLLABUS - Privacy and data management ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version of Lithuania Team - 2011-06-15----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:30 (UTC)&lt;br /&gt;
=======================================&lt;br /&gt;
&lt;br /&gt;
2.1. Distinguish between data and information.&lt;br /&gt;
&lt;br /&gt;
2.2. Understand the opportunities and risks of digital data management from fully collaborative to full privacy. &lt;br /&gt;
&lt;br /&gt;
2.3. Know about multi-layer password creation, changing and keeping password policies. &lt;br /&gt;
&lt;br /&gt;
2.4. Know about safe computer login methods. &lt;br /&gt;
&lt;br /&gt;
2.5. Know multiple user accounts on various digital environments. Understand the meaning and importance of access rights (what a personal user account is and how data of different users is separated). &lt;br /&gt;
&lt;br /&gt;
2.6. Be aware of data encryption, decryption and password protected files. &lt;br /&gt;
&lt;br /&gt;
2.7. Understand what intellectual property on Internet is. &lt;br /&gt;
&lt;br /&gt;
2.8. Understand the benefits and purpose of data backups and be able to restore lost data. &lt;br /&gt;
&lt;br /&gt;
=======================================&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
2.0. [[Distinguish between data and information (RL)]]&lt;br /&gt;
&lt;br /&gt;
2.1. Understand the opportunities and risks of digital '''[[data management]]''' from fully collaborative to full privacy.&lt;br /&gt;
&lt;br /&gt;
2.2. Know about  multi-layer '''[[password]]''' creation, changing and keeping password policies.&lt;br /&gt;
&lt;br /&gt;
2.3. Know about '''safe computer [[login]] methods'''.&lt;br /&gt;
&lt;br /&gt;
2.4. Understand the meaning and importance of '''access rights'''.&lt;br /&gt;
&lt;br /&gt;
2.5. Know multiple user accounts on various digital environments. Understand what a '''[[personal user account]]''' is and how [[data]] of different users is separated.&lt;br /&gt;
&lt;br /&gt;
2.6. Be aware of '''data encryption''', decryption and password protected files, transfer?&lt;br /&gt;
&lt;br /&gt;
2.7. Understand what '''[[intellectual property]]''' on Internet is and be aware of [[privacy protection]] legal act. &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Privacy protection legal act is already mentioned in 1.11. Lets make this one only &amp;quot;Understand what '''[[intellectual property]]''' on Internet is.&amp;quot;--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:11 (UTC) )''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
2.8. Understand the benefits and purpose of data and '''backups''' and be able to restore lost data.&lt;br /&gt;
&lt;br /&gt;
2.9. [2.9 to 2.11 to me merged &amp;quot;'''Privacy Management'''&amp;quot;- [[RL]] Know how to '''start and finish safe browsing session''' (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing.&lt;br /&gt;
&lt;br /&gt;
: 2.10. Know how to browse the Web securable. Know about advantages, disadvantages and dangers of Internet '''cookies'''. Know about tools that ensure safety when browsing the Internet (blocking of cookies, ActiveX control, etc.)&lt;br /&gt;
&lt;br /&gt;
: 2.11. [#Privacy-RL] Be able to manage, clear temporary Internet files, browser history, passwords, cookies, and autocomplete data.&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(2.9 , 2.10 , 2.11 may be consolidated and must be moved to chapter 5 --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:17 (UTC))''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 3 SYLLABUS - Security tools and network security ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;New Syllabus version of Lithuania Team - 2011-06-15----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:30 (UTC)&lt;br /&gt;
=======================================&lt;br /&gt;
3.1. Know computer network types (local area network (LAN), wide area network (WAN), virtual private network (VPN)) and why protection is needed. &lt;br /&gt;
&lt;br /&gt;
3.2. Know different network connection methods (Cable, Wireless, Mobile networks). &lt;br /&gt;
&lt;br /&gt;
3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network. &lt;br /&gt;
&lt;br /&gt;
3.4. Sharing and accessing resources over network (Files, Printer, Desktop). &lt;br /&gt;
&lt;br /&gt;
3.5. Understand safety means of computer networks (Firewall, Antivirus, Anti-spyware, Spam blocker Password protection, Connection encryption – wireless). &lt;br /&gt;
&lt;br /&gt;
3.6. Be able to use standard OS integrated protection tools. &lt;br /&gt;
&lt;br /&gt;
3.7. Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.). Distinguish different modes of antivirus protection (active, passive).&lt;br /&gt;
&lt;br /&gt;
3.8. Know what has to be done and in what order, if you suspect that computer system is infected. Distinguish infected files deletion, quarantining and curing.&lt;br /&gt;
&lt;br /&gt;
3.9. Know how to follow, download and use updates for your operating system, software and importance of antivirus definition files. Understand the benefits of these updates.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=======================================&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
3.1. Know computer '''network types''' , ''&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;(local area network (LAN), wide area network (WAN), virtual private network (VPN))&amp;lt;/span&amp;gt; ''and why protection is needed.--[[Utilisateur:Donarena|Renata (Lithuania Team)]] 8 juin 2011 à 16:19 (UTC)&lt;br /&gt;
&lt;br /&gt;
3.2. Know different network '''connection methods''' (Mobile networks, Wireless, Cable).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network.&amp;lt;/span&amp;gt;--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:30 (UTC)&lt;br /&gt;
&lt;br /&gt;
3.3. '''Sharing and accessing resources''' over network (Files, Printer, Screen).&lt;br /&gt;
&lt;br /&gt;
3.4. Understand '''safety means of computer networks''' (Firewall, Antivirus, Password protection, Connection encryption – wireless). &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Firewall, Antivirus, Password protection, Connection encryption are all already mentioned in other items and fit there by content and integrity better. We recommend to cross this 3.4. out at all)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:36 (UTC)''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
3.5. Be able to use standard '''OS integrated protection tools'''. &lt;br /&gt;
&lt;br /&gt;
3.6. [[#see how integrate 3.5 to 2.11 : &amp;quot;'''All about  [[malware]] and intrusion protection tools'''&amp;quot; - RL]] Know what a quality anti-virus, anti-spyware, spam blocker, and personal [[firewall]] is and how to use it. (Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.), know that it is unsafe to turn [[antivirus]] software off and know consequences). Distinguish different modes of antivirus protection (active, passive…). &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.7.[#Updating operating system- RL]. Know how to follow, download and use updates for your operating system, software and importance of antivirus definition files. Understand the benefits of these updates. &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.8. Distinguish different modes of antivirus protection (active, passive…).[# see also 3.6]&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:25 (UTC))''&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
: 3.9. Know what has to be done and in what order, if you suspect that computer system is infected. &lt;br /&gt;
&lt;br /&gt;
: 3.10. Distinguish infected files deletion, quarantining and curing. &lt;br /&gt;
&lt;br /&gt;
: 3.11. Informal and formal periodic external checkup. &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(what do you mean by &amp;quot;checkup&amp;quot;)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:30 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 4 SYLLABUS - Children, newcomers in schools and workplaces : means of safe use for socio-digital inclusion == &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;--We recommend to shorten chapter name: CHAPTER 4 SYLLABUS - Children, newcomers in schools and workplaces&amp;lt;/b&amp;gt; ----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:32 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
New Syllabus version of Lithuania Team - 2011-06-15----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:30 (UTC)&lt;br /&gt;
=======================================&lt;br /&gt;
&lt;br /&gt;
4.1. Understand the impact of communication with new users about safety in IT World.&lt;br /&gt;
&lt;br /&gt;
4.2. Understand the purpose of monitoring, filtering and controlling tools against children computer usage and web browsing. &lt;br /&gt;
&lt;br /&gt;
4.3. Be aware of different ways to block social networking and other web sites.&lt;br /&gt;
&lt;br /&gt;
4.4. Be able to develop policies and applicate methods for children’s use of the computer and the Internet (depending on age and socio-cultural situation). &lt;br /&gt;
&lt;br /&gt;
4.5.Understanding advantages and limitations of protection software. &lt;br /&gt;
&lt;br /&gt;
=======================================&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(what is a socio-digital inclusion? Maybe we can shorten this chapter name to &amp;quot;Children, newcomers in schools and workplaces&amp;quot;?--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:49 (UTC) )''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4.1. Understand '''the impact of communication''' with new users '''about safety''' in IT World, &lt;br /&gt;
&lt;br /&gt;
4.2. Policy : Be able to '''develop policies and applicate methods''' for children’s use of the computer and the Internet (depending on age and socio-cultural situation) &lt;br /&gt;
&lt;br /&gt;
4.3. Understand the purpose of '''monitoring, filtering and controlling tools''' against children computer usage and web browsing.&lt;br /&gt;
&lt;br /&gt;
4.4. Understanding '''advantages and limitations with protection software'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Need more items in this chapter. After consolidation in Latvia this chapter has become even shorter than it was. And it was already short :). Maybe we can try to expand again to look more like the previous version, but less stick to children, as you mentioned in Latvia)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:49 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CHAPTER 5 SYLLABUS - Social networks and safe usage of the Internet ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;lt;b&amp;gt;We recommend change chapter name to: &amp;quot;CHAPTER 5 SYLLABUS - Social networks and safe virtual communication----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:32 (UTC)&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
New Syllabus version of Lithuania Team - 2011-06-15----[[Utilisateur:Donarena|Renata (Lithuania Team)]] 15 juin 2011 à 13:31 (UTC)&lt;br /&gt;
=======================================&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5.1. Know how to start and finish safe browsing session (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing. &lt;br /&gt;
&lt;br /&gt;
5.2. Know about advantages, disadvantages and dangers of Internet cookies and ActiveX control. Know about tools that ensure safety when browsing the Internet.  &lt;br /&gt;
&lt;br /&gt;
5.3. Be able to manage: temporary Internet files, browser history, passwords, cookies and autocomplete data. &lt;br /&gt;
&lt;br /&gt;
5.4. Be able to safely connect to e-Services and secure environments– connecting and using, recover lost passwords.&lt;br /&gt;
&lt;br /&gt;
5.5. Know when and in which cases personal information can be published on the Internet (i.e. status publishing about leaving home).&lt;br /&gt;
&lt;br /&gt;
5.6. Know who you should contact if you discovered inappropriate information about you or your related digital identities.&lt;br /&gt;
&lt;br /&gt;
5.7. Understand that you cannot fully trust content and identities on the internet. (i.e. blogs, Wikipedia, social networks, forums, etc). &lt;br /&gt;
&lt;br /&gt;
5.8. Understand 'threats of inappropriate content for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on) &lt;br /&gt;
&lt;br /&gt;
5.9. Understand what a social network is, what are opportunities and risks of social network. Age groups of using social networks. Options and parameters for information disclosure. Understand that it is not safe to disclose information about user accounts, passwords and so on. &lt;br /&gt;
&lt;br /&gt;
5.10. Know different social network types (Friendship-driven and Interest-driven) and be able to use them harmless and safe (appropriate account privacy settings). &lt;br /&gt;
&lt;br /&gt;
5.11. Know what type of information recommended to be published on social network, be responsible for published content, and know impacts &lt;br /&gt;
&lt;br /&gt;
5.12. Understand that online socializing reflects &amp;quot;real life&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
5.13. Be able to send/receive e-mail securely: know how to reject email from specific email addresses. Know how to treat email messages from unknown senders, classified as spam and email messages infected with malware. Know about scam, hoax, chain letters.&lt;br /&gt;
&lt;br /&gt;
5.14. Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information, etc.&lt;br /&gt;
&lt;br /&gt;
5.15. Understand threats of virtual communication: virtual dating, bullying, commenting. &lt;br /&gt;
&lt;br /&gt;
5.16. Understand dependency and addiction to the Internet.&lt;br /&gt;
&lt;br /&gt;
=======================================&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
5.1. Know when and in which cases '''personal information''' can be published on the Internet, i.e. status publishing about leaving home,.&lt;br /&gt;
&lt;br /&gt;
5.2. Understand what a social network is, what are '''opportunities and risks of social network'''. Age groups of using social networks. Options and parameters for information disclosure. Understand that it is not safe to disclose information about user accounts, passwords and so on.&lt;br /&gt;
&lt;br /&gt;
5.3. Know different '''social network types''' and be able to use them harmless and safe (appropriate '''account privacy settings''').&lt;br /&gt;
&lt;br /&gt;
5.4. ('''Publishing content''')Know what type of information recommended to be published on social network, be responsible for published content, know impacts &lt;br /&gt;
&lt;br /&gt;
5.5. Be able to safely '''connect to e-Services and secure environments'''– connecting and using, recover lost passwords. &lt;br /&gt;
&lt;br /&gt;
5.6. (Emails)Be able to '''send/receive e-mail securely'''. Know how to reject email from specific email addresses. Know how to treat email messages from unknown senders&lt;br /&gt;
&lt;br /&gt;
5.7. (Spam and malware) Be able (understand) to use '''network resource controlling software and hardware'''. Know about email that is classified as spam, and email messages infected with malware. &lt;br /&gt;
&lt;br /&gt;
5.8. Be aware of network resource controlling software and hardware. Know how to reject email from specific email addresses.Know about scam, hoax, chain letters...[5.7 &amp;amp; 5.8 to be merged - RL]&lt;br /&gt;
&lt;br /&gt;
5.9. Understand threats of '''virtual communication''': virtual dating, bullying, commenting, &lt;br /&gt;
&lt;br /&gt;
5.10. '''Dependency and addiction to the Internet'''. [# to be develop - TL]&lt;br /&gt;
&lt;br /&gt;
5.11. Understand ''''threats of inappropriate content''' for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on)&lt;br /&gt;
&lt;br /&gt;
5.12. '''Reliability of information''' (Understand that it is not safe to disclose information about user accounts, passwords and so on. can not fully trust content and identities on the internet. (i.e. blogs, Wikipedia, etc).&lt;br /&gt;
&lt;br /&gt;
5.13. '''Reputation management'''. Know who you should contact if you discovered inappropriate information about you or your related digital identities. .&lt;br /&gt;
&lt;br /&gt;
5.14. '''Abuse management''', cyber bullying, cyber-mobbing, when is it possible to remove, when to put additional correct information.&lt;br /&gt;
&lt;br /&gt;
5.15. Understand that online socializing reflects &amp;quot;real life&amp;quot;&lt;br /&gt;
&lt;br /&gt;
5.16. Know about the 2 types of [[social networking]] : [[Friendship-driven]] and [[Interest-driven]] &amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(Social networks types are already mentioned in 5.3. Maybe it can be consolidated or is it different at all?)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 17:03 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
5.17. Understand what is [[Online Safety 3.0]] : research-based, Flexible, layered, Respectful, Positive, empowering, contextual....&lt;br /&gt;
&lt;br /&gt;
5.18. Know reputation and legal safety&lt;br /&gt;
&lt;br /&gt;
5.19. Know about identity, property and community safety&lt;br /&gt;
&lt;br /&gt;
5.20. Understand why [[digital citizenship]] is protective and is the best filter ever : pre-installed, free of charge, improve with use...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;--''(In previous version before Latvia meeting there were items:&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information and etc.&amp;lt;br&amp;gt; &lt;br /&gt;
Know about social viruses, chain letters.&amp;lt;br&amp;gt; &lt;br /&gt;
Know threats of virtual communication (social networks, IM, e-mail and ect.): virtual dating, bullying, commenting, and dependence on the Internet.&amp;lt;br&amp;gt; &lt;br /&gt;
We could consolidate those, but we think that safe IM and social threats are important too and should be included)--[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:56 (UTC)''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Another Mind mapping=&lt;br /&gt;
&lt;br /&gt;
[[Fichier:notions-and-concepts.png|1100px|]]&lt;br /&gt;
&lt;br /&gt;
You can access to the dynamic mapp here [http://www.mindomo.com/edit.htm?m=64bf626021b940d99dd9576283c833bf notions and concepts]&lt;br /&gt;
&lt;br /&gt;
[[Proposition]]&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Proposition&amp;diff=4805</id>
		<title>Proposition</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Proposition&amp;diff=4805"/>
				<updated>2011-06-15T18:50:38Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : /* Chap 4 - Media Literacy */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Possible structure of the chapters of the syllabus''' &lt;br /&gt;
&lt;br /&gt;
(title, content, how to categorize definitively).&lt;br /&gt;
&lt;br /&gt;
Challenge : adopt a very clear structure with 3 to 5 chapters, to be fulfilled with '''about 30 notions''' &lt;br /&gt;
&lt;br /&gt;
We could structure the curriculum around the three literacies that make up citizenship in the digital age.&lt;br /&gt;
&lt;br /&gt;
Notice : ''There is lots of overlap among these, for example, what we post and produce online is behavior as much as content, so there's a social aspect to media literacy now. And file-sharing technology, which is both a tech and media skill, also has social and therefore ethical aspects.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Chap 1 - Introduction==&lt;br /&gt;
''Define and distinguish the three (e.g., establish the difference between media and technology, human vs. tech security,&lt;br /&gt;
etc.); help users see that, now that media are social and digital, content is both user-produced and behavioral and power for good or ill is increasingly users' hands. &amp;quot;With great power comes great responsibility,&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Chap 2 - Technical Literacy==&lt;br /&gt;
&lt;br /&gt;
Understanding how to use technology and devices in constructive ways that are not harmful to either the device/environment or the user (including computer and network security, ID theft); in the introduction, need to establish the difference between technology and media&lt;br /&gt;
&lt;br /&gt;
==Chap 3 - Social Literacy==&lt;br /&gt;
&lt;br /&gt;
Etiquette &amp;amp; netizenship (social norms), psychological safety (cyberbullying), and physical safety (predation, etc.)&lt;br /&gt;
&lt;br /&gt;
==Chap 4 - Media Literacy==&lt;br /&gt;
&lt;br /&gt;
Traditional (developing critical thinking and literacy concerning what we read, consume, download) and new media&lt;br /&gt;
literacy (developing critical thinking and literacy about what we post, share, produce, and upload); copyrights/IP, plagiarism&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
New media literacies :&lt;br /&gt;
&lt;br /&gt;
• Networking : the ability to search for, synthesize, and disseminate information.&lt;br /&gt;
&lt;br /&gt;
• Judgment—the ability to evaluate the reliability and credibility of different information sources.&lt;br /&gt;
&lt;br /&gt;
• Collective intelligence—evidence that participants in knowledge communities pool&lt;br /&gt;
knowledge and compare notes with others toward a common goal&lt;br /&gt;
&lt;br /&gt;
ref : CREDIBILITY - Unit Overview - [http://www.goodworkproject.org/practice/our-space/]&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
&lt;br /&gt;
Thanks to [http://www.netfamilynews.org/bio.html Anne Collier]&lt;br /&gt;
&lt;br /&gt;
[http://www.goodworkproject.org/practice/our-space Our Space: Being a Responsible Citizen of the Digital World ]&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Proposition&amp;diff=4804</id>
		<title>Proposition</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Proposition&amp;diff=4804"/>
				<updated>2011-06-15T18:49:44Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : /* Chap 4 - Media Literacy */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Possible structure of the chapters of the syllabus''' &lt;br /&gt;
&lt;br /&gt;
(title, content, how to categorize definitively).&lt;br /&gt;
&lt;br /&gt;
Challenge : adopt a very clear structure with 3 to 5 chapters, to be fulfilled with '''about 30 notions''' &lt;br /&gt;
&lt;br /&gt;
We could structure the curriculum around the three literacies that make up citizenship in the digital age.&lt;br /&gt;
&lt;br /&gt;
Notice : ''There is lots of overlap among these, for example, what we post and produce online is behavior as much as content, so there's a social aspect to media literacy now. And file-sharing technology, which is both a tech and media skill, also has social and therefore ethical aspects.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Chap 1 - Introduction==&lt;br /&gt;
''Define and distinguish the three (e.g., establish the difference between media and technology, human vs. tech security,&lt;br /&gt;
etc.); help users see that, now that media are social and digital, content is both user-produced and behavioral and power for good or ill is increasingly users' hands. &amp;quot;With great power comes great responsibility,&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Chap 2 - Technical Literacy==&lt;br /&gt;
&lt;br /&gt;
Understanding how to use technology and devices in constructive ways that are not harmful to either the device/environment or the user (including computer and network security, ID theft); in the introduction, need to establish the difference between technology and media&lt;br /&gt;
&lt;br /&gt;
==Chap 3 - Social Literacy==&lt;br /&gt;
&lt;br /&gt;
Etiquette &amp;amp; netizenship (social norms), psychological safety (cyberbullying), and physical safety (predation, etc.)&lt;br /&gt;
&lt;br /&gt;
==Chap 4 - Media Literacy==&lt;br /&gt;
&lt;br /&gt;
Traditional (developing critical thinking and literacy concerning what we read, consume, download) and new media&lt;br /&gt;
literacy (developing critical thinking and literacy about what we post, share, produce, and upload); copyrights/IP, plagiarism&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
New media literacies :&lt;br /&gt;
&lt;br /&gt;
• Networking : the ability to search for, synthesize, and disseminate information.&lt;br /&gt;
• Judgment—the ability to evaluate the reliability and credibility of different information sources.&lt;br /&gt;
• Collective intelligence—evidence that participants in knowledge communities pool&lt;br /&gt;
knowledge and compare notes with others toward a common goal&lt;br /&gt;
&lt;br /&gt;
ref : CREDIBILITY - Unit Overview - [http://www.goodworkproject.org/practice/our-space/]&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
&lt;br /&gt;
Thanks to [http://www.netfamilynews.org/bio.html Anne Collier]&lt;br /&gt;
&lt;br /&gt;
[http://www.goodworkproject.org/practice/our-space Our Space: Being a Responsible Citizen of the Digital World ]&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	<entry>
		<id>https://www.netizen3.org/index.php?title=Proposition&amp;diff=4803</id>
		<title>Proposition</title>
		<link rel="alternate" type="text/html" href="https://www.netizen3.org/index.php?title=Proposition&amp;diff=4803"/>
				<updated>2011-06-15T18:49:10Z</updated>
		
		<summary type="html">&lt;p&gt;Remilevy : /* Chap 4 - Media Literacy */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Possible structure of the chapters of the syllabus''' &lt;br /&gt;
&lt;br /&gt;
(title, content, how to categorize definitively).&lt;br /&gt;
&lt;br /&gt;
Challenge : adopt a very clear structure with 3 to 5 chapters, to be fulfilled with '''about 30 notions''' &lt;br /&gt;
&lt;br /&gt;
We could structure the curriculum around the three literacies that make up citizenship in the digital age.&lt;br /&gt;
&lt;br /&gt;
Notice : ''There is lots of overlap among these, for example, what we post and produce online is behavior as much as content, so there's a social aspect to media literacy now. And file-sharing technology, which is both a tech and media skill, also has social and therefore ethical aspects.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Chap 1 - Introduction==&lt;br /&gt;
''Define and distinguish the three (e.g., establish the difference between media and technology, human vs. tech security,&lt;br /&gt;
etc.); help users see that, now that media are social and digital, content is both user-produced and behavioral and power for good or ill is increasingly users' hands. &amp;quot;With great power comes great responsibility,&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Chap 2 - Technical Literacy==&lt;br /&gt;
&lt;br /&gt;
Understanding how to use technology and devices in constructive ways that are not harmful to either the device/environment or the user (including computer and network security, ID theft); in the introduction, need to establish the difference between technology and media&lt;br /&gt;
&lt;br /&gt;
==Chap 3 - Social Literacy==&lt;br /&gt;
&lt;br /&gt;
Etiquette &amp;amp; netizenship (social norms), psychological safety (cyberbullying), and physical safety (predation, etc.)&lt;br /&gt;
&lt;br /&gt;
==Chap 4 - Media Literacy==&lt;br /&gt;
&lt;br /&gt;
Traditional (developing critical thinking and literacy concerning what we read, consume, download) and new media&lt;br /&gt;
literacy (developing critical thinking and literacy about what we post, share, produce, and upload); copyrights/IP, plagiarism&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
New media literacies :&lt;br /&gt;
&lt;br /&gt;
• Networking : the ability to search for, synthesize, and disseminate information.&lt;br /&gt;
• Judgment—the ability to evaluate the reliability and credibility of different information&lt;br /&gt;
sources.&lt;br /&gt;
• Collective intelligence—evidence that participants in knowledge communities pool&lt;br /&gt;
knowledge and compare notes with others toward a common goal&lt;br /&gt;
&lt;br /&gt;
ref : CREDIBILITY - Unit Overview - [http://www.goodworkproject.org/practice/our-space/]&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
&lt;br /&gt;
Thanks to [http://www.netfamilynews.org/bio.html Anne Collier]&lt;br /&gt;
&lt;br /&gt;
[http://www.goodworkproject.org/practice/our-space Our Space: Being a Responsible Citizen of the Digital World ]&lt;/div&gt;</summary>
		<author><name>Remilevy</name></author>	</entry>

	</feed>