Gsd-skill-creator digital-citizenship
Being a constructive participant in networked communities. Covers digital footprint management, online etiquette and professional communication, collaborative tools, attribution and copyright, cyberbullying recognition and response, and the responsibilities that come with amplification. Use when helping learners think about how to behave online -- not what is technically allowed, but what is actually healthy for themselves and their communities.
git clone https://github.com/Tibsfox/gsd-skill-creator
T=$(mktemp -d) && git clone --depth=1 https://github.com/Tibsfox/gsd-skill-creator "$T" && mkdir -p ~/.claude/skills && cp -r "$T/examples/skills/digital-literacy/digital-citizenship" ~/.claude/skills/tibsfox-gsd-skill-creator-digital-citizenship && rm -rf "$T"
examples/skills/digital-literacy/digital-citizenship/SKILL.mdDigital Citizenship
Digital citizenship is the practice of participating in online communities in ways that are responsible to yourself, to others, and to the commons. The phrase is sometimes dismissed as a euphemism for "don't cyberbully" but the real content is much larger. A digital citizen is someone who understands that every post, share, comment, and account is a public act with consequences that outlast the moment. This skill draws from danah boyd's work on youth participation, Henry Jenkins's participatory culture framework, and Howard Rheingold's community network writing.
Agent affinity: rheingold (community participation), boyd (youth norms and social context), jenkins (participatory culture)
Concept IDs: diglit-professional-communication, diglit-collaborative-tools, diglit-copyright-attribution, diglit-digital-footprint, diglit-cyberbullying-response
The Digital Footprint
Every online action leaves traces: posts, likes, searches, purchases, logged-in sessions, device fingerprints, metadata from uploaded files. The sum of these traces is your digital footprint. Three facts about it matter most:
- It is persistent. Content you thought was ephemeral -- Stories, Snaps, deleted posts -- is often cached, screenshotted, or stored in backend logs. Assume anything you put online could reappear.
- It is searchable. Even content not easily found today can become findable with new tools. Old forum posts, archived blogs, and leaked databases surface regularly.
- It is aggregable. Individual traces are boring. The aggregate -- what you care about, where you go, who you know, when you are online -- is a profile that can be sold, targeted, or subpoenaed.
The first question of digital citizenship is not "am I anonymous?" but "what kind of person does my footprint show me to be?"
Professional Communication Online
Online professional communication follows rules that are different from both face-to-face and formal writing. The three most common failures are:
Tone mismatch
Email, chat, and comments strip tone of voice and body language. A terse reply reads as hostile. A joke reads as sarcasm. A one-word acknowledgment reads as dismissive. The discipline is to over-signal warmth and intent in text -- not because you are being fake, but because the medium eats signal.
Practical moves: Say "thank you" explicitly. Use the recipient's name. Acknowledge what the other person said before adding your point. Avoid sarcasm and irony in professional contexts unless you have an established rapport.
Audience confusion
Online platforms blur the line between public and private. A message in a small chat is usually public-adjacent -- screenshots travel. Posts in private groups leak. Assume anything you write could be read by someone you did not intend to read it.
Practical moves: Before posting, ask "would I be comfortable if this were screenshotted?" If the answer is no, reconsider whether the medium fits the message.
Response pressure
Digital tools create asymmetric expectations: instant response feels required, even when the sender did not intend urgency. Managing this is a citizenship skill in both directions.
Practical moves: Set expectations explicitly ("I check email twice a day"). Respect others' response boundaries. Do not treat silence as hostility.
Collaborative Tools
Shared documents, version control, and collaborative editing changed how groups work together. They also created new forms of miscommunication.
Track changes and suggestions
When editing someone else's work, prefer suggestions over direct edits. This preserves authorship and signals respect. The extra friction is cheap; the social cost of silently overwriting someone's words is high.
Version history
Most collaborative tools record every edit. This is a feature, not a surveillance system. Use it to recover lost work, to understand how a document evolved, and to honestly credit contributors. Do not use it to audit coworkers.
Comments and discussion
Comments are a conversation, not a scoreboard. "This is wrong" is a comment; "I think this might be off because X" is a conversation. Assume good faith. When you disagree, explain your reasoning before your conclusion.
Real-time editing etiquette
When two people are editing simultaneously, announce what you are doing. "I'll take the intro; you do the methods." This prevents the awkward experience of watching someone rewrite the paragraph you are rewriting.
Attribution and Copyright
The cheap cost of copy-paste makes attribution feel optional. It is not. Attribution is a signature of trust in the information ecosystem.
Creative Commons
Creative Commons licenses give creators a way to say "you may reuse this" without giving up all rights. The six main variants combine four attributes:
- BY -- attribution required
- SA -- share alike (derivatives must use the same license)
- NC -- non-commercial only
- ND -- no derivatives
A CC-BY-SA image can be reused with attribution and the same license. A CC-BY-NC-ND image can be reused with attribution but not modified and not used commercially.
Fair use
In U.S. law, fair use allows limited reuse without permission for commentary, criticism, teaching, and transformation. Fair use is a four-factor test: purpose (transformative?), nature (factual vs creative?), amount (how much?), and market effect (does it replace the original?). Fair use is a defense, not a permission. When in doubt, ask.
How to cite digital sources
Every citation should include: author (if known), title, site name, publication date, URL, and date of access. For academic work, follow your discipline's style guide (MLA, APA, Chicago). For informal writing, a link and a credit line are the minimum.
Cyberbullying: Recognition and Response
Cyberbullying is persistent, targeted, harmful communication using digital tools. The defining features are: repetition, power imbalance, and harm. Isolated criticism is not cyberbullying. Sustained targeting is.
Recognition
- Direct attacks (insults, threats, doxxing)
- Exclusion (organized shunning, coordinated blocking)
- Impersonation (creating fake accounts to harm reputation)
- Public humiliation (non-consensual sharing of private content)
Response for targets
- Document. Screenshot everything before engaging.
- Do not engage. Responses feed attention, which is the payoff for most harassment.
- Block and report. Use platform tools. They are imperfect but worth using.
- Tell someone. Isolation is the attacker's ally. Trusted adults, counselors, or friends change the dynamic.
- Involve authorities when warranted. Threats of violence, doxxing, and sexual content involving minors should be reported to law enforcement.
Response for bystanders
The bystander effect is strong online. The single highest-impact action is sending a private supportive message to the target. Public defense sometimes escalates; private support always helps.
For parents and educators
Do not take away the device as the first move. For many young people, the device is also where their support network lives. Taking it away adds isolation to harm. Work with the target to manage access while maintaining connections.
The Responsibilities of Amplification
Sharing is not neutral. When you share a post, you are lending it your reputation and delivering it to your network. A few principles:
- Verify before sharing. Use the information-evaluation skill first.
- Share because it is useful, not because it is inflammatory. Engagement-driven feeds reward outrage. The payoff for your brain (dopamine of righteousness) is real; the payoff for your community is usually negative.
- Credit the original. When possible, share from the source, not from an aggregator. Screenshots without attribution are information laundering.
- Correct yourself publicly when you are wrong. This is the hardest habit to develop and the most valuable. It teaches your network that you are trustworthy.
When NOT to Use This Skill
- Technical computer literacy questions. Use
-- that is about systems, not behavior.computational-literacy - Source credibility questions. Use
-- that is about the truth of a claim, not how to behave around it.information-evaluation - Privacy configuration. Use
-- that is about what platforms collect, not how you treat others.data-privacy
Decision Guidance
Before any significant online action, ask the three citizenship questions:
- Who is harmed if this is wrong? If the answer is "no one meaningful," proceed. If it is a specific person or group, slow down.
- Who benefits if this is right? If the benefit is narrowly yours, lower your expectation of virtue. If it is a community, act.
- Would I do this if everyone I respected were watching? If no, do not do it. The lack of visibility is a contingency, not a permission.
Cross-References
- rheingold agent: Community participation, virtual communities as civic spaces
- boyd agent: Youth norms, networked publics, social context
- jenkins agent: Participatory culture, fan communities, collective intelligence
- information-evaluation skill: Upstream of responsible sharing
- data-privacy skill: The other side of digital footprint management
References
- boyd, d. (2014). It's Complicated: The Social Lives of Networked Teens. Yale University Press.
- Jenkins, H. (2006). Convergence Culture: Where Old and New Media Collide. NYU Press.
- Rheingold, H. (2012). Net Smart: How to Thrive Online. MIT Press.
- Palfrey, J., & Gasser, U. (2008). Born Digital: Understanding the First Generation of Digital Natives. Basic Books.
- Citron, D. K. (2014). Hate Crimes in Cyberspace. Harvard University Press.