Computer-Based Technology in the Classroom EDX 1201X National University October 20,2012.

Slides:



Advertisements
Similar presentations
CyberSafety Unraveled
Advertisements

Northside I.S.D. Acceptable Use Policy
Developed by Technology Services 1:1 Laptop Initiative
Thank you for your cooperation. We will begin shortly.
Sporting Violence Sgt Andy Gosling Sgt Mardi Foweraker Crime Prevention Section Western Adelaide Local Service Area SAPOL.
ACCEPTABLE USE POLICIES.  Use network resources for school work only  Always Log-on/Log-off  AUP/RUP training and signature pages are required  Always.
Youth and Social Networking Sites Comenius Project
Coxheath Primary School E-safety- Term Purpose To outline the use of the internet in school The use of the internet outside school What are the.
Cyber Bullying The newest form of bullying.. What is cyber bullying?  Being cruel to others by sending or posting harmful material using technological.
CHRISTY BOWMAN ANGELA CORNETT JODI DAVIDSON KELLI JESSIE MELISSA MCDANIEL CAROLYN MITCHELL Cyberbullying and Sexting: The Grey Area.
$100 $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $200 $300 $400 $500.
Boyertown Area School District Acceptable Use Policy.
CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety.
How Secure Are You When You Use the Internet?. Overview What is the Internet? And what it is commonly used for? o Parents vs. Teens/Kids Use Ways of accessing.
Internet Safety A Community Approach November 1, 2010 Internet Safety for Parents of Young Children.
An Internet Safety Presentation for Middle School Adopted from netsmartz with video from netsmartz.org, center for missing & exploited children, and Saturday.
Jana Dixon Dawson Educational Cooperative
Cyber Bullying Welcome to our Parent Power night. I hope you will find the evening helpful and informative. Mrs. Fleming is very proactive and very much.
GROUP 3: APRIL, DELICIA, LISA, SHEILAH.  Your child spends large amounts of time on-line, especially at night.  You find pornography on your child's.
CyberSafety A Lesson in CYBERWORLD Culture, Customs, Culture, Customs, Language, and Safety.
BY: ASHLEY ESTEP, ALYSIA GEORGE, AND ASHLEY MOFFETT Internet Safety.
Technology: Friend or Foe? Thinking about Information Ethics.
1 Internet Safety By: Nicole Sutton, Kenny Messinger, and Emily Whitman.
What you should know as parents by Charles McKinley Parents’ Technology Night, 2013, sponsored by your PTSO.
How Can We Help Our Students to Use the Internet in a Safer Way?
If you are talking to a friend in a chat room and they ask you for financial information, you should: a) Ask your friend why they need the information.
Digital Citizenship Texting vs. Sexting Cyberbullying.
Welcome… Parent Awareness Session. Media Story 21 year old media student from Surrey who…… –Arranged to meet a 14-year-old at a railway station –Had.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Internet Safety By: Cindy Price. Internet Safety Education 1. Understand Internet Practices 2. Understand the Dangers 3. Understand the Law 4. Raise Awareness.
By: Zach Oltmanns.
Cyber Safety. Limit time on the Internet Set limits on length of time on the Internet Explore the Internet in designated places.
Cyberbullying Online Social Aggression Guidelines for Educators.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
SAFE AND ETHICAL USE OF TECHNOLOGY By Dorreth Bailey-Oldacre 12/14/14 Professor: Dr. Barbara Gruber, PhD, CETL.
AUP, Netiquette, Copyright & Fair Use Wilkes University – Internet Literacy for Educators Cathy W. Dowd Spring 2009.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Internet Services Web browsing Chat/Messaging Newsgroups Social networking Shopping Information –Text –Pictures –Movies –Music And more! 3.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
The Concerns  Acceptable Use Policies  Cyberbullying  Cyberpredators  Identity Safety  Piracy and Plagiarism.
Technology: Friend or Foe? Thinking about Information Ethics.
Internet Safety Presentation for Families. Keeping Kids Safe What are they doing online? What are some of the concerns? How do we keep them safe?
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
CYBERBULLYING Cyberbullying is when someone bullies others over the internet or on a mobile phone by sending abusive s or texts directly or by posting.
CYBERSAFETY IN AISD: AWARENESS AND RESPONSE. 1. Cybersafety: What is it? » Definition »Social Media 2. Digital Citizenship: What is it? » Cyberbullying.
 Legal Issues-copyright and fair use, privacy, software piracy, acceptable use  Social Issues- digital divide, cyber bullying, online interaction 
Online Safety ~ Raising students’ awareness of the risks of Internet use ~
What is Harassment?? Harassment is when hurtful or upsetting things are repeatedly said or done to someone. Harassment CAN: Involve physical violence.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
CYBERBULLYING Bullying that takes place using electronic technology Bullying that takes place using electronic technology. Is an issue that need to be.
Internet Safety at DESS. What Children do Online and the risks they are exposed to The following presentation outlines the various activities that children.
Cybersafety 4 Kids: Smart Moves in an Online World.
CYBERSAFTEY 101 By: Tarrah Marcus INTRODUCTION  Acceptable Use Policies (AUP)  Policies that govern internet use  Cyberbullying  Technology based.
Internet Safety. Online Concerns: Contact Content Conduct.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
Cybersafety 4 Kids: Smart Moves in an Online World.
Google+ Local Content Policies and Why It’s Important to Follow Them.
Danielle Hildebrant  Acceptable Use Policies ◦ document stating the use and limits of the network or internet  Cyberbullying ◦ Bullying that takes.
DIGITAL CITIZENSHIP ED 505 TECHNOLOGY AND EDUCATION (REVISION)
Internet Safety: Providing an Education Plan for Your School
Internet Safety: Providing an Education Plan for Your School
Internet Safety: Providing an Education Plan for Your School
Tips and Information for Parents
Digital Citizenship & Social Media.
Jeopardy iT Final Jeopardy iT $100 $100 $100 $100 $100 $100 $200 $200
Rules To Help You Navigate the Internet Safely
Issues With Internet in College
Personal Safety Online
Student User Agreement and Policy 2022
Presentation transcript:

Computer-Based Technology in the Classroom EDX 1201X National University October 20,2012

 Acceptable Use Policies: A school’s written internet user agreement between teachers, students, parents.  Cyberbullying: Using technology to bully someone.  Cyberpredators: A person who uses the internet to find and make contact victims the intent of bodily or emotional harm.  Identity Safety: Steps taken to avert cyberbullying and cyberpredators and protect the identity of a person using the intenet.  Inappropriate Content: Material found on an unfiltered internet site that contains images that are pornographic, violent, illegal activities, obscene and harmful to children.  Piracy,Plagiarism: Sharing or copying copyrighted material without the authorization of the original owner/creator of the product.

 An acceptable use policy (AUP)defines the terms and conditions for internet use in a school.  The AUP is a written agreement between the school, teacher, parents, and student.  AUPs provide safety measures to protect students from internet dangers.

 AUPs should be designed to: ◦ Educates parents and students ◦ Encourages proper internet behavior ◦ Discourages dangerous or illegal activities  For more information: i-SAFE Acceptable Use Policiesi-SAFE Acceptable Use Policies

 Cyberbullying is the use of technology for social cruelty, which can include harassment, impersonation, denigration, trickery, exclusion and stalking. (Walters, 2009c, p.3)

 Cyber Bully Workshop Cyber Bully Workshop  Examples from a student’s perspective.  centre/television-psa centre/television-psa

 A Cyber predator uses the Internet to hunt for victims to take advantage of in ANYway, including sexually, emotionally, psychologically or financially. Cyber predators know how to manipulate kids, creating trust and friendship where none should exist. (Walters, 2009d, p. 4 ).

 Anonymous pedophiles. Hides behind a computer versus a bush.  Interacts with children online by pretending to be a child themselves.  Infiltrates chat rooms, Facebook, , instant messages, text messages via phone.  Grooms children by first giving online attention, gradually incorporating sexually explicit content or suggestions.  Cyber Predator Reporting Cyber Predator Reporting

 Personal information can be used to identify you, your location or your financial assets. Obvious: your name, age, sex, picture, phone number, address/location. Less obvious: hobbies, interests, school mascot, online group memberships.  Too much personal information puts users at risk, can lead to physical harm or identity theft. The information can also be used for scamming, spamming and phishing

 Identity Video Clip Identity Video Clip

 Inappropriate content has been defined in the Children's Internet Protection Act as visual depictions that are obscene, child pornography, or material "harmful to minors” Categories include pornography, hate groups, violence, illegal activity, extremist groups, online advertising. ( Walters, 2009d, p. 5).

 Filtered images vs. unfiltered images.  How do Kids Unknowingly Find the images? How do Kids Unknowingly Find the images?  Children's Internet Protection Act Children's Internet Protection Act

 “Piracy or Intellectual Property refers to the ownership rights of materials, created, written, designed or expressed by individuals. These materials include music, games, movies, photos, and writing. Illegally downloading or sharing intellectual property without the permission of the creator is a crime punishable by law” ( Walters, 2009d, p. 5).

 Intellectual property  Copyright laws versus Fair Use Interpretation  Educators may use limited parts of copyrighted material for teaching purposes, only, without written permission of the author.  Fair Use is very broad and ultimately up to legal interpretation.  Refer to the U.S. Copyright Office for more information.U.S. Copyright Office  Reproduction of Copyrighted Works by Educators and Librarians Reproduction of Copyrighted Works by Educators and Librarians

 Cybersafety begins with the school  Information and Awareness = prevention  Prevention = responsibility  Responsibility = safe classrooms

Federal Communications Commission (2012). Children’s Internet Protection Act. Retrieved from Hughes, D.R., (2001). How Children Access Pornography on the Internet. Protecting Kids in Cyberspace. Retrieved from I Safe (2012). Acceptable Use Policies. Retrieved from Ohio Commission DRCM. (2008). Everyone Knows Your Name – Online Safety Commercial. You Tube Video. Retrieved from National Center for Missing and Exploited Children. (2012). NetSmarz Workshop: Chapter 2 Cyberbullying. Retrieved from National Center for Missing and Exploited Children (2012). Cybertipline. Retrieved from National Council of Teachers of English (2012). Code of Best Practices in Fair Use for Media Literacy. Urbana, Il. Retrieved from

Walters, E. (2009d). Cyber Safety: inappropriate Content. Retrieved from Walters, E. (2009). Cyber Safety: Piracy & Plagerism. Retrieved from U.S. Copyright Office (2009). Copyright Basics. Washington, DC: The Library of Congress. U.S. Copyright Office (2009). Reproduction of Copyrighted Works by Educators and Librarians. Washington, DC: The Library of Congress