1/23 ICT and SEND Dr John Woollard Social Justice and Inclusion in Education Research Group Southampton Education School University of Southampton The.

Slides:



Advertisements
Similar presentations
EU Presidency Conference Effective policies for the development of competencies of youth in Europe Warsaw, November 2011 Improving basic skills in.
Advertisements

Anne Gilleran BECTA Research Conference London 13 June 2003 The Digital Generation Student Voices from the eWatch Study BECTA Research Conference 13th.
Policy recommendations on ICT The European e-Learning Forum for Education - ELFE 2nd Conference Copenhagen November 2005.
Key Stage 3 National Strategy 1 Key Stage 3 National Strategy SEN : foundation subjects training materials. Briefing for schools 2003.
Information Literacy Instruction in Libraries
OECD Conf Mexico)_JB 9 December Presentation by: John Bangs, Assistant Secretary (Education, Equality and Professional Development) National Union.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
Dr John Woollard School of Education University of Southampton
E-safety and Internet Awareness Hanbury C of E First School.
School Leadership that Works:
1 Learning Through Innovation Dissemination Meeting.
The Roles of a Sports Coach
Teacher Workshop 1: Introduction to consumer and financial literacy education in Australia Helping young people be MoneySmart
E- SAFETY Resources for teachers and trainees Stephen Carrick-Davies - Childnet Ruth Hammond - Becta.
1/16 Technology Enhanced Learning considering e-safety
E-portfolios in action. Designing, developing and evaluating an e-portfolio system; reflecting upon the affordances for trainee teachers. Dr John Woollard.
What do you know about the Australian Curriculum and how confident are you in implementing it? 1.
The Rubric Reality Cobb Keys Classroom Teacher Evaluation System.
Addition 1’s to 20.
25 seconds left…...
Our approach to e-Safety By Jayne Holt. 12 months ago we had no e-safety embedded within the College. We had an out dated Acceptable Use Policy We had.
“How will the new Primary Curriculum affect my school
Friday 13th March 2009 Our Christian family-safe, happy, caring, valued, special. 1 E-safety at Medlar- with-Wesham CE Primary School Denise Hollowell.
Copyright © 2014 ICT Inspires Ltd. All Rights Reserved. ICT (Computing) Subject Leader Course Session 2: Broader.
lead ▪ learn ▪ protect ▪ engage e-Safety in the Home.
Training for Child Protection Coordinators To Support Training In Early Years Settings and Schools Tuesday 22 nd January, 2013 Sarah Turner – Schools’
Week 1.
We will resume in: 25 Minutes.
E-safety: evaluation of key stage 3 materials for initial teacher education Who’s who  Coordinator MaryLouise Morris Education and Awareness Manager,
Abuse Prevention and Response Protocol.
NORMAPME ISO User Guide for European SMEs The essence of.
1/15 E-Safety in Initial Teacher Training Early Years and Primary Phase 25/02/10 Primaryaq.ppt.
Working with HLTAs/TAs Dr John Woollard SEND Day 2015.
Course resources available from What is Scratch? How does Scratch fit into the Computing PoS? Progression in Computing.
WHAT IS SAFE GUARDING Tutorials. During this lesson you will learn  What safe guarding means  How you can keep yourself and others safe.  The college.
1/15 E-Safety in Initial Teacher Training Secondary Phase.
Demystifying the new Primary computing curriculum
1/15 E-Safety in Initial Teacher Training Early Years and Primary Phase 25/02/10 Primaryaq.ppt.
Online safety and inspection David Brown Friday 3 July 2015 Child Internet Safety summit.
Presentation to BESD IDP Leaders
Dr E Kritzinger – UNISA SACSAW Cyber Awareness Implementation Plan (CAIP) for schools.
UK Child Exploitation and Online Protection (CEOP) Alex Nagle Head of Harm Reduction.
Purpose of study A high-quality computing education equips pupils to use computational thinking and creativity to understand and change the world. Computing.
Improving relevant standards. Aims and objectives Familiarize ourselves with best practice standards of teaching To think about how we can implement the.
Professionalism in teaching. What will this presentation cover  The different identity in you as a student and you as a professional teacher – developing.
Centre of excellence for research and teaching a resource which helps young people understand the dangers of chatting to strangers on the internet.
Understanding Teachers Standards. Objectives of the session To develop an understanding of the teachers standards To start thinking about the relevant.
Student Name Student Number ePortfolio Demonstrating my achievement of the NSW Institute of Teachers Graduate Teacher Stage of the Professional Teacher.
1/15 E-Safety in Initial Teacher Training Early Years and Primary Phase 25/02/10 Primaryaq.ppt.
Safeguarding and fundamental British Values in the School Inspection Handbook Prevent Education Leaders Conference: Luton 5 November 2015 Andrew Cook Regional.
E-Safety THURSDAY 12 TH FEBRUARY. E-Safety  What are the risks?  Jenny’s Story  The Byron report  Evaluation of resources  Planning an e-safety lesson.
Welcome to the Starz Conference March New proposals for Computing PoS How will you ensure you provide a child’s legal entitlement if the new proposal.
Understanding Computing and Programming at KS2 Debs Ayerst.
Sept. 16, Session #2 PED3106 : Agenda - Housekeeping: Hardcopy course outlines, Assignment 1 (8:30AM-8:45AM) - Complimen-tree, Inclusion in I/S Schools.
Understanding Computing and Programming at KS1 Debs Ayerst.
“How do I keep my child safe online?” Miss Johnstone Computing Co-ordinator “Parents / Carers are the one important factor in the home environment to keep.
Learn with your child - computing. Why teach computing? The National Curriculum states: A high-quality computing education equips pupils to use computational.
Chestnuts Primary School PREVENT Protecting our children and families from Extremism & Radicalisation Wednesday 27 th April 2015.
Garden Suburb Junior School 2015 SRE Parent Talk.
Ministry of Education & Religious Affairs, Culture & Civilisation Greek School Network nternet-safety.sch.gr.
Raising Digitally Literate Citizens Curbar Primary School March 2016.
Computing Curriculum Day March 2016 Does this algorithm get Little Red Riding Hood to the Gingerbread Man’s house? Start Finish.
Prevent Strategy SMSC British Values PGCE Secondary (NQT/RQT support) Developing outstanding teachers in an outstanding partnership.
The New Primary National Curriculum
e-Safety Awareness in Schools
E-safety – for teachers
Garden Suburb Junior School
Presentation transcript:

1/23 ICT and SEND Dr John Woollard Social Justice and Inclusion in Education Research Group Southampton Education School University of Southampton The developing Computing curriculum, digital literacy and e- safety

2/23 Primary phase trained and taught Moved to secondary mainstream special educational needs: ROSLA tutor and SENCo Teacher advisor/inspector for SEN (all areas) and ICT in Hampshire for 9 years Teacher trainer for IT and SEN specialist Taught MSc SpLD PhD examiner for SpLD Wrote book using ICT to support teaching and learning and psychology books including Psychology for the Classroom: Behaviourism Now, teacher trainer in the Social Justice and Inclusion in Education Research Centre at the University of Southampton Dr John Woollard

3/23 National Curriculum for Computing (2014) IT, CS and dl how it impacts on pupils dl expectations Teachers’ Standards e-safety professional expectations but people are at the centre it is they that a subject to the changes, resources and attitudes Today

4/23 People are at the centre sensory physical communicationbehaviour health (incl. mental health) learning difficulties attitudes

5/23 The National Curriculum for computing aims to ensure that all pupils:  can understand and apply the fundamental principles of computer science, including logic, algorithms, data representation, and communication  can analyse problems in computational terms, and have repeated practical experience of writing computer programs in order to solve such problems  can evaluate and apply information technology, including new or unfamiliar technologies, analytically to solve problems  are responsible, competent, confident and creative users of information and communication technology. National Curriculum for Computing

6/23 Aims The National Curriculum for computing aims to ensure that all pupils: are responsible, competent, confident and creative users of information and communication technology. Key stage 1 “communicate safely and respectfully online, keeping personal information private” Key stage 2 “be discerning in evaluating digital content; respect individuals and intellectual property; use technology responsibly, securely and safely” Key stage 3 “create, reuse, revise and repurpose digital information and content with attention to design, intellectual property and audience” Key stage 4 “ ” Aspects of digital literacy

7/23 pupils subject to safeguarding or protection activity arrests made relating to safeguarding high risk, sex offender networks disrupted by CEOP The need for e-safety

8/23 Focussed on the school ensuring children are e-safe by “reducing availability, restricting access and increasing resilience” Building “children’s resilience to the material to which they may be exposed so that they have the confidence and skills to navigate … more safely” Ensure that new teachers entering the profession are equipped with e-safety knowledge and skills. Making explicit teaching and learning about e-safety. Identifying home-school links as a key issue. The Byron Review (2008)

9/23 A construct for e-safety – the 3 Cs

10/23 Jenny’s Story is a short film based on the true story of Jenny, a teenager who chats to a stranger on the internet. It shows how, through chatting online, Jenny reveals personal information which results in her being contacted in real life and ultimately hurt. INSERT DVD Jenny’s Story or KIA for Trainee Teachers Jenny’s Story - grooming

11/23 If you suspect that a pupil is a victim of physical abuse or you have received any type of disclosure about abuse occurring either online or offline, you MUST contact the designated member of staff immediately and make it clear to the pupil that he or she will have to share the information with a colleague of yours. For your benefit, you should make and sign accurate notes of the incident immediately after the disclosure. To report suspicious behaviour online with or towards a child contact the ‘Child Exploitation and Online Protection Centre’ Dealing with disclosures

12/23 Organisations General e-safety information sites for trainee teachers:

13/23 7 Manage behaviour effectively to ensure a good and safe learning environment  have clear rules and routines for behaviour in classrooms, and take responsibility for promoting good and courteous behaviour both in classrooms and around the school, in accordance with the school’s behaviour policy  have high expectations of behaviour… E-safety and the Teachers’ Standards

14/23 Teachers’ conduct Part two: Personal and professional conduct A teacher is expected to demonstrate consistently high standards of personal and professional conduct. Teachers uphold public trust in the profession and maintain high standards of ethics and behaviour, within and outside school, by: having regard for the need to safeguard pupils’ well-being, in accordance with statutory provisions

15/23

16/23

17/23

18/23

19/23 Policies in school

20/23

21/23

22/23 remember that most children who form online friendships with peers typically report a positive experience. There are wonderful, exciting ways of using the internet positively Switch+%2F+Touch+Screen+Videos&pid=74 and finally…

23/23