Presentation is loading. Please wait.

Presentation is loading. Please wait.

Dazed, Amazed and Googled Presented by Mrs. Cline Teacher Librarian Murrieta Valley High School.

Similar presentations


Presentation on theme: "Dazed, Amazed and Googled Presented by Mrs. Cline Teacher Librarian Murrieta Valley High School."— Presentation transcript:

1 Dazed, Amazed and Googled Presented by Mrs. Cline Teacher Librarian Murrieta Valley High School

2  Watch, Listen, Discuss  Take Notes  Actively Engage in Your Learning

3 What Does It Mean?

4  Access (print, digital, audio, real world)  Evaluate (accurate, applicable, useful)  Organize (combine, synthesize, create)  Communicate (digital, visual, audio)  to learn, problem-solve, make decisions Literacy

5  Ability to identify what information is needed  Understand how the information is organized  Identify the best sources of information for a given need

6  Locate those sources  Evaluate the sources critically  Share that information. It is the knowledge of commonly used research techniques.

7  Academic purposes  Research papers  Group presentations  Employment  Ability to find and evaluate  Use and share information  Consumer decisions  Which smart phone or car  Citizenship  Understanding issues and voting.

8  The amount of information available is going to keep increasing.  The types of technology used to access, manipulate, and create information will continue to expand.

9  Not all information is created equal  Some is  Authoritative  Current  Reliable  Some is  Biased  Out of date  Misleading  False

10 Informed Consumers of Information

11 What are the Rules??

12 Acceptable Use Policy What Does It Mean?

13  The District system includes:  A network of computers that serves all the schools  Saved files on a server for student work  District email to staff  Internet access

14  All students MUST have a signed Acceptable Use Policy on file in order to use the system  Signed by students and parents =  “I” sticker on your Student ID

15

16  Students will not post personal contact information about themselves or other people.  Includes:  address  telephone number  school address  Will NOT Agree to meet anyone they have met on-line

17  Students should tell their teachers immediately if they receive any message that is inappropriate or makes them feel uncomfortable.

18  Students will not attempt to gain unauthorized access to the system or any other computer system through the system or go beyond the authorized access  This includes:  accessing another person’s files  spreading computer viruses

19  Students will NOT make attempts to disrupt the computer system or destroy data by spreading computer viruses or by any other means. These actions are illegal.

20  Students will not use the system to engage in any illegal acts, such as:  arranging for sale of drugs or alcohol  engaging in criminal gang activity  threatening the safety of another person  Will not use the system for commercial activity  Will not use the system for political lobbying

21  Restrictions against inappropriate language apply to all public and private messages and material posted on Web pages  Students will NOT use:  obscene, profane, lewd, vulgar, rude, inflammatory, threatening, or disrespectful language

22  Students will not engage in personal attacks, including prejudicial or discriminatory attacks  Students will not knowingly or recklessly post false information about a person  Students will not harass another person

23  Students will not post a message that was sent privately to them without permission of the person who sent the message  Students will not post private information about another person

24  Students will use the system only for educational and career development activities  Teacher approval is required to download all files  Students will not post chain letters or engage in “spamming”

25  Students will not plagiarize works that they find on the Internet  Students will respect the rights of copyright owners  If students have questions they should ask their teachers

26  Students will not use the District’s system to access material that is profane or obscene, that advocates illegal acts, or that advocates violence or discrimination towards other people  If students mistakenly access inappropriate information, they should immediately tell their teacher – this protects them against a claim of intentionally violating this policy.

27  Student’s rights to free speech, as set forth in the school’s disciplinary code, applies also to their communication on the Internet  The system is considered a limited forum, similar to the school newspaper  District may restrict student speech for valid educational reasons

28  Students should only expect limited privacy in the contents of their personal work on the District system  Parents have the right at any time to request to see the content of student work

29  The District will cooperate fully with local, state or federal officials in any investigation related to any illegal activities conducted through the District system  In addition to restrictions or elimination of use, other disciplinary actions may take place

30  The District makes no guarantee that the functions or the services provided by or through the District system will be error-free or without defect.  District is not responsible for any damage suffered, including loss of data or interruption of service

31  Harassment – Persistently acting in a manner that distresses or annoys another person. If you are told by a person to stop sending messages, then you must STOP  Spamming – sending an annoying or unnecessary message to a large number of people.

32  Copyright – the exclusive, legal right to reproduce, publish, and sell material – such as literary, musical, or artistic work. This includes images and the written word.  Plagiarism – To steal or pass off the words or ideas of another person as your own.

33 What should I use??????

34  1 st Response  Address  Link works quickly

35 Online Catalog:To see what is available from the library Online Databases: To access remotely as much information as possible---”virtual library” Full Text of magazines, newspapers, reference books & more

36 Subscription FeeFree Current and up-to-date. Timely research. General. Quick and easy for small tasks Print documents accessed electronically Websites could exist only in cyberspace Editorially selected quality articles that are reviewed and updated regularly and meet K-12 curriculum and state standards. Less than 10% of Google is K-12 curriculum- relevant and is focused mostly on consumer related information Responsible person(s) clearly identified Links to info can be outdated and/or from sources unknown or open to question Author may be difficult to ascertain No ads. The focus is workAds and links are sought for profit

37 EBSCOE-BOOKS (Infotrac) Popular and Scholarly Country Reports Maps, Flags, Statistics Reference Books Electronic Books Curriculum Standards E-Mail, Print, Download Graphics MLA Citation SuggestedMLA Citation Completed

38  Welcome to Wikipedia,Wikipedia  the free encyclopedia that anyone can edit.anyone can edit  1,413,387 articles in English 1,413,387  Who is responsible for the articles on Wikipedia?  You are! Actually, you can even edit this very FAQ! As there are more than 2.34 million (2,340,000) other Wikipedians, this is a collaborative effort. Thousands of people have contributed information to different parts of this project, and anyone can do so, including you. All you need is to know how to edit a page, and have some encyclopedic knowledge you want to share. The encyclopedia provides users with a certain amount of freedom.Wikipedianscollaborativehow to edit a pageencyclopedic knowledge

39

40  Anyone can publish on the Web  It is “unfiltered”  Internet sources are much more fluid- the information they provide can change in an instant  Content not evaluated before posting  Click on each for examples Click on each for examples  Focus on: Focus on:  Authority Authority  Coverage Coverage  Currency Currency  Accuracy Accuracy  Objectivity Objectivity

41  Web Directories save valuable time because SMART people, not search programs, listed the websites  MVHS Online Catalog has WEBPATH EXPRESS Click on button for access

42

43 Tips for Remaining Safe Online

44 The 5 Characteristics of Social Networks Hi Sam!!! What’s up Lisa?

45 User Based Users submit and organize information Direction of content can be determined by any user – no one person dictates the current topic Freeform/unstructured

46 Interactive Not just a collection of chat rooms and forums Users can play games, take fun quizzes, share photos and ideas with friends A way to connect and have fun with friends

47 Community Driven Members hold common beliefs or interests Can make new friends with people who say they share your interests or beliefs USE CAUTION Can reconnect with old friends

48 Relationships Social networks are driven by the number of relationships between its members With no control on your settings, information will be dispersed to your friends, their friends, and so on…

49 Emotional Content In the past, web content was primarily information Social networks allow people to communicate needs within a community of friends and receive immediate responses

50 References The 5 core characteristics of social networks were described in a 2007 research study by researchers at Rice University, the University of Maryland, and Max Planck Institute for Software Systems. The characteristics are outlined at http://socialnetworking.lovetoknow.com /Characteristics_of_Social_Networkshttp://socialnetworking.lovetoknow.com /Characteristics_of_Social_Networks

51 Controlling Your Social Networking Privacy Settings Stay safe online!

52 Facebook Privacy Settings

53 Click on “Settings” Then on “Privacy Settings”

54 Use these options to control the information people see about you!

55 “Only friends” is the BEST option to limit who sees your info.

56 Check to see what your friends can see about you. If you don’t like what they are able to see, change it!

57 Do you want your cousin to know that you watch Judge Judy? If not, you can restrict that information!

58 You can choose what can be seen about you through the sites applications! Choose your games and applications wisely!

59 This is the most secure setting for applications (uncheck all)

60 In General…

61 Check the PRIVACY Settings For any and all social network sites & electronic devices---- it’s your responsibility!

62 Anyone can use whatever picture they want on the Internet, so beware! A nice picture can hide a not-so-nice person! It’s best not to use your full name on any social networking site – especially until you’re 18. If you are too young to use a social network, don’t lie, but your true age (teen-aged) may invite cyber-predators, so be careful. Hide your age if you can!

63 If you feel harassed or bullied on a social network: Ask the operators of the network for help Let them know you are a minor Or confide in a trusted adult

64 When on a social network: Only post things you wouldn’t mind an adult seeing Make sure you have a trusted adult as a “friend” or as a “follower.” This will remind you to be on your best online behavior!

65 Look to the Future Future employers may see what you have posted Colleges and scholarship organizations will look at what you’ve posted---OOPS!

66 Set Up Your Privacy Settings It may be the best 10 minutes you spend on the Internet! This slide presentation will be posted on the library webpage for reviewing if you need help remembering how to set your privacy settings Look on the Cyber Bullying and Internet Safety Page on the Library website

67 Works Cited Chait, Jennifer. “Cyberbullying Statistics.” lovetoknow. Web. 9 Sept. 2009. Lopez, Maribel D. “Online Teens Are Not Immune To Phishing.” FORRESTER. Web. 13 Sept. 2009. Make A Difference For Kids, Inc. “Cyberbullying.” Make A Difference For Kids. Web. 9 Sept. 2009. National Crime Prevention Council. “Teens and Cyberbullying.” NCPC. Web. 9 Sept. 2009. “Phishing Scams – 12 Ways to Stop Them.” Tweakspeed. Web. 16 Sept. 2009.

68 Cybersafety

69 What is Cyberbullying Cyberbullying  involves the use of electronic devices  supports deliberate, repeated, and hostile behavior by an individual or group  its intent is to harm others.

70 What is Cyberbullying According to a survey done in 2007 by the National Crime and Protection Council: 43% of teens report that they have experienced some form of cyberbullying that year. The incidence of cyberbullying is higher among females than males. More than 50% of females age 15 to 16 years of age reported at least one cyberbullying incident.

71 Why do teens cyberbully? 81% Because they think it is funny 64% Because they don’t like the person 45% Because they view the victim as a loser 47% Because they feel there are no consequences for cyberbullying 45% Because they don’t think they will get caught 58% of students surveyed don’t think cyberbullying is a big deal

72 Do you think it was a big deal to these students and their loved ones? Rachael was stalked online by anonymous bully. She died by suicide on October 9, 2006. Ryan, a 13-year old, who died by suicide as a result of bullying at school and online. A cruel online hoax by a neighbor led to the suicide death of Megan. Stop Cyber bullying

73 What is a cyber-predator? A cyber-predator uses the internet to hunt for victims to take advantage of them in some way: emotionally sexually psychologically financially A cyber-predator knows how to manipulate people by creating trust and friendships where none should exist.

74 What is a cyber-predator? 77% of the target for online predators are teens aged 14 and older. 33% of teens received an aggressive sexual solicitation online in the past year. 75% of children are willing to share personal information online about themselves and their family in exchange for goods and services.

75 STOP the Bad Guys! 1. Be suspicious of any email with urgent requests for personal financial information. DO NOT RESPOND TO IT! Phisher emails are typically NOT personalized Valid messages from your bank or e- commerce company generally are

76 STOP the Bad Guys! 2. If you suspect an email message might not be authentic...Don't use the embedded links to get to another web page. Call the company on the telephone, or log onto the website directly by typing the URL into the address bar Don’t cut and paste the link from the message into your Internet browser – the phisers can redirect you to a different site

77 How to stop the bad guys 3. Avoid filling out forms in email messages that ask for personal financial information. Phishers make very good fake forms. Only communicate personal financial information via a secure website or the telephone.

78 4. Don’t email personal or financial information. Email is not a secure method of transmitting personal information No one indicator is foolproof Some phishers have forged security icons like the lock icon on an order form

79 5. Always ensure that you're using a secure website when submitting credit card or other sensitive information via your Web browser. Web address should begin with "https://" rather than just "http://".

80 Cyberbullying Video Click on Picture for video

81 Consequences Click on picture for video

82 Social Networking Video Click on picture for video

83 Be Smart! Stay Safe Online!! Get more information @ your library!

84 Virtual Library With Unlimited Access 24 hours a day, 7 days a week with Internet access! Click on logo below for access


Download ppt "Dazed, Amazed and Googled Presented by Mrs. Cline Teacher Librarian Murrieta Valley High School."

Similar presentations


Ads by Google