Presentation is loading. Please wait.

Presentation is loading. Please wait.

Click Here .  A social network is a website created where individuals can connect to one another through the internet. › Often called “nodes”  Benefits:

Similar presentations


Presentation on theme: "Click Here .  A social network is a website created where individuals can connect to one another through the internet. › Often called “nodes”  Benefits:"— Presentation transcript:

1 Click Here 

2

3  A social network is a website created where individuals can connect to one another through the internet. › Often called “nodes”  Benefits: › Good way to keep in touch with family and friends. › Good networking for businesses.  Dangers › Allows easy contact with strangers. › Easy to share private information on the internet.  Examples: › MySpace, Facebook, Twitter  How to stay safe: › Become educated on the hazards that can be caused by the internet. › Do not display any personal information on the web.  Use a nickname and do not give our your e-mail address. Watch this video to learn how to stay safe on the web!video

4  Set of rules that restrict the ways in which a website may be used. › Outline how the student should act while using technology, what they can and can not do with it, and the consequences following their actions.  Appropriate websites vs. inappropriate websites.  Respecting materials.  Only using computers for school- related learning.  How does this work inside of the classroom? › Create a “contract” that outline how students should behave on the internet or while using any form of technology.  Should be looked at and signed by parents, teachers, and students.

5  Refers to the etiquette one should abide by while using the internet. › DO NOT TYPE IN ALL CAPS!  This seems like you are angry or yelling at your reader. › Caution: posts can easily be made public.  Do not share any information (even over E-mail or Instant Messenger) that you would not want to become public knowledge. › Do not use internet slang during school.  Abbreviations, such as LOL, and other slang words are commonly used on the internet but keep in mind that when you are communicating with a teacher or using computers for school related material it is important to use proper spelling and grammar in your sentences.

6  Using technology to emotionally hurt others. › Spreading rumors › Sharing other’s personal information › Sending hurtful photos of others › Impersonating others on the web.  Cyber bullying is one of the most reoccurring type of bullying found in schools today. Cyber bullying occurs whenever someone maliciously intends harm on someone else by using any form of technology such as the internet or text messaging.

7 › 22% of students know someone who has been bullied online. › 19% of students admit to saying something hurtful to others online. › 12% of students have personally become upset by strangers online. › 90% of middle school students have had their feelings hurt online. › 75% have visited a web site bashing another student › 40% have had their password stolen and changed by a bully. › 81% of cyber bullies do it because they think its funny ("Cyberbullying").

8  STOP › Encourage your peers to stop cyberbullying.  BLOCK › Ignore messages from cyber bullies or block them from your social networking sites.  TELL › Tell an adult about the bullying right away.

9  Family Educational Rights and Privacy Act › “Federal law that protects the privacy of student education records. The law applies to all schools that receive funds under an applicable program of the U.S. Department of Education” ("Family educational rights" 2009). › FERPA gives the parents the right to all their child’s educational records until they turn 18 or attend further schooling after high school.  Although it is beneficial for teachers to keep student records digitally, it is of the upmost importance that this information remains private. › In order to keep this information private, it can be beneficial for the teacher to have their own password which allows until authoritative figures to access the students’ information.

10  Children’s Internet Protection Act › Law concerning the amount of access people can obtain from school and library computers. › E-rate program  Any school or library that receives funding from the E- rate program is required to implement the rules of CIPA  Can not receive E-rate discounts unless they verify that they implement the protection measures.  Required to block pictures that are obscene, pornographic, or harmful to minors.  Schools /libraries under the CIPA but address the issues of: › “access by minors to inappropriate matter on the Internet; › the safety and security of minors when using electronic mail, chat rooms, and other forms of direct electronic communications; › unauthorized access, including so-called “hacking,” and other unlawful activities by minors online; › unauthorized disclosure, use, and dissemination of personal information regarding minors; › measures restricting minors’ access to materials harmful to them” ("Children's internet protection" 2009).

11

12  What contributes to this gap? › In general, men are more interested in technology than women. › Most technology software is aimed towards the male sex. › Men are more comfortable on computers.  Spend more time playing computer games.  How can we close this gap? › American Association of University Women  School aimed towards getting girls interested in exploring learning through technology. › The AED Center for Gender Equity  Focuses on helping girls get a good education and succeed in society.  “Promotes the rights of girls and women to education, health, a safe environment, economic participation, and leadership ("Center for gender" ).

13  Difference in SES highly effect the availability of technology.  Finances play a huge role in this gap. › Families may not not have enough money to purchase a computer for their home.  This is a growing problem due to the fact that education is becoming more technology based as the time goes on.  If these children are not exposed to technology while their classmates are, they are sure to fall behind in school and if they are continuously deprived from technology knowledge they will ultimately be behind when they reach the workforce.  Although students can get access to the internet through public libraries, some students may not live close enough to utilize this.  How to stop this gap from growing: › Provide the students with extra time in the classroom to work on the computer. › Organize a “Computer Club” where the students can get together once a week after school and play educational games on the computer with their partner.

14  SES plays a huge role in whether an individual has access to a computer.  Technology Literacy and race › Most literate  White › Least literate  African American  Hispanics  There are nearly 41.3 Hispanic people in the united states and 14 million don’t speak English.  If they do not speak English, they will not be able to efficiently use a computer.

15 (Carvin, 2006)

16  The amount of resources provided differs in each individual school. › For example, one school may have a variety of technology to provide for the students while another has none. › Special needs – many children need assistive technology to learn.  Assistive technology › Many students with special needs have to use assistive technology inside of the classroom to be able to learn. › If a school does not have the resources to provide this form of technology, the student’s cognitive abilities will suffer.

17  Older teachers › Teachers who have been working in the educational field for a long time may not be comfortable using technology in the classroom. Therefore, they may choose to steer clear of using technology as an educational tool in the classroom.  Using technology too much. › Some teachers are very comfortable with using technology inside of the classroom and therefore implement it in every lesson. › Although using technology to teach in the classroom is proven to be beneficial for the students, teachers need to recognize that students learn in a variety of ways and it is important to teach multiple ways instead of choosing to teach solely through technology.

18

19  Copyright is an author’s exclusive right to their creation. › As of April 1, 1989 work is copyrighted and protected whether it has a notice or not. › Even if there is not a copyright on the document, it is still copyrighted by the author. ©  It is illegal to use someone’s work without their permission.  Copyrights last for the life of the author, plus 70 years.  When an item is copyrighted, you can not can make a copy of the work, distribute the work to the public, prepare a work that is derivative from the original work, and you can not perform the work publically ("How to Understand" 2006).

20  This is an exception to the copyright law. › Under some circumstances, copying or distributing someone’s work without their permission.  When copywriting is “fair”: › “The purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; › The nature of the copyrighted work; › The amount and substantiality of the portion used in relation to the copyrighted work as a whole (is it long or short in length, that is, are you copying the entire work, as you might with an image, or just part as you might with a long novel); › The effect of the use upon the potential market for or value of the copyrighted work” ("How to Understand" 2006).

21  Non-profit organization founded in 2001.  Creative commons is “devoted to expanding the range of creative works available for others to build upon legally and to share” (“Creative commons" ) › Organization provides copyright-licenses to the public that allows authors to communicate which rights they want to reserve and which rights they choose to waive in order to let the public freely benefit from their work.

22 Acceptable use policies: a handbook. (n.d.). Retrieved from http://www.doe.virginia.gov/go/VDOE/Technology/AUP/home.shtml http://www.doe.virginia.gov/go/VDOE/Technology/AUP/home.shtml Bitter, G, & Legacy, J. (2006). Using Technology in the classroom. New York, NY: Pearson Education, Inc. Carvin, A. (2006, March 31). Race and the digital divide: a current snapshot. Retrieved from http://www.andycarvin.com/archives/2006/03/race_and_the_digital.html Center for gender equality. Retrieved from http://cge.aed.org/ Children's internet protection act. (2009, September 21). Retrieved from http://www.fcc.gov/cgb/consumerfacts/cipa.html http://www.fcc.gov/cgb/consumerfacts/cipa.html Creative commons. Retrieved from http://creativecommons.org/ Cyberbullying. Retrieved from http://www.makeadifferenceforkids.org/cyberbullying.html Family educational rights and privacy act. (2009, June 16). Retrieved from http://www.ed.gov/policy/gen/guid/fpco/ferpa/index.html http://www.ed.gov/policy/gen/guid/fpco/ferpa/index.html How to Understand copyright restrictions. (2006, August 8). Retrieved from http://lcweb2.loc.gov/ammem/ndlpedu/start/cpyrt/index.html Internet safety & civility. Retrieved from http://www.safekids.com/http://www.safekids.com/ Internet safety with detective kellogg. (2007). [Web]. Retrieved from http://teachertube.com/viewVideo.php?video_id=425&title=Internet_Safety_with_Detective_Kello gg http://teachertube.com/viewVideo.php?video_id=425&title=Internet_Safety_with_Detective_Kello gg McGrath, D. (2004). Closing the gender gap. Girls, Technological Fluency, and PBL, 31(6), Retrieved from http://faculty.salisbury.edu/~ddsessoms/Educ318/GenderGap.pdf Network, networking technology, data communication terms, glossary and dictionary - n. (2004 - 2010). Retrieved from http://www.networkdictionary.com/networking/n.php Technology glossary. (2009). Retrieved from http://www.4teachers.org/techalong/glossary/http://www.4teachers.org/techalong/glossary/ Templeton, B. (1994). 10 big myths about copyright explained. Retrieved from http://www.templetons.com/brad/copymyths.html http://www.templetons.com/brad/copymyths.html


Download ppt "Click Here .  A social network is a website created where individuals can connect to one another through the internet. › Often called “nodes”  Benefits:"

Similar presentations


Ads by Google