dazed, amazed and googled presented by mrs. cline teacher librarian murrieta valley high school
Post on 19-Dec-2015
212 views
TRANSCRIPT
Information Literacy
Dazed, Amazed and Googled
Presented by Mrs. ClineTeacher Librarian
Murrieta Valley High School
TODAY’S TASKS
Watch, Listen, DiscussTake NotesActively Engage in Your Learning
Part One: ICT
What Does It Mean?
Information CommunicationTechnology
Access (print, digital, audio, real world) Evaluate (accurate, applicable, useful)Organize (combine, synthesize, create)Communicate (digital, visual, audio)
to learn, problem-solve, make decisions
Literacy
WHAT IS INFORMATION LITERACY?
Ability to identify what information is needed
Understand how the information is organized
Identify the best sources of information for a given need
WHAT IS INFORMATION LITERACY?
Locate those sources
Evaluate the sources critically
Share that information.
It is the knowledge of commonly used research
techniques.
HOW ARE INFORMATION LITERACY SKILLS USED?
Academic purposes Research papers Group presentations
Employment Ability to find and evaluate Use and share information
Consumer decisions Which smart phone or car
Citizenship Understanding issues and voting.
WHY IS INFORMATION LITERACY IMPORTANT?
The amount of information available is going to keep increasing.
The types of technology used to access, manipulate, and create information will continue to expand.
WHY IS INFORMATION LITERACY IMPORTANT?
Not all information is created equal
Some is Authoritative Current Reliable
Some is Biased Out of date Misleading False
Informed Consumers of Information
Part Two: Access
What are the Rules??
Murrieta Valley Unified School District
Acceptable Use Policy
What Does It Mean?
“The System”
The District system includes: A network of computers that serves all
the schools Saved files on a server for student work District email to staff Internet access
Requirements
All students MUST have a signed Acceptable Use Policy on file in order to use the system
Signed by students and parents =
“I” sticker on your Student ID
Show Student ID!
Personal Safety
Students will not post personal contact information about themselves or other people.
Includes: address telephone number school address
Will NOT Agree to meet anyone they have met on-line
Personal Safety
Students should tell their teachers immediately if they receive any message that is inappropriate or makes them feel uncomfortable.
Illegal Activities
Students will not attempt to gain unauthorized access to the system or any other computer system through the system or go beyond the authorized access
This includes: accessing another person’s files spreading computer viruses
Illegal Activities
Students will NOT make attempts to disrupt the computer system or destroy data by spreading computer viruses or by any other means. These actions are illegal.
Students will not use the system to engage in any illegal acts, such as: arranging for sale of drugs or alcohol engaging in criminal gang activity threatening the safety of another person
Will not use the system for commercial activity
Will not use the system for political lobbying
Inappropriate Language
Restrictions against inappropriate language apply to all public and private messages and material posted on Web pages
Students will NOT use: obscene, profane, lewd, vulgar, rude,
inflammatory, threatening, or disrespectful language
Inappropriate Language
Students will not engage in personal attacks, including prejudicial or discriminatory attacks
Students will not knowingly or recklessly post false information about a person
Students will not harass another person
Respect for Privacy
Students will not post a message that was sent privately to them without permission of the person who sent the message
Students will not post private information about another person
Respect Resource Limits
Students will use the system only for educational and career development activities
Teacher approval is required to download all files
Students will not post chain letters or engage in “spamming”
Plagiarism and Copyright Infringement
Students will not plagiarize works that they find on the Internet
Students will respect the rights of copyright owners
If students have questions they should ask their teachers
Inappropriate Access to Material Students will not use the District’s system
to access material that is profane or obscene, that advocates illegal acts, or that advocates violence or discrimination towards other people
If students mistakenly access inappropriate information, they should immediately tell their teacher – this protects them against a claim of intentionally violating this policy.
Student’s Rights Using the District System
Student’s rights to free speech, as set forth in the school’s disciplinary code, applies also to their communication on the Internet
The system is considered a limited forum, similar to the school newspaper
District may restrict student speech for valid educational reasons
Student’s Rights Using the District System
Students should only expect limited privacy in the contents of their personal work on the District system
Parents have the right at any time to request to see the content of student work
Due Process
The District will cooperate fully with local, state or federal officials in any investigation related to any illegal activities conducted through the District system
In addition to restrictions or elimination of use, other disciplinary actions may take place
Limitation of Liability
The District makes no guarantee that the functions or the services provided by or through the District system will be error-free or without defect.
District is not responsible for any damage suffered, including loss of data or interruption of service
Glossary
Harassment – Persistently acting in a manner that distresses or annoys another person. If you are told by a person to stop sending messages, then you must STOP
Spamming – sending an annoying or unnecessary message to a large number of people.
Glossary
Copyright – the exclusive, legal right to reproduce, publish, and sell material – such as literary, musical, or artistic work. This includes images and the written word.
Plagiarism – To steal or pass off the words or ideas of another person as your own.
Part Three: Availability of Information Sources
What should I use??????
SEARCHING:How Do You Choose?
1st Response
Address
Link works quickly
What You Need and How to Get It
Online Catalog:To see what is available from the library
Online Databases: To access remotely as much information as possible---”virtual library”
Full Text of magazines, newspapers, reference books & more
Online Database vs. Google
Subscription Fee Free
Current and up-to-date. Timely research.
General. Quick and easy for small tasks
Print documents accessed electronically
Websites could exist only in cyberspace
Editorially selected quality articles that are reviewed and updated regularly and meet K-12 curriculum and state standards.
Less than 10% of Google is K-12 curriculum-relevant and is focused mostly on consumer related information
Responsible person(s) clearly identified
Links to info can be outdated and/or from sources unknown or open to questionAuthor may be difficult to ascertain
No ads. The focus is work Ads and links are sought for profit
DATABASE S COMPARISON
EBSCO E-BOOKS (Infotrac)
Popular and Scholarly Country ReportsMaps, Flags, Statistics
Reference BooksElectronic BooksCurriculum Standards
E-Mail, Print, Download E-Mail, Print, Download
Graphics Graphics
MLA Citation Suggested MLA Citation Completed
Online Encyclopedia
Welcome to Wikipedia, the free encyclopedia that anyone can edit. 1,413,387 articles in English Who is responsible for the articles on Wikipedia?
You are! Actually, you can even edit this very FAQ! As there are more than 2.34 million (2,340,000) other Wikipedians, this is a collaborative effort. Thousands of people have contributed information to different parts of this project, and anyone can do so, including you. All you need is to know how to edit a page, and have some encyclopedic knowledge you want to share. The encyclopedia provides users with a certain amount of freedom.
EVALUATING WEB SITES.COM = commercial site - advertising - something to sell .NET = network
.EDU = college, university, etc. check author – professor or student?
.GOV = government sponsored site - reliable
.ORG = organizations – may show some bias
Evaluating Web Sites
Anyone can publish on the Web
It is “unfiltered” Internet sources are
much more fluid- the information they provide can change in an instant
Content not evaluated before posting
Click on each for examples
Focus on: Authority Coverage Currency Accuracy Objectivity
EVALUATING WEB SITESWeb
Directories save valuable time because SMART people, not search programs, listed the websites
MVHS Online Catalog has
WEBPATH EXPRESS Click on button
for access
Questions
Part Four:Cyber Safety
Tips for Remaining Safe Online
The 5 Characteristics of Social Networks
Hi Sam!!!
What’s up
Lisa?
User Based
• Users submit and organize information
• Direction of content can be determined by any user – no one person dictates the current topic
• Freeform/unstructured
Interactive
• Not just a collection of chat rooms and forums
• Users can play games, take fun quizzes, share photos and ideas with friends
• A way to connect and have fun with friends
Community Driven Members hold common
beliefs or interests Can make new friends with
people who say they share your interests or beliefs USE CAUTION
Can reconnect with old friends
Relationships Social networks are driven
by the number of relationships between its members
With no control on your settings, information will be dispersed to your friends, their friends, and so on…
Emotional Content In the past, web
content was primarily information
Social networks allow people to communicate needs within a community of friends and receive immediate responses
References
The 5 core characteristics of social networks were described in a 2007 research study by researchers at Rice University, the University of Maryland, and Max Planck Institute for Software Systems .
The characteristics are outlined at
http://socialnetworking.lovetoknow.com/Characteristics_of_Social_Networks
Controlling Your Social Networking Privacy Settings
Stay safe online!
Facebook Privacy Settings
Click on “Settings”Then on “Privacy Settings”
Use theseoptions to controlthe informationpeople see aboutyou!
“Only friends”is the BESToption to limitwho sees
your info.
Check to see what your friends can see about you. If you don’t like what they are able to see, change it!
Do you want your cousin to knowthat you watch Judge Judy? If not,you can restrict that information!
You can choosewhat can be seen about you through the sitesapplications!
Choose your gamesand applicationswisely!
This is the mostsecure setting forapplications (uncheck all)
In General…
Check the PRIVACY Settings
For any and all social network sites & electronic devices----it’s your responsibility!
• Anyone can use whatever picture they want on the Internet, so beware! A nice picture can hide a not-so-nice person!
• It’s best not to use your full name on any social networking site – especially until you’re 18.
• If you are too young to use a social network, don’t lie, but your true age (teen-aged) may invite cyber-predators, so be careful. Hide your age if you can!
If you feel harassed or bullied on a social network:
• Ask the operators of the network for help
•Let them know you are a minor
• Or confide in a trusted adult
When on a social network:
• Only post things you wouldn’t mind an adult seeing
• Make sure you have a trusted adult as a “friend” or as a “follower.”
•This will remind you to be on your best online behavior!
Look to the Future
• Future employers may see what you have posted
•Colleges and scholarship organizations will look at what you’ve posted---OOPS!
Set Up Your Privacy Settings
It may be the best 10 minutes you spend on the Internet!
This slide presentation will be posted on the library webpage for reviewing if you need help remembering how to set your privacy settings
Look on the Cyber Bullying and Internet Safety Page on the Library website
Works Cited
Chait, Jennifer. “Cyberbullying Statistics.” lovetoknow. Web. 9 Sept. 2009
<http://safety.lovetoknow.com>.
Lopez, Maribel D. “Online Teens Are Not Immune To Phishing.” FORRESTER. Web. 13 Sept.
2009 <http://www.forrester.com>.
Make A Difference For Kids, Inc. “Cyberbullying.” Make A Difference For Kids. Web. 9 Sept.
2009 <http://www.makeadifferenceforkids.org>.
National Crime Prevention Council. “Teens and Cyberbullying.” NCPC. Web. 9 Sept. 2009
<http://www.ncpc.org>.
“Phishing Scams – 12 Ways to Stop Them.” Tweakspeed. Web. 16 Sept. 2009
<http://www.tweakspeed.com>.
Cybersafety
What is Cyberbullying
Cyberbullying involves the use of electronic devices
supports deliberate, repeated, and hostile behavior by an individual or group
its intent is to harm others.
What is Cyberbullying
According to a survey done in 2007 by the National Crime and Protection Council:• 43% of teens report that they have experienced
some form of cyberbullying that year.
• The incidence of cyberbullying is higher among females than males. More than 50% of females age 15 to 16 years of age reported at least one cyberbullying incident.
Why do teens cyberbully?
81% Because they think it is funny
64% Because they don’t like the person
45% Because they view the victim as a loser
47% Because they feel there are no consequences for cyberbullying
45% Because they don’t think they will get caught
58% of students surveyed don’t think
cyberbullying is a big deal
Do you think it was a big deal to these students and their loved ones?
Rachael was stalked online by anonymous bully. She died by suicide on October 9, 2006.
Ryan, a 13-year old, who died by suicide as a result of bullying at school and online.
A cruel online hoax by a neighbor led to the suicide death of Megan.
Stop Cyber bullying
What is a cyber-predator?
A cyber-predator uses the internet to hunt for victims to take advantage of them in some way:• emotionally• sexually• psychologically• financially
A cyber-predator knows how to manipulate people by creating trust and friendships where none should exist.
What is a cyber-predator?
77% of the target for online predators are teens aged 14 and older.
33% of teens received an aggressive sexual solicitation online in the past year.
75% of children are willing to share personal information online about themselves and their family in exchange for goods and services.
STOP the Bad Guys!
1. Be suspicious of any email with urgent requests for personal financial information. DO NOT RESPOND TO IT!
• Phisher emails are typically NOT personalized
• Valid messages from your bank or e-commerce company generally are
STOP the Bad Guys!
2. If you suspect an email message might not be authentic . . .Don't use the embedded links to get to another web page.
• Call the company on the telephone, or log onto the website directly by typing the URL into the address bar
• Don’t cut and paste the link from the message into your Internet browser – the phisers can redirect you to a different site
How to stop the bad guys
•3. Avoid filling out forms in email messages that ask for personal financial information.
• Phishers make very good fake forms.
• Only communicate personal financial information via a secure website or the telephone.
4. Don’t email personal or financial information.
• Email is not a secure method of transmitting personal information
• No one indicator is foolproof
• Some phishers have forged security icons like the lock icon on an order form
5. Always ensure that you're using a secure website when submitting credit card or other sensitive information via your Web browser.
• Web address should begin with "https://" rather than just "http://".
Be Smart!Stay Safe Online!!
Get more information @ your library!
MVHS Library Web Page
Virtual Library With Unlimited Access 24 hours a day, 7 days a
weekwith Internet access!
Click on logo below for access