digital citizenship: responsible behavior in a digital world
TRANSCRIPT
Are YOUYOU a Digital Citizen?
Copyright for the cartoons by Jerry King belong to From Now On, readers may distribute freely provided they reproduce the credit with a link to Jerry's Web site http://www.jerryking.com/ and to From Now On http://fno.org.
An Introduction to the Nine Elements
Florida TechNet
Debra L Hargrove, Ed.D.,Director
Kimberly GatesFayne JohnsonJoan Luebbe
Jana WhiteheadMost of the scenarios were adapted fromhttp://www.slideshare.net/katisearcy as well as Digital Citizenship in Schools, by Mike Ribble and Gerald Bailey. Used with permission
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
A Vision of Students Today
http://www.youtube.com/watch?v=dGCJ46vyR9o
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Quick Definitions Quick Definitions (circa 1970’s)(circa 1970’s)
Backup What you need to do when you run into a tree
Byte What those darn flies do
Cache What you need to buy groceries
Crash When you go to a party uninvited
Hacker Uncle Buddy after 40 years of smoking
Modem What you did when the grass and weeds got too tall
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Are you a Native or Immigrant?Are you a Native or Immigrant?Are you a Native or Immigrant?Are you a Native or Immigrant?
• Digital NativeDigital Native – a person who has
grown up with digital technology such as computers, the Internet, mobile phones and MP3.
• Digital ImmigrantDigital Immigrant – an individual who grew
up without digital technology and adopted it later.
http://tinyurl.com/digitalimmigrant
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Formal and Informal GroupsFormal and Informal Groups Formal and Informal GroupsFormal and Informal Groups
• We started interacting technologically with each other since the early 1990’s
• Created our own digital society– Comes with assumptions that we all behave
an accepted way– Not everyone does
• We must prepare our students to live in a world without boundaries
• Help them work with others virtually or otherwise!
Follow the rules!
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Are there specific rules for behaving Are there specific rules for behaving in a digital world?in a digital world?
Are there specific rules for behaving Are there specific rules for behaving in a digital world?in a digital world?
• Introduce the concept of Digital Citizenship (DC)
• Explain the Nine Elements of Digital Citizenship
• Provide resources for teaching and implementing a DC program in your school
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Why Why (Digital)(Digital) Citizenship? Citizenship?Why Why (Digital)(Digital) Citizenship? Citizenship?
Citizenship is membership in a political community (originally a city or town but now usually a country) and carries with it rights to political participation; a person having such membership is a citizen.
Citizenship status often implies some responsibilities ...
cit·i·zen·ship ˈsɪtəzənˌʃɪp, -sən- - Show Spelled Pronunciation [sit-uh-zuhn-ship, -suhn-] Pronunciation Key - Show IPA Pronunciation
–noun 1.the state of being vested with the rights, privileges, and duties of a citizen. 2.the character of an individual viewed as a member of society; behavior in
terms of the duties, obligations, and functions of a citizen: an award for good citizenship. [Origin: 1605–15; citizen + -ship] Dictionary.com Unabridged (v 1.1)
Based on the Random House Unabridged Dictionary, © Random House, Inc. 2006.
http://en.wikipedia.org/wiki/Citizen
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Adopting the DC PhilosophyAdopting the DC PhilosophyAdopting the DC PhilosophyAdopting the DC Philosophy
• A way to approach the challenges facing all technology users
• A good starting point for both Natives and Immigrants
• The first step in helping our students (and ourselves) become good digital citizens
• Acceptable Use Policies Aren’t Enough!
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
What would you do?What would you do?What would you do?What would you do?
You’ve finally been able to escape to the beach for
the weekend. You found the perfect
spot… no children, no pets, no people.
All of a sudden, a person shows up and starts talking loudly on their
cell phone.
Is it OK to talk on your cell phone
in public?
While the copyright for these cartoons by Jerry King belong to From Now On, readers may distribute freely provided they reproduce the credit with a link to Jerry's Web site http://www.jerryking.com/ and to From Now On http://fno.org.
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Be thinking…Be thinking…
• Do I see similar issues in my classroom or school?
• If not, could they BE an issue in the next year or two?
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Getting in the MindsetWho will YOU be?
http://www.youtube.com/watch?v=MX0aycyAAJA
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Digital Access full electronic participation in
society• Technology allows opportunities for
large numbers of people to communicate quickly
• Not everyone has access
SESSES
Physical LocationPhysical Location
DisabilitiesDisabilities
The haves and have nots
Low income schools
Rural schools
Meeting ADA?
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Digital Access full electronic participation in
society
From “News & Trends” Technology & Learning, 28(10), p.16
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Digital Access ScenarioDigital Access Scenario
The students in your GED class have been given the task of watching a 20-minute Discovery Education streaming movie outside of regular class time.
They have one week in which they are to watch the online movie and take the online quiz.
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
What the Teacher said…
The students have been told that they will receive a “zero” if they do not
watch the movie and take the quiz at home, even though some students do not have Internet access, and some
students who do have Internet access, have a dial-up connection.
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
The teacher gives the assignment that all students are to view the movie and take the quiz. For students who do not have the appropriate Internet connections at home, he/she offers the opportunity for them to
1. come to the classroom 30 minutes before school starts, or
2. come to the classroom after school, or3. take home a CD with the movie and a printed
quiz so they may complete the assignment.
What SHOULD have happened?
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Let’s think about it!Let’s think about it!Let’s think about it!Let’s think about it!
Other possible alternatives to watching the online video
LibraryIpodSmart PhoneFriend’s What else?
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
What could make a differenceWhat could make a difference
When giving online assignments for students to complete outside of school, it is important to remember that they may not have access to the Internet.
For some this may be an ongoing situation and for others it may be a temporary non-access issue.
Since the Internet is a valuable resource, teachers need to provide alternative ways for the students to access the information in order to complete assignments.
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Digital CommerceDigital CommerceBuying and selling of goods Buying and selling of goods
onlineonline
Digital CommerceDigital CommerceBuying and selling of goods Buying and selling of goods
onlineonline
• Most difficult element to address
• Generation Y (8-24 yr olds) spent $196 Billion/year
• Do they really know– All sides of the transaction process– Internet scams– Identity theft
Source: Shop.org 2006
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Digital CommerceDigital CommerceBuying and selling of goods Buying and selling of goods
onlineonline
Digital CommerceDigital CommerceBuying and selling of goods Buying and selling of goods
onlineonline
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
What Makes a Website Safe?What Makes a Website Safe?What Makes a Website Safe?What Makes a Website Safe?
• Padlock• HTTPS• Physical Address and Contact Phone• Privacy and Return Policies• Being cautious when buying overseas
http://www.lib.berkeley.edu/TeachingLib/Guides/Internet/Evaluate.html
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Melissa
Melissa, who recently celebrated her 19th birthday, received an $1000 check from her rich grandmother. She deposited the check in her bank account for which she has a debit card.
Melissa’s home internet connection is temporarily down, so she rode with her older sister to the local public library to use the computer there.
While on the eBay site, she saw that they have just what she wants – a brand new Wii for only $10.00!
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
What happened…What happened…
Excitedly, Melissa took our her debit card and bid on the item. She had watched her father do this before and knows just what to do.
She wanted to make sure she is the highest bidder so she quickly entered her debit card information and selected $300 as her maximum bid.
She didn’t log off as she left the library computer.
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
What Do You Think About That?
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
What She SHOULD Have DoneWhat She SHOULD Have Done
Melissa realized that a new Wii could not possibly sell for $10.00. She looked at other Wii’s that were listed on eBay and saw that the winning bids have averaged around $275.
She really wants the Wii but is uncomfortable putting her debit card information online to purchase something for which she is unsure of the final price.
She logs off the library computer and goes home.
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
What could make a differenceWhat could make a difference
Melissa would do well to go to a store that sells retail Nintendo products such as the Wii. She will know the exact price of the new product she is purchasing plus she will have a receipt in order to return it if it does not work properly.
Her parents and teachers would do well to advise her to be careful where she uses her debit card as that card is the “key” to her checking account funds.
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
An Online Auction
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Don’t Forget What Makes a Website SafeDon’t Forget What Makes a Website SafeDon’t Forget What Makes a Website SafeDon’t Forget What Makes a Website Safe
• Padlock• HTTPS• Physical Address and Contact Phone• Privacy and Return Policies• Being cautious when buying overseas
http://www.lib.berkeley.edu/TeachingLib/Guides/Internet/Evaluate.html
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Digital CommunicationDigital Communicationthe electronic exchange of the electronic exchange of informationinformation
Digital CommunicationDigital Communicationthe electronic exchange of the electronic exchange of informationinformation
Texting Handout
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Digital CommunicationDigital Communicationthe electronic exchange of the electronic exchange of informationinformation
Digital CommunicationDigital Communicationthe electronic exchange of the electronic exchange of informationinformation
• How many ways can we share information?– Cell phones– Text messaging (IM’ing)– Video conferencing– Email video– Chat rooms– Fax– Blog– Wiki– -Social Networks
How can you use some How can you use some of the tools listed in your of the tools listed in your classroom?classroom?
What positive outcomes What positive outcomes do they enable?do they enable?
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Digital CommunicationDigital Communicationthe electronic exchange of the electronic exchange of informationinformation
Digital CommunicationDigital Communicationthe electronic exchange of the electronic exchange of informationinformation
The Couch Potato Generation (8-18)
– Watch TV – 270 min– Text messaging – 90 min– Video games – 73 min– Nonschool computer use – 89 min– Listen to music – 151 min– Talk on cell phone – 33 min
Using phones, computers, TVs and video game systems 7.5 hrs/day!
Source: Kaiser Family Foundation (Time article February 1, 2010)
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
ScenarioScenario
Adult learners at a local school were terrified earlier in the school year when they learned there was an armed intruder on their campus.
Since that incident, almost all of the students at the school now bring cell phones to school in order to be able to contact family in case of any future emergency.
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
What Happened…What Happened…
The students set their “interesting” ring tones on loud rather than setting the phone to vibrate or turning it off.
Whenever possible, they took the phones out and used them to text messages to their classmates in and out of class.
One student also took unflattering photos of their Adult Ed teacher behind her back and sent them to classmates as well.
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
The Adult Ed Teacher should have discussed with the students the cell phone issue. She should explain that while she understands their wishes to have their phones with them, they should only to be used for classroom exercises or emergency purposes.
What She Should Have DoneWhat She Should Have Done
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
What could make a differenceWhat could make a difference
All of these students actually have a mini-computer in their possession. How could you use the cell phones as technology tools?
• Students could text grammar exercises to her.
• Students could use the video options to record each other rehearsing presentations and then review the videos to critique themselves.
• Students could use the calculator functions while studying math
• Students could take photos for lessons and projects.
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Digital LiteracyDigital Literacythe capability to use digital the capability to use digital technology and knowing when and technology and knowing when and how to use it.how to use it.
Digital LiteracyDigital Literacythe capability to use digital the capability to use digital technology and knowing when and technology and knowing when and how to use it.how to use it.
• Technology-fused learning has become more commonplace
• Learning WITH doesn’t always include Learning HOW
• Technology seen as a CLASS as opposed as part of curriculum.
• Teachers need to know how to use technology to stimulate learning.
While the copyright for these cartoons by Jerry King belong to From Now On, readers may distribute freely provided they reproduce the credit with a link to Jerry's Web site http://www.jerryking.com/ and to From Now On http://fno.org.
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Digital LiteracyDigital Literacythe capability to use digital the capability to use digital technology and knowing when and technology and knowing when and how to use it.how to use it.
Digital LiteracyDigital Literacythe capability to use digital the capability to use digital technology and knowing when and technology and knowing when and how to use it.how to use it.
Generational Differences in
Online Activities (Report)
Teens and Gen Y: Play games, watch videos, Download Music, Social Networking
Gen X: Buy something, get health info
All groups (less differences): use email, use search engines, make travel reservations, research products
http://www.pewinternet.org/Reports/2009/Generations-Online-in-2009.aspx
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Being Digitally Literate MeansBeing Digitally Literate MeansBeing Digitally Literate MeansBeing Digitally Literate Means
• Learning the Basics– Browsers, search engines, email
• Evaluating Online Resources– How to determine the accuracy of information– How to determine the trustworthiness and security of
online vendors
Martin Luther King, Jr. A True Historical Examination
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
RememberRemember
Not everything on the Internet is true.
Consult various sources to determine the validity of information on the Internet.
Use a checklist with things to look for to prove the authenticity of a site’s information.
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Let’s Try It!Let’s Try It!
Evaluating Online Resources Handout
• The Pacific Northwest Tree Octopus http://zapatopi.net/treeoctopus/sightings.html
• Save the Mountain Walrus http://www.hmssurprise.org/Miscellany/walrus.php
• Genochoice http://www.genochoice.com/
• Sellafield Zoohttp://www.brookview.karoo.net/Sellafield_Zoo/
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
RememberRememberRememberRemember
Being Digitally Literate Means• Learning the Basics
– Browsers, search engines, email
• Evaluating Online Resources– How to determine the accuracy of information– How to determine the trustworthiness and security
of online vendors
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Digital EtiquetteDigital Etiquettestandards of conduct expected by standards of conduct expected by other digital technology usersother digital technology users
• Few rules• Inappropriate
use seems OK
• Employers WILL check Facebook, MySpace Used with permission, 2009
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Digital EtiquetteDigital Etiquettestandards of conduct expected by standards of conduct expected by other digital technology usersother digital technology users
• Issues to consider– Minimize negative effects
on others• Cell phone/PDA etiquette
– Use technology when contextually appropriate
• Netiquette
– Respecting others online• Cyberbullying, flaming, etc.
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
The Megan Meier Story
http://www.youtube.com/watch?v=6MxxqcH_Mkc
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Digital EtiquetteDigital Etiquettestandards of conduct expected by standards of conduct expected by other digital technology usersother digital technology users
Good digital citizens respect others and learn ways to use technologies courteously and effectively
How’s YOUR How’s YOUR moral compass?moral compass?
http://www.digitalcitizenship.net/uploads/ISTECompass.pdf
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Just CuriousJust CuriousJust CuriousJust Curious
You’re walking down the street and
listening to your iPod when you run into someone you
know.
Do you need to remove both earbuds Do you need to remove both earbuds
to talk to them?to talk to them?
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Ms. Shannon, the Principal for Valley Adult Ed is expecting an important call from her sister out west.
However, she needs to attend the Opening General Session of a conference she is attending.
Ms. ShannonMs. ShannonMs. ShannonMs. Shannon
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
She entered the ballroom and began to talk to several friends and colleagues. She forgot about the impending phone call.
During the keynote presentation, her cell phone rang, loudly. Everyone began looking in her direction as she struggled to find her phone. Because she was flustered, she began the conversation before she exited the room.
What Happened…What Happened…What Happened…What Happened…
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
She put her phone on vibrate and entered the ballroom. During the keynote presentation, her cell phone vibrated and she quietly got up and left the room to answer the call.
That’s being a Good Digital Citizen!
What She Should Have DoneWhat She Should Have DoneWhat She Should Have DoneWhat She Should Have Done
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Digital EtiquetteDigital EtiquetteDigital EtiquetteDigital Etiquette
Handout
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Digital EtiquetteDigital Etiquettestandards of conduct expected by standards of conduct expected by other digital technology usersother digital technology users
Remember
• Issues to consider– Minimize negative effects on others
• Cell phone/PDA etiquette
– Use technology when contextually appropriate• Netiquette
– Respecting others online• Cyberbullying, flaming, etc.
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Digital LawDigital Lawthe legal rights and restrictions the legal rights and restrictions governing technology usegoverning technology use
Digital LawDigital Lawthe legal rights and restrictions the legal rights and restrictions governing technology usegoverning technology use
You overhear Jack, one of your students talking to Sarah, another student, about the new Dave Matthews CD that he picked up over the weekend.
Sarah replies, “Boy, I wanted to get that one too, but my paycheck was just enough to cover bills this week.”
Jack says to her, “Don’t worry, I’ll just burn you a copy tonight, free!”
While the copyright for these cartoons by Jerry King belong to From Now On, readers may distribute freely provided they reproduce the credit with a link to Jerry's Web site http://www.jerryking.com/ and to From Now On http://fno.org.
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Digital LawDigital Lawthe legal rights and restrictions the legal rights and restrictions governing technology usegoverning technology use
Digital LawDigital Lawthe legal rights and restrictions the legal rights and restrictions governing technology usegoverning technology use
• Pirating software/music• File-sharing sites• Hacking• Identity theft• Copyright
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
• Identity Theft
• Pirating Software
• Copyright
Google This Baby… Google This Baby… 2 Things Everyone Should Know about…2 Things Everyone Should Know about…
Google This Baby… Google This Baby… 2 Things Everyone Should Know about…2 Things Everyone Should Know about…
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Digital LawDigital Lawthe legal rights and restrictions the legal rights and restrictions governing technology usegoverning technology use
Digital LawDigital Lawthe legal rights and restrictions the legal rights and restrictions governing technology usegoverning technology use
http://tinyurl.com/idfaceoff
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Digital LawDigital Lawthe legal rights and restrictions the legal rights and restrictions governing technology usegoverning technology use
Digital LawDigital Lawthe legal rights and restrictions the legal rights and restrictions governing technology usegoverning technology use
Remember
• Pirating software/music• File-sharing sites• Hacking• Identity theft• Copyright
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Digital Rights and ResponsibilitiesDigital Rights and Responsibilitiesthe privileges and freedoms extended to the privileges and freedoms extended to all digital technology users, and the all digital technology users, and the behavioral expectations that come with behavioral expectations that come with themthem
Digital Rights and ResponsibilitiesDigital Rights and Responsibilitiesthe privileges and freedoms extended to the privileges and freedoms extended to all digital technology users, and the all digital technology users, and the behavioral expectations that come with behavioral expectations that come with themthem
• Rules exist!– Any golfers?
• Water• Hazard• Mulligans
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Digital Rights and ResponsibilitiesDigital Rights and Responsibilitiesthe privileges and freedoms extended to the privileges and freedoms extended to all digital technology users, and the all digital technology users, and the behavioral expectations that come with behavioral expectations that come with themthem
Digital Rights and ResponsibilitiesDigital Rights and Responsibilitiesthe privileges and freedoms extended to the privileges and freedoms extended to all digital technology users, and the all digital technology users, and the behavioral expectations that come with behavioral expectations that come with themthem
• Issues to consider– Posting online
• Poems, songs, photos• Is my stuff safe from someone passing it off as their own?• Purchasing Rights to a Copyrighted Song
http://www.harryfox.com/public/songfile.jsp• http://www.halldavidson.net/copyright_chart.pdf
– Use online material ethically (cite sources)– Reporting Cyberbullying, – Using Technology to cheat
www.turnitin.com– Creative Commons
www.creativecommons.org (from “All rights reserved” to “Some rights reserved”)
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
How Much Do You Know About How Much Do You Know About Plagiarism?Plagiarism?
How Much Do You Know About How Much Do You Know About Plagiarism?Plagiarism?
Handout
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
It’s up to you!It’s up to you!It’s up to you!It’s up to you!
• How will your school handle inappropriate behavior?
• Do students have a clear understanding of what behaviors are expected?
• Do you have a Technology Ethics guide?
While the copyright for these cartoons by Jerry King belong to From Now On, readers may distribute freely provided they reproduce the credit with a link to Jerry's Web site http://www.jerryking.com/ and to From Now On http://fno.org.
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Betty’s StoryBetty’s Story
Betty loves to play games on her computer. She’s constantly downloading games and found a solitaire card game on the Internet that is “shareware.”
It can be legally used for 30 days and then Betty must either delete it from her computer or send its author a fee. Betty has been using the game for 30 days.
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
What HappenedWhat Happened
After the 30 day trial period, Betty decided that she really liked the game and believed that she’ll just see how much longer the software will run without timing out.
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
What She Should Have DoneWhat She Should Have Done
Betty realized that her 30 days were up and decided to purchase the game. She sent a PayPal payment to the creator.
Two weeks later the creator of the game sent her a link to the newest, upgraded version, with more bells and whistles. Whoo hoo!
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Digital Health and WellnessDigital Health and Wellnessthe elements of physical well-being the elements of physical well-being related to digital technology userelated to digital technology use
Digital Health and WellnessDigital Health and Wellnessthe elements of physical well-being the elements of physical well-being related to digital technology userelated to digital technology use
Ergonomics
• How is your computer situated on your desk? Do you share a computer?
• Have you experienced pain in your wrists, neck?
• Do you have eye strain?
Ergo Checklist and Rulers
•Online Affairs •Online Gambling
•Online Gaming •Compulsive Surfing •eBay Addiction
Addictions
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Digital Health and WellnessDigital Health and Wellnessthe elements of physical well-being the elements of physical well-being related to digital technology userelated to digital technology use
Digital Health and WellnessDigital Health and Wellnessthe elements of physical well-being the elements of physical well-being related to digital technology userelated to digital technology use
http://tinyurl.com/internetaddictiontest
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Digital SecurityDigital Securitythe precautions that all technology users the precautions that all technology users must take to guarantee their personal must take to guarantee their personal safety and the security of their networksafety and the security of their network
Digital SecurityDigital Securitythe precautions that all technology users the precautions that all technology users must take to guarantee their personal must take to guarantee their personal safety and the security of their networksafety and the security of their network
Get Safe Onlinehttp://www.getsafeonline.org/
Quiz
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Digital SecurityDigital Securitythe precautions that all technology users the precautions that all technology users must take to guarantee their personal must take to guarantee their personal safety and the security of their networksafety and the security of their network
Digital SecurityDigital Securitythe precautions that all technology users the precautions that all technology users must take to guarantee their personal must take to guarantee their personal safety and the security of their networksafety and the security of their network
Ms. Perlman gets an e-mail message from someone she does not know. She opens the e-mail message which has an attachment with it.
The attachment is entitled “dancing pigs.” She has had a stressful day and feels that she could use a good laugh. The attachment “dancing pigs” might be funny.
Ms. PerlmanMs. Perlman
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
What Happened…What Happened…
Ms. Perlman opened the e-mail. When she did, her computer started doing crazy things and within a period of five minutes, the computer crashed.
Ms. Perlman immediately ran to the school technology coordinator to tell her that something was wrong with her computer.
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
What She Should Have DoneWhat She Should Have Done
Ms. Perlman should have opened the e-mail and realized that she didn’t know the sender. She remembered that she had been advised to not open e-mail attachments from strangers.
Even though the attachment title sounded interesting, she deleted the message without opening the attachment. She continued checking e-mail.
Use common sense and good judgmentUse common sense and good judgment..
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
– Breaches occur not because of bad equipment, but because of the way students are using it.
– Virus protection– Spyware– Backing up
How do your students protect How do your students protect their data?their data?
http://tinyurl.com/spywaregame
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
At the very LEASTAt the very LEASTAt the very LEASTAt the very LEAST
Protect electronic data• Virus protection
– http://www.avast.com/eng/avast_4_home.html
– http://free.avg.com/us-en/homepage
– http://vil.nai.com/vil/hoaxes.aspx
– http://vil.nai.com/vil/default.aspx
– http://www.symantec.com/norton/security_response/threatmeter.jsp
• Backup• http://www.skydrive.live.com/• https://www.sugarsync.com/signup?startsub=2
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Bringing it all together Where do we begin?
Core GoalsCore GoalsImproving learning and outcomes and preparingImproving learning and outcomes and preparing
Students to become 21’st century citizensStudents to become 21’st century citizens
Student Life Outside the School EnvironmentStudent Life Outside the School EnvironmentDigital Commerce | Digital Health & Wellness | Digital LawDigital Commerce | Digital Health & Wellness | Digital LawStudent Life Outside the School EnvironmentStudent Life Outside the School EnvironmentDigital Commerce | Digital Health & Wellness | Digital LawDigital Commerce | Digital Health & Wellness | Digital LawStudent Life Outside the School EnvironmentStudent Life Outside the School EnvironmentDigital Commerce | Digital Health & Wellness | Digital LawDigital Commerce | Digital Health & Wellness | Digital Law
Core GoalsCore GoalsImproving learning and outcomes and preparingImproving learning and outcomes and preparing
Students to become 21’st century citizensStudents to become 21’st century citizens
Core GoalsCore GoalsImproving learning and outcomes and preparingImproving learning and outcomes and preparing
Students to become 21’st century citizensStudents to become 21’st century citizens
Core GoalsCore GoalsImproving learning and outcomes and preparingImproving learning and outcomes and preparing
Students to become 21’st century citizensStudents to become 21’st century citizens
Core GoalsCore GoalsImproving learning and outcomes and preparingImproving learning and outcomes and preparing
Students to become 21’st century citizensStudents to become 21’st century citizens
School Environment and Student BehaviorSchool Environment and Student BehaviorDigital Etiquette | Digital Rights and Responsibilities | Digital SecurityDigital Etiquette | Digital Rights and Responsibilities | Digital Security
Student Life Outside the School EnvironmentStudent Life Outside the School EnvironmentDigital Commerce | Digital Health & Wellness | Digital LawDigital Commerce | Digital Health & Wellness | Digital Law
Student Learning and Academic PerformanceStudent Learning and Academic Performance(Digital Access | Digital Communication | Digital Literacy)(Digital Access | Digital Communication | Digital Literacy)
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
What’s NextWhat’s Next ??What’s NextWhat’s Next ??
• YOU are in the position to set a tone for appropriate technology use– Let’s find out where
you’re at right now– Digital Citizenship
Audit
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
What’s NextWhat’s Next ??What’s NextWhat’s Next ??
SCORES
• 40-50 Use of technology is high/inappropriate use could also be high
• 30-39 Use of technology is moderate to high. Increased use there is above average technology misuse too
• 20-29 Middle of the Road– School/District not using technology a lot– OR educators unaware of issues related to DC
• 10-19 Low Amount of Inappropriate Use– School/District not using technology– OR Digital Citizenship problems are minimal
Access | Commerce | Communication | Literacy | Etiquette | Law | Rights and Responsibilities | Health and Wellness | Security
Go Forth!Go Forth!
– Educate your staff, teachers and students about the Nine Elements
– Consider putting together a Technology Leadership Team (include community members, adult students, support staff)
– Make use of resources in your packet
Are YOUYOU a Digital Citizen?
Florida TechNet
Debra L Hargrove, Ed.D.,Director
Kimberly GatesFayne JohnsonJoan Luebbe
Jana Whitehead
Copyright for the cartoons by Jerry King belong to From Now On, readers may distribute freely provided they reproduce the credit with a link to Jerry's Web site http://www.jerryking.com/ and to From Now On http://fno.org.
An Introduction to the Nine Elements
Most of the scenarios were adapted fromhttp://www.slideshare.net/katisearcy as well as Digital Citizenship in Schools, by Mike Ribble and Gerald Bailey. Used with permission
BrainPop Videos and Handouts used with permission.