laptop usage / cybersafety seminar wednesday 23 may 2012

37
Laptop Usage / Cybersafety Seminar Wednesday 23 May 2012

Upload: melva

Post on 24-Feb-2016

36 views

Category:

Documents


0 download

DESCRIPTION

Laptop Usage / Cybersafety Seminar Wednesday 23 May 2012. Outline. Introduction Using technology Technology in education Kureosity How staff use Kureosity How students use Kureosity How parents can use Kureosity Use of ICT in the classroom Cybersafety Tips for parents Q and A. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

Laptop Usage / Cybersafety Seminar

Wednesday 23 May 2012

Page 2: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

OutlineIntroduction- Using technology- Technology in education

Kureosity- How staff use Kureosity- How students use Kureosity- How parents can use Kureosity

Use of ICT in the classroom

Cybersafety

Tips for parents

Q and A

Page 3: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

Introduction

Facebook now has over 900 million users

Twitter has over 140 million users

2009 – 10-18 years of age spending more time online than watching television

95% of teens are online every day

3.9 million teens are online via their phone (This figure is from June 2011 – it is changing rapidly!)

90% of 12-17 year olds use social media

http://www.youtube.com/watch?v=Y4MnpzG5Sqc Kony 2012

Page 4: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

Digital natives

This generation of students are often referred to as ‘digital natives’ – they have never known a world without the technologies that exist today.

Digital citizen

Generation i

Efforts by adults to keep up mean that we have even developed glossaries to try and track the online vernacular:

http://www.cyberbullying.org/

Page 5: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

A new vocabulary…

Page 6: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

A new vocabulary…

Page 7: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

New games replacing the old

i

Page 8: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

Concerns regarding online interactions

i

Wall Street Journal (@WSJ)5/22/12 4:40 AMMore than a third of divorce filings last year contained the word "Facebook." sm.wsj.com/KXmGKi Via @SmartMoney

Page 9: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

Media debate regarding technology

i

Page 10: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

Concerns from which generation?

i

Page 11: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

Digital reputation

i

Page 12: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

Social networking• Social networking means that students now share information more

willingly and in more detail than ever before.

• Sharing beyond immediate friendship group

• Sharing information beyond what we consider to be a sensible and responsible norm

Headspace survey:75% of young people use the internet to connect39% of young people use the internet to look up information

(Interestingly, in terms of advice and support, young people go to: friends, parents, relatives/other adults, internet… teachers, counsellors.)

Page 13: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

Computers at St Paul’sA laptop school since 1996

For Year 7s in 2012, we have moved to a leasing scheme- Reduced cost for parents- Uniformity for IT department

The School realised quite early, that information and communication technology was going to play an ever increasing role in almost all aspects of our lives. The decision was taken at an early stage to equip our students with the tools that would allow them to independently research and present information and (later) to interact using these technologies. The technology has changed enormously over the years, but the intent remains to provide the tools for learning to each child in the secondary school as cost effectively as possible. – Mr Robert Jacob

Page 14: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

Technology – fear or foster?According to Rachel Botsman, social innovator and researcher, there are four key phases of technology:

1. Information sharing (internet, wikipedia, blogs)2. Connecting or re-connecting with people (Myspace, facebook)3. Co-production, sharing and exchanging (youtube, twitter, flickr)4. (Now…) Applying and sharing behaviours that are entering other

parts of our lives

Botsman: “People are now saying: ‘Isn’t this a Gen Y thing? Isn’t this creating a generation gap? Isn’t this turning us into disconnected cyber borks?’ No. It’s doing the opposite!”

Botsman: Technology is taking us back to old market behaviours, moving from a ‘cultural me’ to a ‘cultural we’.

Page 15: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

St Paul’s approach to technology• Technology is not something to be feared but an asset to be

embraced and utilised.

• Values provide the cornerstone for using technology effectively and responsibly. Software or legislation (government level or via school rules) will not solve key issues.

• Susan McLean – “Respect + Responsibility”

• Encouraging positive communication

• Highlighting the importance of developing a positive digital reputation

Page 16: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

St Paul’s approach to technology- Proxy site users are checked regularly

- If an incident online affects members of our community, then we will investigate

- If a student presents a hard copy of an online discussion, then we will investigate

Page 17: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

KureosityWhat is Kureosity and how do we use it

effectively to promote student teaching and learning?

Page 18: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

School Intranet

Page 19: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

History of Kureosity

What is MOODLE?

Moodle is a web application that educators can use to create effective online learning sites. Moodle has been developed by teachers for teacher and student interaction. Moodle is also known as the following:

• Course Management System (CMS),• Learning Management System (LMS) • Virtual Learning Environment (VLE)

Why use the MOODLE platform?

Both student and adult educational institutions utilize MOODLE for the delivery of their course and to actively engage students in and out of the classroom

Page 20: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

History of Kureosity

Modular

Object

Oriented

Dynamic

Learning

Environment

Knowledge

Understand

Respect

Encourage

OSITY

“Because curiosity is essential for learning, creative thinking and understanding all the wonderful things there are to know.”

Naming Competition 2009

Page 21: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

Teachers create course information

Students access course information

Kureosity also allows interaction between student and teacher inside and outside the classroom

Parents can access some areas of Kureosity without a username and password

Kureosity also allows interaction between students

Students can save their work - backup system

Page 22: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

How to locate Kureosity

Page 24: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

Teachers create course information

Students access course information

Kureosity also allows interaction between student and teacher inside and outside the classroom

Parents can access some areas of Kureosity without a username and password

Kureosity also allows interaction between students

MAHARA ePortfolio

Students can save their work - backup system

Page 25: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

“Mahara is a fully featured electronic portfolio, weblog, resume builder and social networking system, connecting users and creating online communities. Mahara provides you with the tools to set up a personal learning and development environment.“

Mahara

Page 26: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

ICT in the classroom

- Advantages and potential of digital technologies

- Information accessible

- Impact on student material

Page 27: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

ICT in the classroom

Page 28: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

CybersafetyRisks include:• Cyberbullying• Promotion of harmful behaviours• Advertisements for adult products• Exposing young people to inappropriate materialBenefits:• Deliver educational outcomes• Facilitate supportive relationships• Enable identity formation• Promote a sense of belonging and self esteem

Donna Cross (USA), cited by Dr Jane Burns, CEO Young and Well Co-operative Research Centre – www.yawcrc.com.au

Page 29: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

Risk v Reward“A large part of this generation’s social and emotional formation and development is occurring while on the internet and on mobile phones. Research further identifies the limited capacity young people have for self-regulation, making them vulnerable to peer pressure and increasing personal risk as they navigate and experiment with social media.”

- Dr Paul Rumble, University of the Sunshine Coast

“Growing up Digital: the rise of the net generation” – Don Tapscott

Rather than technology stupefying, they might be the smartest generation yet

Page 30: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

Cyberbullying85% of bullying online is witnessed by people who can – but choose not to – intervene

• Cyberbullying victims and aggressors know in each other in ‘real life’ in most cases

• Anonymous – lack of empathy without face to face interaction• Most cyberbullying happens outside of school• The speed of the proliferation of images is frightening• The ‘audience’ is the entire internet, or world on the wide web• Students are reluctant to report cyberbullying because they have

learnt that if it is not handled well by a teacher then the situation becomes worse.

• Ibid: because parents usually react by simply removing the technology.

Page 31: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

Cyberbullies – why do they do it?

• A sense of entitlement

• All of them want their 15 megabytes of fame

• Because they can

• Thrill of anonymity, freedom

• They are looking for their ‘space’

• The ‘heat is on traditional forms of bullying’ ie schools

have taken huge steps to address these areas

• Lack of inhibition - Bill Belsey

Page 32: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

Advice for parents - media

Page 33: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

Advice for parents• Parents need to be engaged and educated• Students (victims) can be given scenarios and scripts that have been

used with ‘traditional’ bullying adapted to suit online situations.• Be reasonable• Be open – establish a level of trust• Online activity to be in an open area• Try to get them to share their pages/blogs/accounts – to show you

some things they are doing• Parents should consider having a facebook page so they understand

how it works• Students should be reminded about the information on their page

and how

Page 34: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

Advice for parents• Students should be reminded that sexting is classified as the

dissemination of child pornography• Parents need to model good behaviour (by the way they use their

phone/blackberry/computer)• Secure wireless networks• Computers in shared spaces

Let kids know they ARE responsible for their online behaviour towards others

Page 35: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

Advice for parents''The kind of public life we see online has never existed before,'' Dr Boyd told Fairfax Media ahead of her lecture at RMIT on Thursday. ''But it's a myth that teens don't care about privacy. It's really impressive what teens do to find new ways to be private in public.''

Parents who want to help their children navigate an online social minefield need to educate and communicate, not berate, restrict or panic, Dr Boyd said. ''The way forward is to have open conversations, to really have a dialogue of trust … if you engage in surveillance and break that trust, you'll teach them not to talk to you.''

Page 36: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

Summary• We ARE responsible for our behaviour• Online is a privilege, not a right• We are not anonymous, we leave a digital footprint• Real world effects from online actions• Responsibility• Teach kids to think before they click• What is said cannot be taken back• Laws and filters will only be marginally effective• Trust and empower kids• Effective solutions are considered and implemented in context• Lead through trust and teaching, not fear, banning and legislation• Model appropriate behaviour• No quick fixes“Cyberbullying is about people and relationships, not technology.”

- Bill Belsey (NCAB Conference, 2010)

Page 37: Laptop Usage /  Cybersafety  Seminar Wednesday 23 May 2012

WebsitesWebsiteswww.www.yawcrc.org.auhttp://www.ncab.org.au/http://www.amf.org.au/www.reachout.com.auwww.healthinsite.gov.au/topics/bullyingwww.cyberbullying.ca (Canada)www.bullying.org (Canada)

Easy read: Destroying Avalon – Kate McAffrey