This is a presentation I did at the JISC REgional Support Centre Learning REsources Conferences. The audience was librairians in post-16 education institiutions. It includes the support that the JISC Regional support Centre can offer
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
E safety in post-16 education
1. A belt and braces approach to promoting
safe behaviours in the library
Deborah Judah
Elearning Advisor RSC YH
(HE, e-Safety and e-assessment)
2. Encouraging digital values and
responsible behaviour online
What are the issues and why
Understand e-Responsibility
Understand digital values
Explore some of the issues using scenarios
Where to go from here
3. Digital Natives?
Web 1.0 Web 2.0
– Download – Uploading
– Consume – Creating
– Corporate – collaborating
– Separate – Personalising
media – Converged media
– Static – Interactive
– Responsive:
4. What are the Issues?
Content students access & post online
Who students and staff contactand who they
allow to contact them
How students conductthemselves online.
Including: cyberbullying; sexting; pro-harm sites,
etc
How do staff conduct themselves online.
Including photos, “friends”, comments etc
Digital Identity – Now and in the future
5. Why are you worried?
1. Safeguarding is a Limiting Grade at Ofsted
2. Worried about Learners online behaviour
3. Staff skills don‟t match learner savvy
4. Already got a problem with Social Networking
5. Worried you might get sued
6. Unclear advice on risk and responsibility
7. Use of personal devices to bypass filtering
8. Your own Professional/Digital Reputation
6. eResponsibility
Enabling staff to develop skills and knowledge
Encouraging learners to become Informed Users able to
identify risks and act to protect themselves and others
Ensuring that all users are aware of and avoid potential
misuse of technology
Supporting both in identifying risks and acting to protect
themselves
Persuading users to behave responsibly online through
education, policies and sanctions
Provision of a clear procedure and confidential support
process so that users have a mechanism to report any
concerns or communications they have encountered on
line
Go to View > Header & Footer to edit November 9, 2012| slide 6
7. Digital Values
Protecting yourself and others online
Strong passwords and security awareness
Cautious sharing information – everyone‟s
Respect for yourself - protect your profile
Respect for others in online communities
Ownership – copyright and referencing
Care with web forms, txt messages and emails
Go to View > Header & Footer to edit November 9, 2012| slide 7
8. eSafety Risk Scenarios
What level of risk?
How would you know?
What action would you take?
Who would need to be involved?
What are the risks?
Are some at greater risk?
Could this scenario escalate?
9. You overhear a couple of students talking at
the enquiry desk about looking up their
teachers on Facebook and have found that
their Public Services lecturer has his privacy
setting set to public and they can see all of his
posts
(many of which are quite controversial and are
about how he doesn‟t like his job…).
You know the teacher in question very well,
as they are also your friend on Facebook.
10.
11.
12.
13.
14.
15.
16.
17. What is Your Digital Identity?
Digital Dirt
http://www.youtube.com/watch?v=bP4clzrDgy0&feature=related
18.
19. ...
The Real Facebookhttp://www.youtube.com/watch?v=2Qkc9VfDYLc
Go to View > Header & Footer to edit November 9, 2012| slide 19
20. Safeguarding and ICT
Safety issues are the same as offline
Link eResponsibility with learner code
– Making learning successful for everyone
– Play an active part in equality and diversity
– Reporting inappropriate behaviour
• Threats, racism, disrespect, disruption, damage to college.
21. Ofsted Requirements
show a clear requirement to keep learners safe
when using technology in the organisational setting
the importance of equipping learners with the skills
and knowledge to keep themselves safe whenever
and wherever they go online
How are you going to demonstrate it?
22. Key Steps In Esafety
Think eResponsibility! -Digital Skills & Values
SMT backing – across the whole organisation
Assess your current practice
Integrate eSafety into Organisational Policy
Get learners involved- induction and feedback
Clearly define roles in the reporting process
Get Advice from JISC
23. Responsibilities
Staff are expected to:
Undergo training provided
Read and accept the esafety policy and AUP
Include it in the staff handbook
Act accordingly
Report any suspicion of misuse
Help educate learners and act as role models
Pre-check sites and manage searches
Promote critical and legal awareness
24. Responsibilities
Learners are expected to:
Behave in a safe and responsible manner
Treat equipment with respect
No bullying or insulting behaviour
Use the resources for education only
Keep password secure
Act within the law and the policy
Report incidents – and know how to
25. JISC RSC „s Esafety Offer
Awareness Workshops –
– eResponsible behaviour and Digital Values
Strategic consultations on key steps
– Key Steps, Policy and procedures
Staff Development
– Sector Specific, legal and technical requirements
Help in assessing your practice
– Quick Online Overview and action planning
Double approach so that you don’t get caught with your trousers down – or unprepared
There has been a seed change in the way we use technology since web 2. We are uploading, creating and collaborating where we were downloading and consuming.. Digital Native or not ...Young people are routinely using personal devices, phones and games consoles to share their information - not just photos, GPs location – checking into Facebook and places, downloading QR codes to their phones that trigger url’s to websites or download PDF docs. Notice you can check your friends in too.If you don’t use face-book and a smart phone you are entitled to be nervous especially as you have got responsibilities in this alien world.We can’t just ignore the massive changes in our day to day lives that technology - you can’t just lock things down as before and hope for the best – a single smart phones can bypass the filtering, and anyway I’m here to encourage you to utilise the benefits of technology in teaching.
eSafety covers a wide range of issues but Content Contact and Conduct are the three that cover the issues for educationAnd should not be seen as a technical problemYoung people are technically savvy and enthusiastic but need education around the risks and threats to on and off line lifeAnd they are as much as threat to each other than the passive victimIt is all about assessing and responding to real risk
Why are we worried and what worries you?Write it on the board/chart? Not easy to say – organisational and professional risk? Write it on the cards or text it to me Try to remember which 4 you are most interested in.HOLD those numbers might want to come back to them in a minuteName and email address to get ppt.
We are talking: Establishing Digital Values, Controlling Digital Identity, Demonstrating Digital Professionalism, Disseminating Digital skillsLearners have to be taught to protect themselves and recognise the effects of their behaviour on each other. They need to learn digital values just like elsewhere in life.If we are giving staff responsibilities then we ought to give them the skills to protect the learners in their care and increasingly their own professional reputation with clear policies on the use of social media and personal devices.Organisations must assess the real risks to their own staff and learners by actually asking them ...again and again as the new technology emerges.Legal requirements and professional standards that apply must be acknowledged and must be monitored and evidenced
Passwords:Never write them down – find another way to remember them –KeePass locks all your passwords in a safe – with one passwordNever share them – it s probably a disciplinary because of data protection and invalidates financial contractsPersonal information - photos –tagging friends and auto tagging in face bookRespect for your self - Digital DirtTeenager fired for saying job was boringhttp://www.youtube.com/watch?v=bP4clzrDgy0&feature=relatedOwnership – copyright and referencing sticking to terms of use. Not doing things that are illegal.Giving away contact details and then Respect for others – The rules are the same as off line. Is cyberbullying listed in the student code..? Interfering with someone’s wellbeing and ability to study. Test that you know where the line is for appropriate behaviour online. List of quizzes and eSafety assessments to choose from to suit age and issue i.e. A Thin Line http://www.athinline.org/Cyberbullying videos, campaigns and ‘sites’ like Formspring and little gossip exist just to dish the dirt - as well as everyday facebook slanging matches. There are any number of videos aimed at fighting cyberbullying and grooming.SMOKESCREEN – based on a social networking site and authored by young people is an education for all of us.... and then there’s Stalking. I have included this video because it fits in with the idea of digital identity and has a double edged young persons perspective.
Handout Scenarios – 10 – 60 minutesCould be on screen or as a group activity – with action planning if appropriate.Add any other relevant scenarios that help to put the points across. i.e. ACL & WBL – what role does a centre manager / have in enforcing an AUP if a tutor doesn’t comply to password security?VL – Setting up an eBay account for a VL?The aim here is to get each to address their own organisations / departments risk and responsibility – you may not have the answer
Points to raise:-As you are also a friend of the teacher in question he could also be unwittingly revealing some of your personal informationIt could be worth including online behavior awareness raising into information skills sessions or add guidance to the library’s calendar of events (i.e. part of Internet safety week, for example).http://www.youtube.com/watch?v=FDeRKFi0u2g Orange’s “Digital Dirt” video is a good one to show the link between online behavior and employabilityA discreet chat with your friend is also a must!
Foursquare is a legitamate and entirely above board game currently being used extensively in commercial marketing. While it is a matter for your e-safety working group to decide whether it is safe for students to access and use it should be noted that it is probably being used on mobile devices so a ban may not be enforceable and as it is a popular marketing tool a ban may be undesirable as it could impede learning.
It’s hard to decide the balance between allowing students open access all websites to aid learning, and the duty of care to protect them from harm. You may choose to have a comprehensive information literacy programme to teach students to evaluate sites (and other sources of information) or, as an e-safety working group, you may decide that some sites are too risky to allow,You may want to think about how you approach this issue – from a blacklist (all sites are OK unless otherwise stated) or a white list (all sites are barred unless otherwise stated) approach. The white list approach must consider the impact that it could have on teaching & learning activityFrom and Information Literacy point of view, this should be embedded in as many teaching sessions as possible, along with specialist LRC sessions, to equip learners with the skills to interpret and present information from possibly unreliable sources.In terms of this particular student, there may also be a duty of care issue, which should be referred following general safeguarding policies.
People can write what they like on their facebook page, as long as it conforms to the law and facebook terms and conditions. However, it may be worth chatting to him about his open profile. Employers often check facebook profiles and having that kind of content will do him no favours at all!
This shows the difficulty in having an inflexible policy. Student / Tutor relations can be dangerous and you may choose to discourage them – but banning them is often impractical , especially as students often know teachers outside college already.
There are several issues here: Cyber Bullying / HarassmentBreach of Terms of Service (ToS)Possible distribution of an indecent imageIn terms of the bullying aspect, your policies on e-safety, bullying and maybe even social media, should be instigatedCreating false profiles is a breach of almost every social media sites terms and conditions and the profile and, if known, profile creators should be reported for breaching itA “pseudo photograph” is also a photograph in terms of the Protection of Children Act 1978 * so it is possible an offence has been committed and the college should seek legal and/or police advice on this * This is NOT to be taken as legal advice
This demonstrates the importance of havinga clear policy on what is and isn’t acceptable, even on personal accountsan understanding of what is public and what is private and how to set privacy settingsThe importance of understanding digital identity and how we balance personal and professional accounts.Note that separating the two is not always advisable and enforcing it could mean less effective social media use
Show videos
How do you appear online? What is your Digital Profile like?Run Video - Respect yourself There are lots of examples designed to put the fighteners on you but the issues are real. You’re having fun and acting on impulse today but what about tomorrow? Digital dirt A real teenager has been sacked for posting that she was bored and teachers have been sacked because of their holiday snaps online.http://www.youtube.com/watch?v=bP4clzrDgy0&feature=related
What are the consequences of giving out too much information?Show video and discuss in context of relevant risk to learners – adults, under 16’s, Vulnerable Learners, residential settings, friends and colleagueshttp://www.teachertube.com/viewVideo.php?video_id=660&title=Think_Before_You_Pos
Should behaviour online be different to off-line? Why Not? Anonymity/everyone does it/ it’s just for fun/http://www.youtube.com/watch?v=2Qkc9VfDYLc real life facebookTeenage guruz http://www.youtube.com/watch?v=zjkdavG8PnI&feature=related
Make a direct link between the code requirements and policies and say Cyberbullying
For Ofsted - It’s all about assessing risk and evidencing that you have done so through your policies, procedures and practice.Standards and Inspection https://eresponsibility.pbworks.com/w/page/34940070/Standards-and-Inspection
Think eResponsibility! In the learning and skills sector e-safety relies on responsible behavior from learners and staff. Focus on promoting digital values and how technology can support learning when used properly.Make someone in senior management responsible for e-safety and set up a group that brings together curriculum, technical and safeguardingstaff to form e-safety policy. Integrate e-safety policy into all your key organizational policies, internal quality systems and review processes to encourage whole organizational involvement.Get learners involved. Make e-responsibility part of their induction and link it to the student code. Check that they are learning and keep up with how they are using technology.Set out clearly defined reporting process,responsibilities and consequences. Aim to ensure that everyone understands what they need to do through staff training and contracts. Get advice and support from JISC Advance -JISC legal, JISC TechDis and JISC RSC offer resources and support with eSafety strategy. Your local RSC can help with assessing your current practice and the real risks to your learners and offer CPD for staff.
Must not Arrange to meet anyone over the internet or share personal details Engage in chat rooms Send forward or store inappropriate materials
Visit our JISC RSC UK website to find out more about what we offer.Contact your regional eSafety lead http://www.jiscrsc.ac.uk/esafety.aspx
JISC RSC Advisors will take you through eSafety from a stragetic perspective using a range of resources brought together into one place with added context for FE & Skills sector: JISC RSC e-Safety Resource wiki. Including sector specific advice and support from JISC legal and JISC TechDis. You can search for links to useful documents such as the JISC Legal eSafety Policy checklist (http://www.jisclegal.ac.uk/Portals/12/Documents/PDFs/esafetychecklist.pdf ) or Policy Template. You RSC advisor will help get you started.
View the JISC legal eSafety Policy ChecklistComplete the JISC Legal eSafety Templatehttp://www.jisclegal.ac.uk/ManageContent/ViewDetail/ID/1747/e-Safety-Policy-Template-28102010.aspx http://www.jisclegal.ac.uk/Portals/12/Documents/PDFs/esafetychecklist.pdf