Digital Citizenship

7,587 views

Published on

Scenarios depicting the nine themes of digital citizenship

Published in: Education, Technology
2 Comments
13 Likes
Statistics
Notes
No Downloads
Views
Total views
7,587
On SlideShare
0
From Embeds
0
Number of Embeds
474
Actions
Shares
0
Downloads
172
Comments
2
Likes
13
Embeds 0
No embeds

No notes for slide

Digital Citizenship

  1. 1. DIGITAL CITIZENSHIP A Professional Learning Presentation by Kati Searcy
  2. 2. 3
  3. 3. 2
  4. 4. 1
  5. 5. PICTURE START
  6. 6. What is digital citizenship? <ul><li>In a nutshell…. </li></ul><ul><li>It is the proper and correct actions that should be taken by those using digital technology… </li></ul>
  7. 7. Nine Elements of Digital Citizenship according to Ribble and Bailey <ul><li>Digital Access </li></ul><ul><li>Digital Commerce </li></ul><ul><li>Digital Communication </li></ul><ul><li>Digital Literacy </li></ul><ul><li>Digital Etiquette </li></ul><ul><li>Digital Law </li></ul><ul><li>Digital Rights and Responsibilities </li></ul><ul><li>Digital Health and Wellness </li></ul><ul><li>Digital Security </li></ul>
  8. 8. Digital Access <ul><li>Full electronic participation in society </li></ul>
  9. 9. Scenario <ul><li>The students in a fifth grade science class have been given the task of watching a 20-minute Discovery Education streaming movie for homework. They have one week in which they are to watch the on-line movie and take the on-line quiz. </li></ul>
  10. 10. Inappropriate <ul><li>The students have been told that they will receive a “zero” if they do not watch the movie and take the quiz at home, even though some students do not have Internet access, and some students who do have Internet access, have a dial-up connection. </li></ul>
  11. 11. Appropriate <ul><li>The teacher gives the assignment that all students are to view the movie and take the quiz. For students who do not have the appropriate Internet connections at home, he offers the opportunity for them to </li></ul><ul><li>1) come to his classroom 30 minutes before school starts, or </li></ul><ul><li>2) come to his classroom after school, or </li></ul><ul><li>3) take home a CD with the movie and a printed quiz so they may complete the assignment. </li></ul>
  12. 12. What could make a difference <ul><li>When giving on-line assignments for students to complete outside of school, it is important to remember that they may not have access to the Internet. For some this may be an on-going situation and for others it may be a temporary non-access issue. Since the Internet is a valuable resource, teachers need to provide alternative ways for the students to access the information in order to complete assignments. </li></ul>
  13. 13. Digital Commerce <ul><li>The buying and selling of goods online </li></ul>
  14. 14. Scenario <ul><li>Melissa, who recently celebrated her 15 th birthday, received an $1000 check from her rich grandmother. She deposited the check in her bank account for which she has a debit card. </li></ul><ul><li>Melissa’s home internet connection is temporarily down, so she rides with her older sister to the local public library to use the computer there. While on the eBay site, she sees that they have just what she wants – a brand new Wii for only $10.00! </li></ul>
  15. 15. Inappropriate <ul><li>Excitedly, Melissa takes our her debit card and bids on the item. She has watched her father do this before and knows just what to do. She wants to make sure she is the highest bidder so she quickly enters her debit card information and selects $300 as her maximum bid. She doesn’t log off as she leaves the library computer. </li></ul>
  16. 16. Appropriate <ul><li>Melissa realizes that a new Wii could not possibly sell for $10.00. She looks at other Wii’s that are listed on eBay and sees that the winning bids have averaged around $275. She really wants the Wii but is uncomfortable putting her debit card information online to purchase something for which she is unsure of the final price. She logs off the library computer and goes home. </li></ul>
  17. 17. What could make a difference <ul><li>Melissa would do well to go to a store that sells retail Nintendo products such as the Wii. She will know the exact price of the new product she is purchasing plus she will have a receipt in order to return it if it does not work properly. </li></ul><ul><li>Her parents and teachers would do well to advise her to be careful where she uses her debit card as that card is the “key” to her checking account funds. </li></ul>
  18. 18. Digital Communication <ul><li>The electronic exchange of information </li></ul>
  19. 19. Scenario <ul><li>Parents of students in Ms. Parker’s sixth grade class were terrified earlier in the school year when they learned there was an armed intruder at the middle school. </li></ul><ul><li>Since that incident, almost all of the students in the sixth grade, at the direction of their parents, now bring cell phones to school in order to be able to contact parents in case of any future emergency. </li></ul>
  20. 20. Inappropriate <ul><li>The students are delighted to finally have their own cell phones. They set their “interesting” ring tones on loud rather than setting the phone to vibrate or turning it off. Whenever possible, they take the phones out and use them to text messages to their classmates in and out of Mrs. Parker’s class. They also take unflattering photos of Mrs. Parker behind her back and send them to classmates as well. </li></ul>
  21. 21. Appropriate <ul><li>Mrs. Parker discusses with the students the cell phone issue. While she understands their parents’ wishes that they have a phone, she reminds them that they are only to be used for emergency purposes and that they will be confiscated if they are out of backpacks or if the ring tone is audible. She also tells them that her principal has requested that all teachers follow the same rules with their own cell phones. </li></ul>
  22. 22. What could make a difference <ul><li>All of these students actually have a mini-computer in their possession. Imagine how things would change if Mrs. Parker started using the cell phones as classroom technology tools. </li></ul><ul><li>Students could text their grammar sentences to her. </li></ul><ul><li>Students could use the video options to record each other rehearsing speeches and then review the videos to critique themselves. </li></ul><ul><li>Students could use the calculator functions during the math period. </li></ul><ul><li>Students could make photo documentation of science experiments. </li></ul>
  23. 23. Digital Literacy <ul><li>The capability to use digital technology and knowing when and how to use it. </li></ul>
  24. 24. Scenario <ul><li>The students in Ms. Rubin’s class have been assigned to do a report on an endangered species. Ellen does a Google search for endangered species and comes across an article on the “ Pacific Northwest Tree Octopus .” She has never heard of this animal and is excited to learn about it. Based on this one website , she chooses her research topic. </li></ul>
  25. 25. Inappropriate <ul><li>Ellen takes notes about the Pacific Northwest Tree Octopus from this one website. She does not look for any other sources to confirm the information that she has found. She is so excited about this endangered animal, that she starts her own campaign to educate others about this animal and to raise funds to save the Pacific Northwest Tree Octopus. </li></ul>
  26. 26. Appropriate <ul><li>Ms. Rubin would do well to instruct her students as to the fact that everything on the Internet is not true. Students should learn to consult various sources to determine the validity of information they obtain on the Internet. Students could use a checklist with things to look for to prove the authenticity of a site’s information. </li></ul>
  27. 27. What could make a difference <ul><li>Before beginning a research unit, the teacher should actually lead a lesson where students are sent to bogus web sites and asked to report back on their findings. This would then lead to the discussion as to how one knows whether or not a digital source is reliable. The Pacific Northwest Tree Octopus , Save the Mountain Walrus , GenoChoice , and The Sellafield Zoo can help students develop their critical thinking abilities to discriminate between real and bogus on-line information. </li></ul>
  28. 28. Digital Etiquette <ul><li>The standards of conduct expected by other digital technology users </li></ul>
  29. 29. Scenario <ul><li>A disgruntled parent whose child did not qualify for the gifted program sends an e-mail to the gifted teacher with questions as to the ineligibility decision. After several e-mails back and forth between the teacher and the parent, the parent expresses her anger about the fact that, despite her protestations, her very bright child is not eligible by sending a final e-mail to the teacher. This final e-mail has many words in all caps and ends with “WTF.” </li></ul>
  30. 30. Inappropriate <ul><li>After the teacher finds out what the initials “WTF” stand for, she responds immediately with an angry e-mail. Her e-mail also has many words in all caps and ends with “don’t send me any more e-mails or I will have you charged with harassment.” </li></ul>
  31. 31. Appropriate <ul><li>When the second round of e-mails started, the teacher called the parent. The teacher calmly listened to the parent and tried to respond to her questions without emotion. When the parent continued, after the phone call, to send angry e-mails, the teacher notified the principal and asked her to speak with the parent about this situation. </li></ul>
  32. 32. What could make a difference <ul><li>The discussion about digital etiquette needs to occur at faculty meetings or in staff development trainings. Teachers cannot control what a parent sends in an e-mail, but they can control how they should respond. A few things to keep in mind are: 1) never respond in haste, 2) never put anything in writing that you wouldn’t say face to face, and 3) remember that anything that is put in an e-mail can be retrieved at a later date. </li></ul>
  33. 33. Digital Law <ul><li>The standards of conduct expected by other digital technology users </li></ul>
  34. 34. Scenario <ul><li>Mr. Gilbert, a 5 th grade teacher, is compiling a collection of student photos and converting them to a movie using Animoto on-line software. Although the Animoto site offers non-copyrighted music, the teacher wants the background music for the movie to be something the students will recognize. The students will not recognize any of the songs this site offers. </li></ul>
  35. 35. Inappropriate <ul><li>Mr. Gilbert’s son has a Chris Brown C.D. He decides to borrow it and download the song, “With You”, as the background music for the movie. He knows this song is very popular with the students, and knows they will enjoy the movie so much more if they can sing along with the background music. He finishes creating his movie and then uploads the movie he has made to his teacher website. </li></ul>
  36. 36. Appropriate <ul><li>Animoto is a free website for compiling photos into a movie format. Mr. Gilbert is lucky that he knows about this site. There is a disclaimer on the website that advises the users to choose either the copyright-free music on their site or any other music for which they have secured written permission to use. Mr. Gilbert heeds that advice and uses music on the Animoto site. </li></ul>
  37. 37. What could make a difference <ul><li>Perhaps there are students who play an instrument and have composed original music or can play music that is in the public domain as the background music for the movie. </li></ul><ul><li>It is important that teachers understand that copyright rules apply to them, even if they are doing things for educational purposes. There is a misconception among many educators that they can do anything with digital media as long as it is for educational purposes. </li></ul>
  38. 38. Digital Rights and Responsibilities <ul><li>The privileges and freedoms extended to all digital technology users and the behavioral expectations that come with them </li></ul>
  39. 39. Scenario <ul><li>Mrs. Walker is a fourth grade teacher who is introducing a new unit on the American Revolution to her students. She creates a beautiful PowerPoint presentation in which she has photos of famous people and places from that time period. She obtained these photos by doing a Google image search. </li></ul>
  40. 40. Inappropriate <ul><li>Mrs. Walker’s PowerPoint presentation, while “beautiful”, gives no credit to the source of her photos. She does have a slide that says “photos obtained from Google”, but she has not cited the individual sources of each photo because she doesn’t realize there is an individual source. She assumes that Google posts all of these images. </li></ul>
  41. 41. Appropriate <ul><li>Mrs. Walker’s “beautiful” PowerPoint presentation is made possible by the images she has gained from many different web sources. She acknowledges the source at the bottom of each photo that she inserts into the PowerPoint. She also makes it a point to explain this to her students. </li></ul>
  42. 42. What could make a difference <ul><li>Students will do the things their teachers model. If a teacher expects that her students will cite sources, it is imperative that she do the same thing with any and all media (print, digital, audio) that she uses in her classroom. Teachers need to be educated about search engines and how to locate images that are intended for educational use. </li></ul>
  43. 43. Digital Health and Wellness <ul><li>The privileges and freedoms extended to all digital technology users and the behavioral expectations that come with them </li></ul>
  44. 44. Scenario <ul><li>The four computers in Mrs. Anderson’s room are placed on four different tables in an “ Inspired Classroom ” arrangement. She teaches students in the first grade. She doesn’t have desks, but rather tables and adult-sized chairs in her classroom. </li></ul>
  45. 45. Inappropriate <ul><li>The young students are anxious to work on the computers. If they sit in the chairs, they have to strain their neck to look up to the computer screen. Some of the students have taken to actually sitting or kneeling on top of the table when they work on the computer. They do this so they can both see the screen and work on the keyboard and use the mouse more comfortably. </li></ul>
  46. 46. Appropriate <ul><li>The tables in the classroom have been lowered so that the students can look at the computer screen without neck strain. Remote keyboards enable the students to put the keyboards in their lap while they are typing. </li></ul>
  47. 47. What could make a difference <ul><li>It is difficult at times to get “child-size” furniture. Not only are computers themselves designed for adult hands, but tables and chairs that can accommodate computer equipment are often adult-sized as well. Wouldn’t it be great if someone developed some computer furniture designed for a young student so that there were no negative posture issues associated with computer use. </li></ul>
  48. 48. Digital Security <ul><li>The precautions that all technology users must take to guarantee their personal safety and the security of their network. </li></ul>
  49. 49. Scenario <ul><li>Ms. Perlman gets an e-mail message from someone she does not know. She opens the e-mail message which has an attachment with it. The attachment is entitled “dancing pigs.” She has had a stressful day and feels that she could use a good laugh. The attachment “dancing pigs” might be funny. </li></ul>
  50. 50. Inappropriate <ul><ul><li>Ms. Perlman opens the e-mail. When she does, her computer starts doing crazy things and within a period of five minutes, the computer has crashed. </li></ul></ul><ul><ul><li>Ms. Perlman immediately runs to the school technology coordinator to tell her that something is wrong with her computer. </li></ul></ul>
  51. 51. Appropriate <ul><li>Ms. Perlman opens the e-mail and realizes that she does not know the sender. She remembers that she has been advised to not open e-mail attachments from a stranger. Even though the attachment title sounds interesting, she deletes the message without opening the attachment. She continues checking e-mail. </li></ul>
  52. 52. What could make a difference <ul><li>Teachers need to be reminded often of digital security issues, including something as simple as opening attachments from unknown sources. Educators must be reminded that, although there are many virus detection devices and firewalls on school computers, they must still use common sense and good judgment. </li></ul>
  53. 53. Bibliography <ul><li>Ribble, M., & Bailey, G. (2007) Digital Citizenship in School. Washington, D.C. : International Society for Technology in Education. </li></ul>
  54. 54. <ul><li>Prepared by Kati Searcy, October 2008 </li></ul><ul><li>for ITED 8100, Valdosta State University </li></ul>

×