Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Are  YOU  a Digital Citizen? Copyright for the cartoons by Jerry King belong to  From Now On , readers may distribute free...
A Vision of Students Today http://www.youtube.com/watch?v=dGCJ46vyR9o
Quick Definitions  (circa 1970’s) Backup What you need to do when you run into a tree  Byte What those darn flies do Cache...
Are you a Native or Immigrant? <ul><li>Digital Native   </li></ul><ul><ul><li>a person who has grown up with digital techn...
Formal and Informal Groups <ul><li>We started interacting technologically with each other since the early 1990’s  </li></u...
Are there specific rules for behaving in a digital world? <ul><li>Introduce the concept of Digital Citizenship (DC) </li><...
Why  (Digital)  Citizenship? <ul><li>Citizenship  is membership in a political community (originally a city or town but no...
Adopting the DC Philosophy <ul><li>A way to approach the challenges facing all technology users </li></ul><ul><li>A good s...
What would you do? <ul><li>You’ve finally been able to escape to the beach for the weekend. You found the perfect spot… no...
Be thinking… <ul><li>Do I see  similar issues  in my classroom or school? </li></ul><ul><li>If not, could they  BE  an iss...
Getting in the Mindset Who will YOU be? http://www.youtube.com/watch?v=MX0aycyAAJA
Digital Access    full electronic participation in society <ul><li>Technology allows opportunities for large numbers of pe...
Digital Access    full electronic participation in society From “News & Trends”  Technology & Learning , 28(10), p.16
Digital Access Scenario <ul><li>The students in your GED class have been given the task of watching a 20-minute Discovery ...
What the Teacher said… <ul><li>The students have been told that they will receive a “zero” if they do not watch the movie ...
<ul><li>The teacher gives the assignment that all students are to view the movie and take the quiz.  For students who do n...
Let’s think about it! Other possible alternatives to watching the online video Library Ipod Smart Phone Friend’s  What else?
What could make a difference <ul><li>When giving online assignments for students to complete outside of school, it is impo...
Digital Commerce Buying and selling of goods online <ul><li>Most difficult element to address </li></ul><ul><li>Generation...
Digital Commerce Buying and selling of goods online
What Makes a Website Safe? <ul><li>Padlock </li></ul><ul><li>HTTPS </li></ul><ul><li>Physical Address and Contact Phone </...
Melissa <ul><li>Melissa, who recently celebrated her 19 th  birthday, received an $1000 check from her rich grandmother. S...
What happened… <ul><li>Excitedly, Melissa took our her debit card and bid on the item.  She had watched her father do this...
What Do You Think About That?
What She SHOULD Have Done <ul><li>Melissa realized that a new Wii could not possibly sell for $10.00.  She looked at other...
What could make a difference <ul><li>Melissa would do well to go to a store that sells retail Nintendo products such as th...
An Online Auction
Don’t Forget What Makes a Website Safe <ul><li>Padlock </li></ul><ul><li>HTTPS </li></ul><ul><li>Physical Address and Cont...
Digital Communication the electronic exchange of information Texting  Handout
Digital Communication the electronic exchange of information <ul><li>How many ways can we share information? </li></ul><ul...
Digital Communication the electronic exchange of information <ul><li>The Couch Potato Generation (8-18) </li></ul><ul><ul>...
Scenario <ul><li>Adult learners at a local school were terrified earlier in the school year when they learned there was an...
What Happened… <ul><li>The students set their “interesting” ring tones on loud rather than setting the phone to vibrate or...
<ul><li>The Adult Ed Teacher should have discussed with the students the cell phone issue.  She should explain that while ...
What could make a difference <ul><li>All of these students actually have a mini-computer in their possession.  How could y...
Digital Literacy the capability to use digital technology and knowing when and how to use it. <ul><li>Technology-fused lea...
Digital Literacy the capability to use digital technology and knowing when and how to use it. <ul><li>Generational Differe...
Being Digitally Literate Means <ul><li>Learning the Basics </li></ul><ul><ul><li>Browsers, search engines, email </li></ul...
Remember <ul><li>Not everything on the Internet is true.  </li></ul><ul><li>Consult various sources to  determine the vali...
Let’s Try It! <ul><li>Evaluating Online Resources   Handout </li></ul><ul><li>The Pacific Northwest Tree Octopus  http://z...
Remember <ul><li>Being Digitally Literate Means </li></ul><ul><li>Learning the Basics </li></ul><ul><ul><li>Browsers, sear...
Digital Etiquette standards of conduct expected by other digital technology users <ul><li>Few rules </li></ul><ul><li>Inap...
Digital Etiquette standards of conduct expected by other digital technology users <ul><li>Issues to consider </li></ul><ul...
The Megan Meier Story http://www.youtube.com/watch?v=6MxxqcH_Mkc
Digital Etiquette standards of conduct expected by other digital technology users <ul><li>Good digital citizens respect ot...
Just Curious <ul><li>You’re walking down the street and listening to your iPod when you run into someone you know.  </li><...
<ul><li>Ms. Shannon, the Principal for Valley Adult Ed is expecting an important call from her sister out west.  </li></ul...
<ul><li>She entered the ballroom and began to talk to several friends and colleagues. She forgot about the impending phone...
<ul><li>She put her phone on vibrate and entered the ballroom. During the keynote presentation, her cell phone vibrated an...
Digital Etiquette Handou t
Digital Etiquette standards of conduct expected by other digital technology users <ul><li>Remember </li></ul><ul><li>Issue...
Digital Law the legal rights and restrictions governing technology use You overhear Jack, one of your students talking to ...
Digital Law the legal rights and restrictions governing technology use <ul><li>Pirating software/music </li></ul><ul><li>F...
<ul><li>Identity Theft </li></ul><ul><li>Pirating Software </li></ul><ul><li>Copyright </li></ul>Google This Baby…  2 Thin...
Digital Law the legal rights and restrictions governing technology use http://tinyurl.com/idfaceoff
Digital Law the legal rights and restrictions governing technology use <ul><li>Remember </li></ul><ul><li>Pirating softwar...
Digital Rights and Responsibilities the privileges and freedoms extended to all digital technology users, and the behavior...
Digital Rights and Responsibilities the privileges and freedoms extended to all digital technology users, and the behavior...
How Much Do You Know About Plagiarism? Handout
It’s up to you! <ul><li>How will your school handle inappropriate behavior? </li></ul><ul><li>Do students have a clear und...
Betty’s Story <ul><li>  Betty loves to play games on her computer. She’s constantly downloading games and found a solitair...
What Happened <ul><li>  After the 30 day trial period, Betty decided that she really liked the game and believed that she’...
What She Should Have Done <ul><li>  Betty realized that her 30 days were up and decided to purchase the game. She sent a P...
Digital Health and Wellness the elements of physical well-being related to digital technology use <ul><ul><li>Ergonomics <...
Digital Health and Wellness the elements of physical well-being related to digital technology use http://tinyurl.com/inter...
Digital Security the precautions that all technology users must take to guarantee their personal safety and the security o...
Digital Security the precautions that all technology users must take to guarantee their personal safety and the security o...
What Happened… <ul><ul><li>Ms. Perlman opened the e-mail.  When she did, her computer started doing crazy things and withi...
What She Should Have Done <ul><li>Ms. Perlman should have opened the e-mail and realized that she didn’t know the sender. ...
How do your students protect  their data? <ul><ul><li>Breaches occur not because of bad equipment, but because of the way ...
At the very LEAST <ul><li>Protect electronic data </li></ul><ul><li>Virus protection </li></ul><ul><ul><li>http://www.avas...
Bringing it all together   Where do we begin? Core Goals Improving learning and outcomes and preparing Students to become ...
What’s Next ? <ul><li>YOU  are in the position to set a tone for appropriate technology use </li></ul><ul><ul><li>Let’s fi...
What’s Next ? <ul><ul><ul><li>SCORES </li></ul></ul></ul><ul><ul><ul><li>40-50  Use of technology is high/inappropriate us...
Go Forth! <ul><ul><li>Educate your staff, teachers and students about the Nine Elements </li></ul></ul><ul><ul><li>Conside...
Are  YOU  a Digital Citizen? Florida TechNet Debra L Hargrove, Ed.D.,Director Kimberly Gates Fayne Johnson Joan Luebbe Jan...
Upcoming SlideShare
Loading in …5
×
Upcoming SlideShare
DIGITAL LITERACY Steps to Becoming a Digital Citizen
Next
Download to read offline and view in fullscreen.

5

Share

Download to read offline

Digital Citizenship: Responsible Behavior in a Digital World

Download to read offline

Related Books

Free with a 30 day trial from Scribd

See all

Digital Citizenship: Responsible Behavior in a Digital World

  1. 1. Are YOU a Digital Citizen? Copyright for the cartoons by Jerry King belong to From Now On , readers may distribute freely provided they reproduce the credit with a link to Jerry's Web site http://www.jerryking.com/ and to From Now On http://fno.org. An Introduction to the Nine Elements Florida TechNet Debra L Hargrove, Ed.D.,Director Kimberly Gates Fayne Johnson Joan Luebbe Jana Whitehead Most of the scenarios were adapted from http://www.slideshare.net/katisearcy as well as Digital Citizenship in Schools , by Mike Ribble and Gerald Bailey. Used with permission
  2. 2. A Vision of Students Today http://www.youtube.com/watch?v=dGCJ46vyR9o
  3. 3. Quick Definitions (circa 1970’s) Backup What you need to do when you run into a tree Byte What those darn flies do Cache What you need to buy groceries Crash When you go to a party uninvited Hacker Uncle Buddy after 40 years of smoking Modem What you did when the grass and weeds got too tall
  4. 4. Are you a Native or Immigrant? <ul><li>Digital Native </li></ul><ul><ul><li>a person who has grown up with digital technology such as computers, the Internet, mobile phones and MP3. </li></ul></ul><ul><li>Digital Immigrant </li></ul><ul><ul><li>an individual who grew up without digital technology and adopted it later. </li></ul></ul>http://tinyurl.com/digitalimmigrant
  5. 5. Formal and Informal Groups <ul><li>We started interacting technologically with each other since the early 1990’s </li></ul><ul><li>Created our own digital society </li></ul><ul><ul><li>Comes with assumptions that we all behave an accepted way </li></ul></ul><ul><ul><li>Not everyone does </li></ul></ul><ul><li>We must prepare our students to live in a world without boundaries </li></ul><ul><li>Help them work with others virtually or otherwise! </li></ul>Follow the rules!
  6. 6. Are there specific rules for behaving in a digital world? <ul><li>Introduce the concept of Digital Citizenship (DC) </li></ul><ul><li>Explain the Nine Elements of Digital Citizenship </li></ul><ul><li>Provide resources for teaching and implementing a DC program in your school </li></ul>
  7. 7. Why (Digital) Citizenship? <ul><li>Citizenship is membership in a political community (originally a city or town but now usually a country) and carries with it rights to political participation; a person having such membership is a citizen . </li></ul><ul><li>Citizenship status often implies some responsibilities ... </li></ul><ul><li>cit·i·zen·ship   ˈsɪtəzənˌʃɪp, -sən- - Show Spelled Pronunciation [ sit - uh -z uh n-ship, -s uh n-] Pronunciation Key - Show IPA Pronunciation </li></ul><ul><li>– noun </li></ul><ul><li>1.the state of being vested with the rights, privileges, and duties of a citizen. </li></ul><ul><li>2.the character of an individual viewed as a member of society; behavior in terms of the duties, obligations, and functions of a citizen: an award for good citizenship. [Origin: 1605–15; citizen + -ship] </li></ul><ul><li>Dictionary.com Unabridged (v 1.1) Based on the Random House Unabridged Dictionary, © Random House, Inc. 2006. </li></ul><ul><li>http://en.wikipedia.org/wiki/Citizen </li></ul>
  8. 8. Adopting the DC Philosophy <ul><li>A way to approach the challenges facing all technology users </li></ul><ul><li>A good starting point for both Natives and Immigrants </li></ul><ul><li>The first step in helping our students (and ourselves) become good digital citizens </li></ul><ul><li>Acceptable Use Policies Aren’t Enough! </li></ul>
  9. 9. What would you do? <ul><li>You’ve finally been able to escape to the beach for the weekend. You found the perfect spot… no children, no pets, no people. </li></ul><ul><li>All of a sudden, a person shows up and starts talking loudly on their cell phone. </li></ul><ul><li>Is it OK to talk on your cell phone in public? </li></ul>While the copyright for these cartoons by Jerry King belong to From Now On, readers may distribute freely provided they reproduce the credit with a link to Jerry's Web site http://www.jerryking.com/ and to From Now On http://fno.org.
  10. 10. Be thinking… <ul><li>Do I see similar issues in my classroom or school? </li></ul><ul><li>If not, could they BE an issue in the next year or two? </li></ul>
  11. 11. Getting in the Mindset Who will YOU be? http://www.youtube.com/watch?v=MX0aycyAAJA
  12. 12. Digital Access full electronic participation in society <ul><li>Technology allows opportunities for large numbers of people to communicate quickly </li></ul><ul><li>Not everyone has access </li></ul>SES Physical Location Disabilities The haves and have nots Low income schools Rural schools Meeting ADA?
  13. 13. Digital Access full electronic participation in society From “News & Trends” Technology & Learning , 28(10), p.16
  14. 14. Digital Access Scenario <ul><li>The students in your GED class have been given the task of watching a 20-minute Discovery Education streaming movie outside of regular class time. </li></ul><ul><li>They have one week in which they are to watch the online movie and take the online quiz. </li></ul>
  15. 15. What the Teacher said… <ul><li>The students have been told that they will receive a “zero” if they do not watch the movie and take the quiz at home, even though some students do not have Internet access, and some students who do have Internet access, have a dial-up connection. </li></ul>
  16. 16. <ul><li>The teacher gives the assignment that all students are to view the movie and take the quiz. For students who do not have the appropriate Internet connections at home, he/she offers the opportunity for them to </li></ul><ul><li>come to the classroom 30 minutes before school starts, or </li></ul><ul><li>come to the classroom after school, or </li></ul><ul><li>take home a CD with the movie and a printed quiz so they may complete the assignment . </li></ul>What SHOULD have happened?
  17. 17. Let’s think about it! Other possible alternatives to watching the online video Library Ipod Smart Phone Friend’s What else?
  18. 18. What could make a difference <ul><li>When giving online assignments for students to complete outside of school, it is important to remember that they may not have access to the Internet. </li></ul><ul><li>For some this may be an ongoing situation and for others it may be a temporary non-access issue. </li></ul><ul><li>Since the Internet is a valuable resource, teachers need to provide alternative ways for the students to access the information in order to complete assignments. </li></ul>
  19. 19. Digital Commerce Buying and selling of goods online <ul><li>Most difficult element to address </li></ul><ul><li>Generation Y (8-24 yr olds) spent $196 Billion/year </li></ul><ul><li>Do they really know </li></ul><ul><ul><li>All sides of the transaction process </li></ul></ul><ul><ul><li>Internet scams </li></ul></ul><ul><ul><li>Identity theft </li></ul></ul><ul><ul><li>Source: Shop.org 2006 </li></ul></ul>
  20. 20. Digital Commerce Buying and selling of goods online
  21. 21. What Makes a Website Safe? <ul><li>Padlock </li></ul><ul><li>HTTPS </li></ul><ul><li>Physical Address and Contact Phone </li></ul><ul><li>Privacy and Return Policies </li></ul><ul><li>Being cautious when buying overseas </li></ul><ul><li>http://www.lib.berkeley.edu/TeachingLib/Guides/Internet/Evaluate.html </li></ul>
  22. 22. Melissa <ul><li>Melissa, who recently celebrated her 19 th birthday, received an $1000 check from her rich grandmother. She deposited the check in her bank account for which she has a debit card. </li></ul><ul><li>Melissa’s home internet connection is temporarily down, so she rode with her older sister to the local public library to use the computer there. </li></ul><ul><li>While on the eBay site, she saw that they have just what she wants – a brand new Wii for only $10.00! </li></ul>
  23. 23. What happened… <ul><li>Excitedly, Melissa took our her debit card and bid on the item. She had watched her father do this before and knows just what to do. </li></ul><ul><li>She wanted to make sure she is the highest bidder so she quickly entered her debit card information and selected $300 as her maximum bid. </li></ul><ul><li>She didn’t log off as she left the library computer. </li></ul>
  24. 24. What Do You Think About That?
  25. 25. What She SHOULD Have Done <ul><li>Melissa realized that a new Wii could not possibly sell for $10.00. She looked at other Wii’s that were listed on eBay and saw that the winning bids have averaged around $275. </li></ul><ul><li>She really wants the Wii but is uncomfortable putting her debit card information online to purchase something for which she is unsure of the final price. </li></ul><ul><li>She logs off the library computer and goes home. </li></ul>
  26. 26. What could make a difference <ul><li>Melissa would do well to go to a store that sells retail Nintendo products such as the Wii. She will know the exact price of the new product she is purchasing plus she will have a receipt in order to return it if it does not work properly. </li></ul><ul><li>Her parents and teachers would do well to advise her to be careful where she uses her debit card as that card is the “key” to her checking account funds. </li></ul>
  27. 27. An Online Auction
  28. 28. Don’t Forget What Makes a Website Safe <ul><li>Padlock </li></ul><ul><li>HTTPS </li></ul><ul><li>Physical Address and Contact Phone </li></ul><ul><li>Privacy and Return Policies </li></ul><ul><li>Being cautious when buying overseas </li></ul><ul><li>http://www.lib.berkeley.edu/TeachingLib/Guides/Internet/Evaluate.html </li></ul>
  29. 29. Digital Communication the electronic exchange of information Texting Handout
  30. 30. Digital Communication the electronic exchange of information <ul><li>How many ways can we share information? </li></ul><ul><ul><li>Cell phones </li></ul></ul><ul><ul><li>Text messaging (IM’ing) </li></ul></ul><ul><ul><li>Video conferencing </li></ul></ul><ul><ul><li>Email video </li></ul></ul><ul><ul><li>Chat rooms </li></ul></ul><ul><ul><li>Fax </li></ul></ul><ul><ul><li>Blog </li></ul></ul><ul><ul><li>Wiki </li></ul></ul><ul><ul><li>-Social Networks </li></ul></ul>How can you use some of the tools listed in your classroom? What positive outcomes do they enable?
  31. 31. Digital Communication the electronic exchange of information <ul><li>The Couch Potato Generation (8-18) </li></ul><ul><ul><li>Watch TV – 270 min </li></ul></ul><ul><ul><li>Text messaging – 90 min </li></ul></ul><ul><ul><li>Video games – 73 min </li></ul></ul><ul><ul><li>Nonschool computer use – 89 min </li></ul></ul><ul><ul><li>Listen to music – 151 min </li></ul></ul><ul><ul><li>Talk on cell phone – 33 min </li></ul></ul><ul><ul><li>Using phones, computers, TVs and video game systems 7.5 hrs/day! </li></ul></ul><ul><ul><li>Source: Kaiser Family Foundation (Time article February 1, 2010) </li></ul></ul>
  32. 32. Scenario <ul><li>Adult learners at a local school were terrified earlier in the school year when they learned there was an armed intruder on their campus. </li></ul><ul><li>Since that incident, almost all of the students at the school now bring cell phones to school in order to be able to contact family in case of any future emergency. </li></ul>
  33. 33. What Happened… <ul><li>The students set their “interesting” ring tones on loud rather than setting the phone to vibrate or turning it off. Whenever possible, they took the phones out and used them to text messages to their classmates in and out of class. </li></ul><ul><li>One student also took unflattering photos of their Adult Ed teacher behind her back and sent them to classmates as well. </li></ul>
  34. 34. <ul><li>The Adult Ed Teacher should have discussed with the students the cell phone issue. She should explain that while she understands their wishes to have their phones with them, they should only to be used for classroom exercises or emergency purposes. </li></ul>What She Should Have Done
  35. 35. What could make a difference <ul><li>All of these students actually have a mini-computer in their possession. How could you use the cell phones as technology tools? </li></ul><ul><li>Students could text grammar exercises to her. </li></ul><ul><li>Students could use the video options to record each other rehearsing presentations and then review the videos to critique themselves. </li></ul><ul><li>Students could use the calculator functions while studying math </li></ul><ul><li>Students could take photos for lessons and projects. </li></ul>
  36. 36. Digital Literacy the capability to use digital technology and knowing when and how to use it. <ul><li>Technology-fused learning has become more commonplace </li></ul><ul><li>Learning WITH doesn’t always include Learning HOW </li></ul><ul><li>Technology seen as a CLASS as opposed as part of curriculum. </li></ul><ul><li>Teachers need to know how to use technology to stimulate learning . </li></ul>While the copyright for these cartoons by Jerry King belong to From Now On, readers may distribute freely provided they reproduce the credit with a link to Jerry's Web site http://www.jerryking.com/ and to From Now On http://fno.org.
  37. 37. Digital Literacy the capability to use digital technology and knowing when and how to use it. <ul><li>Generational Differences in </li></ul><ul><li>Online Activities ( Report ) </li></ul><ul><li>Teens and Gen Y: Play games, watch videos, Download Music, Social Networking </li></ul><ul><li>Gen X: Buy something, get health info </li></ul><ul><li>All groups (less differences): use email, use search engines, make travel reservations, research products </li></ul>http://www.pewinternet.org/Reports/2009/Generations-Online-in-2009.aspx
  38. 38. Being Digitally Literate Means <ul><li>Learning the Basics </li></ul><ul><ul><li>Browsers, search engines, email </li></ul></ul><ul><li>Evaluating Online Resources </li></ul><ul><ul><li>How to determine the accuracy of information </li></ul></ul><ul><ul><li>How to determine the trustworthiness and security of online vendors </li></ul></ul><ul><ul><li>Martin Luther King, Jr. A True Historical Examination </li></ul></ul>
  39. 39. Remember <ul><li>Not everything on the Internet is true. </li></ul><ul><li>Consult various sources to determine the validity of information on the Internet. </li></ul><ul><li>Use a checklist with things to look for to prove the authenticity of a site’s information. </li></ul>
  40. 40. Let’s Try It! <ul><li>Evaluating Online Resources Handout </li></ul><ul><li>The Pacific Northwest Tree Octopus http://zapatopi.net/treeoctopus/sightings.html </li></ul><ul><li>Save the Mountain Walrus http://www.hmssurprise.org/Miscellany/walrus.php </li></ul><ul><li>Genochoice http://www.genochoice.com/ </li></ul><ul><li>Sellafield Zoo http://www.brookview.karoo.net/Sellafield_Zoo/ </li></ul>
  41. 41. Remember <ul><li>Being Digitally Literate Means </li></ul><ul><li>Learning the Basics </li></ul><ul><ul><li>Browsers, search engines, email </li></ul></ul><ul><li>Evaluating Online Resources </li></ul><ul><ul><li>How to determine the accuracy of information </li></ul></ul><ul><ul><li>How to determine the trustworthiness and security of online vendors </li></ul></ul>
  42. 42. Digital Etiquette standards of conduct expected by other digital technology users <ul><li>Few rules </li></ul><ul><li>Inappropriate use seems OK </li></ul><ul><li>Employers WILL check Facebook, MySpace </li></ul>Used with permission, 2009
  43. 43. Digital Etiquette standards of conduct expected by other digital technology users <ul><li>Issues to consider </li></ul><ul><ul><li>Minimize negative effects on others </li></ul></ul><ul><ul><ul><li>Cell phone/PDA etiquette </li></ul></ul></ul><ul><ul><li>Use technology when contextually appropriate </li></ul></ul><ul><ul><ul><li>Netiquette </li></ul></ul></ul><ul><ul><li>Respecting others online </li></ul></ul><ul><ul><ul><li>Cyberbullying, flaming, etc. </li></ul></ul></ul>
  44. 44. The Megan Meier Story http://www.youtube.com/watch?v=6MxxqcH_Mkc
  45. 45. Digital Etiquette standards of conduct expected by other digital technology users <ul><li>Good digital citizens respect others and learn ways to use technologies courteously and effectively </li></ul>How’s YOUR moral compass? http://www.digitalcitizenship.net/uploads/ISTECompass.pdf
  46. 46. Just Curious <ul><li>You’re walking down the street and listening to your iPod when you run into someone you know. </li></ul>Do you need to remove both earbuds to talk to them?
  47. 47. <ul><li>Ms. Shannon, the Principal for Valley Adult Ed is expecting an important call from her sister out west. </li></ul><ul><li>However, she needs to attend the Opening General Session of a conference she is attending. </li></ul>Ms. Shannon
  48. 48. <ul><li>She entered the ballroom and began to talk to several friends and colleagues. She forgot about the impending phone call. </li></ul><ul><li>During the keynote presentation, her cell phone rang, loudly. Everyone began looking in her direction as she struggled to find her phone. Because she was flustered, she began the conversation before she exited the room . </li></ul>What Happened…
  49. 49. <ul><li>She put her phone on vibrate and entered the ballroom. During the keynote presentation, her cell phone vibrated and she quietly got up and left the room to answer the call. </li></ul><ul><li>That’s being a Good Digital Citizen! </li></ul>What She Should Have Done
  50. 50. Digital Etiquette Handou t
  51. 51. Digital Etiquette standards of conduct expected by other digital technology users <ul><li>Remember </li></ul><ul><li>Issues to consider </li></ul><ul><ul><li>Minimize negative effects on others </li></ul></ul><ul><ul><ul><li>Cell phone/PDA etiquette </li></ul></ul></ul><ul><ul><li>Use technology when contextually appropriate </li></ul></ul><ul><ul><ul><li>Netiquette </li></ul></ul></ul><ul><ul><li>Respecting others online </li></ul></ul><ul><ul><ul><li>Cyberbullying, flaming, etc. </li></ul></ul></ul>
  52. 52. Digital Law the legal rights and restrictions governing technology use You overhear Jack, one of your students talking to Sarah, another student, about the new Dave Matthews CD that he picked up over the weekend. Sarah replies, “Boy, I wanted to get that one too, but my paycheck was just enough to cover bills this week.” Jack says to her, “Don’t worry, I’ll just burn you a copy tonight, free!” While the copyright for these cartoons by Jerry King belong to From Now On, readers may distribute freely provided they reproduce the credit with a link to Jerry's Web site http://www.jerryking.com/ and to From Now On http://fno.org.
  53. 53. Digital Law the legal rights and restrictions governing technology use <ul><li>Pirating software/music </li></ul><ul><li>File-sharing sites </li></ul><ul><li>Hacking </li></ul><ul><li>Identity theft </li></ul><ul><li>Copyright </li></ul>
  54. 54. <ul><li>Identity Theft </li></ul><ul><li>Pirating Software </li></ul><ul><li>Copyright </li></ul>Google This Baby… 2 Things Everyone Should Know about…
  55. 55. Digital Law the legal rights and restrictions governing technology use http://tinyurl.com/idfaceoff
  56. 56. Digital Law the legal rights and restrictions governing technology use <ul><li>Remember </li></ul><ul><li>Pirating software/music </li></ul><ul><li>File-sharing sites </li></ul><ul><li>Hacking </li></ul><ul><li>Identity theft </li></ul><ul><li>Copyright </li></ul>
  57. 57. Digital Rights and Responsibilities the privileges and freedoms extended to all digital technology users, and the behavioral expectations that come with them <ul><li>Rules exist! </li></ul><ul><ul><li>Any golfers? </li></ul></ul><ul><ul><ul><li>Water </li></ul></ul></ul><ul><ul><ul><li>Hazard </li></ul></ul></ul><ul><ul><ul><li>Mulligans </li></ul></ul></ul>
  58. 58. Digital Rights and Responsibilities the privileges and freedoms extended to all digital technology users, and the behavioral expectations that come with them <ul><li>Issues to consider </li></ul><ul><ul><li>Posting online </li></ul></ul><ul><ul><ul><li>Poems, songs, photos </li></ul></ul></ul><ul><ul><ul><li>Is my stuff safe from someone passing it off as their own? </li></ul></ul></ul><ul><ul><ul><li>Purchasing Rights to a Copyrighted Song http://www.harryfox.com/public/songfile.jsp </li></ul></ul></ul><ul><ul><ul><li>http://www.halldavidson.net/copyright_chart.pdf </li></ul></ul></ul><ul><ul><li>Use online material ethically (cite sources) </li></ul></ul><ul><ul><li>Reporting Cyberbullying, </li></ul></ul><ul><ul><li>Using Technology to cheat </li></ul></ul><ul><ul><ul><li>www.turnitin.com </li></ul></ul></ul><ul><ul><li>Creative Commons www.creativecommons.org (from “All rights reserved” to “Some rights reserved”) </li></ul></ul>
  59. 59. How Much Do You Know About Plagiarism? Handout
  60. 60. It’s up to you! <ul><li>How will your school handle inappropriate behavior? </li></ul><ul><li>Do students have a clear understanding of what behaviors are expected? </li></ul><ul><li>Do you have a Technology Ethics guide? </li></ul>While the copyright for these cartoons by Jerry King belong to From Now On, readers may distribute freely provided they reproduce the credit with a link to Jerry's Web site http://www.jerryking.com/ and to From Now On http://fno.org.
  61. 61. Betty’s Story <ul><li> Betty loves to play games on her computer. She’s constantly downloading games and found a solitaire card game on the Internet that is “shareware.” </li></ul><ul><li>It can be legally used for 30 days and then Betty must either delete it from her computer or send its author a fee. Betty has been using the game for 30 days. </li></ul>
  62. 62. What Happened <ul><li> After the 30 day trial period, Betty decided that she really liked the game and believed that she’ll just see how much longer the software will run without timing out. </li></ul>
  63. 63. What She Should Have Done <ul><li> Betty realized that her 30 days were up and decided to purchase the game. She sent a PayPal payment to the creator. </li></ul><ul><li>Two weeks later the creator of the game sent her a link to the newest, upgraded version, with more bells and whistles. Whoo hoo! </li></ul>
  64. 64. Digital Health and Wellness the elements of physical well-being related to digital technology use <ul><ul><li>Ergonomics </li></ul></ul><ul><ul><ul><li>How is your computer situated on your desk? Do you share a computer? </li></ul></ul></ul><ul><ul><ul><li>Have you experienced pain in your wrists, neck? </li></ul></ul></ul><ul><ul><ul><li>Do you have eye strain? </li></ul></ul></ul>Ergo Checklist and Rulers <ul><li>Online Affairs </li></ul><ul><li>Online Gambling </li></ul><ul><li>Online Gaming </li></ul><ul><li>Compulsive Surfing </li></ul><ul><li>eBay Addiction </li></ul>Addictions
  65. 65. Digital Health and Wellness the elements of physical well-being related to digital technology use http://tinyurl.com/internetaddictiontest
  66. 66. Digital Security the precautions that all technology users must take to guarantee their personal safety and the security of their network Get Safe Online http://www.getsafeonline.org/ Quiz
  67. 67. Digital Security the precautions that all technology users must take to guarantee their personal safety and the security of their network Ms. Perlman gets an e-mail message from someone she does not know. She opens the e-mail message which has an attachment with it. The attachment is entitled “dancing pigs.” She has had a stressful day and feels that she could use a good laugh. The attachment “dancing pigs” might be funny. Ms. Perlman
  68. 68. What Happened… <ul><ul><li>Ms. Perlman opened the e-mail. When she did, her computer started doing crazy things and within a period of five minutes, the computer crashed. </li></ul></ul><ul><ul><li>Ms. Perlman immediately ran to the school technology coordinator to tell her that something was wrong with her computer. </li></ul></ul>
  69. 69. What She Should Have Done <ul><li>Ms. Perlman should have opened the e-mail and realized that she didn’t know the sender. She remembered that she had been advised to not open e-mail attachments from strangers. Even though the attachment title sounded interesting, she deleted the message without opening the attachment. She continued checking e-mail. </li></ul>Use common sense and good judgment .
  70. 70. How do your students protect their data? <ul><ul><li>Breaches occur not because of bad equipment, but because of the way students are using it. </li></ul></ul><ul><ul><li>Virus protection </li></ul></ul><ul><ul><li>Spyware </li></ul></ul><ul><ul><li>Backing up </li></ul></ul>http://tinyurl.com/spywaregame
  71. 71. At the very LEAST <ul><li>Protect electronic data </li></ul><ul><li>Virus protection </li></ul><ul><ul><li>http://www.avast.com/eng/avast_4_home.html </li></ul></ul><ul><ul><li>http://free.avg.com/us-en/homepage </li></ul></ul><ul><ul><li>http://vil.nai.com/vil/hoaxes.aspx </li></ul></ul><ul><ul><li>http://vil.nai.com/vil/default.aspx </li></ul></ul><ul><ul><li>http://www.symantec.com/norton/ security_response/threatmeter.jsp </li></ul></ul><ul><li>Backup </li></ul><ul><ul><ul><li>http://www.skydrive.live.com/ </li></ul></ul></ul><ul><ul><ul><li>https://www.sugarsync.com/signup?startsub=2 </li></ul></ul></ul>
  72. 72. Bringing it all together Where do we begin? Core Goals Improving learning and outcomes and preparing Students to become 21’st century citizens Student Life Outside the School Environment Digital Commerce | Digital Health & Wellness | Digital Law Student Life Outside the School Environment Digital Commerce | Digital Health & Wellness | Digital Law Student Life Outside the School Environment Digital Commerce | Digital Health & Wellness | Digital Law Core Goals Improving learning and outcomes and preparing Students to become 21’st century citizens Core Goals Improving learning and outcomes and preparing Students to become 21’st century citizens Core Goals Improving learning and outcomes and preparing Students to become 21’st century citizens Core Goals Improving learning and outcomes and preparing Students to become 21’st century citizens School Environment and Student Behavior Digital Etiquette | Digital Rights and Responsibilities | Digital Security Student Life Outside the School Environment Digital Commerce | Digital Health & Wellness | Digital Law Student Learning and Academic Performance (Digital Access | Digital Communication | Digital Literacy)
  73. 73. What’s Next ? <ul><li>YOU are in the position to set a tone for appropriate technology use </li></ul><ul><ul><li>Let’s find out where you’re at right now </li></ul></ul><ul><ul><li>Digital Citizenship Audit </li></ul></ul>
  74. 74. What’s Next ? <ul><ul><ul><li>SCORES </li></ul></ul></ul><ul><ul><ul><li>40-50 Use of technology is high/inappropriate use could also be high </li></ul></ul></ul><ul><ul><ul><li>30-39 Use of technology is moderate to high. Increased use there is above average technology misuse too </li></ul></ul></ul><ul><ul><ul><li>20-29 Middle of the Road </li></ul></ul></ul><ul><ul><ul><ul><li>School/District not using technology a lot </li></ul></ul></ul></ul><ul><ul><ul><ul><li>OR educators unaware of issues related to DC </li></ul></ul></ul></ul><ul><ul><ul><li>10-19 Low Amount of Inappropriate Use </li></ul></ul></ul><ul><ul><ul><ul><li>School/District not using technology </li></ul></ul></ul></ul><ul><ul><ul><ul><li>OR Digital Citizenship problems are minimal </li></ul></ul></ul></ul>
  75. 75. Go Forth! <ul><ul><li>Educate your staff, teachers and students about the Nine Elements </li></ul></ul><ul><ul><li>Consider putting together a Technology Leadership Team (include community members, adult students, support staff) </li></ul></ul><ul><ul><li>Make use of resources in your packet </li></ul></ul>
  76. 76. Are YOU a Digital Citizen? Florida TechNet Debra L Hargrove, Ed.D.,Director Kimberly Gates Fayne Johnson Joan Luebbe Jana Whitehead Copyright for the cartoons by Jerry King belong to From Now On , readers may distribute freely provided they reproduce the credit with a link to Jerry's Web site http://www.jerryking.com/ and to From Now On http://fno.org. An Introduction to the Nine Elements Most of the scenarios were adapted from http://www.slideshare.net/katisearcy as well as Digital Citizenship in Schools , by Mike Ribble and Gerald Bailey. Used with permission BrainPop Videos and Handouts used with permission.
  • Marilina63

    Jul. 3, 2020
  • FadehanGideonA

    Apr. 23, 2013
  • nogginquest

    Apr. 7, 2012
  • lg.cole

    Aug. 3, 2010
  • jspeavler

    May. 18, 2010

Views

Total views

7,139

On Slideshare

0

From embeds

0

Number of embeds

3,242

Actions

Downloads

120

Shares

0

Comments

0

Likes

5

×