Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Parent engagement cvps


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Parent engagement cvps

  1. 1. Parent Engagement <ul><li>How to responsibly manage your family’s online identity </li></ul><ul><li>Cornell Village Public School </li></ul>
  2. 2. Agenda <ul><li>Computer management and security </li></ul><ul><li>Web cams </li></ul><ul><li>Social Networking </li></ul><ul><li>Online Gaming </li></ul><ul><li>Classroom Applications </li></ul><ul><li>Help your child learn with technology </li></ul>
  3. 3. Computer Management and Security What are the threats? What are the threats? <ul><li>virus: a program capable of reproducing itself and usually is capable of causing harm to files, programs or your whole computer </li></ul><ul><ul><li>includes email viruses, Trojan horses, worms </li></ul></ul><ul><li>spyware: programs that spy on what you do on your computer, and may report back certain pre-specified information to an outside source </li></ul>
  4. 4. <ul><li>Computer Management and Security What can I do? </li></ul><ul><li>What can I do? </li></ul><ul><ul><li>keep yourself protected: have current anti-virus software, firewall and operating system updates - automatically is best </li></ul></ul><ul><ul><li>hints for keeping yourself secure: </li></ul></ul>
  5. 5. <ul><li>Computer Management and Security What can I do? </li></ul><ul><li>What can I do? </li></ul><ul><li>encryption: WEP and WPA </li></ul><ul><ul><li>WEP is older, breakable by someone who really wants to </li></ul></ul><ul><ul><li>WPA is newer, not perfect; its strength depends on the passcode used </li></ul></ul><ul><li>hiding your network </li></ul><ul><li>registering your MAC addresses </li></ul>
  6. 6. <ul><li>Computer Management and Security What about webcams? </li></ul><ul><li>What about webcams? </li></ul><ul><li>Trojan Horses and other types of malware can remotely turn on your webcam or microphone without you even knowing </li></ul>
  7. 7. <ul><li>Computer Management and Security Physical placement and other considerations </li></ul><ul><li>Physical placement and other considerations </li></ul><ul><li>be aware of what your kids are doing: and </li></ul><ul><li>interact with them </li></ul><ul><li>passwords and privacy </li></ul><ul><li>file-sharing sites [torrent, etc.] </li></ul>
  8. 8. <ul><li>Social Networking A brave new world? </li></ul><ul><li>A brave new world? </li></ul>
  9. 9. Social Networking
  10. 10. Social Networking
  11. 11. Social Networking What should I be aware of? What should I be aware of? <ul><li>minimum ages, multiple sites, privacy settings </li></ul><ul><li>saving MSN chats </li></ul><ul><li>just be aware - Who is seeing it? What are the implications today, tomorrow, in ten years? [kids don’t necessarily think of this] </li></ul><ul><ul><li>the “Markville” or “Grandmother” test </li></ul></ul>
  12. 12. Online Gaming What should I be aware of? What should I be aware of? <ul><li>not just World of Warcraft and Call of Duty; many kids games too [Webkinz] </li></ul><ul><li>often a chat component </li></ul><ul><li>pressure to be in the game a lot: team expectations </li></ul><ul><li>Same as social networking: be aware </li></ul>
  13. 13. Classroom Applications What’s going on in school? What’s going on in school? <ul><li>Web 2.0 tools [wikis, blogs, Prezi, Glogster] </li></ul><ul><li>digital storytelling [MovieMaker, Photostory, iMovie, Bitstrips, Comic Life...] </li></ul><ul><li>Smart Notebook, document cameras </li></ul><ul><li>moving towards cameras, smartphones, iPods, and blogging, Twitter - when and if appropriate </li></ul>
  14. 14. Journeying Together <ul><li>Knowledge vs. wisdom: filter </li></ul><ul><li>It’s an ongoing discussion </li></ul><ul><li>Involves the child, parent, school </li></ul><ul><li>Get involved, learn beside each other </li></ul><ul><li>Ask the right questions </li></ul>
  15. 15. Journeying Together <ul><li>Why should he/she be doing this? </li></ul><ul><li>Is my child ready for this? How about me? </li></ul><ul><li>What parameters have I set up? </li></ul><ul><li>What are the implications? </li></ul><ul><li>How will we move forward? </li></ul><ul><li>What are the pros and cons? </li></ul><ul><li>What is our exit strategy? </li></ul>
  16. 16. Jason Eygenraam Computer Resource Teacher YRDSB Elementary, East 2011 2011 2011 2011 2011