Cyberia - Bethany P&F presentation


Published on

Published in: Education, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Great School – special place in my career journey – sister – second HSC class, prac here taught here for 11 yearsCharism of Sisters of Charity and Sisters of St Joseph - significant this is Mary Mackillop week – founder of the Josephites (Josephites: never see a need without doing something about it). When Mrs Fowler asked to come along tonight – I jumped at the chance (I think I responded in 3 minutes)Intro: Where is Cyberia? Is it familiar or foreignWhere are we as parent’s on the journey?Tonight will not be passive The use of technology and the broader learning contextopportunity to share feelings about your daughter’s use of technologyOpportunity to share where you are on the journey to CyberiaWhy the internet presents a unique parenting problemTake aways – strategies for raising kids in an online world The need to learn with your child – knowledge is powerMuch of the material I present tonight is based on research – Dr Michael Carr-Gregg has done significant work
  • Parents raising kids to be strong, resilient, with strong catholic values and ethics Fortunate position to both a parent and a teacher – see this as an opportunity to advise, guide and nuture my children and the children with whom we connect withACMA released a new report  Like, Post, Share: Young Australians’ experience of social media report at a Cybersafety Summit by Senator the Honourable Kate Lundy on FridayKey findings include:While access via a computer still predominates, children and young people are increasingly gaining access to the internet on their mobile devices: eight to 11 year-olds use more than two devices to access the internet, and teenagers use at least three devices Up to 35 per cent of eight to 11-year-olds have their own mobile phone, rising to 94 per cent of 16 to 17-year-olds.The majority of teenagers report using privacy settings on their social networking sites, with 66 per cent of 16 -17 year olds reporting their profiles are private. Younger teens are slightly less likely to have private profiles or take other steps to manage their privacy.Parents are the main source of advice and support for young people who are experiencing difficulties online.  Up to three quarters of 12 to 17-year-olds have talked to their parents about how to stay safe online.[next slide – Melbdec]
  • 2014 will see the implementation of an Australian Curriculum Stage 4 – 7 (Maths, Science, English and History)Stage 5 – 9 same subjectsHeart is a document from late 2008 – MelbdecOnline safety is very much a significant part of the ICT general capability which is written into all syllabuses for the Australian curriculum as well as being covered in Pastoral Care lessons and the PDHPE syllabus.How as educators and parents can we work in synchronicity to foster success, confidence and creativity and engagement in being a ethical global citizen. Our students will need to be confident and highly skilled users of technology as we continue to move to an information economy[next slide – fads]
  • I want to spend a bit of time talking about how society and society’s use and acceptance of technology has changed in such a short space of time - and how this is influencing the classroomTwo images – juxtaposed – What are they ofWe live in very different times Think 2005 – Pope John Paul’s death – 2 years before the iPhone was released12 March 2013 – Pope Francis made his inaugural appearance on the balcony Critical students: spoke about the two distinctly different events – one a funeral, the other an inauguration8 years some of your daughters had just commenced Kindergarten – mobile devices are now the norm
  • The ground is certainly shifting. Edudemic a popular ed tech blog posted this in late 2012 with much controversyTouch screen usurps the mouseBullying is bullying – there is no difference and increasingly we need to be taking the cyber out of itTools in google and online enables students to ethically reference sources. Ask a student the last time they open a World Book encyclopediaThe concept of a negative – will only apply to numbersMovement to mobiles – many households don’t have a landline – this will potentially continue with the NBN (use of VC)
  • Horizon report Near and Now, Medium and Long term horizon
  • What’s your understanding of the Cloud?Cloudshare – speak more about this in a moment[Click on image to Google Data centre]
  • Hands up if you have a watchStudents today would ask you why have a device which is not multi-tasking?The power and potential of mobile devices as ways to achieve efficiency
  • Kids have very quickly worked out – efficiency is KingTeaching is not about keeping our students “busy” – it’s about connections, conversations, critical and creative thinking.
  • I told you this would not be a static presentation and now I’m going to engage your kinaesthetic intelligenceWe’re going to play a game called sit down if you – special something for the last person standing at each tableSit down if you Tweeted todaySit down if you Liked something on Facebook todaySit down if you sent a text message to more than one recipient in the same message todaySit down if you had to reboot your smartphone todaySit down if you downloaded an app todaySit down if you own an Android tabletSit down if you have Google Chrome as your browser of choiceSit down if you used some in-ear headphones today Sit down if you read an eBook today (kindle, iBook etc)Sit down if you engaged in a video conference today
  • You have 12 minutes – timer starts now
  • Everything is available – in the past 5 years the digital universe has grown by 1000%. Google handles 1 billion search queries every dayAnything is possible – I can communicate with anyone – even celebritiesConnections – Young people want to feel connected to the broader societyAgency – young people want to be able to do something, they want to feel they are making a difference, what I does mattersReward – young people want a sense of reward – that through being connected and contributing to society – what they do matters
  • Nine-year-old Martha's first full entry on 8 May 2012 featured a picture of a slice of pizza and a single potato croquette, alongside some sweetcorn and a cupcake for desert.[4] Her written comment was; “The good thing about this blog is Dad understands why I am hungry when I get home. Today he made a Banana Loaf, shame I don't like bananas, see I am not perfect!”[3]On 14 June, Martha was removed from her Mathematics class, taken to the headteacher's office, and told that she could no longer take photographs of her food inside the dining hall. The decision had come down from Argyll and Bute Council, who had become cautious of negative press reaction and the effect it was having on school meals staff. Of particular concern was an article in the Daily Record newspaper, which had published a photograph of Martha alongside chef Nick Nairn under the headline "Time to fire the dinner ladies".[15][16] In response, Martha wrote an entry entitled "Goodbye", explaining the council's decision, followed by a commentary from her fatherAs of the end of 2012, Martha, through the proceeds of her book has raised  £85,000 for kids in Africa and has 6,276,800 visits to her blog and counting! she is amazing!  
  • Predators and Personal safety – Child pornographers and paedophiles find the internet provides a ready source for potential victims (Omegle example)
  • [next slide – inappropriate material]
  • Inappropriate material – The internet is full of the delights and horrors of human experience. Parents need to be around so that, if children come across such material, strategies are discussed to deal with such experiences. [next slide web giants]
  • Cyberbullying – let’s cut the cyber out – bullying is bullying Cyberbullying can be done AnonymouslyCyberbullying has no Geographical boundariesCyberbullying has a wide reaching impactCyberbullying has permanenceFinancial risks – Phishing – random emails asking for money, bank emails asking to login to a bogus system, Microsoft phonecall requesting the user to do things to their computer to allow accessAlways protect personal information to avoid identity theft – passwords and credit card numbers are easily obtainable through key loggers and software transmitted through virusesThis is what the research says – what do your kids say – survey [next slide]
  • Presented a workshop to Year 11 Students back in MayIt took 15 years from 1996 to Q3 2011, to reach 708 million smartphone devices, but it took only one year for another 300 million to come online will be young people who will access the internet solely through a smartphone
  • Highlight the data around Facebook 23 % see this as concerningNext slide – who has Facebook? – would you add a duck and a cat as a friend? [sophos study]
  • This time we created two female Australian Facebook users, Daisy Feletin(21, single) and Dinette Stonily (56, married). Each sent a friend request to100 randomly-selected contacts in their age group, and waited two weeks tosee who would respond.The results were even worse than in the London experiment of 2007. Itseems that social networkers still haven't learned to be circumspect withtheir personal information:Information Daisy Feletin Dinette StonilyFriends accepting 46% 41%Total friends gained 46 49Full d.o.b. (D/M/Y) 89% 57%Partial d.o.b. (D/M) 9% 35%Email address 100% 88%College or workplace 74% 22%Town or suburb 50% 43%Share Like 23Full address 4% 6%Phone number 7% 2 3%IM screen name 13% 18%Family and friend data 46% 31%Average no. of friends 220 932
  • Point out data about Ask FM – links from facebook
  • Askfm – there is no such thing as a ‘random’ everything is traceable
  • Your digital footprint says a lot about you-what does yours say?/
  • Digital reputation is such a critical concept for our young people to appreciate. The mistakes that many are making online are permanent and could cost them in later life – like this young gentleman in the video (we all need to be prepared to be googled)
  • Want to talk about imaging applications – Instagram and snapchat
  • 61 % of respondees use the social media application snapchat
  • Except that apparently you can't. Orem, Utah-based firm Decipher Forensics has figured out a way to recover supposedly deleted images from the recipient's phone. The process isn't simple: 24-year-old Decipher forensics examiner Richard Hickman said it takes him about six hours, on average, to image the phone's data. So far he can only do it with Android devices, though he's working on doing the same for iPhones. But his firm is now offering to perform the recovery procedure for anyone who wants it, from parents to lawyers to the police, for $US300 to $US500.Snapchat is trying to brush off the finding. "We're not really paying much attention to it," spokeswoman Mary Ritti told US News. "I mean, it's forensic software."[next slide : video scenario photos]
  • Lack on information: sometimes a disconnect with what the kids know and what we know as parents. Year 1 daughter – came home and said while watching the news, why does that person have a minecraft face. Adults have an obligation that when a device is given to a child, there are sufficient boundaries and rules in place – warnings about the dangersPortability: move to mobile device. Between now and 2015, we expect 500 million new users from emerging markets to come online, compared to only 15 million new users from the U.S. Unlike in developed countries, most of these new Internet users will experience the web for the first time on a mobile device—not on a desktop computer. Constantly changing: what was “in” a couple of years ago is now fish and chip wrappers (old expression) Omegle – now Ask FmLack of Rules: For 90% of teens, home is their primary source of internet access Rules: many of these households have no rules with regard to internet use. Danger is there
  • Parents can’t afford to be foreigners in Cyberia whilst our kidsare to negotiate this adult world.From the earliest age, make the internet a family activity – conversations about responsible online behaviourKeep the computer and mobile devices in public spaces – from 9:30pm, all devices on the Kitchen benchLearn, learn, learn…this is a unique learning opportunity where many teachers and parents know less than the kids. They become the teachers and experts – does wonders for self confidence creating a environment for life long learning. Learn as much as you can [Next slide – ACMA’s Cybersmart website]
  • High quality resource that every parent should make regular use of – fridge magnets tonight and a whole lot of brouchures for you to take with you.
  • Set clear rules for internet use – reasonable allowances for interests, curiosity – Family Internet Safety Contract [click] – have a read through this on your table – could this be implemented in your home or even the terms negotiated with your child?[next slide – sleeping issues]
  • Bedroom computer and mobile phone use results in later sleep and wake times, and less sleep. The ABC's 2010 Big Sleep Survey of more than 12,000 people, of which 11-18 year olds were best represented, found a third kept mobiles in their bedroom at night, while 15 per cent had TVs, laptops, iPads and radios. More than a quarter admitted watching TV, using the computer or mobile phone when they should have been sleeping.However, Blunden notes parental limits on media usage result in better sleep for teenagers, better relationships between parent and child, and overall improved wellbeing and satisfaction with life. More than a decade of researching and working in paediatric sleep as a clinical psychologist, at Central Queensland University's Appleton Institute in Adelaide, has convinced Blunden that society undervalues sleep and children are paying the price. In her studies she has found up to 30 per cent of children and adolescents have behavioural sleep issues, mirroring international research results.
  • Consider some parental controls – this is not spying – this is reality (surveillance). Useful tools but students could evade the
  • Security is paramount to ensure – only you and your daughters friends need to know how tioDevices on the table at nightFilter allows it, put time limits on -
  • You have 12 minutes – timer starts now
  • Cyberia - Bethany P&F presentation

    1. 1. A place of Necessity for ParentsMr Chris Morris – eLearning Adviser Bethany College P&F 5/8/2013 The Journey to CYBERIA
    2. 2. “Young people are 13% of the population, but 100% of the future” Tony Blair
    3. 3. ...just a tool Technology is....
    4. 4. 10 things students won't need to know when they graduate (source: Edudemic) 1. How to use a mouse 2. The difference between bullying and cyber-bullying 3. Knowing writing style guidelines for referencing 4. How to find basic reference materials in the library 5. Developing film, taking the perfect picture 6. Vocabulary terms "land line" and "dial" 7. Propaganda used in 30 second commercials 8. How to read a paper map 9. How to place data onto a CD/DVD 10. How to read movie listings off a newspaper
    5. 5. 42% of K-12 schools and organizations surveyed are currently implementing some form of cloud computing solution. (The NMC Horizon Report: 2013 K-12 Edition p. 12)
    6. 6. Tablets, smartphones, and mobile apps have become too capable, too ubiquitous, and too useful to ignore. (The NMC Horizon Report: 2013 K-12 Edition p. 12)
    7. 7. Sit down if you…..
    8. 8. What makes the online world so engaging ? everything is available anything is possible connections agency reward
    9. 9. What can make the online world so dangerous? Predators and personal safety Inappropriate material Cyberbullying Financial Risks Identity Theft
    10. 10. What can make the online world so dangerous? Predators and personal safety Inappropriate material Cyberbullying Financial Risks Identity Theft
    11. 11.
    12. 12. What can make the online world so dangerous? Predators and personal safety Inappropriate material Cyberbullying Financial Risks Identity Theft
    13. 13. Bethany College Year 11 Questionnaire n=104 students
    14. 14. Some Comments “Young people are just unaware of the consequences that can come out of inappropriate actions online. They can be a bit cynical and disbelieving.”
    15. 15. Why does Cyberia present a unique parenting problem? Lack of Information Portability Constantly changing Lack of rules
    16. 16. Bringing the digital family together in Cyberia Use of the Internet: a family activity Supervision - connectivity in a public space Learn as much as you can Set clear rules for internet use Parental controls
    17. 17.
    18. 18. Bringing the digital family together in Cyberia Use of the Internet: a family activity Supervision - connectivity in a public space Learn as much as you can Set clear rules for internet use Parental controls
    19. 19. Bringing the digital family together in Cyberia Use of the Internet: a family activity Supervision - connectivity in a public space Learn as much as you can Set clear rules for internet use Parental controls
    20. 20.
    21. 21.
    22. 22.
    23. 23. 4 Key online principles No personal details No meeting up in person No sharing passwords Agree on time limits and enforce them
    24. 24. Questions
    25. 25. A place of Necessity for ParentsMr Chris Morris – eLearning Adviser Bethany College P&F 5/8/2013 The Journey to CYBERIA