Digital Citizenship


Published on

Published in: Technology, Education
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Digital Citizenship

  1. 1. DIGITAL CITIZENSHIP Based on a presentation by Sue Loubser Director of Technology Hebrew Academy of Atlanta at the Building Learning Communities Conference 2007
  2. 2. Information <ul><li>Kids use internet more at home than at school. </li></ul><ul><li>Parents “don't get” internet safety. </li></ul><ul><li>We can only block at school. </li></ul><ul><li>They figure ways around! </li></ul><ul><li>Filtering does not teach anything, we provide no skills. </li></ul><ul><li>&quot;It is about intrinsically integrating acceptable use of all this technology into our children's psyche.&quot; </li></ul><ul><li>Character development! </li></ul>
  3. 3. Strategies <ul><li>Guidance Curriculum </li></ul><ul><li>Teacher Education:  Professional Development </li></ul><ul><li>Cyber Community </li></ul><ul><li>Personal Safety Online </li></ul><ul><li>Avoid Risky Behavior </li></ul><ul><li>Predators </li></ul><ul><li>What we need to teach… </li></ul><ul><li>Cyber Security </li></ul><ul><li>Identity Theft </li></ul><ul><li>Intellectual Property </li></ul><ul><li>Cyber Bullying </li></ul><ul><li>Parent Education </li></ul>
  4. 4. Guidance Curriculum <ul><li>Message can be value based or social skills (e.g. Boys Town Social Skills for Youth) </li></ul><ul><li>Establish ethical values. </li></ul><ul><li>We should be educating NOT schooling our students (Teach skills for life!) </li></ul><ul><li>Character traits, social skills training </li></ul><ul><li>Responsibility (parental, personal, and community) </li></ul><ul><li>Discuss behavior, use activities, role playing, books, etc. </li></ul><ul><li>Communicate with parents:  rules to help children, safety. </li></ul>
  5. 5. Teacher Education:  Professional Development <ul><li>Internet safety training required. </li></ul><ul><li>Implementation strategies </li></ul><ul><li>FREE resource for online training! </li></ul>
  6. 6. Cyber Community <ul><li>Actions, responsibilities, obligations </li></ul><ul><li>Avoid inappropriate places and actions </li></ul><ul><li>The digital world is NOT anonymous! </li></ul>
  7. 7. Personal Safety Online <ul><li>Identify and avoid danger </li></ul><ul><li>Interact safely </li></ul><ul><li>Think critically </li></ul><ul><li>React quickly to uncomfortable situations </li></ul>
  8. 8. Avoid Risky Behavior <ul><li>To be safe:  </li></ul><ul><ul><li>Use careful screen names </li></ul></ul><ul><ul><li>Minors should avoid details in profiles </li></ul></ul><ul><ul><li>Use parent's e-mail address </li></ul></ul><ul><ul><li>Physical risks (meeting online friends) </li></ul></ul><ul><ul><li>Passwords - you are responsible (don't give out passwords) </li></ul></ul><ul><ul><li>Peripheral information (20 questions DON&quot;T ANSWER!!!) </li></ul></ul>
  9. 9. Predators <ul><li>Traditional vs. Online </li></ul><ul><li>Online:  male, 30-65, successful careers, college graduate, was married or currently married, had children of their own. </li></ul><ul><li>How predators hunt:  chat rooms </li></ul><ul><li>Isolating a child (what predators do):  chat room > check profiles > who is not being answered > private chat > asks &quot;20&quot; questions (i.e. asl, brothers or sisters, where is your computer, are you alone, location?) </li></ul><ul><li>Grooming procedure is about keeping secrets, sends gifts (web cam), asks for personal photos, desensitizes child, arranges to meet, threatens if they won't meet. </li></ul>
  10. 10. What we need to teach… <ul><li>Recognize </li></ul><ul><li>Refuse </li></ul><ul><li>Respond </li></ul><ul><li>Report </li></ul>
  11. 11. Cyber Security <ul><li>Responsible maintenance </li></ul><ul><li>Check computers at home </li></ul><ul><li>Keep track of child’s online activity </li></ul><ul><li>It is NOT snooping! It is keeping children safe! </li></ul>
  12. 12. Identity Theft <ul><li>Intercepting commands, phone calls, e-mails </li></ul><ul><li>Phishing </li></ul><ul><li>Key logging </li></ul><ul><li>Firewall </li></ul><ul><li>Unsolicited e-mails </li></ul>
  13. 13. Intellectual Property <ul><li>mp3s </li></ul><ul><li>Videos </li></ul><ul><li>Stealing is stealing! </li></ul>
  14. 14. Cyber Bullying <ul><li>Tie to bullying program (social skills training) </li></ul><ul><li>Stop Bullying Now: </li></ul><ul><li>Cyber Bullying of Teachers! </li></ul><ul><li>After interent safety week or skills are taught, inform parents so they can add support. </li></ul><ul><li>Ryan Halligan Story: </li></ul>
  15. 15. Parent Education <ul><li>Same topics as kids with a stronger message. </li></ul><ul><li>Never forget! Information and resources are all around (law enforcement, community, etc.) </li></ul><ul><li>Never be afraid to check your child's internet use. </li></ul><ul><li>Never overreact! </li></ul><ul><li>Help children to protect themselves. </li></ul><ul><li>Everything digital can be manipulated (pictures change, etc.) </li></ul><ul><li>Contact: </li></ul><ul><li>Communication is key! </li></ul><ul><li>Use every learning opportunity </li></ul><ul><li>What to do:  contact e-mail provider, contact police, every message has a record of where it came from! </li></ul>
  16. 16. Summary <ul><li>Recognize </li></ul><ul><li>Refuse </li></ul><ul><li>Respond </li></ul><ul><li>Report </li></ul>