Keynote presentation for Conference: Vounteering in a Digital Age Sangeet Bhullar
Sangeet Bhullar's Keynote presentation for conference: Vounteering in a Digital Age Conference held in Swansea on the 26th and 27th of September 2012. http://www.communities2point0.org.uk/volunteering-in-a-digital-age-conference
Educators are increasingly using new media and digital technologies to teach and engage their 21st century students. Reading, writing, gaming, trans-media, immersive worlds, augmented reality, and Web 3.0 are all part of the new digital frontiers. Whether it’s science or science fiction, Alice in Wonderland or Angry Birds, the dynamics of this new information ecology are transforming learning experiences in our schools. We can lead this learning revolution by ensuring that our library and the learning ecology we create can harness these new environments. How we do this, will determine our success and the future relevance and importance of our school libraries.
Keynote presentation for Conference: Vounteering in a Digital Age Sangeet Bhullar
Sangeet Bhullar's Keynote presentation for conference: Vounteering in a Digital Age Conference held in Swansea on the 26th and 27th of September 2012. http://www.communities2point0.org.uk/volunteering-in-a-digital-age-conference
Educators are increasingly using new media and digital technologies to teach and engage their 21st century students. Reading, writing, gaming, trans-media, immersive worlds, augmented reality, and Web 3.0 are all part of the new digital frontiers. Whether it’s science or science fiction, Alice in Wonderland or Angry Birds, the dynamics of this new information ecology are transforming learning experiences in our schools. We can lead this learning revolution by ensuring that our library and the learning ecology we create can harness these new environments. How we do this, will determine our success and the future relevance and importance of our school libraries.
This presentation is posted with permission by Doug Johnson who created it. It was presented on March 21st as part of the EdTechConnect series of webinars the Discovery Educator Network (DEN). For more information about Doug Johnson, visit doug-johnson.com. For more information about the DEN, visit DiscoveryEducatorNetwork.com
Strategies to Connect, Communicate and Collaborate with Youth in the Digital AgeVickiLGray
A presentation prepared for the NYATEP Youth Academy in February 2008 to introduce how to serve youth in workforce development programs with new Web 2.0 applications.
Character Development, for students, by students!mediaplaylab
Cyberwellness has always been a ministry initiative, but in recent years has increasingly gained importance nation-wide as the evolving Internet and media landscapes bring about various issues with it.
Innova JC’s JC1 Cyberwellness Civics Lesson was done in collaboration with Media Development Authority (MDA), to bring about character development to IJC students.
All JC1 New Media Arts CCA students (known as NMA Cyberwellness Ambassadors) researched on cyberwellness topics that interest and benefit them as youths (social networking and gaming addiction). The students then collated materials (videos, case studies) to be used in the lessons.
They then leveraged on the weekly Civics Programme to extend its reach to the entire JC1 cohort of students. This programme is also part of Innova New Media Education Programme where students equip Innovians with the skills to be safe and responsible users of the Internet.
Want to know more about social networking and gaming addiction? Read Up! on the pertinent issues now!
Bryce biggs talk to trainers network finalBryce Biggs
This presentation deals with social learning and social media and the possible use of social learning tools to enhance employee engagement. It was presented to public service
Retech: Digital Innovation and Integration in the ClassroomKathryn Schravemade
Presentation for @eduwebinar with @helenstower1
A key goal of future proof education is to ensure students are engaging with information, people and technologies as ‘connected learners’ and that this engagement is effective, safe and ethical.
In our particular school setting, it was identified that traditional ICT subjects focused on the development of software usage skills, which no longer supported the evolving needs of our students. Instead we needed students to develop skills in digital citizenship so that they could participate effectively in an online and networked world. Retech (Research and Technology) is a Middle Years learning experience that has developed in response to this need.
This presentation will explore some of the skills taught in Retech:
Cybersafety & building a positive digital footprint;
Information literacies such as smart searching, curation, effective note taking, licensing and attribution;
Using blogs and social media for building a PLN (Personal Learning Network);
Collaboration through shared bookmarks, notes & Google Groups;
Inquiry and problem solving; and
Creating and presenting with digital tools such as video productions, podcasts and infographics.
A procrastinator’s paradise? or… a constructive community for the cyberliterate? A look at how social networking can be used in higher education with positive outcomes.
viaPlace - A Framework to Provide Location-based Services & ExperiencesMindgrub Technologies
Presenter: Todd Marks, President, Mindgrub Technologies
Summary: Imagine walking up to a store and having the store's hours, prices, and specials delivered right to your mobile phone or device. Sitting in front of a computer searching for information is old. The paradigm shift is “now I’m here, what information is around me?” viaPlace is twofold: a registry system that mirrors a domain registrar which allows for the delivery of advertising, entertainment and education to an end user based on their geographic location. With over 3 billion people worldwide using mobile devices its clear location based services, marketing and advertising is the next hottest trend.
A lot of talk about the future of the internet sounds almost hippie-spiritual or faux-philosophical. The Internet is not the same as the world-wide-web. But the Internet-of-Things and the Semantic Web - all parts of Web 3.0, are beginning to be very important to our learning environments. Here is a summary of key features, ranging from access, creativity, and information architecture.
This presentation is posted with permission by Doug Johnson who created it. It was presented on March 21st as part of the EdTechConnect series of webinars the Discovery Educator Network (DEN). For more information about Doug Johnson, visit doug-johnson.com. For more information about the DEN, visit DiscoveryEducatorNetwork.com
Strategies to Connect, Communicate and Collaborate with Youth in the Digital AgeVickiLGray
A presentation prepared for the NYATEP Youth Academy in February 2008 to introduce how to serve youth in workforce development programs with new Web 2.0 applications.
Character Development, for students, by students!mediaplaylab
Cyberwellness has always been a ministry initiative, but in recent years has increasingly gained importance nation-wide as the evolving Internet and media landscapes bring about various issues with it.
Innova JC’s JC1 Cyberwellness Civics Lesson was done in collaboration with Media Development Authority (MDA), to bring about character development to IJC students.
All JC1 New Media Arts CCA students (known as NMA Cyberwellness Ambassadors) researched on cyberwellness topics that interest and benefit them as youths (social networking and gaming addiction). The students then collated materials (videos, case studies) to be used in the lessons.
They then leveraged on the weekly Civics Programme to extend its reach to the entire JC1 cohort of students. This programme is also part of Innova New Media Education Programme where students equip Innovians with the skills to be safe and responsible users of the Internet.
Want to know more about social networking and gaming addiction? Read Up! on the pertinent issues now!
Bryce biggs talk to trainers network finalBryce Biggs
This presentation deals with social learning and social media and the possible use of social learning tools to enhance employee engagement. It was presented to public service
Retech: Digital Innovation and Integration in the ClassroomKathryn Schravemade
Presentation for @eduwebinar with @helenstower1
A key goal of future proof education is to ensure students are engaging with information, people and technologies as ‘connected learners’ and that this engagement is effective, safe and ethical.
In our particular school setting, it was identified that traditional ICT subjects focused on the development of software usage skills, which no longer supported the evolving needs of our students. Instead we needed students to develop skills in digital citizenship so that they could participate effectively in an online and networked world. Retech (Research and Technology) is a Middle Years learning experience that has developed in response to this need.
This presentation will explore some of the skills taught in Retech:
Cybersafety & building a positive digital footprint;
Information literacies such as smart searching, curation, effective note taking, licensing and attribution;
Using blogs and social media for building a PLN (Personal Learning Network);
Collaboration through shared bookmarks, notes & Google Groups;
Inquiry and problem solving; and
Creating and presenting with digital tools such as video productions, podcasts and infographics.
A procrastinator’s paradise? or… a constructive community for the cyberliterate? A look at how social networking can be used in higher education with positive outcomes.
viaPlace - A Framework to Provide Location-based Services & ExperiencesMindgrub Technologies
Presenter: Todd Marks, President, Mindgrub Technologies
Summary: Imagine walking up to a store and having the store's hours, prices, and specials delivered right to your mobile phone or device. Sitting in front of a computer searching for information is old. The paradigm shift is “now I’m here, what information is around me?” viaPlace is twofold: a registry system that mirrors a domain registrar which allows for the delivery of advertising, entertainment and education to an end user based on their geographic location. With over 3 billion people worldwide using mobile devices its clear location based services, marketing and advertising is the next hottest trend.
A lot of talk about the future of the internet sounds almost hippie-spiritual or faux-philosophical. The Internet is not the same as the world-wide-web. But the Internet-of-Things and the Semantic Web - all parts of Web 3.0, are beginning to be very important to our learning environments. Here is a summary of key features, ranging from access, creativity, and information architecture.
Good Cybercitizens Make the Internet a Safer Place
Own your online presence. To keep yourself safe, set privacy and security settings on web services, apps, and devices to your comfort level. ...
Be a good digital citizen. ...
Respect yourself and others. ...
Practice good communications. ...
Protect yourself and your information.
A 2hr Presentation on Internet Safety and Responsible UseLouise Jones
The first few slides explain the direction of ICT and the strategy for Highland. The rest focus on online risks and responsible use. The 2 hrs were laced with short clips and active learning exercises.
The goal of this presentation is to increase your knowledge about social media and create a sense of awareness about social networking trends including cyber-dangers: sexting, bullying, stalking. Share social networking and media best practices and ultimately, start a conversation about a values-based approach to social networking.
5 facts about the digital worldthat every parent should know.Your eKavach
The Internet can be a notorious and a terrible place. If you're a parent, these facts will come in handy whilst educating your children about the perils of the Internet.
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...mulingoh
This assignment has been submitted as part fulfillment for a Masters Degree in Educational Technology at The American College of Education.
Any comments, opinions or suggestions, to improve this assignment are highly welcome. Please feel free to contact through email, mulingoh@hotmail.com, or at yahoo.com.
Thank you.
CILIP Conference - Promoting digital literacy and digital well-being for chil...CILIP
The Internet and social media today provide huge opportunities: access to communities and networks, online information and learning, business and entertainment. However online connected technologies can also present challenges for children and young people and other vulnerable groups who may not have the critical digital literacies and life skills to recognise risk, or the resilience to manage online stresses and challenges.
This presentation highlights some of the themes to address when developing the digital literacies and digital well-being of children and young people, and those who work with or support them.
Notes 21st century child navigating the digital world with your child 2015 -...Samuel Landete Benavente
Presentation at the American School of Valencia for high school parents focused on time management and myths about internet safety -- largely based on materials available at commonsensemedia.org
Original can be found at
https://docs.google.com/presentation/d/1Kzt3Fh6evMA-zRBQcCOAGozP3mfbA0O1Hs7pw9mRZ6I/edit?usp=sharing
If Facebook were a country, it would be the most populous nation on earth ahead of China, with 1.39 billion people logging in each month. It has a suite of free and powerful tools enabling charities to reach new audiences and communicate their impact. But how can charities make the best of Facebook to connect with supporters and increase engagement with their cause?
In this webinar with digital marketing expert, Dawn Newton we will cover:
1 - Setting goals to increase engagement
2 - How to find out what interests your audience
3 - How to create varied content
4 - Becoming more playful and visual
5 - Clearly inviting interaction and crafting questions
6 - Listen and responding when you get interactions and encourage further discussion
7 – Review, refine and constantly improve
Lasa does lots more charity tech help and advice - find out more at:
Twitter: @lasaict
Web: www.lasa.org.uk/lasaict
This webinar is supported by the City of London Corporation's charity, City Bridge Trust.
Slides from November 2017 webinar with Jason King. In this webinar, we take an overview of Google Analytics, a free tool that provides a wealth of data that you can use to evaluate your success online, and help you make decisions to improve the reach of your website. This webinar is for any non-profit worker with responsibility for their charity’s website.
EU General Data Protection Regulation - Update 2017Cliff Ashcroft
This free Lasa webinar looks at why data protection is important in a digital world, and what practical things charities and civil society organisations can do to prepare for when the EU General Data Protection Regulations come into force in May 2018.
It is vital charities use the next 12 months to understand their new responsibilities and put the required processes in place.
Our webinar gives you the opportunity to ensure you are prepared for what’s to come by putting your #GDPR questions to our data protection expert and published author, Paul Ticher.
Lasa does lots more charity tech help and advice - find out more at: Twitter: @lasaict
Acknowledgements:
Lasa actively promotes and supports the Way Ahead – Civil Society at the Heart of London. See www.citybridgetrust.org.uk/publications/way-ahead/
This webinar is supported by the City of London Corporation's charity, City Bridge Trust. www.citybridgetrust.org.uk
Webinar for charities and beginners thinking about moving to Office 365. We briefly look at email, calendar, SharePoint and other features, charity pricing and take questions from the audience.
Using Technology to Help deliver Advice ServicesCliff Ashcroft
A quick look at the latest technology trends in the advice sector, from justice-as-a-service to online dispute resolution. Presentation at London Advice Conference, 8 February 2017
This webinar gives you an overview of Analytics, useful for any non-profit worker with responsibility for their website.
How successfully does your charity's website reach its intended audience? How well are you engaging with people online? What does and doesn't work on your website? How can you tell where your website's visitors are coming from or if they're viewing your website on a mobile device? The free Google Analytics tool provides a wealth of data that you can use to evaluate your success online, and help you make decisions to improve the reach of your website.
View the full presentation of webinar recording and slides at: http://connectingcare.org.uk/articles/detail/184
More on Google Analytics here: https://www.google.com/analytics/
This webinar follows on from our recent Google Ad Grants for Charities webinar: http://connectingcare.org.uk/articles/detail/webinar-google-ad-grants-for-charities
This webinar is supported by London for All, a London Councils’ funded project to capacity build London’s voluntary and community sector. More at: www.lvsc.org/londonforall/
If you’re already using or thinking of moving to Microsoft Office 365, you’ll need to think about where to store your precious documents.
Microsoft SharePoint integrates with Office 365 and allows organisations to set up a centralised, password protected space to store and manage documents, create an intranet and collaborate on projects.
In this webinar with charity IT experts, Co-Operative Systems, we look at:
• What is SharePoint and why use it
• Key features explained
• Migrating to SharePoint and what it doesn't say on the tin
• Practical demonstration of how SharePoint works
• Question & Answer
About Co-Operative Systems:
Co-Operative Systems have helped over 2,000 users onto Microsoft's Office 365 platform, and have been providing specialist IT support services to the non-profit sector since 1987. Their annual Where ITs @ event for charities is hosted by Microsoft. Read more about Co-Operative Systems at: www.coopsys.net
Webinar by @LasaICT and @Watfordgap on 11 November 2014. Top tips to help charities and non-profits make better use of social media
Watch the webinar at: https://vimeo.com/112268090
Presentation given at Children England's Virtually Ready conference, 24 January 2013.
**CREDITS**
This presentation is remixed and adapted from “What the F**K is Social Media” by Martha Kagan of espresso.com under Creative Commons Licence Attribution-Non-Commercial 2.5, and added to with nuggets of our own received wisdom (yes, really).
Thanks also to Idealware.org for their excellent Social Media Decision Guide which informs some of the slides on which social media to use.
All images are from iStockphoto.com unless otherwise acknowledged.
http://creativecommons.org/licenses/by-nc/2.5/
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
CYP E-Safety
1. e-safety
Miles Maier Twitter @LasaICT
Lasa
Dr Sangeet Bhullar Twitter @sangeet
WISE KIDS
2. • Funded by DfE via Children England
• Capacity building CYP knowledge of ICT
• Series of 6 webinars on technology
• http://lasa.eventbrite.co.uk
• www.childrenengland.org.uk/overview/1584
3. About Lasa
• 25+ years in the sector
• Technology leadership, publications, events
and consultancy
• www.lasa.org.uk/ict
• Welfare Rights
• www.rightsnet.org.uk
4. Audience Poll #1
What is your main area of responsibility?
•Chief Executive
•Management (service manager)
•Practitioner (youth/community worker)
•Information technology
•Finance/Office administration
5. Audience Poll #2
What size of organisation are you from?
•£5m - £10m
•£1m - £5m
•£501k - £1m
•£101k - £500k
•£26k - £100k
•Under £25k
7. Internet and digital
technologies are
transforming the
way we access
information, learn,
interact, network,
socialise –
Presents
opportunities and
Picture from
http://www.flickr.com/photos/dellphotos/6151880114 challenges
Creative Commons License
http://creativecommons.org/licenses/by/2.0/deed.en
11. The Knight Commission recognised that successful
participation in the digital age entails two kinds of skills
sets – digital literacy and media literacy:
“Digital literacy means learning how to work the
information and communication technologies in a
networked environment, as well as understanding the
social, cultural and ethical issues that go along with the
use of these technologies. Media literacy is the ability
to access, analyse, evaluate, create, reflect upon, and
act with the information products that media
disseminate.”
Taken from a Nesta Futurelab Publication: Big Data -
The power and possibilities of Big Data
http://www.nesta.org.uk/library/documents/Hot_Topics_Big_Data_v
5.pdf
12. What do we know?
Picture from
http://www.flickr.com/photos/olpc/2606362543
Creative Commons License
http://creativecommons.org/licenses/by/2.0/deed.en
13. Understanding the meaning of young people’s
experiences online
• What are the experiences of
young people in this space?
• What are their motivations?
• How do they perceive risk,
safety?
• What is their concept of the
Internet?
• Is it a universal world view?
• What does it mean to them?
Picture from
http://www.flickr.com/photos/dellphotos/6151888916
Creative Commons License
http://creativecommons.org/licenses/by/2.0/deed.en
14. Munch, Poke and Ping –
a report by Stephen Carrick-Davies
From: http://www.carrick-davies.com/mpp/mpp-report
15. Xilent Flex on YouTube:
http://www.youtube.com/user/XilentFlex?feature=watch
Math Train
www.mathtrain.tv
16. The top 10 myths about children's online risks
[Taken from http://www2.lse.ac.uk/newsAndMedia/news/archives/2011/09/toptenmyths.aspx]
• 1 Digital natives know it all.
Only 36 per cent of 9-16-year-olds say it is very true that they know more about
the internet than their parents. This myth obscures children's needs to develop
digital skills.
• 2 Everyone is creating their own content
The study showed that only one in five children had recently used a file-sharing
site or created an avatar, half that number wrote a blog. Most children use the
internet for ready-made content.
• 3 Under 13s can't use social networking sites
Although many sites (including Facebook) say that users must be aged at least 13,
the survey shows that age limits don't work – 38 per cent of 9-12-year-olds have a
social networking profile. Some argue age limits should be scrapped to allow
greater honesty and protective action.
• 4 Everyone watches porn online.
One in seven children saw sexual images online in the past year. Even allowing for
under-reporting, this myth has been partly created by media hype.
• 5 Bullies are baddies
The study shows that 60 per cent who bully (online or offline) have themselves
been bullied. Bullies and victims are often the same people.
17. The top 10 myths about children's online risks
[Taken from http://www2.lse.ac.uk/newsAndMedia/news/archives/2011/09/toptenmyths.aspx]
• 6 People you meet on the internet are strangers.
Most online contacts are people children know face-to-face. Nine per cent met
offline people they'd first contacted online – most didn't go alone and only one per
cent had a bad experience.
• 7 Offline risks migrate online
This is not necessarily true. While children who lead risky offline lives are more likely
to expose themselves to danger online, it cannot be assumed that those who are
low-risk offline are protected while online.
• 8 Putting the PC in the living room will help
Children find it so easy to go online at a friend's house or on a smart phone that this
advice is out of date. Parents are better advised to talk to their children about their
internet habits or join them in some online activity.
• 9 Teaching digital skills reduces online risk
Actually the more digital skills a child has, the more risks they are likely to encounter
as they broaden their online experience. What more skills can do is reduce the
potential harm that risks can bring.
• 10 Children can get around safety software
In fact, fewer than one in three 11-16 year-olds say they can change filter
preferences. And most say their parents' actions to limit their internet activity is
helpful.
18. Image taken from:
http://www.timdavies.org.uk/wp-content/uploads/Social-media-and-youth-participation-in-local-democracy.pdf
21. UK Legal Framework
Racial and Religious Hatred Act 2006
Criminal Justice Act 2003
Sexual Offences Act 2003
Communications Act 2003 (section 127)
Data Protection Act 1998
The Computer Misuse Act 1990 (sections 1 - 3)
Malicious Communications Act 1988 (section 1)
Copyright, Design and Patents Act 1988
Public Order Act 1986 (sections 17 — 29)
Obscene Publications Act 1959 and 1964
Protection from Harassment Act 1997
Regulation of Investigatory Powers Act 2000
Criminal Justice and Immigration Act 2008
Education and Inspections Act 2006
Taken from the Kent e-Safety Policy Template:
http://www.kenttrustweb.org.uk/UserFiles/CW/File/Childrens_Services/Childrens_Safeguards_Serv
22. New Ofsted School Inspection Guidance
From September 2012 schools will be judged on the
provision of e-safety; during an inspection, Ofsted will
observe how well schools protect and educate staff and
pupils in the safe use of technology, and what measures
they have in place to intervene and support an issue
arise.
Source: Ofsted 05 September 2012
Further information:
School inspection handbook from September 2012 (PDF)
23. The Digital Edge
Using digital technology to support young people
- A PROVOCATION PAPER written for Nominet Trust by
Tim Davies, David Wilcox and Alex Farrow June 2012
http://www.nominettrust.org.uk/sites/default/files/The%20Digital%
24. 10 key messages from an exploration on how digital technologies can support
young people to engage socially and economically with their communities
http://storify.com/dtye/
25. 10 key messages from an exploration on how digital
technologies can support young people to engage socially and
economically with their communities http://storify.com/dtye/
26. Staff Issues:
New Technologies can blur boundaries
BECTA PIES Model between professional and personal
relationships, public and private
information
Need Skills and Knowledge/
Guidance /Support to change thinking,
behaviour, values, competencies
Picture from
http://www.flickr.com/photos/audiolucistore/7403731050/
Creative Commons License
http://creativecommons.org/licenses/by/2.0/deed.en
27. Young People – a hidden resource
• Top down/ bottom up? Starting with
young people as co-researchers;
active participants shaping solutions
• Creating a shared understanding of
the ‘space’
• Exploring the dynamics/ potentials
and challenges of different ‘spaces’ –
e.g. Facebook vs. Twitter
• Exploring ‘digital youth culture’ -
identity, relationships, values and Picture from
behaviour http://www.flickr.com/photos/dellphotos/5501057589/in/set-
72157626068267213
Creative Commons License
http://creativecommons.org/licenses/by/2.0/deed.en
• Understanding and modelling norms
28. Focus
• Young people as peer educators –
model norms – ‘good’; explore
differences between online and f2f
Picture from
http://www.flickr.com/photos/dellphotos/6151331305/
• Skills, knowledge, digital
Creative Commons License competencies + values + behaviour
http://creativecommons.org/licenses/by/2.0/deed.en
– self-esteem, confidence, respect,
rights, support
• ‘Positive presence’ vs. ‘negative
footprint’
• Vulnerable groups
• Risk does not automatically mean
harm
29. Dare to be different;
Challenge the status quo
Picture from
http://www.flickr.com/p
hotos/rodrigogalindez/
4637637337
Creative Commons
License
http://creativecommon
s.org/licenses/by/2.0/d
eed.en
Be radically different but relevant!
- tell stories; listen to young people
- ask: what needs to change?
- create appropriate frameworks; train and support staff to use technology
creatively to support learning and to promote good digital/net skills and
behaviour
- learn from others; pilot; share good practice
- embed across organisation;
changing culture and thinking;
30. Thank You
sangeet@wisekids.org.uk
www.wisekids.org.uk/lasaesafety
32. WISE KIDS works at a
Policy and Grassroots' Level with:
• Educators – schools, Further • Law Enforcement
Education colleges • Policy Makers
• Governors of schools • Creators of Children’s Internet
• Youth Professionals Services
• Young People • Regulatory Bodies
• Mental Heath/Nursing • Government
Professionals
• Librarians
• LSCBs, Social Workers and Staff
from Children’s Services
• Community Groups
• Public and Private Organisations
33. Cloud Toolbox
4 toolboxes covering the main areas where
cloud tools could be used by organisations:
Knowledgebase:
www.ictknowledgebase.org.uk/cloudtoolbox
Social Source Commons:
https://socialsourcecommons.org/toolbox/show/3252
34. 17 Oct – Websites (Jason King) 11.30am
Sign up at: http://lasa.eventbrite.co.uk/
Follow us at: @LasaICT and @childrenengland
Editor's Notes
Welcome and Introductions > NEXT SLIDE > About these webinars
About Children England and this webinar series Thank you to our funders, DfE via Children England, who are enabling us to present these webinars to you free of charge. Children England are the government’s strategic partner for children, youth and families organisations in the non-profit sector. You can find out more by following the link at the bottom of this presentation: www.childrenengland.org.uk/overview/1584 This project is about capacity building ICT knowledge in the CYP sector and, Lasa as Children England’s technical partner, is delivering a series of 6 workshops * 3 in the summer – managing ict, data protection and social media on the ICT Knowledgebase * and 3 from mid-September onwards with cloud tools, websites and e-safety And the link to find out more about that is http://lasa.eventbrite.co.uk
3. Orientation (MM) RUN POLLS HANDOVER CHAIR TO SANGEET MM – MUTE WHEN YOURSELF ON HANDOVER TO STONY
More transparent world – networking and marketing are changing due to web services like these and YouTube
Back Office including document creation, email tools and accounting software. Publishing including social media, webtools, audio and video creating and hosting. Collaboration - including project planning and management, document sharing and Events and Meetings - tools to help plan, organise and report on events and meetings.
END PRESENTATION THANK YOU EVERYONE FOR YOUR TIME TODAY, WE HOPE IT WAS USEFUL. BEFORE YOU GO WE HAVE A COUPLE OF ANNOUNCEMENTS TO MAKE: WE WILL MAKE THIS PRESENTATION AND THE AUDIO RECORDING AVAILABLE FOR DOWNLOAD VERY SHORTLY, WE’LL LET YOU KNOW WHEN ITS AVAILABLE. FORTHCOMING WEBINARS PLEASE COMPLETE THE WEBINAR EVALUATION THANK YOU TO STONY + THANK YOU TO ALL OF YOU WHO ATTENDED