SlideShare a Scribd company logo
Unit 5. Activities
Explorer & Expert Level
KA2 - 2019-1-BE02-KA201-060212
KA2 - 2019-1-BE02-KA201-060212
3.5.1. Digital ethics
Time required: 2h
3.5.1. Digital ethics
KA2 - 2019-1-BE02-KA201-060212 3
According to Howard Gardner, in order to teach responsible digital
citizenship, you can develop a framework based on 5 main elements:
1. Identity: Which information appears if someone types your name on
the web?
2. Privacy: Are your information adequately protected?
3. Ownership: How would you use the contents produced by others?
4. Trustworthiness: Are you sure about the reliability of the information
sent by others?
5. Community: how to interact within the Online community? How to
respond in the case of malicious texts or emails?
Based on these elements, develop your classroom’s rules.
3.5.1. Digital ethics
KA2 - 2019-1-BE02-KA201-060212 4
Why don’t you try this activity with your students?
 Identify:
1. A risk connected to each of the 5 areas: Identity, privacy,
ownership, trustworthiness, community
2. A rule preventing that happening
 Together with your students, create your classroom’s rules.
(Stannard, 2018). You may also ask your students to present
their netiquette rules through interactive tools, e.g.
Piktochart, Canva.
Web users should be aware of the dangers they may encounter and of the
necessary instruments for appropriate prevention/reaction.
Identify some of these topics and prepare a framework of suggested behaviours.
You may discuss: Online privacy, Fake news, Cyberbullying, Sexting, Oversharing,
Cyber predators, Phishing, Malware, Befriend strangers, Online Hate Speech.
KA2 - 2019-1-BE02-KA201-060212
3.5.2. Online & Offline social
norms
Tools, data & Resources needed:
Internet, Computer / mobile phones
Common Sense Education, Video Library
Time required: 1h
3.5.2. Online & Offline social norms
KA2 - 2019-1-BE02-KA201-060212 6
Oversharing and Your Digital Footprint
Source https://www.commonsense.org/education/videos/teen-voices-
oversharing-and-your-digital-footprint
Discussion • What are some advantages/drawbacks of sharing on social media?
• Do you agree with some of the perspectives in the video? Which one?
Why?
• Now provide a definition of what digital footprint means and discuss
together how to keep safe on social media
Here are some inspirational videos from Common Sense Education to
start conversation:
3.5.2. Online & Offline social norms
KA2 - 2019-1-BE02-KA201-060212 7
Friendships and Boundaries
Source https://www.commonsense.org/education/videos/teen-voices-
friendships-and-boundaries
Discussion - How have relationships changed with the spread of digital devices?
- Why can online relationships be risky? How can we reduce such risks?
- How is online communication similar/different to/from real life
communication? Can you identify pros/contra of each?
- What can you do to enhance your online relationships, towards
responsible and respectful behaviours?
- What makes a quality friendship?
- Do you agree? Why or why not?
- How can we intervene if someone is behaving cruelly online or using
hate speech?
- Identify responsible behaviours to follow
3.5.2. Online & Offline social norms
KA2 - 2019-1-BE02-KA201-060212 8
Hate Speech Online
Source https://www.commonsense.org/education/videos/teen-voices-hate-
speech-online
Discussion • How would you define hate speech?
• Have you ever seen it online?
• What do you think is the reason behind hate speech?
• Give a definition of hate speech and discuss how this affect the
students’ activities online
3.5.2. Online & Offline social norms
KA2 - 2019-1-BE02-KA201-060212 9
Is the Internet making you meaner?
Source https://www.commonsense.org/education/videos/is-the-internet-
making-you-meaner
Discussion • What does online disinhibition mean for you?
• Provide a definition of online disinhibition
• Which are the main causes for this phenomenon?
• Have you ever experienced it?
• Do you think it is a benefit or a bad thing? Why?
3.5.2. Online & Offline social norms
KA2 - 2019-1-BE02-KA201-060212 10
• You may also use these topics as a starting point to
develop your classroom’s rules according to Howard
Gardner’ s elements, as suggested in the previous
activity.
• The following link offers other interactive games and
videos that can be helpful:
https://wideopenschool.org/student-activities/dig-
cit/grades-9-12/#all/
Sharing data, interacting and collaborating through them, implies interacting on the
online community: some apps may communicate your location; multimedia content
often contains such metadata as EXIF for images, identifying the place and time when
the picture was taken and even the camera serial number.
The term “digital footprint” defines the invisible record of your online activities
The following video shows what the digital footprint is:
https://www.youtube.com/watch?v=KAeJuod0GFA&feature=emb_logo
KA2 - 2019-1-BE02-KA201-060212
3.5.3. Your digital footprint
checklist
Time required: 1h
3.5.3. Your digital footprint checklist
KA2 - 2019-1-BE02-KA201-060212 12
• Do a simple Web search: digit your name on a searching engine: what
can you find about yourself?
• Monitor your Google Privacy and check which devices are allowed to
access your account.
• Check your social media: disactivate old accounts and control your
privacy settings on the social media you use most often.
• You can also activate alerts for future notifications: e.g., Google alerts will
notify new content emerging from online researches about yourself.
• Remember to monitor your privacy settings on social media platforms
and be careful while sharing.
Are you aware of your
digital footprint?
3.5.3. Your digital footprint checklist
KA2 - 2019-1-BE02-KA201-060212 13
Now discuss with your students:
• What do you do online that may influence your identity?
• Have you ever posted a picture of someone else without
asking for permission? How would you feel if the same
happened to you?
• Why is your digital footprint important? How can it influence
your life?
• What can you do to protect your digital footprint?
This checklist can provide you with a “reminder”
for a safe online experience
Data ethics is “a branch of ethics that evaluates data practices with the
potential to adversely impact on people and society – in data collection,
sharing and use” (Open Data Institute).
KA2 - 2019-1-BE02-KA201-060212
3.5.4. The Data Ethics Canvas
Tools, data and resources needed:
• Internet, Computer / mobile phones
• The Data Ethics Canvas
Time required: 20 min
3.5.4. The Data Ethics Canvas
KA2 - 2019-1-BE02-KA201-060212 15
The Data Ethics Canvas may help you identify and overcome any
ethical issue that can arise from the use of others’ data.
• You can start from any part of the Canvas and follow the
order you prefer. For each section take your time to reflect.
• The model can be helpful before taking any action of data
sharing.
• The Data Ethics Canvas can be downloaded in different
languages at the following website.
• Use the Data Ethics Canvas before sharing data in your
presentation/research/blog.
Available in different languages, the Data Detox x Youth is an activity book to
support young people control of their online activity, in relation to four main
areas:
• Digital privacy, to monitor your online profile;
• Digital security, with tips for secure passwords
• Digital wellbeing, dealing with the risk of getting addicted to smartphones
• Misinformation, with a guide on how to consume information online
KA2 - 2019-1-BE02-KA201-060212
3.5.5. Data Detox x Youth
Tools, data and resources needed:
Internet, Computer / mobile phones
Data Detox x Youth
3.5.5. Data Detox x Youth
KA2 - 2019-1-BE02-KA201-060212 17
The toolkit targets youngsters aged 11-16 years old, who already
own their digital device, but can be applied to other age groups.
• English
• Italian
• Deutsch
Other languages are available
The Safer Internet Day was launched by the EU Safe Borders project in 2004
and taken up by the Insafe network as one of its first activities in 2005.
The event is a unique occasion for awareness raising about topics related to
such online issues as cyberbullying, digital identity, social networking.
The Safer Internet Day builds on a global, community-led approach, which
encourages everyone to give their contribute.
KA2 - 2019-1-BE02-KA201-060212
3.5.6. The Safer Internet Day
Tools, data and resources needed:
Internet, Computer / mobile phones
More information
3.5.6. The Safer Internet Day
KA2 - 2019-1-BE02-KA201-060212 19
• The Safer Internet Day website a global online community
platform for countries and organisations to show their events
and actions. The website offers a gallery of resources that can
help you promote safer behaviours online.
• An interesting resource for teachers is the handbook “The Web
we want”: lesson plans offering ideas and activities to spur their
learners’ creative and critical thinking skills. Available in
different languages, the lesson plans are organised in line with
the European e-Competence Framework.
• Other resources can be found at:
https://www.saferinternetday.org/resources

More Related Content

What's hot

D3 1.1.2.1-information needs
D3 1.1.2.1-information needsD3 1.1.2.1-information needs
D3 1.1.2.1-information needs
GeorgePapastefanou1
 
Current and Future Trends in Education: Non-traditional Learners
Current and Future Trends in Education: Non-traditional Learners Current and Future Trends in Education: Non-traditional Learners
Current and Future Trends in Education: Non-traditional Learners
Mark Brown
 
720 final
720 final720 final
720 final
Willisa Gaut, MS
 
Examining the practical value of social media as a communication tool
Examining the practical value of social media as a communication toolExamining the practical value of social media as a communication tool
Examining the practical value of social media as a communication tool
debparker
 
ICT Projects for Social Awareness
ICT Projects for Social AwarenessICT Projects for Social Awareness
ICT Projects for Social Awareness
DepEd-Bataan
 
Digital Vision for CALP
Digital Vision for CALPDigital Vision for CALP
Digital Vision for CALPtaipida
 
Networking Development in the Network Society : Integrating ICT in Developmen...
Networking Development in the Network Society : Integrating ICT in Developmen...Networking Development in the Network Society : Integrating ICT in Developmen...
Networking Development in the Network Society : Integrating ICT in Developmen...
Manuel Acevedo
 
Social government: a platform for online collaboration
Social government:  a platform for online collaborationSocial government:  a platform for online collaboration
Social government: a platform for online collaboration
Patrick McCormick
 
Fit for Purpose? @ #PLE_SOU
Fit for Purpose? @ #PLE_SOUFit for Purpose? @ #PLE_SOU
Fit for Purpose? @ #PLE_SOU
Lisa Harris
 
Student Data and Its Discontents: How FUD undermined an education reform agenda
Student Data and Its Discontents: How FUD undermined an education reform agendaStudent Data and Its Discontents: How FUD undermined an education reform agenda
Student Data and Its Discontents: How FUD undermined an education reform agenda
Patrick McCormick
 
Read-write government: engaging citizens with social media
Read-write government: engaging citizens with social mediaRead-write government: engaging citizens with social media
Read-write government: engaging citizens with social media
Patrick McCormick
 
Digital Divide
Digital DivideDigital Divide
Digital Divide
Dr.Suresh Isave
 
Rebooting digital identity: how the social web is transforming citizen behavi...
Rebooting digital identity: how the social web is transforming citizen behavi...Rebooting digital identity: how the social web is transforming citizen behavi...
Rebooting digital identity: how the social web is transforming citizen behavi...
Patrick McCormick
 
Making the most of social media july 2013
Making the most of social media   july 2013Making the most of social media   july 2013
Making the most of social media july 2013
Lisa Harris
 
Suvi's presentations for ICY digital youth work group
Suvi's presentations for ICY digital youth work groupSuvi's presentations for ICY digital youth work group
Suvi's presentations for ICY digital youth work group
Verke
 
Social networks management policies
Social networks management policiesSocial networks management policies
Social networks management policies
Gabriel BREZOIU
 

What's hot (16)

D3 1.1.2.1-information needs
D3 1.1.2.1-information needsD3 1.1.2.1-information needs
D3 1.1.2.1-information needs
 
Current and Future Trends in Education: Non-traditional Learners
Current and Future Trends in Education: Non-traditional Learners Current and Future Trends in Education: Non-traditional Learners
Current and Future Trends in Education: Non-traditional Learners
 
720 final
720 final720 final
720 final
 
Examining the practical value of social media as a communication tool
Examining the practical value of social media as a communication toolExamining the practical value of social media as a communication tool
Examining the practical value of social media as a communication tool
 
ICT Projects for Social Awareness
ICT Projects for Social AwarenessICT Projects for Social Awareness
ICT Projects for Social Awareness
 
Digital Vision for CALP
Digital Vision for CALPDigital Vision for CALP
Digital Vision for CALP
 
Networking Development in the Network Society : Integrating ICT in Developmen...
Networking Development in the Network Society : Integrating ICT in Developmen...Networking Development in the Network Society : Integrating ICT in Developmen...
Networking Development in the Network Society : Integrating ICT in Developmen...
 
Social government: a platform for online collaboration
Social government:  a platform for online collaborationSocial government:  a platform for online collaboration
Social government: a platform for online collaboration
 
Fit for Purpose? @ #PLE_SOU
Fit for Purpose? @ #PLE_SOUFit for Purpose? @ #PLE_SOU
Fit for Purpose? @ #PLE_SOU
 
Student Data and Its Discontents: How FUD undermined an education reform agenda
Student Data and Its Discontents: How FUD undermined an education reform agendaStudent Data and Its Discontents: How FUD undermined an education reform agenda
Student Data and Its Discontents: How FUD undermined an education reform agenda
 
Read-write government: engaging citizens with social media
Read-write government: engaging citizens with social mediaRead-write government: engaging citizens with social media
Read-write government: engaging citizens with social media
 
Digital Divide
Digital DivideDigital Divide
Digital Divide
 
Rebooting digital identity: how the social web is transforming citizen behavi...
Rebooting digital identity: how the social web is transforming citizen behavi...Rebooting digital identity: how the social web is transforming citizen behavi...
Rebooting digital identity: how the social web is transforming citizen behavi...
 
Making the most of social media july 2013
Making the most of social media   july 2013Making the most of social media   july 2013
Making the most of social media july 2013
 
Suvi's presentations for ICY digital youth work group
Suvi's presentations for ICY digital youth work groupSuvi's presentations for ICY digital youth work group
Suvi's presentations for ICY digital youth work group
 
Social networks management policies
Social networks management policiesSocial networks management policies
Social networks management policies
 

Similar to D3 Unit 5_Activities

Maddie is Online Series 1 Booklet with resources
Maddie is Online Series 1 Booklet with resources Maddie is Online Series 1 Booklet with resources
Maddie is Online Series 1 Booklet with resources
Konstantina Martzoukou
 
GDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your AppsGDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your Apps
Carl Brown
 
GCSECS-ImpactOfTechnology.pptx
GCSECS-ImpactOfTechnology.pptxGCSECS-ImpactOfTechnology.pptx
GCSECS-ImpactOfTechnology.pptx
sangeetha865539
 
Promoting and Modeling Digital Citizenship and Responsibility
 Promoting and Modeling Digital Citizenship and Responsibility Promoting and Modeling Digital Citizenship and Responsibility
Promoting and Modeling Digital Citizenship and Responsibility
E Robertson
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
Oodit Jethwa
 
Internet Safety - Parents
Internet Safety - ParentsInternet Safety - Parents
Internet Safety - Parents
- Mark - Fullbright
 
www.Ebook777.comFree ebooks == www.Ebook777.comhttp.docx
www.Ebook777.comFree ebooks ==   www.Ebook777.comhttp.docxwww.Ebook777.comFree ebooks ==   www.Ebook777.comhttp.docx
www.Ebook777.comFree ebooks == www.Ebook777.comhttp.docx
odiliagilby
 
GoDigital Project: module 4 - Digital Safety and Problem Solving
GoDigital Project: module 4 - Digital Safety and Problem SolvingGoDigital Project: module 4 - Digital Safety and Problem Solving
GoDigital Project: module 4 - Digital Safety and Problem Solving
Karl Donert
 
D3 unit 2 explorer
D3 unit 2 explorerD3 unit 2 explorer
D3 unit 2 explorer
Simona Sglavo
 
Promoting and modeling digital citizenship and responsibility no wf
 Promoting and modeling digital citizenship and responsibility no wf Promoting and modeling digital citizenship and responsibility no wf
Promoting and modeling digital citizenship and responsibility no wfE Robertson
 
Dwe m3 digital footprint netiquette and reputation
Dwe m3   digital footprint  netiquette and reputation Dwe m3   digital footprint  netiquette and reputation
Dwe m3 digital footprint netiquette and reputation
Data-Set
 
An easy way to help your students learn, collabor.docx
An easy way to  help your students learn, collabor.docxAn easy way to  help your students learn, collabor.docx
An easy way to help your students learn, collabor.docx
nettletondevon
 
An easy way to help your students learn, collabor.docx
An easy way to  help your students learn, collabor.docxAn easy way to  help your students learn, collabor.docx
An easy way to help your students learn, collabor.docx
greg1eden90113
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
egschool
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
IRJET Journal
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
Olga Morozan
 
IDENTITY AWARENESS, PROTECTION, AND MANAGEMENT GUIDE - March 2019
IDENTITY AWARENESS, PROTECTION, AND MANAGEMENT GUIDE - March 2019IDENTITY AWARENESS, PROTECTION, AND MANAGEMENT GUIDE - March 2019
IDENTITY AWARENESS, PROTECTION, AND MANAGEMENT GUIDE - March 2019
Ron Craig
 

Similar to D3 Unit 5_Activities (20)

Maddie is Online Series 1 Booklet with resources
Maddie is Online Series 1 Booklet with resources Maddie is Online Series 1 Booklet with resources
Maddie is Online Series 1 Booklet with resources
 
GDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your AppsGDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your Apps
 
GCSECS-ImpactOfTechnology.pptx
GCSECS-ImpactOfTechnology.pptxGCSECS-ImpactOfTechnology.pptx
GCSECS-ImpactOfTechnology.pptx
 
Promoting and Modeling Digital Citizenship and Responsibility
 Promoting and Modeling Digital Citizenship and Responsibility Promoting and Modeling Digital Citizenship and Responsibility
Promoting and Modeling Digital Citizenship and Responsibility
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
 
Internet Safety - Parents
Internet Safety - ParentsInternet Safety - Parents
Internet Safety - Parents
 
www.Ebook777.comFree ebooks == www.Ebook777.comhttp.docx
www.Ebook777.comFree ebooks ==   www.Ebook777.comhttp.docxwww.Ebook777.comFree ebooks ==   www.Ebook777.comhttp.docx
www.Ebook777.comFree ebooks == www.Ebook777.comhttp.docx
 
GoDigital Project: module 4 - Digital Safety and Problem Solving
GoDigital Project: module 4 - Digital Safety and Problem SolvingGoDigital Project: module 4 - Digital Safety and Problem Solving
GoDigital Project: module 4 - Digital Safety and Problem Solving
 
D3 unit 2 explorer
D3 unit 2 explorerD3 unit 2 explorer
D3 unit 2 explorer
 
Digital employability workshop
Digital employability workshop Digital employability workshop
Digital employability workshop
 
Promoting and modeling digital citizenship and responsibility no wf
 Promoting and modeling digital citizenship and responsibility no wf Promoting and modeling digital citizenship and responsibility no wf
Promoting and modeling digital citizenship and responsibility no wf
 
Dwe m3 digital footprint netiquette and reputation
Dwe m3   digital footprint  netiquette and reputation Dwe m3   digital footprint  netiquette and reputation
Dwe m3 digital footprint netiquette and reputation
 
An easy way to help your students learn, collabor.docx
An easy way to  help your students learn, collabor.docxAn easy way to  help your students learn, collabor.docx
An easy way to help your students learn, collabor.docx
 
An easy way to help your students learn, collabor.docx
An easy way to  help your students learn, collabor.docxAn easy way to  help your students learn, collabor.docx
An easy way to help your students learn, collabor.docx
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
 
R2EDPresentationDec.
R2EDPresentationDec.R2EDPresentationDec.
R2EDPresentationDec.
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Chapter6
Chapter6Chapter6
Chapter6
 
IDENTITY AWARENESS, PROTECTION, AND MANAGEMENT GUIDE - March 2019
IDENTITY AWARENESS, PROTECTION, AND MANAGEMENT GUIDE - March 2019IDENTITY AWARENESS, PROTECTION, AND MANAGEMENT GUIDE - March 2019
IDENTITY AWARENESS, PROTECTION, AND MANAGEMENT GUIDE - March 2019
 

Recently uploaded

Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
John Andrews
 
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
haila53
 
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
v3tuleee
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
TravisMalana
 
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
ewymefz
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单
enxupq
 
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
Tiktokethiodaily
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
ahzuo
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
ewymefz
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
yhkoc
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
slg6lamcq
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
balafet
 
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Subhajit Sahu
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
Oppotus
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
NABLAS株式会社
 
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape ReportSOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
Subhajit Sahu
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
ewymefz
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
ewymefz
 

Recently uploaded (20)

Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
 
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
 
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
 
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单
 
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
 
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
 
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape ReportSOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape Report
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
 

D3 Unit 5_Activities

  • 1. Unit 5. Activities Explorer & Expert Level KA2 - 2019-1-BE02-KA201-060212
  • 2. KA2 - 2019-1-BE02-KA201-060212 3.5.1. Digital ethics Time required: 2h
  • 3. 3.5.1. Digital ethics KA2 - 2019-1-BE02-KA201-060212 3 According to Howard Gardner, in order to teach responsible digital citizenship, you can develop a framework based on 5 main elements: 1. Identity: Which information appears if someone types your name on the web? 2. Privacy: Are your information adequately protected? 3. Ownership: How would you use the contents produced by others? 4. Trustworthiness: Are you sure about the reliability of the information sent by others? 5. Community: how to interact within the Online community? How to respond in the case of malicious texts or emails? Based on these elements, develop your classroom’s rules.
  • 4. 3.5.1. Digital ethics KA2 - 2019-1-BE02-KA201-060212 4 Why don’t you try this activity with your students?  Identify: 1. A risk connected to each of the 5 areas: Identity, privacy, ownership, trustworthiness, community 2. A rule preventing that happening  Together with your students, create your classroom’s rules. (Stannard, 2018). You may also ask your students to present their netiquette rules through interactive tools, e.g. Piktochart, Canva.
  • 5. Web users should be aware of the dangers they may encounter and of the necessary instruments for appropriate prevention/reaction. Identify some of these topics and prepare a framework of suggested behaviours. You may discuss: Online privacy, Fake news, Cyberbullying, Sexting, Oversharing, Cyber predators, Phishing, Malware, Befriend strangers, Online Hate Speech. KA2 - 2019-1-BE02-KA201-060212 3.5.2. Online & Offline social norms Tools, data & Resources needed: Internet, Computer / mobile phones Common Sense Education, Video Library Time required: 1h
  • 6. 3.5.2. Online & Offline social norms KA2 - 2019-1-BE02-KA201-060212 6 Oversharing and Your Digital Footprint Source https://www.commonsense.org/education/videos/teen-voices- oversharing-and-your-digital-footprint Discussion • What are some advantages/drawbacks of sharing on social media? • Do you agree with some of the perspectives in the video? Which one? Why? • Now provide a definition of what digital footprint means and discuss together how to keep safe on social media Here are some inspirational videos from Common Sense Education to start conversation:
  • 7. 3.5.2. Online & Offline social norms KA2 - 2019-1-BE02-KA201-060212 7 Friendships and Boundaries Source https://www.commonsense.org/education/videos/teen-voices- friendships-and-boundaries Discussion - How have relationships changed with the spread of digital devices? - Why can online relationships be risky? How can we reduce such risks? - How is online communication similar/different to/from real life communication? Can you identify pros/contra of each? - What can you do to enhance your online relationships, towards responsible and respectful behaviours? - What makes a quality friendship? - Do you agree? Why or why not? - How can we intervene if someone is behaving cruelly online or using hate speech? - Identify responsible behaviours to follow
  • 8. 3.5.2. Online & Offline social norms KA2 - 2019-1-BE02-KA201-060212 8 Hate Speech Online Source https://www.commonsense.org/education/videos/teen-voices-hate- speech-online Discussion • How would you define hate speech? • Have you ever seen it online? • What do you think is the reason behind hate speech? • Give a definition of hate speech and discuss how this affect the students’ activities online
  • 9. 3.5.2. Online & Offline social norms KA2 - 2019-1-BE02-KA201-060212 9 Is the Internet making you meaner? Source https://www.commonsense.org/education/videos/is-the-internet- making-you-meaner Discussion • What does online disinhibition mean for you? • Provide a definition of online disinhibition • Which are the main causes for this phenomenon? • Have you ever experienced it? • Do you think it is a benefit or a bad thing? Why?
  • 10. 3.5.2. Online & Offline social norms KA2 - 2019-1-BE02-KA201-060212 10 • You may also use these topics as a starting point to develop your classroom’s rules according to Howard Gardner’ s elements, as suggested in the previous activity. • The following link offers other interactive games and videos that can be helpful: https://wideopenschool.org/student-activities/dig- cit/grades-9-12/#all/
  • 11. Sharing data, interacting and collaborating through them, implies interacting on the online community: some apps may communicate your location; multimedia content often contains such metadata as EXIF for images, identifying the place and time when the picture was taken and even the camera serial number. The term “digital footprint” defines the invisible record of your online activities The following video shows what the digital footprint is: https://www.youtube.com/watch?v=KAeJuod0GFA&feature=emb_logo KA2 - 2019-1-BE02-KA201-060212 3.5.3. Your digital footprint checklist Time required: 1h
  • 12. 3.5.3. Your digital footprint checklist KA2 - 2019-1-BE02-KA201-060212 12 • Do a simple Web search: digit your name on a searching engine: what can you find about yourself? • Monitor your Google Privacy and check which devices are allowed to access your account. • Check your social media: disactivate old accounts and control your privacy settings on the social media you use most often. • You can also activate alerts for future notifications: e.g., Google alerts will notify new content emerging from online researches about yourself. • Remember to monitor your privacy settings on social media platforms and be careful while sharing. Are you aware of your digital footprint?
  • 13. 3.5.3. Your digital footprint checklist KA2 - 2019-1-BE02-KA201-060212 13 Now discuss with your students: • What do you do online that may influence your identity? • Have you ever posted a picture of someone else without asking for permission? How would you feel if the same happened to you? • Why is your digital footprint important? How can it influence your life? • What can you do to protect your digital footprint? This checklist can provide you with a “reminder” for a safe online experience
  • 14. Data ethics is “a branch of ethics that evaluates data practices with the potential to adversely impact on people and society – in data collection, sharing and use” (Open Data Institute). KA2 - 2019-1-BE02-KA201-060212 3.5.4. The Data Ethics Canvas Tools, data and resources needed: • Internet, Computer / mobile phones • The Data Ethics Canvas Time required: 20 min
  • 15. 3.5.4. The Data Ethics Canvas KA2 - 2019-1-BE02-KA201-060212 15 The Data Ethics Canvas may help you identify and overcome any ethical issue that can arise from the use of others’ data. • You can start from any part of the Canvas and follow the order you prefer. For each section take your time to reflect. • The model can be helpful before taking any action of data sharing. • The Data Ethics Canvas can be downloaded in different languages at the following website. • Use the Data Ethics Canvas before sharing data in your presentation/research/blog.
  • 16. Available in different languages, the Data Detox x Youth is an activity book to support young people control of their online activity, in relation to four main areas: • Digital privacy, to monitor your online profile; • Digital security, with tips for secure passwords • Digital wellbeing, dealing with the risk of getting addicted to smartphones • Misinformation, with a guide on how to consume information online KA2 - 2019-1-BE02-KA201-060212 3.5.5. Data Detox x Youth Tools, data and resources needed: Internet, Computer / mobile phones Data Detox x Youth
  • 17. 3.5.5. Data Detox x Youth KA2 - 2019-1-BE02-KA201-060212 17 The toolkit targets youngsters aged 11-16 years old, who already own their digital device, but can be applied to other age groups. • English • Italian • Deutsch Other languages are available
  • 18. The Safer Internet Day was launched by the EU Safe Borders project in 2004 and taken up by the Insafe network as one of its first activities in 2005. The event is a unique occasion for awareness raising about topics related to such online issues as cyberbullying, digital identity, social networking. The Safer Internet Day builds on a global, community-led approach, which encourages everyone to give their contribute. KA2 - 2019-1-BE02-KA201-060212 3.5.6. The Safer Internet Day Tools, data and resources needed: Internet, Computer / mobile phones More information
  • 19. 3.5.6. The Safer Internet Day KA2 - 2019-1-BE02-KA201-060212 19 • The Safer Internet Day website a global online community platform for countries and organisations to show their events and actions. The website offers a gallery of resources that can help you promote safer behaviours online. • An interesting resource for teachers is the handbook “The Web we want”: lesson plans offering ideas and activities to spur their learners’ creative and critical thinking skills. Available in different languages, the lesson plans are organised in line with the European e-Competence Framework. • Other resources can be found at: https://www.saferinternetday.org/resources