This document discusses the author's use of the internet and reflections on integrating technology safely and ethically. The summary is:
The author reflects on her frequent personal use of the internet through social media, email, online shopping, and search engines. She realizes she discloses too much personal information online and has been guilty of copyright infringement. As a teacher, she must prioritize internet safety lessons and model proper ethics. The school has an acceptable use policy to regulate student internet use, and the author thinks more reminders and parent education are needed on these topics.
When Mom Or Dad Ask To Be Your Facebook Friend 0609 RevSusan Anderson
"When Mom or Dad Asks to be Your Facebook Friend" is a presentation for parents of incoming first year students on how to communicate with their children in the world of social media.
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...mulingoh
This assignment has been submitted as part fulfillment for a Masters Degree in Educational Technology at The American College of Education.
Any comments, opinions or suggestions, to improve this assignment are highly welcome. Please feel free to contact through email, mulingoh@hotmail.com, or at yahoo.com.
Thank you.
When Mom Or Dad Ask To Be Your Facebook Friend 0609 RevSusan Anderson
"When Mom or Dad Asks to be Your Facebook Friend" is a presentation for parents of incoming first year students on how to communicate with their children in the world of social media.
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...mulingoh
This assignment has been submitted as part fulfillment for a Masters Degree in Educational Technology at The American College of Education.
Any comments, opinions or suggestions, to improve this assignment are highly welcome. Please feel free to contact through email, mulingoh@hotmail.com, or at yahoo.com.
Thank you.
Concentraded Solar Power
CSP systems use mirrors and tracking systems to focus a large area of sunlight into a small beam. The concentrated heat is then used as a heat source for a conventional power plant.
For additional information visit: www.solarux.com.tr
An electronic copy of a handout that is used with the presentation "A Parent and Teacher Training Program for Cyberbullying Detection and Intervention", Andy Jeter's presentation on his action research proposal. The handout includes a list of web resources and cyberbullying prevention tips for teachers and parents. The PowerPoint for the presentation can be found at - http://www.slideshare.net/andymanj/a-parent-and-teacher-training-program-for-cyberbullying-detection-and-intervention
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
Delivering Micro-Credentials in Technical and Vocational Education and TrainingAG2 Design
Explore how micro-credentials are transforming Technical and Vocational Education and Training (TVET) with this comprehensive slide deck. Discover what micro-credentials are, their importance in TVET, the advantages they offer, and the insights from industry experts. Additionally, learn about the top software applications available for creating and managing micro-credentials. This presentation also includes valuable resources and a discussion on the future of these specialised certifications.
For more detailed information on delivering micro-credentials in TVET, visit this https://tvettrainer.com/delivering-micro-credentials-in-tvet/
2. 1.
I guess it is fair to say that I am an Internet-a-holic, if that’s a word!
use the Internet.
I love to use Facebook to catch up with old friends and classmates
and see pictures of their families.
around me.
work.
I love to
I like to see what is going on in the lives of others
I use email on a daily basis.
I have a personal email account and one at
I communicate with others using email daily.
I do not use chat rooms or
discussion boards often, although I like the Pinterest website and how it is designed.
This time of year I do a lot of online shopping for Christmas.
Technology has
made it so easy to buy online and have it delivered right to your front door.
It is very
convenient, and we live in a society that is all about convenience.
Google is probably my favorite website.
I use it daily to locate information
from lesson plans, homework help for my children, ideas for crafts, home repair- you
name it, and I can find it on Google!
2.
As I research this information and reflect on my practices of using the Internet, I
have become surprisingly aware that I divulge too much information online.
When I
am making an online purchase, I try to online use sites that take Paypal for payment.
But many times, depending on how much I want the item or how inexpensive it is, I will
buy it without the secure lock checkout sign at the bottom.
3. When I use Facebook, I have set my account so that only my friends can view my
posts and pictures.
However, I am aware that there are ways around this.
I have
become so paranoid from all the news stories that I have heard recently about stalkers
preying on children, that I have just about banned myself from putting any pictures on
the web.
As a teacher, it is my responsibility to make sure that I know what students
are doing on the Internet and making sure that I set guidelines for computer use (Mills,
p. 16).
Teaching students about Internet safety has to be one of my first priorities.
I must admit, after reading this week’s information, that I have been guilty of
breaking the copyright rules.
Many times, before reading these pages, have I used
some clip art or cute pictures from the web for presentations or newsletters I have
written.
I, like many students, have assumed that if it is on the Internet that it there
for my free use.
But after reading the Mills text, I am aware that I must model integrity
for my students (Mills, p. 18).
This must be consistent in my daily activities such as
photocopying and taking graphics off the Internet.
Mills expresses the need for
teachers to use different strategies to help students understand and prevent plagiarism
such as making assignments clear and specific and using rubrics for assignments.
(Mills, p. 18).
3.
I work in the Hardeman County School System. We have a district-wide
4. acceptable use policy that is sent home at the beginning of the school year for parents
and students to discuss and sign.
Any students who do not return it, or whose parents
check no to Internet use, will not be allowed to use the school’s computers.
Each
student has a file in which this important document is kept.
Our policy begins with the statement that “computer use is a privilege, not a
right.” Many of us forget that.
The policy then goes on to describe in detail what is
“acceptable use” and “prohibited use.” Acceptable use explains that students may surf
the net and play games under the supervision of a teacher.
Prohibited use forbids
personal software from being brought to school and copied on school computers.
Students may not cause harm to the computers or use food or drink around them.
Computers are not to be used to harass or bully others. Violation of copyright laws is
prohibited.
Students are prohibited to give their personal information online.
Accessing social networking sites blocked by filtering software is prohibited.
I am
including the link to our acceptable use policy below from one of our schools’
handbooks.
It is on page 11.
http://www.hardemancountyschools.org/bchs/files/Student_Handbook%202013%20re
v%208-7-13.pdf
Our county strives to make sure that each student’s personal information is kept
5. secure.
Parents must sign a release at the beginning of the year giving the school
consent to take and publish pictures of their child, use their child in any reading videos,
or to publish their child’s name.
We use filtering software that blocks sites that are
deemed inappropriate for children.
Our school has adopted the Olweus Bullying
Prevention Program, and we devote much time to talk to our students about different
types of bullying, including cyberbullying.
Our students are very aware of bullying and
now know how to identify it and the steps to take to prevent it.
4.
As I reflect on our district acceptable use policy, I feel that it is very
comprehensive and comparable to others in the state.
However, after reading the
Mills text, I realized that there are ways that we could make the policy better.
We do
have filtering software on our computers, but we need programs that prevent students
from giving out personal information online.
(Mills, 2006).
I also like the idea from
Mills about creating a classroom email address so that teachers and parents can
monitor student discussions in online chats.
Although I teach lessons on plagiarism
and copyright, I realize that students need a constant reminder throughout the year of
the AUP rules. Mills suggested making a classroom poster reminding students of the
AUP rules.
5.
I think this is a great idea, and one I am planning on using.
I currently teach 1st grade, and my first graders are not as Internet savvy as most
6. of the older students in our school.
My students are very innocent and naive, so I try
to express to them that they cannot believe everything they read online. Although
they are young, I understand the importance of teaching them early on about copyright
infringement and using the Internet safely and wisely.
At the beginning of the year I go
over the AUP with my students and make sure they know what is expected of them.
I
have the students take the AUP home and go over it with their parents and have them
and their parents sign it.
We have a short lesson in class on what is “acceptable use”
and “unacceptable use.” The computer teacher also goes over this with students.
Most of the lessons I find on copyright are over my kids’ heads, so I have to water it
down some and adapt it for my 1st graders.
The following websites are great resources
for teaching students about copyright:
www.copyrightkids.org
http://www.cyberbee.com/cb_copyright.swf
http://www.teachingcopyright.org/
Even though my students are young, they are not too immature to be taught
how to distinguish between Internet sites that are reliable and those who are not. I
like to approach this topic early on in the year.
I found a great website, and worked
7. together with our librarian to teach my students four lessons over the course of three
weeks.
I needed a lot of help from my librarian to adapt the information for my
students.
I feel that this is a process that is a school-wide effort, and begins with the
early grade teachers.
The following website even lists some kid friendly sites that are
deemed reliable.
http://www.scholastic.com/teachers/top-teaching/2010/11/reliable-sources-and-citatio
ns
6.
As I said earlier, my students are very young and naïve when it comes to the
Internet. They take what they see at face value.
I have not had any problems with
my students violating the copyright laws or with plagiarism, mostly because the work
they do is supervised. They have not completed major research projects yet in which
they have to cite information.
However, I am now more aware, after reading this
week’s texts, of the importance of teaching students early on about academic honesty.
The reality is that many parents are not aware of copyright infringement and plagiarism.
I think the best way to get this message across to our students is to educate the parents
as well.
I loved the idea from the post about having a parent night to inform parents
about cyber safety issues (Mirtschin, 2008).
for this.
I think the earlier in the year, the better
8. 7.
After reading all the texts this week, I am painfully aware that I need to do more
to protect myself personally online.
information for its credibility.
students about Internet safety.
mind.
I also need to take more time to evaluate
As a teacher, I
am responsible for teaching my
Several ideas from our texts this week stuck out in my
I would like to create an AUP poster stating all the rules and leave it up in my
classroom all year (Mills, 2006).
This would serve as a constant reminder for my
students of what is expected of them.
I also like the idea of purchasing some type of
filtering software that limits personal information students are allowed to put on the
web (Mills, 2006).
Although most of my students do not participate in online chats, I
think it would be a great idea to have a classroom email so that parents and I could
monitor any students discussions online. I would like to coordinate, along with our
librarian,
a Parent Technology Night in which we educate parents about the
importance of Internet safety and copyright laws (Mirtschin, 2008).
benefit our students as well.
I think this would
9. References
Bunyi, A. (2010, November 5). Identifying Reliable Sources and Citing Them.
Retrieved
November 14, 2013, from http://www.scholastic.com/teachers/topteaching/2010/11/reliable-sources-and-citations
Cyber Bee. (2013). Retrieved November 13, 2013, from
http://www.cyberbee.com/cb_copyright.swf
Electric Frontier Foundation. (2013). Retrieved November 13, 2013, from
http://www.teachingcopyright.org/
Hardeman County Schools. Retrieved November 14, 2013, from
http://www.hardemancountyschools.org/bchs/files/Student_Handbook%2020
3%20rev%208-7-13.PDF
Mills, S. (2006). Using the Internet for Active Teaching and Learning.
River, NJ: Pearson.
Upper Saddle
Mirtschin, A. (2008, March 27). Keeping Students Cybersafe. Retrieved November
14,
2013, from http://murcha.wordpress.com/2008/03/27/keeping-studentscybersafe/
The Copyright Society of the USA.
www.copyrightkids.org
(2007).
Retrieved from November 13, 2013 from