Chs digital citizenship orientation 2015Rowan Taigel
This document outlines the key aspects of being a responsible digital citizen according to Cambridge High School. It discusses staying safe online, being ethical and respectful, understanding rights and responsibilities, using technology positively and capably, thinking critically, connecting with others, and participating in educational and cultural activities. Students are asked to get creative and design a visual product representing each category and providing examples of what each aspect looks like in practice.
2 social media awareness for schools tec leadership institutetecleadership
Social Media Awareness Workshops aim to address the challenges presented by technology and reduce cyberbullying. The workshops teach students to use social media responsibly and inform them of the risks of online behavior. Educators are provided strategies to prevent cyberbullying and handle incidents effectively. Workshops include presentations for students on protecting their online reputation and privacy, and recognizing cyberbullying. Educator sessions cover how students use technology, signs of cyberbullying, consequences, and policies and plans for dealing with issues. Workshops are delivered through school assemblies, classroom sessions, half-day educator workshops, and individual leadership meetings.
Expanding our Horizons by Exploring the World Wide WebSheila Dingcong
1) The document discusses guidelines for using the internet safely and effectively for research and communication as part of a school curriculum. It provides examples of search engines and reference websites as well as social networks that can be used.
2) Ethics for research are discussed, including properly citing sources, checking information from multiple sources, and not misquoting or taking information out of context.
3) Additional tips are provided such as protecting privacy, thinking critically about information found online, being careful about anonymity and personal information shared, and overall being smart and safe online.
While the Internet provides many educational and communication benefits, it also poses several dangers, especially for children. The document discusses various online dangers like inappropriate content, scams, and cyberbullying. It emphasizes that both children and parents use the Internet differently, so parents must educate themselves on how children are using it and provide guidance to help them stay safe online. The key is for parents to have open communication with children and to understand that the online world is just as "real" as the physical one.
Breaking down the barriers through social mediaHeidi Siwak
This document discusses various barriers to online learning, including infrastructure issues, resistance to change, lack of expertise, and concerns about reputation, safety, privacy and identity theft in online spaces. It also notes challenges like unpredictability, risk of failure, and ensuring learning is meaningful. Tips are provided on how to behave and protect oneself in online communities. Overall, the document outlines both challenges and opportunities associated with integrating online learning.
This document summarizes a presentation given to middle school parents on digital citizenship and leadership. It discusses how children engage with technology like online gaming, social media, and communication apps. It emphasizes building digital literacy skills through respecting oneself and others online, educating oneself on privacy and safety, and creating content digitally. The presentation stresses having open conversations to help children navigate their digital world, understand privacy, share appropriately, research effectively, communicate efficiently, and be leaders that make positive change through technology. The goal is to prepare students for lives immersed in a digital society.
Chs digital citizenship orientation 2015Rowan Taigel
This document outlines the key aspects of being a responsible digital citizen according to Cambridge High School. It discusses staying safe online, being ethical and respectful, understanding rights and responsibilities, using technology positively and capably, thinking critically, connecting with others, and participating in educational and cultural activities. Students are asked to get creative and design a visual product representing each category and providing examples of what each aspect looks like in practice.
2 social media awareness for schools tec leadership institutetecleadership
Social Media Awareness Workshops aim to address the challenges presented by technology and reduce cyberbullying. The workshops teach students to use social media responsibly and inform them of the risks of online behavior. Educators are provided strategies to prevent cyberbullying and handle incidents effectively. Workshops include presentations for students on protecting their online reputation and privacy, and recognizing cyberbullying. Educator sessions cover how students use technology, signs of cyberbullying, consequences, and policies and plans for dealing with issues. Workshops are delivered through school assemblies, classroom sessions, half-day educator workshops, and individual leadership meetings.
Expanding our Horizons by Exploring the World Wide WebSheila Dingcong
1) The document discusses guidelines for using the internet safely and effectively for research and communication as part of a school curriculum. It provides examples of search engines and reference websites as well as social networks that can be used.
2) Ethics for research are discussed, including properly citing sources, checking information from multiple sources, and not misquoting or taking information out of context.
3) Additional tips are provided such as protecting privacy, thinking critically about information found online, being careful about anonymity and personal information shared, and overall being smart and safe online.
While the Internet provides many educational and communication benefits, it also poses several dangers, especially for children. The document discusses various online dangers like inappropriate content, scams, and cyberbullying. It emphasizes that both children and parents use the Internet differently, so parents must educate themselves on how children are using it and provide guidance to help them stay safe online. The key is for parents to have open communication with children and to understand that the online world is just as "real" as the physical one.
Breaking down the barriers through social mediaHeidi Siwak
This document discusses various barriers to online learning, including infrastructure issues, resistance to change, lack of expertise, and concerns about reputation, safety, privacy and identity theft in online spaces. It also notes challenges like unpredictability, risk of failure, and ensuring learning is meaningful. Tips are provided on how to behave and protect oneself in online communities. Overall, the document outlines both challenges and opportunities associated with integrating online learning.
This document summarizes a presentation given to middle school parents on digital citizenship and leadership. It discusses how children engage with technology like online gaming, social media, and communication apps. It emphasizes building digital literacy skills through respecting oneself and others online, educating oneself on privacy and safety, and creating content digitally. The presentation stresses having open conversations to help children navigate their digital world, understand privacy, share appropriately, research effectively, communicate efficiently, and be leaders that make positive change through technology. The goal is to prepare students for lives immersed in a digital society.
This document provides guidance for staff and students on using social media safely and appropriately. It advises staff to keep personal and professional social media accounts separate and follow school district policies. When using social media, it recommends students and staff use strong passwords, privacy settings, HTTPS, verify friend requests and links, and update accounts regularly. It also warns against sharing passwords or personal information, uploading inappropriate content, or being rude.
This document discusses safe searching and YouTube for kids. It provides information on YouTube's safety mode feature which allows users to filter out mature content. It also discusses the filtering software used at Trinity School, including Webroot and monitoring software. The document emphasizes that parents should talk to their kids about online safety and monitor their internet usage, as filters cannot catch everything and kids can sometimes find ways around them.
This document discusses establishing positive digital footprints and safe searching for elementary school children. It covers age-appropriate social media tools like blogs and wikis that Trinity School uses. It also discusses privacy laws like COPPA and how to make portions of profiles private versus public. Finally, it provides safety tips for social media sites like YouTube, Facebook, Instagram and searching tools like browsers and Google's safe search features. Students and parents with questions should contact the instructional technology specialists.
Technology Boot Camp Internet Safety 2012-13Marsha Harris
This document discusses internet safety for children and what parents can do to support safe internet use at home. It provides an overview of the internet safety curriculum at Trinity School, which teaches students about topics like cyberbullying, inappropriate content, privacy and digital citizenship. The school uses web filtering and monitoring software to promote safe browsing. The document encourages parents to set limits on internet use, install parental controls, and have open conversations about internet safety with their children.
The document provides tips for keeping children safe while using the internet both at school and at home. At school, students have monitored usernames and passwords, limited website access, and are supervised when online. At home, parents are encouraged to spend time with their children online, keep computers in common areas, set basic rules, teach safety strategies, and use parental controls or kid-friendly browsers to filter content and monitor activity.
This document discusses several topics related to digital safety and identity protection. It addresses the types of digital environments and devices people use to access the internet. It also describes the growing problem of identity theft, with over 15 million cases of identity fraud in the US each year resulting in $50 billion in losses. The document provides best practices for staying safe online, such as using strong and unique passwords, keeping software updated, and being cautious about sharing personal information publicly. It stresses the importance of respecting yourself and others, educating yourself on digital safety, and protecting your identity and information when using technology and social media.
This document provides tips and guidelines for staying safe online. It discusses:
- The benefits of the internet but also dangers of sharing personal information or interacting with strangers.
- Specific safety rules like keeping personal information private, using strong passwords, being careful what you post, and downloading only from trusted sources.
- Issues like cyberbullying, protecting your computer, and not meeting people you only know online.
- A reminder that anything posted can be traced back and privacy is an illusion, so be thoughtful about what you share.
This document discusses social media and its pros and cons. It provides statistics on popular social media platforms and their users. Some benefits of social media include staying connected with others, sharing information and resources, and forming online communities. However, risks include identity theft, inappropriate contact from strangers, and information being publicly available forever. The document concludes by offering tips for parents to help children safely navigate social media, such as maintaining open communication, setting guidelines, and using parental controls and content filters.
Dr. Arlines Rodriguez presented on integrating technology for instruction and learning in Maracaibo, Venezuela in 2010. The presentation emphasized using online tools like RSS readers, blogs, digital audio players, VoIP, and collaborative websites, wikis and videos to research information, share knowledge, communicate with others, and create online projects; these tools allow students and teachers to build personal networks and share work with the world.
This document discusses various online risks to computers, families, and personal information. It identifies primary threats to computer security such as viruses, worms, Trojans, and spyware. It also outlines primary online risks for children like cyberbullies, file-sharing abuses, disturbing content, predators, and invasion of privacy. The document recommends talking to kids about online safety, setting rules for internet use, keeping personal information private, and using tools for family safety.
The document discusses using social media effectively for an organization called SVUK. It defines social media as tools for communicating on an individual and mass scale, like email and phones. It notes the shift from Web 1.0, where users passively consumed content, to Web 2.0, where users actively generate content. The document provides examples of how SVUK and individuals can use social media platforms like Twitter, YouTube, and SlideShare to share information, follow experts, and promote their work. It emphasizes using social media in a way that suits one's personality and strengths.
This document provides instructions for making a Google Doc in 8 steps: 1) Open Google Chrome and click Drive, 2) Click on Drive, 3) Double click create, 4) Click Document, 5) A blank document will appear, 6) Click share to save and name the document, 7) Choose who can view the document carefully and do not make it public, 8) Consider digital security and safety when sharing information and whether it could hurt others. The document also discusses how to introduce Google Docs to a class and link it to the curriculum around digital literacy, safety, and appropriate information sharing.
This document provides instructions for making a Google Doc in 8 steps: 1) Open Google Chrome and sign in, 2) Click Drive, 3) Double click Create, 4) Click Document, 5) A blank document will appear, 6) Click Share to save, 7) Name the document and press Save, 8) Choose who can see the document and be careful not to make it public. It also discusses the importance of digital security and citizenship when sharing documents.
Presentation to 5th grade students about Internet Awareness w/ a focus on digital citizenship, privacy, cyberbulling, social media and striking a balance
The document discusses the results of a digital citizenship questionnaire taken by 36 participants. Most participants answered the questions correctly. The questions covered topics like thinking before sharing online, password security, commenting appropriately, protecting private information, and identifying online bullying. Each participant received their results to see how well they understand good digital citizenship practices.
This document discusses connected learning and how digital tools can be used to meet the NETS-T (National Educational Technology Standards for Teachers) in 5 areas. It provides examples of digital tools that teachers can use to facilitate communication and collaboration among students, provide diverse learning resources and assessments, enhance productivity, promote digital citizenship, and support professional growth through personal learning networks. Key digital tools recommended include Google Docs, Edmodo, Khan Academy, Twitter, and Evernote. The document aims to help teachers integrate new digital tools that align with the NETS-T into their practice.
The document discusses the results of a study on the impact of COVID-19 lockdowns on air pollution. Researchers found that lockdowns led to significant short-term reductions in nitrogen dioxide and fine particulate matter pollution globally as human activity declined. However, the impacts on air quality were temporary and pollution levels rebounded once lockdowns were lifted and activity resumed.
A presentation supporting a discussion of incremental self-improvement for the betterment of a school and community. This presentation served in the promotion of a culture of learning.
This document provides guidance for staff and students on using social media safely and appropriately. It advises staff to keep personal and professional social media accounts separate and follow school district policies. When using social media, it recommends students and staff use strong passwords, privacy settings, HTTPS, verify friend requests and links, and update accounts regularly. It also warns against sharing passwords or personal information, uploading inappropriate content, or being rude.
This document discusses safe searching and YouTube for kids. It provides information on YouTube's safety mode feature which allows users to filter out mature content. It also discusses the filtering software used at Trinity School, including Webroot and monitoring software. The document emphasizes that parents should talk to their kids about online safety and monitor their internet usage, as filters cannot catch everything and kids can sometimes find ways around them.
This document discusses establishing positive digital footprints and safe searching for elementary school children. It covers age-appropriate social media tools like blogs and wikis that Trinity School uses. It also discusses privacy laws like COPPA and how to make portions of profiles private versus public. Finally, it provides safety tips for social media sites like YouTube, Facebook, Instagram and searching tools like browsers and Google's safe search features. Students and parents with questions should contact the instructional technology specialists.
Technology Boot Camp Internet Safety 2012-13Marsha Harris
This document discusses internet safety for children and what parents can do to support safe internet use at home. It provides an overview of the internet safety curriculum at Trinity School, which teaches students about topics like cyberbullying, inappropriate content, privacy and digital citizenship. The school uses web filtering and monitoring software to promote safe browsing. The document encourages parents to set limits on internet use, install parental controls, and have open conversations about internet safety with their children.
The document provides tips for keeping children safe while using the internet both at school and at home. At school, students have monitored usernames and passwords, limited website access, and are supervised when online. At home, parents are encouraged to spend time with their children online, keep computers in common areas, set basic rules, teach safety strategies, and use parental controls or kid-friendly browsers to filter content and monitor activity.
This document discusses several topics related to digital safety and identity protection. It addresses the types of digital environments and devices people use to access the internet. It also describes the growing problem of identity theft, with over 15 million cases of identity fraud in the US each year resulting in $50 billion in losses. The document provides best practices for staying safe online, such as using strong and unique passwords, keeping software updated, and being cautious about sharing personal information publicly. It stresses the importance of respecting yourself and others, educating yourself on digital safety, and protecting your identity and information when using technology and social media.
This document provides tips and guidelines for staying safe online. It discusses:
- The benefits of the internet but also dangers of sharing personal information or interacting with strangers.
- Specific safety rules like keeping personal information private, using strong passwords, being careful what you post, and downloading only from trusted sources.
- Issues like cyberbullying, protecting your computer, and not meeting people you only know online.
- A reminder that anything posted can be traced back and privacy is an illusion, so be thoughtful about what you share.
This document discusses social media and its pros and cons. It provides statistics on popular social media platforms and their users. Some benefits of social media include staying connected with others, sharing information and resources, and forming online communities. However, risks include identity theft, inappropriate contact from strangers, and information being publicly available forever. The document concludes by offering tips for parents to help children safely navigate social media, such as maintaining open communication, setting guidelines, and using parental controls and content filters.
Dr. Arlines Rodriguez presented on integrating technology for instruction and learning in Maracaibo, Venezuela in 2010. The presentation emphasized using online tools like RSS readers, blogs, digital audio players, VoIP, and collaborative websites, wikis and videos to research information, share knowledge, communicate with others, and create online projects; these tools allow students and teachers to build personal networks and share work with the world.
This document discusses various online risks to computers, families, and personal information. It identifies primary threats to computer security such as viruses, worms, Trojans, and spyware. It also outlines primary online risks for children like cyberbullies, file-sharing abuses, disturbing content, predators, and invasion of privacy. The document recommends talking to kids about online safety, setting rules for internet use, keeping personal information private, and using tools for family safety.
The document discusses using social media effectively for an organization called SVUK. It defines social media as tools for communicating on an individual and mass scale, like email and phones. It notes the shift from Web 1.0, where users passively consumed content, to Web 2.0, where users actively generate content. The document provides examples of how SVUK and individuals can use social media platforms like Twitter, YouTube, and SlideShare to share information, follow experts, and promote their work. It emphasizes using social media in a way that suits one's personality and strengths.
This document provides instructions for making a Google Doc in 8 steps: 1) Open Google Chrome and click Drive, 2) Click on Drive, 3) Double click create, 4) Click Document, 5) A blank document will appear, 6) Click share to save and name the document, 7) Choose who can view the document carefully and do not make it public, 8) Consider digital security and safety when sharing information and whether it could hurt others. The document also discusses how to introduce Google Docs to a class and link it to the curriculum around digital literacy, safety, and appropriate information sharing.
This document provides instructions for making a Google Doc in 8 steps: 1) Open Google Chrome and sign in, 2) Click Drive, 3) Double click Create, 4) Click Document, 5) A blank document will appear, 6) Click Share to save, 7) Name the document and press Save, 8) Choose who can see the document and be careful not to make it public. It also discusses the importance of digital security and citizenship when sharing documents.
Presentation to 5th grade students about Internet Awareness w/ a focus on digital citizenship, privacy, cyberbulling, social media and striking a balance
The document discusses the results of a digital citizenship questionnaire taken by 36 participants. Most participants answered the questions correctly. The questions covered topics like thinking before sharing online, password security, commenting appropriately, protecting private information, and identifying online bullying. Each participant received their results to see how well they understand good digital citizenship practices.
This document discusses connected learning and how digital tools can be used to meet the NETS-T (National Educational Technology Standards for Teachers) in 5 areas. It provides examples of digital tools that teachers can use to facilitate communication and collaboration among students, provide diverse learning resources and assessments, enhance productivity, promote digital citizenship, and support professional growth through personal learning networks. Key digital tools recommended include Google Docs, Edmodo, Khan Academy, Twitter, and Evernote. The document aims to help teachers integrate new digital tools that align with the NETS-T into their practice.
The document discusses the results of a study on the impact of COVID-19 lockdowns on air pollution. Researchers found that lockdowns led to significant short-term reductions in nitrogen dioxide and fine particulate matter pollution globally as human activity declined. However, the impacts on air quality were temporary and pollution levels rebounded once lockdowns were lifted and activity resumed.
A presentation supporting a discussion of incremental self-improvement for the betterment of a school and community. This presentation served in the promotion of a culture of learning.
A brief presentation explaining the concepts and processes associated with creating a personalized professional development plan and supporting it through digital connections.
This document provides strategies for managing a classroom with a 1:1 student to device environment. It recommends developing student-centered lessons that focus on learning over content and leave no time for off-task behavior. Suggested management strategies include using proximity, timers, and fostering collaboration to influence positive behavior while modeling appropriate technology use. The document also lists signs that may indicate off-task student behavior and considerations for implementing a successful 1:1 classroom.
This document discusses the need for personalized professional development (PD) for educators. It outlines shifts from traditional PD, including moving from isolated to connected learning. Challenges of traditional PD like being unfulfilling and ineffective are highlighted. The benefits of a personalized PD approach through a personal learning network (PLN) are described, including encouraging networked learning, regularly sharing learnings, and engaging with learners on social media. Key aspects of a personalized PD program are recommended, such as creating a digital knowledge base with curated resources and communication tools. Popular PD learning tools including collaboration, communication, and resource curation tools are listed. The document provides examples of using blogs and digital portfolios to reflect on practice and showcase work.
This document promotes the creation of Haiku Deck presentations on SlideShare and includes photos credited to various photographers. It encourages the viewer to get started making their own Haiku Deck presentation by providing a link to do so. The document aims to inspire the viewer to try out Haiku Deck's presentation software.
How to Create Gmail Account - Short Tutorialslenorajohnson
This document provides basic tutorials for beginners on using Gmail accounts, including how to send emails to multiple people, insert Google Drive files into emails, and invite people to chat in Gmail. It encourages readers who are struggling to use their Gmail accounts to visit Shorttutorials.com for step-by-step instructions and screenshots showing how to perform common Gmail tasks.
The presentation discusses emerging literacies and argues that school curriculum mus tbe revised to teach students to manage information, make meaning from multimodal text and represent knowledge and information. The session also introduces an idea of social networking literacy.
Responsible Use of Social Media in the PhilippinesWoManila
The document discusses the results of a study on the impact of COVID-19 lockdowns on air pollution. Researchers found that lockdowns led to significant short-term reductions in nitrogen dioxide and fine particulate matter pollution globally as transportation and industrial activities declined substantially. However, the document notes that the improvements in air quality were temporary and pollution levels rose back to pre-pandemic levels as restrictions eased and activity increased again.
Social Media Etiquette for the College StudentLiz Jostes
The document discusses social media etiquette and best practices for professionals. It covers that recruiters and hiring managers are actively using social media to research candidates. They may find inappropriate content that could cause them to not hire a candidate such as photos with drinking or drugs. However, social media can also be used positively to showcase qualifications and build networks. The document provides tips for social media profiles such as using a professional photo and complete profiles across platforms. It also recommends privacy settings and being cautious of anything posted online since content is permanent.
To create a Gmail account, go to Gmail.com and follow the sign up process. Once complete, you will have successfully made a Gmail account. The next suggested step is to learn how to use the blogging platform Blogger.
1) The document discusses strategies for using social media for Rotaract clubs, including determining the audience, developing a content strategy, and selecting appropriate platforms.
2) It recommends starting with a SWOT analysis and setting goals, then focusing content on the club calendar, projects, and themes like Rotary and UN initiatives.
3) The presenter advocates sharing 80% existing content and creating 20% original posts, and designating one member per month to manage each platform as part of a long-term social media plan.
Creating a Gmail Account involves the following steps:
1) Go to Google and click on the Gmail tab to access the sign up page. Fill in your first name, last name, and choose a unique username.
2) Select a password that is easy to remember and re-enter it to verify. Also choose a security question and answer.
3) Provide your birthdate in MM/DD/YYYY format and type the letters displayed to verify that you are not a robot. Finally, accept the terms and conditions to complete sign up.
The document provides an overview of Facebook, including:
1) Its origins from Facemash at Harvard and launch as "The Facebook" which was later shortened to just "Facebook".
2) Details on its founder Mark Zuckerberg and initial growth among Harvard students before expanding to other schools.
3) Descriptions of Facebook's features, financial information, reception and controversies over privacy and other issues.
4) Explanations of lawsuits and legal issues faced by Facebook regarding intellectual property and privacy concerns.
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Arniel Ping
Media and Information Literacy (MIL) Legal, Ethical, and Societal Issues in Media and Information (Part 1)
Topics:
1. Intellectual Property in International
and Local Context
2. Fair Use and Creative Commons
LEARNING COMPETENCIES:
1. explain intellectual property and its different types (SSHS);
2. explain copyright, fair use, etc.vis-a-vis human rights (MIL11/12LESI-IIIg20);
3. discuss current issues related to copyright vis-à-vis gov’t./provide sectors actions (MIL11/12LESI-IIIg21);
4. put into practice their understanding of the intellectual property, copy right, and fair use guidelines (MIL11/12LESI-IIIg17); and
5. explain actions to promote ethical use of media and information (MIL11/12LESI-IIIg22);
This document provides an introduction to the social networking site Facebook, including instructions for creating an account, personalizing a profile, and using features like friend requests and messaging. It covers the basics of setting up an account, filling out profile information, adjusting privacy settings, and connecting with other users through friend requests and groups. The key points are that Facebook has over 400 million active users who spend over an hour per day on average on the site, and that personalizing a profile, understanding privacy settings, and managing connections with other users are important aspects of using the platform.
Facebook is a social networking website that connects people around the world who share common interests. It was founded by Mark Zuckerberg in 2004 while he was a student at Harvard University. Facebook allows users to share updates, photos, and messages with friends, family and connections. It has grown tremendously and is now one of the largest social networks in the world with billions of users and revenue in the billions of dollars.
How You Can Use Social Media - What's Your Small Step Going to Be?Brittany Smith
This document discusses using social media and provides tips for businesses. It notes that social media has become widespread, with nearly 80% of internet users in the US using social networks or blogs. It also states that half of American adults now use social networking sites. The document then discusses challenges of using social media, such as lack of time or skills. It proposes creating a "content management machine" using tools like Buffer, Tweet Deck and Hoot Suite to schedule social media posts. Businesses are encouraged to start small, such as setting up social media profiles, to begin using social media.
Social media is a computer-based technology that allows users to share content and interact online. There are many different types of social media platforms including Facebook, Instagram, Twitter, YouTube, Google+, and Pinterest. Social media has several important uses such as staying connected with friends and family, learning about current events and news, and promoting businesses and building brands. However, there are also disadvantages like cyberbullying, hacking, addiction, and spreading of fake news. It is important to use social media safely by having strong passwords, customizing privacy settings, and only sharing information with trusted connections.
The role of social media in our personal lifeArnob Khan
The document presents information on the role of social media in personal life. It discusses what social media is, common social media platforms, how it impacts personal life both positively and negatively. The positive impacts include social media enabling education and business opportunities. However, it can also be addictive, trigger sadness from social comparisons, and enable cyberbullying. Moderation is key to harnessing benefits while avoiding negatives.
The document discusses social media, including its definition, history, popular platforms, and effects on youth. It provides statistics on platforms like Facebook, Twitter, YouTube, and WhatsApp. Both positive and negative effects are outlined. Positives include connecting with others and sharing information, while negatives include technology overuse, distraction from schoolwork, and risks like cyberbullying. The document concludes by emphasizing the need for internet safety education for youth.
This document discusses the rise of social media and its implications for schools and teachers. Some key points:
- Social media use is widespread, with over 150 million US adults using the internet daily and 55% going online for political news in 2008. 45% of employers use social media to research candidates.
- Social media allows people to get information and connect with each other outside of traditional institutions. Platforms like Facebook, Twitter, blogs and YouTube are discussed.
- Schools and teachers should thoughtfully consider how to use social media to connect with communities while also addressing risks like improper sharing of information or photos by teachers that could lead to disciplinary action.
- Maintaining separate professional and personal social media profiles and
Security and Privacy in Social Networks.pptxSIMNchannel
Social networks allow users to connect and share information online. However, they also present security and privacy risks. It is important to understand a site's privacy settings and use strong passwords to protect information. While social media has benefits like staying connected with others, users should be aware of potential threats like identity theft and careful not to share too many personal details publicly. Regularly updating privacy settings and practicing safe online habits can help users reap the benefits of social platforms while mitigating risks to their security and privacy.
Although contradictory in its title, this post does bring to light something I have recently been thinking about: ‘How private can you be on social networks?‘ I have a wide variety of social media accounts and use a huge list of tools in order to perform my daily activities effectively and efficiently.
Advantages and Disadvantages Of Social MediaDilna DV
This document discusses the advantages and disadvantages of social media. It begins with defining social media as websites and apps that allow users to create and share content or participate in social networking. Some key advantages mentioned are worldwide connectivity, finding people with common interests, and its use as a promotional tool. Disadvantages include cyberbullying, risks of fraud and identity theft due to lack of privacy controls, addiction, and negative impacts on family relationships and student motivation. The document concludes that social media can be beneficial if used wisely, but individuals must take responsibility for their own safety when sharing personal information online.
This document outlines some key aspects of social networking including popular platforms, advantages, and disadvantages. It discusses how social networking allows worldwide connectivity and real-time information sharing, but also poses higher risks of cyberbullying, fraud, and identity theft due to privacy issues. The conclusion acknowledges that social networks can be helpful if used wisely, but harmful if too much personal information is shared or time is spent unnecessarily.
This document discusses managing your digital identity online. It begins by defining digital identity and noting that everyone has an online presence and footprint. It then discusses verifying identities online and the challenges of doing so. It outlines some of the risks of having your identity stolen online. The document then discusses managing personal versus professional identities on social media and challenges the idea that anyone is truly anonymous online. It provides examples of legal issues that can arise from improper social media use and shares tips for maintaining privacy and managing one's online reputation.
Seminar presented by Ellie Stringer and Merel van Dijke to A level students in Canary Wharf. - See more at: http://blog.soton.ac.uk/digichamps/living-and-learning-on-the-web-bmooweb/
This document discusses social media and productivity among Generation 2.0. It defines Generation 2.0 as those born after 1997 who have grown up in the digital world and are expected to construct their identity, manage privacy, connect with friends, and collaboratively work with information online. The document provides statistics on internet, social media, and mobile usage globally and discusses how Generation 2.0 uses technology and digital tools. It also examines case studies on how social media has impacted credit worthiness, work, political uprisings, and banking and discusses maintaining digital ethics and avoiding social media addiction.
This document discusses the dangers of social media use, particularly for teenagers. It begins by providing background on social media and its prevalence. It then outlines some potential benefits but also many risks, including exposure to inappropriate content, risky behaviors due to poor judgment, cyberbullying, interacting with strangers, erosion of privacy, distorted perceptions of relationships, lack of sleep, wasting time, exposure to toxic online cultures, and various long-term psychological risks like depression, decreased empathy, underdeveloped social skills, inability to focus, and low frustration tolerance. It concludes by providing tips for parents to help navigate these risks, such as understanding triggers for overuse and setting appropriate boundaries.
Hello Guy's Here The Advantage and Disadvantages of Social Netwoking .
Social media Challenges and Advantage.
Social media bad or good.
pros and cons social media .
Information and communication technology has changed rapidly over the past 20 years with a key development being the emergence of social media.
The pace of change is accelerating. For example, the development of mobile technology has played an important role in shaping the impact of social media. Across the globe, mobile devices dominate in terms of total minutes spent online. This puts the means to connect anywhere, at any time on any device in everyone’s hands.
This document discusses social networking usage among teenagers and whether it can lead to addiction. It provides pros and cons of social networking, including interviews with a teacher and student about positive and negative impacts. Key social networking sites mentioned are Facebook, Twitter, and Google. The top concerns discussed are lack of privacy, spreading of false information, and cyberbullying on social media platforms.
This document discusses social networking usage among teenagers and whether it can lead to addiction. It provides pros and cons of social networking, including interviews with two people discussing positive and negative impacts. The top three social networking sites mentioned are Facebook, Twitter, and Tumblr. Issues raised include lack of privacy, spreading of misinformation, and cyberbullying on social media platforms.
How to Setup Default Value for a Field in Odoo 17Celine George
In Odoo, we can set a default value for a field during the creation of a record for a model. We have many methods in odoo for setting a default value to the field.
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.pptHenry Hollis
The History of NZ 1870-1900.
Making of a Nation.
From the NZ Wars to Liberals,
Richard Seddon, George Grey,
Social Laboratory, New Zealand,
Confiscations, Kotahitanga, Kingitanga, Parliament, Suffrage, Repudiation, Economic Change, Agriculture, Gold Mining, Timber, Flax, Sheep, Dairying,
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...indexPub
The recent surge in pro-Palestine student activism has prompted significant responses from universities, ranging from negotiations and divestment commitments to increased transparency about investments in companies supporting the war on Gaza. This activism has led to the cessation of student encampments but also highlighted the substantial sacrifices made by students, including academic disruptions and personal risks. The primary drivers of these protests are poor university administration, lack of transparency, and inadequate communication between officials and students. This study examines the profound emotional, psychological, and professional impacts on students engaged in pro-Palestine protests, focusing on Generation Z's (Gen-Z) activism dynamics. This paper explores the significant sacrifices made by these students and even the professors supporting the pro-Palestine movement, with a focus on recent global movements. Through an in-depth analysis of printed and electronic media, the study examines the impacts of these sacrifices on the academic and personal lives of those involved. The paper highlights examples from various universities, demonstrating student activism's long-term and short-term effects, including disciplinary actions, social backlash, and career implications. The researchers also explore the broader implications of student sacrifices. The findings reveal that these sacrifices are driven by a profound commitment to justice and human rights, and are influenced by the increasing availability of information, peer interactions, and personal convictions. The study also discusses the broader implications of this activism, comparing it to historical precedents and assessing its potential to influence policy and public opinion. The emotional and psychological toll on student activists is significant, but their sense of purpose and community support mitigates some of these challenges. However, the researchers call for acknowledging the broader Impact of these sacrifices on the future global movement of FreePalestine.
1. Social Media in Schools
Best practices for safe and effective learning
through social networking.
Robert Schuetz
2013 - 2014
2. What is social media?
Social media refers to the means of interactions among
people in which they create, share, and/or exchange
information and ideas in virtual communities and networks.
What are your favorite online activities, and why?
Can you identify these popular social media trademarks?
3. Why learn about social
media?
●
●
●
●
●
●
●
96% of the Millennials belong to a social network.
YouTube has the 2nd largest search engine in the world. Over 100 hours of
video will be uploaded by the time you finish reading this slide.
If Facebook were a country, it would be the 3rd largest in the world.
80% of U.S. companies use social media for recruitment. 95% of those are
using LinkedIn.
Users downloaded 1 billion iTunes store apps in first 9 months.
There are over 200 billion blogs. Word of mouth has been replaced by word of
blog.
1 in 8 couples married in the U.S. met through social media.
4 Reasons Why Social Media Should be Taught in Schools - Huffington Post
Trending Reasons to Teach Social Media in Schools - Getting Smart
Social Media Use in Schools - Best Masters in Education
4. Social Media in action - “What
does Chris Kutcher find sexy?”
What is Ashton Kutcher asking of teens?
5. Responsible use of social
media
1.
What do you consider your personal information?
2.
Why is it important to keep personal information private?
●
Think before you post. All information shared on the Internet is accessible to
potentially billions of users.
●
Your digital footprint (everything shared on the Internet) is permanent.
What’s Your Digital Footprint?
●
Sharing your full name and birthdate is enough information for someone to
steal your identity. Be careful not to reveal too much personal information.
●
Social profiles are checked by ¾ of all hiring agencies. A damaged reputation
is hard to overcome. The Risks of Posting in Social Networks
6. Responsible use of social
media
●
Build a positive brand. Your digital footprint should represent the best of who
you are. Common Sense Media - Digital Footprint
●
Use social media to curate information that you can store and improve upon at
a later date.
●
Use social media to share personal creations, creative expressions and ideas.
●
Use social media to build relevance with authentic audiences.
●
Use social media to build a network of support.
●
Using social media to gain strength in numbers is called crowd sourcing.
7. Email, Chat Rooms, and IM
1.
Do you use IM or chat rooms to talk to your friends and others?
2.
Do you know the real identities of everyone in your “buddy” list?
●
Email - Teens use text messaging (SMS) more popular than electronic mail.
Email addresses are often necessary for joining social networking sites such as
Facebook or Twitter. Email messages can contain viruses, scams, and
inappropriate material. Students should be wary of messages from strangers.
●
Chat Rooms - are online hangouts where conversations can be far-ranging.
Users may, or may not, know each other “in real life”. Chat rooms, particularly
one-on-one conversations are favorite hunting grounds for online predators.
Students should not share personal information with strangers.
●
Instant Messaging (IM) - allows the exchange of real time messages. Since
accounts can be created anonymously it is difficult to identify the messenger.
8. Social Networking Activities
1. Google Yourself Challenge
2. NetSmartz - Making Safe Choices (Games)
3. Internet Safety Hangman - Quia
4. Internet Safety Quiz for HS Students - Mentor Mob
5. Internet Safety Pledge - NetSmartz
6. Create & share an Internet safety PSA
PSA Example
9. References and Resources
● NetSmartz Workshop
● Common Sense Media
● Pew Internet
● iSafe.org
● Google Family Safety Center
● Schoology Internet Safety Group