Presentation given by Sangeet Bhullar, Executive Director of WISE KIDS at the International Conference on “Children in ICT" on the 27th and 28th October in Gijón (Spain).
The document discusses strategies for engaging digital natives. It notes that digital natives assert their identity and personalize their lives online. They view the online world as their habitat to be creative and pull resources from. While creating and sharing content online, digital natives must also consider their safety, privacy, and responsible advocacy in the digital world. The document proposes a strategy framework for libraries to engage, enrich, and empower virtual users by supporting their digital identities, creativity, sharing of information, safety, opportunities, and advocacy online.
Keynote presentation for Conference: Vounteering in a Digital Age Sangeet Bhullar
The document discusses the opportunities and challenges of digital citizenship in the 21st century. It notes that internet and digital technologies are transforming how people access information, learn, interact, and socialize. While these changes provide many benefits, they also pose risks regarding privacy, control, and digital literacy that organizations and individuals must navigate. The document provides an overview of key topics around social media use, viral content, legal issues, and strategies for non-profits to leverage digital tools while mitigating risks.
This document discusses the importance of teaching students how to learn and be curious, rather than just teaching lessons, in order to promote lifelong learning. It also notes that teaching students the same way as in the past limits their future opportunities. Different types of computers are suitable for children at different skill levels. The document advocates for not restricting children's learning to a teacher's own experiences and for replacing teachers who cannot adapt to new technologies. It identifies various online risks for children and suggests parents monitor who their children interact with online. Better teacher training and keeping teachers up-to-date on technologies is recommended to help children safely use the internet.
The document discusses re-thinking learning for the 21st century. It outlines how technology and ICT developments have transformed learning over the past century. These include the evolution from film and television to today's personalized mobile devices and cloud computing. The document also discusses how 21st century learners and skills have changed, requiring new approaches like collaborative and creative learning. Emerging tools and trends in online and mobile learning are presented, as well as frameworks for 21st century learning.
Dr. Steve Yuen, The Future of Digital Learning, A presentation delivered at the Division of Information and Communication Technology for Education, King Mongkut's University of Technology North Bangkok, Bangkok, Thailand, September 11, 2012
The document discusses emerging technologies in the 21st century and their impact on education. It covers topics like the digital divide, use of multimedia in classrooms, professional development for teachers, emerging national education services, and emerging technologies. The document predicts that emerging technologies will transform learning environments, content delivery, assessment, and more over the coming decades.
Elearning session for Secondary PGCE and GTP traineeswkidd
This document discusses the use of technology to enhance teaching and learning. It introduces concepts like digital natives, digital immigrants, and the flipped classroom. It also discusses challenges around integrating new technologies without proper pedagogical guidance. Key terms related to e-learning and web tools are defined. Throughout, it emphasizes the importance of pedagogy over technology when incorporating new tools into teaching.
The document discusses strategies for engaging digital natives. It notes that digital natives assert their identity and personalize their lives online. They view the online world as their habitat to be creative and pull resources from. While creating and sharing content online, digital natives must also consider their safety, privacy, and responsible advocacy in the digital world. The document proposes a strategy framework for libraries to engage, enrich, and empower virtual users by supporting their digital identities, creativity, sharing of information, safety, opportunities, and advocacy online.
Keynote presentation for Conference: Vounteering in a Digital Age Sangeet Bhullar
The document discusses the opportunities and challenges of digital citizenship in the 21st century. It notes that internet and digital technologies are transforming how people access information, learn, interact, and socialize. While these changes provide many benefits, they also pose risks regarding privacy, control, and digital literacy that organizations and individuals must navigate. The document provides an overview of key topics around social media use, viral content, legal issues, and strategies for non-profits to leverage digital tools while mitigating risks.
This document discusses the importance of teaching students how to learn and be curious, rather than just teaching lessons, in order to promote lifelong learning. It also notes that teaching students the same way as in the past limits their future opportunities. Different types of computers are suitable for children at different skill levels. The document advocates for not restricting children's learning to a teacher's own experiences and for replacing teachers who cannot adapt to new technologies. It identifies various online risks for children and suggests parents monitor who their children interact with online. Better teacher training and keeping teachers up-to-date on technologies is recommended to help children safely use the internet.
The document discusses re-thinking learning for the 21st century. It outlines how technology and ICT developments have transformed learning over the past century. These include the evolution from film and television to today's personalized mobile devices and cloud computing. The document also discusses how 21st century learners and skills have changed, requiring new approaches like collaborative and creative learning. Emerging tools and trends in online and mobile learning are presented, as well as frameworks for 21st century learning.
Dr. Steve Yuen, The Future of Digital Learning, A presentation delivered at the Division of Information and Communication Technology for Education, King Mongkut's University of Technology North Bangkok, Bangkok, Thailand, September 11, 2012
The document discusses emerging technologies in the 21st century and their impact on education. It covers topics like the digital divide, use of multimedia in classrooms, professional development for teachers, emerging national education services, and emerging technologies. The document predicts that emerging technologies will transform learning environments, content delivery, assessment, and more over the coming decades.
Elearning session for Secondary PGCE and GTP traineeswkidd
This document discusses the use of technology to enhance teaching and learning. It introduces concepts like digital natives, digital immigrants, and the flipped classroom. It also discusses challenges around integrating new technologies without proper pedagogical guidance. Key terms related to e-learning and web tools are defined. Throughout, it emphasizes the importance of pedagogy over technology when incorporating new tools into teaching.
Advances in technology have changed the way learning and instruction are carried out. Formal and informal learning are blending, with students now learning 80% informally. Learners today have new literacies and need teachers with 21st century skills who are computer-savvy, creative, critical thinkers and good communicators. New tools like podcasts, videocasts, mind maps and online editors are supporting more personalised, visual, collaborative and hands-on styles of learning.
The document discusses opportunities and challenges of mobile learning for open and distance learning. It summarizes that after a decade of understanding e-learning and blended learning, mobile or m-learning is now prevalent with the ubiquity of mobile devices. However, adopting mobile learning presents both opportunities like portable access to education materials as well as challenges from developing new mobile-friendly educational content and infrastructure. The document advocates transforming learning from traditional "push" models to ones where students can learn on demand through "pull" approaches enabled by new mobile technologies.
The document appears to be a presentation on media innovation and the future of digital advertising. It discusses concepts like tracking consumers across different devices and media, measuring the impact and flow of digital advertising, targeting consumers with addressable ads, and improving ad quality and metrics to maximize effectiveness. It also references challenges like distinguishing accidental clicks from genuine interest and ensuring ads reach the right audience.
Bryce biggs talk to trainers network finalBryce Biggs
This presentation deals with social learning and social media and the possible use of social learning tools to enhance employee engagement. It was presented to public service
This document discusses various online tools for learning including blogging, Twitter, web-based courses, infographics, copyright issues, sharing knowledge, podcasts, and connecting with others. It reflects on the author's experiences using these tools and how they provide new ways for students to learn and reflect. The author emphasizes the importance of getting involved, sharing knowledge, and expanding one's network through online connections.
Ideas for Vancouver Secondary Schools - Technology for Learning [Dec2012]Brian Kuhn
Sharing ideas with Vancouver School Board secondary school teachers, principals to assist with envisioning uses of technology, professional learning, types of technology for learning, planning, and implementing.
Real World: Customer Edition Panel "Stories about Social Computing Deployment"Enterprise 2.0 Conference
The document summarizes presentations from several organizations on using social computing and knowledge management tools:
1) Electronic Arts discussed using Microsoft SharePoint to create an internal social network, knowledge base, and search tools to enhance collaboration, engage employees, drive innovation and increase productivity.
2) The Minnesota Department of Education launched a social networking website called getSTEM to connect teachers and students with local STEM businesses and volunteers to promote STEM education from nation-leading to world-competing.
3) The US Army discussed using a social network called MilSpace to help develop leadership skills by allowing commanders to connect, share experiences and lessons learned, and learn from gaming simulations.
4) Battelle uses SharePoint for
The document discusses how technology can create social isolation and neurosis. It provides statistics showing that technology reduces in-person interactions and lowers reliance on spouses for discussions. While technology has benefits like convenience and access to information, overuse can be problematic as it replaces face-to-face social interactions. Different technologies are examined like smartphones, video games, social media, television, and self-serve machines, with both pros and cons discussed for each. The conclusion is that technology overuse and addiction can lead to isolation and mental health issues, so moderation and balance is important.
The document discusses a parent workshop on cyber bullying held at the International School of Tanganyika. It defines cyber bullying as the use of technology to deliberately harm or harass others. The workshop aims to educate parents on the differences between traditional bullying and cyber bullying, which can be anonymous and constant. Videos are shown depicting a case of cyber bullying and a mother's perspective on the issue. Parents discuss how their children currently interact online and ways to protect them from cyber bullying through privacy settings and monitoring their activities on social media.
The 16th Annual International Conference focused on harnessing Web 2.0 for education. The conference objectives were to reflect on educational uses of Web 2.0, how it can transform education, and exchange best practices. Web 2.0 tools like blogs, wikis, social bookmarking, media sharing, and social networking were discussed. Benefits of Web 2.0 in education included motivating and engaging students through interactive learning, collaboration, and flexibility. The conference concluded with ways educators can start using Web 2.0 through exploring, commenting, and contributing online content.
The social Web is changing how we connect and collaborate, but it's not all about tools and technology. What are the human needs driving this transformation, and how can we make online choices that will most benefit our life communities: personal, professional, and civic?
Web 2.0 has enabled new forms of social interaction and user participation online. This has changed how people share information and experiences. Early internet platforms in the 1980s like Usenet allowed people to share text-based information but had limitations. The rise of the World Wide Web in the 1990s made it easier to set up websites focused on specific interests, and discussion forums became popular areas for sharing experiences and expertise within communities.
This document discusses how to protect yourself in the cyber world. It begins by outlining how connectivity has evolved over time, from connecting people to information in the 1990s to connecting everything today. It then describes characteristics of cyberspace such as its intangibility, disregard for national boundaries, and potential for anonymity. The document goes on to discuss online predators, cyberbullying, pornography, hackers, and digital piracy as threats in cyberspace. It provides tips on how to avoid these threats, such as not sharing personal information online, being wary of anonymous messages, and not downloading or uploading copyrighted content without permission. The goal is to educate people on potential dangers in the digital world and how to stay safe.
Updated: Design beyond the glowing rectangle (Polish IA Summit 2011)Claire Rowland
The document discusses how the internet of things will impact UX designers. It begins by noting that most interactions still involve screens but objects are becoming interconnected. This will require designing experiences that involve not just screens but physical objects and services across platforms. The document outlines some key challenges this presents for UX designers, such as relationships between devices, services, and data becoming more complex. It suggests designers will need to consider cohesion across experiences, interfaces, and platforms.
The document discusses the topic of online communities and the role of technology in community formation. It explores whether online connections can constitute communities or are simply networks. While some argue online interactions cannot replace face-to-face communities, others believe technology allows isolated individuals to connect in meaningful ways and form communities. The document also examines different tools that can help build and support online communities.
Cyber safety & Social Media - Penguin 2012Corrie Barclay
This document discusses the use of social media for secondary students and challenges schools face. It notes that today's students are digital natives who enjoy social interaction online. While social media allows self-expression, it also poses risks like cyberbullying, sexting, and loss of privacy if overshared. Schools can help students become responsible digital citizens by educating them about these issues, modeling best practices, and discussing the legal and ethical use of online content and platforms. Embracing appropriate social media use in schools themselves can help address these challenges.
The document discusses why CIOs and other executives must learn to deal with social media. It notes that social media is changing how people live, work and get information. It argues that companies cannot ignore social media and that executives should create a social media plan to help their organizations understand and leverage social media opportunities rather than seeing it as a threat. The plan should include creating awareness, defining goals and strategies, finding internal champions, establishing policies and rolling out managed social media projects.
The document provides a history of computers and their use in education from ancient counting methods to modern technologies. It describes how computers have evolved from early calculation devices like the abacus to the 5th generation computers of today with features like artificial intelligence and voice recognition. It also discusses how the internet and educational technologies have revolutionized learning by providing interactive activities, online resources, and new models for instruction catering to different learning styles. The future sections speculate on developing technologies and their potential impacts on education and teaching.
The document discusses young people's use of the internet, opportunities and challenges. It summarizes a survey of 11-12 year olds' internet and mobile phone use, understanding of internet safety, and experiences like receiving rude messages. It emphasizes the need to teach digital literacy and safety skills to help young people navigate public online spaces and make informed decisions.
Advances in technology have changed the way learning and instruction are carried out. Formal and informal learning are blending, with students now learning 80% informally. Learners today have new literacies and need teachers with 21st century skills who are computer-savvy, creative, critical thinkers and good communicators. New tools like podcasts, videocasts, mind maps and online editors are supporting more personalised, visual, collaborative and hands-on styles of learning.
The document discusses opportunities and challenges of mobile learning for open and distance learning. It summarizes that after a decade of understanding e-learning and blended learning, mobile or m-learning is now prevalent with the ubiquity of mobile devices. However, adopting mobile learning presents both opportunities like portable access to education materials as well as challenges from developing new mobile-friendly educational content and infrastructure. The document advocates transforming learning from traditional "push" models to ones where students can learn on demand through "pull" approaches enabled by new mobile technologies.
The document appears to be a presentation on media innovation and the future of digital advertising. It discusses concepts like tracking consumers across different devices and media, measuring the impact and flow of digital advertising, targeting consumers with addressable ads, and improving ad quality and metrics to maximize effectiveness. It also references challenges like distinguishing accidental clicks from genuine interest and ensuring ads reach the right audience.
Bryce biggs talk to trainers network finalBryce Biggs
This presentation deals with social learning and social media and the possible use of social learning tools to enhance employee engagement. It was presented to public service
This document discusses various online tools for learning including blogging, Twitter, web-based courses, infographics, copyright issues, sharing knowledge, podcasts, and connecting with others. It reflects on the author's experiences using these tools and how they provide new ways for students to learn and reflect. The author emphasizes the importance of getting involved, sharing knowledge, and expanding one's network through online connections.
Ideas for Vancouver Secondary Schools - Technology for Learning [Dec2012]Brian Kuhn
Sharing ideas with Vancouver School Board secondary school teachers, principals to assist with envisioning uses of technology, professional learning, types of technology for learning, planning, and implementing.
Real World: Customer Edition Panel "Stories about Social Computing Deployment"Enterprise 2.0 Conference
The document summarizes presentations from several organizations on using social computing and knowledge management tools:
1) Electronic Arts discussed using Microsoft SharePoint to create an internal social network, knowledge base, and search tools to enhance collaboration, engage employees, drive innovation and increase productivity.
2) The Minnesota Department of Education launched a social networking website called getSTEM to connect teachers and students with local STEM businesses and volunteers to promote STEM education from nation-leading to world-competing.
3) The US Army discussed using a social network called MilSpace to help develop leadership skills by allowing commanders to connect, share experiences and lessons learned, and learn from gaming simulations.
4) Battelle uses SharePoint for
The document discusses how technology can create social isolation and neurosis. It provides statistics showing that technology reduces in-person interactions and lowers reliance on spouses for discussions. While technology has benefits like convenience and access to information, overuse can be problematic as it replaces face-to-face social interactions. Different technologies are examined like smartphones, video games, social media, television, and self-serve machines, with both pros and cons discussed for each. The conclusion is that technology overuse and addiction can lead to isolation and mental health issues, so moderation and balance is important.
The document discusses a parent workshop on cyber bullying held at the International School of Tanganyika. It defines cyber bullying as the use of technology to deliberately harm or harass others. The workshop aims to educate parents on the differences between traditional bullying and cyber bullying, which can be anonymous and constant. Videos are shown depicting a case of cyber bullying and a mother's perspective on the issue. Parents discuss how their children currently interact online and ways to protect them from cyber bullying through privacy settings and monitoring their activities on social media.
The 16th Annual International Conference focused on harnessing Web 2.0 for education. The conference objectives were to reflect on educational uses of Web 2.0, how it can transform education, and exchange best practices. Web 2.0 tools like blogs, wikis, social bookmarking, media sharing, and social networking were discussed. Benefits of Web 2.0 in education included motivating and engaging students through interactive learning, collaboration, and flexibility. The conference concluded with ways educators can start using Web 2.0 through exploring, commenting, and contributing online content.
The social Web is changing how we connect and collaborate, but it's not all about tools and technology. What are the human needs driving this transformation, and how can we make online choices that will most benefit our life communities: personal, professional, and civic?
Web 2.0 has enabled new forms of social interaction and user participation online. This has changed how people share information and experiences. Early internet platforms in the 1980s like Usenet allowed people to share text-based information but had limitations. The rise of the World Wide Web in the 1990s made it easier to set up websites focused on specific interests, and discussion forums became popular areas for sharing experiences and expertise within communities.
This document discusses how to protect yourself in the cyber world. It begins by outlining how connectivity has evolved over time, from connecting people to information in the 1990s to connecting everything today. It then describes characteristics of cyberspace such as its intangibility, disregard for national boundaries, and potential for anonymity. The document goes on to discuss online predators, cyberbullying, pornography, hackers, and digital piracy as threats in cyberspace. It provides tips on how to avoid these threats, such as not sharing personal information online, being wary of anonymous messages, and not downloading or uploading copyrighted content without permission. The goal is to educate people on potential dangers in the digital world and how to stay safe.
Updated: Design beyond the glowing rectangle (Polish IA Summit 2011)Claire Rowland
The document discusses how the internet of things will impact UX designers. It begins by noting that most interactions still involve screens but objects are becoming interconnected. This will require designing experiences that involve not just screens but physical objects and services across platforms. The document outlines some key challenges this presents for UX designers, such as relationships between devices, services, and data becoming more complex. It suggests designers will need to consider cohesion across experiences, interfaces, and platforms.
The document discusses the topic of online communities and the role of technology in community formation. It explores whether online connections can constitute communities or are simply networks. While some argue online interactions cannot replace face-to-face communities, others believe technology allows isolated individuals to connect in meaningful ways and form communities. The document also examines different tools that can help build and support online communities.
Cyber safety & Social Media - Penguin 2012Corrie Barclay
This document discusses the use of social media for secondary students and challenges schools face. It notes that today's students are digital natives who enjoy social interaction online. While social media allows self-expression, it also poses risks like cyberbullying, sexting, and loss of privacy if overshared. Schools can help students become responsible digital citizens by educating them about these issues, modeling best practices, and discussing the legal and ethical use of online content and platforms. Embracing appropriate social media use in schools themselves can help address these challenges.
The document discusses why CIOs and other executives must learn to deal with social media. It notes that social media is changing how people live, work and get information. It argues that companies cannot ignore social media and that executives should create a social media plan to help their organizations understand and leverage social media opportunities rather than seeing it as a threat. The plan should include creating awareness, defining goals and strategies, finding internal champions, establishing policies and rolling out managed social media projects.
The document provides a history of computers and their use in education from ancient counting methods to modern technologies. It describes how computers have evolved from early calculation devices like the abacus to the 5th generation computers of today with features like artificial intelligence and voice recognition. It also discusses how the internet and educational technologies have revolutionized learning by providing interactive activities, online resources, and new models for instruction catering to different learning styles. The future sections speculate on developing technologies and their potential impacts on education and teaching.
The document discusses young people's use of the internet, opportunities and challenges. It summarizes a survey of 11-12 year olds' internet and mobile phone use, understanding of internet safety, and experiences like receiving rude messages. It emphasizes the need to teach digital literacy and safety skills to help young people navigate public online spaces and make informed decisions.
The document discusses three technological trends - Moore's Law, Metcalfe's Law, and Maxwell's Law - that are "rebooting the world" and driving changes across generations from Baby Boomers to the digital native Generation Y. It explores how each generation interacts with technology differently and has varying workplace expectations. Examples are given of new technologies like social networks, cloud computing, and wireless connectivity that are shaping our increasingly digital world.
The document discusses three technological trends - Moore's Law, Metcalfe's Law, and Maxwell's Law - that are "rebooting the world". It then covers topics like ubiquitous computing with chips everywhere, the evolution of the internet from Web 1.0 to 3.0, social media and networks, different generations including digital natives and how technology usage has changed between generations. The document advocates considering diversity in perspectives and brainstorming scenarios to plan for social media initiatives.
The document discusses the history and rise of Web 2.0 and user-generated online content. It describes how Web 2.0 allows users to actively engage with and contribute content to websites, rather than just passively consuming information. Examples mentioned include social media sites, blogs, videos, and reviews. The document also addresses some risks of oversharing personal information online and excessive internet use.
This document provides information about safer internet initiatives and guidelines. It discusses the European Commission's Safer Internet programme launched in 1999 to promote safe internet use. It also describes SecurityNet, a Portuguese project developed in 2004 as part of the Safer Internet programme to promote informed, critical and secure internet use among students. The document then addresses various internet safety topics like cyberbullying, phishing, sexting, copyright, and Creative Commons licensing.
The summary provides an overview of the 10th Annual World Internet Project Meeting held in Macau from July 8-11, 2009. Key details include the location of Macau, participants of the meeting, a publishing ceremony, and a keynote speech by Professor William Dutton of Oxford University. Presentations were given on topics like mobile internet use in Japan and a media ecology perspective on the internet in a changing media environment. Conclusions focused on the digital divide closing in Japan, importance of TV, reliability of the internet, and future directions for WIP internet research. Plans were also announced for a new WIP official website and the next annual meeting in Lisbon, Portugal in mid-July 2010.
This document discusses the future of screens and the internet. It describes how screens will become more interactive and how users will be able to manipulate data in augmented reality. Voice may become a more common interface. Near future screens may be difficult to distinguish from computers. The document also discusses the eBig3 project, which aims to develop an integrated learning platform using television, mobile devices, and the internet to provide lifelong learning opportunities.
Michael Fauscette discusses how business is being transformed by social, mobile, and cloud technologies. Customers are increasingly congregating online and sharing their thoughts, while expecting to interact with companies through new digital channels. This is driving organizations to adopt social media strategies, leverage mobile apps, and provide content through cloud services in order to better engage customers.
WebTrends - Between Semantic, loss of Privacy and Personalization.useKit
A strict separation of users into producers and consumers of information characterize the original Web. From the end user perspective, the original Web is a read-only information space. Progress in Web software architecture as well as a paradigm change has resulted in a proliferation of social software platforms. Every user is considered to be a valuable information source and as a consequence is allowed to produce and deposit information. In such a context, systems turn out to improve the more users get in touch with it. The Web became an editable information space fed by a collective intelligence impetus.
For the next Web generation, semantic, loss of privacy and personalization in terms of a freely mashable, annotable, and reorganizable information space is on the horizon.
This keynote speech will deliver an insight into actual trends and will discuss possibilities for more semantic in the Web that may come through the social usage of the Web.
This document summarizes Professor Chris Marsden's discussion on net neutrality implementation and regulation. It discusses key issues around whether internet access providers should be allowed to prioritize some data over others or block/throttle certain sites based on payments. It also considers challenges regarding dominant platform providers colluding with mobile operators and the lack of choice for mobile internet users. Finally, it outlines Professor Marsden's current work focusing on topics like net neutrality regulation in different regions and addressing problems in the mobile universe.
A point of view on digital citizenship essentialsEduwebinar
Five essential digital citizenship skills are presented together with an a approach on how to integrate these into the Australian curriculum.
http://www.schoollibrarymanagement.com
The document discusses the history and evolution of the World Wide Web from Web 1.0 to present. It suggests that Web 3.0, also called the Semantic Web, will connect online and offline data through technologies like semantic web, cloud computing, and microformats to allow machines to better understand web pages. Key aspects of Web 3.0 may include fewer dedicated email services, connecting currently separated social networks and data silos, and giving users more control over their online experiences and data through browser-based applications.
The document discusses new trends in e-learning in 2009, including increased use of mobile technologies, learning nuggets, online video, social media like Twitter, semantic search technologies, browser wars, open educational resources, and simulation tools for e-learning. Some specific trends mentioned are the growth of mobile learning in places like India and China, the rise of netbooks and short learning modules, improvements in online video quality and usage, the potential for semantic searches to enhance e-learning discovery, ongoing browser competition, expanding open-source e-learning tools, and decreasing barriers to adoption of simulation technologies in training.
The document discusses using Web 2.0 technologies like Honeycomb in primary classrooms. It notes that Honeycomb provides a safe online environment for creation, communication, and collaboration. The school implemented Honeycomb across years 3-6 and saw engaged students sharing work. Moving forward, the school aims to expand Honeycomb use to year 2 and integrate it into their learning platform to enable more collaboration.
This document provides a crash course on using mobile phones to create and distribute content. It discusses platforms like WordPress, Twitter, Facebook and Flickr that allow sharing audio, video and text from mobile devices. It also reviews best practices for gathering and distributing content as a citizen journalist and ways to generate revenue. The document gives an overview of the types of content and gear that can be used to engage in mobile journalism.
This is an abridged version of the September Webinar presentation which focused on GE's AMSTC located near Detroit, Michigan. We are hiring over 1,100 IT professionals over the next few years and our monthly calls highlight different technologies in use and our wide ranging businesses.
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...EduSkills OECD
Andreas Schleicher, Director of Education and Skills at the OECD presents at the launch of PISA 2022 Volume III - Creative Minds, Creative Schools on 18 June 2024.
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.pptHenry Hollis
The History of NZ 1870-1900.
Making of a Nation.
From the NZ Wars to Liberals,
Richard Seddon, George Grey,
Social Laboratory, New Zealand,
Confiscations, Kotahitanga, Kingitanga, Parliament, Suffrage, Repudiation, Economic Change, Agriculture, Gold Mining, Timber, Flax, Sheep, Dairying,
🔥🔥🔥🔥🔥🔥🔥🔥🔥
إضغ بين إيديكم من أقوى الملازم التي صممتها
ملزمة تشريح الجهاز الهيكلي (نظري 3)
💀💀💀💀💀💀💀💀💀💀
تتميز هذهِ الملزمة بعِدة مُميزات :
1- مُترجمة ترجمة تُناسب جميع المستويات
2- تحتوي على 78 رسم توضيحي لكل كلمة موجودة بالملزمة (لكل كلمة !!!!)
#فهم_ماكو_درخ
3- دقة الكتابة والصور عالية جداً جداً جداً
4- هُنالك بعض المعلومات تم توضيحها بشكل تفصيلي جداً (تُعتبر لدى الطالب أو الطالبة بإنها معلومات مُبهمة ومع ذلك تم توضيح هذهِ المعلومات المُبهمة بشكل تفصيلي جداً
5- الملزمة تشرح نفسها ب نفسها بس تكلك تعال اقراني
6- تحتوي الملزمة في اول سلايد على خارطة تتضمن جميع تفرُعات معلومات الجهاز الهيكلي المذكورة في هذهِ الملزمة
واخيراً هذهِ الملزمة حلالٌ عليكم وإتمنى منكم إن تدعولي بالخير والصحة والعافية فقط
كل التوفيق زملائي وزميلاتي ، زميلكم محمد الذهبي 💊💊
🔥🔥🔥🔥🔥🔥🔥🔥🔥
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
Young People, Internet Literacy and Safety - Opportunities and Challenges
1. 10/28/2009
Young People and Internet Literacy and Safety -
Opportunities and Challenges
1er Congreso Internacional Menores en las TIC
1st International Congress “Minors in ICT”
Educando para una Internet más segura
Educating for a safer Internet
Palacio de Congresos – Recinto Ferial Luis Adaro (Gijón)
27 y 28 de octubre de 2009
1
9. 10/28/2009
What are the issues – young
people?
• Web 2.0 world - services and
applications can blur
boundaries between
professional and personal
relationships, public and
private information
• Users encouraged to network
and express themselves
online, create and share
content, and share
• Huge positives BUT need the
skills to navigate and make
informed decisions
9
11. 10/28/2009
WISE KIDS and Bridgend Healthy Schools Survey
of Year 7 pupils (11 and 12 year olds)
On line questionnaire aimed to find out:
- how year 7 pupils from Bridgend Secondary Schools use the Internet and their mobile
phones
- their understanding of the Internet environment
- their understanding of how to keep themselves safe when using the Internet and mobile
technologies
1519 pupils completed the online survey fully, of whom 73% were aged 12, and 27%
were aged 11 at the time of the survey.
There was also an approximately even balance of boys and girls - (51%boys, 49% girls)
11
17. 10/28/2009
What have we learned/ What do we teach?
• Our experience shows that for young people aged 11
and 12, there is sometimes a lack of understanding
and awareness of :
– the Internet as a public space with laws and
consequence
– the possible bias and accuracy of Internet
information
– how to make judgements in their online
interactions – i.e. sometimes trusting and naive
– how to safeguard their data online
– personal digital identity extending to devices and
applications
– appropriate digital/net etiquette
– internet security issues like viruses and spyware
– laws online for example on when file sharing
copyright media
– where to get support/ report issues like
cyberbullying or Internet grooming
17
27. 10/28/2009
Whose problem is this?
Who do we work with?
Policy and Grassroots' Level
• Educators – schools, Further • Law Enforcement
Education colleges • Policy Makers
• Governors of schools • Creators of Children’s Internet
• Youth Professionals Services
• Young People • Regulatory Bodies
• Mental Heath/Nursing
Professionals
• Social Workers
• Community Groups
• Public and Private
Organisations
27
28. 10/28/2009
• Have a responsibility to promote digital
Role of literacy and Internet literacy – safe AND
innovative AND up to knowledge and skills
Schools •
•
Embed this in the curriculum a/ lesson plans
Must ensure that all staff are appropriately
trained on Internet technologies and safety
issues – needs commitment and appropriate
resources
• Have a e-safety/e-safeguarding coordinator
• Act on issues of cyberbullying or inappropriate
use of the Internet
• Give teachers access rather than blanket
blocking
• Use language that young people understand,
and make advice age appropriate; listen and
learn – fill the gaps
• Reach out to parents through home school
links
• Should create a culture of support – teaching,
supporting, being visible and proactive in
Internet Safety
28
29. 10/28/2009
Role of parents
• Be involved in their
children’s use of the
Internet
• Filtering solutions not a
replacement for parental
involvement
• Parents need to update
their knowledge and skills
• Start communicating
messages with their
children from a young age
• Create a culture of
support
• Be the parent!
29