View
213
Download
0
Embed Size (px)
Citation preview
Social Networking
A social network is a website created where individuals can connect to one another through the internet.› Often called “nodes”
Benefits:› Good way to keep in touch with
family and friends.› Good networking for businesses.
Dangers› Allows easy contact with
strangers.› Easy to share private
information on the internet. Examples:
› MySpace, Facebook, Twitter
How to stay safe:› Become educated
on the hazards that can be caused by the internet.
› Do not display any personal information on the web. Use a nickname
and do not give our your e-mail address.
Watch this video to learn how to stay safe on the web!
Acceptable Use Policy (AUP) Set of rules that restrict the ways in
which a website may be used.› Outline how the student should act
while using technology, what they can and can not do with it, and the consequences following their actions. Appropriate websites vs.
inappropriate websites. Respecting materials. Only using computers for school-
related learning. How does this work inside of the
classroom?› Create a “contract” that outline
how students should behave on the internet or while using any form of technology. Should be looked at and signed by
parents, teachers, and students.
Netiquette Refers to the etiquette one should abide by
while using the internet.› DO NOT TYPE IN ALL CAPS!
This seems like you are angry or yelling at your reader.
› Caution: posts can easily be made public. Do not share any information (even over E-mail or
Instant Messenger) that you would not want to become public knowledge.
› Do not use internet slang during school. Abbreviations , such as LOL, and other slang words are
commonly used on the internet but keep in mind that when you are communicating with a teacher or using computers for school related material it is important to use proper spelling and grammar in your sentences.
Cyber Bullying
Using technology to emotionally hurt others.› Spreading rumors› Sharing other’s
personal information› Sending hurtful
photos of others› Impersonating others
on the web.
Cyber bullying is one of the most reoccurring type of bullying found in schools today.
Cyber bullying occurs whenever someone maliciously intends harm on someone else by using any form of technology such as the internet or text messaging.
Cyber Bullying Statistics› 22% of students know someone who has been bullied
online. › 19% of students admit to saying something hurtful to
others online. › 12% of students have personally become upset by
strangers online. › 90% of middle school students have had their feelings
hurt online. › 75% have visited a web site bashing another student › 40% have had their password stolen and changed by a
bully .› 81% of cyber bullies do it because they think its
funny ("Cyberbullying").
How To Put An End To Cyber Bullying STOP
› Encourage your peers to stop cyberbullying. BLOCK
› Ignore messages from cyber bullies or block them from your social networking sites.
TELL› Tell an adult about the bullying right away.
Student Data Family Educational
Rights and Privacy Act› “Federal law that protects
the privacy of student education records. The law applies to all schools that receive funds under an applicable program of the U.S. Department of Education” ("Family educational rights" 2009).
› FERPA gives the parents the right to all their child’s educational records until they turn 18 or attend further schooling after high school.
Although it is beneficial for teachers to keep student records digitally, it is of the upmost importance that this information remains private.› In order to keep this
information private, it can be beneficial for the teacher to have their own password which allows until authoritative figures to access the students’ information.
Internet Privacy Children’s Internet
Protection Act› Law concerning the amount of
access people can obtain from school and library computers.
› E-rate program Any school or library that
receives funding from the E-rate program is required to implement the rules of CIPA
Can not receive E-rate discounts unless they verify that they implement the protection measures.
Required to block pictures that are obscene, pornographic, or harmful to minors.
Schools /libraries under the CIPA but address the issues of:› “access by minors to inappropriate
matter on the Internet;› the safety and security of minors
when using electronic mail, chat rooms, and other forms of direct electronic communications;
› unauthorized access, including so-called “hacking,” and other unlawful activities by minors online;
› unauthorized disclosure, use, and dissemination of personal information regarding minors;
› measures restricting minors’ access to materials harmful to them” ("Children's internet protection" 2009).
Gender
What contributes to this gap?› In general, men are
more interested in technology than women.
› Most technology software is aimed towards the male sex.
› Men are more comfortable on computers. Spend more time
playing computer games.
How can we close this gap?› American Association of
University Women School aimed towards
getting girls interested in exploring learning through technology.
› The AED Center for Gender Equity Focuses on helping girls get
a good education and succeed in society.
“Promotes the rights of girls and women to education, health, a safe environment, economic participation, and leadership ("Center for gender" ).
Socio-Economic Difference in SES highly effect
the availability of technology. Finances play a huge role in this gap.
› Families may not not have enough money to purchase a computer for their home. This is a growing problem due to the fact
that education is becoming more technology based as the time goes on.
If these children are not exposed to technology while their classmates are, they are sure to fall behind in school and if they are continuously deprived from technology knowledge they will ultimately be behind when they reach the workforce.
Although students can get access to the internet through public libraries, some students may not live close enough to utilize this.
How to stop this gap from growing:› Provide the
students with extra time in the classroom to work on the computer.
› Organize a “Computer Club” where the students can get together once a week after school and play educational games on the computer with their partner.
Race SES plays a huge role in
whether an individual has access to a computer.
Technology Literacy and race› Most literate
White
› Least literate African American Hispanics
There are nearly 41.3 Hispanic people in the united states and 14 million don’t speak English.
If they do not speak English, they will not be able to efficiently use a computer.
Resource Equity
The amount of resources provided differs in each individual school.› For example, one
school may have a variety of technology to provide for the students while another has none.
› Special needs – many children need assistive technology to learn.
Assistive technology› Many students with
special needs have to use assistive technology inside of the classroom to be able to learn.
› If a school does not have the resources to provide this form of technology, the student’s cognitive abilities will suffer.
Teacher Bias
Older teachers› Teachers who have been
working in the educational field for a long time may not be comfortable using technology in the classroom. Therefore, they may choose to steer clear of using technology as an educational tool in the classroom.
Using technology too much.› Some teachers are very
comfortable with using technology inside of the classroom and therefore implement it in every lesson.
› Although using technology to teach in the classroom is proven to be beneficial for the students, teachers need to recognize that students learn in a variety of ways and it is important to teach multiple ways instead of choosing to teach solely through technology.
Copyright
Copyright is an author’s exclusive right to their creation.› As of April 1, 1989 work is copyrighted and protected
whether it has a notice or not.› Even if there is not a copyright on the document, it is
still copyrighted by the author. © It is illegal to use someone’s work without their
permission. Copyrights last for the life of the author, plus 70 years. When an item is copyrighted, you can not can make a
copy of the work, distribute the work to the public, prepare a work that is derivative from the original work, and you can not perform the work publically ("How to Understand" 2006).
Fair Use This is an exception to the copyright law.
› Under some circumstances, copying or distributing someone’s work without their permission.
When copywriting is “fair”:› “The purpose and character of the use, including whether
such use is of a commercial nature or is for nonprofit educational purposes;
› The nature of the copyrighted work; › The amount and substantiality of the portion used in
relation to the copyrighted work as a whole (is it long or short in length, that is, are you copying the entire work, as you might with an image, or just part as you might with a long novel);
› The effect of the use upon the potential market for or value of the copyrighted work” ("How to Understand" 2006).
Creative Commons
Non-profit organization founded in 2001. Creative commons is “devoted to
expanding the range of creative works available for others to build upon legally and to share” (“Creative commons" )› Organization provides copyright-licenses to
the public that allows authors to communicate which rights they want to reserve and which rights they choose to waive in order to let the public freely benefit from their work.
Bibliography•Acceptable use policies: a handbook . (n.d.). Retrieved from http://www.doe.virginia.gov/go/VDOE/Technology/AUP/home.shtml•Bitter, G, & Legacy, J. (2006). Using Technology in the classroom. New York, NY: Pearson Education, Inc.•Carvin, A. (2006, March 31). Race and the digital divide: a current snapshot. Retrieved from http://www.andycarvin.com/archives/2006/03/race_and_the_digital.html•Center for gender equality. Retrieved from http://cge.aed.org/•Children's internet protection act . (2009, September 21). Retrieved from http://www.fcc.gov/cgb/consumerfacts/cipa.html• Creative commons. Retrieved from http://creativecommons.org/ • Cyberbullying. Retrieved from http://www.makeadifferenceforkids.org/cyberbullying.html•Family educational rights and privacy act. (2009, June 16). Retrieved from http://www.ed.gov/policy/gen/guid/fpco/ferpa/index.html •How to Understand copyright restrictions. (2006, August 8). Retrieved from http://lcweb2.loc.gov/ammem/ndlpedu/start/cpyrt/index.html•Internet safety & civility. Retrieved from http://www.safekids.com/•Internet safety with detective kellogg. (2007). [Web]. Retrieved from http://teachertube.com/viewVideo.php?video_id=425&title=Internet_Safety_with_Detective_Kellogg•McGrath, D. (2004). Closing the gender gap. Girls, Technological Fluency, and PBL, 31(6), Retrieved from http://faculty.salisbury.edu/~ddsessoms/Educ318/GenderGap.pdf•Network, networking technology, data communication terms, glossary and dictionary - n. (2004 - 2010). Retrieved from http://www.networkdictionary.com/networking/n.php•Technology glossary. (2009). Retrieved from http://www.4teachers.org/techalong/glossary/•Templeton, B. (1994). 10 big myths about copyright explained. Retrieved from http://www.templetons.com/brad/copymyths.html