Lesson Goal/Objectives: To begin having students think about where they are with respect to technology usage.
|
|
|
- Cuthbert Tate
- 10 years ago
- Views:
Transcription
1 6.2 Foundational Lesson Plan #2 Digital Compass Summary Description: Providing students with a direction in their use of technology. Focus Question: Do students think about their technology use differently than adults? Additional Questions: 1. How do we begin the discussion with students on what should be considered appropriate or not with regard to technology? 2. When should students learn about appropriate technology use? For more information about the basic concepts of Digital Citizenship see Chapter 2 (p. 8) or on the nine themes see Chapter 3 (p. 12). NETS standards: NETS*T Standard VI, NETS*S Standard 2 see p. 193 for the ISTE standards Lesson Goal/Objectives: To begin having students think about where they are with respect to technology usage. Tools/Resources: Warm-Up Activity - Maricopa Center for Learning and Instruction Activity Description: 1. Divide students into groups of two or three. Provide each group with a Digital Compass (for the activity and compass, see Figure 6.1) as well as a list of ten scenarios. 2. Provide opportunities for each group go through the ten scenarios and identify what direction they believe the actor in each of these scenarios is going. Each group also should come up with one or two situations of their own (about technology use or misuse) and identify those on the compass as well. 3. Have students explain why they thought the situation should be in one direction or another. They need to support why they choose a direction. 4. Discuss the six directions on the compass and find out how the students understand each of the directions. 5. Follow-up with how they as technology users need to think about how they use technology both in school and elsewhere. Lesson Extension Ideas/Activities: 1. Have students create their own scenarios of appropriate and inappropriate technology use and have the class determine where they would place them on the compass. 2. Have students come up with appropriate punishments or consequences for those scenarios that are clearly inappropriate.
2 Teaching Tips: 1. Prepare to have adults consider some of the scenarios to be inappropriate, while students will most likely have a different reaction. 2. Understand that there will be some students who will be unmoved by the effect of inappropriate activities have on others. Attempt to make it clear to students how inappropriate activities affect others. 3. Know that some students will choose a direction to get attention from others, and make sure students can explain why they are taking a certain position.
3 Digital Citizenship and the 21 st Century Digital Compass Activity Directions: Give each student a copy of the 21 st Century Digital Compass. Read the following scenarios. Instruct students to point to the direction that matches their opinion. After everyone makes a choice, allow students to analyze their answers. Scenario #1 A student sends a harassing to another student. The receiving student retaliates with a flaming . Is sending harassing and flaming messages wrong? Scenario #2 When hanging out with friends, one of the students gets a cell phone call and conducts a loud conversation. Is talking in a loud voice on a mobile phone in a public place right? Scenario #3 A student logs on to a file sharing website and downloads the newest song. Is downloading music from a file-sharing site wrong? Scenario #4 A student follows a questionable link to a website and downloads a malicious script which releases a Trojan Horse virus on to the school network. Is downloading material from unknown sites appropriate? Scenario #5 An hour before class, a student remembers that a writing assignment is due. The student goes to the library, logs on to a website, and copies/pastes information without giving credit to the authors. Is using Internet materials without giving credit to the authors wrong? Scenario #6 At home, a student uses a software package to copy movies and games from DVD s for his or her friends. Is copying copyrighted materials right? Scenario #7 A student logs into the schools course management system to download a copy of the course syllabus that they had lost. Is online learning appropriate for K-12 students? Scenario #8 Two students use text messaging on their cellular phones to pass information with each other during class. Is it wrong to send text-messages during class? Scenario #9 A team of students create a website for a teacher at school, but the website cannot be read by students with special needs (disabilities). Is it right to make websites that are not accessible to students with disabilities? Scenario #10 A student brings a USB flash drive to school with all their assignments. The student checks with the teacher before connecting the drive to the schools computer. Is it appropriate for students to bring foreign materials to be connected to school property? Scenario #11 During class, students uses their handheld computers to share answers to an assignment. Is it wrong to share information during class? Scenarios #12 Students obtain a copy of the final exam for the teacher s computer by "hacking" the password. Is hacking into the teacher s computer wrong?
4 Interpreting the Answers There is no easy answer for any of the scenarios. In most instances, students responses are going to be varied. Why? Technology users are not always going to agree on what is right and wrong. Often when using technology there are shades of gray depending on who interprets the question. When interpreting each scenario, users need to consider not only their feelings but feelings of others. Some users may have had poor role models, developed bad habits, or perhaps a lack of thinking before acting. The purpose of the compass metaphor activity is to help students analyze the concept of technology use and misuse. The teacher should review the following compass directions in order to better understand student opinions: Wrong Direction When traveling in the wrong direction, the cause is often bad information. When a student chooses to go in the wrong direction with technology, it often has to do with a lack of training or not considering those around them. To get back on the right path, students need to learn about how their technology use can affect others. It s an Individual Choice, So What s the Big Deal Direction Often students don t consider how others may feel about their behavior, and they believe if it doesn t bother me, why should it bother anyone else? Students traveling in this direction can t understand what the big fuss is all about. The teacher needs to help these students see beyond their own personal experience. As technology becomes more accessible, it becomes integrated in who we are. Because my cellular phone is mine, then what I do with it is my concern. These students believe that technology use is a right and not a privilege. Simply put, they don t want others to tell them how to use their technology. As Long As I Don t Get Caught Direction Those students choosing this direction believe that technology is there to be used and everything will be fine as long as no one else knows. The trouble with this attitude is that what we do or do not do can and often does affect others around us. Many students know that what they are doing is not right, but they believe that if no one knows, that makes it ok. Depends on the Situation Direction Some situations do lend themselves to new interpretations, but there is usually an overarching understanding of appropriate technology use. There are times when a student needs to know that some activities are appropriate in one situation but can be inappropriate in another. I Don t Know If It s Right or Wrong Direction Some students are given technology but fail to learn how to use it appropriately. But, ignorance of the rules cannot be used as a defense for technology misuse or abuse. Basic digital technology citizenship skills should be learned when using technology. This is the direction students go when they understand some aspects of technology but only enough to be dangerous. Sometimes, this can be worse than having no training at all. When no digital citizenship training is provided, students learn from others and can get poor advice.
5 Right Direction Traveling in the Right direction takes time and diligence on the part of the student. To follow this path the student needs to have a good understanding of the technology they are using. They also need to reflect on how they use technology on a daily basis. Those who follow the right direction take time to decide not only how their action affects them, but those around them.
6 Figure 6.1
7 6.4 Foundational Lesson Plan #4 Digital Driver s License Summary Description: Providing a benchmark for students to use technology appropriately. Focus Question: What basic information should students know about the appropriate use of technology? Additional Question: 1. Should all students be able to use technology without knowing if they have some knowledge and understanding of Digital Citizenship? 2. When should students begin to learn about the appropriate use of technology? Lesson Goals/Objectives: To begin relating the needs of basic competency for technology usage, especially related to Digital Citizenship. Tools/Resources Needed: Get Your Web License PBS Kids GO! Junior Computer Drivers License Danish Ministry of Education For more information about the basic concepts of Digital Citizenship see Chapter 2 (p. 8) or on the nine themes see Chapter 3 (p. 12). NETS standards: NETS*T Standard VI, NET*S Standard 2 see p. 193 for the ISTE standards Activity Description: 1. Discuss the need for students to have a basic understanding of what is considered appropriate or not when using technology. This instrument can help show if students understand the concept. 2. Administer the Digital Driver s License exam for the particular level you are teaching (elementary for grades 4-6 and secondary for grades 7-10). Students should be able to complete the exam with an 80% or better score to be considered eligible for a license. 3. Allow students that have completed the exam to continue to learn more about appropriate technology use. Those with less satisfactory scores need to review the concepts of Digital Citizenship. Lesson Extension Ideas/Activities: 1. Have students create their own exam questions. Let the students quiz others with their new exam. 2. Have the students create a driving test as a companion to this written exam. Have the students identify what skills would be most important.
8 Teaching Tips: 1. Work with students prior to giving the license exam to help them identify situations which would be considered inappropriate use of technology. 2. Show students that learning how to use technology appropriately is to their advantage because, they will be more informed and protected from possible problems. 3. Understand that the exam is not the primary focus. The students need to realize that just like driving a car, technology use is a privilege not a right. 4. Provide more information in the classroom than just the ideas on the test. Students need instruction on the appropriateness of technology use.
9 Elementary Driver s License Digital Manners (Etiquette) 1. Having your cell phone turned on during school hours is: a. a bad idea because it might disturb others. b. a good idea for keeping in touch with parents. c. no big deal because everyone else does it. d. your choice if it doesn t affect anyone else Digital Messages (Communication) 2. When writing on a blog, should I share my secrets? a. sure, a blog is like a diary, so this is where I should put them. b. it doesn t matter, only my friends read my blog. c. no, the blog is open to anyone who has access to the Internet. d. as long as no one knows my true identity. Digital Learning (Literacy) 3. When learning about technology in school, it is important for you to know: a. the rules for using technology. b. how to work with others when using the technology. c. how the different technologies are used. d. all the above. Digital Inclusion (Access) 4. Students with disabilities (those who aren t able to see, hear, or walk): a. can t use technology. b. should have the same opportunities as others to use technology. c. are not able to understand and learn about technology. d. have no reason to use technology. Digital Business (Commerce) 5. If your parents allow you to buy things on the Internet, you should: a. think twice about buying online, because all sites are dangerous. b. follow what your friends say about where to buy. c. find the first site with what you want and buy it. d. first check to see if the site is safe and secure when buying something. Digital Trust (Law) 6. When looking graphics and text from the Internet: a. take whatever you want because the purpose of the Internet. b. ask your friends for places to find material you can copy. c. ask for permission to use the information before using them. d. avoid it because all the information on the Internet is false.
10 Digital Privileges (Rights & Responsibilities) 7. When using a new technology in class, you should: a. do what ever you want because no one ever checks. b. ask teachers and parents about what can be done. c. figure out ways that you can have fun with it. d. ask your friends because they know about technology. Digital Protection (Health/Wellness) 8. How I work with technology (i.e., sitting, laying, stooping at the desk, floor, or sofa): a. doesn t matter as long as I am comfortable. b. depends on where I am. c. isn t something that I need to be concerned about. d. shouldn t be ignored. Digital Precaution (Security) 9. When dealing with people online, giving personal information is: a. okay as long these people live far away. b. never a good idea, no matter the reason. c. fine as long as the people are nice. d. nothing to worry about.
11 Answer Sheet for Elementary Driver s License Quiz #1 - Correct Answer: A Many schools are allowing students to have cell phones in schools for safety, but are requiring that they be turned off or silenced during the school day. This keeps students focused on doing the right things in school. #2 - Correct Answer: C Blogs are open to anyone on the Internet. Many users think that they are like diaries (and used as such) that students should share their thoughts on the blog. Blogs can be useful tools to share information, but users need to be careful what they share. #3 - Correct Answer: D Technology affords many opportunities for students to learn beyond the classroom. But there must be an understanding of how to use the technologies first. #4 - Correct Answer: B Students with disabilities should have opportunities to work and learn with technology. Some students may need special technology tools to provide this opportunity (e.g., screen readers, special input devices, speech to text converters). #5 - Correct Answer: D Purchasing goods and services online needs to be taken seriously. People can gain information about you and your family from information that you provide. Make sure the site is secure by checking it over (e.g., does it have secure access only, ask only questions that are appropriate for the purchase, have alternate ways to contact the company). #6 - Correct Answer: C Students need to realize that when borrowing anything from the Internet that its use is restricted by the owner (unless stated otherwise). All content taken from the web should be cited appropriately. #7 - Correct Answer: B All users have certain rights and responsibilities when using technology. It is important to know what is appropriate and what is not appropriate before using technology. #8 - Correct Answer: D Users often don t think about safety physical habits until they hurt themselves. How you use technology today can have a big impact on how you are going to be able to use it in the future. #9 - Correct Answer: B It is easy to act differently online than face-to-face. Students need to make sure that private information remains private.
12 Secondary Driver s License Digital Etiquette: electronic standards of conduct or protocol. 1. During school hours the correct cell phone ringer setting is: A. low B. vibrate C. specialized ring tone D. high 2. Handheld computers and smartphones should be used in class for: A. exchanging ideas from class discussion B. helping friends get the answers C. playing games D. sending notes during a teacher s lecture Digital Communication: electronic exchange of information. 3. messages should be: A. long and full of details B. sent to as many recipients as you can C. short and to the point D. sent without a subject line 4. Instant Messaging (IM) is a good tool for: A. sharing what happened in class with friends B. discussing class topics C. talking to friends when bored in class D. inviting people outside the school into the discussion Digital Literacy: process of teaching and learning about technology and the use of technology. 5. The most appropriate use of technology in schools is to: A. do research only B. find resources to help learn the class topics C. write class papers only D. play games during class 6. Online learning is: A. difficult and not worth the time B. not well understood by students C. like trying to take a class without a teacher D. being tested in many school districts
13 Digital Access: full electronic participation in society regardless of gender, race, age, ethnicity, and physical or mental challenges. 7. Assistive technologies for people with disabilities are: A. necessary for some users to access information B. seen as just an additional expense C. expensive relative to regular technology D. needed for a few students 8. The differences between those with access to digital technology and those without is: A. not a big deal because all technology is a luxury B. something that can never be fixed C. a concern that needs to be addressed by the school/district D. not a priority for school/districts 9. Digital technology-based assignments should be: A. avoided because some students may not have access to technology at home B. integrated into the classroom C. approached cautiously for fear of offending someone D. assigned for out-of-class work only Digital Commerce: electronic buying and selling of goods. 10. Purchasing goods and services online is: A. a waste of time because goods sold on the Internet are a scam B. something that everyone has learned at home C. not a skill to be overlooked by schools D. not needed by students in schools 11. Searching for information about products online before buying is: A. should not be ignored when looking for the best price B. too time consuming C. a lot of work and not very informative D. not helpful, because it is difficult to find products online Digital Law: electronic responsibility for actions and deeds which is either ethical or unethical. 12. Information on the Internet is: A. available for anyone to use as they want B. copyrighted and should be treated as someone else s property C. easy to copy and paste into your own document D. unreliable and should be held suspect
14 13. Sharing music or copyrighted material online: A. doesn t hurt anyone because musicians and actors make enough money B. is caused by greedy companies C. is illegal and should not be done D. keeps the musician or actor popular Digital Rights & Responsibilities: those freedoms extended to every student, administrator, teacher, parent or community member. 14. If someone puts copyrighted material on the Internet and another person wants to use it, that person should: A. use it, if it is for educational use B. take it, and use it as they want C. not use the information because it is too much trouble D. ask permission from the author or at least cite the source 15. In schools, students should: A. have the ability to do whatever they want online B. follow the Acceptable Use Policies of the school/district C. look at other student s if they have the password D. come up with rules with their friends for using technology Digital Health/Wellness: physical and psychological well-being in an digital technology world. 16. Physical injuries related to technology use: A. is not a big deal and is not a major concern B. will not happen for many years, so should not be a priority C. can have dramatic and painful effects on your body D. is not a concern for schools 17. Furniture and chairs for technology should be: A. the right height and size for using that technology B. any size because it doesn t matter to students C. bigger than the students to allow them to stretch D. soft and flexible so the students can be comfortable Digital Security: taking necessary precautions to guarantee electronic digital safety. 18. When dealing with strangers, online users should: A. give personal information freely B. be cautious about giving information C. provide passwords and credit information if asked D. not tell anyone about people they meet online
15 19. To protect a computer from virus, a user should: A. never open an message B. unplug your computer from the Internet C. keep up-to-date on virus protection D. trust your service provider to protect your computer 20. Virus protection and firewalls are: A. foolproof and never need to be checked B. a waste of time and money because virus attacks only happen to big businesses C. effective but not necessary D. a good investment, but they need to be monitored and updated regularly
16 Answer Sheet for the Secondary Driver s License Quiz #1 - Correct answer is B. Vibrate is correct because it is the least distracting setting during the school day. Many schools are allowing students to carry cell phones for safety and security reasons. A specialized ring tone might be able to identify your phone from others, but can be annoying to other users. Another option would be to turn off the phone during school hours. #2 - Correct answer is A. The ability for PDAs to share information can lead to significant learning. But in a testing situation or times when others are talking, they should not be used this way. PDAs are appropriate for other uses at the teacher s discretion. # 3 - Correct answer is C. is intended for short communication. Long and involved s are often either not read or filed for later review. A descriptive subject line can alert the user about importance and content in the . #4 - Correct answer is B. IM can be used for allowing students to express themselves in a less threatening fashion. IM is not a place to gossip, waste time, or exclude others from being in the conversation. #5 - Correct answer is B. Technology can be a helpful tool and provide additional resources for teaching and learning. Technology can assist instructors to be more efficient in their teaching. #6 - Correct answer is D. Online learning is being tested and used in several school districts in the U.S. Online learning, if done correctly, can be a great benefit for everyone who wants to become a life-long learner #7 - Correct answer is A. Some students (and adults) with disabilities need assistive technologies so that they can access digital information. Everyone should have an opportunity to access information. Many of these technologies are very cost effective. #8 - Correct answer is C. There is still a digital divide between those that have access to technologies and those that do not. Often basic technology needs go unfulfilled, even as prices decrease. As a society becomes more technologically integrated, it will become the responsibility of the school to develop a plan for addressing this need. #9 - Correct answer is B. Some teachers are reluctant to assign technology-based assignments because some students might not have access (e.g., home, library). These assignments should be integrated into the classroom where students have access to technology. #10 - Correct answer is C. Teenage students are becoming one of the largest groups of online consumers. There is a need to protect them and make sure they are not being exploited. The process of buying goods online needs to be taught and discussed.
17 #11 - Correct answer is A. Technologies such as the Internet provide many tools to help find information. The Internet offers many opportunities to buy and sell goods, but the smart shopper looks around to find the best value. With the search tools that are available today, finding many different vendors is quick and easy. #12 - Correct answer is B. According to copyright law, anything that is produced by an individual is copyrighted whether they have gone through the legal process or not. It may be easy to copy something and pass off as original work, but it still needs to be cited. Users do need to differentiate between real and fabricated information on the Internet. Much information is credible, but you can assume that it is credible without close examination. #13 - Correct answer is C. Downloading materials without artist s consent is stealing. Often users know that taking files from the Internet is wrong but rationalize it for a variety of reasons (e.g., high cost, availability). #14 - Correct answer is D. If material is copyrighted, users must give credit to the person who created it. If you are going to make profit from a source, permission must be obtained. Educational users can have access to some copyrighted material, but the rules of copyright need to be thoroughly understood. #15 - Correct answer is B. Most schools have set up Acceptable Use Policies for use of technology in school. If someone is going to use technology appropriately, they need to follow the rules that have been created. #16 - Correct answer is C. Repetitive stress injuries are injuries that happen after extended periods of time by using technology incorrectly. There are long-term effects, but there are also short-term effects that include fatigue, eye problems, and sore muscles. #17 - Correct answer is A. When purchasing technology, educators need to consider how that technology will be arranged for students. Furniture that is the wrong size or not made for that purpose can make it difficult for students to use the technology. It can also lead to technology related injuries such as repetitive stress, eyestrain, and sore muscles. #18 - Correct answer is B. It can be very difficult to know who you are dealing with when using digital technology. It is easy to disguise your identity online. Be cautious about giving out personal information such as home address, phone number, etc. Do not give out information such as passwords or credit information. #19 - Correct answer is C. Protecting one s computer from an attack against a virus takes diligence on the part of the user. It is necessary to maintain virus protection. You should not open s (and especially attachments) from people that you do not know. #20 - Correct answer is D. Virus protection, firewalls, surge protectors, and battery backups are all appropriate tools to help protect your technology investment, but purchasing them is not enough. These tools need to be monitored and updated to ensure they are working properly.
18 Scoring Rubric for Student Activities Objectives Exemplary Performance - 4 At or Above Average - 3 At or Below Average - 2 Low Performance - 1 Points Earned Students have an understanding of the importance of the concept. Student involved in classroom activity. Student understands the relevance of the topic to larger discussion of Digital Citizenship. Student has complete grasp of concept. Student completely engaged. Student has good grasp of both the topic and Digital Citizenship. Student not as sure about importance of concept. Student interested but not engaged. Student aware of Digital Citizenship but unsure of connection. Student unaware of importance of concept. Student not providing effort in class. Student has only minimal understanding of either the topic or Digital Citizenship. Student does not understand topic. Student not interested in topic. Student does not understand either the topic or Digital Citizenship. Student can come up with related examples of topics within Digital Citizenship. Student is able to use information from activity to come up with new concepts related to Digital Citizenship. Student can provide limited examples with prompting from teacher or other students. Student has difficulty making the connection between activity and other examples. Student is not able to come up with any examples beyond what is presented in the activity. Student can understand the need to use technology appropriately. Student is able to make the connection between appropriate technology use and good citizenship. Student understands that technology should be used appropriately but believes that some misuse is ok. Student having difficulty realizing how inappropriate technology use affects others. Student cannot understand the need for using technology appropriately. At the conclusion of the activity, did the student seem to gain any new ideas or concepts? Overall, what effort did the student put forth in this activity? Yes, the student seemed to learn many new ideas. The student has given much effort to the topic. Yes, the student took away some ideas. The student worked hard, but not 100% Not sure. The student did very little during this activity. No, the student seems to be disinterested in the topic. The student provided no effort in doing this activity. Score:
19 Holistic Score: The holistic score provides a general level of online computing usage and understanding. Look at your holistic score and the description of that score below = Exemplary understanding of topic and Digital Citizenship. Student has good understanding of the concept = Above average understanding of the topic and Digital Citizenship. Student understands the topic but still needs additional resources = Below average understanding of the topic and Digital Citizenship. Student struggling with this topic and overall concept of Digital Citizenship = Low understanding of the topic and Digital Citizenship. Student has little knowledge of the topic, more work is needed. Below 17 = needs additional work with the topic and Digital Citizenship. Student does not understand the topic or is uninterested.
Lesson Goals/Objectives: To decide where cell conversations are appropriate.
LEARNING AND STUDENT PERFORMANCE ACTIVITIES 7.1 Guided Lesson Plan #1 Summary Description Cell phone Interruptions Focus Question: Should people be able to use cell phones in crowded places? Additional
Teaching Digital Citizenship
32 Government of Newfoundland and Labrador - Education I A School-Wide Approach - Positive Behaviour Supports 2013 Education Teaching Digital Citizenship Digital citizenship can be defined as the norms
STOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself
Online Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
Keeping Score: Why Credit Matters
Keeping Score: Why Credit Matters LESSON 6: TEACHERS GUIDE In the middle of a championship football game, keeping score is the norm. But when it comes to life, many young adults don t realize how important
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger
Baldwin County Public Schools. Acceptable Use Policy
Introduction Baldwin County Public Schools Acceptable Use Policy Baldwin County Public Schools (BCPS) recognizes that access to technology in school gives students greater opportunities to learn, engage,
2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood
K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying
Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability
Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability The i-safe comprehensive curriculum provides a unique approach to Internet safety education, by meaningfully integrating
Related KidsHealth Links
Grades 6 to 8 Personal Health Series KidsHealth.org/classroom Teacher s Guide This guide includes: Standards Related Links Discussion Questions Activities for Students Reproducible Materials Standards
EADS up. stop think connect
EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,
FIRBANK GRAMMAR SCHOOL
FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...
Calling for Help in an Emergency
Calling for Help in an Emergency In an emergency, the ability to call for help quickly and effectively can mean the difference between minor property damage and total devastation, or even between life
National Cybersecurity Awareness Campaign. Kids Presentation
National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help
Digital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
TECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus
Telecommunication Tools TECHNOLOGY The Internet is like a giant web of computers connected. The Internet is also called the World Wide Web. There are good places to go on the Internet and there are some
HEADS up. stop think connect
HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more
Music and the Internet. A guide for parents and teachers
Music and the Internet A guide for parents and teachers Music on the internet what you should know There are many great ways of accessing music safely and legally online. This guide aims to keep parents,
Mental Health Role Plays
Mental Health Role Plays Goals: To discuss various mental health issues and mental illnesses. To discuss stigma, support and treatment options surrounding mental health issues and mental illnesses. Requirements:
SOCIAL NETWORKING SITES
YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,
Media Production Fundamentals #7510
Media Production Fundamentals #7510 2013-14 Instructor Information Instructor: Allen Haeger Room: B105 Office: B107 Voice Mail: E-Mail: [email protected] Course Website https://sites.google.com/a/cfsd16.org/mediaproduction/
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
Note: Survey responses are based upon the number of individuals that responded to the specific question. Response Responses Responses
State: IN Results based on 133 survey(s). Note: Survey responses are based upon the number of individuals that responded to the specific question. What is your current job responsibility? (select one)
Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org
Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage
Parent / Guardian Consent for Technology Use in Schools
Parent / Guardian Consent for Technology Use in Schools Our school uses computers and other mobile devices in the classroom to help increase student motivation and achievement. We will use laptop sets,
Class 3: Identify Tricks and Scams Online
Class 3: Identify Tricks and Scams Online Identify Tricks and Scams Online Instructor s Overview DESCRIPTION: In this lesson, students will learn how to avoid online tricks and scams, and learn best practices
Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES. Version 5
BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 5 08/25/2015 Table of Contents BYOD Program Overview... 3 What is BYOD?... 3 BYOD Rationale... 3 Overview of BYOD Program... 3 Objective
Case study: What the? Online scams and identity theft
Case study: What the? Online scams and identity theft Theme The internet and mobile technologies are a source of scams and identity theft. Key learning/subject areas Cross curricula. Duration One to two
Learn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
Characteristics of Successful Online Students. highschool.nebraska.edu [email protected] (402) 472-3388
Characteristics of Successful Online Students Enthusiasm & Curiosity Organization Study Skills Intellectualism Being Well-Rounded highschool.nebraska.edu [email protected] (402) 472-3388 Characteristics
St Bernadette s Catholic Primary School. E-Safety Policy
St Bernadette s Catholic Primary School E-Safety Policy St Bernadette s Catholic Primary School - e-safety policy Our Vision St Bernadette s Catholic Primary School embrace the positive impact and educational
Safety Tips for Social Networking
Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and
Music, Film, TV and the Internet. A guide for parents and teachers
Music, Film, TV and the Internet A guide for parents and teachers Music, film and TV on the internet what you should know There are many great ways of accessing music, film, TV and video safely and legally
October Is National Cyber Security Awareness Month!
(0 West Virginia Executive Branch Privacy Tip October Is National Cyber Security Awareness Month! In recognition of National Cyber Security Month, we are supplying tips to keep you safe in your work life
Protect Yourself. Who is asking? What information are they asking for? Why do they need it?
Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary
Phase 2 The System Specification
Team W2 Video-Conferencing-Based Classroom Extension Sergio Bana Andrew Carland Matt Dyson Sarah Jordan Andrew Wantuch Phase 2 The System Specification 1 P a g e TABLE OF CONTENTS 1. INTRODUCTORY PROBLEM
How To Understand Credit Rating And Credit Rating
Keeping Score: Why Credit Matters LESSON 1 Keeping Score: Why Credit Matters LESSON 1: TEACHERS GUIDE In the middle of a football grandfinal, keeping score is the norm. But when it comes to life, many
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is
C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:
Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online
Health & Safety at Work
Ministry of Labour Worker Health & Safety at Work Prevention Starts Here Worker Health and Safety Awareness in 4 Steps This workbook belongs to: Contents 01 INTRODUCTION 03 STEP 1: GET ON BOARD 03 Everyone
Technology Acceptable Use Policy
Technology Acceptable Use Policy Introduction San Gabriel Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop
Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives
Estimated time: 45 minutes Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Overview: Students learn strategies for guarding against
It s easy to protect our files our school work, our music, our photos, our games everything that we save on our computers from loss by malware.
Activities for Protecting Your Identity and Computer for Elementary and Middle School Students Overview There are three posters about protecting your computer for this grade span. We recommend that these
SPRING VALLEY MIDDLE-HIGH SCHOOL. Bring Your Own Device (BYOD) Guidelines
SPRING VALLEY MIDDLE-HIGH SCHOOL Bring Your Own Device (BYOD) Guidelines Last updated: 9/5/2012 Gretchen Cipriano Principal If you have questions, please email [email protected]. PURPOSE/PLAN
What does student success mean to you?
What does student success mean to you? Student success to me means to graduate with a B average with no failing grades. Ferris is ridicules tuition rates don t affect me since I was fortunate enough to
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
CFHS Grading Scale: Computer Lab Rules: THESE RULES ARE DISTRICT POLICIES AND MONITORED BY THE ADMINISTRATION, TECH SUPPORT AND TEACHER
2011 2012 Course: Graphic Design 1 Teacher: Kim Gassman Email: [email protected] Room: Computer lab, House 1 Office Hours: 7:30 AM Fee: $40 payable to the bursar Class Website: http://www.cfsd16.org/teachers/gassman
STUDENT LAPTOP GUIDELINES
Bellmawr Public Schools STUDENT LAPTOP GUIDELINES Laptop Initiative Guiding Principles Laptops are provided first and foremost to further academic achievement Students are responsible for themselves and
Choosing an LMS FOR EMPLOYEE TRAINING
Choosing an LMS FOR EMPLOYEE TRAINING As organizations grow it becomes more challenging to scale your internal learning culture. You must be certain that your staff is trained in the entire organizational
Today s teens use technology more than ever. Most have
Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social
Their stories are tragic. A new chapter starts now. now.
! Their stories are tragic. A new chapter starts now. now.! Bully is a movie that tells powerful stories about children and their families dealing with extreme pain and tragic consequences related to bullying.
How To Teach Your Students To Be Respectful
E-RATE TOOLKIT Show Respect Online LESSON PLAN Essential Question: How can I make sure my emails are clear and respectful? Learning Overview and Objectives Overview: Students explore the similarities and
BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 4.3.14 04/03/2014
BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 4.3.14 04/03/2014 Table of Contents BYOD Program Overview... 3 What is BYOD?... 3 BYOD Rationale... 3 Overview of BYOD Program... 3 Objective
Sibford School Student Computer Acceptable Use Policy
Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students
Internet Safety/CIPA Lesson Plan
Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,
Chromebook Policy and Information for Students and Parents
1 Chromebook Policy and Information for Students and Parents The mission of the 1:1 program in the Meadow Heights High School is to create a collaborative learning environment for all learners. This environment
A Publication of the GCPS Information Management Division
GCPS A Publication of the GCPS Information Management Division Gwinnett County Public Schools is committed to providing information related to student technology use in a manner that is clear, concise,
Music, Film, TV and the Internet. A guide for parents and teachers
Music, Film, TV and the Internet A guide for parents and teachers Music, film and TV on the internet what you should know There are many great ways of accessing music, film, TV and video safely and legally
Technology Acceptable Use Policy. Introduction
Technology Acceptable Use Policy Introduction Shiloh Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop skills
Private and Personal Information
LESSON PLAN Private and Personal Information UNIT Essential Question How can you protect yourself from online identity theft? Lesson Overview As students visit sites that request information about their
Would You Like To Earn $1000 s With The Click Of A Button?
Would You Like To Earn $1000 s With The Click Of A Button? (Follow these easy step by step instructions and you will) This Version of the ebook is for all countries other than the USA. If you need the
Office Etiquette and Professionalism. Working to support our military veterans in cooperation with Accenture
Office Etiquette and Professionalism Working to support our military veterans in cooperation with Accenture Published May 19, 2014 Workplace code of conduct A code of conduct outlines the mission and values
COMPUTER SUPPORT STAFF TIPS FOR DISABILITY ETIQUETTE
COMPUTER SUPPORT STAFF TIPS FOR DISABILITY ETIQUETTE COMPUTER SUPPORT STAFF TIPS FOR DISABILITY ETIQUETTE Norman Coombs, CEO EASI EASI: Equal Access to Software and Information 2011 (this document may
DIGITAL CITIZENSHIP MODULE 1
Digital Etiquette DIGITAL CITIZENSHIP MODULE 1 Email, Texting, Cell Phone Usage, Ringtones, Social Networks, YouTube, Web Browsing, Shared Storage/Usage Space Define and apply the standards of use to daily
Bring Your Own Device Program (BYOD)
Bring Your Own Device Program (BYOD) A. Parent Letter Including Recommended Device Types B. Student Owned Device Handbook C. District Social Media Policy & Consent D. Parental Consent Form and Student
Teaching Digital Citizenship: When will it become a Priority for 21 st Century Schools?
Teaching Digital Citizenship: When will it become a Priority for 21 st Century Schools? Mike S. Ribble Instructional Services Coordinator Bluemont Hall 016C College of Education Manhattan, KS 66506 Voice
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
School-Based Health Education Standards:
School-Based Health Education Standards: Accessing Valid Health Information (A.V.I.) Interpersonal Communication (I.C.) California Healthy Kids Resource Center (C.H.K.R.C.) Hello. This is the third module
Bring Your Own Device (BYOD) Guidelines Gettys Middle School
Bring Your Own Device (BYOD) Guidelines Gettys Middle School BYOD At Gettys As we work to prepare students for the 21 st century, we must challenge students with increased rigor and personalized academic
Trade Show Staff Training. Kevin England
Trade Show Staff Training by Kevin England Today s Trade Show Environment Setting Reasonable Objectives Managing Your Own Expectations Managing Visitor s Expectations Trade Show Selling Process Engage
How To Use Your Cell Phone At Renaissance Academy Charter School
Renaissance Academy Charter School Bring Your Own Device (BYOD) Board Policy PURPOSE The Renaissance Academy School Board values technology and seeks to increase student access and use when it will enhance
Young people and drugs
Young people and drugs Many parents worry about whether their son or daughter is taking illegal drugs, how they can tell, and what to do about it. While there s a lot of concern about illegal drugs in
BYOD and Digital Citizenship at Trumbull High School
BYOD and Digital Citizenship at Trumbull High School Providing students and staff with a 21st century digital learning environment is part of the Trumbull High School core values. THS now allows high school
51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES
Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology
Tech savvy? Lesson A Tech support. I have no idea why... UNIT. A Unscramble the questions. B Unscramble the statements.
Tech savvy? UNIT 9 Lesson A Tech support 1 I have no idea why... A Unscramble the questions. 1. which battery / Do you know / should / buy / I /? Do you know which battery I should buy? 2. they / where
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
Cyber safety Parent Easy Guide 63
Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed
Mentor Public Schools Board of Education 6.48 Policy Manual page 1 Chapter VI Pupil Personnel STUDENT E-MAIL, INTERNET AND COMPUTER USE
Policy Manual page 1 STUDENT E-MAIL, INTERNET AND COMPUTER USE Access to the Internet is being offered by Mentor Public Schools through the IT Department. The District is also pleased to provide its students
I. PERSONAL RESPONSIBILITY
ACCEPTABLE USE AND INTERNET SAFETY POLICY FOR STUDENTS USING THE COMPUTER SYSTEMS OF THE BUTLER TECHNOLOGY AND CAREER DEVELOPMENT SCHOOLS The Butler Technology and Career Development Schools is pleased
Years 3-7 Acceptable Use Policy & Agreement
Years 3-7 Acceptable Use Policy & Agreement Reidy Park Primary School is committed to enhancing teaching and learning through the safe use of information and communication technologies (ICTs). We require
How To Behave At A School
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
