create - 2webwatchers

Download Report

Transcript create - 2webwatchers

Cartoon by Peter Steiner. The New Yorker, July 5, 1993 issue (Vol.69 (LXIX) no. 20) page 61
Traveling the Information Highway
“In education circles the magical mantra has been ’student
safety.’ The fear of online predators has been used to curtail,
restrict, and prohibit the use of some of the most promising
online educational technology tools. …
As educational leaders we need to be safety conscious. We
need to be prudent, reasonable; but we won’t live in fear and
we won’t act from fear. It is by opening doors, not closing
them, that we create new possibilities for our children and
new futures for ourselves.”
Pete Reilly, Facts Abut Online Sex Abuse and Schools, Jan. 06, 2007
Essential Questions
 How can we teach our students to use the
Internet safely?
 How can we teach our students to use the
Internet ethically?
 How can we teach our students to use the
Internet effectively?
The Read-Only Web (Web 1.0)
 Powerful resource for
educators and
students, but…
 Information moves
one way only- from
publishers to
consumers
 Information cannot be
edited
The Read-Write Web (Web 2.0)
 It is now as easy to create
as it is to consume
 Anyone can publish, share,
and change information
 Web 2.0 changes
everything – including
teaching and learning!
Image from Time Magazine, Dec 25, 2006/Jan 1, 2007 issue
Blogs
 Web + Log = weblog
or “we blog”
 Easy to create
 Easy to update
 Allow visitors to
comment
 If you can fill out a
form, you can blog!
Wikis
 Websites anyone can
edit!
 If you can use a word
processor, you can
use a wiki.
 Visitors can see a
history of changes and
revert to earlier
versions.
http://wikipedia.org/
Educational Wikis
 Collaboratively
authored class texts
 Writing projects
 Sharing resources
 Grade level teams
 Subject area teams
http://youthwiki.wikispaces.com/
IM and Chat
PM
POS
A/S/L
LOL
TMI
P911
PAL
PAW
DIKU
BWL
CTN
TTYL
BRB
EGUSD Internet Safeguards
What we currently have in place:




Internet filtering software and procedures
CIPA/COPA Guidelines
AR 6162.7
AB 307 – Internet safety as part of next EGUSD
Technology Plan
 iSafety workshops through Curriculum and
Professional Learning
 Parent and community workshops through EGACE
Social Network
 Members have profiles
 May contain personal
information
 Used to connect with
others
 Often includes a blog,
pictures, songs,
videos, and messages.
Let’s take a tour!
Safety Concerns
 Way too much information – age, address,
phone number, gender, family names,
school, passwords
 Inappropriate content
 Inappropriate sharing
 Trevor’s Story
Adapted from http://www.staysafe.org/teens/videos/predator.html
What to Watch for? Grooming!







“Let’s go private!”
Where’s your computer in the house?
Who’s your favorite band? Designer?
I know someone who can get you a modeling job.
You seem sad. Tell me what’s bothering you.
I know a way you can earn money fast
If you don’t do what I ask, I’ll tell your parents/share
your photos, etc.
Sarah’s Story (iSafe.org)
*Grooming references from SafeTeen.com – How to Recognize Grooming
Cyberbullying Concerns
 Creating websites that have stories, cartoons, pictures,
and jokes ridiculing others
 Posting pictures of classmates online with intent to
embarrass them
 Engaging someone in IM (instant messaging), tricking
that person into revealing sensitive personal
information, and forwarding that information to others
 Taking an embarrassing picture of a person using a
digital phone camera and sending that picture to others
 Broken Friendship
Adapted from http://www.netsmartz.org/resources/reallife.htm#realfriendship
Why Kids Cyberbully?
 Often motivated by anger, revenge, or
frustration
 Sometimes done for entertainment
 Out of boredom + too much time +too many
tech toys
 To torment others for self ego
 To bolster social standing
 Some even think they are righting a wrong
Cyberbullying Statistics
 19% of teens report being harassed or bullied
online
 The incidence is higher among kids 16 and 17year-olds at 23%
 85% of incidents occur when youth are at home
 In 44% of cases, children are harassed by their
peers
*Stats from NetSmartz.org
Safety Tips for Students




Do not share identifying information
Do not share personal information
Do not share provocative images
Do not post false information about other
people
 Consider the consequences and the future
 Talk with parents, teachers, or other
trusted adults if you have concerns about
safety or cyberbullying
Safety Tips for Parents
 Create an open dialog about online safety
concerns
 Set boundaries and time limits for online
activities
 Move computers into shared spaces &
make monitors visible
 Watch for Alt+F4 (Alt+Tab)
 Check history (is it suspiciously blank?)
 Beware of a reluctance to be candid
Safety Tips for Teachers
 Communicate with students
 Communicate with other
educators
 Communicate with Tech Services
 Confront students who are
behaving in irresponsible,
inappropriate, or unsafe ways.
Do not look the other way.
 Create an iSafe classroom
Click for iSafe
Overview
Growing Bank of FREE Resources
Q&A
 Contact Information:
 Gail Desler – Technology Integration Specialist
[email protected]
 Kathleen Watt – EGUSD Web Specialist
[email protected]
 Professional Development Opportunities:
 Contact Curriculum and Professional Learning for a listing
of upcoming workshops
http://www.egusd.net/cpl/pl_opportunities.html