Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Digital Citizenship Teaching Group 4
Transcript of Digital Citizenship Teaching Group 4
technology on a regular basis. John Tiffany, a high school science teacher, explains how he uses the Internet in all his classes for activities such as finding articles, using e-mail to respond to them, and accessing his class website to respond to other classmates’ discussions. These are all common assignments
in today’s traditional classroom. researching
internet scavenger hunts
virtual field trips
e-mailing and skyping uploading files
student response systems
aka “clickers” These are all tools and skills you
need in the traditional classroom. From online classes to blogging
to video creation to simply typing a report
—all are the present and future of technology,
and all require a set of skills. Do you have what it takes? to be successful...
in the workforce? Can you…
create a video?
post it on YouTube?
create a web page?
create online group projects
without ever meeting with the group?
Do you know how to protect yourself?
Do you know how to find information
online that is trustworthy? Do you have skills? You should! Technology is the future of education. You need a certain set of skills that allows you to locate, analyze, and produce information through some form of multimedia like YouTube, Prezi, Glogster, or Facebook pages. Problem-based learning, Project-based learning, and Design-based learning all use real world situations that teach you skills you will need for college and your career. Research shows project-based learning helps students who struggle in lecture-style classes succeed by providing situations and problems that students find relevant to themselves. Problem-based learning offers real-world problems where “students work in small groups
…and explore multiple solutions” for completion. Learning options, such as design-based, help students excel in math and science because they are able to understand what makes systems (like the solar system or the body) function. Design-based projects include assignments like building robots! So how important is technology?
Even if you never take an
online class in high school or college, and even if you won’t use
a computer on your job, it’s still a necessary skill to learn. It can help with future job searching! Technology is
our present and
our future. Do you have the skills to succeed? References and Those Who Use It Respecting Technology Privacy and
Protection What is
Identity Theft? When someone uses your
without you knowing! Almost 36,000,000 people
by identity theft last year What are common ways
to have your
identity stolen? 1. Phishing Phishing is when people pretend
to be companies and send emails
asking for your password
or other information . . .
Remember, no company will ever
ask for this information! 2. File Sharing
When you download documents, music, images, or videos from another computer.
Never click links in emails,
even if it is from
someone you know and trust. 3. Social Networks Facebook and Twitter are fun, but . . .
Even if your profile is "locked" or "private" . . .
Do not put where you live,
phone number, or any other
PERSONAL, PRIVATE information. What is a
Computer Virus? Computer Viruses are small software
programs that can really hurt
You can get a virus from
email attachments, strange websites,
phishing scams, free game downloads,
and even instant messaging. In 2008,
known viruses! Tell your parents to install
anti-virus software to protect
YOU and YOUR computer. Isn't Technology
Great? YES! However . . . .
with great technology,
comes great responsibility. 47% of teens
with cell phones
a text message
and wished they
could take it back. The more text messages
you send, the more likely you are
to make this mistake
or send a text message
to the wrong person. Remember, it is harder to express
your feelings in a text message.
People may not know you are
joking, sad, or happy . . . Online Predators are bad people
who use the internet to hurt
and take advantage of
children and teens. To protect yourself, do not add strangers
to your Facebook friend list
or allow strangers to follow you on Twitter.
Do not email or text
do not know. Strangers are not
the only problem.
Even people you know can cause trouble online. Cyber-Bullying is using
the internet, cell phones,
video game systems, or
other technology to hurt,
threaten, or embarrass
someone else. 43% of teens were
cyber-bullied last year.
Most victims of cyber-bullying are
between 12 and 17 years old. Anyone can be a cyber-bully.
Treat others how you want
to be treated . . . even online. Nafeesa, a 15 year-old cheerleader
from New Jersey, was targeted
by a cyber-bully. The bully pretended to be Nafeesa, posted embarrassing pictures and sent angry messages to her family and friends. This continued for YEARS until the police caught the bully. Cyber-bullying is wrong!
If you do it, you
will get caught
and go to jail. Using too much
technology can be a
bad thing! On average, teens spend 9.5 hours
a day using technology like televisions, computers, and cell phones . . .
That's 40% of your day! Frank is 14 years old and
he sends and receives
over 500 text messages a day.
That's 21 text messages an hour! Using too much technology can cause students to make bad grades,
get in trouble at school,
and even get in fights
with their parents. Technology is a part of your life, not all of it!
Make time to enjoy
with family and friends. Downloading music or software from the Internet without paying for it is also breaking Copyright Laws! Copyright Issues Jean is in a hurry to finish her English paper and finds a great source of material on the Internet. It's perfect! She just copies a few paragraphs and puts them into her paper. She says it's OK because the information was posted on the Internet. Plagiarism Jean just committed what is called plagiarism. Plagiarism is when you copy something someone else wrote and pretend that you wrote it yourself. This is a form of cheating! The person who wrote the words has what is called a "copyright" which means he "owns" those words once they have been written down and no one can exactly copy them without giving him credit.
If you want to use words that someone else wrote in your paper, you have to let everyone who reads your paper know who really wrote those words. You do this by listing the author as a "source" that you used. Your teacher can show you the correct way to do this. Your best friend Johnny just got a new CD and it's your favorite band! He loans it to you and tells you to just make a copy of it for yourself. After all, he says, no one will get hurt, so it's OK. Copying CDs, Movies, or Software Copying a CD or a movie or a computer game that you did not buy means you are stealing the money it would have cost to buy it from the people who made the CD, the movie or the game. That's how they earn their money. You wouldn't want someone to take something you made without permission, would you?
Imagine this: You recorded a CD and were going to sell it for $1 each to all the students in your class. You worked really hard getting it just right. But, the first person who bought it made copies and gave them to everyone else without your permission!
How would you feel?
It's OK to borrow a CD, a movie or a game, but don't make copies of it if you didn't buy it. Harmful Computer Programs You are looking at YouTube videos when an advertisement window pops up. You close it, but then another window pops up. You close that one, but another pops up, and another, and another.
You can't close them as fast as they are opening! Malware (Malicious Software) Hackers sometimes get into a person's computer and load a program called a "computer virus" or a "worm" onto the computer. A computer virus can damage your computer data, files, or memory. It can delete things, move things so that you can't find them, or make programs not work the way they are supposed to.
Viruses can be very difficult and costly to remove from a computer. There is software called "Antivirus Protection Software" that you can load on your computer to help protect it from viruses. Some of this software is free, other versions you have to buy.
They can be very important in protecting your computer from viruses! Isabel is checking her e-mail and sees one that says she has won a prize! She is so excited! She doesn't recognize the company, but that's OK - she's won a prize! The message says all she has to do is click on the link in the message and type in her name, address, phone number, and some other information. Phishing Don't ever click on a link in an e-mail unless you are sure of who sent it and why. This is called "phishing" (pronounced fishing) but can get you in a lot more trouble than regular fishing can!
Some companies use phishing to gather information about their customer's buying habits. This helps them understand what their customers want and design better products and services. That is OK and nothing to worry about.
But other dishonest people use this to steal information so they can rob you. They get unsuspecting people to enter bank account numbers or credit card numbers and then take their money or charge things to their accounts.
Never click on a link in an e-mail unless you know the sender, and never enter any kind of important information on-line without letting your parents check it out first. THE DIGITAL DIVIDE by Clay Shumate by Kandi Massey Another way to avoid Plagiarism is to read the material several times and then write it in your own words. This is called "paraphrasing" and is not cheating. It has to be your OWN words, though. You can't just change one or two of the author's words and call it paraphrasing. by Cheryl Waites students’ physical access to technology is dependent on several factors.
Let’s look at race and socioeconomic status: GAPS IN ACCESS The graph below shows statistics from studies conducted between 2002 and 2005. While these numbers may have changed over the past decade, they reflect the reality that certain racial and socioeconomic groups have greater access to educational technology than others. GAPS IN ACCESS THE DIGITAL DIVIDE refers to students’ access to educational technology, and the quality of students’ interaction with that technology. The Digital Divide Racism, classism, and gender bias affect students’ access to educational technology: GAPS IN SUPPORT AND ENCOURAGEMENT When a teacher always asks a boy, instead of a girl, to help connect a DVD player to a TV, the teacher is sending a clear but unvoiced message that boys are supposed to be able to know how to help, whereas girls will be less likely to know how. Do you think the teacher is right? What might the teacher do to avoid sending this unintended message? Instead of automatically choosing a boy, the teacher can provide opportunities for boys and girls to help.
Can you think of other ways that racism, classism, or gender bias affect students' access to educational technology? What might happen if the girl never gets an opportunity to help the teacher with classroom technology?
According to the National Science Board, women earn only 27% of bachelors degrees in computer science. Could girls' opportunities in the classroom affect their opportunities later in life? If a teacher asks a group of students of color to use computers to type a term paper, and asks a group of white students to use computers to inquire about a subject of interest, formulate a research question, and prepare a multi-media presentation, which group is getting a better education? This is one way that a teacher’s (intentional or unintentional) racism affects students’ learning experiences. Economically disadvantaged students, girls, and students of color are not reaping the same benefits from existing educational technology as their affluent, white counterparts. A, L., R, L., S, C., & K, P. (2010). Teens and mobile phones. Informally published manuscript, Michigan
Communication Studies, Retrieved from http://pewinternet.org/Reports/2010/Teens-and-Mobile-Phones/Chapter-5/Regretting-
Blended learning: a disruptive innovation. (n.d.) Retrieved from
Costanza, T. (2012, July 25). Evolution of educational technology (infographic). [infographic]. Retrieved from
Evaluating online learning challenges and strategies for success. (2008). Retrieved
Fox, S. (2005). Digital divisions. Washington, DC: Pew Internet & American Life Project.
Gorski, P.C. (2006). Complicity with conservatism: The de-politicizing of multicultural and intercultural education. Intercultural
Education, 17(2), 163-177
Gorski, P. (2007). Insisting on digital equity: Reframing the dominant discourse on multicultural education and technology. Retrieved
Jesstern. (2010, January 10). Web 2.0 in education. [video file]. Retrieved
Lewin, T. (2010, January 20). If your kids are awake, they’re probably online . The New York Times. Retrieved from
National Center for Educational Statistics (NCES). (2002). Beyond school-level Internet access: Support for instructional technology.
Washington, DC: U.S. Department of Education Are you sure? Is that right? Is it really? Is it? No! It's not OK! It's stealing! You've got a VIRUS! What's going on? It looks ok . . . . Should she do it?
NetSmartz.Org, (2007). Netsmartz.org social networking tips [Video podcast]. Retrieved from
Nova Development. (2010). Art Explosion 500,000 (Version 184.108.40.206) [Computer software]. Calabasas, CA: Avanquest North America, Inc.
Pacific, P. (2010, August). 21st century skills for students and teachers. Retrieved from http://www.ksbe.edu/spi/PDFS/21 century skills
Per Christensson. (2006). Techterms.com. In The Tech Terms Computer Dictionary. Retrieved from www.techterms.com.
Queally, J. (2011, February 13). Newark teen's online identity stolen and used to destroy her reputation. The Star-Ledger. Retrieved from
Roblyer, M. D., & Doering, A. H. (2012). Integrating educational technology into teaching. (6th ed., pp. 18-19). Boston, MA: Pearson.
Sharing too much online and on smartphones leaves you vulnerable to id theft. (2012, March 22). The Boston Globe. Retrieved from
Siciliano, R. (2010, October 12). Retrieved from https://blogs.mcafee.com/consumer/identity-theft/five-ways-identities-are-stolen-online
Starr, L. (2011, June 14). Technology integration / ideas that work. Retrieved from
Walsh, K. (2012, August 15). 5 fun ways to use facebook in your lesson plans and teaching. Retrieved from
Walsh, K. (2012, September 9). 10 emerging education and instructional technologies that all educators should know about. Retrieved
Web-based course offerings. (2012). Retrieved from
What skills are employers looking for. (n.d.). Retrieved from http://www.aarpworksearch.org/Inside/Pages/HowEmployableAmI.aspx