Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Digital Citizenship Teaching Group 4

Group 4 Presentation for ED527-301

Kandi Massey

on 28 September 2012

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Digital Citizenship Teaching Group 4

A 6th Graders Guide to Digital Citizenship 1 2 Cultural & Equity Issues 3 Legal & Ethical Issues 4 Educational Issues Social Issues Using Technology Appropriately The future of education Are you ready? This is technology This is the future of education Are you ready? Today, schools... ...are online. ...have flipped classrooms. ...have replaced textbooks with eBooks. ...take field trips without ever leaving the room. ...explore other countries through a computer. ...connect with other classrooms through video chat. This is technology. This is the future of education. Are you ready? Some states and school districts now require students to take an online course in order to graduate. Experts predict that by 2019, 50% of all high school classes will be offered online. This means you will have access to classes you wouldn't be able to receive otherwise due to low-funding or low-teacher availability. (classes like web design, health and wellness, and computer programming) Teachers are even starting a variation of online learning by flipping their class. A "flipped" class is when you receive the lesson at home and do the homework in class with the teacher. We live in a world where we have gone from one computer per class to one computer per student. Even traditional classrooms use
technology on a regular basis. John Tiffany, a high school science teacher, explains how he uses the Internet in all his classes for activities such as finding articles, using e-mail to respond to them, and accessing his class website to respond to other classmates’ discussions. These are all common assignments
in today’s traditional classroom. researching
collecting pictures
internet scavenger hunts
virtual field trips
e-mailing and skyping uploading files
polling apps
student response systems
aka “clickers” These are all tools and skills you
need in the traditional classroom. From online classes to blogging
to video creation to simply typing a report
—all are the present and future of technology,
and all require a set of skills. Do you have what it takes? to be successful...
in school?
in college?
in the workforce? Can you…
video chat?
create a video?
post it on YouTube?
create a web page?
create online group projects
without ever meeting with the group?

Do you know how to protect yourself?
your information?

Do you know how to find information
online that is trustworthy? Do you have skills? You should! Technology is the future of education. You need a certain set of skills that allows you to locate, analyze, and produce information through some form of multimedia like YouTube, Prezi, Glogster, or Facebook pages. Problem-based learning, Project-based learning, and Design-based learning all use real world situations that teach you skills you will need for college and your career. Research shows project-based learning helps students who struggle in lecture-style classes succeed by providing situations and problems that students find relevant to themselves. Problem-based learning offers real-world problems where “students work in small groups
…and explore multiple solutions” for completion. Learning options, such as design-based, help students excel in math and science because they are able to understand what makes systems (like the solar system or the body) function. Design-based projects include assignments like building robots! So how important is technology?
Even if you never take an
online class in high school or college, and even if you won’t use
a computer on your job, it’s still a necessary skill to learn. It can help with future job searching! Technology is
our present and
our future. Do you have the skills to succeed? References and Those Who Use It Respecting Technology Privacy and
Protection What is
Identity Theft? When someone uses your
personal information
without you knowing! Almost 36,000,000 people
were affected
by identity theft last year What are common ways
to have your
identity stolen? 1. Phishing Phishing is when people pretend
to be companies and send emails
asking for your password
or other information . . .

Remember, no company will ever
ask for this information! 2. File Sharing

When you download documents, music, images, or videos from another computer.

Never click links in emails,
even if it is from
someone you know and trust. 3. Social Networks Facebook and Twitter are fun, but . . .

Even if your profile is "locked" or "private" . . .

Do not put where you live,
phone number, or any other
PERSONAL, PRIVATE information. What is a
Computer Virus? Computer Viruses are small software
programs that can really hurt
your computer.

You can get a virus from
email attachments, strange websites,
phishing scams, free game downloads,
and even instant messaging. In 2008,
known viruses! Tell your parents to install
anti-virus software to protect

YOU and YOUR computer. Isn't Technology
Great? YES! However . . . .
with great technology,
comes great responsibility. 47% of teens
with cell phones
have sent
a text message
and wished they
could take it back. The more text messages
you send, the more likely you are
to make this mistake
or send a text message
to the wrong person. Remember, it is harder to express
your feelings in a text message.

People may not know you are
joking, sad, or happy . . . Online Predators are bad people
who use the internet to hurt
and take advantage of
children and teens. To protect yourself, do not add strangers
to your Facebook friend list
or allow strangers to follow you on Twitter.

Do not email or text
people you
do not know. Strangers are not
the only problem.

Even people you know can cause trouble online. Cyber-Bullying is using
the internet, cell phones,
video game systems, or

other technology to hurt,
threaten, or embarrass
someone else. 43% of teens were
cyber-bullied last year.

Most victims of cyber-bullying are
between 12 and 17 years old. Anyone can be a cyber-bully.

Treat others how you want
to be treated . . . even online. Nafeesa, a 15 year-old cheerleader
from New Jersey, was targeted
by a cyber-bully. The bully pretended to be Nafeesa, posted embarrassing pictures and sent angry messages to her family and friends. This continued for YEARS until the police caught the bully. Cyber-bullying is wrong!
If you do it, you
will get caught
and go to jail. Using too much
technology can be a
bad thing! On average, teens spend 9.5 hours
a day using technology like televisions, computers, and cell phones . . .

That's 40% of your day! Frank is 14 years old and
he sends and receives

over 500 text messages a day.
That's 21 text messages an hour! Using too much technology can cause students to make bad grades,
get in trouble at school,
and even get in fights
with their parents. Technology is a part of your life, not all of it!

Make time to enjoy
other activities
with family and friends. Downloading music or software from the Internet without paying for it is also breaking Copyright Laws! Copyright Issues Jean is in a hurry to finish her English paper and finds a great source of material on the Internet. It's perfect! She just copies a few paragraphs and puts them into her paper. She says it's OK because the information was posted on the Internet. Plagiarism Jean just committed what is called plagiarism. Plagiarism is when you copy something someone else wrote and pretend that you wrote it yourself. This is a form of cheating! The person who wrote the words has what is called a "copyright" which means he "owns" those words once they have been written down and no one can exactly copy them without giving him credit.

If you want to use words that someone else wrote in your paper, you have to let everyone who reads your paper know who really wrote those words. You do this by listing the author as a "source" that you used. Your teacher can show you the correct way to do this. Your best friend Johnny just got a new CD and it's your favorite band! He loans it to you and tells you to just make a copy of it for yourself. After all, he says, no one will get hurt, so it's OK. Copying CDs, Movies, or Software Copying a CD or a movie or a computer game that you did not buy means you are stealing the money it would have cost to buy it from the people who made the CD, the movie or the game. That's how they earn their money. You wouldn't want someone to take something you made without permission, would you?

Imagine this: You recorded a CD and were going to sell it for $1 each to all the students in your class. You worked really hard getting it just right. But, the first person who bought it made copies and gave them to everyone else without your permission!
How would you feel?

It's OK to borrow a CD, a movie or a game, but don't make copies of it if you didn't buy it. Harmful Computer Programs You are looking at YouTube videos when an advertisement window pops up. You close it, but then another window pops up. You close that one, but another pops up, and another, and another.
You can't close them as fast as they are opening! Malware (Malicious Software) Hackers sometimes get into a person's computer and load a program called a "computer virus" or a "worm" onto the computer. A computer virus can damage your computer data, files, or memory. It can delete things, move things so that you can't find them, or make programs not work the way they are supposed to.
Viruses can be very difficult and costly to remove from a computer. There is software called "Antivirus Protection Software" that you can load on your computer to help protect it from viruses. Some of this software is free, other versions you have to buy.

They can be very important in protecting your computer from viruses! Isabel is checking her e-mail and sees one that says she has won a prize! She is so excited! She doesn't recognize the company, but that's OK - she's won a prize! The message says all she has to do is click on the link in the message and type in her name, address, phone number, and some other information. Phishing Don't ever click on a link in an e-mail unless you are sure of who sent it and why. This is called "phishing" (pronounced fishing) but can get you in a lot more trouble than regular fishing can!

Some companies use phishing to gather information about their customer's buying habits. This helps them understand what their customers want and design better products and services. That is OK and nothing to worry about.

But other dishonest people use this to steal information so they can rob you. They get unsuspecting people to enter bank account numbers or credit card numbers and then take their money or charge things to their accounts.
Never click on a link in an e-mail unless you know the sender, and never enter any kind of important information on-line without letting your parents check it out first. THE DIGITAL DIVIDE by Clay Shumate by Kandi Massey Another way to avoid Plagiarism is to read the material several times and then write it in your own words. This is called "paraphrasing" and is not cheating. It has to be your OWN words, though. You can't just change one or two of the author's words and call it paraphrasing. by Cheryl Waites students’ physical access to technology is dependent on several factors.

Let’s look at race and socioeconomic status: GAPS IN ACCESS The graph below shows statistics from studies conducted between 2002 and 2005. While these numbers may have changed over the past decade, they reflect the reality that certain racial and socioeconomic groups have greater access to educational technology than others. GAPS IN ACCESS THE DIGITAL DIVIDE refers to students’ access to educational technology, and the quality of students’ interaction with that technology. The Digital Divide Racism, classism, and gender bias affect students’ access to educational technology: GAPS IN SUPPORT AND ENCOURAGEMENT When a teacher always asks a boy, instead of a girl, to help connect a DVD player to a TV, the teacher is sending a clear but unvoiced message that boys are supposed to be able to know how to help, whereas girls will be less likely to know how. Do you think the teacher is right? What might the teacher do to avoid sending this unintended message? Instead of automatically choosing a boy, the teacher can provide opportunities for boys and girls to help.

Can you think of other ways that racism, classism, or gender bias affect students' access to educational technology? What might happen if the girl never gets an opportunity to help the teacher with classroom technology?

According to the National Science Board, women earn only 27% of bachelors degrees in computer science. Could girls' opportunities in the classroom affect their opportunities later in life? If a teacher asks a group of students of color to use computers to type a term paper, and asks a group of white students to use computers to inquire about a subject of interest, formulate a research question, and prepare a multi-media presentation, which group is getting a better education? This is one way that a teacher’s (intentional or unintentional) racism affects students’ learning experiences. Economically disadvantaged students, girls, and students of color are not reaping the same benefits from existing educational technology as their affluent, white counterparts. A, L., R, L., S, C., & K, P. (2010). Teens and mobile phones. Informally published manuscript, Michigan
Communication Studies, Retrieved from http://pewinternet.org/Reports/2010/Teens-and-Mobile-Phones/Chapter-5/Regretting-

Blended learning: a disruptive innovation. (n.d.) Retrieved from

Costanza, T. (2012, July 25). Evolution of educational technology (infographic). [infographic]. Retrieved from

Evaluating online learning challenges and strategies for success. (2008). Retrieved

Fox, S. (2005). Digital divisions. Washington, DC: Pew Internet & American Life Project.

Gorski, P.C. (2006). Complicity with conservatism: The de-politicizing of multicultural and intercultural education. Intercultural
Education, 17(2), 163-177

Gorski, P. (2007). Insisting on digital equity: Reframing the dominant discourse on multicultural education and technology. Retrieved
from http://edchange.com/publications/digital-equity.pdf

Jesstern. (2010, January 10). Web 2.0 in education. [video file]. Retrieved
from http://www.youtube.com/watch?v=KdwwcLkmkw&feature=youtu.be

Lewin, T. (2010, January 20). If your kids are awake, they’re probably online . The New York Times. Retrieved from

National Center for Educational Statistics (NCES). (2002). Beyond school-level Internet access: Support for instructional technology.
Washington, DC: U.S. Department of Education Are you sure? Is that right? Is it really? Is it? No! It's not OK! It's stealing! You've got a VIRUS! What's going on? It looks ok . . . . Should she do it?
NetSmartz.Org, (2007). Netsmartz.org social networking tips [Video podcast]. Retrieved from

Nova Development. (2010). Art Explosion 500,000 (Version [Computer software]. Calabasas, CA: Avanquest North America, Inc.

Pacific, P. (2010, August). 21st century skills for students and teachers. Retrieved from http://www.ksbe.edu/spi/PDFS/21 century skills

Per Christensson. (2006). Techterms.com. In The Tech Terms Computer Dictionary. Retrieved from www.techterms.com.

Queally, J. (2011, February 13). Newark teen's online identity stolen and used to destroy her reputation. The Star-Ledger. Retrieved from

Roblyer, M. D., & Doering, A. H. (2012). Integrating educational technology into teaching. (6th ed., pp. 18-19). Boston, MA: Pearson.

Sharing too much online and on smartphones leaves you vulnerable to id theft. (2012, March 22). The Boston Globe. Retrieved from

Siciliano, R. (2010, October 12). Retrieved from https://blogs.mcafee.com/consumer/identity-theft/five-ways-identities-are-stolen-online

Starr, L. (2011, June 14). Technology integration / ideas that work. Retrieved from

Walsh, K. (2012, August 15). 5 fun ways to use facebook in your lesson plans and teaching. Retrieved from

Walsh, K. (2012, September 9). 10 emerging education and instructional technologies that all educators should know about. Retrieved
from http://www.emergingedtech.com/2012/09/10-emerging-education-and-instructional-technologies-that-all-educators-should

Web-based course offerings. (2012). Retrieved from
http://accessdl.state.al.us/documents/9-6-12 Catalog_Fall12-Summer2013_Web-BasedCourses.pdf

What skills are employers looking for. (n.d.). Retrieved from http://www.aarpworksearch.org/Inside/Pages/HowEmployableAmI.aspx
Full transcript