Dazed, Amazed and Googled Presented by Mrs. Cline Teacher Librarian Murrieta Valley High School.

Slides:



Advertisements
Similar presentations
Northside I.S.D. Acceptable Use Policy
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
The 5 Characteristics of Social Networks Hi Sam!!! What’s up Lisa?
HISD Becoming #GreatAllOver. How many hours per day does the average child between the ages of 8 and 18 spend with media and technology? (this includes.
Cybersafety Elimbah State School Cybersafety and cyberbullying: A guide for parents and caregivers, May 2012., Dept of Education, Training and Employment.
What is Cyber-Bullying? Cyber-Bullying is the use of technology to harass, threaten, embarrass or target another person. Social Networks Instant.
What you don’t know CAN hurt you!
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
Cyber and Internet Safety El Rodeo School September 11, 2013.
e-safety and cyber bullying
Boyertown Area School District Acceptable Use Policy.
S2 – COMMUNICATIONS UNIT
What do I need to know?.   Instant Messages  Social Networking.
Are you being a safe and successful digital citizen?
Company LOGO Internet Safety A Community Approach.
GROUP 3: APRIL, DELICIA, LISA, SHEILAH.  Your child spends large amounts of time on-line, especially at night.  You find pornography on your child's.
HISD Becoming #GreatAllOver. How many hours per day does the average child between the ages of 8 and 18 spend with media and technology? (this includes.
Day 3 Cybersafety Presented by FJUHSD Teacher Librarian.
Cybersafety.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
Electronic Use Policies.   Social Media  Internet.
A Fleming Parent’s Guide to Child Safety on the Internet Adapted by Kam Purewal June 24,2010 Based on: Responding to Cyberbullying: A Guide for School.
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
INTERNET SAFETY Tips for becoming a “surfer” dude!
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
What it is About  This poster is about The Nine Elements of Digital Citizenship.  It also has a lot of information about Cyber bullying.  There were.
Controlling Your Social Networking Privacy Settings Stay safe online!
Cyberspace Rules for Mrs. Johnson’s Kindergarten Class These are the rules we will use to learn, play, and have fun on the internet.
A guide to netiquette, copyright & fair use, plagiarism, internet and computer safety By Briana Horton.
Information Literacy Dazed, Amazed and Googled Presented by Mrs. Jacobs, Teacher Librarian Vista Murrieta High School.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Information provided by Microsoft CYBERETHICS.
Acceptable Use Policy.  The District system includes:  A network of computers that serves all the schools  Saved files on a server for student work.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
August 24 th 2011 Digital Citizenship. Cell/Smart phones Slates and Tablets Social Network Sites Video Conferencing Online Gaming.
Acceptable Use Policy and Internet Safety Training Mr. Chalmers, Media Specialist Southwest Middle School Used with permission from Kristin Seeger.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Berkeley Unified School District Cyber Savvy social networking and netiquette.
Cassidy Culligan Digital Citizenship Project ED 505.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Online Safety Parent Workshop Helping to keep your children safe online.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Digital Citizenship Amy Tubb ED 505 University of West Alabama.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
© 2008 i-SAFE Inc. an i-SAFE presentation. © 2008 i-SAFE Inc. Learning Goals YOU WILL: Understand that an online stranger is anyone met exclusively online.
Acceptable Use of Internet & Technology and Netiquette for High School Students.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
The internet is an amazing resource. We can connect, communicate and be creative in a number of different ways, on a range of devices. However, the internet.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
Cybersafe and Secure BYHS ACCEPTABLE USE POLICY.  Access to Internet and computer resources should be for educational purposes.  Transmission of copyrighted.
Computer-Based Technology in the Classroom EDX 1201X National University October 20,2012.
How many of these social networks do you use?. Stay safe online!
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
E-safety Helping your children stay safe on-line A presentation for Parents.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Internet Safety. Online Concerns: Contact Content Conduct.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
Working to Keep our Children Safe in a World Filled with Technology
FJUHSD Teacher Librarian
Social Media Cybersafety.
Dazed, Amazed and Googled
Presentation transcript:

Dazed, Amazed and Googled Presented by Mrs. Cline Teacher Librarian Murrieta Valley High School

 Watch, Listen, Discuss  Take Notes  Actively Engage in Your Learning

What Does It Mean?

 Access (print, digital, audio, real world)  Evaluate (accurate, applicable, useful)  Organize (combine, synthesize, create)  Communicate (digital, visual, audio)  to learn, problem-solve, make decisions Literacy

 Ability to identify what information is needed  Understand how the information is organized  Identify the best sources of information for a given need

 Locate those sources  Evaluate the sources critically  Share that information. It is the knowledge of commonly used research techniques.

 Academic purposes  Research papers  Group presentations  Employment  Ability to find and evaluate  Use and share information  Consumer decisions  Which smart phone or car  Citizenship  Understanding issues and voting.

 The amount of information available is going to keep increasing.  The types of technology used to access, manipulate, and create information will continue to expand.

 Not all information is created equal  Some is  Authoritative  Current  Reliable  Some is  Biased  Out of date  Misleading  False

Informed Consumers of Information

What are the Rules??

Acceptable Use Policy What Does It Mean?

 The District system includes:  A network of computers that serves all the schools  Saved files on a server for student work  District to staff  Internet access

 All students MUST have a signed Acceptable Use Policy on file in order to use the system  Signed by students and parents =  “I” sticker on your Student ID

 Students will not post personal contact information about themselves or other people.  Includes:  address  telephone number  school address  Will NOT Agree to meet anyone they have met on-line

 Students should tell their teachers immediately if they receive any message that is inappropriate or makes them feel uncomfortable.

 Students will not attempt to gain unauthorized access to the system or any other computer system through the system or go beyond the authorized access  This includes:  accessing another person’s files  spreading computer viruses

 Students will NOT make attempts to disrupt the computer system or destroy data by spreading computer viruses or by any other means. These actions are illegal.

 Students will not use the system to engage in any illegal acts, such as:  arranging for sale of drugs or alcohol  engaging in criminal gang activity  threatening the safety of another person  Will not use the system for commercial activity  Will not use the system for political lobbying

 Restrictions against inappropriate language apply to all public and private messages and material posted on Web pages  Students will NOT use:  obscene, profane, lewd, vulgar, rude, inflammatory, threatening, or disrespectful language

 Students will not engage in personal attacks, including prejudicial or discriminatory attacks  Students will not knowingly or recklessly post false information about a person  Students will not harass another person

 Students will not post a message that was sent privately to them without permission of the person who sent the message  Students will not post private information about another person

 Students will use the system only for educational and career development activities  Teacher approval is required to download all files  Students will not post chain letters or engage in “spamming”

 Students will not plagiarize works that they find on the Internet  Students will respect the rights of copyright owners  If students have questions they should ask their teachers

 Students will not use the District’s system to access material that is profane or obscene, that advocates illegal acts, or that advocates violence or discrimination towards other people  If students mistakenly access inappropriate information, they should immediately tell their teacher – this protects them against a claim of intentionally violating this policy.

 Student’s rights to free speech, as set forth in the school’s disciplinary code, applies also to their communication on the Internet  The system is considered a limited forum, similar to the school newspaper  District may restrict student speech for valid educational reasons

 Students should only expect limited privacy in the contents of their personal work on the District system  Parents have the right at any time to request to see the content of student work

 The District will cooperate fully with local, state or federal officials in any investigation related to any illegal activities conducted through the District system  In addition to restrictions or elimination of use, other disciplinary actions may take place

 The District makes no guarantee that the functions or the services provided by or through the District system will be error-free or without defect.  District is not responsible for any damage suffered, including loss of data or interruption of service

 Harassment – Persistently acting in a manner that distresses or annoys another person. If you are told by a person to stop sending messages, then you must STOP  Spamming – sending an annoying or unnecessary message to a large number of people.

 Copyright – the exclusive, legal right to reproduce, publish, and sell material – such as literary, musical, or artistic work. This includes images and the written word.  Plagiarism – To steal or pass off the words or ideas of another person as your own.

What should I use??????

 1 st Response  Address  Link works quickly

Online Catalog:To see what is available from the library Online Databases: To access remotely as much information as possible---”virtual library” Full Text of magazines, newspapers, reference books & more

Subscription FeeFree Current and up-to-date. Timely research. General. Quick and easy for small tasks Print documents accessed electronically Websites could exist only in cyberspace Editorially selected quality articles that are reviewed and updated regularly and meet K-12 curriculum and state standards. Less than 10% of Google is K-12 curriculum- relevant and is focused mostly on consumer related information Responsible person(s) clearly identified Links to info can be outdated and/or from sources unknown or open to question Author may be difficult to ascertain No ads. The focus is workAds and links are sought for profit

EBSCOE-BOOKS (Infotrac) Popular and Scholarly Country Reports Maps, Flags, Statistics Reference Books Electronic Books Curriculum Standards , Print, Download Graphics MLA Citation SuggestedMLA Citation Completed

 Welcome to Wikipedia,Wikipedia  the free encyclopedia that anyone can edit.anyone can edit  1,413,387 articles in English 1,413,387  Who is responsible for the articles on Wikipedia?  You are! Actually, you can even edit this very FAQ! As there are more than 2.34 million (2,340,000) other Wikipedians, this is a collaborative effort. Thousands of people have contributed information to different parts of this project, and anyone can do so, including you. All you need is to know how to edit a page, and have some encyclopedic knowledge you want to share. The encyclopedia provides users with a certain amount of freedom.Wikipedianscollaborativehow to edit a pageencyclopedic knowledge

 Anyone can publish on the Web  It is “unfiltered”  Internet sources are much more fluid- the information they provide can change in an instant  Content not evaluated before posting  Click on each for examples Click on each for examples  Focus on: Focus on:  Authority Authority  Coverage Coverage  Currency Currency  Accuracy Accuracy  Objectivity Objectivity

 Web Directories save valuable time because SMART people, not search programs, listed the websites  MVHS Online Catalog has WEBPATH EXPRESS Click on button for access

Tips for Remaining Safe Online

The 5 Characteristics of Social Networks Hi Sam!!! What’s up Lisa?

User Based Users submit and organize information Direction of content can be determined by any user – no one person dictates the current topic Freeform/unstructured

Interactive Not just a collection of chat rooms and forums Users can play games, take fun quizzes, share photos and ideas with friends A way to connect and have fun with friends

Community Driven Members hold common beliefs or interests Can make new friends with people who say they share your interests or beliefs USE CAUTION Can reconnect with old friends

Relationships Social networks are driven by the number of relationships between its members With no control on your settings, information will be dispersed to your friends, their friends, and so on…

Emotional Content In the past, web content was primarily information Social networks allow people to communicate needs within a community of friends and receive immediate responses

References The 5 core characteristics of social networks were described in a 2007 research study by researchers at Rice University, the University of Maryland, and Max Planck Institute for Software Systems. The characteristics are outlined at /Characteristics_of_Social_Networkshttp://socialnetworking.lovetoknow.com /Characteristics_of_Social_Networks

Controlling Your Social Networking Privacy Settings Stay safe online!

Facebook Privacy Settings

Click on “Settings” Then on “Privacy Settings”

Use these options to control the information people see about you!

“Only friends” is the BEST option to limit who sees your info.

Check to see what your friends can see about you. If you don’t like what they are able to see, change it!

Do you want your cousin to know that you watch Judge Judy? If not, you can restrict that information!

You can choose what can be seen about you through the sites applications! Choose your games and applications wisely!

This is the most secure setting for applications (uncheck all)

In General…

Check the PRIVACY Settings For any and all social network sites & electronic devices---- it’s your responsibility!

Anyone can use whatever picture they want on the Internet, so beware! A nice picture can hide a not-so-nice person! It’s best not to use your full name on any social networking site – especially until you’re 18. If you are too young to use a social network, don’t lie, but your true age (teen-aged) may invite cyber-predators, so be careful. Hide your age if you can!

If you feel harassed or bullied on a social network: Ask the operators of the network for help Let them know you are a minor Or confide in a trusted adult

When on a social network: Only post things you wouldn’t mind an adult seeing Make sure you have a trusted adult as a “friend” or as a “follower.” This will remind you to be on your best online behavior!

Look to the Future Future employers may see what you have posted Colleges and scholarship organizations will look at what you’ve posted---OOPS!

Set Up Your Privacy Settings It may be the best 10 minutes you spend on the Internet! This slide presentation will be posted on the library webpage for reviewing if you need help remembering how to set your privacy settings Look on the Cyber Bullying and Internet Safety Page on the Library website

Works Cited Chait, Jennifer. “Cyberbullying Statistics.” lovetoknow. Web. 9 Sept Lopez, Maribel D. “Online Teens Are Not Immune To Phishing.” FORRESTER. Web. 13 Sept Make A Difference For Kids, Inc. “Cyberbullying.” Make A Difference For Kids. Web. 9 Sept National Crime Prevention Council. “Teens and Cyberbullying.” NCPC. Web. 9 Sept “Phishing Scams – 12 Ways to Stop Them.” Tweakspeed. Web. 16 Sept

Cybersafety

What is Cyberbullying Cyberbullying  involves the use of electronic devices  supports deliberate, repeated, and hostile behavior by an individual or group  its intent is to harm others.

What is Cyberbullying According to a survey done in 2007 by the National Crime and Protection Council: 43% of teens report that they have experienced some form of cyberbullying that year. The incidence of cyberbullying is higher among females than males. More than 50% of females age 15 to 16 years of age reported at least one cyberbullying incident.

Why do teens cyberbully? 81% Because they think it is funny 64% Because they don’t like the person 45% Because they view the victim as a loser 47% Because they feel there are no consequences for cyberbullying 45% Because they don’t think they will get caught 58% of students surveyed don’t think cyberbullying is a big deal

Do you think it was a big deal to these students and their loved ones? Rachael was stalked online by anonymous bully. She died by suicide on October 9, Ryan, a 13-year old, who died by suicide as a result of bullying at school and online. A cruel online hoax by a neighbor led to the suicide death of Megan. Stop Cyber bullying

What is a cyber-predator? A cyber-predator uses the internet to hunt for victims to take advantage of them in some way: emotionally sexually psychologically financially A cyber-predator knows how to manipulate people by creating trust and friendships where none should exist.

What is a cyber-predator? 77% of the target for online predators are teens aged 14 and older. 33% of teens received an aggressive sexual solicitation online in the past year. 75% of children are willing to share personal information online about themselves and their family in exchange for goods and services.

STOP the Bad Guys! 1. Be suspicious of any with urgent requests for personal financial information. DO NOT RESPOND TO IT! Phisher s are typically NOT personalized Valid messages from your bank or e- commerce company generally are

STOP the Bad Guys! 2. If you suspect an message might not be authentic...Don't use the embedded links to get to another web page. Call the company on the telephone, or log onto the website directly by typing the URL into the address bar Don’t cut and paste the link from the message into your Internet browser – the phisers can redirect you to a different site

How to stop the bad guys 3. Avoid filling out forms in messages that ask for personal financial information. Phishers make very good fake forms. Only communicate personal financial information via a secure website or the telephone.

4. Don’t personal or financial information. is not a secure method of transmitting personal information No one indicator is foolproof Some phishers have forged security icons like the lock icon on an order form

5. Always ensure that you're using a secure website when submitting credit card or other sensitive information via your Web browser. Web address should begin with " rather than just "

Cyberbullying Video Click on Picture for video

Consequences Click on picture for video

Social Networking Video Click on picture for video

Be Smart! Stay Safe Online!! Get more your library!

Virtual Library With Unlimited Access 24 hours a day, 7 days a week with Internet access! Click on logo below for access