Introductions A total of 5 students attended the program. 4 boys and 1 girl. We spent a few minutes getting to know each other. I also introduced the.

Slides:



Advertisements
Similar presentations
Partnering With The Hostess
Advertisements

Your Child As A Reader.
Going Places Safely Going Places Safely Digital Literacy Grade K VUSD Grade K.
CONNECTING WITH OTHERS. Connecting with others TALKING HELPS: IT’S HARD TO SAY Scenarios Harriet stole some money from her Mum’s purse because she wanted.
What is Cyberbullying? "Cyberbullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted.
Parent-Teacher Conferences:
Wolfpack Advocacy Hour January 10, 2012 Grade 10.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Going Places Safely Essential Question:
2. would rather...than Direct Speech & Indirect Speech.
P OWER WRITING T ECHNIQUE You have 5 minutes to write a paragraph about what you think of a particular type of a student. excellent, average, or Careless.
 Welcome to Second Grade Curriculum Night. Family Information System Staff Directory Amy Clark On my classroom website, you will.
Social Media: FACEBOOK Kristin Martin Professional Development.
My Policies and Some Advice for Doing Well in this Course.
My Policies and Some Advice for Doing Well in this Course.
1. Posting online is when you upload anything on the Internet, like photos, videos and information. a. Give me an example of something you have posted.
Do you know how to keep yourself safe?
“At A Distance” Video Cyberbullying Chain Reaction Grades 3-4
Accelerated Reader Questions & Answers
A teacher asks her students to write down one Teacher reads the responses. She picked Alex’s paper up as she read “I I had friends at this school”.
TEACHERS AS MODELS FOR DIGITAL LEARNING By Jessica Bonatsos.
Welcome to 4 th Grade! Ms. Oglesby’s Class A note to the parents about this year.
Safety On The Internet  Usage time  Locations that may be accessed  Parental controls  What information may be shared with others Online rules should.
WELCOME TO THIRD GRADE Back to School This is Mrs. McIlrath and her family!
The people.
Bullying… What you can do about it. Who is Involved? Who are the three people involved in bullying situations? Definition of Bullying – “Bullying is when.
9/14/20151 Parent Information Night Lincoln Alternative Elementary School 5th Grade A Track.
Social Media. Topics 1. Inclusion Means Everywhere 2. What is Social Media? 3. Facebook 4. Twitter 5. Youtube 6. Instagram 7. Linked In 8. Staying Safe.
How to Teaching Social Skills to a student who has Intellectual deficiency/PDD and or Autism with the help of current technology.
Danny Learns Something New at the Zoo Contributor: Kalyn Profilet.
CYBER BULLYING MRS. CROCKER’S CLASS SUBMITTED BY:.
KAREN PHELPS Spontaneous Sponsoring. Your Home Presentations “A Valuable Source for Recruits”
Sight Words List 1 Mr. Matthews Grade One can.
How to break up with your boyfriend … By: Price Signaigo The predicament.
Internet Safety And Avoiding Online Predators. Learning Objective Today, we will identify and avoid situations that could threaten our safety when using.
XHS Students Web Tools 2.0 Class. Personal Information Passwords Make it hard for others to figure out Never give it to your friends Don’t use the same.
s By Jordon walker. Sending an attachment.
JUDICIAL AFFAIRS PROJECT RONALD ALEXANDER III. PURPOSE The purpose of this project was utilize theory and practice within the practicum site to gauge.
“The Student and the Project”. There once was a student named Jane who loved Social Studies, especially her favorite teacher Mrs. Miller! Mrs. Miller.
Making Reading Real Simple Ways to Support Reading at Home Robert Sox Senior Administrator, Title I.
LPM – Unit 1 L 4 Socialising on the internet. How do you keep in contact with your friends and family? List all of the different types of technology.
Ethics & Boundaries In the School Setting. You are in a position of power and with that comes great responsibility.
How is going on the Internet like going out on Halloween?
Digital Communication By: Kimmie LaRich. Digital Communication- is how we communicate with people all over the world Two main ways we communicate are.
PGHS Advocacy Digital Citizenship Lesson 2
GPA vs. Living on Campus & Commuting By: Alan Beavers, Joanna Stolarczyk and Rachel Quillen.
What would you do? Cyber Bullying. Directions: This PowerPoint contains scenarios in which you will have to think about the appropriate way to behave.
Review Chapter 6. REVIEW To Be Who is he? Who is she? Who are they? He’s my father. She’s my friend. They’re my parents.
Skills For Effective Communication
Click here to begin Internet Safety Keeping Kids Safe On-Line.
Welcome to Grade 2! Mrs. Waugh and Mme. Brophy. Our Class  Teachers: Mrs. Waugh and Mme. Brophy  Mrs. Waugh teaches Monday, Tuesday, and Wednesday 
Cyber-Bullying How to stay safe What to do if it happens to you.
 17. He is c ____ the room.  18. My parents like reading n______ after lunch.  19. Do you want to j____ me for dinner?  20. I think w____ clothes is.
Digital Footprints By: Devon Nicholson. What is a digital footprint? A digital footprint is an online footprint in which people can look at what you have.
Action Research Presented by Tania Bellamy Aim: To increase the communication between school and home through using a blog.
CELDT Speaking Practice Activities Speech Functions Grades 3-5.
CELDT Speaking Practice Activities Speech Functions Grades 6-8.
Christian Citizenship in a Digital World Lesson 4:Digital Etiquette.
Sometimes Teachers Change. I go to school at ________________________. There are many people that help me learn at school. They are my teachers. Sometimes.
Dealing with Cyberbullying. Characteristics of Bullying: A member of a group is targeted for: verbal abuse spreading of hurtful rumors threats of exclusion.
Introduction to Privacy
How People Violate Boundaries
Sharing on the Internet
I Can Stay Safe Online! Read the title slide with the students or have the group read it aloud. Introduce the lesson by saying that we can use the computer.
Lesson 2 5th Grade WELCOME & INTRODUCTION 1:30 CLASS WELCOME
冀教版 九年级 Lesson 49 Get Along with Others.
Here are some good questions to start out the presentation:
Online Safety! Created by Educational Technology Network
Today we will analyze the implications of posting online.
Presentation transcript:

Introductions A total of 5 students attended the program. 4 boys and 1 girl. We spent a few minutes getting to know each other. I also introduced the program at this point.

Netiquette Information Handing out book marks with the netiquette rules so that we can use that for discussion purposes.

Discussion We discussed the netiquette rules and why they are important. I chose to sit with the students rather than stand in front of them because it was a small group and I felt like I would connect with them more if I was “on their level”.

Scenarios Different internet scenarios were given to the students. They analyzed them to see what netiquette rules had been broken. I visited with the students as they were reading to make sure they understood the situation and answer any questions they had.

Lester sends to the entire body inviting them to a BYOB party at his house while his parents are out of town. Lester receives a message from a system administrator calling him in for a meeting with school officials. He objects because he feels that his is his own private business. Scenario 1

Scenario 2 Jules has walked away from a lab computer without logging off. Trish sits down and, still logged in as Jules, sends inflammatory messages out to a number of students and posts similar messages on the class newsgroup

Scenario 3 Chester, Agatha, and Ridley are hanging out at the park one day and meet up with Chester’s friend Troy. Troy takes a bunch of pictures with his cell phone and uploads them to Facebook, adding suggestive captions to the photos. Agatha starts getting friend requests from guys she doesn’t know. She also gets a phone call from one of the families she babysits for, cancelling her upcoming job with them.

Discussions The three different scenarios prior to this slide were read by the students and discussions were held about the scenario, which rule was broken and why.

Program Evaluation I enjoyed the speaker’s presentation. Yes No I learned new and useful information about the topic. Yes No I could easily hear the speaker well. Yes No I could easily see the speaker and materials. Yes No I want to find out more information about this topic. Yes No I thought the program was too long. Yes No The best aspect of the program was: My suggestions for future programs: Adapted from Wilson Library Programs that Inspire

Evaluation Results The results are an average of all the surveys completed by the students. I enjoyed the speaker’s presentation. Yes No I learned new and useful information about the topic. Yes No I could easily hear the speaker well. Yes No I could easily see the speaker and materials. Yes No I want to find out more information about this topic. Yes No I thought the program was too long. Yes No The best aspect of the program was: Looking at the scenarios and talking about them My suggestions for future programs: none

Thank You Thank you note was sent to Mrs. Judy Alexander, Librarian at Beebe High School, for allowing me to use her library.

References Teacher Created Resources. Internet Literacy, Grades 6 – Westminster, CA. erlit/scenarios.php Accessed Program Evaluation. Wilson Library Programs That Inspire. Found on Wiki for Designing Informational Programs blackboard.