Presentation is loading. Please wait.

Presentation is loading. Please wait.

Technology And Safety Leah Bratcher L & M 2017.

Similar presentations


Presentation on theme: "Technology And Safety Leah Bratcher L & M 2017."— Presentation transcript:

1 Technology And Safety Leah Bratcher L & M 2017

2 Think about all of the new Technology coming out -
How does it affect learning? How does it affect how and what we teach? What are the types of technology you can name? What is your level of comfort with all of the new technology?

3 .

4 Digital Time Management
Adults waste 6.3 hours a day checking s – A DAY! Both personal and work s Our students spend 9 hours a day consuming media. 1/3 of day! Immediate satisfaction – phone notifications on updates – social media Washington Post Nov 3, 2015 Who are the role models – restaurants - dating

5 Parents - We set the example –
Be careful how we spend time with our children Parents check s, facebook, research and games.

6 Students Use their technology differently –
Social media, not Facebook, movies, check grades (on occasion) write papers, and shop! No filter!

7 Snapchat Snapchat introduced “Snap Map” earlier this year –
Allows you to share your location with your friends on a map If you aren’t careful, Snap Map will broadcast your exact location to anyone on your friends list – EVERY time you open the app.

8 Cyber Bullying 25% of teenagers report that they have experienced repeated bullying by their cell phone, or on the internet. 52% of young people reported being cyber bullied! 11% of adolescents and teens report that embarrassing or damaging photographs have been taken of them without their knowledge or consent. June 12, 2017

9 Cyber bullying affects many adolescents and teens on a daily basis
Cyber bullying affects many adolescents and teens on a daily basis. Cyber bullying involves using technology, like cell phones and the Internet, to bully or harass another person. Cyber bullying can take many forms: - Sending mean messages or threats to a person’s account or cell phone - Spreading rumors online or through texts - Posting hurtful or threatening messages on social networking sites or web pages - Stealing a person’s account information to break into their account and send damaging messages - Pretending to be someone else online to hurt another person - Taking unflattering pictures of a person and spreading them through cell phones or the Internet - Sexting, or circulating sexually suggestive pictures or messages about a person

10 The Harford County Examiner reported similarly concerning cyber bullying statistics:
- Around half of teens have been the victims of cyber bullying - Only 1 in 10 teens tells a parent if they have been a cyber bully victim - Fewer than 1 in 5 cyber bullying incidents are reported to law enforcement - 1 in 10 adolescents or teens have had embarrassing or damaging pictures taken of themselves without their permission, often using cell phone cameras - About 1 in 5 teens have posted or sent sexually suggestive or nude pictures of themselves to others - Girls are somewhat more likely than boys to be involved in cyber bullying

11 How to protect your students
Teach students to be safe on internet – Webwisekids.org or there are apps to use to teach them. Through analogies and student generated projects – remember Red Riding Hood? Things aren’t always what they seem… Guest speakers on the subject – Child Lures Prevention/Teen Lures Prevention Have students be the teachers – use Commonsense.org to help you Create a research lesson on the matter

12

13 What are other things to think about with Technology…

14 Shopping “On the Line” Craigslist most dangerous!
Craigslist most dangerous! “Let it go” and “Offer up”

15 Home Monitor Safety Echo and Alexa are Amazon Google – Home
Convenient and user friendly – BUT is it safe? They know your every move

16 Safety Mute the echo when not in use
Do not give them access to private accounts – such as bank Delete old recordings Just like Amazon online – they know everything you buy Stay alert with light colors when talking. You may not think its recording – when it is!

17 Ransomware and Malware
Ransomware is a subset of malware. Malware attacks usually come in the form of a computer virus or worm. A virus piggybacks on something like a document, spreadsheet or , whereas a worm is a more active attack. It starts on a networked computer system and attempts to subvert one or more computers on the network. This used to be difficult when networked computers were limited in number and connectivity. These days, of course, the internet effectively links billions of devices. - Hospitals, government offices, and general public

18 More technology…

19 Learn about virtual, augmented, and mixed technologies

20 Virtual Reality / Augmented Reality and Robots
The ultimate goal is a pair of smart glasses, and companies such as Google Microsoft, Facebook, Apple and Snapchat are all actively developing or exploring such a product. But in the near-term most popular augmented reality applications will take place on a smartphone, as was the case with last summers smash hit “Pokemon Go app”. Business Insider Nov 16, 2016

21 Virtual Reality Virtual Reality (VR) is an artificial, computer-generated simulation or recreation of a real life environment or situation. It immerses the user by making them feel like they are experiencing the simulated reality firsthand, primarily by simulating their vision and hearing. Wear a headset like Facebooks’ Oculus Soon shop this way – cars, clothes, IKEA

22 Augmented Reality (AR) is a technology that layers computer-generated enhancements atop an existing reality in order to make it more meaningful though the ability to interact with it. It is quickly becoming mainstream. 3D s, photos or text messages. Hologram and motion activated commands coming soon.

23 Robots There are 3 parts to every robot – Brawn, Bone and Brain
The number of robots in the world today is approaching 1,000,000 – with half of that number in Japan. Only 15% in America In use everywhere – vacuum the house, mow the lawn, & identify bombs!

24 Wall-E

25 Drones UAS – Unmanned aircraft Systems – August 29, 2016 – FAA rules
Must be registered to use. Amazon wants to deliver packages with this technology.

26 Cars and new technology
Apps – maintenance Parallel park Noises, beeps and light indicators Messages – baby Swerve into other lanes Braking on own Screen backing up Cars driving by itself

27 Tesla

28 Tips for safety Don’t get on sensitive websites when in public domains like “Starbucks” Protect your passwords! App on phone for this… Guard your personal information Don’t overshare – vacations, birthdays, family information Antivirus/Malware Beware of Sweepstakes and Contests KEEP AN EYE ON YOUR FINANCES! – credit karma or something of that nature.

29 Safety precautions Tape over camera on computer
Smartphone apps – be careful of “spying on phones” Many of the “games” kids play are “online” and you don’t know who you are playing with! Copyright infringement… are you in the know? How to get photos that are ok to copy…

30

31


Download ppt "Technology And Safety Leah Bratcher L & M 2017."

Similar presentations


Ads by Google