Digital Citizenship\ - The American School of Tampico

Download Report

Transcript Digital Citizenship\ - The American School of Tampico

Digital citizenship describes the
norms of appropriate,
responsible behavior with
regard to technology use.
The template used in this page come from:
Animation Factory. Templates. Open Source Technology Group. Animation Factory. Retrieved September 7, 2006.
<http://www.animationfactory.com/brain/home.cgi>
Nine Elements of Digital Citizenship
•
•
•
•
•
•
•
•
•
Digital Access
Digital Commerce
Digital Communication
Digital Literacy
Digital Etiquette
Digital Law
Digital Rights and Responsibilities
Digital Health and wellness
Digital Security
Four-Stage Technology Learning Framework
for Teaching Digital Citizenship
First Stage:
Awareness
ATS Technology Policy
Technology Policy
Individual Responsibilities
– Common courtesy and respect for
rights of others
– Privacy of information
– Intellectual property
– Harassment
– Responsible use of resources
– Game playing
– Information Integrity
– Use of desktop systems
Technology Policy
Access to Facilities and Information
– Sharing of Access
– Permitting unauthorized access
– Use of privileged access
– Academic dishonesty
– Use of copyrighted information and
materials
– Use of licensed software
– Political campaigning- commercial
advertising
– Personal business
Technology Policy
Control of Access to Information
– Imposition of sanctions
– System administrator access
– Monitoring of usage, inspection of files
– Suspension of individual privileges
Second Stage:
Guided Practice
Computer Ethics
Computer Ethics: Netiquette
“Contraction of Internet etiquette, the etiquette
guidelines for posting messages to online services, and
particularly Internet newsgroups. Netiquette covers not
only rules to maintain civility in discussions (i.e., avoiding
flames), but also special guidelines unique to the
electronic nature of forum messages. For example,
netiquette advises users to use simple formats because
complex formatting may not appear correctly for all
readers.” (from: www.webopedia.com)
Common rules for e-mail such as avoiding flamewars and
spam are constant across most mediums and
communities. Another rule is to avoid typing in ALL
CAPS, which is considered shouting or yelling.
•Netiquette
Computer Ethics: Copyright
• Copyright – the legal right granted to a creator of a work
(authors, artists, composers and others) to the exclusive
publication, production, sale or distribution of it.
• Intellectual Property –a product of the intellect, such as
an expressed idea or concept, that has commercial
value.
• Fair Use – Allows you to use a limited amount of
copyrighted material for your educational use.
• Public Domain - The absence of copyright protection;
belonging to the public so that anyone may copy or
borrow from it. (1923-1978) However, you should still
give credit to the source.
• Copyright
• Copyright from Cyberbee.com
Computer Ethics: Plagiarism
Plagiarism is the use of another's original words or ideas as
though they were your own.
Examples of Plagiarism
• Turning in someone else's work as your own
• Copying words or ideas from someone else without giving
credit
• Failing to put a quotation in quotation marks
• Giving incorrect information about the source of a quotation
• Changing words but copying the sentence structure of a
source without giving credit
• Copying so many words or ideas from a source that it
makes up the majority of your work, whether you give credit
or not
Computer Ethics: Why Students Plagiarize?
There are many reasons why students plagiarize:
– Deadlines come around more quickly than expected.
– Sometimes assignments make them feel overwhelm.
– Sometimes the boundaries of plagiarism and research just get confused.
Intentional Plagiarism
• Searching vs. Researching
– real skills: interpretation and analysis, process the information.
•
"But their words are better“
– how they understand the assigned topic, and
• how they develop their own style and voice.
• Making the Grade
– grades won't matter if they don't have the skills to show for them.
• "Everyone else is doing it“
– catch those students who do plagiarize.
• Poor Planning
– Scheduling stages of progress is effective.
Computer Ethics: Why Students Plagiarize?
Unintentional Plagiarism
• Citation Confusion
– ignorance of the proper forms of citation.
• Plagiarism vs. Paraphrasing
– exercises in class with paraphrased and plagiarized
passages to discuss.
• "I was just copying my notes“
– Practice note-taking methods.
• "I couldn't find the source“
– Track references during note-taking.
• "I thought we didn't have to quote facts“
– Teach them "When in doubt, cite sources."
• Confusion about expectations
– the ambiguity of "analyze" and "discuss“, no reporting.
Computer Ethics: Plagiarism
Types of Plagiarism
• Sources Not Cited
– Word-for-word
– Portions of text
– Copying from several different sources
– Changing key words and phrases
– Paraphrase most of the paper
• • Sources Cited (but still plagiarized)
– Only mentions an author's name
– Do not use quotation marks
– The paper contains almost no original work
Plagiarism Prevention
1. Explain What "Plagiarism" Means
2. Explain what's Wrong about Plagiarism
3. Make the Consequences Clear
4. Start off with Clear Expectations
5. Assign Specific Questions or Topics
6. Require Students to Submit Thesis Statements,
Introductions, Outlines, or Drafts
7. Have the Students Annotate their Bibliography
8. Assign Oral Presentations
9. Require Recent and Printed Sources
10.Assign a Paragraph on the Composition Process
11.Encourage Concision
Third Stage:
Modeling and
Demonstration
Safe Surfing
•
•
•
•
The internet provides a powerful resource for learning, as well as an
efficient means of communication. including the development of:
independent learning and research skills, such as improved access to
subject learning across a wide range of learning areas, as well as in
integrated or cross-curricular studies; and
communication and collaboration, such as the ability to use learning
technologies to access resources, create resources and communicate
with others.
Teachers can adjust to the different learning styles and in the classroom.
Common concerns about children's’ internet use:
– Access to inappropriate content
– Identity Theft
– Bullying peers
– Sexual Predators
– Manipulation of photos and conversations
– Social Networking Sites such as FACEBOOK are inappropriate for
people under 13 years old.
E-safety guidelines for elementary students
We strongly recommend adult supervision when Elementary
Student students use social online communication (chatting,
e-mail).
• To keep safe, our students should:
• Keep personal information confidential. For example don't
give out your name, age, address or phone number
• Create a nick name to use instead of your real name when
a username is required
• Only email people you know
• Use Internet chat rooms with caution and know how to
block unwanted users. (previous parent’s authorization)
• Never arrange to meet anyone alone, if asked, always
report it to a responsible adult.
E-safety guidelines for elementary students
Cyber bullying occurs when students write
harassing/flame emails, post negative websites, and are
mean/cruel in instant messaging/chat rooms.
What to do if you are being Cyber Bullied:
• Not reply to bullying messages
• Block the bully. Learn how to block or report someone
who is behaving badly
• Save the evidence. Learn how to keep records of
offending messages, pictures or online conversations
• Report cyber bullying. Make sure you tell to an adult
you trust
E-safety guidelines for elementary students
• Always respect others. Remember you can’t see the
impact your words or images have on the other person,
so it is important to show respect to people and be
careful with what you say/send
• Think before you “send”. Whether photos or text,
whatever you send or post online can be made public
very quickly and could stay online forever
• Use websites recommended by teachers and use a
student friendly search
• Be aware of who created a website and possible bias
within information. Don't believe everything you read or
see online
• Copyright and intellectual property rights must be
respected
Safe Surfing
Keep your Students Safe
 ATS Online Resources
 Search Engines
•
•
•
•
Yahooligans Web Guide
Kid's Search Tools
KidsClick Web Search
Dib, Dab, Doo, and Dilly, Too
•
•
•
•
OneKey.Com
Ask for Kids
Activity Search
Family Source
Find the suitable Information
• Search Strategies
• Use Bookmarks and Favorites
• Narrow your searching:
noodletools.com
• Put it on context: answers.com/
Web Page Evaluation
Evaluation Criteria
•
•
•
•
•
Authority
Objectivity
Accuracy
Currency
Coverage
Put Netiquette in your personal
and professional practice…
• Posting Mail
– In the interests of privacy, it's considered extremely bad
taste to post any email that someone may have sent,
unless they explicitly give you permission to redistribute it.
– Signatures
• Copyright in an Electronic Environment
– Cite Sources
Easybib.com
CitationMachine.net
NoodleTools
– There's also a handy chart that outlines teachers' fair use
rights and responsibilities.
Fourth Stage:
Feedback and
Analysis
2008-2009 Survey Findings:
• Facebook is a social network to be used by people older
than 13.
• Facebook is used by 48% of Upper Elementary
students.
• Approximately 3-4 students in every 3rd grade classroom
has a Facebook account. It’s “cool” to be on Facebook.
• Some students aware of risks have asked Technology
teachers for support to manage their Facebook account
in a safe way.
• Some parents have decided their children are not
allowed to have an email/Facebook account.
• Cyber-harassment and cyber bullying
Bibliography
Ribble, Mike. Passport to Digital Citizenship. ISTE (International Society for
Technology in Education), January, 2009.www.iste.org
The Copyright information in this presentation comes from:
– IParadigms, LLC. "Research Resources.“ Turnitin. 2005. iParadigms. 18 Apr.
2008
<http://www.turnitin.com/research_site /e_home.html>. – I-SAFE America Inc.
Copyright Quick Reference. Carlsbad, CA: I-SAFE American, n.d.