forumWith Power Comes Responsibility:

Internet Awareness, Ethics, and Safety



Below is an outline of the TCUSD iteration of the workshop, complete with hotlinks.

Slides:


Google Moderator for This Session



Welcome


Worst Fears & Best Hopes

What are your worst fears about how your child will use the internet?
What are your best hopes about how your child will use the internet?
What can you do as an educator to help you child avoid your fears and live up to your hopes?

ACTIVITY: Worst Fears - Best Hopes (See questions above.)

The Read-Only Web

Powerful resource for educators and students, but…
Information moves from publishers to consumers
Information cannot be edited
One-Way Web
(Web 1.0)

The Read/Write Web

It is now as easy to create as it is to consume.
Anyone can publish, share, and change information
Two-Way Web
(Web 2.0)
This is changing our world!

ACTIVITY: Pre-Assessment of Tools Below By Show of Hands... and volunteer's definitions.

Wikis

Websites anyone can edit!
If you can use a word processor, you can use a wiki.
Visitors can see a history of changes and revert to earlier versions.

Wikipedia

Online encyclopedia
Collaboratively authored and edited
Over 3.1 million articles in English
Over 10 million articles worldwide
Great resource, but..
Use with caution
Visit, explore, and add to Wikipedia

Note: A favorite Information Literacy assignment using Wikipedia - Read an article related to what is being studied in class... then prove or disprove statements in the article by referring to other sources. Edit the article to make any changes or improvements, if applicable.

Educational Wikis

Collaboratively authored class texts
Writing projects
Group projects
Sharing resources
Grade level teams
Subject area teams
Professional development
Create your own educational wiki: http://www.wikispaces.com/site/for/teachers

Example Wikis in Education

The Wikipedia - http://www.wikipedia.org
Dave Conlay's Aristotle Experiment - http://aristotle-experiment.wikispaces.com
Eva Wagner's Houghton-Mifflin Tech Resources Wiki - http://hmtech.wikispaces.com
Eva Wagner's Technology Integration Projects for Grades K-3 - http://techtips.wikispaces.com
Dan McDowell's Wiki Resources - http://www.ahistoryteacher.com/necc2006/
More Workshop Wikis - http://edtechlife.com/?p=1487 and http://edtechlife.com/?p=1494
More Examples (A wiki about wikis in education!) - http://educationalwikis.wikispaces.com/

Wiki For This Workshop

http://internetawareness.wikispaces.com

Other Services

Blogs
Podcasts
Social Bookmarks
Photo Sharing
Video Streaming
Online Office Suites
Chat, IM, & Text
Twitter
And More...

Social Networking

Members have profiles
May contain personal information
Used to connect with others
Often includes a blog, pictures, songs, videos, and messages.
Check it out at www.myspace.com
Social networking for kids! - http://www.clubpenguin.com/

Educational Social Networking

Recruiting & admissions
Professional networks - http://www.linkedin.com
Educator networks - http://classroom20.ning.com
Parent networks - http://www.socialshield.com (NOTE: Gone now... just advertisements.)
The Remembrance Journey's Ning - http://remembrancejourneys.ning.com/

ACTIVITY: What social networks do you use and why? How about your students - or children?

Why Social Networks? (For Students)

New “Town Square”
Teens gather with friends online
Most are not there to meet strangers
Most ignore adults
Most go online to do good things
Healthy social outlet
Physically safe
Teens develop their identities
Coming-of-age experiences
Networking skills
Creative Skills
21st century skills

The Benefits

Engagement and Motivation
Context
Inquiry
Collaboration
Reflection and Metacognition
21st Century Skills

Information Literacy

Relevance?
Source?
Agenda or bias?
Fact checking
Trusted sources
Information literacy skills - http://www.big6.com
See also - http://www.snopes.com (Debunk myths and rumors here.)

Inappropriate Content

Offensive, sexual, or violent content
Due diligence
Increasingly difficult to filter
Appropriate responses to the inevitable

Inappropriate Sharing

Students may post:
  • Inappropriately
  • Unsafely
  • Irresponsibly
  • Provocatively
  • Illicit or illegal behavior
Students will post outside of school!
Think Before You Post (Video on YouTube)
Think Before You Post (Video on Teacher Tube)

Sexting

Students can be sex offenders themselves!
Teens send pictures of themselves... which get passed on.
They then face "child pornography" charges.
Not to mention embarrassment... and even suicide.
Learn more - http://en.wikipedia.org/wiki/Sexting

Sharing of Student Information

Intentional disclosure
  • School Officials with Legitimate Educational Purpose
  • Others as allowed by FERPA.
Unintentional disclosure
  • Unlocked computers
  • Poor passwords
  • Sloppy forwarding...
Student Self-disclosure
Note: Retention of records is important.

Threats and Cyber-bullying

Students may post threats
Threats that impact attendance or academics are a school concern
Credible threats may be a criminal matter
Embarassment is a bigger issue!
Learn more - http://www.cyberbully.org
Check out Santa Ana Unified School District's Cyber Safety Week Curriculum

Common Forms of Cyberbullying

Flaming
Harassment
Denigration
Impersonation
Outing
Trickery
Exclusion
Cyber Stalking
Learn more - http://www.csriu.org

Cyberbullying Intervention

Stop the behavior.Refer to the rules.Help students feel supported and safe from retaliation.Include bystanders in the conversation.Impose consequencesDo not require students to meet & work things out.Provide follow-up interventions.Notify parents, as appropriate.
Learn more - http://www.stopbullyingnow.hrsa.gov

Intellectual Property

Academic honesty
Copyright law
Digital Millennium Copyright Act of 1998
Alternative licenses - http://www.creativecommons.org
Note: The Technology Education and Copyright Harmonization Act (or TEACH Act) of 2002
See more details here (at a different workshop wiki): http://principals.wikispaces.com/copyright

Fraud and Identity Theft

Students may put their families and friends at risk
Students are at risk
Fraud
Theft
Identity theft
Learn more - http://www.consumer.gov/idtheft/

Stalkers and Predators

Most serious consequence of inappropriate sharing
Predators do hunt children through online social networks
Students can protect themselves
It's usually not stranger danger.
Deception is not the norm.
Force is seldom used.
Young teens are more vulnerable.
Learn more - http://www.perverted-justice.com

Other Concerns

Unsafe or self-harming online communities
Hate groups & gangs
Violent games & addition to games
Gambling
Hacking
Technical security

Free Speech Concerns

Students do have 1st Amendment Rights
Parody is protected
We cannot control students, we can educate them
Is it false, highly private, or otherwise harmful?
Note: The school’s network is a limited forum. The Internet is a public forum.
On or off campus?
On or off duty?
On or off the school network & computers?
A protected topic?
Workplace disruption? (school function & student safety)

Another Perspective

Citizen journalism
Citizen police work
Threats, suicides, and risky behavior are often reported
Sting operations catch criminals
“My space is safer for teens than predators.”

Lack of Understanding

Fear of the unknown
Some adults vilify technologies with many benefits
Deleting Online Predators’ Act 2006
Potential for rebellion and destruction of trust

Legislation

Child Internet Protection Act (CIPA): Filtering, Monitoring, & Policies
  • Requires filtering if receiving e-rate funds.
  • Requires a process for unblocking sites.
  • Judicial Interpretation: When a patron encounters a blocked site, he need only ask a librarian to unblock it or (at least in the case of adults) disable the filter.
  • FCC: A patron should not have to explain... why he was asking a site to be unblocked or the filtering to be disabled.
Children’s Online Privacy Protection Act (COPPA): Policies, Parental Consent, Protection of Info
  • Not to be confused with COPA, which was struck down as unconstitutional.
  • Requires verifiable parental consent to collect (or share) information on users under 13 y.o. (Applies to commercial entities only.)
  • Requires privacy policies.
  • Schools may act as agents for parents.
  • Does not apply to contractors hired by a school.
Family Educational Rights and Privacy Act (FERPA): Parents have the right to inspect, request changes of, and give permission to release student records.
  • Parents or eligible students have the right to inspect and review (and request correction of) the student's education records maintained by the school.
  • Generally, schools must have written permission from the parent or eligible student in order to release any information from a student's education record… with some exceptions.
  • Contractors (and volunteers) are ok, within certain conditions.
More Detail (and Surprising Facts) about CIPA, COPPA, and FERPA
Adam Walsh Child Protection and Safety Act: Stiff Penalties for Offenders, National Registry
California AB 86 - Cyberbullying: Adds cyberbullying to CA Ed Code, empowers administrators and law enforcement


Tech Plan Requirements

Information Literacy
Ethical and Lawful Uses
Online Privacy and Predators
And: Two-Way Communication between Home and School

ACTIVITY: Write a mock tech plan goal - with curriculum, professional development, infrastructure, funding, and monitoring components.

Cyber Ethics (Beyond Safe & Legal Use)

Ten Commandments of Cyber Ethics (Computer Ethics Institute, as Cited in Bissonetter, 2009):
  1. Thou shalt not use a computer to harm other people.
  2. Though shalt not interfere with other people’s computer work.
  3. Thou shalt not snoop around in other people’s computer files.
  4. Thou shalt not use a computer to steal.
  5. Thou shalt not use a computer to bear false witness.
  6. Thou shalt not copy or use proprietary software for which you have not paid.
  7. Though shalt not use other people’s computer resources without authorization or proper compensation.
  8. Though shalt not appropriate other people’s intellectual output.
  9. Though shalt think about the consequences of the program you are writing or system you are designing.
  10. Thoug shalt always use a computer in ways that insure consideration and respect for your fellow humans.
Four Simple Commandments (Warlick, D. 2004. Redefining Literacy for the 21st Century)
  • Seek truth and express it.
  • Minimize harm.
  • Be accountable.
  • Respect information and its infrastructure

ACTIVITY: If you were to write Ten Commandments of Cyber Ethics for your students and staff, what would they be?

Safety Tips for Students

Do not share identifying information.
Do not share personal information.
Do not share provocative images.
Beware of grooming. (See The Grooming Process from North Carolina's Attorney General)
Consider the consequences and the future.
Talk with parents, teachers, or other trusted adults.

Safety Tips for Parents

Move computers into shared spaces & make monitors visible
Watch for Alt+Tab (or Alt+F4)
Check history (is it suspiciously blank?)
Beware a reluctance to be candid

ACTIVITY: What are your best safety tips for students and parents? What about school staff?

MySpace Unraveled

Your kids know more than the news
Ask your kids if they have been harassed
Ask if they use more than one social network site
Kids will react strongly to cancelled accounts
Read the MySpace Terms of Use and Safety Tips
Report Violations
Know the people in your children’s friends lists
View their friends’ profiles
Search for their school
Monitor and Filter if necessary
Learn more - http://www.blogsafety.com (An online forum)

MySpace Safety

51 Tips For Teens and Parents
How-To Primers
Includes HTML and CSS script code to disable unwanted contact options.

Cyber-Safe Kids, Cyber-Savvy Teens

Young people fear that if they report a disturbing online situation to an adult, the most likely response will be to restrict their access or prevent involvement in desired online activities.

Educate Your Students

Own Your Space - Students learn to:
  • Stop viruses and spam
  • Understand privacy
  • Safeguard CC #s
Safe Practices for Online Life - Includes Exercises:
  • Choosing Screen Names
  • Protecting Privacy
  • Avoiding ID Theft
  • Uncomfortable Situations
  • Instant Messaging
  • Social Networking
  • Phishing & Scams

Cyber Law: Maximizing Safety and Minimizing Risk in Classrooms

Scenarios Include:
  • Cyberbullying
  • Student Use
  • Staff Use
  • Privacy & Security
  • Copyright Law
  • Ethical Issues

ACTIVITY: Explore printed resources. Be prepared to share anything striking that you find.

Online Resources

www.connectsafely.org (Formerly blogsafety.com)
TheParentsEdge.com (Don't miss the acronym dictionary!)
See also the Links page!

CTAP Region 4 Resources

Cyber Safety Website (With downloadable classroom posters!)
Administrator Resources
Acceptable Use Policies
Don't miss the My Space Official School Administrators' Guide

ACTIVITY: Explore online resources. Be prepared to share anything striking that you find.

What else can teachers do?

Communicate with students
Communicate with other educators
Communicate with IT
Communicate with the police
Confront students who are behaving in irresponsible, inappropriate, or unsafe ways. Do not look the other way.

Policy Alone

Policy alone does not teach students to think about the impact of their actions; nor does it engage them in dialogue about how they can address the challenges that new technologies bring, in an informed, thoughtful and coherent manner.
Shariff &Johnny (2007, as cited in Bissonette, 2009)

Q & A


Google Moderator for This Session

Online Evaluation