internet & computer newsInternet Awareness and Safety

For Educators and Parents


Below is an outline of the most recent iteration of the workshop, complete with hotlinks.

Materials:
NEW Slides for Administrators at Leadership 3.0 (April 17, 2010)
NEW Slides for parents at LBUSD (April 12, 2010)
See also TCUSD (December 2009)
Updated Slides for Parents at LBUSD (April 28, 2009)
Updated Slides for Administrators at Leadership 3.0 (April 2, 2009)
Internet_Awareness.mov (Slides in Quicktime Format - OLDER)
Internet_Awareness.ppt (Slides in PowerPoint Format - OLDER)
Internet_Awareness.pdf (A printable handout in PDF Format - OLDER)
InternetAwareness.zip (Original slides and handouts commissioned by LBUSD)

Contents:
Welcome
The Technologies
The Concerns
Proactive Strategies



Disclaimer


The information in this presentation (and in the accompanying website) is not legal advice and is not intended as legal advice. Please consult with your own attorney in regard to these issues.



Welcome


Worst Fears & Best Hopes

What are your worst fears about how your child will use the internet?
What are your best hopes about how your child will use the internet?
What can you do as a parent to help you child avoid your fears and live up to your hopes?



The Technologies


The Read-Only Web

Powerful resource for educators and students, but…
Information moves from publishers to consumers
Information cannot be edited
One-Way Web
(Web 1.0)

The Read/Write Web

It is now as easy to create as it is to consume.
Anyone can publish, share, and change information
Two-Way Web
(Web 2.0)
This is changing our world!

Wikis

Websites anyone can edit!
If you can use a word processor, you can use a wiki.
Visitors can see a history of changes and revert to earlier versions.

Wikipedia

Online encyclopedia
Collaboratively authored and edited
Over 2.3 million articles in English
Over 10 million articles worldwide
Great resource, but..
Use with caution
Visit, explore, and add to Wikipedia

Educational Wikis

Collaboratively authored class texts
Writing projects
Group projects
Sharing resources
Grade level teams
Subject area teams
Professional development

Example Wikis in Education

The Wikipedia - http://www.wikipedia.org
Dave Conlay's Aristotle Experiment - http://aristotle-experiment.wikispaces.com
Eva Wagner's Houghton-Mifflin Tech Resources Wiki - http://hmtech.wikispaces.com
Eva Wagner's Technology Integration Projects for Grades K-3 - http://techtips.wikispaces.com
Dan McDowell's Wiki Resources - http://www.ahistoryteacher.com/necc2006/
More Workshop Wikis - http://edtechlife.com/?p=1487 and http://edtechlife.com/?p=1494
More Examples (A wiki about wikis in education!) - http://educationalwikis.wikispaces.com/

Wiki For This Workshop

http://internetawareness.wikispaces.com

Other Services

Blogs
Podcasts
Social Bookmarks
Photo Sharing
Video Streaming
Online Office Suites
Chat, IM, & Text
Twitter
And More...

Social Networking

Members have profiles
May contain personal information
Used to connect with others
Often includes a blog, pictures, songs, videos, and messages.
Check it out at www.myspace.com
Social networking for kids! - http://www.clubpenguin.com/

Educational Social Networking

Recruiting & admissions
Professional networks - http://www.linkedin.com
Educator networks - http://classroom20.ning.com
Parent networks - http://www.socialshield.com (NOTE: Gone now... just advertisements.)
The Remembrance Journey's Ning - http://remembrancejourneys.ning.com/


Why Social Networks (for Students)?

New “Town Square”
Teens gather with friends online
Most are not there to meet strangers
Most ignore adults
Most go online to do good things
Healthy social outlet
Physically safe
Teens develop their identities
Coming-of-age experiences
Networking skills
Creative Skills
21st century skills

The Benefits

Engagement and Motivation
Context
Inquiry
Collaboration
Reflection and Metacognition
21st Century Skills



The Concerns


Information Literacy

Relevance?
Source?
Agenda or bias?
Fact checking
Trusted sources
Information literacy skills - http://www.big6.com
See also - http://www.snopes.com (Debunk myths and rumors here.)

Inappropriate Content

Offensive, sexual, or violent content
Due diligence
Increasingly difficult to filter
Appropriate responses to the inevitable

Inappropriate Sharing

Students may post:
  • Inappropriately
  • Unsafely
  • Irresponsibly
  • Provocatively
  • Illicit or illegal behavior
Students will post outside of school!
Think Before You Post (Video on YouTube)
Think Before You Post (Video on Teacher Tube)

Sexting

Students can be sex offenders themselves!
Teens send pictures of themselves... which get passed on.
They then face "child pornography" charges.
Not to mention embarrassment... and even suicide.
Learn more - http://en.wikipedia.org/wiki/Sexting

Sharing of Student Information

Intentional disclosure
  • School Officials with Legitimate Educational Purpose
  • Others as allowed by FERPA.
Unintentional disclosure
  • Unlocked computers
  • Poor passwords
  • Sloppy forwarding...
Student Self-disclosure
Note: Retention of records is important.

Threats and Cyber-bullying

Students may post threats
Threats that impact attendance or academics are a school concern
Credible threats may be a criminal matter
Embarassment is a bigger issue!
Learn more - http://www.cyberbully.org
Check out Santa Ana Unified School District's Cyber Safety Week Curriculum

Common Forms of Cyberbullying

Flaming
Harassment
Denigration
Impersonation
Outing
Trickery
Exclusion
Cyber Stalking
Learn more - http://www.csriu.org

Cyberbullying Intervention

Stop the behavior.Refer to the rules.Help students feel supported and safe from retaliation.Include bystanders in the conversation.Impose consequencesDo not require students to meet & work things out.Provide follow-up interventions.Notify parents, as appropriate.
Learn more - http://www.stopbullyingnow.hrsa.gov

Intellectual Property

Academic honesty
Copyright law
Digital Millennium Copyright Act of 1998
Alternative licenses - http://www.creativecommons.org
Note: The Technology Education and Copyright Harmonization Act (or TEACH Act) of 2002
See more details here (at a different workshop wiki): http://principals.wikispaces.com/copyright

Fraud and Identity Theft

Students may put their families and friends at risk
Students are at risk
Fraud
Theft
Identity theft
Learn more - http://www.consumer.gov/idtheft/

Stalkers and Predators

Most serious consequence of inappropriate sharing
Predators do hunt children through online social networks
Students can protect themselves
It's usually not stranger danger.
Deception is not the norm.
Force is seldom used.
Young teens are more vulnerable.
Learn more - http://www.perverted-justice.com

Other Concerns

Unsafe or self-harming online communities
Hate groups & gangs
Violent games & addition to games
Gambling
Hacking
Technical security

Free Speech Concerns

Students do have 1st Amendment Rights
Parody is protected
We cannot control students, we can educate them
Is it false, highly private, or otherwise harmful?
Note: The school’s network is a limited forum. The Internet is a public forum.
On or off campus?
On or off duty?
On or off the school network & computers?
A protected topic?
Workplace disruption? (school function & student safety)

Another Perspective

Citizen journalism
Citizen police work
Threats, suicides, and risky behavior are often reported
Sting operations catch criminals
“My space is safer for teens than predators.”

Lack of Understanding

Fear of the unknown
Some adults vilify technologies with many benefits
Deleting Online Predators’ Act 2006
Potential for rebellion and destruction of trust




Proactive Strategies


Legislation

Child Internet Protection Act (CIPA): Filtering, Monitoring, & Policies
  • Requires filtering if receiving e-rate funds.
  • Requires a process for unblocking sites.
  • Judicial Interpretation: When a patron encounters a blocked site, he need only ask a librarian to unblock it or (at least in the case of adults) disable the filter.
  • FCC: A patron should not have to explain... why he was asking a site to be unblocked or the filtering to be disabled.
Children’s Online Privacy Protection Act (COPPA): Policies, Parental Consent, Protection of Info
  • Not to be confused with COPA, which was struck down as unconstitutional.
  • Requires verifiable parental consent to collect (or share) information on users under 13 y.o. (Applies to commercial entities only.)
  • Requires privacy policies.
  • Schools may act as agents for parents.
  • Does not apply to contractors hired by a school.
Family Educational Rights and Privacy Act (FERPA): Parents have the right to inspect, request changes of, and give permission to release student records.
  • Parents or eligible students have the right to inspect and review (and request correction of) the student's education records maintained by the school.
  • Generally, schools must have written permission from the parent or eligible student in order to release any information from a student's education record… with some exceptions.
  • Contractors (and volunteers) are ok, within certain conditions.
More Detail (and Surprising Facts) about CIPA, COPPA, and FERPA
Adam Walsh Child Protection and Safety Act: Stiff Penalties for Offenders, National Registry
California AB 86 - Cyberbullying: Adds cyberbullying to CA Ed Code, empowers administrators and law enforcement

Tech Plan Requirements

Information Literacy
Ethical and Lawful Uses
Online Privacy and Predators
And: Two-Way Communication between Home and School

Cyber Ethics (Beyond Safe & Legal Use)

Ten Commandments of Cyber Ethics (Computer Ethics Institute, as Cited in Bissonetter, 2009):
  1. Thou shalt not use a computer to harm other people.
  2. Though shalt not interfere with other people’s computer work.
  3. Thou shalt not snoop around in other people’s computer files.
  4. Thou shalt not use a computer to steal.
  5. Thou shalt not use a computer to bear false witness.
  6. Thou shalt not copy or use proprietary software for which you have not paid.
  7. Though shalt not use other people’s computer resources without authorization or proper compensation.
  8. Though shalt not appropriate other people’s intellectual output.
  9. Though shalt think about the consequences of the program you are writing or system you are designing.
  10. Thoug shalt always use a computer in ways that insure consideration and respect for your fellow humans.
Four Simple Commandments (Warlick, D. 2004. Redefining Literacy for the 21st Century)
  • Seek truth and express it.
  • Minimize harm.
  • Be accountable.
  • Respect information and its infrastructure

Safety Tips for Students

Do not share identifying information.
Do not share personal information.
Do not share provocative images.
Beware of grooming. (See The Grooming Process from North Carolina's Attorney General)
Consider the consequences and the future.
Talk with parents, teachers, or other trusted adults.

Safety Tips for Parents

Move computers into shared spaces & make monitors visible
Watch for Alt+Tab (or Alt+F4)
Check history (is it suspiciously blank?)
Beware a reluctance to be candid

What else can you do?

Communicate with students
Communicate with other parents and educators
Communicate with IT
Communicate with the police

Confront students who are behaving in irresponsible, inappropriate, or unsafe ways. Do not look the other way.

Q & A


Online Evaluation



Older Cut Material