tcusd

=forumWith Power Comes Responsibility:= =Internet Awareness, Ethics, and Safety=

//Below is an outline of the TCUSD iteration of the workshop, **complete with hotlinks**.//


 * Slides:**

[|Google Moderator for This Session]

=Welcome=

**Worst Fears & Best Hopes**
What are your worst fears about how your child will use the internet? What are your best hopes about how your child will use the internet? What can you do as an educator to help you child avoid your fears and live up to your hopes?

ACTIVITY: Worst Fears - Best Hopes (See questions above.)

**The Read-Only Web**
Powerful resource for educators and students, but… Information moves from publishers to consumers Information cannot be edited One-Way Web (Web 1.0)

**The Read/Write Web**
It is now as easy to create as it is to consume. Anyone can publish, share, and change information Two-Way Web (Web 2.0) This is changing our world!

ACTIVITY: Pre-Assessment of Tools Below By Show of Hands... and volunteer's definitions.

**Wikis**
Websites anyone can edit! If you can use a word processor, you can use a wiki. Visitors can see a history of changes and revert to earlier versions.

**Wikipedia**
Online encyclopedia Collaboratively authored and edited Over 3.1 million articles in English Over 10 million articles worldwide Great resource, but.. Use with caution Visit, explore, and add to [|Wikipedia]

Note: A favorite Information Literacy assignment using Wikipedia - Read an article related to what is being studied in class... then prove or disprove statements in the article by referring to other sources. Edit the article to make any changes or improvements, if applicable.

**Educational Wikis**
Collaboratively authored class texts Writing projects Group projects Sharing resources Grade level teams Subject area teams Professional development Create your own educational wiki: http://www.wikispaces.com/site/for/teachers

Example Wikis in Education
The Wikipedia - [|http://www.wikipedia.org] Dave Conlay's Aristotle Experiment - http://aristotle-experiment.wikispaces.com Eva Wagner's Houghton-Mifflin Tech Resources Wiki - http://hmtech.wikispaces.com Eva Wagner's Technology Integration Projects for Grades K-3 - http://techtips.wikispaces.com Dan McDowell's Wiki Resources - http://www.ahistoryteacher.com/necc2006/ More Workshop Wikis - http://edtechlife.com/?p=1487 and http://edtechlife.com/?p=1494 More Examples (A wiki about wikis in education!) - http://educationalwikis.wikispaces.com/

**Wiki For This Workshop**
http://internetawareness.wikispaces.com

**Other Services**
Blogs Podcasts Social Bookmarks Photo Sharing Video Streaming Online Office Suites Chat, IM, & Text Twitter And More...

**Social Networking**
Members have profiles May contain personal information Used to connect with others Often includes a blog, pictures, songs, videos, and messages. Check it out at [|www.myspace.com] Social networking for kids! - http://www.clubpenguin.com/

**Educational Social Networking**
Recruiting & admissions Professional networks - http://www.linkedin.com Educator networks - http://classroom20.ning.com Parent networks - http://www.socialshield.com (NOTE: Gone now... just advertisements.) The Remembrance Journey's Ning - http://remembrancejourneys.ning.com/

ACTIVITY: What social networks do you use and why? How about your students - or children?

Why Social Networks? (For Students)
New “Town Square” Teens gather with friends online Most are not there to meet strangers Most ignore adults Most go online to do good things Healthy social outlet Physically safe Teens develop their identities Coming-of-age experiences Networking skills Creative Skills 21st century skills

The Benefits
Engagement and Motivation Context Inquiry Collaboration Reflection and Metacognition 21st Century Skills

**Information Literacy**
Relevance? Source? Agenda or bias? Fact checking Trusted sources Information literacy skills - http://www.big6.com See also - http://www.snopes.com (Debunk myths and rumors here.)

**Inappropriate Content**
Offensive, sexual, or violent content Due diligence Increasingly difficult to filter Appropriate responses to the inevitable

**Inappropriate Sharing**
Students may post: Students will post outside of school! [|Think Before You Post] (Video on YouTube) [|Think Before You Post] (Video on Teacher Tube)
 * Inappropriately
 * Unsafely
 * Irresponsibly
 * Provocatively
 * Illicit or illegal behavior

Sexting
Students can be sex offenders themselves! Teens send pictures of themselves... which get passed on. They then face "child pornography" charges. Not to mention embarrassment... and even suicide. Learn more - http://en.wikipedia.org/wiki/Sexting

Sharing of Student Information
Intentional disclosure Unintentional disclosure Student Self-disclosure Note: Retention of records is important.
 * School Officials with Legitimate Educational Purpose
 * Others as allowed by FERPA.
 * Unlocked computers
 * Poor passwords
 * Sloppy forwarding...

**Threats and Cyber-bullying**
Students may post threats Threats that impact attendance or academics are a school concern Credible threats may be a criminal matter Embarassment is a bigger issue! Learn more - http://www.cyberbully.org [|Check out Santa Ana Unified School District's Cyber Safety Week Curriculum]

Common Forms of Cyberbullying
Flaming Harassment Denigration Impersonation Outing Trickery Exclusion Cyber Stalking Learn more - http://www.csriu.org

Cyberbullying Intervention
Stop the behavior.Refer to the rules.Help students feel supported and safe from retaliation.Include bystanders in the conversation.Impose consequencesDo not require students to meet & work things out.Provide follow-up interventions.Notify parents, as appropriate. Learn more - http://www.stopbullyingnow.hrsa.gov

**Intellectual Property**
Academic honesty Copyright law [|Digital Millennium Copyright Act of 1998] Alternative licenses - http://www.creativecommons.org Note: The [|Technology Education and Copyright Harmonization Act] (or TEACH Act) of 2002 See more details here (at a different workshop wiki): http://principals.wikispaces.com/copyright

**Fraud and Identity Theft**
Students may put their families and friends at risk Students are at risk Fraud Theft Identity theft Learn more - http://www.consumer.gov/idtheft/

**Stalkers and Predators**
Most serious consequence of inappropriate sharing Predators do hunt children through online social networks Students can protect themselves It's usually not stranger danger. Deception is not the norm. Force is seldom used. Young teens are more vulnerable. Learn more - http://www.perverted-justice.com

**Other Concerns**
Unsafe or self-harming online communities Hate groups & gangs Violent games & addition to games Gambling Hacking Technical security

Free Speech Concerns
Students do have 1st Amendment Rights Parody is protected We cannot control students, we can educate them Is it false, highly private, or otherwise harmful? Note: The school’s network is a limited forum. The Internet is a public forum. On or off campus? On or off duty? On or off the school network & computers? A protected topic? Workplace disruption? (school function & student safety)

**Another Perspective**
Citizen journalism Citizen police work Threats, suicides, and risky behavior are often reported Sting operations catch criminals “My space is safer for teens than predators.”

**Lack of Understanding**
Fear of the unknown Some adults vilify technologies with many benefits Deleting Online Predators’ Act 2006 Potential for rebellion and destruction of trust

**Legislation**
[|Child Internet Protection Act (CIPA)]: Filtering, Monitoring, & Policies [|Children’s Online Privacy Protection Act (COPPA)]: Policies, Parental Consent, Protection of Info [|Family Educational Rights and Privacy Act (FERPA)]: Parents have the right to inspect, request changes of, and give permission to release student records. More Detail (and Surprising Facts) about CIPA, COPPA, and FERPA [|Adam Walsh Child Protection and Safety Act]: Stiff Penalties for Offenders, National Registry [|California AB 86] - Cyberbullying: Adds cyberbullying to CA Ed Code, empowers administrators and law enforcement
 * Requires filtering if receiving e-rate funds.
 * Requires a process for unblocking sites.
 * Judicial Interpretation: When a patron encounters a blocked site, he need only ask a librarian to unblock it or (at least in the case of adults) disable the filter.
 * FCC: A patron should not have to explain... why he was asking a site to be unblocked or the filtering to be disabled.
 * Not to be confused with COPA, which was struck down as unconstitutional.
 * Requires verifiable parental consent to collect (or share) information on users under 13 y.o. (Applies to commercial entities only.)
 * Requires privacy policies.
 * Schools may act as agents for parents.
 * Does not apply to contractors hired by a school.
 * Parents or eligible students have the right to inspect and review (and request correction of) the student's education records maintained by the school.
 * Generally, schools must have written permission from the parent or eligible student in order to release any information from a student's education record… with some exceptions.
 * Contractors (and volunteers) are ok, within certain conditions.

**Tech Plan Requirements**
Information Literacy Ethical and Lawful Uses Online Privacy and Predators And: Two-Way Communication between Home and School

ACTIVITY: Write a mock tech plan goal - with curriculum, professional development, infrastructure, funding, and monitoring components.

Cyber Ethics (Beyond Safe & Legal Use)
Ten Commandments of Cyber Ethics (Computer Ethics Institute, as Cited in Bissonetter, 2009): Four Simple Commandments (Warlick, D. 2004. Redefining Literacy for the 21st Century)
 * 1) Thou shalt not use a computer to harm other people.
 * 2) Though shalt not interfere with other people’s computer work.
 * 3) Thou shalt not snoop around in other people’s computer files.
 * 4) Thou shalt not use a computer to steal.
 * 5) Thou shalt not use a computer to bear false witness.
 * 6) Thou shalt not copy or use proprietary software for which you have not paid.
 * 7) Though shalt not use other people’s computer resources without authorization or proper compensation.
 * 8) Though shalt not appropriate other people’s intellectual output.
 * 9) Though shalt think about the consequences of the program you are writing or system you are designing.
 * 10) Thoug shalt always use a computer in ways that insure consideration and respect for your fellow humans.
 * Seek truth and express it.
 * Minimize harm.
 * Be accountable.
 * Respect information and its infrastructure

ACTIVITY: If you were to write Ten Commandments of Cyber Ethics for your students and staff, what would they be?

**Safety Tips for Students**
Do not share identifying information. Do not share personal information. Do not share provocative images. Beware of grooming. (See [|The Grooming Process] from North Carolina's Attorney General) Consider the consequences and the future. Talk with parents, teachers, or other trusted adults.

**Safety Tips for Parents**
Move computers into shared spaces & make monitors visible Watch for Alt+Tab (or Alt+F4) Check history (is it suspiciously blank?) Beware a reluctance to be candid

ACTIVITY: What are your best safety tips for students and parents? What about school staff?

**MySpace Unraveled**
Your kids know more than the news Ask your kids if they have been harassed Ask if they use more than one social network site Kids will react strongly to cancelled accounts Read the MySpace [|Terms of Use] and [|Safety Tips] Report Violations Know the people in your children’s friends lists View their friends’ profiles Search for their school Monitor and Filter if necessary Learn more - http://www.blogsafety.com (An online forum)

**MySpace Safety**
51 Tips For Teens and Parents How-To Primers Includes HTML and CSS script code to disable unwanted contact options.

Cyber-Safe Kids, Cyber-Savvy Teens
Young people fear that if they report a disturbing online situation to an adult, the most likely response will be to restrict their access or prevent involvement in desired online activities.

Educate Your Students
Own Your Space - Students learn to: Safe Practices for Online Life - Includes Exercises:
 * Stop viruses and spam
 * Understand privacy
 * Safeguard CC #s
 * Choosing Screen Names
 * Protecting Privacy
 * Avoiding ID Theft
 * Uncomfortable Situations
 * Instant Messaging
 * Social Networking
 * Phishing & Scams

Cyber Law: Maximizing Safety and Minimizing Risk in Classrooms
Scenarios Include:
 * Cyberbullying
 * Student Use
 * Staff Use
 * Privacy & Security
 * Copyright Law
 * Ethical Issues

ACTIVITY: Explore printed resources. Be prepared to share anything striking that you find.

**Online Resources**
[|www.connectsafely.org] (Formerly blogsafety.com) [|TheParentsEdge.com] (Don't miss the acronym dictionary!) See also the Links page!

**CTAP Region 4 Resources**
[|Cyber Safety Website] (With downloadable classroom posters!) [|Administrator Resources] [|Acceptable Use Policies] Don't miss the [|My Space Official School Administrators' Guide]

ACTIVITY: Explore online resources. Be prepared to share anything striking that you find.

**What else can teachers do?**
Communicate with students Communicate with other educators Communicate with IT Communicate with the police Confront students who are behaving in irresponsible, inappropriate, or unsafe ways. Do not look the other way.

Policy Alone
Policy alone does not teach students to think about the impact of their actions; nor does it engage them in dialogue about how they can address the challenges that new technologies bring, in an informed, thoughtful and coherent manner. Shariff &Johnny (2007, as cited in Bissonette, 2009)

=**Q & A**=

[|Google Moderator for This Session]

[|Online Evaluation]