SlideShare una empresa de Scribd logo
1 de 14
EDUCATIONAL LEADERSHIP IN TECHNOLOGY:
PREPARING SCHOOL ADMINISTRATORS FOR A
DIGITAL AGE
BY
VIRGINIA E. GARLAND AND CHESTER TADEJA
Chapter 6: Legal and Social Issues in Technology
CHAPTER 6: SYNOPSIS
• NETS.A Standard 5: “Digital Citizenship”
• Appropriate Internet uses for students
• Laws relating to copyright and Internet access
• Ethical and environmentally sound technology
practices
• Leader survey for Chapter 6 skill sets
• Discussion questions
Key points in this reflection come from an instructional
technology coordinator in Illinois:
• Block inappropriate content on the web
• Educate students on appropriate uses of social networking tools
• Inform parents and students on Internet acceptable use policies (AUPs)
• Educate students and teachers on all grade levels about cyber-bullying
• Electronic Communication Guidelines for the Naperville District 203
• Students are "our future" as digital citizens
CHAPTER 5: LEADER REFLECTION
• Explanation of NETS.A Standard 5
• Laws and guidelines for student safety online
• Ethical and environmental concerns regarding
technology use in schools
• Global issues regarding digital citizenship
CHAPTER 6: INTRODUCTION
ISTE NETS.A STANDARD 5: “DIGITAL
CITIZENSHIP”
• Leadership roles for superintendents in leveraging
technology use in their school districts
• Social networking tools for school leaders
• School administrators and technology coordinators
should address the factors causing a “digital divide”:
oScio-economic status
oDisability
oEthnicity
oRace
oLanguage
oGender
• Children’s Internet Protection Act (CIPA); the need for
safe Internet use policies in all public schools or loss of
federal funding under the No Child Left Behind Act
(NCLB) and low E-Rates
• Fair use of the Copyright Act should be enforced:
o Copyrighted text, graphics, music, and images from the web
may only be used in the classroom
o Student multimedia projects may not be copied to school
websites or social media sites
ISTE NETS.A STANDARD 5: “DIGITAL
CITIZENSHIP”
• Cell phone policies and no cameras from Smartphones in
schools
• Cyber-bullying policies and social networking tools
• Environmentally appropriate technology waste removal
• Tools for global communication and collaboration
ISTE NETS.A STANDARD 5: “DIGITAL
CITIZENSHIP”
• Self-scoring survey
• Based on National Educational Technology Standards
and Performance Indicators for Administrators
(NETS.A) Standard 5 (NETS.A 5.a, 5.b, 5.c, 5.d)
• Ratings of 1 or 2 indicate areas of needed professional
growth
• Assessment can also be used to create an individualized
e-portfolio
CHAPTER 6: TECHNOLOGY LEADERSHIP
SELF-ASSESSMENT SURVEY
1. Here are some important questions to ask before developing a cyber-bullying policy for
your school or district:
• What issues prompt the updating or creation of an anti-cyber-bullying policy?
• What does the district or school website currently define as cyber bullying?
• What are my top concerns as a superintendent or principal about cyber bullying?
• What staff development training will I provide to address this topic?
• What resources, including experts, do I have to initiate or sustain an effective anti-
cyber-bullying policy?
2. Make sure that your school district is in full compliance with the Children’s Internet
Protection Act (CIPA), which requires that students are blocked access to such content as
pornography, gambling, or obscenity.
3. Provide clear guidelines on the appropriate and inappropriate use of social networking
tools for educational purposes, particularly the social networking communication tools of
text messaging, filming, emailing, and posting information on Internet-based sites.
CHAPTER 6: TIPS FOR LEADERS
4. Have strong anti-cyber-bullying policies by educating not only teachers
but also students and their parents on the forms of cyber bullying that
can occur at all grade levels.
5. Discuss and review appropriate Internet safety and digital citizenship
with school resource officers throughout the school year.
6. Encourage teachers and students to explore and collaborate with the
global world of Internet users by safely and securely using Web 2.0
social networking tools.
7. Overcome the socio-economic, disability, ethnic, racial, language, and
gender factors that can cause a digital divide in your school or district by
providing equitable access to appropriate technology resources for all
learners.
CHAPTER 6: TIPS FOR LEADERS
8. Ensure simplicity and clarity as you design an acceptable use policy
(AUP) in your school or district by using student-friendly language which
includes the purpose, the penalties for misuse, and a place for all
stakeholders to sign an agreement with the guidelines.
9. Enforce fair use of the Copyright Act by not allowing students and
teachers to use copyrighted text, graphics, music, and images from the
web outside of the classroom without written consent.
10. Use only “green” companies in order to safely remove and destroy or
recycle old computers or other obsolete hardware, such as FAX
machines and copiers.
11. Provide your students with opportunities to collaborate with other
students around the world for enriching cross-cultural experiences.
CHAPTER 6: TIPS FOR LEADERS
1. Does your school or school district block content? What do you know
about this process? Who determines what information is to be blocked?
Using a diagram, draw a representation of the kinds of information your
school or school district blocks (or can block) and the positive or negative
impact this can create for student learning. Be sure to include the benefits
and possible consequences of this kind of blocking. Be prepared to share
findings with the rest of the group.
2. Discuss with a small group (or draft a paper on) what content should be
included in establishing, monitoring, and enforcing an acceptable use policy
(AUP) for your organization. Discuss the need to protect intellectual property
as it relates to an AUP.
3. Identify several scenarios in which cyber bullying could take place
between students and other students and/or employees and other
employees. Be prepared to discuss these scenarios, as well as their
possible solutions with other individuals and/or groups.
CHAPTER 6: DISCUSSION QUESTIONS
4. With what other professional organizations could you partner? How would
you promote and foster cross-cultural collaboration? How would you engage
in multinational collaboration? What could you do to sustain such a
relationship?
5. In the leader reflection for this chapter, John David Son states: “The
Children’s Internet Protection Act (CIPA) requires school districts to block
access to such content as pornography, gambling, or obscenity. Every
school district is required by law to block such content, and we do that fairly
well; but what about the other content? What about the social
media/networking sites? YouTube? Twitter? Facebook? Many school
districts today block access to those sites because they don’t want to deal
with potential distractions, or incidents that might occur from their use.
School districts spend hours each day searching log files, blocking new
sites, and disciplining students according to acceptable use policies.
Wouldn’t a better use of our time, energy, and resources be educating our
students [on] how to appropriately utilize these tools to enhance their
educational experience?” Discuss concerns you might have with enforcing
CIPA and your agreement or disagreement with Son’s ideas on student
access and appropriate educational uses of Internet-based social networking
tools.
CHAPTER 6: DISCUSSION QUESTIONS
6. Based on your responses to the self-assessment for
Chapter 6, what are the next steps you might take in
becoming a more effective leader in the educational use of
social networking tools in your school or district? What is
the district lacking or proud of in terms of safe Internet
access or cyber-bullying policies or environmentally sound
practices? What technology resources would you need in
your own professional e-portfolio in order to assist you in
achieving your goals?
CHAPTER 6: DISCUSSION QUESTIONS

Más contenido relacionado

La actualidad más candente

National education technology plan 5 2010
National education technology plan  5 2010National education technology plan  5 2010
National education technology plan 5 2010nreid12
 
Technology integration
Technology integrationTechnology integration
Technology integrationblhopki
 
An effective use of ict for education and
An effective use of ict for education andAn effective use of ict for education and
An effective use of ict for education anddewinjustiniano
 
Technology Integration PowerPoint
Technology Integration PowerPointTechnology Integration PowerPoint
Technology Integration PowerPointginabinaz71
 
625 Kings Final
625 Kings Final625 Kings Final
625 Kings Finalkebking
 
Lesson 1 ict competency standards for philippine pre-service teacher education
Lesson 1 ict competency standards for philippine pre-service teacher educationLesson 1 ict competency standards for philippine pre-service teacher education
Lesson 1 ict competency standards for philippine pre-service teacher educationBai Saguira Abdulah-Malik
 
Using social media in the teaching and learning process
Using social media in the teaching and learning process Using social media in the teaching and learning process
Using social media in the teaching and learning process Monica Batac
 
Cypress fairbanks isd
Cypress fairbanks isdCypress fairbanks isd
Cypress fairbanks isdPeckmc1
 
Integrating technology in teaching
Integrating technology in teachingIntegrating technology in teaching
Integrating technology in teachingCarlo Magno
 
Integrating online-learning-into-elementary-classroom. (1)
Integrating online-learning-into-elementary-classroom. (1)Integrating online-learning-into-elementary-classroom. (1)
Integrating online-learning-into-elementary-classroom. (1)Sophita Senatham
 
EDLD 5362 Technology Plan Assignment
EDLD 5362 Technology Plan AssignmentEDLD 5362 Technology Plan Assignment
EDLD 5362 Technology Plan Assignmentpjendiwa
 
Social media in higher education ver2
Social media in higher education ver2Social media in higher education ver2
Social media in higher education ver2Mavic Pineda
 
Integration of Technology in Higher Education
Integration of Technology in Higher EducationIntegration of Technology in Higher Education
Integration of Technology in Higher Educationjihan tarhini
 
Capacity building for 21st century learning in secondary schools in Africa
Capacity building for 21st century learning in secondary schools in AfricaCapacity building for 21st century learning in secondary schools in Africa
Capacity building for 21st century learning in secondary schools in AfricaPetra Fisser
 
Integrating technology in teaching
Integrating technology in teachingIntegrating technology in teaching
Integrating technology in teachingCarlo Magno
 

La actualidad más candente (20)

Chapter1
Chapter1Chapter1
Chapter1
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
National education technology plan 5 2010
National education technology plan  5 2010National education technology plan  5 2010
National education technology plan 5 2010
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Technology integration
Technology integrationTechnology integration
Technology integration
 
An effective use of ict for education and
An effective use of ict for education andAn effective use of ict for education and
An effective use of ict for education and
 
Technology Integration PowerPoint
Technology Integration PowerPointTechnology Integration PowerPoint
Technology Integration PowerPoint
 
Iste & nets
Iste & netsIste & nets
Iste & nets
 
625 Kings Final
625 Kings Final625 Kings Final
625 Kings Final
 
Lesson 1 ict competency standards for philippine pre-service teacher education
Lesson 1 ict competency standards for philippine pre-service teacher educationLesson 1 ict competency standards for philippine pre-service teacher education
Lesson 1 ict competency standards for philippine pre-service teacher education
 
Using social media in the teaching and learning process
Using social media in the teaching and learning process Using social media in the teaching and learning process
Using social media in the teaching and learning process
 
Cypress fairbanks isd
Cypress fairbanks isdCypress fairbanks isd
Cypress fairbanks isd
 
Integrating technology in teaching
Integrating technology in teachingIntegrating technology in teaching
Integrating technology in teaching
 
Integrating online-learning-into-elementary-classroom. (1)
Integrating online-learning-into-elementary-classroom. (1)Integrating online-learning-into-elementary-classroom. (1)
Integrating online-learning-into-elementary-classroom. (1)
 
EDLD 5362 Technology Plan Assignment
EDLD 5362 Technology Plan AssignmentEDLD 5362 Technology Plan Assignment
EDLD 5362 Technology Plan Assignment
 
Social media in higher education ver2
Social media in higher education ver2Social media in higher education ver2
Social media in higher education ver2
 
Integration of Technology in Higher Education
Integration of Technology in Higher EducationIntegration of Technology in Higher Education
Integration of Technology in Higher Education
 
Capacity building for 21st century learning in secondary schools in Africa
Capacity building for 21st century learning in secondary schools in AfricaCapacity building for 21st century learning in secondary schools in Africa
Capacity building for 21st century learning in secondary schools in Africa
 
Integrating technology in teaching
Integrating technology in teachingIntegrating technology in teaching
Integrating technology in teaching
 
The role of IT in education
The role of IT in educationThe role of IT in education
The role of IT in education
 

Similar a Chapter6

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipegschool
 
Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016Diana Benner
 
Digital citizenship Project
Digital citizenship ProjectDigital citizenship Project
Digital citizenship Projectl yingling
 
Day 5 standards and digitial citizenship bridgewater 2011
Day 5 standards and digitial citizenship bridgewater 2011Day 5 standards and digitial citizenship bridgewater 2011
Day 5 standards and digitial citizenship bridgewater 2011vpriddle
 
Finalprojectedit654rev phpapp02
Finalprojectedit654rev phpapp02Finalprojectedit654rev phpapp02
Finalprojectedit654rev phpapp02carrietales
 
-DLL-Empowerment-Technologies-WEEK-1_Banaglorioso.docx
-DLL-Empowerment-Technologies-WEEK-1_Banaglorioso.docx-DLL-Empowerment-Technologies-WEEK-1_Banaglorioso.docx
-DLL-Empowerment-Technologies-WEEK-1_Banaglorioso.docxIanBanaglorioso
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computingsappingtonkr
 
Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Diana Benner
 
Promoting and Modeling Digital Citizenship and Responsibility
 Promoting and Modeling Digital Citizenship and Responsibility Promoting and Modeling Digital Citizenship and Responsibility
Promoting and Modeling Digital Citizenship and ResponsibilityE Robertson
 
Civil discourse lesson_plan
Civil discourse lesson_planCivil discourse lesson_plan
Civil discourse lesson_planthinkict
 
Cybersafety
Cybersafety Cybersafety
Cybersafety Sue Noor
 
Web 2 issues and policy workshop
Web 2 issues and policy workshopWeb 2 issues and policy workshop
Web 2 issues and policy workshopLynleyJ
 
Connecting the Learner 2021
Connecting the Learner 2021Connecting the Learner 2021
Connecting the Learner 2021andyberning
 
Edu642 fish, heather twitcast iste standards
Edu642 fish, heather twitcast iste standardsEdu642 fish, heather twitcast iste standards
Edu642 fish, heather twitcast iste standardsHeather Fish
 
Promoting and modeling digital citizenship and responsibility no wf
 Promoting and modeling digital citizenship and responsibility no wf Promoting and modeling digital citizenship and responsibility no wf
Promoting and modeling digital citizenship and responsibility no wfE Robertson
 
Common sense media pdf k 8
Common sense media pdf k 8Common sense media pdf k 8
Common sense media pdf k 8sebaraff
 
Tech Competency Institute for College Student Educators
Tech Competency Institute for College Student EducatorsTech Competency Institute for College Student Educators
Tech Competency Institute for College Student EducatorsPaul Brown
 

Similar a Chapter6 (20)

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016
 
Digital citizenship Project
Digital citizenship ProjectDigital citizenship Project
Digital citizenship Project
 
Day 5 standards and digitial citizenship bridgewater 2011
Day 5 standards and digitial citizenship bridgewater 2011Day 5 standards and digitial citizenship bridgewater 2011
Day 5 standards and digitial citizenship bridgewater 2011
 
Finalprojectedit654rev phpapp02
Finalprojectedit654rev phpapp02Finalprojectedit654rev phpapp02
Finalprojectedit654rev phpapp02
 
-DLL-Empowerment-Technologies-WEEK-1_Banaglorioso.docx
-DLL-Empowerment-Technologies-WEEK-1_Banaglorioso.docx-DLL-Empowerment-Technologies-WEEK-1_Banaglorioso.docx
-DLL-Empowerment-Technologies-WEEK-1_Banaglorioso.docx
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
 
Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016
 
Promoting and Modeling Digital Citizenship and Responsibility
 Promoting and Modeling Digital Citizenship and Responsibility Promoting and Modeling Digital Citizenship and Responsibility
Promoting and Modeling Digital Citizenship and Responsibility
 
Civil discourse lesson_plan
Civil discourse lesson_planCivil discourse lesson_plan
Civil discourse lesson_plan
 
Cybersafety
Cybersafety Cybersafety
Cybersafety
 
Web 2 issues and policy workshop
Web 2 issues and policy workshopWeb 2 issues and policy workshop
Web 2 issues and policy workshop
 
Connecting the Learner 2021
Connecting the Learner 2021Connecting the Learner 2021
Connecting the Learner 2021
 
Edu642 fish, heather twitcast iste standards
Edu642 fish, heather twitcast iste standardsEdu642 fish, heather twitcast iste standards
Edu642 fish, heather twitcast iste standards
 
Grad presentation
Grad presentationGrad presentation
Grad presentation
 
Promoting and modeling digital citizenship and responsibility no wf
 Promoting and modeling digital citizenship and responsibility no wf Promoting and modeling digital citizenship and responsibility no wf
Promoting and modeling digital citizenship and responsibility no wf
 
Common sense media pdf k 8
Common sense media pdf k 8Common sense media pdf k 8
Common sense media pdf k 8
 
Tech Competency Institute for College Student Educators
Tech Competency Institute for College Student EducatorsTech Competency Institute for College Student Educators
Tech Competency Institute for College Student Educators
 
e learning merged.pdf
e learning merged.pdfe learning merged.pdf
e learning merged.pdf
 
Digital literacy and Citizenship syllabus
Digital literacy and Citizenship syllabusDigital literacy and Citizenship syllabus
Digital literacy and Citizenship syllabus
 

Último

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

Chapter6

  • 1. EDUCATIONAL LEADERSHIP IN TECHNOLOGY: PREPARING SCHOOL ADMINISTRATORS FOR A DIGITAL AGE BY VIRGINIA E. GARLAND AND CHESTER TADEJA Chapter 6: Legal and Social Issues in Technology
  • 2. CHAPTER 6: SYNOPSIS • NETS.A Standard 5: “Digital Citizenship” • Appropriate Internet uses for students • Laws relating to copyright and Internet access • Ethical and environmentally sound technology practices • Leader survey for Chapter 6 skill sets • Discussion questions
  • 3. Key points in this reflection come from an instructional technology coordinator in Illinois: • Block inappropriate content on the web • Educate students on appropriate uses of social networking tools • Inform parents and students on Internet acceptable use policies (AUPs) • Educate students and teachers on all grade levels about cyber-bullying • Electronic Communication Guidelines for the Naperville District 203 • Students are "our future" as digital citizens CHAPTER 5: LEADER REFLECTION
  • 4. • Explanation of NETS.A Standard 5 • Laws and guidelines for student safety online • Ethical and environmental concerns regarding technology use in schools • Global issues regarding digital citizenship CHAPTER 6: INTRODUCTION
  • 5. ISTE NETS.A STANDARD 5: “DIGITAL CITIZENSHIP” • Leadership roles for superintendents in leveraging technology use in their school districts • Social networking tools for school leaders • School administrators and technology coordinators should address the factors causing a “digital divide”: oScio-economic status oDisability oEthnicity oRace oLanguage oGender
  • 6. • Children’s Internet Protection Act (CIPA); the need for safe Internet use policies in all public schools or loss of federal funding under the No Child Left Behind Act (NCLB) and low E-Rates • Fair use of the Copyright Act should be enforced: o Copyrighted text, graphics, music, and images from the web may only be used in the classroom o Student multimedia projects may not be copied to school websites or social media sites ISTE NETS.A STANDARD 5: “DIGITAL CITIZENSHIP”
  • 7. • Cell phone policies and no cameras from Smartphones in schools • Cyber-bullying policies and social networking tools • Environmentally appropriate technology waste removal • Tools for global communication and collaboration ISTE NETS.A STANDARD 5: “DIGITAL CITIZENSHIP”
  • 8. • Self-scoring survey • Based on National Educational Technology Standards and Performance Indicators for Administrators (NETS.A) Standard 5 (NETS.A 5.a, 5.b, 5.c, 5.d) • Ratings of 1 or 2 indicate areas of needed professional growth • Assessment can also be used to create an individualized e-portfolio CHAPTER 6: TECHNOLOGY LEADERSHIP SELF-ASSESSMENT SURVEY
  • 9. 1. Here are some important questions to ask before developing a cyber-bullying policy for your school or district: • What issues prompt the updating or creation of an anti-cyber-bullying policy? • What does the district or school website currently define as cyber bullying? • What are my top concerns as a superintendent or principal about cyber bullying? • What staff development training will I provide to address this topic? • What resources, including experts, do I have to initiate or sustain an effective anti- cyber-bullying policy? 2. Make sure that your school district is in full compliance with the Children’s Internet Protection Act (CIPA), which requires that students are blocked access to such content as pornography, gambling, or obscenity. 3. Provide clear guidelines on the appropriate and inappropriate use of social networking tools for educational purposes, particularly the social networking communication tools of text messaging, filming, emailing, and posting information on Internet-based sites. CHAPTER 6: TIPS FOR LEADERS
  • 10. 4. Have strong anti-cyber-bullying policies by educating not only teachers but also students and their parents on the forms of cyber bullying that can occur at all grade levels. 5. Discuss and review appropriate Internet safety and digital citizenship with school resource officers throughout the school year. 6. Encourage teachers and students to explore and collaborate with the global world of Internet users by safely and securely using Web 2.0 social networking tools. 7. Overcome the socio-economic, disability, ethnic, racial, language, and gender factors that can cause a digital divide in your school or district by providing equitable access to appropriate technology resources for all learners. CHAPTER 6: TIPS FOR LEADERS
  • 11. 8. Ensure simplicity and clarity as you design an acceptable use policy (AUP) in your school or district by using student-friendly language which includes the purpose, the penalties for misuse, and a place for all stakeholders to sign an agreement with the guidelines. 9. Enforce fair use of the Copyright Act by not allowing students and teachers to use copyrighted text, graphics, music, and images from the web outside of the classroom without written consent. 10. Use only “green” companies in order to safely remove and destroy or recycle old computers or other obsolete hardware, such as FAX machines and copiers. 11. Provide your students with opportunities to collaborate with other students around the world for enriching cross-cultural experiences. CHAPTER 6: TIPS FOR LEADERS
  • 12. 1. Does your school or school district block content? What do you know about this process? Who determines what information is to be blocked? Using a diagram, draw a representation of the kinds of information your school or school district blocks (or can block) and the positive or negative impact this can create for student learning. Be sure to include the benefits and possible consequences of this kind of blocking. Be prepared to share findings with the rest of the group. 2. Discuss with a small group (or draft a paper on) what content should be included in establishing, monitoring, and enforcing an acceptable use policy (AUP) for your organization. Discuss the need to protect intellectual property as it relates to an AUP. 3. Identify several scenarios in which cyber bullying could take place between students and other students and/or employees and other employees. Be prepared to discuss these scenarios, as well as their possible solutions with other individuals and/or groups. CHAPTER 6: DISCUSSION QUESTIONS
  • 13. 4. With what other professional organizations could you partner? How would you promote and foster cross-cultural collaboration? How would you engage in multinational collaboration? What could you do to sustain such a relationship? 5. In the leader reflection for this chapter, John David Son states: “The Children’s Internet Protection Act (CIPA) requires school districts to block access to such content as pornography, gambling, or obscenity. Every school district is required by law to block such content, and we do that fairly well; but what about the other content? What about the social media/networking sites? YouTube? Twitter? Facebook? Many school districts today block access to those sites because they don’t want to deal with potential distractions, or incidents that might occur from their use. School districts spend hours each day searching log files, blocking new sites, and disciplining students according to acceptable use policies. Wouldn’t a better use of our time, energy, and resources be educating our students [on] how to appropriately utilize these tools to enhance their educational experience?” Discuss concerns you might have with enforcing CIPA and your agreement or disagreement with Son’s ideas on student access and appropriate educational uses of Internet-based social networking tools. CHAPTER 6: DISCUSSION QUESTIONS
  • 14. 6. Based on your responses to the self-assessment for Chapter 6, what are the next steps you might take in becoming a more effective leader in the educational use of social networking tools in your school or district? What is the district lacking or proud of in terms of safe Internet access or cyber-bullying policies or environmentally sound practices? What technology resources would you need in your own professional e-portfolio in order to assist you in achieving your goals? CHAPTER 6: DISCUSSION QUESTIONS