1. What can we do to keep our children safe
while using digital technology?
1. understanding the global nature of the internet.
2.How we harness the immense power of the internet and
equip the young to use it in a safe way.
Why?
“We can’t put the genie back into the bottle”
(Nicholas Car “The Shallows” 2011)
PPP bySusana Noor
2. How mobile is Technology?
• Open access by anyone, anytime, anywhere
• society, community organisations, businesses, learning institutions.
• Used for information, inspiration, collaboration, multi-sensory
connecting with the world online.
• Tools and applications explore the web and actively engage with
each other online, profile our lives with pictures, personal details,
share our likes and dislikes.
• The globe is at our fingertips…
3. What is our digital footprint ?
• The trail you leave behind in cyberspace and any form
of digital communication: texting, blogging, e-mailing,
social networking, using mobile phones and messages.
• Why not “google” yourself and find out what information is
online about you ?
• http://dsc.discovery.com/convergence/koppel/interactive/interactive.html
has a great site to show you where you leave your digital
footprint in everyday life.
• Employers, police and other authorities will often
search a persons digital footprint to examine what is
online so anything written can be there for years ahead
that means it is traceable…
4. What does the NSW Education Department Policy say
about internet safety ?
• General Guidelines
• Educational information & collaboration enhances student outcomes
-communication, research and learning .
• Guidance/needs of school-responsible usage of services and tools-
ensure a safe learning environment.
• General Netiquette
• Be kind and polite just like the real world.
• Use appropriate methods of texting and never swear.
• Don’t use all capitals for script, as you may appear to be shouting,
• If someone online says something that makes you feel
uncomfortable( rude text or photo or says something scary) then
don’t respond and tell an adult you trust.
5. What happens in Reality?
• In a recent Frontline program (2008) called “Growing up online”
90% of parents where unaware of their child’s online activity.1
in 5 teens has been bullied online.
• The program highlighted teens “virtual world” issues - primary
school age children.
• Often act on impulse or bravado when online.
• Unwarranted consequences online culture 24/7. Addiction to Cyber
activity social networking such as facebook, chat sites, games.
• Cyber bullying can affect everyday life.
• Can lead to depression, low-self esteem, feeling unwanted,
anxiousness, extreme cases suicide.
6. What is Cyber-bullying ?
What help is available to combat the problem?
• Cyberbullying means -using internet technologies (email, chat, websites, text,
messages etc) in an inappropriate way to (stalk, harrass, intimidate, defame,
humiliate, impersonate, threaten, demean, exclude, embarrass, abuse, flame or
trick) make another person unhappy.
• Programs- NSW ED Dept “Carers guide” to internet safety
• -“Cybersmart” by ACMA( Australian Communication and Media Agency).
• Sollutions
• School rules for the internet.
• Keeping certain information private ( passwords, home details, some photos).
• Teach students about using appropriate language and netiquette.
• Report anything unusual to a person they trust ( parent, teacher etc).
• Ignore and don’t respond to online threats.
• Keep a copy for evidence of online bullying and seek school help when dealing with
issues.
• Reassure child that they are not at fault and provide counseling if necessary.
7. As educators…how can we model safe
approaches to the internet?
• A good teacher
• gains respect as a good role model
• shows leadership and knowledge
• inspires and coaches students with skills
• has high expectations of students.
• Keeps a professionally focused & monitored environment.
• Developing a trans-literacy policy with regard to digital safety issues
• across all subjects to promote the best standards from Library Authorities.
• *Scaffold resources or tools (step by step process )
• *Rubrics (standards/ associated grades)
• School specific needs , curriculum, procedures and policies
• Teachers need to develop a network for their own professional learning-
(listservs, blogs, formal groups, colleagues) .
8. What are the student Implications?
• We have 6 years to make an impact on a child so …yes Library
matters!” (Williams 2008)
• Our aim is to produce informed, confident digital citizens.
• 3 hurdles to get over
• Growing digitization and portability of information
• Changes in the nature of information source-checking
• Need for new skills for workers of global economy
• (Johnson,D 2006)
• The Reflection Model for Safety
• 1-Awareness (Code of Conduct, Student and parent guidelines)
• 2-Guided Practice (Acceptable use and cyber-smart advice)
• 3-Modeling and Demonstration (Sharing ownership each age group)
9. How can we implement safety
guidelines in the classroom situation?
• Collaborative Awareness-Tackle Cyber safety issues as a group-
meaningful to students-age level, community of helpers.
• Work through safety programs available online -privacy, ownership,
plagerism, copyright issues.
• Wikis & Google Docs,Skype- collaborate, analyse and edit
together.One single resource can be available to multiple students
(copyright free or under license agreement). Safety programs.
• Blogs as well as instant messaging/chat/conferencing tools ( audio
and video) enable students to collaborate regionally and globally
within safe boundaries.Example-school buddies on social networking
sites from schools in two different countries discuss travel safety.
10. How can the library implement
safety lessons?
3 Paradigms of the 21st Century
1. ICT literacy includes how to use a computer-
access software, internet for information manipulate multimedia tools
collaboratively. Application skills, Web tools, and social networking
skills.
2. Information literacy how to organise information-
“Students can access, use, organise, present and evaluate information”
(ASLA 2009 and ALIA 2006) -Define, Locate, Select,.
3.Critical literacy how to critically think about information
Questioning, problem solving skills and reflective thinking skills. The
ability to access, ,manipulate and present information for a specific
need. includes time-management and collaboration.
Environment
1.Atmosphere of sharing- guided practice activities
2.Set clear boundaries for Safety-Monitor
3.Have specific consequences for breaches of rules in line with
your school and library policy.
11. Conclusion- What happens in the future ?
• How do we negotiate the rapids of the digital age ?
• One step at a time, build up skills and lead by example, make your library
an atmosphere of safe sharing.
• How do we help each other to be safe online?
• Help others learn by holding professional workshops to build confidence in
use of digital skills and protection issues- yourself, staff, students.
• How do we keep up with changes?
• “By transforming yourself into a professional who researches trends,
monitors technology, avoids the fear factor and empowers student-
centered learning.”By Julie Lindsay and Vicki Davis
• What is the most important issue for the future?
• Put safety first and step out into the ever- changing, digital world.
12. Recommended Readings
• 1.ACMA Cybersmart Program (2012)
• http://www.acma.gov.au/scripts/nc.dll?WEB/STANDARD/1001/pc=I...
• 13 Jan 2012 ... The Cybersmart program enables children, parents, carers,
teachers ... and activities http://www.cybersmart.gov.au/
• 2..Dept of Education-Curriculum- Technology and …(2010)
• http://det.wa.edu.au/curriculumsupport/k10syllabus/redirect/...
• Technology and Enterprise. ... ACARA has developed the following information
resources for the Australian Curriculum: Information sheets; Learning Area ...
• 3.Johnson,D (2006) website-dougwri-Dangers and Opportunities
• http://www.doug-johnson.com/dougwri/dangers-and-opportunitie...
• 10 Jul 2007 ... crisis.jpg Dangers and Opportunities: Challenges for Libraries in the
Digital Age
...... Johnson, D. “You know you are a librarian in 2005 when…
• 4.Kallick, B. & Wilson, J. M. (2001). Creating an information infrastructure :
• challenges for the future. In B. Kallick & J. M. Wilson III (Eds.), Information
• technology for schools : creating practical knowledge to improve
• student performance (pp. 93-115). San Francisco : Jossey-Bass.
• 5..O’Connell, J. (2008). School library 2.0 : new skills, new knowledge, new futures.
In P.Godwin & J. Parker (Eds.), Information literacy meets Library 2.0 (pp. 51-62).
London : Facet Publishing
Notas del editor
Carr, Nicholas “The Shallows” ttp://www. theshallows book.com/ The Shallows . What the Internet Is Doing to Our Brains. by Nicholas Carr . Finalist for the 2011 Pulitzer Prize in General Nonfiction. Finalist for the 2011 PEN ...
What is Definition of The Internet-whatis.com The Internet , sometimes called simply "the Net ," is a worldwide system of computer networks - a network of networks in which users at any one computer can, ... searchwindevelopment.techtarget.com/definition/Internet Notes for subject ETL523 by Judy O’Connell (2012) Centre for Information Studies at Charles Sturt University, Wagga Wagga NSW
NSW Education and Training has a “Carers Guide to Internet safety” Aug 26, 2010 ... NSW Public Schools – Leading the Way www.det. nsw .edu.au p ... Internet Acceptable Use Policy .... 10 Steps to Child Internet Safety . 1. Locate ... www.sydneyr.det.nsw.edu.au/internetsafety/internetsafety.pdf Koppel on Discovery-Digital Footprint-Discovery Channel How much information about your daily life gets recorded by big business and Big Brother? Play this simple scenario by conducting your normal transactions as ... dsc.discovery.com/convergence/koppel/interactive/interactive.html Digital Footprint-Netlingo- The Internet dictionary- online dictionary. digital footprint . a.k.a. digital shadow. An expression that refers to the way technology now pervades everyone's lives, your " digital footprint " specifically ... www.netlingo.com/word/digital-footprint.php
Aug 26, 2010 ... NSW Department of Education & Training ... Do you discuss Internet Safety ? • What is accessible ... ALL schools have an Internet Access Policy ... www.sydneyr.det.nsw.edu.au/internetsafety/internetsafety.pdf Cybersmart was lauched 2. Feb 19, 2010 ... In order to ensure that NSW Departmental Internet and email services are safe and suitable for students, filters are always used when students ... www.cybersmart.gov.au/Schools/Cybersafety policies and procedures/National or state and territory policies/New south wales cybersafety policies.aspx
Frontline “Growing up Online” Features teens from County New Jersey and highlights unwanted attention through online activity such as educational Origami-Cyber Safety posting personal profiles under a different name and image, “ Growing up Online” YouTube-Uploaded by BlackEdelweiss on Jan 27, 2008 A clip from the PBS documentary "Growing Up Online." YouTube Cyberbullying /Cybersafety various different online presentations
Cyberbullying-An information video on Cyber bullying on Teacher Tube Professional Development Oct 26,2010 YouTube. Think Time: How does Cyberbullying affect you?.Uploaded by MySecureCyberspace on Nov 30, 2010 YouTube Programs Connecting with confidence Think consequences-Respect Others CARES- co-operation, assertiveness, responsibility, empathy and self-control, Stop/ think/ Connect Connecting with confidence Think consequences- respect others Regarding Cyberbullying “ Stop/ Block/Tell” h ttp:// www.csriu.org - Center for Safe and Responsible Internet Use- Embracing Digital Youth http://www.safekids.com/ - general resource site http://www.getnetwise.org/ - Internet Education Foundation http://www.wiredsafety.org - Wired Safety Internet Safety- NSW Police online-Aug 16, 2010 ... A Parent's Guide to Internet Safety . As a parent, you wouldn't think of leaving your children alone in a strange neighbourhood, allowing them to ... www.police.nsw.gov.au/community_issues/internet_safety http:// www.cybersmart.gov.au / Cybersmart by the ACMA Australian Communciation and Media Agency has short videos of age appropriate information and sollutions to help parents and carers learn about and deal with different online issues. Nature-the Cyber Security Blog – 11 easy ways to protect the mobile security of your family www.staysafeonline.info/blog/11-easy-ways-protect-mobie-security-your-famiy
Government of South Australia, Department of Education and Children's Services's Child and Student Wellbeing: Cyber Safety (2009) http://www.decs.sa.gov.au/speced2/pages/cybersafety/ Australian Curriculum in ICT information and Communication Technology ACARA *Wall,J & Ryan, S (2010) Resourcing for Curriculum innovation-Learning in a changing world, Acer Press, Victoria. pp.26-27 Scaffolds and Rubrics. Networks for Teachers and Librarians-Accessed through ETL523 CSU Feb 3, 2010 ... ALIA /ASLA joint statement on teacher-librarians ... The FAQ of the Web4Lib listserv , this site contains a wealth of information for computer ... Teacher Librarian link –Listserv-www.teachers.ash.org.au/rblonline/teacherlibrarianship/tllinks.htm Creative Commons-sharing resources Creative Commons licenses provide a flexible range of protections and freedoms for authors, artists, and educators. creativecommons.org/ ERA- Consortia for Australian Libraries for Collaboration in Purchasing of Electronic Resources- Creative Commons licenses provide a flexible range of protections and freedoms for authors, artists, and educators. creativecommons.org/ Sir Ken Robinson- Adresses on topics of Information and Technology-Creativity Learning and the Curriculum (2011) London-Oct 14, 2010 ... Sir Ken Robinson - Changing Paradigmsby theRSAorg256260 views · Ken Robinson ... Sir Ken Robinson : Bring on the learning revolution!by ... www.youtube.com/watch?v=zDZFcDGpL4U Lord Puttnam –Education and the Digital Society-Jan 27, 2011 ... Lord David Puttnum of Queensgate spent thirty years as an independent film producer with many award winning films including Chariots of Fire ... www.youtube.com/watch?v=-Iv0rOYHTIU Wintergarten 1989 Information Policy notes- Wintergarten Keller - Ihr exklusiver Wintergarten , ob als Wohnwintergarten, Orangerie ... The Keller AG has created this privacy statement in order to demonstrate our firm ... The following discloses our information gathering and dissemination ... www.keller.lu/it/privacy.php Hey jude44-Australian Policy online-Learning in an online world-”Langwitches”- A personal Learning Network Valenza,J –Award Winning Blog for Springfield Elementary School” The Neverending Story” Rebora,A Oct11,2010 ... Education Week Teacher and the Teacher PD Sourcebook. Send an email to Anthony Rebora . ... Change Agent . October 11, 2010 – Teacher. Teacher Group ... www.edweek.org/tm/contributors/anthony.rebora.html Change Agent Blog-Teachers Teach Expert Sourcebook
The Neverending Search- 6 days ago ... Posted by joycevalenza on April 23rd, 2012. I discovered Slikk yesterday. Still in beta, the new search tool is a nice alternative to the traditional ... http://edorigami.edublogs.org/category/cyber-safety/ 11 Dec 2011 ... Tags: acceptable use, acceptable use guidelines, cyber-safety , digital citizenship, management, Pedagogy, reflection , role model , technology ... eProjects http://ffabri.global2.vic.edu.au/ 16 Mar 2012 ... children can suddenly become ' model learners' when there is a toy involved. ... June 12th, 2011 by ffabri · No Comments · cybersafety , Reflections ... In reflection to this approach it is compelling to think about what is this ... As part of the project under the Reflection Heading “Planning for Cyber Safety” has a code of conduct, Parent guidelines, Acceptable behaviour, Cybersmart websites , Sharing ownership with different grades in primary school examples. ISTE International Society for Technology in Education-Cybersafety at home- includes many websites to help students and parents. http://ictpd-digital-citizenship-at-home.wikispaces.com/Reso... Cybersafety at home ... Cyber safety at home. A great ... It provides an overview of Ribble's nine elements of digital citizenship as well as his reflection model of ... 3.Johnson,D (2006) website-dougwri-Dangers and Opportunities http://www.doug-johnson.com/dougwri/ danger s-and-opportunitie... 10 Jul 2007 ... crisis.jpg Dangers and Opportunities: Challenges for Libraries in the Digital Age ...... Johnson , D . “You know you are a librarian in 2005 when…
*Wall,J & Ryan, S (2010) Resourcing for Curriculum innovation-Learning in a changing world, Acer Press, Victoria. pp.25-26 ETL523 Notes (2010)from Course, CSU, Centre for Information and Technology , Wagga Wagga
Wall,J & Ryan, S (2010) Resourcing for Curriculum innovation-Learning in a changing world, Acer Press, Victoria. pp.25-26 Australian Library and Information Association (ALIA) 2006, Statement The 21 st century has brought with it three main learning paradigms- ICT literacy
Quote by Julie Lindsay and Vicki Davis , (2010) ISTE international Society for Technology in Education, US and Canada 1.800.336.5191.