background preloader

Digital Citizenship: Teacher Resources

Facebook Twitter

Digital Footprint Video. Tap here for our Free App! Get all our media picks, personalized for your kids. No thanks Jump to navigation Discover the best apps, games, and websites and learn best practices forteaching with technology. Mute Current Time 0:00 Duration Time 1:19 Loaded: 0% Progress: 0% Stream TypeLIVE Remaining Time -0:00 Playback Rate Chapters Chapters descriptions off, selected Descriptions subtitles off, selected Subtitles captions settings, opens captions settings dialogcaptions off, selected Captions This is a modal window.

Educator video Digital Footprint Video Discussion Guide Find Videos Digital Citizenship All Best Practices Curriculum Lessons in Action Teaching Strategies Webinar ArchiveAbout Our Resources Tech Integration All Best Practices Lesson in Action Teaching Strategies Tech 101 Webinar ArchiveAbout Our Resources More Digital Citizenship Curriculum Videos Pages Browse our library of reviews Now playing and coming soon Browse all reviews See what our editors recommend What we love Browse more of what we love. Digital Footprint Video Discussion Guide. Oops I Broadcast it on the Internet Lesson Plan. Digital Footprint Image. NetSmartz Teens Presentation. Title CloseX About Us Donate MissingKids.com NetSmartzKids.org NSTeens.org Language: Login Register Teens Presentation Download Presenter's Guide Learn Teach Watch About Us | Contact Us | Legal Information | Site Map Copyright © 2001-2017 National Center for Missing & Exploited Children.

NetSmartz Teens Presenters Guide 2015. Parent's Guide to Online Safety. 5 Best Apps to Protect Teens, Kids Online: KSL story. 4 Ways for Teachers to Stay Safer Online- NetSafe Utah. 1) Acceptable Use Policies (AUP) AUP's are "contracts" that outline how students can use the technology, what they cannot do with it and the consequences for violating the policy. These should include school web pages and the content that is allowed on them. AUPs should be signed by an authorized representative of the school, students and parents so that all concerned parties are aware of the policy. 2) No Student Names It is recommend that when referring to students on a web page that either their names not be used or only their first names be posted. 3) Student Pictures You are encouraged to post student work that may include student pictures; however, you should get written permission to post student pictures and work before placing it onto the web. 4) School or Classroom Web Pages Made available with permission of Stevens Institute of Technology; the Trustees of the Stevens Institute of Technology, Hoboken, NJ 07030.

Learn More About These Risks NetSafe Pledges Additional Resources: Protecting personal information | Office of the Children's eSafety Commissioner. Scams are often sent via email but can also be sent by instant messaging and SMS. According to the Australian Competition and Consumer Commission’s (ACCC) SCAMwatch website anyone can fall victim to a scam. Scams succeed because they look like the real thing and scammers manipulate people into responding. Scams can appear to come from authoritative sources, like a well-known bank or mobile phone provider. They may make people fearful that they will miss out on a special offer, or feel ashamed of themselves for refusing to help a person or group in need. If in doubt about the legitimacy of a website, call the organisation it claims to represent. Identity Theft. Methods According to the Federal Trade Commission (FTC), identity thieves can obtain information by rummaging through trash or stealing from purses, wallets, mailboxes, or homes.[1] They may also use electronic methods, such as those listed below.

Phishing relies on pop-ups, spam, and websites that look authentic to obtain personal information, such as log-in information and credit card numbers. Pharming uses malicious code to redirect users to fraudulent sites where hackers can access their personal information. Pretexting acquires personal information through false and illegal means, for example, obtaining financial information by pretending to call from a bank. These scams are sometimes accomplished with the use of malware (software designed to damage computers). Spyware, for example, is malware that is used to collect information from a computer without the user’s knowledge. Protecting Yourself You should also talk to your children about online scamming techniques. Social Media Explained Poster.

Common Sense Media: Facebook, Instagram, and Social Topic Center. KSL: Investigation Shows Why Teens Shouldn't 'Friend' People They Don't Know. Gaming Tips. Gaming Parent Handout. A Parent's Guide to Gaming. Video Games Play May Provide Learning, Health, Social Benefits, Review Finds. WASHINGTON — Playing video games, including violent shooter games, may boost children’s learning, health and social skills, according to a review of research on the positive effects of video game play to be published by the American Psychological Association. The study comes out as debate continues among psychologists and other health professionals regarding the effects of violent media on youth.

An APA task force is conducting a comprehensive review of research on violence in video games and interactive media and will release its findings in 2014. “Important research has already been conducted for decades on the negative effects of gaming, including addiction, depression and aggression, and we are certainly not suggesting that this should be ignored,” said lead author Isabela Granic, PhD, of Radboud University Nijmegen in The Netherlands. “However, to understand the impact of video games on children’s and adolescents’ development, a more balanced perspective is needed.” Frequently Asked Questions about Copyright and Fair Use. What is fair use? The Copyright Act gives copyright holders the exclusive right to reproduce works for a limited time period.

Fair use is a limitation on this right. Fair use allows people other than the copyright owner to copy part or, in some circumstances, all of a copyrighted work, even where the copyright holder has not given permission or objects. How does fair use fit with copyright law? Copyright law embodies a bargain. It gives copyright holders a set of exclusive rights for a limited time period as an incentive to create works that ultimately enrich society as a whole. In exchange for this limited monopoly, creators enrich society by, hopefully, contributing to the growth of science, education and the arts.

However, copyright law does not give copyright holders complete control of their works. How does the court know if a use is fair? Whether a use is fair will depend on the specific facts of the use. These factors are guidelines, and they are not exclusive. About Creative Commons Licenses: creativecommons.org. Our public copyright licenses incorporate a unique and innovative “three-layer” design. Each license begins as a traditional legal tool, in the kind of language and text formats that most lawyers know and love. We call this the Legal Code layer of each license.

But since most creators, educators, and scientists are not in fact lawyers, we also make the licenses available in a format that normal people can read — the Commons Deed (also known as the “human readable” version of the license). The Commons Deed is a handy reference for licensors and licensees, summarizing and expressing some of the most important terms and conditions. Think of the Commons Deed as a user-friendly interface to the Legal Code beneath, although the Deed itself is not a license, and its contents are not part of the Legal Code itself. Searching for open content is an important function enabled by our approach. Fair Use Checklist. Copyright & Creative Commons Explained for Kids Video. Questia How To Avoid Plagiarism Video. Excellent Video Clips on Plagiarism to Share with Your Students.

1- What is Plagiarism 2- A Quick Guide to Plagiarism 3- Plagiarism: a film by Murdokh 4- Avoid Plagiarism in Research papers with paraphrases and quotations 5- Before he cheats: A teacher parody 6- 10 types of plagiarism. Turnitin - Originality Check! Works with Canvas. Handouts on Plagiarism from Plagiarism.org. Responding to Cyberbullying: Guidelines for Administrators. What is Cyberbullying. Cyberbullying is bullying that takes place using electronic technology. Electronic technology includes devices and equipment such as cell phones, computers, and tablets as well as communication tools including social media sites, text messages, chat, and websites.

Examples of cyberbullying include mean text messages or emails, rumors sent by email or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles. Why Cyberbullying is Different Kids who are being cyberbullied are often bullied in person as well. Additionally, kids who are cyberbullied have a harder time getting away from the behavior. Cyberbullying can happen 24 hours a day, 7 days a week, and reach a kid even when he or she is alone. Effects of Cyberbullying Cell phones and computers themselves are not to blame for cyberbullying. Kids who are cyberbullied are more likely to: Frequency of Cyberbullying Research on cyberbullying is growing. Cyberbullying. Cyberbully PSA. Tips to Prevent Sexting. Your Photo Fate Video.