Cybersmart Tagged What you do online could tag you for life This captioned film contains moving images, a sound track and dialogue. A full copy of the script, including scene descriptions, is provided in a separate file titled ‘Tagged film script’. Gold — WorldMediaFestival Silver — New York Festivals Winner – ATOM Awards When a group of high-school friends post a rumour about a rival it sparks a chain reaction that leaves no one untouched. Developed by the Australian Communications and Media Authority’s Cybersmart program, Tagged is recommended for use with students aged 14 and over. Tagged is supported by lesson plans and compelling character reflection interviews. Bulletin officiel n°9 du 26 février 2004 PROTECTION DU MILIEU SCOLAIRE Usage de l’internet dans le cadre pédagogique et protection des mineurs NOR : MENT0400337C RLR : 506-0 CIRCULAIRE N°2004-035 DU 18-2-2004 MEN DT Texte adressé aux rectrices et recteurs d’académie Le développement de l’usage de l’internet est une priorité nationale. Il doit s’accompagner des mesures de formation et de contrôle permettant d’assurer la sécurité des citoyens et notamment des mineurs. qui recense l’ensemble des informations et projets en ce domaine et que vous pourrez utilement consulter. Les mesures d’aides aux établissements et équipes éducatives Les déploiements d’accès généralisés à l’internet dans les établissements et écoles ne peuvent s’effectuer qu’en prenant en compte les besoins des enseignants et des équipes éducatives de disposer d’outils leur permettant de sélectionner ou de contrôler l’information mise à disposition des élèves. Les mesures d’alerte Les mesures d’accompagnement du dispositif lui-même Annexe 1
Illinois Attorney General - Safeguarding Children - Internet Safety Internet Safety In today’s world, many people choose to communicate via the Internet and cell phones. Youth especially have embraced new technologies such as text messaging, social networking sites, and digital cameras to share information and connect with friends. However, without proper guidance, these types of communication technologies can be dangerous to a child’s physical and psychological well-being. To help inform parents and educators about our children’s online activities and to assist in their efforts to educate our youth regarding responsible and safe online behavior, the Attorney General’s Office provides the following resources: The accompanying webinar walks educators through each of these modules to describe the information covered and explain how educators can use the modules to educate their students about safe cyber behavior. Cyberbullying: A Student Perspective Cyber Safety Survey: The Results
This Is Me: This Is Me Introduction The JISC funded Digitally Ready project, part of the Developing Digital Literacies programme has enabled us to further the work done on the Eduserv funded This Is Me project. By bringing the original project outputs in to University of Reading ownership, the materials are more sustainable, and set in the twin contexts of Digital Literacy and Employability. A drinks coaster, for all your Digital Identity needs The This Is Me project looked at ways of helping people to learn more about what makes up their Digital Identity (DI) and at ways of developing and enhancing it. The University of Reading’s CCMS funded a continuation of This Is Me, which ran through until early 2010. We developed a number of short exercises and learning materials to help people think about what sorts of issues there are about DI. Please Note: This Is Me Activities by This Is Me is licensed under a Creative Commons Attribution-Share Alike 2.0 UK: England & Wales License.
Daughter ‘Begged’ for Spanking Instead of Mom’s Embarrassing Web Photo May 21, 2012 1:20pm Author ReShonda Tate Billingsley had her daughter post this picture to Instagram. (Courtesy ReShonda Tate Billingsley) At first, it might seem like your typical case of modern parental discipline: A Texas mom has prohibited her 12-year-old daughter from using the photo-sharing site Instagram after she caught the girl posting a photo of herself holding an unopened bottle of vodka with a caption that read “I sure wish I could drink this.” But it’s what ReShonda Tate Billingsley did next that has people buzzing: Billinglsey, a prominent Houston-area author, had her daughter post a new picture of herself to Instagram earlier this month holding a sign reading, “Since I want to post photos of me holding liquor, I am obviously not ready for social media and will be taking a hiatus until I learn what I should (and) should not post. “I thought she knew better, but in her mind, she thought, ‘I’m not drinking, what’s the problem?’” And hurt it did.
Les chartes d’usage de l’informatique à l’école La circulaire ministérielle, "PROTECTION DU MILIEU SCOLAIRE, Usage de l’internet dans le cadre pédagogique et protection des mineurs" du 18 février 2004 ( BO n°9 du 26 février 2004 ) indique les mesures à mettre en œuvre pour garantir le développement de l’usage de l’Internet dans le cadre pédagogique. La charte d’utilisation des ressources TIC fait partie de ces mesures. Elle doit être établie dans chaque établissement ou école et jointe au règlement intérieur. La charte d’usage des TIC est un texte à dimension éducative et ne doit pas se réduire à une liste d’interdictions ou à un mode d’emploi des outils informatiques. Cette charte doit être expliquée et détaillée aux élèves par l’équipe pédagogique, au même titre que le règlement intérieur. Ce document s’adresse aux élèves : il doit être court et utiliser un vocabulaire adapté au niveau des élèves concernés.
Lesson Plans and Student Activity Sheets Twenty-First Century Challenges CyberSmart! original, nonsequential standards-based lesson plans and student activity sheets have students think critically about the Internet as a communication and collaboration tool and consider how their futures will be affected by rapidly changing digital technologies. Communication Inventions Students learn how the Internet relates to communication inventions of the past. Grades Lesson Title Lesson Overview Codes * Spread the News! Children learn what it means to communicate, recognize the computer as a communication invention, and plan their own way to communicate a message. What's the Big Idea? Students recognize people's need and desire to communicate as they describe and classify past and present communications inventions. Great Communicators Students consider great communications inventions, including the Internet, and assess advantages and disadvantages of each. Great Moments in Communications What Is Cyberspace? Cyberspace at School Cyberspace Country
The Dark Sides of Our Digital Self I recently picked up a copy of Virtually You: The Dangerous Powers of the E-Personality at my local library. The author is a psychiatrist by the name of Elias Aboujaoude who is currently serving as the director at the Obsessive Compulsive Disorder Clinic at the Stanford University School of Medicine. The thesis of Aboujaoude’s book is that the world wide web can have a very profound affect on our sense of self. In fact, it can cause a kind of “digital divide” between our digital self, how we often think and behave online, and our offline self, how we often think and behave in face-to-face, “real world” interactions. Some of the case studies and examples in Virtually You are clearly reflective of individuals who already have a propensity for certain mental problems. However, the bigger lesson in Aboujaoude’s book is that the internet does play a very causal role in our lives and well being – and thus it is important to be very mindful of our online behavior. Delusions of Grandeur Narcissism
Digital Citizenship & BYOD My Colleague Lee Crockett made a comment the other day about BYOD, Bring your own device and Digital Citizenship. He said that the heart of any BYOD program is digital citizenship. And he’s right. As soon as a school starts allowing students to bring their own devices into school, they begin to surrender some of their control of the learning environment to the students. Schools also lack the ability to search the machine, it is not the schools machine, rather it is the private property of another individual. The boundaries between home/personal use in its varied forms – whether this is homework, social connections, entertainment, games or even inappropriate activities become blurred. While BYOD provides many obvious strengths and opportunities to the school ranging from improved care, access and use; to reduced capital, repair and licensing costs. So how do you manage and mitigate these risks? What is required is a deep understanding and acceptance of what is appropriate and right.
Identité numérique Un article de Wiki Paris Descartes. (Redirigé depuis E-réputation ) Des clés pour comprendre l'Université numérique Identité L’identité est ce qui caractérise un groupe ou un individu, le distingue, lui confère son individualité et sa singularité. « L’identité est un système de représentations, de sentiments et de stratégies, organisé pour la défense conservatrice de son objet (le « être soi-même »), mais aussi pour son contrôle, sa mobilisation projective et sa mobilité idéalisante (le « devenir soi-même »). Identité numérique « L'identité numérique est un lien technologique entre une entité réelle et une entité virtuelle. » (Wikipédia) « L'identité numérique n'est plus le simple reflet, plus ou moins fidèle, de l'identité civile. L'identité numérique est au coeur du web 2.0 , des blogs , des CV en ligne, des ePortfolios , des réseaux sociaux , etc. Liens pour approfondir
TextED Study: Your Facebook Personality Is The Real You If you think you're different on Facebook than you are in real life, you've got some explaining to do. A 2011 study from the University of Texas at Austin's Department of Psychology called "Manifestations of Personality in Online Social Networks: Self-Reported Facebook-Related Behaviors and Observable Profile Information" published in the academic journal Cyberpsychology, Behavior, and Social Networking found that Facebook users are no different online than they are offline. The study also revealed strong connections between real personality and Facebook-related behavior. Social and personality processes, the study says, accurately mirror non-virtual environments. Looking at the big five personality traits - openness, conscientiousness, extraversion, agreeableness and neuroticism - Professor Samuel D. In Study 1 (of the two studies covered in this paper), researchers examined personality and self-reported Facebook-related behaviors.
Thinkuknow - home Keeping children safe online and protecting them from sexual abuse and exploitation CEOP's Thinkuknow programme provides a range of free educational resources - films, lesson plans, presentations, practitioner guidance, games and posters - to professionals working with children and young people. Through the use of our educational materials you can help to empower and protect young people from the harm of sexual abuse and exploitation, both online and off. To access these resources you will need to register on the site. Exploited - preventing sexual abuse through education Our latest resource, Exploited, aims to help young people, aged 12 and over, to stay safe from sexual exploitation by recognising the signs. Guidance to schools and other organisations CEOP provides training and education resources for practitioners to use with children and young people to increase their understanding of online safety.
Is your digital footprint ready for teaching Am in the process of creating a new blog to be called “Is my digital footprint ready for teaching?”. The following describes the why and what and records some initial planning/design. Keen to hear any suggestions folk have. Why? This idea is killing two birds with one stone. First, is the need to demonstrate some sort of online learning event so the students have some ideas for their first assignment. The current intention is for the blog to act as a stand-alone learning event. The inspiration for this idea is, in part, the “pink bits” talk given at the CQUniversity GDLT induction. What? The aims of the site are to allow visitors to Discover what their public digital footprint is. In general, I shouldn’t be creating lots of content on this site. Looking for resources/activities George Couros’ page on digital footprint. Via Doug Pete’s about page is Visual.ly infographic generated based on my Twitter activity. Nice video from one of Michael Wesch’s students And the obligatory US news story Sites