Tuesday, April 25, 2017

Hex 6-3: Digital Communication

Consider:

1. Why is making a connection with other humans important?




http://hub.salesways.com/is-your-sales-team-using-social-media-effectively/

2.  How is digital communication different from face-to face?  What are the pros and cons of digital communication?


3.  How can you make positive online connections?


4.  What are some specific challenges, barriers, or misunderstandings that can happen with digital communication?


5.  What are some differences in the ways you communicate with your friends, family, teachers, boss, etc?  


6.  A Personal Learning Network (PLN) is an informal learning network that consists of people and websites that you learn from and/or communicate with.  Everyone has a PLN, whether or not they are on social media or not.  



What is in your PLN?  What could you add?  


Monday, April 24, 2017

Hex 6-2: Digital Commerce

https://digitalcitizenship-2a.wikispaces.com/Digital+Commerce

Consider:

1-What are some concerns with shopping online?

2-How can you know that you are on a secure site?  Should you use secure sites on a public computer for shopping?

3-What are some ways to make sure you can be safe when shopping online?

4-What should you (as a young adult) always do before shopping online?

5-What are some ways to stay safe when selling items online?



http://www.businessinsider.com.au/teens-digital-behavior-changes-2014-10


Some considerations:
1-identity theft/stolen financial information, scams

2-lock symbol, statements of security, encryptions, colors (none, blue [standard security], green [extended validation])

3-When using public computers, you may want to use private browsing (incognito) and "Clear All History"

4-Keep track of card activity
   -check bank and credit card statements carefully
   -check bank and card policies, but in general:
     -debit card: 2 days to dispute ($50 liability); up to 60 days,    
     liable for up to $500; after 60 days, loss not covered
     -credit card: 60 days to dispute ($50 liability); not covered after        60 days

5-Research retailers, particularly out of the U.S. (may not be covered for loss)

Handout: Cyber Consumer Safety Tip Sheet

Assignment:
Comment on this blog post with 2-3 sentences about your parents' opinions on online shopping.  You should ask your parents before responding (or even have your parents respond for you!).  Be sure to put your first name or initials on your comment, and be sure to comment on this post for Digital Commerce.

Friday, April 21, 2017

Hex 6-1: Digital Access


Consider the following questions:

1.  Why is access to technology important?  What are some things you must have technology for in today's world?

2.  What are some ways that access to technology can be limited? 


http://blog.jobsfirstnyc.org/2011/09/bridging-digital-divide-in-new-york.html

 Consider: 
-physical limitations
-financial/economic limitations
-geographic limitations (national and international)
-filters
-censorship 
-technology limitations (mobile phones vs. computers)

Video:  Internet Censorship




"Participation gap" is defined as "the unequal access to the opportunities, experiences, skills, and knowledge that will prepare youths for full participation in the world of tomorrow."
(Harlan, Mary Ann.  "Standing on a Corner: The Access Gap in Rural Communities."  Teacher Librarian.  Oct. 2014: 38-42.)

3.  What are some of the opportunities, experiences, skills and knowledge that students without access are missing?  In other words, what are they going to be missing when they graduate and go to college or into the working world?

(Communication, creation, collaboration, discovery, evaluation, innovations, networking/PLN)

(0-2:40)

http://ologie.com/2013/06/bridging-the-brand-gap/



4.  What can be done about lack of access?  Whose responsibility is it to ensure access?

Video: Net Neutrality



Activity (if time allows):
With your table group, come up with ideas about bridging the digital divide for the following factors:  physical, financial, geographic, filters, or censorship.  Type several short paragraphs on your ideas in the comment section, using the limitations assigned to your group.  

Try to include:  
-Specific problems with access to technology for your group 
-Specific ideas to bridge the digital divide for your group.  Think about specific things that you and people you know can do, as well as big ideas.  Use your own ideas, but you can do some quick research as well.
-Write a short response on how it felt to use technology with your limitations.  How did it feel?  How did you compare your groups to other groups?  Did it feel fair?

Thursday, April 20, 2017

Hex 6: Digital Citizenship (overview)

In this class, we will be focusing on 9 Elements of Digital Citizenship.  


http://cohort21.com/garthnichols/action-plan/digital-citizenship-curriculum/

Video: Living in a Digital World

Consider the following questions:

1.  What does it mean to be a citizen of a community (school, city, state, national, etc.)?

2. What are some rights and responsibilities of a citizen?

3.  How is being a digital citizen similar and different to other kinds of citizens?

4. Where can you find policies of different websites?  Why is looking at policies important?


http://www.edudemic.com/first-five-days-of-digital-citizenship-at-your-school/

Next, you will be creating rules of conduct for being a responsible, positive citizen online, with your table groups.  

Group roles:
-Facilitator (you like to take charge and can keep everyone on task)
-Recorder (you can write and type quickly)
-Spokesperson (you like to talk)

Everyone should contribute ideas!

Come up with five rules for proper behavior when using the Internet.  

Share your five rules in the comment section of this post.  Comment as Anonymous, but be sure to put the first names or initials of your group members.







Wednesday, April 19, 2017

Hex 6: Blog Expectations


For this class, you will participating in a class blog several days a week.  The blog will contain questions for discussion, information, short assignments, etc. 

Remember that what you write online could be seen by others in this class, in our school, in our community, and possibly even around the world.  Keeping that in mind, here are several expectations when participating in our class blog:
  • Be respectful to others
  • Be academic in your writing (spelling, grammar, etc.)
  • Stay on topic (no random posts)
  • Be mindful of who can/should read this (feel free to share with your parents)
  • Respond in the comment section for the correct day/post
  • Use your first name or initials ONLY (no name or initials=no credit)

Discussion of issues related to digital citizenship will be important in this class.  You may be asked to respond in writing to what we have discussed, so be sure to pay attention!  If discussion isn't working out, additional assignments may be necessary.  While we are discussing issues, be sure to:
  • Pay attention and listen to others (don't repeat the same answers)
  • Participate in the discussion, if you have something meaningful to add to the topic
  • Be considerate--do not interrupt or put down what someone else has to say


IF YOU ARE ABSENT:
Look first on the blog to see what you missed that day. Look at the information and videos, consider the discussion questions, and respond to any assignments for the day. Then check with Mrs. Arrants for any additional activities you missed.

Tuesday, April 11, 2017

Hex 5: Annotated Bibliography

For your final project for this class, you will be researching a topic on an issue within digital citizenship.

Assignment: Research an issue from within the nine elements of digital citizenship and create a bibliography using Noodletools (one person per topic).  

Sign up for your topic in the comments section of this blog post ("Final Project"), identifying the element AND the topic--first one to post gets the topic (you must include: your first name, the element of digital citizenship, and the topic to claim first rights).  Let me know if you have any ideas that are NOT on the list (but fit within one of the nine elements).

Other requirements:
-You MUST have at least three sources related to your topic
-You can include (but it is not required) no more than one video or audio clip on your topic
-You must use Noodletools to create your annotated bibliography
-Include a 2-3 sentence annotation for each source, which can be a summary or reflection of what you learned from the source


Possible Topics within the Nine Elements: 
1. Digital Access
-digital divide (in America or internationally)
-disabilities that prevent access (physical or mental)
-filters
-censorship
-net neutrality

2.  Digital Commerce
-buying or selling online
-cookies

3.  Digital Communication
-Cell phones in society
-Creating community through online methods
-Social media and society

4.  Digital Literacy
-Search strategies 
-Evaluation of websites
-Internet in the workplace (future of technology)
-Technology in schools 

5.  Digital Etiquette
-Appropriate use of technology in society

6.  Digital law
-Copyright and/or plagiarism
-Music and copyright
-Pirating, downloading, or file-sharing
-Hacking
-Cybercriminals and/or cybercrime divisions of law enforcement
-Cyberterrorism
-Laws dealing with cyber acts 

7. Digital Rights and Responsibilities
-Acceptable use policies (public computers, specific websites, etc.)
-Cyberbullying

8.  Digital Health and Wellness
-Physical issues (carpal tunnel, headaches, neck or eye strain, etc.)
-Psychological issues (addiction, depression, sleep issues, etc)

9.  Digital Security
-Internet safety 
-Sexting
-Predators
-Passwords
-Identity theft
-Online schemes/scams (phishing, etc)
-Malware, viruses, spyware, etc.
-Antivirus, firewalls, etc.
-Data collection by companies (big data, cookies, data mining)
-Government leaks (Wikileaks, Edward Snowden)


-Data breaches

Tuesday, April 4, 2017

Hex 5-9: Digital Security


http://senior-learning.wikispaces.com/file/view/lesson4-art.png/278606920/645x363/lesson4-art.png

Part I: Dangers on the Internet

Activity: Are You Web Aware?

1-What are some possible dangers on the Internet?  Is the Internet a dangerous place?

2-When is it OK to share personal information online? What kinds of personal information are NOT OK to share?  What kinds of personal information are OK to share?

http://transmissionsmedia.com/wp-content/uploads/2012/11/DANGER-INTERNET-AHEAD-PROCEED-WITH-CAUTION.png

Video:  Friend or Fake

Guide to Social Networking 

Video: Think Before You Share (Top 10)

Things to Think About with Social Media:
-limit your friends list
-privacy settings/controls (check often)
-"privacy fatigue" (read privacy guidelines, know new features)
-malicious apps, phishing, malware (similar to email)
-future job hunting
   -These types of posts will impact future career plans the most: lifestyle; inappropriate materials (comments, photos, etc.) made by you OR your friends/relatives; comments criticizing your past jobs (employees, coworkers, clients, etc); membership in certain groups 
   -Positive online reputation will help
   -Do not disclose a username and password in an interview

HW: Internet Contract





Part II: Scams


http://www.planetminecraft.com/blog/minecrafr-frauds-thetruth/

1-What are some different ways that you can be digitally scammed?

2-What can you do to make sure that you are not a victim of a scam?

3-What advice would you give to adults (especially older adults) in your life that might be susceptible to scams?

Video: 
The Internet: Cybersecurity & Crime





Types: 
-malware (connected to flash drives, embedded in files, downloads, email attachments)
-pop-ups (scareware ["Your computer is infected"], malicious advertising/contests)
-spyware (record keystrokes, screenshots, video, audio, browsing)
-ransomware (hold computer hostage until you pay)
-backdoor (hidden access to computer, besides malware)
-public wifi ("listen" to others, rogue router [not the wifi you think you're connecting to], "shoulder surfing", theft [don't leave unattended])
-private wifi (piggybacking [unauthorized use on private wifi--slows speed, could be doing illegal activity or "listening", hackers share locations]; turn off if not in use [vacation])
-Identity theft

Video: Identity theft targets kids








Defense:
Data backup
Firewalls
Software patches
Antivirus software (only trust warnings from a legitimate source)
User knowledge/education
   -Do not click on unknown links! (hover over link)
   -Do not give personal/confidential information over the phone!
   -Phishing emails may use personalization or play on your emotions


Activity: Scams and Schemes

Kahoot: Digital Security 


Part III: Sexting

1-What is sexting?  Why would someone do it?

2-What are some consequences of sexting?  
Consider child pornography before forwarding.

3-Do you think teens today feel pressured to sext?

4-What should you do if you receive an unwanted sext?




Part IV: Passwords

1-How frequently do you change your passwords?

2-What makes a good password?


Most Used Passwords
Source: Computer Security Literacy: Staying Safe in a Digital World


Source: Better Buys


 Source: Better Buys


Video: A World Beyond Passwords

Activity:  Creating a Good Password

Password Tester
(just for fun)


Part V: Digital Footprint/Misc.

1-Did you know websites/companies collect your personal information (cookies)?

2-What are some issues with leaks of government information (Wikileaks, Edward Snowden)?

3-What is a digital footprint?  What is on your digital footprint?



http://www.cybersmart.gov.au/Kids/Get%20the%20facts/~/media/Cybersmart/General%20Archive/Archive/digitalFootprint2.png

Video: Your Digital Footprint


Activity:  Privacy and Your Digital Footprint