Friday, May 19, 2017

Hex 6: Final project/Bibliography

For your final project for this class, you will be researching a topic on an issue within digital citizenship.

Assignment:
Step 1: 
Research an issue from within the nine elements of digital citizenship and create a bibliography using Noodletools (one person per topic).  Due Tuesday.

Sign up for your topic in the comments section of this blog post ("Final Project/bibliography"), identifying the element AND the topic--first one to post gets the topic (you must include: your first name, the element of digital citizenship, and the topic to claim the topic).  

Example: KA, Digital Health & Wellness, addiction

Other requirements:
-You MUST have at least three sources related to your topic
-You can include (but it is not required) no more than one video or audio clip on your topic
-You must use Noodletools to create your bibliography (choose MLA Lite--the free option--to create your account)


Step 2:
Create an online project on your topic, putting information into your own words.  This will be shared with the class on Thursday.

Options: Prezi, Emaze, Powtoon--any online presentation creator (but try to avoid Google Slides--boring!!!)
Possible Topics within the Nine Elements: 
1. Digital Access
-digital divide (in America or internationally)
-disabilities that prevent access (physical or mental)
-filters
-censorship
-net neutrality

2.  Digital Commerce
-buying or selling online
-cookies

3.  Digital Communication
-Cell phones in society
-Creating community through online methods
-Social media and society

4.  Digital Literacy
-Search strategies 
-Evaluation of websites
-Internet in the workplace (future of technology)
-Technology in schools 

5.  Digital Etiquette
-Appropriate use of technology in society

6.  Digital law
-Copyright and/or plagiarism
-Music and copyright
-Pirating, downloading, or file-sharing
-Hacking
-Cybercriminals and/or cybercrime divisions of law enforcement
-Cyberterrorism
-Laws dealing with cyber acts 

7. Digital Rights and Responsibilities
-Acceptable use policies (public computers, specific websites, etc.)
-Cyberbullying

8.  Digital Health and Wellness
-Physical issues (carpal tunnel, headaches, neck or eye strain, etc.)
-Psychological issues (addiction, depression, sleep issues, etc)

9.  Digital Security
-Internet safety 
-Sexting
-Predators
-Passwords
-Identity theft
-Online schemes/scams (phishing, etc)
-Malware, viruses, spyware, etc.
-Antivirus, firewalls, etc.
-Data collection by companies (big data, cookies, data mining)
-Government leaks (Wikileaks, Edward Snowden)
-Data breaches

Tuesday, May 16, 2017

Hex 6-9: Digital Safety


http://senior-learning.wikispaces.com/file/view/lesson4-art.png/278606920/645x363/lesson4-art.png

Part I: Dangers on the Internet

Activity: Are You Web Aware?

1-What are some possible dangers on the Internet?  Is the Internet a dangerous place?

2-When is it OK to share personal information online? What kinds of personal information are NOT OK to share?  What kinds of personal information are OK to share?

http://transmissionsmedia.com/wp-content/uploads/2012/11/DANGER-INTERNET-AHEAD-PROCEED-WITH-CAUTION.png

Video:  Friend or Fake

Guide to Social Networking 

Video: Think Before You Share (Top 10)

Things to Think About with Social Media:
-limit your friends list
-privacy settings/controls (check often)
-"privacy fatigue" (read privacy guidelines, know new features)
-malicious apps, phishing, malware (similar to email)
-future job hunting
   -These types of posts will impact future career plans the most: lifestyle; inappropriate materials (comments, photos, etc.) made by you OR your friends/relatives; comments criticizing your past jobs (employees, coworkers, clients, etc); membership in certain groups 
   -Positive online reputation will help
   -Do not disclose a username and password in an interview

HW: Internet Contract





Part II: Scams


http://www.planetminecraft.com/blog/minecrafr-frauds-thetruth/

1-What are some different ways that you can be digitally scammed?

2-What can you do to make sure that you are not a victim of a scam?

3-What advice would you give to adults (especially older adults) in your life that might be susceptible to scams?

Video: 
The Internet: Cybersecurity & Crime





Types: 
-malware (connected to flash drives, embedded in files, downloads, email attachments)
-pop-ups (scareware ["Your computer is infected"], malicious advertising/contests)
-spyware (record keystrokes, screenshots, video, audio, browsing)
-ransomware (hold computer hostage until you pay)
-backdoor (hidden access to computer, besides malware)
-public wifi ("listen" to others, rogue router [not the wifi you think you're connecting to], "shoulder surfing", theft [don't leave unattended])
-private wifi (piggybacking [unauthorized use on private wifi--slows speed, could be doing illegal activity or "listening", hackers share locations]; turn off if not in use [vacation])
-Identity theft

How to Protect Yourself from Identity Theft (Dave Ramsey)

Activity: Scams and Schemes



Video: Identity theft targets kids





Defense:
Data backup
Firewalls
Software patches
Antivirus software (only trust warnings from a legitimate source)
User knowledge/education
   -Do not click on unknown links! (hover over link)
   -Do not give personal/confidential information over the phone!
   -Phishing emails may use personalization or play on your emotions


Kahoot: Digital Security 



Part III: Passwords

1-How frequently do you change your passwords?

2-What makes a good password?


Most Used Passwords
Source: Computer Security Literacy: Staying Safe in a Digital World


Source: Better Buys


 Source: Better Buys


Video: A World Beyond Passwords


Activity:  Creating a Good Password


Dice Activity
Step 1: Roll five dice all at once. Note the faces that come up without looking at the wordlist yet. 
Step 2: Your results might look like this reading left to right: 4, 3, 4, 6, 3. Write those numbers down.
Step 3: Open EFF's Long Wordlist [.txt] to find the corresponding word next to 43463.
Step 4: You will find the word "panoramic." This is the first word in your passphrase, so write it down.
Step 5: Repeat steps 1-4 five more times to come up with a total of SIX words.
When you are done, your passphrase may look something like this:
panoramic nectar precut smith banana handclap
Step 6: Come up with your own mnemonic to remember your phrase. It might be a story, scenario, or sentence that you will be able to remember and that can remind you of the particular words you chose, in order. For example:

The panoramic view, as I tasted the nectar of a precut granny smith apple and banana, deserved a handclap.
Password Tester
(just for fun)


Part IV: Digital Footprint/Misc.

1-Did you know websites/companies collect your personal information (cookies)?
In the News: Disney Sued Over Gaming Apps

2-What are some issues with leaks of government information (Wikileaks, Edward Snowden)?

3-What is a digital footprint?  What is on your digital footprint?



http://www.cybersmart.gov.au/Kids/Get%20the%20facts/~/media/Cybersmart/General%20Archive/Archive/digitalFootprint2.png

Video: Your Digital Footprint


Activity:  Privacy and Your Digital Footprint

Friday, May 12, 2017

Hex 6-8: Digital Health & Wellness

Consider:

1-What are some possible physical issues that could happen because of technology?

2-Can you think of some "danger zones" at school or at home for physical issues?  


http://internetsavvy.wikispaces.com/file/view/health.jpg/200142334/461x138/health.jpg


http://mobihealthnews.com/wp-content/uploads/2013/10/LumoBack-infographic.jpg

What can you do about them (to avoid them, to fix them, etc.)?
http://mentalfloss.com/article/75385/how-you-should-really-be-sitting-your-desk



https://gallery.mailchimp.com/7960acdb88d010a689afcc915/images/Ribbet_collage_infographic2.jpg


Stretches:

GoNoodle

3-What are some possible psychological problems that could happen because of technology?


http://blog.jammer-store.com/wp-content/uploads/2011/09/mental-health.jpg

Consider:  addiction, isolation, stress, depression, anxiety/social anxiety, sleep disorders, mental issues associated with cyberbullying, etc.


(3:15-10:23)

4-What can you do if you or someone you know is exhibiting some of these behaviors?

Video:  Internet Addiction


Site: Warning Signs of Internet Addiction

Addiction Test

Article: Dealing with the Device-Addicted Generation
In the News: Have Smartphones Destroyed a Generation?


Choose an activity (if time allows):
1-Choose a partner and create a short scene where one person has any digital health and wellness issue and the other person is a friend trying to help them with their issue.  Show a positive way to help them and a negative way.  Act out for the class in a 2-3 minute skit.

2-Find an article or video that talks about physical, psychological, or emotional health and technology.  Write a summary of your article, including the important points (3-5 sentences), in the comment section of this post.  Be sure to include the URL of your article or video.

Possible topics/search terms include:  technology AND addiction, isolation, carpal tunnel, posture, eye strain, lack of exercise, etc.   

3-Write a detailed plan to solve a digital health and wellness issue of someone in your life (you do not need to share names).  Try to have 4-6 steps of things they can do to solve their problem. Ideas:  a plan to help them through addiction or isolation, a map/photos with a change to help with ergonomics, best items to buy to help with carpal tunnel or other ailments, etc.  Be specific!

Thursday, May 11, 2017

Hex 6-7: Digital Rights & Responsibilities

Consider:

1-What rights (freedoms or privileges) do you have when using digital technology?

2-What responsibilities do you have when using digital technology?

3-What are some ways that you can use technology responsibly?

4-True or False:  Everyone is responsible for a positive online experience.


Part II:

Review:

1-What is plagiarism?

2-What are some consequences of plagiarism?

3-How can you avoid plagiarism?

MLA Documentation

Video:  Stopping Word Thieves



Part III:

Consider:

1-What is cyberbullying?

2-What are some examples of cyberbullying?

3-What are some consequences of cyberbullying?

4-What should you do if you are a victim of cyberbullying?

5-True or False:  Most kids do not cyberbully.

6-Do you think cyberbullying is a problem in our school?  If it is, what can we do about it?

Video:  Let's Fight It Together 


Activity: Scenarios (if time allows)

Tuesday, May 9, 2017

Hex 6-6: Digital Law

Consider:

1-Do you share music, games, movies, etc. with your friends?  

2-What are some consequences for illegal downloading, file sharing, pirating, etc?

3-What is your opinion on sharing files?




http://cloudfront.sproutfund.org/files/2014/10/pirating-music1.jpg

Part II


Consider:

1-What is copyright?

2-What does copyright protect?  Why is it important?

3-How can we obey copyright in our school work?

4-What are the consequences for breaking copyright (in school, in college, at work, etc)?


http://blog.kunvay.com/wp-content/uploads/2013/07/Copyright-CutOut2.jpg

Video:  What's Mine Isn't Yours

Video:  Music Plagiarism

Activity: Creator's Rights

Monday, May 8, 2017

Hex 6-5: Digital Etiquette

http://wallpaper.mohoboroto.com/images/892729-mobile-manners-cell-phone-etiquette-do-not-use-cell-phones-when-in.jpg

Consider:
1-Have you ever been annoyed in public by other people on their cell phones or other devices?  Give examples.  When and/or where can the use of cell phones be considered impolite, inappropriate, or illegal?



https://www.wow247.co.uk/wp-content/uploads/2013/04/popes.jpg

2-Should cell phones or other technology be banned in some places?  In what places and under what circumstances?


http://3.bp.blogspot.com/_Ty1MoTdJZYA/TK2FTqedmeI/AAAAAAAAAFw/sZqACDrcmxI/s1600/CELL+PHONE+CITATION.jpg

3-When are appropriate and inappropriate times to use cell phones in school?  

Consider texting, listening to music, answering a call, taking photos/video, social media, etc.

Side question: Should students be friends with teachers on social media?


http://www.grandhaventribune.com/sites/www.grandhaventribune.com/files/styles/large/public/cell_phone.gif?itok=-lNa-O4L

4-What are some things to keep in mind when borrowing someone else's computer? Examples: a friend, a parent, or a public computer

Consider: closing windows, changing settings, shutting down, privacy, etc.

5-How can we protect people's privacy on social media?  How can we avoid spreading gossip or starting rumors?  
Example: medical emergency in town

6-What is "tech shaming"?  Why is it inappropriate? 

7-How can technology negatively affect your relationships?  What would be some good rules to help build relationships?
Example: no cell phones at the dinner table





http://www.techbrother.com/wp-content/uploads/2013/10/funny-cell-phone-quotes.jpg

8-Email and other technological communication is now common in school and the workplace.  What are some guidelines (things to do and not do) when writing emails or other workplace communications?  

Consider: textspeak, capitalization, spelling, jokes, subject line, closing/greeting, all caps, etc.

Always try to catch  your mistakes:











Video:


Video: Word Crimes 



Activity (if time allows):
Come up with 5 rules with your table group regarding cell phone use in public and post them in the comments section.  Be sure to include first names only of your group members.