The educational thoughts of Jason Epstein
THE PERSONAL VIEWS, OPINIONS AND COMMENTS CONTAINED HEREIN ARE SOLELY THOSE OF THE BLOG’S AUTHOR IN HIS PERSONAL CAPACITY, AND ARE NOT ENDORSED BY ANY OTHER PERSON OR ENTITY.
Anti-Phishing Phil™ is an engaging online game that teaches students and adults how to identify phishing URLs. The game was developed at Carnegie Mellon (in partnership with Wombat Security Technologies). Scientific evaluation has shown that Phil is more engaging than traditional training solutions and significantly more effective in terms of how well people are later able to detect phishing attacks and how long they remember what they have learned.
Web-based Comics. BitStrips for Schools places it on a private virtual network where teachers can moderate content and review all characters and comics. Students can flag inappropriate comments or bullying, which is then instantly removed pending teacher review. There is a nominal fee of $9.95 per month for up to 40 students.
Social networking services from Twitter and Foursquare to Yelp and Buzz encourage users to log in and share their location. Please Rob Me is a website by Forthehack that lists updates on Twitter and Foursquare from people who are telling they world that they are not home. Scary stuff and definitely something both kids and adults need to consider.
Everyone you consider a "friend" on Facebook, may not have the friendliest intentions. That was the hard lesson homeowners in New Albany, Ind., believe they learned after their home was ransacked by two men.
TechLiteracy Assessment uses a blend of interactive, performance-based questions and multiple choice, knowledge-based questions to measure and report technology literacy for elementary and middle school students
It would be wonderful if parents could simply purchase a set of “controls” that would instruct children in online safety and screen out dangers. While of course no piece of software can do all of this, parental controls combined with online safety education and some common sense rules for Internet use are a parent’s best strategy for keeping children safe online.
Illustrated stories are a powerful form of popular expression. Formats such as the single cartoon, panel strip, comic book, graphic novel, and illustrated book have been widely used in our culture to communicate and express ideas in dramatic ways.
Software giant Microsoft has launched its own site — www.getgamesmart.com — to help address the problem of cyberbullying in online games, as well as assist parents in using the ESRB Rating System to determine what games their children should be playing — and what games they should not.
IKeepSafe Video addresses parents on the importance of an online reputation and the realities of a negative digital reputation. The same two vignettes are used in this video as the one done specifically for students. These are true stories. Advice to parents is offered.
Whether it is for a job application, friendship, dating, or other purposes, when people want to learn about someone, they turn to this ever-growing pool of information. Online reputation, therefore, plays an important role in personal and professional life and has become a significant factor in making hiring decisions.
Florida State lawmakers Monday took up a bill that would, for the first time, create a separate penalty for the increasingly common, and risqué, practice among teens — sending naked or suggestive pictures of themselves via cell phone or e-mail.
So far this year, at least 15 states have introduced or are considering bills or resolutions aimed at “sexting.” The legislation generally aims to educate young people about the risks of sexting, deter them from the practice, and apply appropriate penalties to those who do engage in sexting. While some states are just encouraging programs to educate teens about the dangers of sexting, others are attempting to de-criminalize the act
Impressive school district page on external Internet Safety resources by topic and age group. Also includes samples of K-12 student content and cybersafety activities that have taken place at individual schools within the district.
How will you prove your students meet NCLB requirements to be "technology literate" by 8th Grade? This free assessment is based on the International Society for Technology in Education (ISTE) National Educational Technology Standards for Students (NETS-S), the assessment is available in both Mac and PC versions. In other words, the screen shots used in the assessment questions match those of a Mac or PC. (The actual assessment is web-based and platform-independent).
Yes that Garfield! Garfield animated comic books now educate kids about cyberbullying and online safety. Other topics in development include digital and media literacy. Watch/Try/Apply scaffolded teaching strategies are used as students watch animated lessons, try interactive, guided practice and apply interactive knowledge. Kids earn safety certificates.
Excellent educator-created video offers students an introduction to the concepts of "managing personal identity online" and "digital footprint" and what it will mean in the course of their lifetime. Particularly noteworthy are the employer comments regarding what they learn from reading what job candidates have posted online and how it affects them both negatively and positively in considering the person for a job.
Do Internet search engines point us to the information that we need or confuse us with irrelevant or questionable information? How can Internet users improve their searches to find reliable information? are some ways to perform effective searches? In this lesson, students conduct Web searches on open-ended questions, and draw on their experiences to develop guides to searching effectively and finding reliable information online.
New Jersey Legal, a firm specializing in computer forensics, (eDiscovery, litigation support and trial service), also provides custom court room exhibits and multimedia presentations. They run a weekly comic series on their web site called CAPTAIN FORENSICS - with comics that are all related to computer crimes. This is part one of a 4-part series on Cyberbullying. Click next for the rest of the episodes.
Among 50 U.S. cities studied for their vulnerability to cybercrime, Seattle came out on top as the riskiest place, followed by Boston, Washington, D.C., and San Francisco, according to the report "Norton's Top 10 Riskiest Online Cities," released Monday. Results are based on number of attempted hacking attacks and infected systems.
In this lesson, students research different types of identity-theft fraud and ways to avoid falling victim to various scams. They then create focused public service announcements in different media, targeted to individuals most susceptible to consumer fraud.
Executive Summary of a white paper on the same title, available at http://www.pearson.org. The study begins a discussion of how digital media is changing the way children learn and whether the way they learn is evolving to meet a new, dynamic digital media format.
In the first federal appeals court opinion dealing with “sexting” — the transmission of sexually explicit photographs by cellphone — a three-judge panel of the United States Court of Appeals for the Third Circuit ruled Wednesday that parents could block the prosecution of their children on child pornography charges for appearing in photographs found on some classmates’ cellphones.
Katherine Evans wanted everyone to know: Ms. Phelps was the worst English teacher she'd ever had. So Evans, a Florida high school senior and honors student, posted a Facebook page to publicly criticize the teacher. Two months later, though, Evans was suspended for cyberbullying the teacher with her very precisely named group, "Ms. Sarah Phelps is the worst teacher I've ever had," on the social-networking site.
A quarter of UK internet users aged eight to 12 had profiles on Facebook, Bebo or MySpace last year, research has found, although the lowest minimum age set on any of the sites is 13. Ofcom's annual Children's Media Literacy Audit for 2009 also had bad news for the music industry, finding that 44% of children between 12 and 15 thought downloading shared copies of films and music for free should not be illegal.
This section contains links to a variety of scenarios of ethical and unethical technology use by students. The scenarios will include discussion questions and brief commentary. I would welcome real receiving real incidents from your experiences as a library media specialist, teacher or parent that would make good discussion starters.
The Six Principles of e-Teaching: Integrate, Lead with "Hands-On," Build Hard Skills, Involve Students, Connect Students with Real World, Showcase student work. A database of lesson plans is included on this site. LearniT-TeachiT is a non-profit organization dedicated to connecting business, industry, governmental agencies and other organizations to use the power of technology to prepare teachers, students, and learners of all ages to develop 21st century skills that will provide a basis for their ongoing engagement in learning and personal achievement.
This fictional site was developed by a group of teachers as a means of teaching students about the Internet. Although the Internet can be a tremendous resource for gathering information about a topic, we found that students often did not have the skills to discern useful information from worthless data. The teachers set out to develop a series of lessons for elementary age students in which they would demonstrate that just because it is out there for the searching does not mean it is worthwhile.
See chart for descriptions of roles students play in bullying situations. To see the Olweus Bullying Prevention program used to address cyberbullies, check out the work of this group of school psychologists.
A comparison of five Digital Citizenship models: ISTE NETS, Bailey & Ribble, IKeepSafe/C3 Framework, Digital Citizenship & Creative Commons, Protecting Students in the 21st Century. The chart can be downloaded here.
Organized around the way middle schoolers use the Internet, the CyberCitz Project provides teaching materials on Internet safety, security and ethics. This new project includes an Educators' Guide, a youth website, technology citizenship posters, and e-lessons on a K-12 learning management system. This project was produced in collaboration with the Virginia Department of Educational Technology and IIIA at James Madison University. Navigate through the curriculum content using the sidebar on the left side of the screen.
Cisco & Wired Safety's Tween CyberSafety 6-page document is loaded with colorful graphics and gives kids tips on a variety of Internet safety topics, such as cyberbullying, remembering passwords, and determining which sites are safe.
NCSA teamed up with USA Today Education Foundation and the Department of Homeland Security to develop seven lessons during the 2009-2010 school year targeted at 8th-12th graders. Lesson plans use recent news stories about cyber security issues.
In 2006, legislation in the state of Virginia added a new component to the educational curriculum for GR K-12: Internet Safety for Students. This colorful 25-page Citizen's Cyberguide focuses on a middle school audience and integrates ethical standards that can promote their use of the web more wisely and responsibly. Includes information on general safety, social networking and gaming and is designed to help kids develop safety skills, cyberethics and respect regarding their behavior online.
Download free posters suitable for GR 6-12 classrooms on sexting awareness, firewalls, cyberpredators and cybersecurity from Cyber Exchange, a Cyber Security Awareness program and nonprofit that provides education and certification for information security professionals.
GINA'S STORY - first-person account of a high school student whose photos were high-jacked from her private page on a social networking site. They were altered with PhotoShop and covered with nasty comments, then posted on another site for everyone to see.
26 page guide for Educators on Safety, Security and Ethics produced for K-12 students and teachers by the IIIA/James Madison University in cooperation with the Office of Ed Tech for the State of Virginia. Covers digital communication topics like ethics, digital footprint, flaming, spyware, viruses, hoaxes, spoofing & phishing, spam, identity theft, privacy, cyberpredators, social networking, gaming, and bullying via cell phone.
Higher ed requires incoming freshmen to take Composition and some form of math, and so, too, should universities require students to take a course that helps them identify reputable information in the vast expanse of the web.