38
Digital Literacy Tour Google/iKeepSafe/YouTube Presenter Introduction Davina Pruitt-Mentle, Ph.D. Ed Tech Policy, Research and Outreach

Digital Literacy Tour Google/iKeepSafe/YouTube Presenter Introduction Davina Pruitt-Mentle, Ph.D. Ed Tech Policy, Research and Outreach

Embed Size (px)

Citation preview

Digital Literacy TourGoogle/iKeepSafe/YouTube

Presenter Introduction

Davina Pruitt-Mentle, Ph.D.

Ed Tech Policy, Research and Outreach

Welcome and IntroductionsWelcome and Introductions

OutcomesOutcomes

• Intro to Resource Guide– Key Questions and Core Messaging– Expanding the Definition of Digital Literacy– Other Resources

• Skimming through Lesson Plans & Videos– Detecting Lies and Staying true– Playing Safe Online– Playing Safe on YouTube

Intro to Resource GuideIntro to Resource Guide Key Questions- pg 4

Intro to Resource GuideIntro to Resource Guide Core Messaging pg 4

• Keep personal information private

• Authenticate and evaluate resources-including people, text messages and emails

• Help build an Upstander Society

• Craft a positive online presence

• Learn to manage and monitor your online reputation

• Understand that what you send or post are permanent

• Think carefully before you post photos, before you blog, and even before you send an email

• Understand that family, friends, employers and colleges are all interested in your digital footprints

• Educate yourself and others on cyber security. Take action and remain vigilant

Help build and cultivate a culture of good cyber citizenship: one in which

we recognize our shared responsibility !

 

Intro to Resource GuideIntro to Resource Guide Expanding Definition pg 4-7

C1 …Cyberethics• Promote the benefits of keeping a

positive online profile and reputation by advocating considerate online behavior and respecting the copyright of online material.

C2 … Cybersafety• Protect physical and mental wellbeing

by discussing the importance of limiting the amount of personal information available and keeping privacy and identity information secret.

C3 … Cybersecurity• Prevent damage to your computer,

data, and identity by using software filters, scanning and monitoring software, and hardware firewalls as a first line of defense.

Intro to Resource Guide OtherIntro to Resource Guide Other Resources pg 7-9

• Google– Google’s Chrome Browser– Safe Search Lock Feature

• YouTube– Private Videos and How to Share Them– Find and Send a Private Video’s Private URL– Blocking Users– Edit/Delete Your Comments– Deleting Comments Left on Your Video– Flagging– Hide Objectionable Words

LessonsLessons

Lesson OverviewLesson Overview

Each Lesson…

• Connected to Video

• Video Summary• Activity Overview• Objectives• Standards• Materials• Website Resource Link

• Main Activity• Multiple Extension

Activities• Student Sheets• Answer Keys

Detecting Lies and Staying TrueDetecting Lies and Staying True

• Directed Viewing Guide & Discussion (handout)

• Identify the Internet Crimes Sheet-closure or take home (handout)

• Practicing Detective Skills– Act 1: Photos– Act 2: E-mail– Act 3: Web Evaluation

Answers: page 17-18 of guide

Which is Fake? Which is True?Which is Fake? Which is True?

http://urbanlegends.about.com/library/bl_image_quiz.htm PIC SITE

How to Tell if an E-mail is RealHow to Tell if an E-mail is Real

How to Tell if an E-mail is RealHow to Tell if an E-mail is Real

Clues

• Too good to be true offers• Asking for personal or identity

information• Asking for passwords• Grammatical or Spelling errors• A sense of urgency or loss if

you don’t act quickly.• URLs that include the @ sign• Misspelled URLs• Attachments

http://sillydog.org/miscellaneous/networktool.phphttp://www.searchengineoptimising.com/network-query

Web Evaluation

http://zapatopi.net/afdb/

http://www.google.com/jobs/lunar_job.html

Detecting Lies: Core MessagingDetecting Lies: Core Messaging

• Keep personal information private —others can easily access• Authenticate and evaluate resources-including people, text

messages and emails• Uses three sources to verify information on the Internet• Help build an Upstander Society• Craft a positive online presence –it’s easy to track down current

and past digital footprints you have left• Learn to manage and monitor your online reputation • Understand that what you send or post are permanent• Think carefully before you post photos, before you blog, and even

before you send an email • Respect the copyrights of the owners of Internet content – avoid

plagiarism and cite your sources

Playing and Staying Safe OnlinePlaying and Staying Safe Online

Online Reputation ManagementOnline Reputation Management

• What have you seen posted?

• Are these “street smart?”• Current news events?• Digital Footprints• Online Reputation• Online Reputation

management• Who looks? Who cares?

Playing and Staying Safe: Playing and Staying Safe: Key MessagingKey Messaging

• Keep private info private

• Be kind online and if you encounter a bully report them

• Authenticate and evaluate resources-including people, text messages and emails

Staying Safe on YouTubeStaying Safe on YouTube

• What do you already know about YouTube safety?

• What would you like to know more about?

• Video & take notes

Stay Tune for More Tips Stay Tune for More Tips

from Your YouTube Team!from Your YouTube Team!

Bush, 2005— I think I may need a Bathroom Break?

http://urbanlegends.about.com/