Click here to load reader

EDU 225: Instructional Technology Week 12 Professor Vasquez

Embed Size (px)

Citation preview

EDU 225: Instructional Technology

EDU 225: Instructional TechnologyWeek 12Professor VasquezLast weekWe discussed ethical use of technologyWe explored the fair use and internet safety guidelinesWe discussed the teachers role in internet safetyWe looked at some tools teachers can use to teach ethical use of technologyPrayer(you are welcome to join or take a mental break)Serenity PrayerGod grant me the serenity to accept the things I cannot change; courage to change the things I can; and wisdom to know the difference. Living one day at a time; enjoying one moment at a time; accepting hardships as the pathway to peace; taking, as He did, this sinful world as it is, not as I would have it; trusting that He will make all things right if I surrender to His Will; that I may be reasonably happy in this life and supremely happy with Him forever in the next. Amen.

Ethical Use and Evaluation of Technology (Weeks 11 and 12)

Display an understanding of the terms Internet Security and Internet Privacy and their importance in K-12 education.Explain ethical practices for technology use in creating a copyright and student use agreement for a K-12 school district.Name and describe three ethical practices for technology use and be able to address their importance to a K-12 school district.Explain how to evaluate technology use in the classroom, including factors such as effectiveness, ease of integration, cost, and reliability.Evaluate technology use in the K-12 classroom.Whats the difference between internet security and internet privacy?

Internet security is a general term for a very broad issue covering security for transactions made over the Internet. Generally, Internet security encompasses browser securityFirewallsAnti-malwareAnti-spywareAnti-virushttp://www.techopedia.com/definition/23548/internet-securityInternet SecurityInternet PrivacyInternet privacy is the privacy and security level of personal data published via the Internet. It is a broad term that refers to a variety of factors, techniques and technologies used to protect sensitive and private data, communications, and preferencesAt risk when making an online purchase, visiting a social networking site, participating in online games or attending forumsPhishing: An Internet hacking activity used to steal secure user data, including username, password, bank account number, security PIN or credit card number.Pharming: An Internet hacking activity used to redirect a legitimate website visitor to a different IP address.Spyware: An offline application that obtains data without a user's consent. When the computer is online, previously acquired data is sent to the spyware sourcehttp://www.techopedia.com/definition/24954/internet-privacy

Copyright and Student Use Agreementhttp://www.fusd1.org/cms/lib03/AZ01001113/Centricity/Domain/638/AUP_from_technology_website.pdfWhat do you like about this agreement?What elements are needed on a Technology/Student Use Agreement?Evaluate technology use in the K-12 classroomhttps://www.teachingchannel.org/videos/differentiating-in-mathWhat are some positives to this lesson?What is this teachers use of technology?What would you have done differently?https://www.teachingchannel.org/videos/poetry-and-technologyWhat are some positives to this lesson?What is this teachers use of technology?What would you have done differently?

Break

Ethical Use of Social Networkinghttp://plato.stanford.edu/entries/ethics-social-networking/#FriVirGooLifSocNetSerRead the introduction to section 3Break into pairs to read and discuss your section3.1 Social Networking Services and Privacy3.2 The Ethics of Identity and Community on Social Networking Services3.3 Friendship, Virtue and the Good Life on Social Networking Services3.4 Democracy, Freedom and Social Networking Services in the Public SphereCreate a short PPT, Prezi, Kizoa, SmartNotebook or other visual display to share highlights of the sectionEffectiveness, Ease of integration, Cost, and ReliabilityCompare two types of a technology toolUse a chart or graphic organizer to visualize comparisonEthical Use for Teachers and Teacher CandidatesMust prepare with precautionary measuresMust be discreet in technology useMust follow guidelines in the Student Teaching HandbookCOE Clinical Practice Expectations and Academic StandardsDispositional ExpectationsClinical Practice Expectation ViolationsZero Tolerance PolicyWhat applies to your ethical use of technology?Thinking of ethical technology use, what could be added to these guidelines?Next week bring your draftsComprehensive Classroom Technology Plan (e-Portfolio Assignment)The Comprehensive Classroom Technology Plan will include the sections listed below. A Reflection Essay will also be prepared to accompany the plan. The plan is composed of the following components: Section One: Mission and Vision StatementSection Two: Communications PlanSection Three: Integrating Instructional Technology Section Four: Software to Support AssessmentSection Five: Technology Ethics in the ClassroomConclusionComprehensive Classroom Technology Plan (Benchmark Assessment)Submit the Comprehensive Classroom Technology Plan (approximately 1200 words) and the Reflection Essay (approximately 500 words) to the instructor by the end of Week 13.Additionally, submit the complete assignment in TaskStream. Directions for submitting to TaskStream can be found on the College of Educations page in the Student Success Center.