Please enable JavaScript.
Coggle requires JavaScript to display documents.
ETC447 (Global Awareness and Cultural Understanding (Modern technologies…
ETC447
-
Safety, Ethics, and Legal Technoogy:
Safety: Stranger danger. Protecting your information on the internet. Australia has set up a esaftey commissioner
Ethics: What should we do on the internet? Copy pasting?
“Show respect for the humanity of others no matter their race, religion, or sexual orientation, and the importance of doing the right thing.”
Is reading someone’s emails without their permission similar to opening someone’s physical mail?
Legal uses: Identity theft, cookie poisoning, spyware, malware, cyberstalking/online harassment (in some states)
Legal uses COPPA: Children’s Online Privacy Protection Act imposes certain requirements on operators of websites or online services directed to children under 13 years of age, and on operators of other websites or online services that have actual knowledge that they are collecting personal information online from a child under 13 years of ago (Federal Trade Commission)
China and the internet: In China, the government has 11 different agencies to oversee all internet use in the country.
-
Socially Responsible
-
Community Involvement
Encourage parent leadership within parent communities
-Gather an advisory group, invite an expert, use resources
Communicate regularly to parents about how you are using technology in the classroom
-Age, grade level, ensuring safety and savvy-ness
Be clear with parents about how appropriate technology use is enforced
-Parents review with their children and sign Code of Conduct at the beginning of each year
-
-
Responsibilities
Teaching students to take care of equipment
-How to avoid viruses, Clean and care for technologies.
Explore appropriate and safe sites for learning and research.
-Providing pre-approved sites for research, help them differentiate
from true and false information
Restate copyright, and plagiarism rules
-Teach them about types of citations
Help them prevent Cyberbullying
-How to avoid being a cyber bullying, and how to avoid being bullied.
Self Image
-Think about what you are posting, is it something you want your parents, bosses or friends to see.
Think
-Why are you using technology, are you making wise choices
Equitable Access
What it looks like: ensure individuals know how to use technology, outline where to go for help getting access, be flexible to accommodate diverse learners and exceptional needs
Creating Awareness: Open access, free software applications, access to learning modules through YouTube, TedEd and other educational websites
Advocating: Incorporate technology in the classroom, remember it is a tool not a lesson, encourage discussion, be prepared to take action and give our students the access they need
Recommendations to achieve equitable access: ensure individuals (students and teachers) know how to use technology,outline where to go for help getting access,be flexible to accommodate diverse learners and instructional needs,provide more support to teachers so they can use technology more effectively
Equitable access in the community: improving access to technology
BYOD (Bring Your Own Device):Families own/lease device through community,Students have device in school and at home
Universal design for learning,
Open Education Resources (OER)
Inequitable Access: Uneven distribution of technology and professional development in school districts