e-learning project: student digital citizenship€¦ · “warrior digital citizenship tool box”...
TRANSCRIPT
E-Learning Project: Student Digital Citizenship
Tammy Randall
Purdue University EDCI 569
March 1, 2015
Digital Citizenship Module
Notes for developer:
SmartBuilder: choice for elearning module
http://www.smartbuilder.com/smartbuilder-2/e-learning-software-
tools/Digital+Citizenship/loz000b4o000000000003g/share.html
Master Page: Have the two graphics on the next slide, the “Citizenship chalkboard” and the
“Warrior Digital Citizenship Tool Box” on each page.
Template in SmartBuilder for Master Page: Blue frame hi-tech
Titles in Arial font size 32
Text in Arial font size 20
Audio: Use when provided (slides 3 – 7)
SurveyMonkey: choice for Digital Citizenship Module Evaluation
Included in your Digital Citizenship Tool Box
School Acceptable Use Policy (AUP)
Tips for protecting and sharing personal information
Protection for your online reputation – now & later
Examples of safe internet social media practices
Tools for understanding Plagiarism and Copyright
Citizenship
Next Prev
Digital Citizenship Tool Box
What is Digital Citizenship all about?
Internet Safety
Information Sharing Responsible Use According to Mike Ribble (2015), "Digital citizenship can be
defined as the norms of appropriate, responsible behavior
with regard to technology use."
Next Prev
What You’ll Learn
After completing this module, you will be able to:
Describe safety precautions for protecting user privacy
Apply the school acceptable use policy
Distinguish between acceptable and non-acceptable reuse of material from the internet
Describe the current and future impacts of social media actions
Provide examples of risky and safe Internet behavior
Relate sharing of inappropriate information to level of risk and opportunities
Next Prev
Note to developer: Insert the 2 videos after this page. See References below.
Future Impact
What you are doing now could have an impact on you in the future. Think about the "seeds" that you are sowing as you traverse the internet. Could they grow into a bigger problem? Or, is your plant going to be a strong, positive representation of who you are? Is it healthy or good information/action or is it a weed? Next Prev
Personal Image
Imagine having the mirror attached to your computer/device. If you looked in it and saw someone in the reflection, would you approve of what you are doing or saying online? Next Prev
Journal… Blog… Post…
Imagine all of the things you write in your journal were online. Avoid posting too much information online, the internet is not your protected journal.
Would you be comfortable if anyone could read that journal?
What do you keep private?
Who do you share information with?
Next Prev
Lasting Effects
Imagine crumpling up a piece of paper, throwing it around and stomping on it. Then imagine apologizing to the paper for destroying it. The piece of paper represents someone’s heart that has been cyberbullied. We can apologize all we want, but the emotional scars that remain inside DON'T go away completely.
Next Prev
Your Public Image
First impressions start with Google. People are using Google to
find out information about us. What will show up when
someone searches you on Google? Be cautious and read the
fine print and the terms and conditions.
` PAST FUTURE
PRESENT
Internet Search
Next Prev
Think Before You Share or Post
Students often post, tweet, and retweet information – make
sure that it is NOT inappropriate. By retweeting or reposting
inappropriate material, you’re telling others that you agree
with it and can be held accountable.
Keep It Clean!
Next Prev
Use Caution
Lasting Impressions
Think that everything you do online is creating a digital tattoo rather
than a digital footprint. Tattoos are a lot harder to get rid of. Getting
rid of things on the Internet is a long, painful, expensive process – and
is most often impossible.
Think
before
you
ink!
Next Prev
Content Control Filter
As digital citizens, you have to be good at "straining" out the
bad stuff, what’s real, what's not, and finding material that is
applicable to your search/use of the internet.
Good safe site/reliable information Unsafe/unreliable
information
Only good
Next Prev
Safety Tips to Follow Review your account settings – especially for social media sites
Use Privacy Settings – Ask yourself: What are my privacy settings and who can see my online activity?
Make sure you know who you are allowing to be your “friends, contacts, and followers” online – Don’t just accept everyone as a “friend.”
Make informed choices when an App or person asks you to “share your location.”
If in doubt, don’t share! Ask a trusted and knowledgeable adult for advice.
Also, talk to your friends about what is ok with them to post before sharing.
Next Prev
Personal Integrity
Historian Thomas Babington Macaulay (1800-1859) said, "The
measure of a man's real character is what he would do if he knows
he would never be found out.“
Even if no one is watching, integrity of your beliefs and opinions is
an important trait to have. It is a sign of maturity and conviction.
Next Prev
Evaluating Internet Sources
More information about internet safety can be found at: National Center for Missing & Exploited Children. (2010) NetSmartz.org. Cybersecurity Made Clear. Retrieved from http://cdn.netsmartz.org/tipsheets/cybersecurity_tips.pdf
Reference National Center for
Missing & Exploited Children.
(2013) NetSmartz.org.
Evaluating Internet Sources.
Retrieved from
http://cdn.netsmartz.org/tipsheet
s/EvaluatingInternetSources.pdf
Set Strong Passwords
Set up pass-code locks on
all digital devices Next Prev
Protect Yourself and Your Information
NEVER share your passwords. The only people who should
have access to your “house key” or passwords are your
parents or trusted adults.
Next Prev
Hard to Take It Back…
Imagine the information that you are putting online is like the
toothpaste coming out of the tube. Once it is out, it is almost
impossible to get it all back in the tube!
Next Prev
Permanent Damage
Everything that you put online is permanent....even if
you hit the delete button after posting. You lose control
of what you post after putting it online.
Next Prev
Take Time to Unplug …Disconnect
We are almost constantly connected. Everything/everyone in the world can be connected. We don't have to be connected all the time.
Next Prev
Examples of Risky Behaviors
Sending mean or rude messages
Sharing inappropriate photos
Talking about adult subjects
Visiting adult sites
Next Prev
You should report anyone who…
sends you adult images
asks you to meet offline, if you don’t know them
talks to you about adult inappropriate subjects
If in doubt, always talk to a trusted adult.
Next Prev
Sharing TMI (Too Much Information)
Warning: Use Caution
Online information:
Spreads quickly and to a large number of people
Can fall into the hands of people you don’t know or trust
Can often be permanently available
Can be very difficult to remove once it is out
Next Prev
What is Personal Information?
Any information that can identify you or help someone find you or impersonate you online:
Addresses / phone numbers
Full name / Family / Friends
Financial information
School information / schedules
Location
Login or passwords
Next Prev
Internet - Safe Practices
Have a different password for each account
Understand and use privacy settings
Only accept “friend” requests from people you know
Limit access to your location
Look for the lock icon or green https symbol when surfing to ensure secure sites
Don’t share anyone’s personal information without their permission
Never share passwords
Next Prev
Inappropriate Content
Inappropriate content may include pictures, video, audio, or text about inappropriate topics:
Drinking or drug use
Hate speech or dialogue
Lewd or offensive gestures
Profanity
Revealing or suggestive images
Threats
Next Prev
Before Posting or Sharing…
Always ask yourself:
Who might I hurt?
Do I like what this says about me?
Could this get me into trouble?
Would the adults in my life thinks this is appropriate?
How could this impact my future or that of others?
Next Prev
Remember
Never post anything unless you would be comfortable sharing it with your grandmother, your children, and every college and future employer you will encounter.
Next Prev
Check Your Understanding Click all that apply.
Choose appropriate safety precautions for protecting your privacy while using the internet and social media.
Set your privacy setting for public at all times
Include your full name, address and social security number whenever asked
Always look for Settings and Options when managing your Profile or Photos online
“Accept” anyone who asks to be your “Friend”
Seek the advice of a trusted adult when in doubt
Next Prev
Check Your Understanding (Note: Interactive response back if wrong boxes checked: Not quite. Here’s the right answers. Correct – Very good – you got all of them!)
Choose appropriate safety precautions for protecting your privacy while using the internet and social media.
Set your privacy setting for public at all times
Caution – “Public” allows everyone to see everything (add red X)
Include your full name, address and social security number whenever asked Danger – Giving out your personal information is a security risk (add red X)
Always look for Settings and Options when managing your Profile or Photos online Correct – Settings and Options can help protect your privacy
“Accept” anyone who asks to be your “Friend” Danger – Giving out your personal information is a security risk (add red X)
Seek the advice of a trusted adult when in doubt Correct – It is always good to seek the advice of a trusted adult.
Next Prev
Check Your Understanding
You are an outgoing high school student and enjoy posting to Facebook and tweeting on Twitter regularly. You set your privacy setting to “Public” to add to your list of “Friends” more quickly. If anyone looked you up on one of these social media sites they could see photos of you and your friends, along with personal history and locations you frequent often. You feel safe and secure.
After learning more about internet safety, what are some actions this outgoing high school student should consider? Click all that apply:
Set your privacy setting to “Private”
Screen “Friends” more carefully; don’t automatically accept every friend request
Careful use of appropriate pictures and personal information
Next Prev
Click all that apply.
Check Your Understanding You are an outgoing high school student and enjoy posting to Facebook and tweeting on Twitter regularly. You set your privacy setting to “Public” to add to your list of “Friends” more quickly. If anyone looked you up on one of these social media sites they could see photos of you and your friends, along with personal history and locations you frequent often. You feel safe and secure.
After learning more about internet safety, what are some actions this outgoing high school student should consider? Click all that apply
Set your privacy setting to “Private” Always consider keeping your settings to the most private setting possible.
Screen “Friends” more carefully; don’t automatically accept every friend request People can hide behind online personas – know who your “friends” are in the real world.
Careful use of appropriate pictures and personal information
Always protect your photos and personal information so that it is only used in ways that you approve.
Next Prev
Check Your Understanding Based on the scenario where the outgoing high school student used Facebook and Twitter and shared “Publicly” and accepted most Friend requests, click all that apply:
These type of activities can have an impact on…
future job opportunities
future college or university choices
current and future relationships
the future of friends whose pictures were shared publicly
Next Prev
Check Your Understanding
Based on the scenario where the outgoing high school student used Facebook and Twitter and shared “Publicly” and accepted most Friend requests, click all that apply :
These type of activities can have an impact on…
future job opportunities
future college or university choices
current and future relationships
the future of friends whose pictures were shared publicly
Next Prev
Check Your Understanding Hi! I noticed your Facebook page and thought we have a lot in common. I really enjoy watching science fiction too. How would you like to meet at the X Theater and see the current ABC movie that starts Saturday? I would even spring for a Coke and popcorn. See you Saturday. I will be the guy wearing the Dr. Who scarf.
How would you respond to the following email? Should you meet up with this person?
Yes, meet up and get free popcorn and a coke. It will be ok because it is a public place.
Yes, but take along another friend just in case. It’s safe because it is a public place.
No, don’t even reply back and do not go to the theater. Report this to a trusted adult, and think about changing your privacy settings.
Next Prev
Check Your Understanding Hi! I noticed your Facebook page and thought we have a lot in common. I really enjoy watching science fiction too. How would you like to meet at the X Theater and see the current ABC movie that starts Saturday? I would even spring for a Coke and popcorn. See you Saturday. I will be the guy wearing the Dr. Who scarf.
How would you respond to the following email? Should you meet up with this person?
Yes, meet up and get free popcorn and a coke. It will be ok because it is a public place.
Yes, but take along another friend just in case. It’s safe because it is a public place.
No, don’t even reply back and do not go to the theater. Report this to a trusted adult, and think about changing your privacy settings.
Next Prev
Check Your Understanding
1. Misuse of Passwords
2. Unauthorized Equipment
3. Avoiding School Filters
4. Unauthorized Access to
Blogs/Social Networking
Sharing passwords with your best friend
Accessing an unapproved website through a “backdoor”
Downloading and purchasing apps for your school-provided iPad
Updating your Facebook status with school equipment
Choose the correct example portrayed for applying school acceptable use policy.
Next Prev
Check Your Understanding
1. Misuse of Passwords
2. Unauthorized Equipment
3. Avoiding School Filters
4. Unauthorized Access to Blogs/Social Networking
Sharing passwords with your best friend
Accessing an unapproved website through a “backdoor”
Downloading and purchasing apps for your school-provided iPad
Updating your Facebook status with school equipment
Place the following examples under the correct heading.
Answer Sheet
1
2
3
4
Next Prev
Check Your Understanding
Watch your comments – don’t post anything inappropriate, threatening or illegal.
Report suspicious behavior to a
trusted adult
Share your passwords with friends and keep them all alike
Avoid posting or sharing TMI (too much information) - anything too personal or embarrassing
Setting up a face-to-face meeting with an online “Friend” you have never met and told no one about. Sharing your location with every
App
Place the described behavior in the correct column. Currently they are mixed up and need to be rearranged.
Risky Behavior Safe Behavior
Next Prev
Check Your Understanding
Setting up a face-to-face meeting with an online “Friend” you have never met and told no one about.
Sharing your location with
every App
Share your passwords with friends and keep them all alike
Avoid posting or sharing TMI (too much information) - anything too personal or embarrassing
Watch your comments – don’t post anything inappropriate, threatening or illegal.
Report suspicious behavior to a trusted adult
Place the described behavior in the correct column
Risky Behavior Safe Behavior
Answer Sheet
Next Prev
Plagiarism
Plagiarism is the use of someone else’s creation without adequately giving them credit.
Giving credit to the creator:
Is sometimes required under copyright law
Is required as a matter of academic integrity
Is a sign of respect to the creator of the work
Next Prev
Copyright Copyright law protects a creator’s ownership of and control over their work. This includes text, images, audio and video.
If a work is copyrighted, you must get the creator’s permission before using that work.
Video on Copyright and Fair Use:
(watch video by clicking image)
https://d1pmarobgdhgjx.cloudfront.net/education/ED_copyright-fair-use-whose-is-it.mp4
c
Example of copyright symbol Next Prev
Copyright
Before using anyone’s work, always:
Check who owns it
Get permission to use it
Give credit to the creator
Buy it (if necessary)
Use it responsibly
Next Prev
Fair Use
Fair use allows you to use only a small part of someone else’s creative work as part of something new. The work can only be used for non-commercial purposes (that is, unrelated to a business), and in certain ways, which include:
schoolwork and education
news reporting
criticism or social commentary
comedy or parody
Next Prev
Check Your Understanding
Choose the acceptable reuses of internet material. Click all that apply:
a small part of an author’s work for schoolwork and education with proper citation
an uncited partial work by a famous writer
a partial work used for a criticism or social commentary, news, reporting, comedy or parody with proper citation
an author’s complete work
Next Prev
Check Your Understanding Interactive response back if wrong box checked
Choose the acceptable reuses of internet material. Click all that apply:
a small part of an author’s work for schoolwork and education with proper citation
an uncited partial work by a famous writer
a partial work used for a criticism or social commentary, news, reporting, comedy or parody with proper citation
an author’s complete work
Next Prev
Audio for AUP
Notes for the web developer or instructional designer:
The Acceptable Use Policy (starting next slide) will have an audio that follows the slides and text.
The following section, “Acceptable Use Policy Quiz” will be read by the students and they will make a choice that they feel correctly answers each of the 10 questions. They will not be allowed to go to previous screens once they get to this section. This will be graded based on 10 points for each correct answer for a possible 100 points or 100%. The passing score is 80% or greater, so at least 8 out of 10 questions must be answered correctly. Results will automatically be reported to the Learning Management System (LMS).
After completing the AUP Quiz, an Evaluation of this module will be available to collect feedback from the student population. After choosing values between 1 through 5 that best describe their feelings, the module automatically proceeds and reports the responses to the LMS.
Acceptable Use Policy For Electronic Resources
All students and staff are responsible for their actions and activities involving the school district’s computers, electronic devices, network and Internet services, and for their computer files, passwords, and accounts.
These rules provide general guidance concerning the use of school computers and other electronic devices and provide examples of prohibited uses. The rules and guidelines detail acceptable use of electronic information resources under which students, staff and all members of the school corporation, community, herein referred to as “users,” will be held accountable. The rules do not attempt to describe every possible prohibited activity. Students, parents, and school staff who have questions about whether a particular activity is prohibited are encouraged to contact a building administrator. These rules apply to all school computers, all school-provided electronic devices wherever used, all uses of school servers, and Internet access and networks regardless of how they are accessed.
Next Prev
Acceptable Use
1. School computers, network and internet services, and electronic resources are provided for educational purposes and research consistent with the school’s educational mission, curriculum, and instructional goals.
2. Users must comply with all school board policies, the student handbook, and school rules and expectations concerning conduct and communication when using school computers or school-issued electronic resources, whether on or off school property.
3. Students also must comply with all specific instructions from school staff.
Next Prev
Prohibited Uses
Unacceptable uses of school electronic resources include, but are not limited to, the following:
1. Accessing or Communicating Inappropriate Materials
Users may not access, submit, post, publish, forward, download, scan, or display defamatory, abusive, obscene, vulgar, sexually explicit, sexually suggestive, threatening, discriminatory, harassing, bullying, and/or illegal materials or messages.
2. Illegal Activities Users may not use the school district’s computers, electronic devices, networks, or Internet services for any illegal activity or in violation of any board policy/procedure or school rules. The corporation and its employees and agents assume no responsibility for illegal activities of students while using school computers or school-issued electronic resources.
Next Prev
Prohibited Uses Continued
3. Violating Copyrights or Software Licenses Downloading, copying, duplicating, and distributing software, music, sound files, movies, images, or other copyrighted materials without the specific written permission of the copyright owner is prohibited, except when the use falls within the Fair Use Doctrine of the United States Copyright Law (Title 17, USC) and content is cited appropriately.
4. Plagiarism Users may not represent as their own work any materials obtained on the Internet (i.e. term papers, articles, music, etc). When using other sources, credit must be given to the copyright holder.
Next Prev
Prohibited Uses Continued
5. Use for Non-School Related Purposes School district’s computers, electronic devices, and network and Internet services are provided for purposes related to educational programs, school operations, and performance of job responsibilities. Incidental personal use of school devices is permitted as long as such use:
a. does not interfere with the user’s responsibilities and performance
b. does not interfere with system operations or other system users
c. does not violate this policy and the accompanying rules or any other board policy, procedure, or school rules
6. Misuse of Passwords/Unauthorized Access Users may not share passwords, use other users’ passwords, access or use other users’ accounts, or attempt to circumvent network security systems.
Next Prev
Prohibited Uses Continued 7. Malicious Use/Vandalism
Users may not engage in any malicious use, disruption, or harm to the school district’s computers, electronic devices, or network and Internet services, including but not limited to hacking activities and the creation/uploading of computer viruses.
8. Avoiding School Filters Users may not attempt to or use any software, utilities, or other means to access Internet sites or content blocked by the school filters.
Next Prev
Prohibited Uses Continued
9. Unauthorized Access to Blogs/Social Networking Sites, Etc. Users may not access blogs, social networking sites, etc. prohibited by building administration or the Corporation’s Technology Department. Teachers and students using authorized social networking sites for educational projects or activities shall follow the age requirements and legal requirements that govern the use of social networking sites in addition to the guidelines established in this policy.
10. Wasting System Resources Users shall not use the network in such a way that would waste system resources or disrupt the use of the network by others. This includes but is not limited to excessive printing, file storage, online games, and video/audio streaming not directly related to educational projects as determined by the supervising instructor or building administrator.
Next Prev
Prohibited Uses Continued
11. Unauthorized Equipment Users may not attach unauthorized equipment, including personal laptops, tablets, and handheld devices, to the district network without permission from the corporation’s Technology Department.
Next Prev
Student Security • Users may not reveal personal information, including a home address and phone number, about themselves or another individual on any unsecured electronic medium, such as websites, blogs, podcasts, videos, wikis, or social networking sites.
• If users encounter dangerous or inappropriate information or messages, they shall notify the school administration immediately.
• Staff may post student pictures on district/ school/classroom “public” websites as long as the student’s name or other identifying information is not included. Students’ grades, test results, or identifying pictures may be stored only on district-approved secure sites that require a username and password for authorized individuals to access
• All corporation schools are closed campuses.
Next Prev
Student Security Continued
• The school corporation retains all rights concerning any recording and/or publishing of any student’s or staff member’s work(s) or image(s). Students must obtain permission from a staff member to publish a photograph or video of any school-related activity. It is best practice and common courtesy to ask permission before recording an individual or groups. The use of cameras on any type of electronic device is strictly prohibited in locker rooms and restrooms.
• Corporation Staff must maintain the confidentiality of student data in accordance with the Family Education Rights and Privacy Act (FERPA).
• Students may be issued a school email address to improve student communication and collaboration on school projects. Email shall be used only for educational purposes that directly relates to a school project or assignment.
Next Prev
TECHNOLOGY PRIVACY
All computers, telephone systems, voicemail systems, electronic mail, and electronic communication systems are the district’s property. The district retains the right to access and review all electronic and voice mail, computer files, databases, and any other electronic transmissions contained in or used in conjunction with district’s computer system, telephone system, electronic mail system, and voice mail system.
Students and staff should have no expectation that any information contained on such systems is confidential or private.
Caution
Next Prev
SYSTEM SECURITY Any user who identifies a security problem must notify his/her teacher or building administrator immediately.
The user shall not demonstrate the problem to others or access unauthorized material. Staff shall immediately report any potential security breaches to the corporation’s Technology Department. Staff shall change their passwords to all systems at least once every 90 days.
Internet Safety is a Priority
Report Problems Immediately
Next Prev
PERSONAL DEVICES
All users are prohibited from using privately-owned electronic devices in school unless explicitly authorized by the building principal or school district administration.
Additional Rules for Laptops, iPads, or other Electronic Devices Issued to Students or Staff:
1. Electronic devices loaned or leased to students or staff shall be used only for educational purposes that directly relate to a school project or assignment, unless otherwise explicitly authorized by building administration.
2. Users are responsible for the proper care of electronic devices at all times, whether on or off school property, including costs associated with repairing or replacing the device
Next Prev
Personal Devices Continued
3. Users must report a lost or stolen device to the building administration immediately. If a device is stolen, a report also should be made immediately with the school safety officer and/or local police.
4. The policy and rules apply to the use of the electronic device at any time or place, on or off school property. Students are responsible for obeying any additional rules concerning care of devices issued by school staff.
5. Violation of policies or rules governing the use of electronic devices or any careless use of the device may result in a student’s device being confiscated and/or a student only being allowed to use the device under the direct supervision of school staff. The student will also be subject to disciplinary action for any violations of Board policies/procedures or school rules.
Next Prev
Personal Devices Continued
6. Parents are responsible for supervising their child’s use of the device when not in school.
7. The device configuration shall not be altered in any way by users; this includes software, hardware and accessories such as cases. No software applications shall be installed, removed, or altered on the device unless permission is explicitly given by the teacher or building administrator.
8. The device is to be used only by the student or staff member to whom it is issued. The person to whom the device is issued will be responsible for any activity or action performed on the device.
9. The device must be returned in acceptable working order by the last day of each school year, upon withdrawal or exit date from the school district, and whenever requested by school staff.
Next Prev
Terms of Use The school corporation reserves the right to deny, revoke, or suspend specific user privileges and/or take other disciplinary action, including suspensions or expulsion from school, for violations of this policy.
Additionally, all Student Handbook regulations apply to the use of the school network, Internet, and electronic resources.
Student Handbook
Next Prev
Terms of Use (Continued) Disclaimer – The corporation, its employees and agents, make no warranties of any kind, neither expressed nor implied, concerning the network, Internet access, and electronic resources it is providing.
Furthermore, the corporation is not responsible for:
1. The accuracy, nature, quality, or privacy of information stored on local servers or devices or information gathered through Internet access.
2. Any damages suffered by a user (whether the cause is accidental or not) including but not limited to, loss of data, delays or interruptions in service, and the infection of viruses or other malware on personal computers or other devices.
3. Unauthorized financial obligations resulting from the use of school corporation’s electronic resources.
Next Prev
Acceptable Use Policy Quiz
10 Questions over the school policy 80% Correct or greater required to pass
Next
School policy allows students to download any App that the student thinks will be helpful to their educational experience.
True
False
Next
Question #1
Updating your Facebook status during class on school-provided equipment is an approved acceptable use of resources.
True
False
Next
Question #2
What is an acceptable method to access blocked internet sites using school-provided equipment or internet?
Use utilities that bypass the school filters
Use your smartphone to access the blocked site.
There is no acceptable way to access blocked sites without prior request and approval of the school Technology Department.
Next
Question #3
Listening to your favorite streaming audio using the school internet is an acceptable use of resources.
True
False
Next
Question #4
Adding a webcam to school-provided equipment is permitted if needed for a class-related project.
True
False
Next
Question #5
Prohibited malicious use includes which of the following:
Forwarding unwanted emails to many users (spam)
Creation of harmful programs
Hacking
All listed answers
Next
Question #6
Your friend needs access to the computer network for a school-related project, but has forgotten his password. You tell him your password so that he can complete his project. Is this considered an acceptable use?
Yes, if it is for a school project
No, sharing passwords is not acceptable
Next
Question #7
You have a chance to make some extra money by working as a DJ, and you want to use your school-provided iPad as a music source. Is this an acceptable use of equipment.
Yes, it is an example of acceptable incidental use.
No, only occasional personal communication is permitted.
Next
Question #8
You found several pictures at Google images that illustrate your research paper. Since it would take a lot of time to cite each image, you decide to only cite the source of specific quotes. Is this acceptable?
No, this is an example of plagiarism.
Yes, although it is not proper etiquette.
Yes, this is accepted practice.
Next
Question #9
The school finds illegally downloaded material on your school iPad. Can you be held accountable?
No, since the school has no way of knowing who downloaded it.
Yes, you are responsible for all use of your school-provided equipment.
Next
Question #10
You have now completed the required Acceptable Use Policy Quiz
Your score Percentage Note: 80% Correct or greater required to pass
Next
# correct out of 10
%
Answer Sheet for 10 Question Acceptable Use Policy Quiz
Question Answer
1 False
2 False
3 There is no acceptable way to access blocked sites without prior request and approval of the school Technology Department
4 False
5 False
6 All listed answers
7 No
8 No
9 No, this is an example of plagiarism.
10 Yes, you are responsible for all use of your school-provided
equipment
Evaluation of Module
When finished with the survey, please close the survey window and
click the right arrow below on this screen. Thank you for taking our
Digital Citizenship Module Survey.
Next
Click on the image below to begin
Note: Hyperlink to SurveyMonkey, Inc. (2015). DCHS Student
Evaluation of Digital Citizenship Module.
https://www.surveymonkey.com/s/TCCVJW6
I can describe appropriate safety precautions for protecting my privacy.
I understand the Acceptable Use Policy well enough to apply it in my daily life.
I can distinguish between acceptable and unacceptable reuse of material.
I can describe positive and negative impacts of online interactions.
I can distinguish between safe and risky online behavior.
Digital Citizenship Module Evaluation
1 2 3 4 5
1 2 3 4 5
1 2 3 4 5
1 2 3 4 5
1 2 3 4 5
1 = Strongly disagree | 2 = Disagree | 3 = Neither agree/disagree | 4 = Agree | 5 = Strongly Agree
Please click on the response that best summarizes your experience with this module.
After completing this module, I would handle online interactions differently than I would have before this training.
This module adequately covered the important concepts of digital citizenship and safety.
The material presented was well organized, understandable and there were good examples of the content in real situations.
The videos presented were helpful in understanding the material.
I would like to have a follow-up lesson that explored these topics more deeply.
Digital Citizenship Module Evaluation
1 2` 3 4 5
1 2 3 4 5
1 2 3 4 5
1 2 3 4 5
1 2 3 4 5
1 = Strongly disagree | 2 = Disagree | 3 = Neither agree/disagree | 4 = Agree | 5 = Strongly Agree
Survey Monkey Evaluation https://www.surveymonkey.com/s/TCCVJW6
References
Clipart Panda.com (n.d.) Granny rocker clipart. Retrieved from http://images.clipartpanda.com/grandmother-and-granddaughter-clipart-granny-rocker-clipart.jpg.
Common Sense Media. (2015). Copyright and fair use animation. Retrieved from https://www.commonsensemedia.org/videos/copyright-and-fair-use-animation.
Common Sense Media. (2015). Digital Footprint. Video retrieved from https://www.commonsensemedia.org/videos/digital-footprint.
Common Sense Media. (2015). Oversharing: Think before you post. Video retrieved from https://www.commonsensemedia.org/videos/oversharing-think-before-you-post.
Common Sense Media. (2015). Top 10 things to think about before you post. Retrieved from https://www.commonsensemedia.org/sites/default/files/uploads/classroom_curriculum/oversharing-poster-8.5x11-b_8_.pdf.
Crumpled Paper (2012). Crumpled paper. Retrieved from https://acrumpledpaper.files.wordpress.com/2012/04/crumpled-paper1.jpg.
References Danville Community School Corporation (DCSC). (2012). Acceptable use policy for
electronic resources. Retrieved from https://docs.google.com/document/pub?id=1JXQy0fJ0aSqAWgzIJxpiiQ907LvfyiPS9AJm1GtmvEI.
Dynastream Innovations Inc. (2015). Activity icons. Retrieved from http://www.thisisant.com/assets/ANT.GPS.icon.FA.jpg.
Enough.Pro. (2013). 10 HTML and CSS registration and contact forms in web design. Farguson image retrieved from http://www.enough.pro/wp-content/uploads/2013/04/enough-pro-modern-web-form.jpg.
Guardianlv.com. (2013). Retrieved from http://guardianlv.com/wp-content/uploads/2013/07/quizzical-emoticon.jpg.
Hartzer, B. (2013). Measure title tag length in pixels, not characters, for search engine optimization. http://www.standingdog.com/blog/measure-title-tag-length-in-pixels-not-characters-for-search-engine-optimization/#sthash.gAkwouyK.dpuf.
Motor-kid.com (2012). Image: landscape-cartoon. Retrieved from http://www.trendleaks.com/wp-content/uploads/2012/07/bright-outdoor-landscape.jpg.
References National Center for Missing & Exploited Children. (2010). NetSmartz.org.
Cybersecurity made clear. Retrieved from http://cdn.netsmartz.org/tipsheets/cybersecurity_tips.pdf.
National Center for Missing & Exploited Children. (2013). NetSmartz.org. Evaluating Internet Sources. Retrieved from http://cdn.netsmartz.org/tipsheets/EvaluatingInternetSources.pdf.
Ribble, M. (2015). Digital Citizenship: Using technology appropriately. Retrieved from http://www.digitalcitizenship.net/Nine_Elements.html.
Shutterstock.com (n.d.). http://thumb1.shutterstock.com/display_pic_with_logo/280/153359564/stock-photo-ethics-concept-looking-at-ethics-through-a-magnifying-glass-153359564.jpg.
SurveyMonkey, Inc. (n.d.). Image retrieved from http://d.ibtimes.co.uk/en/full/1409005/surveymonkey.jpg.
SurveyMonkey, Inc. (2015). DCHS Student Evaluation of Digital Citizenship Module. https://www.surveymonkey.com/s/TCCVJW6
References
Therecoveringpolitician.com. (2014). Paul Kaplan: Unplugged http://therecoveringpolitician.com/friends/saulk/saul-kaplan-unplugged. Image retrieved from http://therecoveringpolitician.com/wp-content/uploads/2014/03/unplug.jpg.
TutorialChip (2013). Wrinkled paper. Retrieved from http://cdnm.tutorialchip.com/wp-content/uploads/2011/02/Wrinkled-Paper-520x693.jpg.
When was it invented.org. (n.d.) Retrieved from http://www.whenwasitinvented.org/wp-content/uploads/2011/05/World-Wide-Web.jpg.