Dazed, Amazed and Googled Presented by Mrs. Cline Teacher Librarian Murrieta Valley High School.

Post on 19-Dec-2015

212 views 1 download

Transcript of Dazed, Amazed and Googled Presented by Mrs. Cline Teacher Librarian Murrieta Valley High School.

Information Literacy

Dazed, Amazed and Googled

Presented by Mrs. ClineTeacher Librarian

Murrieta Valley High School

TODAY’S TASKS

Watch, Listen, DiscussTake NotesActively Engage in Your Learning

Part One: ICT

What Does It Mean?

Information CommunicationTechnology

Access (print, digital, audio, real world) Evaluate (accurate, applicable, useful)Organize (combine, synthesize, create)Communicate (digital, visual, audio)

to learn, problem-solve, make decisions

Literacy

WHAT IS INFORMATION LITERACY?

Ability to identify what information is needed

Understand how the information is organized

Identify the best sources of information for a given need

WHAT IS INFORMATION LITERACY?

Locate those sources

Evaluate the sources critically

Share that information.

It is the knowledge of commonly used research

techniques.

HOW ARE INFORMATION LITERACY SKILLS USED?

Academic purposes Research papers Group presentations

Employment Ability to find and evaluate Use and share information

Consumer decisions Which smart phone or car

Citizenship Understanding issues and voting.

WHY IS INFORMATION LITERACY IMPORTANT?

The amount of information available is going to keep increasing.

The types of technology used to access, manipulate, and create information will continue to expand.

WHY IS INFORMATION LITERACY IMPORTANT?

Not all information is created equal

Some is Authoritative Current Reliable

Some is Biased Out of date Misleading False

Informed Consumers of Information

Part Two: Access

What are the Rules??

Murrieta Valley Unified School District

Acceptable Use Policy

What Does It Mean?

“The System”

The District system includes: A network of computers that serves all

the schools Saved files on a server for student work District email to staff Internet access

Requirements

All students MUST have a signed Acceptable Use Policy on file in order to use the system

Signed by students and parents =

“I” sticker on your Student ID

Show Student ID!

Personal Safety

Students will not post personal contact information about themselves or other people.

Includes: address telephone number school address

Will NOT Agree to meet anyone they have met on-line

Personal Safety

Students should tell their teachers immediately if they receive any message that is inappropriate or makes them feel uncomfortable.

Illegal Activities

Students will not attempt to gain unauthorized access to the system or any other computer system through the system or go beyond the authorized access

This includes: accessing another person’s files spreading computer viruses

Illegal Activities

Students will NOT make attempts to disrupt the computer system or destroy data by spreading computer viruses or by any other means. These actions are illegal.

Students will not use the system to engage in any illegal acts, such as: arranging for sale of drugs or alcohol engaging in criminal gang activity threatening the safety of another person

Will not use the system for commercial activity

Will not use the system for political lobbying

Inappropriate Language

Restrictions against inappropriate language apply to all public and private messages and material posted on Web pages

Students will NOT use: obscene, profane, lewd, vulgar, rude,

inflammatory, threatening, or disrespectful language

Inappropriate Language

Students will not engage in personal attacks, including prejudicial or discriminatory attacks

Students will not knowingly or recklessly post false information about a person

Students will not harass another person

Respect for Privacy

Students will not post a message that was sent privately to them without permission of the person who sent the message

Students will not post private information about another person

Respect Resource Limits

Students will use the system only for educational and career development activities

Teacher approval is required to download all files

Students will not post chain letters or engage in “spamming”

Plagiarism and Copyright Infringement

Students will not plagiarize works that they find on the Internet

Students will respect the rights of copyright owners

If students have questions they should ask their teachers

Inappropriate Access to Material Students will not use the District’s system

to access material that is profane or obscene, that advocates illegal acts, or that advocates violence or discrimination towards other people

If students mistakenly access inappropriate information, they should immediately tell their teacher – this protects them against a claim of intentionally violating this policy.

Student’s Rights Using the District System

Student’s rights to free speech, as set forth in the school’s disciplinary code, applies also to their communication on the Internet

The system is considered a limited forum, similar to the school newspaper

District may restrict student speech for valid educational reasons

Student’s Rights Using the District System

Students should only expect limited privacy in the contents of their personal work on the District system

Parents have the right at any time to request to see the content of student work

Due Process

The District will cooperate fully with local, state or federal officials in any investigation related to any illegal activities conducted through the District system

In addition to restrictions or elimination of use, other disciplinary actions may take place

Limitation of Liability

The District makes no guarantee that the functions or the services provided by or through the District system will be error-free or without defect.

District is not responsible for any damage suffered, including loss of data or interruption of service

Glossary

Harassment – Persistently acting in a manner that distresses or annoys another person. If you are told by a person to stop sending messages, then you must STOP

Spamming – sending an annoying or unnecessary message to a large number of people.

Glossary

Copyright – the exclusive, legal right to reproduce, publish, and sell material – such as literary, musical, or artistic work. This includes images and the written word.

Plagiarism – To steal or pass off the words or ideas of another person as your own.

Part Three: Availability of Information Sources

What should I use??????

SEARCHING:How Do You Choose?

1st Response

Address

Link works quickly

What You Need and How to Get It

Online Catalog:To see what is available from the library

Online Databases: To access remotely as much information as possible---”virtual library”

Full Text of magazines, newspapers, reference books & more

Online Database vs. Google

Subscription Fee Free

Current and up-to-date. Timely research.

General. Quick and easy for small tasks

Print documents accessed electronically

Websites could exist only in cyberspace

Editorially selected quality articles that are reviewed and updated regularly and meet K-12 curriculum and state standards.

Less than 10% of Google is K-12 curriculum-relevant and is focused mostly on consumer related information

Responsible person(s) clearly identified

Links to info can be outdated and/or from sources unknown or open to questionAuthor may be difficult to ascertain

No ads. The focus is work Ads and links are sought for profit

DATABASE S COMPARISON

EBSCO E-BOOKS (Infotrac)

Popular and Scholarly Country ReportsMaps, Flags, Statistics

Reference BooksElectronic BooksCurriculum Standards

E-Mail, Print, Download E-Mail, Print, Download

Graphics Graphics

MLA Citation Suggested MLA Citation Completed

Online Encyclopedia

Welcome to Wikipedia, the free encyclopedia that anyone can edit. 1,413,387 articles in English Who is responsible for the articles on Wikipedia?

You are! Actually, you can even edit this very FAQ! As there are more than 2.34 million (2,340,000) other Wikipedians, this is a collaborative effort. Thousands of people have contributed information to different parts of this project, and anyone can do so, including you. All you need is to know how to edit a page, and have some encyclopedic knowledge you want to share. The encyclopedia provides users with a certain amount of freedom.

EVALUATING WEB SITES.COM = commercial site - advertising - something to sell .NET = network

.EDU = college, university, etc. check author – professor or student?

.GOV = government sponsored site - reliable

.ORG = organizations – may show some bias

Evaluating Web Sites

Anyone can publish on the Web

It is “unfiltered” Internet sources are

much more fluid- the information they provide can change in an instant

Content not evaluated before posting

Click on each for examples

Focus on: Authority Coverage Currency Accuracy Objectivity

EVALUATING WEB SITESWeb

Directories save valuable time because SMART people, not search programs, listed the websites

MVHS Online Catalog has

WEBPATH EXPRESS Click on button

for access

Questions

Part Four:Cyber Safety

Tips for Remaining Safe Online

The 5 Characteristics of Social Networks

Hi Sam!!!

What’s up

Lisa?

User Based

• Users submit and organize information

• Direction of content can be determined by any user – no one person dictates the current topic

• Freeform/unstructured

Interactive

• Not just a collection of chat rooms and forums

• Users can play games, take fun quizzes, share photos and ideas with friends

• A way to connect and have fun with friends

Community Driven Members hold common

beliefs or interests Can make new friends with

people who say they share your interests or beliefs USE CAUTION

Can reconnect with old friends

Relationships Social networks are driven

by the number of relationships between its members

With no control on your settings, information will be dispersed to your friends, their friends, and so on…

Emotional Content In the past, web

content was primarily information

Social networks allow people to communicate needs within a community of friends and receive immediate responses

References

The 5 core characteristics of social networks were described in a 2007 research study by researchers at Rice University, the University of Maryland, and Max Planck Institute for Software Systems .

The characteristics are outlined at

http://socialnetworking.lovetoknow.com/Characteristics_of_Social_Networks

Controlling Your Social Networking Privacy Settings

Stay safe online!

Facebook Privacy Settings

Click on “Settings”Then on “Privacy Settings”

Use theseoptions to controlthe informationpeople see aboutyou!

“Only friends”is the BESToption to limitwho sees

your info.

Check to see what your friends can see about you. If you don’t like what they are able to see, change it!

Do you want your cousin to knowthat you watch Judge Judy? If not,you can restrict that information!

You can choosewhat can be seen about you through the sitesapplications!

Choose your gamesand applicationswisely!

This is the mostsecure setting forapplications (uncheck all)

In General…

Check the PRIVACY Settings

For any and all social network sites & electronic devices----it’s your responsibility!

• Anyone can use whatever picture they want on the Internet, so beware! A nice picture can hide a not-so-nice person!

• It’s best not to use your full name on any social networking site – especially until you’re 18.

• If you are too young to use a social network, don’t lie, but your true age (teen-aged) may invite cyber-predators, so be careful. Hide your age if you can!

If you feel harassed or bullied on a social network:

• Ask the operators of the network for help

•Let them know you are a minor

• Or confide in a trusted adult

When on a social network:

• Only post things you wouldn’t mind an adult seeing

• Make sure you have a trusted adult as a “friend” or as a “follower.”

•This will remind you to be on your best online behavior!

Look to the Future

• Future employers may see what you have posted

•Colleges and scholarship organizations will look at what you’ve posted---OOPS!

Set Up Your Privacy Settings

It may be the best 10 minutes you spend on the Internet!

This slide presentation will be posted on the library webpage for reviewing if you need help remembering how to set your privacy settings

Look on the Cyber Bullying and Internet Safety Page on the Library website

Works Cited

Chait, Jennifer. “Cyberbullying Statistics.” lovetoknow. Web. 9 Sept. 2009

<http://safety.lovetoknow.com>.

Lopez, Maribel D. “Online Teens Are Not Immune To Phishing.” FORRESTER. Web. 13 Sept.

2009 <http://www.forrester.com>.

Make A Difference For Kids, Inc. “Cyberbullying.” Make A Difference For Kids. Web. 9 Sept.

2009 <http://www.makeadifferenceforkids.org>.

National Crime Prevention Council. “Teens and Cyberbullying.” NCPC. Web. 9 Sept. 2009

<http://www.ncpc.org>.

“Phishing Scams – 12 Ways to Stop Them.” Tweakspeed. Web. 16 Sept. 2009

<http://www.tweakspeed.com>.

Cybersafety

What is Cyberbullying

Cyberbullying involves the use of electronic devices

supports deliberate, repeated, and hostile behavior by an individual or group

its intent is to harm others.

What is Cyberbullying

According to a survey done in 2007 by the National Crime and Protection Council:• 43% of teens report that they have experienced

some form of cyberbullying that year.

• The incidence of cyberbullying is higher among females than males. More than 50% of females age 15 to 16 years of age reported at least one cyberbullying incident.

Why do teens cyberbully?

81% Because they think it is funny

64% Because they don’t like the person

45% Because they view the victim as a loser

47% Because they feel there are no consequences for cyberbullying

45% Because they don’t think they will get caught

58% of students surveyed don’t think

cyberbullying is a big deal

Do you think it was a big deal to these students and their loved ones?

Rachael was stalked online by anonymous bully. She died by suicide on October 9, 2006.

Ryan, a 13-year old, who died by suicide as a result of bullying at school and online.

A cruel online hoax by a neighbor led to the suicide death of Megan.

Stop Cyber bullying

What is a cyber-predator?

A cyber-predator uses the internet to hunt for victims to take advantage of them in some way:• emotionally• sexually• psychologically• financially

A cyber-predator knows how to manipulate people by creating trust and friendships where none should exist.

What is a cyber-predator?

77% of the target for online predators are teens aged 14 and older.

33% of teens received an aggressive sexual solicitation online in the past year.

75% of children are willing to share personal information online about themselves and their family in exchange for goods and services.

STOP the Bad Guys!

1. Be suspicious of any email with urgent requests for personal financial information. DO NOT RESPOND TO IT!

• Phisher emails are typically NOT personalized

• Valid messages from your bank or e-commerce company generally are

STOP the Bad Guys!

2. If you suspect an email message might not be authentic . . .Don't use the embedded links to get to another web page.

• Call the company on the telephone, or log onto the website directly by typing the URL into the address bar

• Don’t cut and paste the link from the message into your Internet browser – the phisers can redirect you to a different site

How to stop the bad guys

•3. Avoid filling out forms in email messages that ask for personal financial information.

• Phishers make very good fake forms.

• Only communicate personal financial information via a secure website or the telephone.

4. Don’t email personal or financial information.

• Email is not a secure method of transmitting personal information

• No one indicator is foolproof

• Some phishers have forged security icons like the lock icon on an order form

5. Always ensure that you're using a secure website when submitting credit card or other sensitive information via your Web browser.

• Web address should begin with "https://" rather than just "http://".

Cyberbullying Video

Click on Picture for video

Consequences

Click on picture for video

Social Networking Video

Click on picture for video

Be Smart!Stay Safe Online!!

Get more information @ your library!

MVHS Library Web Page

Virtual Library With Unlimited Access 24 hours a day, 7 days a

weekwith Internet access!

Click on logo below for access