Saturday, 20 June 2015

5. Digital Rights and Responsibilities

Some of my information are from how IIE wants students to behave
Essential rights and obligations of understudies: 

Fairness

Human respect


Life


Opportunity and security of a man


Protection


Opportunity of expression


Instruction


Dialect and society


Society, connection, conviction.


Digital Rights:

Right to freedom of expression
Right to privacy
Right to credit for personal works
Right to digital access
Right to our identity

Digital Responsibilities:

Responsibility to report bullying, harassing, sexting, or identity theft
Responsibility to cite works used for resources and researching
Responsibility to download music, videos, and other material legally
Responsibility to model and teach student expectations of technology use
Responsibility to keep data/information safe from hackers
Responsibility not to falsify our identity in any way

Penalty guidelines for non-compliance: 
the biggest penalty is that the law will get involved, rather do it right from the beginning and don't go off the rails.

[Online]. Available at: http://www.nisd.net/digitalcitizen/ [Accessed 18 June 2015]. 

9. Digital Commerce


History of e-commerce:

E-commerce is the buying and selling of goods and services, over an electronic network, mainly the Internet. Over the centuries technology has improved thus making it easier to do that hand-to-hand trading.

Importance of being informed

Before purchasing something online it is important to know what you are buying. These purchases are seen as an investment and have different categories which they can be divided into, such as: higher quality investments, safe investments, money saving investments, ethical investments and responsible investments. (The Independent Institute of Education, 2015)


If one does not know what they are buying this could lead to a loss of finances and receiving of inferior quality products.


Plagiarism guidelines

-Ensure you know the correct citation styles.

- Develop suitable research and writing skills.


- Know the difference between paraphrasing and quotations.


- Make sure to reference photos and pictures.


-Being aware of creative commons.


(The Independent Institute of Education, 2015)


Online Auctions and tips

- Know the specific auction rules pertaining to that site.

- Ensure you know the protection procedures.


- Make sure you know who the seller is and some information about them.


-Determine with the goods being bought comes with warranty.


-Know who is responsible for the shipping and delivery of goods purchased



-Know sellers return policy.

8. Digital Security-Digital Health and Wellbeing.



Children

Physical issues:

-High blood pressure

-Repetitive strain injury syndrome


-Eye strain


-Obesity


-Neck/back strain


These problems result from one sitting in front of the computer all day, usually with bad posture.


Psychological issues

-Addiction

-Online disinhibition effect


-Cyber bullying


-Cyber stalking

These types of problems aren’t easily recognised as there is no visual warning and therefore usually get mistreated.


Section for parents


This page is for sharing information about safe internet practices which parents can teach their young and where I suggest some fun and educational games for the young. These games are mainly aimed the healthy development of the children's brains. 



1- Smart Kit


The Smart Kit is a platform that provides  school-safe games and puzzles that kids & adults just love to play!  Importantly, the content in The Smart Kit is appropriate for school use and family fun. That means you will never find violence, harsh language, or adult situations.




 2- Room Recess


 


Room Recess is focused on providing children with free educational games. These games reinforce important skills that are vital to elementary students and their learning process. Room Recess was developed entirely by an elementary school teacher with the goal of reinforcing fundamental learning concepts in math, reading, spelling, language arts, and basic problem solving. Students do not have to sign up or hold an account they can simply load up an activity and have fun learning while they play!





 3- Fun Brain


Fun brain, created for kids ages preschool through grade 8, offers more than 100 fun, interactive games that develop skills in math, reading, and literacy. Plus, kids can read a variety of popular books and comics on the site, including Diary of a Wimpy Kid, Amelia Writes Again, and Brewster Rocket.


4- Duckie Deck

Duckiedeck is a kid safe platform that provides a wide variety of games for toddlers and preschoolers. These games cover various topics including :


  • Games For Kids
  • Doctor Games
  • Eco Games
  • Nature Games
  • Painting Games
  • Creative Games
  • Health Games
  • Engineering Games
  • Number Games
  • Circus Games
  • Animal Games
  • Toys And Games
  • House Games

5- Math Chimp

Math Chimp is a directory of fun online math games, videos and worksheets all of which are aligned to the Common Core Standards. The purpose is to provide engaging and helpful Common Core activities for grades K+ through 8th.

6- Jefferson Lab

Jefferson Lab is another great website where students can have access to different games and puzzles. All of these internet based games require a JavaScript enabled browser.
http://www.educatorstechnology.com/2013/08/6-good-kids-safe-sites-for-educational.html

Additional resources


Recommended
Additional
Reading
The Digital Divide: Social Capital and Social Skills
[Online]. Available at: http://sites.duke.edu/digitaldivide/socialcapital/
[Accessed 22 April 2015]
Social Transformation in an Information Age
[Online]. Available at: http://portal.unesco.org/ci/en/file_
download.php/7364b6dd37bccc23a9038e48cb7f956dcorpus-1-
144.pdf [Accessed 22 April 2015]
Digital and Web
Resources
Additional digital resources are also available for this module.
Please log on to the BlackBoard, and follow the links to
‘Supplementary Digital Material’ to source the following.

Reference page

Bibliography

The Independent Institute of Education. 2015. Digital Citizenship Module Guide. 2015. First Edition. p23-126

Ecommerce Land, 2015. History of Ecommerce. [Online]

Available at: http://www.ecommerce-land.com/history_ecommerce.html
[Accessed 05 May 2015].

Anon. Types of Cyber Crimes. Cross Domain Solutions. [Online]. Available at: http://www.crossdomainsolutions.com/cyber-crime/ [Accessed on 20 May 2015]


Royal Canaidian Mounted Police. 2012. [Online]. Available at: http://www.rcmp-grc.gc.ca/tops-opst/tc-ct/cyber-tips-conseils-eng.htm [Accessed on 20 May 2015].

Digital Rights and Responsibility,[Online]. Available at: http://www.nisd.net/digitalcitizen/ [Accessed 18 June 2015].


Digital Etiquette, http://www.albion.com/netiquette/corerules.html,2015


http://image.slidesharecdn.com/netiquetteandcodeofconductincommunication-120322223243-phpapp01/95/netiquette-and-code-of-conduct-in-communication-2-728.jpg?cb=1332455712


http://edtech2.boisestate.edu/markwinkelman/502/images/netiquette/netiquetterules.png


http://vignette1.wikia.nocookie.net/netiquette/images/2/29/Etiquette.gif/revision/latest?cb=20120621025135


Digital communication, (http://clashofclans.wikia.com/wiki/Clans,2015)   (Anon (a), (2013). MIT Technology in Review. [Internet] 2013: The Year of the Internet of Things. Available from: http://www.technologyreview.com/view/509546/2013-the-yearof-the-internet-of-things/)


Digital literacy and information fluency, Digital Literacy and Information Fluency, http://www.animalplanet.com/tv-shows/mermaids/about-this-show/about-mermaids/,2013


http://www.animalplanet.com/tv-shows/mermaids/videos/the-best-mermaid-evidence-of-2013/,2013


http://www.eonline.com/news/424537/mermaids-the-new-evidence-reels-in-huge-ratings-baits-viewers-for-more-sea-siren-specials, 2013


http://abcnews.go.com/blogs/entertainment/2013/05/mermaids-mocumentary-stirs-big-ratings-for-animal-planet/, 2013


http://www.webopedia.com/TERM/D/digital_footprint.html,2015


http://www.teachhub.com/10-things-your-students-should-know-about-their-digital-footprints, 2015


Digital access, http://www.nisd.net/digitalcitizen/sec_digcit/access_6_12.htm


5 fluences, https://allthingslearning.wordpress.com/


section for parents, http://www.educatorstechnology.com/2013/08/6-good-kids-safe-sites-for-educational.html

6. Digital Security

There are many types of risks when it comes to digital security. When it comes to computers/laptops/tablets etc. these devices can be affected by malicious malware. There are sub categories of this Malicious Software, namely: Bot, Adware, Bugs and Rootkits.    These programs run in the background without you even knowing it.

The risks of T&C’s are that they are often very long and people usually don’t read them.


Different types of Cyber-crimes

-Hacking: a person’s computer is “broken into” and his personal information can be accessed (Cross Domain Solutions, 2015)

-Theft: when a person’s steals and downloads music/movies/games and software. This is a copyright violation. (Cross Domain Solutions, 2015)


-Cyber stalking: online harassment and stalking.  (Cross Domain Solutions, 2015)


-Child abuse: criminals talk to minors on social media/online dating and get them to send photos of themselves. (Cross Domain Solutions, 2015)


-Identity theft: Criminal accesses information of someone bank account/ credit card etc. to but things in the victims’ names. (Cross Domain Solutions, 2015)


(http://www.crossdomainsolutions.com/cyber-crime/)




How to avoid these crimes:

Hacking: Don’t download things from untrusted sites.

Theft: Make sure there is no one watching you when you draw money.


Cyber stalking: do not give your personal information to random people (Address, number etc.)


Child abuse: Monitor children’s devices to see what they get up to.


Identity theft: be careful when doing online transactions; make sure they are trusted sites.

Did you know?

What Your Students Really Need to Know About Digital Citizenship

The greatest software invented for human safety is the human brain. It's time that we start using those brains. We must mix head knowledge with action. In my classroom, I use two essential approaches in the digital citizenship curriculum that I teach: proactive knowledge and experiential knowledge.

Proactive Knowledge
I want my students to know the "9 Key Ps" of digital citizenship. I teach them about these aspects and how to use them. While I go into these Ps in detail in my book Reinventing Writing, here are the basics:

1. Passwords
Do students know how to create a secure password? Do they know that email and online banking should have a higher level of security and never use the same passwords as other sites? Do they have a system like LastPass for remembering passwords, or a secure app where they store this information? (See 10 Important Password Tips Everyone Should Know.)

2. Privacy
Do students know how to protect their private information like address, email, and phone number? Private information can be used to identify you. (I recommend the Common Sense Media Curriculum on this.)

3. Personal Information
While this information (like the number of brothers and sisters you have or your favorite food) can't be used to identify you, you need to choose who you will share it with.

4. Photographs
Are students aware that some private things may show up in photographs (license plates or street signs), and that they may not want to post those pictures? Do they know how to turn off a geotagging feature? Do they know that some facial recognition software can find them by inserting their latitude and longitude in the picture -- even if they aren't tagged? (See the Location-Based Safety Guide)

5. Property
Do students understand copyright, Creative Commons, and how to generate a license for their own work? Do they respect property rights of those who create intellectual property? Some students will search Google Images and copy anything they see, assuming they have the rights. Sometimes they'll even cite "Google Images" as the source. We have to teach them that Google Images compiles content from a variety of sources. Students have to go to the source, see if they have permission to use the graphic, and then cite that source.

6. Permission
Do students know how to get permission for work they use, and do they know how to cite it?

7. Protection
Do students understand what viruses, malware, phishing, ransomware, and identity theft are, and how these things work? (See Experiential Knowledge below for tips on this one.)

8. Professionalism
Do students understand the professionalism of academics versus decisions about how they will interact in their social lives? Do they know about netiquette and online grammar? Are they globally competent? Can they understand cultural taboos and recognize cultural disconnects when they happen, and do they have skills for working out problems?

9. Personal Brand
Have students decided about their voice and how they want to be perceived online? Do they realize they have a "digital tattoo" that is almost impossible to erase? Are they intentional about what they share?

Experiential Knowledge
During the year, I'll touch on each of these 9 Key Ps with lessons and class discussions, but just talking is not enough. Students need experience to become effective digital citizens. Here's how I give them that:

Truth or Fiction
To protect us from disease, we are inoculated with dead viruses and germs. To protect students from viruses and scams, I do the same thing. Using current scams and cons from Snopes, Truth or Fiction, the Threat Encyclopedia, or the Federal Trade Commission website, I'm always looking for things that sound crazy but are true, or sound true but are false or a scam. I'll give them to students as they enter class and ask them to be detectives. This opens up conversations of all kinds of scams and tips.

Turn Students into Teachers
Students will create tutorials or presentations exposing common scams and how to protect yourself. By dissecting cons and scams, students become more vigilant themselves. I encourage them to share how a person could detect that something was a scam or con.

Collaborative Learning Communities
For the most powerful learning experiences, students should participate in collaborative learning (like the experiences shared in Flattening Classrooms, Engaging Minds). My students will collaborate with others on projects like Gamifi-ed or the AIC Conflict Simulation (both mentioned in a recent post on game-based learning).

Students need experience sharing and connecting online with others in a variety of environments. We have a classroom Ning where students blog together, and public blogs and a wiki for sharing our work with the world. You can talk about other countries, but when students connect, that is when they learn. You can talk about how students need to type in proper case and not use IM speak, but when their collaborative partner from Germany says they are struggling to understand what's being typed in your classroom, then your students understand.

Digital Citizenship or Just Citizens?
There are those like expert Anne Collier who think we should drop the word "digital" because we're really just teaching citizenship. These are the skills and knowledge that students need to navigate the world today.

We must teach these skills and guide students to experience situations where they apply knowledge. Citizenship is what we do to fulfill our role as a citizen. That role starts as soon as we click on the internet.


VICKI DAVIS @COOLCATTEACHER'S PROFILE

Wednesday, 17 June 2015

4. Digital Etiquette

1. 10 points of netiquette

Rule 1: Remember the Human
Rule 2: Adhere to the same standards of behavior online that you follow in real life
Rule 3: Know where you are in cyberspace
Rule 4: Respect other people's time and bandwidth
Rule 5: Make yourself look good online
Rule 6: Share expert knowledge
Rule 7: Help keep flame wars under control
Rule 8: Respect other people's privacy
Rule 9: Don't abuse your power

Rule 10: Be forgiving of other people's mistakes
(albion,the core rules of netiquette,2015)

2. Penalties that apply for failing to meet these
you will go for disciplinary hearing
you might be suspended
3. How you would enforce and manage this in your business
Monitoring internet usage and block certain websites.
4. References

http://www.albion.com/netiquette/corerules.html,2015
http://image.slidesharecdn.com/netiquetteandcodeofconductincommunication-120322223243-phpapp01/95/netiquette-and-code-of-conduct-in-communication-2-728.jpg?cb=1332455712

http://edtech2.boisestate.edu/markwinkelman/502/images/netiquette/netiquetterules.png

http://vignette1.wikia.nocookie.net/netiquette/images/2/29/Etiquette.gif/revision/latest?cb=20120621025135
5. All images to be Creative Commons











Digital Communication

Clash of clan

1. Provide an overview of the game, the logistics, strategies used, and your experience.


Clash of Clans is a popular iPad/iPhone/iPod/Android game created by "Supercell". It has been available internationally on the iTunes store for free since its initial v1.7 release on 2 August 2012, and on the Google Play Store since 8 October 2013. Clash of Clans is a strategy game where players can construct and expand one's village, unlock successively more powerful warriors and defenses, raid and pillage resources from other villages, create and join Clans and much, much more.Although Clash of Clans is Free-to-Play, additional in-game currency can be purchased for real money from the Apple App Store/Google Play Store in the form of In-App Purchases. However, all features of the game are open to players who choose not to make In-App Purchases. Clash of Clans is available on iOS and Android devices!
(Clash of clans wiki,2015)
http://clashofclans.wikia.com/wiki/Clash_of_Clans_Wiki

2. Address the collaborative process within the clan you joined (this means you will use each part of the process, discuss the section and provide examples from your experience).

Clans are groups of players that join together in order to compete with other Clans in two ways: the first is to pool their trophies and battle to collect the most trophies, and the second is to win Clan Wars for loot and prestige. Members of Clans have a private chat for socializing with each other and are able to donate troops to each other. Within a Clan there are four ranks, member, elder, co-leader, and leader. Including the leader, you can have up to 50 members in a Clan.

Joining a Clan
To be a member of a Clan you must first repair your Clan Castle. To do this will cost you 10,000 gold. Once your Clan Castle has been repaired you have the option of joining or creating a Clan. There are various ways to join a Clan. Below are some examples:

View a Clan that has the status 'Anyone Can Join' and tap the 'join' button.
Send a request to join a Clan that has the status 'invite only'.
Go on global chat and watch for people recruiting members to join their Clan.
Accepting an invitation sent by a clan elder/co-leader/leader.
Note: Some Clans have a minimum trophy requirement to join their Clan; you cannot join nor send a request to join if you do not meet the trophy requirement (you can, however, be invited and accept the invite). The trophy requirement is set by the Clan leader or co-leader and can vary from from 0 to 4,200.

Clan Ranks
(Not to be confused with Clan Rankings)

Leader
Clan leaders are the ones who have the big responsibility of managing their Clan. In order to create a brand-new Clan, it costs an additional 40,000 gold, whereupon the player will immediately become the first member and leader of the new Clan. The leader has the administrative authority to invite players to join their Clan, accept or decline requests to join, start wars, and promote/demote members to and from eldership and/or co-leader. The leader can kick out co-leaders, elders, and members.

Additionally, a Clan leader has the ability to demote themselves and promote another player to leader. This move is generally only made in particular circumstances and should be exercised with extreme caution, as once another member is made leader the former leader no longer holds the same administrative powers. Typically a Clan leader should only do this if the person they promoted was entirely trusted. If the Clan leader leaves without promoting someone else to leader, the co-leader who has been in the clan for longest will automatically become leader. If there are no co-leaders, the most senior elder will take the position, and if there are no co-leaders nor elders the oldest member in the Clan will obtain leadership. If the leader is the only one in the Clan when he leaves, the Clan will close.

The main difference between the Clan leader and an co-leader is that only the leader has the authority to bestow (and withdraw) the title of co-leader on another player. It is strongly discouraged for leaders to freely give away leader status, as this will completely and irrevocably relinquish control to the new leader. There can only be one leader at a time.

Making a new Clan

ClanCreation
Assuming his or her Clan Castle is already rebuilt, a player must do the following to create a new Clan:
  1. Choose the badge and name of the clan.
  2. Make a description of your clan to let know others what you're all about (optional)!
  3. Select the status of the clan/clan type. i.e.; Anyone can join, invite only or closed.
  4. Set the amount of trophies required to join the clan (this field can be left blank and the default will be 0).
  5. Select the war frequency of the clan.
  6. Choose out the Clan Location of your clan.
  7. Pay the required 40,000 gold.

Editing Your Clan

The leader or co-leader(s) of the Clan may edit the badge, Clan type, minimum trophyrequirement and description of the Clan. It is not possible to change the name of a Clan once it has been created.
Clan setting updates can now be seen in the Clan Chat, indicating who changed them.

Clan Types

Closed

You are not allowed to join the Clan at this time, even if there is room and you fit the requirements. However, you can be part of a closed Clan if invited personally by an elder/co-leader or the leader of the said Clan, invitations can also bypass Trophy requirements set by the Clan.

Invite Only

You can apply to join this Clan if you have at least the minimum number of trophies required. Your message will pop up in the Clan chat, at which time a clan elderco-leader  or a leader can accept you (which causes you to immediately join the Clan) or reject you. If you have been rejected you will have to wait 6–8 hours until you can apply again for the same Clan. You will receive a message if you are rejected. Members cannot invite or accept pending invites. You can accept or decline an invite sent by the elderco-leader or leader of a clan.
Note that you can apply to multiple Clans at once. You will join the first Clan that accepts your application, and any subsequent Clans that try to accept you will receive a message that you are already in another Clan (although the application will stay in chat until it is either accepted or rejected, and there is otherwise no indication that you have joined another Clan in the meantime).

Anyone Can Join

This is a type of Clan where anyone can join. Even if anyone is able to join, you must still have at least the minimum number of trophies that the Clan requires.

Minimum Trophy Requirement

This may be adjusted from 0-4,200.  It will stop players of a lower trophy count from joining, but will hopefully attract higher levels. A player of a lower trophy count may join if invited by an elder, co-leader or leader of the clan. The minimum trophy requirement can be increased by increments of 200 from 0 to 1,000, and by increments of 100 from 1,000 to 4,200. Anyone without the required amount of trophies cannot join the Clan, but Clan members or elders which are below the trophy requirement will not be automatically kicked from the Clan (the leader or co-leaders can manually do so, of course). An elder cannot kick an elder, nor can a co-leader kick a co-leader.

Clan Badge

Clan Badges
All Clans have a badge, which is initially designed by the leader when he or she creates the Clan. The leader can customize the badge using the 79 preset patterns, 12 colors and 20 borders that Supercell has provided.







(http://clashofclans.wikia.com/wiki/Clans,2015)

3. Present the type of communication used, examples of inappropriate communication as well as inappropriate behaviour.


Type of communication used
The Internet and E-mail 

This was made for conveying over systems. The most well-known correspondence is email, in light of the fact that it is utilized for both business and individual correspondence 

Voice over Internet Protocol (VoIP) 

This sort of correspondence permits individuals to see one another whilst talking. This kind of correspondence empowers the non-verbal communication, in light of the fact that they are synchronously utilizing the Internet 


Social networking 


The design is to share what is going ahead in your life. Instagram is a stage of sharing your photographs 

Examples of Inappropriate Communication
Accepting assembles or messaging in a conference or class

Gushing wrong material out in the open

Chatting on the telephone amid feast times

Utilizing institutional PCs for non-institutional purposes (e.g. work PCs for individual or school PCs for non-scholarly purposes)

Utilizing organization telephones for individual utilization

Wrong utilization of work resources

Examples of inappropriate behaviour 
irritating or culpable or debilitating conduct towards an individual or gathering I the work environment
work environment savagery
hindrance in the working environment by liquor or different substances

4. Address the issue of how, if at all, this game could be used to educate the younger generation about digital citizenship.
the diversion is in view of the advanced citizenship manual aide, so the learners and more individuals will pick up learning on computerized citizenship and how it influences our every day lives


(Anon (a), (2013). MIT Technology in Review. [Internet] 2013: The Year of the Internet of Things. Available from: http://www.technologyreview.com/view/509546/2013-the-yearof-the-internet-of-things/)

5. Research needs to be referenced and substantiate your arguments (Please use at least five (5) relevant and authentic sources).
Why do you need to reference?

There are many reasons why referencing is important, go to the Home page and check out the view points given in the short videos or check out the ideas listed below.

To distinguish your own ideas from those of someone else.

To cite different points of view.

To validate what you are writing, by referring to documented evidence. Published work for instance can be used to support your argument and add credibility to your writing.

To inform readers of the scope and depth of your reading.

To integrate information by assessing, comparing, contrasting or evaluating it, to show understanding.

To emphasise a position that you agree or disagree with.

To refer to other research that leads up to your study.

To highlight a pertinent point by quoting the original.

To enable readers to consult the original source independently. For instance the interpretation you give may be different from the one intended.
(Referencite,2015)
(Palgrave,2015)
(Skillsyouneed,2015)
(Universityofreferencing,2015)
(sokogskriv,2015)

Monday, 15 June 2015

Digital Literacy and Information Fluency

Animal planet- Mermaids

1. Purpose of the site and series
The purpose of Animal planet creating sites and series about mermaids is for us (the public) to know everything about mermaids, and i didn't even knew that they existed, so it has helped me see how they look like and how they operate.

 2. The process
The film mixes genuine occasions and phenomena with the tale of two researchers who affirm they discovered the remaining parts of a never-before-distinguished ocean animal. Dynamite CGI vivifies a world where mermaids truly do swim underneath the water's surface, agreeably chase with dolphins and may keep on getting by in a many-sided society where they stay covered up in trepidation of their Earth-bound relatives.

3. The public’s response
The public is still shocked, they still cant believe if such things exists even after seeing even videos

4. The veracity of the series
It seems true, because Animal planet is a reality show and videos that are shown there just have to be to for the show is broadcast-ed worldwide and they have to be proven in order to avoid misleading public.

5. Your opinion of the success or lack thereof of Animal Planet’s campaign.
 I think that Animal Planet succeeded in creation of the sites because you can see the video was not edited for those who took them were there also on the video and thankfully we now know about Mermaids because of Animal Planet. It wouldn't be easy believing a human being talking other than providing a proof.

6. Ensure you reference all findings.

http://www.animalplanet.com/tv-shows/mermaids/about-this-show/about-mermaids/,2013

http://www.animalplanet.com/tv-shows/mermaids/videos/the-best-mermaid-evidence-of-2013/,2013

http://www.eonline.com/news/424537/mermaids-the-new-evidence-reels-in-huge-ratings-baits-viewers-for-more-sea-siren-specials, 2013

http://abcnews.go.com/blogs/entertainment/2013/05/mermaids-mocumentary-stirs-big-ratings-for-animal-planet/, 2013

http://www.webopedia.com/TERM/D/digital_footprint.html,2015

http://www.teachhub.com/10-things-your-students-should-know-about-their-digital-footprints, 2015

7. Use Creative Commons images where possible. A workaround is to take screenshots.

Mermaids: The New Evidence

In the video Mermaids-The body found by Animal planet posted by Jenna Mullins, 2013

VIDEO: A mockumentary that aired on the cable channel has a brief disclaimer in the end credits.

GOOD MORNING AMERICA By ABC NEWS ,2013

Digital Footprints

On the Internet a digital footprint is the word used to describe the trail, traces or "footprints" that people leave online. This is information transmitted online, such as forum registration, e-mails and attachments, uploading videos or digital images and any other form of transmission of information — all of which leaves traces of personal information about yourself available to others online.
digital footprint, webopedia,By Vangie Beal,2015

Building a digital legacy is an issue I believe doesn’t garner enough attention in our personal and professional lives. In fact, some of the heaviest users of online tools and social media, are our young students, who are growing up as a generation of visual learners and visual attention seekers. This is in fact the Facebook and YouTube generation, and the reality is that many teens are unconcerned about the dangers of sharing personal information online.


A highly respected education advocate, Kevin Honeycutt, once asked me if any of us from our generation (GenX and before), had ever made a mistake in puberty. He then asked if our mistakes are “Googleable.”


The reality is that our mistakes from puberty are not “Googleable”. But our students’ mistakes are. “They’re on the record you see, ” Kevin continued, “so if they’re gonna do it (live online) anyway, I think it behooves us as educators to help our students shape and build a positive legacy.”



With that in mind, I have developed some important facts and opinions that our students should be completely aware of as they live in their digital world, creating digital footprints along the way.

10 Things Your Students Should Know About Their Digital Footprints

1.) College admissions andemployers do read your online profiles and they do make decisions based upon information they find out about you online. In fact, college’s will make decisions based upon many forms of questionable involvement. Scott Cornwell, College and Career Adviser at Ladue Horton Watkins High School in St. Louis, Missouri said, “I had a case where a parent sent an email to a college suggesting they look at the Facebook page of a student who was applying to the same school as her daughter.  The Facebook page showed the other student at a party with alcohol.  The mother's goal was to get rid of some of the competition her daughter would have at this selective school.  In the end, both the student at the party and the daughter of the mother were rejected (the first in part because of the Facebook page, the second because the college was concerned about dealing with such a manipulative mother for four years).
2. ) As illustrated in the example above, educators and parents do see, read, and hear about your online escapades, even though you go to great lengths to hide them from us. There have been many times I wish I hadn’t stumbled upon a student Twitter or Facebook post, but I have. These experiences, which included foul language,cyberbullying, and basic immaturity, have only reinforced to me that digital citizenship needs to be taught in our schools as early as possible.
3.) Educate yourself on the basics. What does Digital Citizenship mean to you? What should it mean? These are important lessons that students can research on their own. However, wouldn’t it be fantastic to offer some of this education in our schools as well?
4.) Create a profile that says simple, non-specific details about yourself, but that is still identifiably you. Ultimately, we are all personally responsible for our digital reputation, but many of our students, and quite frankly many adults, don’t know how to accomplish this important task.
5.) Create separate accounts so you can consistently remain positive in public online spaces. If you have already developed a full identity online, you don’t necessarily need to “scrub it clean”, but it would make sense to create a professional identity, and limit the amount of personal information you share publicly. Increase your privacy settings on all of your personal information, and publicly share all the wonderful things you are contributing to the world.
6.) Learn from others. Find teenagers, professionals, or reputation resources who are doing things the right way and model your online presence in a similar manner. Read the survey’s that have been conducted and make informative decisions on what personal material is appropriate to share publicly, and what is not.
7.) Keep private information private. Have you heard the saying the “Internet is forever?” You may think you can easily hit delete, and what you sent goes away. But it truly doesn’t. Be aware and learn why the Internet is permanent.
8.) The Golden Rule. Never has this rule applied more than to how you speak to others online. What are you truly accomplishing by saying things behind the veil of a computer screen, that you would never say to someone in person? Treat others as you would like to be treated. Simply put, if you don’t have something nice to say, don’t say anything at all. Remember, you can’t truly delete when you SEND.
9.) Don’t be afraid to make a mistake, but be mindful that being careless, too open, too trusting, and realize spending too much time on the Internet, has real consequences.
10.) Build your own positive image and brand yourself in a great way. Say “iAm” to the world. I created a wonderful lesson for my class by asking them who they are as people, not as students. I then asked them to create a short video to show me who they are. It was a great success and I learned a lot about my students in a very positive way.
I hope you will find this information helpful. I would love to hear your feedback in the comments section.
Good luck!
(10 Things Your Students Should Know About Their Digital Footprints By: Digital Media in the Classroom,2015)