Reading Reflection
Chapters 9 & 10
Chapter 9
Modeling and Facilitating Use of Digital Tools
This may include:
-Communicating curricular requirement.
-Report and discuss students progress.
-Keeping parents informed.
-Creating classroom websites/newsletters.
-Collecting student contact and health information.
When Communicating With Parents...
Be POSITIVE!
Be PREPARED!
Be RESPECTED.!
Expectations for Electronic Communications:
Set Goals
Take Action and Monitor
Ask yourself the following questions:
"What commonalities do you find across the policies?"
"What disparities exist?"
Evaluate and Extend
Key Terms:
Tele-monitoring: "eMentoring," using web-based technologies to support a mentoring program.
Podcasts: digital audio files downloaded from the internet played back on the computer.
Screencasts- animated movies captured from the teacher's monitor or a whiteboard.
Open-source Software: free software that allows users to access and modifying the underlying code.
Software Evaluation Rubrics: forms that provide criteria ob which to evaluate educational softwares and websites.
Chapter 10
Legal and Ethical Use
Examples of Acceptable and Unacceptable Use:
-Abiding by polices and procedures.
-Being polite and using appropriate language.
-Enforcing appropriate use.
-Respecting copyright.
-Using online time effectively.
-Using the internet ethically and legally.
Unacceptable:
-Altering software buy deleting files.
-Assuming identity.
-Plagiarizing.
-Harassing an individual on internet.
-Giving out personal Information.
-Using the internet ethically and legally.
- Vandalizing equipment of digital files.
The TEACH Act
1. Be a nonprofit organization.
2. Be accredited.
3. Have a copyright compliance policy.
4. Provide notice on copyright-protected materials.
5. Prevent copyright-protected material from being transmitted beyond the period of instruction.
Key Terms:
Creative Commons Licensing: guidelines that limit your use to copy, edit, or build upon all or parts of their work.
Tips for Creating Passwords: Securing your information such as accounts, websites and resources.
Use 8 or more characters.
Mix upper and lower case, numbers and special characters.
Change passwords often.
Cyberbullying
Cyberbullying can take place through:
Messaging.
Pictures, videos, and other recordings.
Creating websites.
Using Technology to Support Responsible Internet Use:
Say hello.
Describe your message.
Be polite.
Make sure you mean it.
Say goodbye.