Final Digital Citizenship Student Guide SMS 2013-2014
Transcription
Final Digital Citizenship Student Guide SMS 2013-2014
Student Interactive Workbook DIGITAL CITIZENSHIP 2013-2014 All resources courtesy of www.commonsensemedia.org Copyright This workbook is intended for student use only. All material presented is property of www.commonsensemedia.org, unless otherwise noted. Please do not reproduce or distribute this material without proper permission. Each interactive chapter contains: *Workbook page(s) *Video(s) *Follow-Up Work & Assessment(s) *Family Tip Sheet page i Student Survey Before you Do you love going on the Internet, watching TV, playing video games, or listening to music? Most everyone does! This survey is going to ask about how you use media, and what types of media* you like the most. Since your name is not on the survey, no one will know how you answer — so you can be honest! Click HERE to take the Survey! THINK T= Is it True? H= Is it Helpful? I= Is it Inspiring? N= Is it Necessary? K= Is it Kind? page ii Chapter 1 YOUR ONLINE FOOTPRINT You will explore what it means to be a good digital citizen in your online and offline community. Everything that you post and publish stays with you forever and becomes part of your ‘digital footprint.’ What is a Digital Footprint, and what does yours’ convey? Did you know that you have a ‘digital footprint’ that can be searched and seen by a large audience? Did you know that your information can be shared with others? Did you know that you can try to control some of your digital footprint by thinking about what you post online? Click on the video HERE to learn more about your “Digital Footprint.” page 4 I took a photo of my friend that I want to share...now what? 1. IS IT A GOOD PHOTO? YES NO Be proud of the photos that you share with others! Only show people the best of the best. 2. WOULD MY FRIEND AGREE? YES NO ’t ou wouldn Y . e ic n y Pla o r friend t want y ou to a bad pho broadcast ld y ou? ou of y ou, w 3. COULD IT GET MY FRIEND INTO TROUBLE? YES NO 4. IS IT GOING TO CAUSE DRAMA? that might come Don’t post any photos your friends. You back to haunt you or e them. never know who will se Then it’s not wor th posting. Really. YES NO So my friend is okay with it, but how might it affect me? 5. AM I AWARE THAT ANYONE CAN SHARE IT? YES NO Well, it's true. Anything you post online can be saved, copied, and shared with a large invisible audience. 6. WOULD I BE OKAY WITH MY GRANDMA SEEING IT? YES NO If you think it will make your grandma blush, then there’s a good chance somebo dy else will find it inappropriate, too. 7. A YEAR FROM NOW, WILL I FEEL GOOD ABOUT MAKING THIS PUBLIC ? YES NO Hold off if you’re having doubts. Your future self will thank you. Congratulations! You clearly self-reflect before you self-reveal online, so... Go ahead! Share & ENjoy! For information and resources about digital citizenship, page 5 MY DIGITAL FOOTPRINT Trillion Dollar Footprint Directions What kind of online information would you want linked to your name in 10 years? Design your own digital footprint! Fill in the footprint below with images, Web hits, and types of information that you would want to see linked to your name in 10 years. Examples: “a social networking profile on Facebook or MySpace; a YouTube video of me performing with my rock band; an online newspaper article about my work to help the homeless.” Be creative! Use Common Sense! You can have a great time online learning from and sharing with others, but: Think before you post, because many things you do online will add to your digital footprint Remember to review your privacy settings Perform a search on yourself every so often to see what your digital footprint looks like TRILLION DOLLAR FOOTPRINT / STUDENT HANDOUT DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2012 www.commonsense.org 1 page 6 Who helped to shape Linda’s and Jason’s digital footprints? At Home.... Can you tell what a person is really like offline based on what you find online? What are some other types of information that make up your “digital footprint”? Extension Activity My Digital Footprint Student Handout At-Home Activity Choose a Candidate Student Handout page 7 ASSESSMENT Trillion Dollar Footprint 1. True or false: Your digital footprint is all the information about you online that only you post. a) True b) False 2. What kinds of information can make up a digital footprint? a) Online photos b) Comments that others post about you c) Both a and b 3. What kinds of information would make a POSITIVE digital footprint? Circle all that apply. a) Photos of you doing work in the community b) A newspaper article about your soccer team c) A mean comment that you made on a friend’s website d) A blog you created to showcase your artwork e) Inappropriate photos of you on a social network site Click HERE to learn more about Eva’s story about messaging and her online footprint. TRILLION DOLLAR FOOTPRINT / ASSESSMENT DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2012 www.commonsense.org 1 page 8 FAMILY TIP SHEET ELEMENTARY SCHOOL Common Sense on Privacy and Digital Footprints Our kids live in a culture of sharing that has forever changed the concept of privacy. In a world where everyone is connected and anything created online can be copied, pasted, and sent to thousands of people in a heartbeat, privacy starts to mean something different than simply guarding personal or private information. In this context, you might think about kids’ privacy in three categories: privacy and security, privacy and reputation, and privacy and advertising. This is the private information (e.g., Social Security number, first and last name) that could put kids at risk for identity theft if it got into the wrong hands. The information that could be personally embarrassing or hurtful to them or others if posted publicly. The information about their habits and behavior online that companies collect in order to target them with ads and other content. For good or bad, everything our kids do online creates digital footprints that migrate and persist. Kids share work with others and, as they get older, receive comments and feedback. This culture of sharing is beneficial in many ways. But if kids aren’t careful, their reputations can be harmed, or their information used in ways they never intended. For example, your child may think he or she just sent something to a friend, but that friend can send it to a friend’s friend, who can send it to their friends’ friends, and so on. Or they may innocently fill out an online form without understanding that this may make them vulnerable to identity theft. And their online behavior will likely be tracked without them knowing by the industry, which has little incentive to be responsible. common sense says Let kids know that you are the gatekeeper. They should ask your permission before filling out online forms, and they should always keep their Social Security number, birth date, address, and full name private. Everything online leaves a digital footprint. Help them think before they post so that they will be proud of their Internet presence down the road. Remind kids that they will be treated online as they treat others. Whatever negative things they say can and probably will come back to haunt them, in more ways than they can imagine. The next time an ad pops up online, or you see that you are being targeted by ads specific to your interests, point it out to your kids. Let them know that some companies advertise to you based on what kinds of things you look at online. DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2012 www.commonsense.org 1 page 9 Chapter 2 POWER OF WORDS You will explore positive ways of communicating online with others. Your words have great power! We will also explore strategies for staying safe when you encounter scary, mean, or inappropriate language online. What should you do when someone uses mean or scary language on the Internet? Consider your favorite websites. When you are online, have you ever encountered messages from other children that made you feel angry, hurt, sad, or fearful? Have you ever thought about strategies for handling cyberbullying? How have you responded in the face of upsetting online language? Have you ever participated in online communication that was disrespectful? Click HERE to learn more about Stacey’s story about how rumors escalate. page 11 WORDS CAN HURT The Power of Words Directions Read the story below and then answer the questions that follow. Rani and Aruna love a website that has games and chatting for kids. Their parents let them play on the site. Lately, though, Rani and Aruna have been receiving mean messages on the site, including: Group Chat: Player A: Player B: Player C: Player D: I hate you! You are ruining the game! You are so stupid. You are a dork. 1. How do you think Rani and Aruna feel when they read those messages? 2. How would you feel if you received messages like these? 3. Why do you think people send these kinds of message to people they don’t know? A Matter of Ethics There’s an old saying: “Sticks and stones may break my bones, but words will never hurt me.” THE POWER OF WORDS / STUDENT HANDOUT DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2012 www.commonsense.org 1 page 12 TALK AND TAKE ACTION The Power of Words Directions Create a cartoon about a cyberbullying situation. Each frame should show a different part of the situation: FRAME 1: Make a cartoon about something that a cyberbully might do or write online. Remember to use language appropriate for school. FRAME 2: Show what you might do if you saw what the cyberbully has done or written. FRAME 3: What might be a positive outcome, or result, of the situation? What might a cyberbully say or do? What would you do in response? What would a positive outcome be? Use Common Sense! s If someone is mean to you online, take a breather and ignore them. Save a copy of your conversation between you and the bully. s If you, or someone you know, is cyberbullied, talk to a trusted adult – like a parent, family member, or teacher. Together, you can think of a plan for how to respond. THE POWER OF WORDS / STUDENT HANDOUT DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2012 www.commonsense.org 1 page 13 ASSESSMENT ASSESSMENT The Power of Words The Power of Words 1. Alicia receives a text message from her friend Ronald. The message says, “I am having a party. You are not invited.” Circle the word that shows how Alicia might feel after she receives the message. a) hurt b) excited in between? c) popular Message: Good job, nerd! 2. Theo is having fun playing Dragons and Knights online. Then he sees a message that go with each answer. a) Ignore the player who sent the mean message b) Write a message back that says, “You’re so stupid, you’re the one ruining the game” c) Pretend that he doesn’t feel hurt by the message d) Save the message in case the other player sends Theo another mean message e) Tell an adult about the message Okay In Between Hurtful f) Never play Dragons and Knights online again THE POWER OF WORDS / ASSESSMENT DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2012 www.commonsense.org 1 THE POWER OF WORDS / ASSESSMENT DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2012 www.commonsense.org 2 page 14 Why is it a bad idea to send mean or scary messages online? Because they can make the person who gets them upset, angry, or scared. Why might there be more misunderstandings between people when they Online messages can be more confusing or scarier than face-to-face messages because there are no face-to-face cues send online messages as opposed to to help you understand people’s intentions. At Home.... face-to-face discussion? What can kids do when they get They can (1) calm down and take a deep breath, (2) tell a cyberbullying messages? friend or a trusted adult who can help develop a plan to handle the situation, (3) ignore the bully, (4) keep a copy of the communication with the bully. Extension Activity In small groups, have students make a cyberbully protection kit. The kit should contain a shield that they decorate with an anti-cyberbullying symbol and a scroll that lists things they could say to a cyberbully. The kit can be created with cardboard or paper and markers, or online with Kerpoof (www.kerpoof.com). At-Home Activity Encourage students to use the Talk and Take Action Student Handout as a model to create comic strips with family members about other cyberbullying situations. Students can use Make Beliefs Comix (www.makebeliefscomix.com), a free online tool. Students should create one frame that shows the cyberbullying scenario. The next frame should show what they might do when faced with this situation or message. The last frame should show a positive outcome of the situation, which might involve confiding in a trusted adult. THE POWER OF WORDS/ LESSON PLAN DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2012 www.commonsense.org 4 page 15 FAMILY TIP SHEET ELEMENTARY SCHOOL Common Sense on Talking Safely Online Kids love connecting with others online. Most young people talk online only with their friends and family. But as a parent, you might be concerned that a stranger with bad intent (predator) could contact your child. Predatory behavior is when people contact your child on the Internet (mostly through instant messaging, chat rooms, or social networking sites) and attempt to “groom” your child for a relationship. These people try to win children’s trust by hiding their true identities. They may try to get kids into creepy or dangerous situations by pretending to have similar interests, giving them compliments, and letting them talk about anything they want. They typically tell children to keep the friendship secret, and they may even threaten kids if they tell anybody. As the relationship develops, the predator may send pictures, ask a child to send them pictures, and then ask to meet face to face. Teaching your child to be alert about how predators groom their targets is crucial to keeping your child safe. With very small kids, it is best if you are present when they are online. At this age, you may choose to block your kids from talking online, or create strict rules for them to follow about who they can talk to. For older elementary school children, you may choose to give them more freedom after first discussing how to stay safe online. common sense says Establish rules for appropriate instant messaging and chatting online, and explain that you’re enforcing those rules because you care about their safety. You may want to involve an older sibling who can model good online behavior and can stay involved in their younger siblings’ online lives. Online talk should generally be with people your children know, like family and friends. Kids shouldn’t answer questions online that make them feel uncomfortable. They also shouldn’t talk about adult topics with strangers. If something creepy or inappropriate happens online, kids need to know they won’t get in trouble if they tell an adult they trust. Also, avoid banning them from the computer. Kids are less likely to tell parents when they experience a problem on the computer if they think as a result they won’t be allowed to use it. Kids should never give out their name, address, school, phone number, email, pictures, or anything that could identify who they are. Most kids know to brush off unwanted contact. Encourage this behavior. Does your child seem withdrawn, emotionally distant, spend endless hours online, or seem to be hiding something? The kids who get sucked into inappropriate online relationships often show warning signs. They might be hiding an online relationship they don’t want you to know about. If you think this might be happening, ask your child about it! DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2012 www.commonsense.org 1 page 16 Chapter 3 CYBER BULLYING Cyberbullying can be very public. Posts can spread rapidly and to a large, invisible audience because of the nature of how information travels online. What is Cyberbullying, and how do you deal with it? There are several key similarities and differences between online and in-person bullying. Many kids may use more extreme or hurtful language online rather than in-person. Cyberbullying can happen anytime, whereas in-person bullying generally stops when children go home. Both kinds of bullying can make people feel embarrassed, powerless, sad, hurt, and angry. Click HERE to watch Emma’s story of being cyberbullied by a best friend. page 18 What advice would you give Sondra about how to handle the situation? Directions What do you think the people who are bullying Sondra would say about their behavior? Read the story of Sondra below. Then answer the questions that follow. Sondra is planning a birthday sleepover. Her parents have set a limit of eight girls, so Sondra can’t invite everyone she’d like. Two girls, who are left out of the party, overhear the plans. They decide to create a “We Hate Sondra Jones” website. They say that anyone invited to the party should not go. They share the website with everyone in school. The girls also tell everyone to add new reasons why they hate Sondra and to spread mean rumors about her. When Sondra hears about the site, she gets a sick feeling in her stomach. Each day she finds a new mean comment or joke about her on the website. She feels hurt and embarrassed. She tells her parents she is sick, so she won’t have to go to school. Is this a cyberbullying situation? Why or why not? Who are the cyberbullies? Who is the target? __________________________________________________ How do you think Sondra feels? ______________________________________ Why do you think the two girls made the mean website about Sondra? www.commonsense.org 1 www.commonsense.org page 19 ASSESSMENT a) Sad and hurt b) Like it’s not a big deal c) Fine a) Makes people feel sad, angry, hurt, and embarrassed b) Can cause physical harm c) Can cause emotional harm d) The bully’s identity can be anonymous, or unknown e) Can be witnessed by a bystander f) Can be stopped or made better by an upstander a) TJ should block the bully. b) TJ should write mean messages back. c) TJ should tell an adult. www.commonsense.org 1 page 20 cyberbullying situation? Don’t respond or retaliate. Block the bully. Save and print bullying messages. Talk to a friend. Tell a trusted adult. At Home.... Have students pretend that they are Dr. Chip Micro, a famous TV personality who helps people having difficulites with others online. Let students know that Sondra has written to Dr. Chip Micro about her situation. They, as Dr. Chip Micro, should send an email reply providing concrete advice to Sondra. Let them know that they should: (1) empathize with Sondra, (2) acknowledge the difficulty of her situation, and (3) offer help and/or suggested solutions for her situation. Encourage students to interview family members about incidents of bullying that they have either been part of or witness to. Suggest that students create about ten interview questions that invite family members to share their stories and also ask them to reflect on how they think technoloy has or has not changed the way bullying impacts kids (and adults). Students can record the interviews with an audio recorder or a smartphone’s voice memo function. They then can share their interviews with the class or incorporate them into a multimedia presentation using VoiceThread (www.voicethread.com). www.commonsense.org 5 page 21 FAMILY TIP SHEET ELEMENTARY SCHOOL Common Sense on Cyberbullying Spreading rumors and bullying is nothing new. Kids have always found ways to be cruel to one another. But computers, cell phones, and digital technologies make bullying easier and more widespread. Kids now use their cell phones and computers to hurt, humiliate, and harass each other, and it’s starting at younger ages. Cyberbullying is defined as repeatedly sending or posting harmful or mean messages, images, or videos about someone else using the Internet, cell phones, or other digital technologies. Kids may call each other names, say nasty things about one another, threaten each other, or make others feel uncomfortable or scared. Children’s increased access to digital technology has created more pathways to communicate — for both good and for bad. Although cyberbullying is typically associated with tweens and teens, more cases are now being reported with younger children. Cyberbullying is especially disturbing because it is constant, inescapable, and very public. It can happen anytime — at school or at home — and can involve large groups of kids. The combination of the boldness created by being anonymous and the desire to be seen as “cool” can cause a kid who normally wouldn’t say anything mean face to face to show off to other kids by cyberbullying someone. Younger kids may bully to get attention, because they think it will make them popular, or because they want to look tough and make others afraid of them. And because it happens online, it can easily go undetected by parents and teachers. Cyberbullying is a growing problem among younger kids. Younger kids are starting to use online communication and at the same time they are exploring ways to test other people’s reactions. For instance, kids who send a mean message might not fully understand how another person might react to that message. What’s more, hurtful information posted on the Internet is extremely difficult to prevent or remove, and anyone can see it. Imagine being publically humiliated in front of everyone you know. Such behavior usually happens when adults aren’t around. So parents and teachers often see only the anxiety or depression that results from their kids being hurt or bullied. Parents can help by becoming aware of the issue, learning to identify the warning signs of bullying, and helping kids to understand how to be respectful to others online. What Families Can Do Make a list together of how talking online is different than talking face to face. Get kids to think about how it might be easier to say things online you wouldn’t say in person, and how this may be good sometimes and a problem at other times. Practice writing a text or chat message to a friend. Model for your child how to compliment people and how to avoid mean words or behaviors. Point out that it’s important to stick up for others, online as well as in the real world. Discuss ways they can support friends who are bullied and report bad behavior they see online. DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2012 www.commonsense.org 1 page 22 marked by an asterisk (*) or are highlighted in red. teach 2Chapter 4 Private andINTERNET Personal (10 minutes) SAFETY, PRIVACY, & DEFINE the KeySECURITY Vocabulary terms personal information and private information. Emphasize that EXPLAIN to students that some kinds of information are generally safe to share on the Internet and some are not. However, the information that’s considered safe should not be shared one on one with people they don’t already know offline. personal information is usually safe to share online. Private information is usually unsafe to share online (students should get permission from a parent or guardian). SHARE the following examples of information that is safe or unsafe to share: SAFE – Personal Information UNSAFE – Private Information Your favorite food Mother’s maiden name Your opinion (though it should be done respectfully) Social Security number First name Your date of birth Parents’ credit card information Phone number ASK: Sample Click HERE to watch aresponses: video about teens’ Why would someone want to steal someone else’s identity on the Internet? To steal money experience with To doonline something badsafety. or mean To hide their real identity How can you protect yourself from online identity theft? An identity thief uses private information to pretend to be the person whose identity he or she has stolen. Once the thief has taken someone’s identity, he or she can use that person’s name to get a driver’s license or buy things, even if the person whose identity they stole isn’t old enough to do these things! It’s often not until much later that people realize that their identity has been stolen. Identity thieves may also apply for credit cards in other people’s names and run up big bills that they don’t pay off. Identity thieves often target children and teens because they have a clean credit history and their parents are unlikely to be aware that someone is taking on their child’s identity. Click HERE to watch a helpful video about privacy. page 24 PROTECT YOURSELF Private and Personal Information Directions Decide if each piece of information below is an example of personal information or private information. Then check the box to show your answer. Information Personal Private Full name (first and last) Age Street address Email address Date of birth Gender How many brothers and sisters you have Favorite band Phone numbers Credit card information Favorite food The name of your pet Mother’s maiden name Name of your school PRIVATE AND PERSONAL INFORMATION / STUDENT HANDOUT DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2012 www.commonsense.org 1 page 25 ALL ABOUT ME Private and Personal Information Directions Pretend you have a public profile in an online community. There are people you know, and people you don’t know, who can view your profile. Write down personal information that you would want to share about yourself. Make sure that everything on your list is safe to share and that it is not private information that could reveal your identity. ________________________________________________________________ ________________________________________________________________ ________________________________________________________________ ________________________________________________________________ ________________________________________________________________ ________________________________________________________________ ________________________________________________________________ ________________________________________________________________ Use Common Sense! Each time you share information about yourself online, stop and think: “Am I giving out information that I should keep private?” Personal information often is safe to share. But you should never share private information without the permission of a parent, guardian, or teacher. PRIVATE AND PERSONAL INFORMATION / STUDENT HANDOUT DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2012 www.commonsense.org 1 page 26 ASSESSMENT Private and Personal Information 1. If a website asks you for your __________________ online, you should talk to a parent or family member. a) favorite color b) date of birth c) screen name 2. An identity thief probably would not be interested in your personal information, such as __________________. a) our full name b) your street address c) your favorite movie 3. Clara received two emails. Which email should she NOT respond to? Circle your answer. PRIVATE AND PERSONAL INFORMATION / ASSESSMENT DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2012 www.commonsense.org 1 page 27 safe to share online, you might choose not to share this information, and that’s fine. What would be a good rule for kids about giving out private information online? At Home.... They should not share it online without the permission of a teacher, parent, or guardian. Extension Activity Direct students to find examples of additional websites for kids their age that require identity information to register. Have students classify the information requested as personal information or private information. Students may report their site findings and classifications to the class. At-Home Activity Encourage students to share the tips they’ve learned about sharing information online with their parents or family members. Have students explain the difference between personal information and private information. Then, ask family members if they visit websites that ask for private information. What do family members do to keep their private information secure? PRIVATE AND PERSONAL INFORMATION / LESSON PLAN DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2012 www.commonsense.org 5 page 28 FAMILY TIP SHEET MIDDLE SCHOOL Common Sense on Protecting and Respecting Privacy Our kids live in a culture of sharing that has forever changed the concept of privacy. In a world where everyone is connected and anything created online can be copied, pasted, and sent to thousands of people in a heartbeat, privacy starts to mean something different than simply guarding personal or private information. Each time your child fills out a profile without privacy controls, comments on something, posts a video, or texts a picture of themselves to friends, they potentially broadcast themselves to the world. Digital life is both public and permanent. Everything our kids do online creates digital footprints that migrate and persist. Something that happens on the spur of the moment – a funny picture, an angry post – can resurface years later. And if kids aren’t careful, their reputations can be harmed. Your child may think he or she just sent something to a friend – but that friend can send it to a friend’s friend, who can send it to their friends’ friends, and so on. That’s how secrets become headlines and how false information spreads fast and furiously. The stakes only increase when we remember that all of this takes place in front of a huge, invisible audience. Kids’ deepest secrets can be shared with thousands of people they’ve never even met. common sense says Help kids think long term. Everything leaves a digital footprint. Whatever gets created may never go away. If they don’t want to see it tomorrow, they’d better not post it today. Explain to them that nothing is really private online – no matter what they think. Privacy settings aren’t infallible. Others can pass on information that is supposed to be private. It’s up to kids to protect themselves by thinking twice before they post anything that could damage their reputation or that someone else could use to embarrass or hurt them. Teach kids to keep personal information private. Help kids define which information is important for them to keep private when they’re online. To start, we recommend that kids not share their addresses, phone numbers, or birth dates. Encourage kids to think carefully about the nature of their relationships (close friends, family, acquaintances, strangers) and adjust their privacy settings accordingly. Passing along a rumor or identifying someone in a picture (called “tagging”) affects other people’s privacy. If your kids are tagged in friends’ photos, they can ask to have the photos or the tags removed. But beyond that, there’s not too much they can do. What goes around comes around. If kids spread a rumor or talk trash about a teacher, they can’t assume that what they post will stay private. Whatever negative things they say can and probably will come back to haunt them, in more ways than they can imagine. DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2012 www.commonsense.org 1 page 29 kids absorb and accept these gender stereotypes, they can be misinformed about how the world perceives them and what they can grow up to be. Why Does It Matter? Chapter 5 and mental health at risk. And because kids today are not only media consumers but also media creators, they may mirror these SELF IMAGE & IDENTITY stereotypes while texting, messaging, posting comments, or developing their own digital works. When kids are exposed to rigid ideas about boys’ and girls’ roles through their peers — both online or offline — it can be hard to convince them not to adopt those ideas. Your students need to develop media literacy skills now, not later. As elementary school educators teach kids how to read literature and informational texts, they have a unique opportunity to also equip them with media and digital literacy skills. Kids can apply questions about authorship, content, context, and validity to many different forms of digital media – online ads, websites, and even virtual worlds. Technology allows us to edit photos Early discussions about gender can help diffuse digital drama so that they look like things that in the future. Preteens aren’t immune to issues like online drama, mightcyberbullying, exist only in sexting. our Quite imaginations. and even often, these issues are rooted in social attitudes, not the technology itself. When a child But if people compare themselves to chooses to be a bystander, rather than an upstander, it’s often altered photos ofabout celebrities and And boys and because she’s concerned social repercussions. girls face different consequences for showing separateness from models, which are unrealistic, they their peers. If kids can unpack “gender codes” at an early age, they might feel bad how they may be more likelyabout to handle any drama relatedlook. to them later on. Source: Social Media, Social Life: How Teens View Their Digital Lives (June 26, 2012). A Common Sense Media Research Study. http://www.commonsensemedia.org/research/social-mediasocial-life Not Your Specialty? Not a Problem! There are more classroom connections than you think. Talking about gender roles can create an easy segue between the subject you regularly teach – whether it’s history, English, or health and wellness – and a class discussion about digital How can photos be changed on the computer, and how can that affect our feelings about the way we look? Did you know that photos can be altered digitally? You will consider the upsides and downsides of this practice. Sometimes photos that are altered and distorted can affect our self-image and our perception of the world around us. Many advertising companies uses photo alteration to help sell products. Click HERE to watch an example of photography alteration by Dove’s Evolution of Real Beauty Campagin. page 31 MAGAZINE MAGIC Picture Perfect Directions Take a look at the magazine cover below, and the real-life photo of singer Kelly Clarkson. Discuss how the two photos of Kelly are different. Then work with a partner to answer the questions. List the kinds of products you think this magazine will advertise: What kind of message does this magazine cover send about how girls and women should look? How might a girl or woman feel about herself after looking at this magazine? Kelly Clarkson in real life, singing on Good Morning America Photo Sources Wenn. 2009. Photograph. Kelly Clarkson Photo Retouched to Make Her ‘Look Her Best.’ People.com, 11 Aug. 2009. Web. 30 Aug. 2012. <http://www.people.com/people/article/0,,20297322,00.html>. Mayer, Janet. PR Photos. Photograph. In Pictures: ‘Kelly Clarkson Performs on Good Morning America’. Monsters and Critics, 02 Aug. 2009. Web. 04 Sep. 2012. <http://www.monstersandcritics.com/music/features/article_1493279.php/In_Pictures_Kelly_Clarkson_Performs_on_Good_Morning_America?page=9> PICTURE PERFECT / STUDENT HANDOUT DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2012 www.commonsense.org 1 page 32 Directions Take a look at the magazine cover below, and the real-life photo of tennis player Andy Roddick. Discuss how the two photos of Andy are different. Then work with a partner to answer the questions. List the kinds of products you think this magazine will advertise: What kind of message does this magazine cover send about how men and boys should look? Andy Roddick, in real life How might a boy or man feel about himself after looking at this magazine? Photo Sources Christopher Peterson/BuzzFoto. “Stars Who Love Athletes Slide: Brooklyn & Andy.” People Magazine. 52 May. 2011. Web. 30 Aug. 2012. <http://www.people.com/people/gallery/0,,20266474_20967664,00.html> Newman, Andrew A. “3 Magazines Are Accused of Retouching Celebrity Photos to Excess.” The New York Times. The New York Times, 28 May 2007. Web. 30 Aug. 2012. <http://www.nytimes.com/2007/05/28/business/media/28fitness.html?_r=1>. PICTURE PERFECT / STUDENT HANDOUT DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE page 33 ASSESSMENT Picture Perfect 1. Which photo looks like a real girl? a) Photo 1 b) Photo 2 Explain your answer: Photo 1 Photo 2 2. If a girl told you that she wanted to look like the girl in Photo 2, what would you tell her? 3. These two pictures are of the same pig. How do you think the pig got his stripes in the second picture? a) He was born that way. b) Someone used paint to put stripes on him. c) Someone used a computer to put stripes on him. Image Source: Tim Piper. “dove evolution.” The Dove® Campaign for Real Beauty. Web. 16 Oct. 2012.<http://www.youtube.com/watch?v=iYhCn0jf46U> PICTURE PERFECT / ASSESSMENT DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2012 www.commonsense.org 1 page 34 Extension Activity Read aloud the first three paragraphs of The New York Times article “A Real Girl, 14, Takes a Stand Against the Flawless Faces in Magazines” (www.nytimes.com/2012/05/04/nyregion/seventeen-magazine-faulted-by-girl-14for-doctoring-photos.html). Explain that Julia believes altered photos can make girls feel bad about the way they look. She also believes they give boys the wrong idea about how girls are supposed to look. So Julia started an online petition called “Seventeen Magazine: Give Girls Images of Real Girls!” for people to sign. In it, At Home.... she asks Seventeen Magazine to promise to always include some real photos – ones that are not altered. Ask volunteers to say whether or not they would sign Julia’s petition, and explain the reasons for their decision. Then engage students in a discussion of how Julia stood up for what she believed, and how the Internet gives people the chance to share important messages with others across the world. At-Home Activity Have students imagine a magazine filled with real, unaltered photographs of people who look like those they see every day in the real world. These people would come in all shapes, sizes, and styles. Everyone would look different, and no one would look perfect. Students should design the cover of their magazine, either on paper or using an online tool such as Glogster (www.glogster.com). What would the headlines be? What image(s) would be on the cover? Encourage students to reflect on how they might feel about their own appearance after reading that kind of magazine. PICTURE PERFECT / LESSON PLAN DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2012 www.commonsense.org 5 page 35 FAMILY TIP SHEET ELEMENTARY SCHOOL Common Sense on Boys, Girls, and Media Messages In today’s 24/7 media world, girls and boys are flooded with messages about how they should look and act. Whether in toy stores, advertisements, TV shows, movies, or games, the images and stories kids see in the media play a powerful role in framing their sense of what’s “acceptable” and what isn’t. The problem is that mainstream media often encourages narrow definitions of girls’ and boys’ roles, and such gender stereotypes are now making their way into the digital world. As kids grow older and become more active online, they may encounter more extreme attitudes about differences between girls and boys, whether in the comments section of YouTube, in virtual worlds, on social network sites, or even while chatting with their friends. Our media landscape has widened — creating new forms and sources of pressure for girls to look pretty and “sexy,” and for boys to toughen up and “act like man.” When kids see the same gender stereotypes portrayed over and over again in media, they can become misinformed about how the world perceives them and what they can grow up to be. They may also form judgments about others based on the portrayals they see in stories and images. Additionally, when kids are exposed to rigid ideas about boys’ and girls’ roles through their peers — both online or offline — it may be more difficult to convince them not to adopt those ideas. What Families Can Do In this digital age, it’s important for kids to develop media-literacy skills early on. Parents, relatives, teachers, and other adult mentors are uniquely positioned to help kids analyze the gender messages they see on TV, at the movies, in ads, in games, and online — and to encourage them not to perpetuate harmful stereotypes. common sense says When you’re standing in line at the grocery store with your children, take a look at the magazine covers. Explain how publishers use computers to airbrush images of people. And point out elements of our bodies that would normally be captured in photos but are missing there — like freckles, veins, or wisps of hair. The fictional characters and stars that kids idolize may not paint a complete picture of boys’ and girls’ roles. Help expand their horizons by finding role models in books, on TV, in movies, and in real life that show kids how they can be recognized for their talents and brains rather than their looks. Depending on your kids’ ages, you can talk about common stereotypes and debunk your kids’ accepting them. Use examples from the real world — like all blondes are dumb, for example — to show that media portrayals often aren’t accurate. DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2012 www.commonsense.org 1 page 36 Chapter 6 WRAP-UP: SUPER DIGITAL CITIZENS The things we read, see, and hear online can lead people to have all sorts of feelings (e.g., happy, hurt, excited, angry, curious). So what we do and say online can be powerful. The Internet also allows us to learn about anything, talk to people at any time (no matter where they are in the world), and share our knowledge and creative projects with other people. How can people help others to be super digital citizens? Although the Internet makes it very easy, copying the work of others and presenting it as one’s own is called plagiarism. You will also learn about circumstances in which it is permissible to use the work of others. How do you know whether or not a resource is available for free and fair use? You will be introduced to proper ways to cite people’s words and ideas from the Internet, including how to write a citation. Click HERE to watch a video about Digital Drama. page 38 All Digital citizens Protect private information for themselves and others. Respect themselves and others in online communities. Stay safe online by listening to their gut feelings. Stand up to cyberbullying when they see it happening. Balance the time they spend using media and doing other activities. For information and resources about digital citizenship, visit www.commonsense.org/educators. page 39 SAVE THE DAY! Super Digital Citizen Directions Step 1: Create a digital superhero. Note some of his or her special powers or characteristics. My digital superhero is named: SUPER DIGITAL CITIZEN / STUDENT HANDOUT DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2012 www.commonsense.org 1 page 40 Step 2: Create a comic strip in which your superhero sees an act of poor digital citizenship. Then have your superhero fix the problem … and save the day! Use illustrations and captions to tell your story. Comic strip title: SUPER DIGITAL CITIZEN / STUDENT HANDOUT DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2012 www.commonsense.org 2 page 41 ASSESSMENT Super Digital Citizen 1. Read the scenarios below. Which person acts like a good digital citizen? a) Kwame gets an email from a person he doesn’t know that says he won a prize. He immediately deletes the email and doesn’t reply. b) Sara makes a peanut butter sandwich for her little sister. c) Willie and Juan are in a fight. They keep posting mean comments about one another online. 2. What would a good digital citizen do in the following situation? Nick sees that his classmate left her email account open on a school computer by mistake. Nick decides to ________________________________________________. a) send an email from her account to a friend b) log out of her email and let her know that he closed it for her c) not do anything and let someone else deal with it 3. What is one way that you can act responsibly online? ______________________________________________________________________ ______________________________________________________________________ ______________________________________________________________________ SUPER DIGITAL CITIZEN / ASSESSMENT DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2012 www.commonsense.org 1 page 42 page 43 At Home.... Extension Activity Have students design “super digital citizen” screensavers or wallpaper for the computers or tablets at your school. Their screensavers or wallpaper should describe being a good digital citizen, using words and phrases from the warm-up discussion. Students can prioritize and emphasize certain words by creating a word cloud online using a site such as ABCYa! (www.abcya.com/word_clouds.htm). Have students save the word cloud as a JPG (.jpg) or a screen shot grab, and then upload the image as a screensaver or wallpaper. At-Home Activity Have students transform their comic strips into a story with a beginning, middle, and end. Encourage them to add dramatic details and flesh out their characters a bit more. Students can use an online story map or a plot diagram (for example, www.readwritethink.org/files/resources/interactives/plot-diagram/) to help craft their story before writing it. page 44 Chapter 7 MORE RESOURCES Here are some other resources for you and your family. We need you to be a Super Digital Citizen, today and always! Take a family media agreement! Family Media Agreement: K- 5 I will . . . stay safe. I will not give out any private information, such as my full name, date of birth, address, or phone number, without my family’s permission. I will keep my passwords private and only share them with my family. I will tell a trusted adult if anyone online makes me feel uncomfortable, sad, or unsafe. I will recognize that my safety is more important to my family than anything else. think first. I will communicate kindly when I use the Internet or my cell phone. I will not tease, embarrass, or bully others. I know that the Internet is public, and I will respect myself and others when I’m using it. I will not pretend that I created something that’s not actually my own work. stay balanced. I know that not everything I read, hear, or see online is true. I will respect my family’s decisions for what I’m allowed to watch, play with, or listen to, and when. I will continue to enjoy the other activities – and people – in my life. In exchange, my family agrees to . . . recognize that media is a big part of my life, even if they don’t always understand why. talk with me about what worries them and why, before saying “no.” x x signed by me Essentials Program signed by my parent or caregiver For more info on 1-to-1, go to www.commonsensemedia.org/educators/1to1 © 2013 page 46 This is a great app to practice Digital Citizenship. page 47 Guiding Principles for Technology use in the Shrewsbury Public Schools RESPECT YOURSELF You are part of a community that is local and global - everything you do online e.g. post, write, like, friend, comment, pin, +1, tweet, message, IM, text, etc. defines you to your local community, teachers, parents, friends, neighbors, college admissions officers, future employers, the whole world. What do you want this “personal brand” to say about you? Unfortunately, the reality is that you need to act as though nothing is private and nothing can be deleted Behave as you would in the town square (because you are, it just looks different) Be a credit to your family, town, school, etc. by being kind, thoughtful, considerate, polite, constructive, etc. While you are enrolled in school and in a school building, school staff can ask to see the contents of your devices and accounts. (is this true vis-a-vis privacy rights and reasonable suspicion?) Until you are 18 your parents can ask to see the contents of your devices and accounts. (is this true visa-vis privacy rights and reasonable suspicion) page 48 Guiding Principles for Technology use in the Shrewsbury Public Schools....continued.... BE CAREFUL Not everybody has good intentions and not all information is reputable. Seek assistance from a parent, teacher, or other adult you trust when you receive or find something that makes you uncomfortable. Check your sources Consider privacy settings and take advantage of them when setting up digital accounts and be aware that true anonymity is difficult to achieve Guide your online choices and behaviors with an awareness of which personal information, habits, preferences, etc. advertisers, marketers, app developers, retailers, criminals, etc. collect and how they collect it, and the use and value of the information. page 49 Guiding Principles for Technology use in the Shrewsbury Public Schools...end. BE RESPECTFUL It’s important to respect others as your actions can affect them. Seek permission for recording via photograph, video, audio, hologram, etc. Respect confidentiality - Don’t reveal information from others that was only intended for you Respect the work of others - Pay attention to copyright and attribution Respect and conserve the resources we all share (wifi, internet bandwidth, etc.) Follow the laws of the land Actively listen to others Respect property page 50 Shrewsbury Public Schools, 2013 RESPONSIBLE USE POLICY SPS Responsible Use of Technology Policy The use of technology is an important part of education in the 21st century. This School Committee policy was developed to guide the use of technology by students. Students must agree to the following stipulations in order to be allowed to use technology at school (the acknowledgement of this policy in the student handbook will serve as agreement). 1. Students shall use the Internet and all forms of school technology responsibly. School technology includes, but is not limited to, computers, tablets, printers, copiers, cameras, and interactive web resources that serve educational purposes. This agreement extends to use of technology that students may be able to use off site. 2. Students shall respect the rights of copyright owners by limiting copying to essential materials and providing attribution (citations) for images and text. Students shall avoid plagiarism by ensuring that their papers and projects reflect their thoughts and ideas as well as cited paraphrases, summaries and quotations. Students will ask teachers or media staff for assistance if they have questions regarding these terms. 3. Students shall understand that they may use a personal device on the school network, that they may be required to provide information about their device to the technology department to ensure that it can operate safely without disrupting others, that all school policies apply to them whether they are using their own device or school technologies, and that this privilege may be limited or revoked. page 51 4. Students shall understand the network is a valuable resource for teaching, learning and many other 6. Students shall understand that the district’s Bullying Prevention and Intervention Plan applies to forms of productivity for students, staff and parents. Students shall understand that downloading large files or online behaviors and they shall comply with all provisions of that policy. attachments may compromise network speed and they will avoid this type of activity without permission even if they are using a personal device. Students shall limit their use of downloading large files to classroom lessons and research. Students engaging in school work shall be given priority when accessing school technology. 7. Students shall understand and shall comply with all personal technology guidelines associated with their school. 5. Students shall understand that their participation in school interactive web resources--using a personal device or not--must represent what is expected from a student in the Shrewsbury Public Schools. Therefore, anything that is considered inappropriate in the classroom is also inappropriate in all uses of email, blogs, podcasts, social networking sites, messaging/chat sites, or other digital communication tools. This includes, but is not limited to disrespectful, profane, racist, sexist or other discriminatory remarks. Additionally, students shall promptly inform a teacher or administrator if any messages received or material reviewed is inappropriate. 8. Students shall understand that school provided access to the Internet has to be filtered. If they need access to a blocked site, they shall work with their teachers to explore options available. Students shall not attempt to bypass any blocked sites or circumvent the filter in any manner. 9. Students shall not impersonate nor attempt to impersonate another nor use or attempt to use somebody else’s accounts on any device. Students shall not delete or tamper with anyone else’s files, folders, or work. Students shall not let another student use their accounts on any device. page 52 10. Students shall understand that files, services, and devices provided by and/or managed by the school are not private. There is no expectation of privacy when students use the school district’s network, devices, and services and anything they do can be viewed by administration at any time. 11. Students and their families shall understand that unless superseded by the liability schedule of a specific program they will be liable for full repair and replacement costs for damage to school property, whether intentional or through negligence, including electronic devices. disabling device features or applications, the revocation of all network access, suspension or exclusion from school, or legal action by the authorities. Students or parents should contact the district or school administration if they have any questions about this agreement or its implementation. This policy will be reviewed within five years of adoption, or when necessary due to significant change in technology access or usage by students. 12. Students shall understand that attempts to override, disable, alter, or circumvent security restrictions, management systems, or device firmware will be considered intentional damage. Students shall understand that should they be found in violation of this policy, the consequences could include, but are not limited to; restricting access to the device, page 53 FAMILY TIP SHEET ELEMENTARY SCHOOL Common Sense on Effective Email Communication EMAIL ETIQUETTE There is a high tolerance for misspellings and stream-of-consciousness ideas in text messages and informal emails. But what happens when kids need to write a formal message? Will they know how to change their writing style to match their audience? Sizing up your audience and making your words match are important skills for students to learn. Teaching our kids to evaluate their audience and create messages accordingly will help them gain more respect from their teachers and win better responses in any formal setting. common sense says Encourage your children to consider the audience and purpose of their email. Using a more formal tone with people they have never met is the safest and most respectful way to communicate. Prompt kids to get right to the point. Most people have a lot of email to sift through. Keeping formal messages to one page is ideal. Anything kids would say over email should be something they are able to say to someone’s face. Suggest to children that they use uppercase type only on rare occasions. Uppercase letters indicate that you are shouting. Kids should use them only if they really want to make a STRONG POINT. Click HERE to watch a lesson in action about Email Etiquette Remind kids to proofread. They should check their spelling, grammar, punctuation, and formatting before sending an email. Coach kids to use emoticons sparingly. Using smiley faces or exclamation points on occasion can help others understand their meaning in the absence of visual and vocal cues. However, they are usually inappropriate with more formal emails. :) DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2012 www.commonsense.org 1 page 54 Directions Sondra has sent an email to her friend Jim about his pet rabbit. But she made 7 errors in the email below. Work with a partner to circle or highlight all 7 errors. Writing Good Emails Directions From: [email protected] Compare and contrast the letter to the email. Do you see the parts that are the same? On the email, circle or highlight the parts that are different. To: soccerfan#[email protected] Sent: Monday, October 15, 2012 at 5:21 pm 321 Main Street header hi! Subject: _________________________________ Township, MA 10749 November 1, 2012 greeting Dear Serena, How are you? How is school? I like my new teacher. We have school lunches that are yummy! Write back soon. From, I like your new pet! Your rabit Molly is message body closing signature Clayton From: [email protected] To: [email protected] Sent: Thursday, November 1, 2012 at 3:34 pm Subject: playdate Hey Tyrone, How are you? Can you come over on Saturday? From, Tanya /\_/\ (0 . 0 ) >^< great? What do you feed Molly? let’s play with your rabbit again soon. me header greeting message body Use Common Sense! It’s always a good idea to proofread an email before you send it. Double-check for the following: a clear and specific subject a greeting, closing, and signature closing proper capitalization signature proper punctuation correct spelling WRITING GOOD EMAILS / STUDENT HANDOUT DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2012 www.commonsense.org WRITING GOOD EMAILS / STUDENT HANDOUT DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE 1 © 2012 www.commonsense.org 2 page 55