With a little help from my friends
Third entry in a series looks at sites that help users create content. In the last instalment of this series we looked at some of examples of user-created media such as mashups, fan movies and machinima.
Third entry in a series looks at sites that help users create content. In the last instalment of this series we looked at some of examples of user-created media such as mashups, fan movies and machinima.
“Who steals my purse steals trash,” Shakespeare wrote, “but he that filches from me my good name robs me of that which not enriches him, and makes me poor indeed.”
Today is Safer Internet Day, an annual international event sponsored by Insafe to promote a safer Internet for children. Recent research on Internet life has shown that the greatest threat to kids online comes from kids themselves, both in the form of risky behaviour and online harassment, or cyber bullying. Cyber bullying can take forms such as harassing e-mails or text messages, social exclusion and spreading private photos and videos, among others, and presents a particular challenge for parents and teachers because it often happens outside the home or classroom. Because the Internet has become an essential part of kids' social lives, cyber bullying can also have more devastating effects as youth feel they have no escape.
In Japan, cell phones and texting are much more widespread among young people than they are here. Much of what we do on computers is done through phones there, with the result that those students that own cell phones spend an average of two hours a day on them. Japanese TV dramas even feature scenes where the dialogue is entirely done through texting, with characters thumb-typing furiously while the messages appear as subtitles. Now another part of life has been squeezed onto the one-inch screen, resulting in the creation of the cell phone novel.
If anyone still doubts that youth need to learn how to evaluate online information, those doubts should have been dispelled by a recent hoax perpetrated by the group called the Yes Men. This group, which has a history of staging fake press conferences, decided to draw attention to Canada's position at the Copenhagen conference on climate change by creating a number of fake Web sites purporting to be, among others, the Copenhagen summit site, the Wall Street Journal, and Environment Canada's site. While it didn't take long for Environment Canada to make a statement exposing the hoax, by that time many journalists had reported the story as fact and the story had been widely distributed by wire services.
This lesson is designed to help students determine the validity of information that is presented to them on the Internet. After reviewing a series of evaluation techniques for online resources, students form groups to assess selected websites.
The Information and Privacy Commissioner of Ontario has created three guides for teachers that help increase the understanding of open government and personal privacy. What Students Need to Know About Freedom of Information and Protection of Privacy has been created to provide an opportunity for teachers and their students to discuss why access to government-held information and personal privacy are important public values and how these values are reflected in our relationships with governments.
This lesson allows students to explore the concepts of rules, values and ethics and learn how they influence our decision-making. Students are then invited to consider how they can contribute to create positive online cultures.
In this lesson, students learn about ways to manage their privacy and reputation online by exploring their digital presence and to make good choices about sharing other people’s content online. Students explore how they are portrayed online through their own content and content posted or shared by others, and research tools for controlling access to their online content. Finally, students explore moral dilemmas relating to posting and sharing personal material.
In this lesson, students learn about and discuss the legal aspects of cyberbullying. They review a variety of hypothetical scenarios and a case study, and they consider the seriousness of the situations, who is legally responsible, what action (if any) should be taken and by whom.