SlideShare une entreprise Scribd logo
1  sur  81
Owning Your Life(at least online) Pat Sine	Information Technology – Client Support & ServicesUniversity of Delaware
Teens on the Internet 93% of teens ages 12-17 go online Three-quarters (75%) of teens and 93% of adults ages 18-29 now have a cell phone 73% of wired American teens now use social networking websites Source: Pew Internet & American Life Project, 2010 American teenagers are using 3,146 messages a month, which translates into more than 10 messages every hour of the month that they are not sleeping or in school.  Source: Neilsen.com, 2010
Teens on the Internet US kids between 8 and 18 years old spent an average of 53 hours per week using electronics — and because some of that time includes several electronics at once, they actually manage to cram 10 hours and 45 minutes worth of media into the 7 hours, 38 minutes actually spent per day. Source: Kaiser Family Foundation, 2010 79 percent of United States hiring managers and job recruiters surveyed reviewed online information about job applicants 70 percent of United States hiring managers in the study say they have rejected candidates based on what they found ,[object Object],[object Object]
Image source info: “Wired Man”  Uploaded to Flickr by Mike Licht, NotionsCapital.com under a Creative Commons Attribution 2.0 Generic license on August 6, 2007
?
What You’ve Been Told
Internet Safety Rules Don’t give out your name Don’t give out personal details Don’t meet online friends offline without your parents’ permission .
Update 2010
Online “Predators” and Their Victims: Myths, Realities, and Implications for Prevention and Treatment  Janis Wolak, David Finkelhor, and Kimberly J. Mitchell 	University of New Hampshire Michele L. YbarraInternet Solutions for Kids, Inc.  	American Psychologist, Feb-Mar 2008
Online Behaviors  Disclosure of personal information  Posted personal information  Sent personal information  Harassing behavior  Made a rude or nasty remark  Harassed or embarrassed someone  Talking with someone met online  Meeting someone online (number of ways)  People in buddy list known only online (number of people)  Sexual behavior  Visited an X-rated Web site on purpose  Talk about sex with someone known only online  Other online activities  Downloaded images from file-sharing programs
Engaging in 4 or more of these behaviors makes kids more likely to receive online sexual solicitations.
4 Rules ,[object Object]
Names, email addresses, IM names
Info on your whereabouts or your habitsRULE 1:  Be careful of the personal information you reveal online Names, email addresses, IM names Info on your whereabouts or your habits
Location – Aware Apps Foursquare Gowalla Pleaserobme.com
[object Object],4 Rules
4 Rules RULE 3:  Understand:  What you put online can remain online indefinitely ,[object Object],[object Object]
4 Rules RULE 4:  Understand: Putting small bits of information in many places on the web enables searchers (human or computer) to identify you, your interests, your activities and your location
http://personas.media.mit.edu
Movie – Digital Dossier www.digitalnative.org/MediaProjects/DigitalDossier/
Owning Your Life(at least online)
Psychology of CyberSpace John Suler www-usr.rider.edu/~suler/psycyber/psycyber.html Ongoing updates 1996 to 2010
Can your child really protect and police himself?
What do parents need to know? Monitor your child’s cognitive ability.  When is he or she old enough to make good judgments? Children progress from concrete to abstract thinking. Disinhibition Unrestrained behavior resulting from a lessening or loss of inhibitions or a disregard of cultural constraints. Technology often provides  a perceived buffer from regular consequences  a buffer from traditional social cues
You, The Victim
Harassment & Cyberbullying – 2008 Survey1,454 kids between the ages of 12 and 17 41 percent reported between one and three cyberbullying incidents during the year 13 percent reported four to six incidents 19 percent reported seven or more “In other words, no longer are victims of bullying relegated to the geeks and nerds of yore when it comes to the Internet.” http://newsroom.ucla.edu/portal/ucla/bullying-of-teenagers-online-is-64265.aspx
You, The Perp
http://www.pennlive.com/midstate/index.ssf/2008/04/students_charged_for_afterscho.html
http://cbs3.com/topstories/Facebook.Williamstown.New.2.1531958.html
Movie – Think Before You Post www.youtube.com/watch?v=rbpKawqA6VQ
What can you do? Don’t let it start with you. Make it stop with you.
You, The Master
On the Internet, nobody knows you’re a teenager. New Yorker Magazine,July 5, 1993
Chronicle of Higher Education Website, 11/14/2008
Your Brain	 Plasticity & Malleability “Is Google Making us Stupid?” "iBRAIN: Surviving the Technological Alteration of the Modern Mind." Image source: http://flickr.com/photos/gaetanlee/421949167/
How does Google get so smart?
Page Rank Source: http://en.wikipedia.org/wiki/Page_rank
Page Rank Source: http://en.wikipedia.org/wiki/Page_rank
How does Wikipedia get so smart?
Wikipedia
What did I just see? Reputation Crowdsourcing
Own Your Own Life Tools Tools to make this work for you. Flickr Twitter Facebook YouTube Delicious or Diigo Wikipedia
http://theconversationprism.com/click/
First generation who doesn’t have to say “I don’t know”  to a wide range of questions
Google and Goog411 Wikipedia 1-800-2CHACHA Wolfram Alpha Augumented Reality
Android Shopping App
Pocket Universe
But, what does this mean for ME?
Preparing for Your “Real Life” 21st Century Skills Critical Thinking Technology Applied to Problems Collaboration Locally – working in teams Broadly – drawing from many sources around the Net Globally – using tech tools to create new products with remote partners
Howard Rheingold “Loss of certainty about authority and credibility is one of the prices we pay for the freedom of democratized publishing. We can no longer trust the author to guarantee the veracity of work; today’s media navigators must develop critical skills in order to find their way through the oceans of information, misinformation, and disinformation now available.”
Tools to Make You Smart	 Diigo Google Alerts and iGoogle
Diigo – Social Bookmarking	 Social bookmarking
Google Alerts
Google Alerts and iGoogle
Tools to show the world you’re smart
Page Rank Source: http://en.wikipedia.org/wiki/Page_rank
25 Days to Make a Difference 10-year old girl sets out to honor her grandfather’s memory http://twentyfivedays.wordpress.com
Your own YouTube Channel Corey Vidal Videographer Musician Self-employed  http://www.youtube.com/coreyvidal His channel career spans dancing, singing, playing musical instruments, beatboxing, acting in short films (including a major short film production by Niagara College), solving Rubik's Cubes, video blogging, and collaborating with other YouTubers.  (from Wikipedia)
Why? Careers 10 – 14 by age 42 Information 2003 – 5 exabytes 2006 – 161 exabytes 2010(est.) – 1 zettabyte Exabyte - 1,000,000,000,000,000,000 bytes — 1018 Zettabyte - 1,000,000,000,000,000,000,000 bytes - 1021.
Owning Your Life(at least online)
Internet Safety Rules for 2009 Monitor and manage your privacy settings Your email address(es) Post only what you don’t want to come back to haunt you Make the Internet serve you Create your own Internet persona
?
My Internet persona can be found at  www.udel.edu/sine

Contenu connexe

Tendances

Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior Larry Magid
 
Where does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane AbdonWhere does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane AbdonJohn Florentino E Echon
 
Social Media 101 for Parents: Do you know where your children are?
Social Media 101 for Parents:  Do you know where your children are?Social Media 101 for Parents:  Do you know where your children are?
Social Media 101 for Parents: Do you know where your children are?Sarah Welstead
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointhmorrell1
 
Help! I'm the parent of a tech saavy child!
Help! I'm the parent of a tech saavy child!Help! I'm the parent of a tech saavy child!
Help! I'm the parent of a tech saavy child!Scott Burnett
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensAndrew Kohl
 
Social networks
Social networksSocial networks
Social networksdrlizmike
 
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
 2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji... 2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...Jim "Brodie" Brazell
 
Conceptual approaches to adolescent online risk
Conceptual approaches to adolescent online riskConceptual approaches to adolescent online risk
Conceptual approaches to adolescent online riskMarcelo Pesallaccia
 
Plugged in and tuned out
Plugged in and tuned outPlugged in and tuned out
Plugged in and tuned outMohamed Sedky
 
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...Andy Jeter
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspectiveConnectSafely
 
Social Media and its effects on youth
Social Media and its effects on youthSocial Media and its effects on youth
Social Media and its effects on youthAbhishek Jain
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesLightedCandle
 
Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Larry Magid
 

Tendances (20)

Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior
 
Where does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane AbdonWhere does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane Abdon
 
Social Media 101 for Parents: Do you know where your children are?
Social Media 101 for Parents:  Do you know where your children are?Social Media 101 for Parents:  Do you know where your children are?
Social Media 101 for Parents: Do you know where your children are?
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Help! I'm the parent of a tech saavy child!
Help! I'm the parent of a tech saavy child!Help! I'm the parent of a tech saavy child!
Help! I'm the parent of a tech saavy child!
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital Citizens
 
Teens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & CyberbullyingTeens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & Cyberbullying
 
Social networks
Social networksSocial networks
Social networks
 
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
 2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji... 2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
 
Conceptual approaches to adolescent online risk
Conceptual approaches to adolescent online riskConceptual approaches to adolescent online risk
Conceptual approaches to adolescent online risk
 
Teens and Social Media: An Overview
Teens and Social Media: An OverviewTeens and Social Media: An Overview
Teens and Social Media: An Overview
 
Plugged in and tuned out
Plugged in and tuned outPlugged in and tuned out
Plugged in and tuned out
 
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspective
 
Social Media and its effects on youth
Social Media and its effects on youthSocial Media and its effects on youth
Social Media and its effects on youth
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...
 
Social Media: Kids & Teens
Social Media: Kids & TeensSocial Media: Kids & Teens
Social Media: Kids & Teens
 

En vedette

Avon Grove LII Kickoff
Avon Grove LII KickoffAvon Grove LII Kickoff
Avon Grove LII KickoffPat Sine
 
Public by Default: Life Online in 2012
Public by Default:  Life Online in 2012Public by Default:  Life Online in 2012
Public by Default: Life Online in 2012Pat Sine
 
Surviving and Thriving Online 2011
Surviving and Thriving Online 2011Surviving and Thriving Online 2011
Surviving and Thriving Online 2011Pat Sine
 
Delaware Public School Financial Transparency 2013
Delaware Public School Financial Transparency 2013Delaware Public School Financial Transparency 2013
Delaware Public School Financial Transparency 2013Pat Sine
 
21 cent tools for understanding
21 cent tools for understanding21 cent tools for understanding
21 cent tools for understandingPat Sine
 
Why a MOOC?
Why a MOOC?Why a MOOC?
Why a MOOC?Pat Sine
 
proposal on point of sale information system of a super store
proposal on point of sale information system of a super storeproposal on point of sale information system of a super store
proposal on point of sale information system of a super storeHAMMAD AHMAD
 
A Complete Point of Sale Systems
A Complete Point of Sale SystemsA Complete Point of Sale Systems
A Complete Point of Sale SystemsDavid Martin
 

En vedette (9)

Avon Grove LII Kickoff
Avon Grove LII KickoffAvon Grove LII Kickoff
Avon Grove LII Kickoff
 
Public by Default: Life Online in 2012
Public by Default:  Life Online in 2012Public by Default:  Life Online in 2012
Public by Default: Life Online in 2012
 
Surviving and Thriving Online 2011
Surviving and Thriving Online 2011Surviving and Thriving Online 2011
Surviving and Thriving Online 2011
 
Delaware Public School Financial Transparency 2013
Delaware Public School Financial Transparency 2013Delaware Public School Financial Transparency 2013
Delaware Public School Financial Transparency 2013
 
21 cent tools for understanding
21 cent tools for understanding21 cent tools for understanding
21 cent tools for understanding
 
Why a MOOC?
Why a MOOC?Why a MOOC?
Why a MOOC?
 
proposal on point of sale information system of a super store
proposal on point of sale information system of a super storeproposal on point of sale information system of a super store
proposal on point of sale information system of a super store
 
A Complete Point of Sale Systems
A Complete Point of Sale SystemsA Complete Point of Sale Systems
A Complete Point of Sale Systems
 
Point of Sale (POS)
Point of Sale (POS)Point of Sale (POS)
Point of Sale (POS)
 

Similaire à Own Your Own Life (at least online)

Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementaryemilyensign
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safetyRay Brannon
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online SafetyDonna Murray
 
Teen Cybersafety & Database Resources
Teen Cybersafety & Database ResourcesTeen Cybersafety & Database Resources
Teen Cybersafety & Database ResourcesMs. D
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyinglheikkila
 
Safe kids – connected to web 2
Safe kids – connected to web 2Safe kids – connected to web 2
Safe kids – connected to web 2Oliver Mittl
 
Parents guide to cyberbullying
Parents guide to cyberbullyingParents guide to cyberbullying
Parents guide to cyberbullyingSaraMitchell40
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010paul
 
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop PresentationLydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop PresentationLydia Smith-Davis
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)amalgarn
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentationegregory
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 

Similaire à Own Your Own Life (at least online) (20)

Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementary
 
Parenting the Net Generation - Full Version
Parenting the Net Generation - Full VersionParenting the Net Generation - Full Version
Parenting the Net Generation - Full Version
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
 
Teen Cybersafety & Database Resources
Teen Cybersafety & Database ResourcesTeen Cybersafety & Database Resources
Teen Cybersafety & Database Resources
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 
Safe kids – connected to web 2
Safe kids – connected to web 2Safe kids – connected to web 2
Safe kids – connected to web 2
 
Parents guide to cyberbullying
Parents guide to cyberbullyingParents guide to cyberbullying
Parents guide to cyberbullying
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010
 
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop PresentationLydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 

Dernier

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 

Dernier (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 

Own Your Own Life (at least online)

  • 1. Owning Your Life(at least online) Pat Sine Information Technology – Client Support & ServicesUniversity of Delaware
  • 2. Teens on the Internet 93% of teens ages 12-17 go online Three-quarters (75%) of teens and 93% of adults ages 18-29 now have a cell phone 73% of wired American teens now use social networking websites Source: Pew Internet & American Life Project, 2010 American teenagers are using 3,146 messages a month, which translates into more than 10 messages every hour of the month that they are not sleeping or in school. Source: Neilsen.com, 2010
  • 3.
  • 4. Image source info: “Wired Man” Uploaded to Flickr by Mike Licht, NotionsCapital.com under a Creative Commons Attribution 2.0 Generic license on August 6, 2007
  • 5. ?
  • 7. Internet Safety Rules Don’t give out your name Don’t give out personal details Don’t meet online friends offline without your parents’ permission .
  • 9. Online “Predators” and Their Victims: Myths, Realities, and Implications for Prevention and Treatment Janis Wolak, David Finkelhor, and Kimberly J. Mitchell University of New Hampshire Michele L. YbarraInternet Solutions for Kids, Inc. American Psychologist, Feb-Mar 2008
  • 10. Online Behaviors Disclosure of personal information Posted personal information Sent personal information Harassing behavior Made a rude or nasty remark Harassed or embarrassed someone Talking with someone met online Meeting someone online (number of ways) People in buddy list known only online (number of people) Sexual behavior Visited an X-rated Web site on purpose Talk about sex with someone known only online Other online activities Downloaded images from file-sharing programs
  • 11. Engaging in 4 or more of these behaviors makes kids more likely to receive online sexual solicitations.
  • 12.
  • 14. Info on your whereabouts or your habitsRULE 1: Be careful of the personal information you reveal online Names, email addresses, IM names Info on your whereabouts or your habits
  • 15.
  • 16. Location – Aware Apps Foursquare Gowalla Pleaserobme.com
  • 17.
  • 18.
  • 19.
  • 20. 4 Rules RULE 4: Understand: Putting small bits of information in many places on the web enables searchers (human or computer) to identify you, your interests, your activities and your location
  • 21.
  • 23. Movie – Digital Dossier www.digitalnative.org/MediaProjects/DigitalDossier/
  • 24. Owning Your Life(at least online)
  • 25. Psychology of CyberSpace John Suler www-usr.rider.edu/~suler/psycyber/psycyber.html Ongoing updates 1996 to 2010
  • 26. Can your child really protect and police himself?
  • 27. What do parents need to know? Monitor your child’s cognitive ability. When is he or she old enough to make good judgments? Children progress from concrete to abstract thinking. Disinhibition Unrestrained behavior resulting from a lessening or loss of inhibitions or a disregard of cultural constraints. Technology often provides a perceived buffer from regular consequences a buffer from traditional social cues
  • 29. Harassment & Cyberbullying – 2008 Survey1,454 kids between the ages of 12 and 17 41 percent reported between one and three cyberbullying incidents during the year 13 percent reported four to six incidents 19 percent reported seven or more “In other words, no longer are victims of bullying relegated to the geeks and nerds of yore when it comes to the Internet.” http://newsroom.ucla.edu/portal/ucla/bullying-of-teenagers-online-is-64265.aspx
  • 30.
  • 33.
  • 35. Movie – Think Before You Post www.youtube.com/watch?v=rbpKawqA6VQ
  • 36. What can you do? Don’t let it start with you. Make it stop with you.
  • 38. On the Internet, nobody knows you’re a teenager. New Yorker Magazine,July 5, 1993
  • 39. Chronicle of Higher Education Website, 11/14/2008
  • 40. Your Brain Plasticity & Malleability “Is Google Making us Stupid?” "iBRAIN: Surviving the Technological Alteration of the Modern Mind." Image source: http://flickr.com/photos/gaetanlee/421949167/
  • 41. How does Google get so smart?
  • 42. Page Rank Source: http://en.wikipedia.org/wiki/Page_rank
  • 43. Page Rank Source: http://en.wikipedia.org/wiki/Page_rank
  • 44.
  • 45. How does Wikipedia get so smart?
  • 47.
  • 48. What did I just see? Reputation Crowdsourcing
  • 49. Own Your Own Life Tools Tools to make this work for you. Flickr Twitter Facebook YouTube Delicious or Diigo Wikipedia
  • 51. First generation who doesn’t have to say “I don’t know” to a wide range of questions
  • 52. Google and Goog411 Wikipedia 1-800-2CHACHA Wolfram Alpha Augumented Reality
  • 53.
  • 56. But, what does this mean for ME?
  • 57. Preparing for Your “Real Life” 21st Century Skills Critical Thinking Technology Applied to Problems Collaboration Locally – working in teams Broadly – drawing from many sources around the Net Globally – using tech tools to create new products with remote partners
  • 58. Howard Rheingold “Loss of certainty about authority and credibility is one of the prices we pay for the freedom of democratized publishing. We can no longer trust the author to guarantee the veracity of work; today’s media navigators must develop critical skills in order to find their way through the oceans of information, misinformation, and disinformation now available.”
  • 59. Tools to Make You Smart Diigo Google Alerts and iGoogle
  • 60. Diigo – Social Bookmarking Social bookmarking
  • 61.
  • 62.
  • 63.
  • 64.
  • 66. Google Alerts and iGoogle
  • 67.
  • 68.
  • 69. Tools to show the world you’re smart
  • 70. Page Rank Source: http://en.wikipedia.org/wiki/Page_rank
  • 71. 25 Days to Make a Difference 10-year old girl sets out to honor her grandfather’s memory http://twentyfivedays.wordpress.com
  • 72.
  • 73.
  • 74. Your own YouTube Channel Corey Vidal Videographer Musician Self-employed http://www.youtube.com/coreyvidal His channel career spans dancing, singing, playing musical instruments, beatboxing, acting in short films (including a major short film production by Niagara College), solving Rubik's Cubes, video blogging, and collaborating with other YouTubers. (from Wikipedia)
  • 75.
  • 76.
  • 77. Why? Careers 10 – 14 by age 42 Information 2003 – 5 exabytes 2006 – 161 exabytes 2010(est.) – 1 zettabyte Exabyte - 1,000,000,000,000,000,000 bytes — 1018 Zettabyte - 1,000,000,000,000,000,000,000 bytes - 1021.
  • 78. Owning Your Life(at least online)
  • 79. Internet Safety Rules for 2009 Monitor and manage your privacy settings Your email address(es) Post only what you don’t want to come back to haunt you Make the Internet serve you Create your own Internet persona
  • 80. ?
  • 81. My Internet persona can be found at www.udel.edu/sine

Notes de l'éditeur

  1. High schoolers do stupid things…
  2. Video of think before you post
  3. Stupid teenage tricks
  4. Is Google Making Us Stupid? by Nicholas Carr – Atlantic Monthly, July/August 2008"According to Vorgan (The Memory Bible) and Small, one of America’s leading neuroscientists, digital technology has altered the neural circuitry in human brains and triggered an evolutionary process in just one generation. The authors identify the inherent problems and challenges this poses, providing a technology toolkit filled with strategies to preserve one’s humanity and keep up with the latest technology. They make their case based on abundant research in the areas of health, psychology, pediatrics, education, business, and technology. Their exercises include developing face-to-face communication skills as well as mastering electronic games. A compelling as well as timely read, this is highly recommended for all libraries.” "iBRAIN: Surviving the Technological Alteration of the Modern Mind."
  5. Cha Cha video
  6. Corey Vidal video