Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Etl523 pres jj jarick
1. “But mum and dad say its ok!”
K-6 student’s safety online.
A staff development session covering key
safety issues for K – 6 teachers.
James J Jarick
Teacher – Caringbah North PS
(1) (2)
2. A Digital Literacy Continuum
How can mums, dads and TEACHERS know what is safe?
They need help – Cybersafety
(3) (4) (5) (6)
(7) (8) (9)
3. This Presentation
(Key aspects of Cybersafety)
• So what is Cybersafety?
• Coming to grips with the jargon.
• Protecting your Digital Identity.
• Who’s your friend?
• Never an excuse for bad manners!
• It’s up to us!
• Other Issues
(10)
4. So what is Cybersafety
Definition:
Cybersafety is the safe and responsible
use of Information and Communication
Technologies (ICT).
(www.cybersafety.org.nz)
Safe use = no harm (physical, emotional or psychological) to themselves.
Responsible use = no harm to others.
(11)
5. Coming to grips with the jargon
(Terminology)
Online Profile / Digital Profile / Digital Identity:
The you that you generate online.
Digital Footprint:
The trail you leave about yourself when you’re on the
net.
Grooming:
When an adult takes deliberate actions to befriend and
establish an emotional connection with a child in order
to lower the child's inhibitions with the intent of later
having sexual contact. (Cybersmart – Glossary)
(12)
6. Protecting your Digital Identity
(Securityand Privacy)
• Set strong passwords. No “common passwords”,
even Kindy need to learn to protect themselves.
• Use effective and up to date virus / malware
protection. Once someone is in your computer /
device they can become you!
• Who do you want to share information with?
Check providers privacy policies and check privacy
settings in programs.
(Microsoft)
(13)
7. WEB 2.0 - Who’s your friend?
(Stranger Danger)
Fredrick Bloggs
bloggo@friendlymail.com
bloggo@friendlymail.com
**************
Month 10th Day18th
Year 2004
Other issues:
• Students can share to much personal information
• Students don’t protect their information
“Overview of Key Cybersafety Features”
http://www.dbcde.gov.au/easyguide
(unauthorised?)
(14)
8. There is never an excuse for
bad manners! (Online Etiquette)
• Cyberbullying is deliberately and repeatedly engage in hostile
behaviour to harm someone.
• All online activity, from any device on the department network can be
traced.
• Dangers
• Once something is posted on the net it can be difficult to remove all
copies of it (circulation).
• A huge, potentially global, audience.
"Netiquette" is network etiquette, the do's and don'ts of online communication.
(Ross, 2012)
(15)
9. It’s up to us!
(Policy and Strategies)
• Departmental policies
• School policies
• Changing behaviours
• Cybersafety Team
• Technology Audit – what are our students using
• Scope and sequence for Cybersafety training
• Resource units of work
• Train up staff in delivery
• Deliver
• Assess and review
(16)
10. Other Cybersafety issues that
may arise:
• Digital reputation
• Downloading
• Excessive internet use
• Identity theft
• Inappropriate content
• Online shopping
• Sexting
• Unwanted contact
• Violent / explicit content
11. Summary
As teachers we not only provide access for students to the world
via the internet we encourage students to utilise its power in
many different ways. With this instruction comes a responsibility
to ensure student safety in this “new?” and very open
environment.
Summary
Defined
Online Profiles
Other issues
Conclusion
12. Questions
1. Is there a natural hierarchy of risk that would form the basis for a
scope and sequence of cybersafety for K-6 students?
2. Are there cybersafety issues that should not be covered in K – 6?
3. How many people should be in the Cybersafety Team, open for all,
one from each grade (7) or one from each stage (4)?
This presentation
Bibliographyand Recommendedreading(Bold)
Cybersmart. (n.d.).
http://www.cybersmart.gov.au
Cybersmart. Glossary. (n.d). Retrieved from
http://www.cybersmart.gov.au/Parents/About%20the%20technology/Glossary.aspx
DBCDE. Overview of Key Cybersafety Features. (n.d.). Retrieved from
http://www.dbcde.gov.au/easyguide
Microsoft. Create strong passwords. (2012). Retrieved from
http://www.microsoft.com/en-au/security/online-privacy/passwords-create.aspx
Netsafe. What is Cybersafety? (n.d.). Retrieved from
www.cybersafety.org.nz/kit/welcome/cybersafety.html
Online Communication Services: Acceptable Usage for School Students. (n.d.). Retrieved from
https://www.det.nsw.edu.au/policies/general_man/general/accep_use/
Ross,S.T. (2012) Netiquette. Retrieved from
http://www.albion.com/netiquette/
All Images obtained from Google Images under Collective Commons
Notes de l'éditeur
Welcome to my presentation my name is James Jarick and I am currently a teacher at Caringbah North PS where I have a 4/5 composite class (CLICK). Caringbah North is a school in Sydney’s Sutherland Shire about 10 minutes from the beaches of Cronulla. There are 21 classes , two of which are OC classes and we have around 520 students. I share the role of Computer Coordinator with one of our OC teachers and prior to term 2 last year I had been the TL and Computer Coordinator at Clemton Park PS since 2003.As you can see my presentation today is aimed at K-6 teachers and its focus is on online safety. It is based on the premise that many teachers at my school are unfamiliar with these safety issues. But how can that be the case you ask.
A Digital Literacy Continuum?Ilike to put forward the concept that we all sit on a Digital Literacy Continuum that stretches from the Geekiest Computer Geek (eg Bill Gates) through to the least techno savvy of us e.g. my mum who still has 4 8s flashing on her microwave oven. Whilst we all sit at a different point on this continuum we have a duty of care to our students, one that many parents can not fulfil, in ensuring the safety of our students when they are utilising ICT.Let us firstly reflect on how this safety issue has arisen and take a minute to think about where we each sit on this continuum. For me this is how my technology journey started:(CLICK) Growing up in the late 60’s where if I wanted to contact someone I had to walk around the corner to a Red phone box. (CLICK) In the early 70’s we got a home phone like this BUT it had a lock and dad took the key to work (Analogue safety?)(CLICK) 1985 Work bought a Brick phone for safety issues because we were working off site. At $3,500 there still weren’t many about.(CLICK) In 1996 we purchased our first mobile phone. It cost $1200 plus plan for the simple reason that my wife was having our first son.(CLICK) In our household now we have a range of users, from my wife and myself who would best be described as purpose users. Josh (18) and uses tech to keep in touch with friend (and arrange parties) and Jayson (14) who has grown up with facebook, online gaming and instant access – for him it’s all just part life and doesn’t change fast enough.(CLICK)and who knows where this is all leading us to?Kids now can reach out across the world at the touch of a button and interact with anyone anywhere at any time– BUT WHO IS GUIDING AND PROTECTING THEM whilst they do this? (CLICK)As teachers our role has evolved along with this advancement in technology and a critical part of this new role is to ensure the safety of our students as they engage online.
This presentation covers 6 main areas of Cybersafety in what I believe is the order of importance for Kindergarten students through to Year 6. These areas are:(CLICK) Defining what we mean by the term Cybersafety(CLICK) Major Terminology that is used when talking about Cybersafety(CLICK) Security and Privacy whilst students are online(CLICK) Online Etiquette and how they behave(CLICK) Stranger Danger in an online setting(CLICK) Policies and Strategies that we need to be aware of and develop (CLICK) I have also included an “Other Issues” section where I highlight some of the many safety issues that students may face as they move into a High School setting or at home with older siblings.
So what is cybersafety? (CLICK) There are many definition of the term cybersafety, so why do I like this one from cybersafety NZ? Mainly because it is clear and simple, its two facets are to: (CLICK) act safely on the net to protect ourselves (CLICK) act responsibly on the net to protect othersSo, in summary cybersafety is not just about protecting our students from others, it is also about ensuring our students do not effect the safety of others.
There is a plethora of terminology in and about the internet and cybersafety. Three of the more important from theCybersmart Glossary include:Online Profile / Digital Profile / Digital Identity:(CLICK) is the you that you generate online. As we will see later on in the presentation this “you” on line can be factual, fictional, or a mixture of both.Digital Footprint: (CLICK) the trail you leave about yourself when you’re on the net. This footprint is important because it can be traced in a number of ways and build your profile. The most obvious is searching for yourself on the internet. This progresses all the way through to tracing what sites your computer visits via your IP address.Most concerning for us as teachers is the concept of Grooming.Grooming: (CLICK) occurs when an adult takes deliberate actions to befriend and establish an emotional connection with a child in order to lower the child's inhibitions with the intent of later having sexual contact. = onlinepredators
Microsoft suggest three key strategies to help protect your digital identity:The most common protection protocol takes the form of a username and password set. (CLICK) Set strong passwords. No “common passwords” even Kindy need to learn to protect themselves.These are our first line of defence and we must get students to recognise their importance and set and protect them appropriately.(CLICK) Use effective and up to date virus / malware protection. Once someone is in your computer / device they can become you!Virus protection is loaded and updated automatically on departmental devices and student information is protected by various firewalls. Student devices (BYOD) and home devices will be susceptible without up to date protection.(CLICK) Who do you want to share information with? Check providers privacy policies and check settings in programs.Protecting our privacy online is the same as protecting it offline. We wouldn’t hand out personal details to people we don’t know on the street so why would we want to do it to a bigger group online? Check privacy policies before we join web sites to see if they allow your information to be shared with third parties either partially or in full. Check wether web sites allow you to adjust privacy setting to restrict who has access to information that you decide to share online.Microsoft great advice for setting strong passwords on their website.Passwords: http://www.microsoft.com/en-au/security/online-privacy/passwords-create.aspx
When online one of the biggest areas of concern is that of Social Networking. Sites such as Facebook, Club Penguin and Twitter allow students to contact people they “think” they know. So, very quickly, how easy is it to set up an account?NameEmailPasswordMonth and dayYear = so I’m 8 yrs oldPhoto = obtained illegally for demonstration purposes was cropped straight from a school web pageAnd I’m done, I now have a profile as an 8 year old school boy. But who am I really? (Click 7)Age guidelines do apply to major social networking sites BUT of course they are easily falsified.Here we are talking about our major concern, Grooming and inappropriate contact and we need to make sure our students are aware that if they don’t “know” the person they could be anyone.Other issues with these web 2 sites include:(CLICK) Sharing too much personal information - photos, addresses, schools – any information that can make students locatable.(CLICK) Not protecting personal information - not just what we are sharing but who we are sharing it with. We need to set privacy settings so that they don’t end up with friends of friends of friends etc…(CLICK) For an overview of some of the key safety features on many of the more popular social networking and gaming sites visit the Department of Broadband, Communications and the Digital Economy website at http://www.dbcde.gov.au/easyguide
(CLICK) Online etiquette or Netiquette covers all aspects of online communication and as with normal etiquette there are a variety of interpretations and expectations about behaviour.(CLICK) One aspect of Netiquette that is universally agreed upon is the unacceptability of Cyberbullying, a deliberate and repeated attack on an individual.Students need to realise that the internet is not an anonymous environment and students can, and are, tracked and are held accountable for their online behaviour. If they are the target of this behaviour, as with any bullying behaviour, the earlier they speak out the quicker and easier it is to address the problem. Most or good web sites will have the facility to allow you to report inappropriate behaviour. http://www.albion.com/netiquette/http://www.cybersmart.gov.au/Parents/Cyber%20issues/Cyberbullying.aspx
DepartmentReview and familiarise ourselves with the departments policyOnline Communication Services: Acceptable Usage for School Studentshttps://www.det.nsw.edu.au/policies/general_man/general/accep_use/PD20020046.shtml?level=Which all department personnel, including students, agree to as a summary each time they log in.School policies need to be developed and these should aim at contextualise the departmental policies for application at a school level and cover areas such as:CybersafetyUse of Mobile devicesBYODThese policies need to be focused on changing behaviours and developing appropriate behaviours in students not just punitive.To do this we need to develop a Cybersafety Team with the initial tasks of :Design and construct a Technology Audit to measure what technology our students are using as well as how they are using it.Develop a Scope and Sequence for Cybersafety training based on what and how our students are currently using technology.Resource units of workTrain up staff in delivery of this workDeliver the trainingAssess and review
Other Cybersafety issues may arise as students enter HS or that they may be exposed to through older siblings include things such as:Managing their Digital reputation as they build their online presentsDownloading, piracy and copyright Excessive internet use Identity theft Inappropriate content Online shoppingSexting Managing unwanted contact Violent / explicit content Many of these issues we would hope not to encounter at a K – 6 level and some are mitigated at school by the departments filters but I am also sure that as the web continues to work itself further into all our lives that other issues will arise and we will need to be in a position to respond quickly to the challenge of helping protect our students.
So in summary we have:Defining what we mean by the term CybersafetyMajor Terminology that is used when talking about CybersafetySecurity and Privacy whilst students are onlineProfiles and how easily they are to falsifyOnline Etiquette or Netequette and how they behaveStranger Danger in an online settingPolicies that we need to be aware of and Strategic process we can follow to achieve a positive outcome for our students.In conclusionAs teachers we not only provide access for students to the world via the internet we encourage students to utilise its power in many diferent ways. With this instruction comes a responsibility to ensure their safety in this new and very open environment.
QuestionsIs there a natural hierarchy of risk that would form the basis for a scope and sequence of cybersafety for K-6 students?Are there cybersafety issues that should not be covered in K – 6?How many people should be in the Cybersafety Team, one from each grade (7) or one from each stage (4)?Bibliography and recommendedreadings:Cybersmart. (n.d.).http://www.cybersmart.gov.auCybersmart. Glossary. (n.d). Retrieved from http://www.cybersmart.gov.au/Parents/About%20the%20technology/Glossary.aspxDBCDE. Overview of Key Cybersafety Features. (n.d.). Retrieved fromhttp://www.dbcde.gov.au/easyguide Microsoft. Create strong passwords. (2012). Retrieved fromhttp://www.microsoft.com/en-au/security/online-privacy/passwords-create.aspxNetsafe. What is Cybersafety? (n.d.). Retrieved fromwww.cybersafety.org.nz/kit/welcome/cybersafety.htmlOnline Communication Services: Acceptable Usage for School Students. (n.d.). Retrieved fromhttps://www.det.nsw.edu.au/policies/general_man/general/accep_use/Ross,S.T. (2012)Netiquette. Retrieved fromhttp://www.albion.com/netiquette/All images sourced under CC-BY-SA or approved for use by Caringbah North PS.Caringbah North Public School - James Joseph JarickCaringbah North Public School – 4/5Jhttp://commons.wikimedia.org/wiki/Category:Haroldswickwww.fotopedia.com/items/flickr-425100484http://thomasdavisgrouprealty.com/2011/07/things-to-do-with-your-old-cell-phone/http://foter.com/Oldschool%20phone/http://www.flickr.com/photos/25031050@N06/4442939883/http://www.speedofcreativity.org/feed/atom/Microsoft ClipartMicrosoft Cliparthttp://library.thinkquest.org/06aug/01158/home.htmlhttp://www.kippypdesigns.com/2012/11/blah-blah-blah.htmlhttp://newdelhi.olx.in/cyber-security-assesment-risk-analysis-services-iid-447575682http://www.flickr.com/photos/chexed/1546923312/https://en.wikipedia.org/wiki/File:HisgirlFriday.jpgCaringbah North PS