SlideShare uma empresa Scribd logo
1 de 29
Baixar para ler offline
II – Teaching and Parenting
       in a Digital Age
   Raising Faithful Young People
         in Media Cultures
         Diocese of Laredo
           June 16, 2012
The Internet. . .
. . . has become a fact of
    life. Approach it like you
    do other potentially
    dangerous activities –
    like walking home from
    school, driving a car,
    riding a skateboard –
    and teach your kids
    how to use the
    technology responsibly.
Digital Natives
Rethinking Learning:
               The 21st Century Learner




http://www.youtube.com/watch?v=c0xa98cy-Rw&feature=related
Step 1: don’t panic!
There are a lot of hysterical, over-the-top
reports on your local evening news about the
latest crazy, dangerous, end-of-civilization-as-
we-know-it threat to all that is good and decent,
but the truth is not quite so dangerous. Yes, bad
things can happen to kids who are not savvy
online, but there are simple things you can do
to help prevent them.
Internet Risk Factors
1. Technological: Those that threaten your
   computer.
2. Emotional: Those that imperil psychological
   well-being.
3. Physical: Those that pose the potential for
   bodily danger.
Technological Risks
          •   Viruses
          •   Hackers
          •   Email Attachments
          •   Storage Devices
          •   Page Links
          •   Email Forgery
Technological Risks
                                                                                  • Unlikely Scenario’s
                                                                                  • Hoaxes
                                                                                  • That all seem plausible
                                                                                    When unsure about an
                                                                                    email, internet plea or
                                                                                    rumor:
                                                                                  • Hoaxbusters
                                                                                  • Snopes
http://cartoonstudent.blogspot.com/2009/09/preston-blair-ethnic-skepticism.html   • Truth or Fiction
SPAM Definition
                                                                                   •      The word "Spam" as applied to Email means
                                                                                          "Unsolicited Bulk Email".
                                                                                          Unsolicited means that the Recipient has not
                                                                                          granted verifiable permission for the
                                                                                          message to be sent. Bulk means that the
                                                                                          message is sent as part of a larger collection
                                                                                          of messages, all having substantively
                                                                                          identical content.
                                                                                          A message is Spam only if it is both
                                                                                          Unsolicited and Bulk.

                                                                                   •      Unsolicited Email is normal email
                                                                                          (examples: first contact enquiries, job
                                                                                          enquiries, sales enquiries)


                                                                                   •      Bulk Email is normal email
                                                                                          (examples: subscriber newsletters, customer
                                                                                          communications, discussion lists)

http://www.allspammedup.com/2011/04/spam-reduced-by-more-than-a-third-since-rustock-takedown-bagle-and-others-step-in-to-fill-the-void/
Emotional Risks
Pre-Internet World               Internet World
• Petty note passing             • Instant messaging or text
• Rumors                            messaging harassment
• Overall back-biting behavior   • Stealing Passwords
                                 • Abusive “hate” websites or
                                    Facebook groups
                                 • Sending pictures through
                                    email and mobile phones
                                 • Sending porn and other
                                    spam email
Catholic Social Teaching (CST)
Seven themes of CST                                                     L & G of Human Person
• Life and Dignity of the Human                                         • human life is sacred
  Person                                                                • dignity of the human person is
• Call to Family, Community,                                              the foundation of a moral
  and Participation                                                       vision for society.
                                                                        • every person is precious
• Rights and Responsibilities
                                                                        • people are more important
• Option for the Poor and                                                 than things
  Vulnerable                                                            • the measure of every
• The Dignity of Work and the                                             institution is whether it
  Rights of Workers                                                       threatens or enhances the life
• Solidarity                                                              and dignity of the human
                                                                          person.
• Care for God's Creation

http://www.usccb.org/beliefs-and-teachings/what-we-believe/catholic-social-teaching/seven-themes-of-catholic-social-teaching.cfm
Simple Question
• Would you say what you are saying online
  directly to the person F2F?
Emotional Risks




http://www.ua.edu/features/abcsofeducation/cyberbullying.html
What Can Happen
• Instant messaging or   • Look for constant
  text messaging           barrages of negative or
  harassment               threatening instant
                           messages or texts.
                         • Watch for “false names”
                           – sometimes others
                           create to spread rumors
                           that your child will be
                           blamed for.
What Can Happen
• Stealing passwords   • Remind your child to
                         never release his/her
                         password to others.
                       • Keep it safe.
What Can Happen
• Abusive “hate” websites • Bullies can easily create
  or Facebook groups        “ihatebobbysmith.com”
                            or a Facebook group
                            called “Jenny Robbins at
                            East Middle School Is a
                            Tramp.”
                          • Use the site’s reporting
                            function to have it
                            suspended.
What Can Happen
• Sending pictures    • Often pictures of a kid
  through email and     in a compromising
  mobile phones         position – changing in a
                        locker room, showering
                        after a sports practice
                        or using the bathroom.
                      • Can be broadcast at
                        school or world-wide.
What Can Happen
• Sending porn and other   • It’s easy for a bully to
  spam email                 use a friend’s email
                             address to sign him/her
                             up on any number of
                             pornographic websites
                           • Often flood’s the
                             friend’s inbox with
                             inappropriate material.
What Can YOU Do?
• Listen and do not jump to conclusions!
• When a child says that he/she is being bullied,
  or made to feel unsafe physically or
  emotionally, this should be taken just as
  seriously as the same situation in the physical
  world.
Once you know that “bullies” are ….
Targeting Your Child – What Can YOU do?
• Deny Access – but does not do much to solve
  the problem
• Map the extent of the bullying: Understand
  the full picture
• Step-by-step remediation: (1) If password was
  hijacked, change it! (2) Post to discredit
  anything that was said. (3) Review password
  strength. See password strength tips.
Once you know that “bullies” are ….
Targeting Your Child – What Can YOU do?
• Contact school authorities and/or parents:
  – If on school grounds – contact school
    administration
  – If “after school hours” – go straight to parents of
    the suspected perpetrator.
Remember….
Ultimately – you may NOT be able to “fix” the
  problem!
• Teach child how to handle the pressure
  without letting it affect his or her mental
  health.
• You cannot prevent it! Giving the child the
  skills to handle a cyber-bullying attack can also
  give them the poise and street smarts that will
  help them be more effective in adult world.
Physical Risks




http://moralestireautoelectrical.com/
Physical Risks
Risk from a sex offender:
• Child spends large amounts of time online,
  especially at night.
• Pornography found on child’s computer
  (supplied by an adult or other solicitor).
• Child receives phone calls from adults you
  don’t know or is making calls (sometimes
  long-distance calls) to numbers you don’t
  recognize.
Physical Risks
Risk from a sex offender:
• Child receives mail, gifts or packages from
  someone you do not know.
• Child turns monitor off or quickly changes the
  screen on the monitor when you come into
  the room.
• Child becomes withdrawn from the family.
• Child is using an online account that belongs
  to someone else.
Parental Controls
If younger children (under 13):
• MS Windows 7 – offers convenient and easy-to-
   configure parental controls.
  – Tools – Internet Options > Content > Content Advisor
• Internet filtering software (nannyware)
• Location Control
• Make sure kids know they can come to you if they
  inadvertently see something they don’t
  understand or that frightens them.
Honesty really is the best policy
Have frank, consequences-free discussion with
  kids about their online activities:
• Ask – what sites they frequent the most?
• What are they doing on these sites?
• Why they like those sites?
• Be their friend – FB etc. – but keep a low
  profile.
Also learn more about. . .
Digital Citizenship -
  http://www.delicious.com/ccerveny/DigitalCitizenship
  or http://bit.ly/LuImwH
Social Media -
  http://www.delicious.com/stacks/view/HM8sag or
  http://bit.ly/NsSN6J
How to Teach Internet Safety to Younger Elementary
  Students – http://www.edutopia.org/blog/internet-
  safety-younger-elementary-mary-beth-hertz or
  http://bit.ly/KqWf1R
OSV In Focus – The Catholic Guide to The Internet
OSV Catholic Parent Know How – Internet & Families
Caroline Cerveny, SSJ-TOSF, D. Min.
• E-mail: c.cerveny@verizon.net
• ACyberPilgrim Blog: www.acyberpilgrim.org
• Catechesis 2.0: www.catechesis20.org
• Facebook:
  https://www.facebook.com/c.cerveny
• Twitter: @ccerveny
• LinkedIn:
  http://www.linkedin.com/in/carolinecerveny

Mais conteúdo relacionado

Mais procurados

Participant Guide for INROADS Social Networking Training
Participant Guide for INROADS Social Networking TrainingParticipant Guide for INROADS Social Networking Training
Participant Guide for INROADS Social Networking TrainingAngela Siefer
 
20100625 gov2.0 cmrs
20100625 gov2.0 cmrs20100625 gov2.0 cmrs
20100625 gov2.0 cmrsPolyU
 
Who is the digital you?
Who is the digital you?Who is the digital you?
Who is the digital you?Tony Fish
 
Adfed Central Minnesota - August 2010 - Curation: Celebrating Constraints
Adfed Central Minnesota - August 2010 - Curation: Celebrating ConstraintsAdfed Central Minnesota - August 2010 - Curation: Celebrating Constraints
Adfed Central Minnesota - August 2010 - Curation: Celebrating ConstraintsJoseph Rueter
 
Using netnography for studying "pure" cyber-cultures
Using netnography for studying "pure" cyber-culturesUsing netnography for studying "pure" cyber-cultures
Using netnography for studying "pure" cyber-culturesEmerson Marques Pedro
 
IBM and Social Media Strategies and Tactics
IBM and Social Media Strategies and TacticsIBM and Social Media Strategies and Tactics
IBM and Social Media Strategies and TacticsChristian Carlsson
 
Authors metadatarightssocialmediafv
Authors metadatarightssocialmediafvAuthors metadatarightssocialmediafv
Authors metadatarightssocialmediafvpeterclifton
 

Mais procurados (7)

Participant Guide for INROADS Social Networking Training
Participant Guide for INROADS Social Networking TrainingParticipant Guide for INROADS Social Networking Training
Participant Guide for INROADS Social Networking Training
 
20100625 gov2.0 cmrs
20100625 gov2.0 cmrs20100625 gov2.0 cmrs
20100625 gov2.0 cmrs
 
Who is the digital you?
Who is the digital you?Who is the digital you?
Who is the digital you?
 
Adfed Central Minnesota - August 2010 - Curation: Celebrating Constraints
Adfed Central Minnesota - August 2010 - Curation: Celebrating ConstraintsAdfed Central Minnesota - August 2010 - Curation: Celebrating Constraints
Adfed Central Minnesota - August 2010 - Curation: Celebrating Constraints
 
Using netnography for studying "pure" cyber-cultures
Using netnography for studying "pure" cyber-culturesUsing netnography for studying "pure" cyber-cultures
Using netnography for studying "pure" cyber-cultures
 
IBM and Social Media Strategies and Tactics
IBM and Social Media Strategies and TacticsIBM and Social Media Strategies and Tactics
IBM and Social Media Strategies and Tactics
 
Authors metadatarightssocialmediafv
Authors metadatarightssocialmediafvAuthors metadatarightssocialmediafv
Authors metadatarightssocialmediafv
 

Semelhante a Part II: Teaching and Parenting in a Digital Age

David Troy - Presentation at Emerging Communications Conference & Awards (eCo...
David Troy - Presentation at Emerging Communications Conference & Awards (eCo...David Troy - Presentation at Emerging Communications Conference & Awards (eCo...
David Troy - Presentation at Emerging Communications Conference & Awards (eCo...eCommConf
 
Computer Security
Computer SecurityComputer Security
Computer Securitytonik
 
Eis thu 900 kip edwardson
Eis thu 900 kip edwardsonEis thu 900 kip edwardson
Eis thu 900 kip edwardsonMediaPost
 
Cyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_onlineCyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_onlineFtlwood Families
 
Umar yahaya
Umar yahayaUmar yahaya
Umar yahayaUmar Zai
 
Bible Tech2009 John Dyer How Bible Technology Shapes Our Faith
Bible Tech2009 John Dyer How Bible Technology Shapes Our FaithBible Tech2009 John Dyer How Bible Technology Shapes Our Faith
Bible Tech2009 John Dyer How Bible Technology Shapes Our FaithB Jones
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Donald E. Hester
 
CNW Presents... The New PR: Creating & Curating Trusted Content from @CraigSi...
CNW Presents... The New PR: Creating & Curating Trusted Content from @CraigSi...CNW Presents... The New PR: Creating & Curating Trusted Content from @CraigSi...
CNW Presents... The New PR: Creating & Curating Trusted Content from @CraigSi...CNW Group
 
Digital communication anabelly
Digital communication anabelly Digital communication anabelly
Digital communication anabelly anabellymata
 
Change 改變 (2011.06.30@STL 明光社)
Change 改變 (2011.06.30@STL 明光社)Change 改變 (2011.06.30@STL 明光社)
Change 改變 (2011.06.30@STL 明光社)Calvin C. Yu
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshareMarian Merritt
 
Introduction to World Wide Web
Introduction to World Wide WebIntroduction to World Wide Web
Introduction to World Wide WebMarlon Jamera
 
CNW Presents... The New PR: Creating & Curating Trusted Content from @CraigSi...
CNW Presents... The New PR: Creating & Curating Trusted Content from @CraigSi...CNW Presents... The New PR: Creating & Curating Trusted Content from @CraigSi...
CNW Presents... The New PR: Creating & Curating Trusted Content from @CraigSi...CNW Group
 
B.S. Detection for Digital Content
B.S. Detection for Digital ContentB.S. Detection for Digital Content
B.S. Detection for Digital ContentCraig Silverman
 
和你在一起 Be There (2011.11.03@九龍城浸信會KCBC)
和你在一起 Be There (2011.11.03@九龍城浸信會KCBC)和你在一起 Be There (2011.11.03@九龍城浸信會KCBC)
和你在一起 Be There (2011.11.03@九龍城浸信會KCBC)Calvin C. Yu
 
Multichannel Fundraising For Nonprofits - Bridge Conference 2012
Multichannel Fundraising For Nonprofits - Bridge Conference 2012Multichannel Fundraising For Nonprofits - Bridge Conference 2012
Multichannel Fundraising For Nonprofits - Bridge Conference 2012Moira Kavanagh
 
lecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkinglecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkingHamid Zainudin
 
Digital communication anabelly
Digital communication anabelly Digital communication anabelly
Digital communication anabelly anabellymata
 

Semelhante a Part II: Teaching and Parenting in a Digital Age (20)

David Troy - Presentation at Emerging Communications Conference & Awards (eCo...
David Troy - Presentation at Emerging Communications Conference & Awards (eCo...David Troy - Presentation at Emerging Communications Conference & Awards (eCo...
David Troy - Presentation at Emerging Communications Conference & Awards (eCo...
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Eis thu 900 kip edwardson
Eis thu 900 kip edwardsonEis thu 900 kip edwardson
Eis thu 900 kip edwardson
 
Cyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_onlineCyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_online
 
Umar yahaya
Umar yahayaUmar yahaya
Umar yahaya
 
Bible Tech2009 John Dyer How Bible Technology Shapes Our Faith
Bible Tech2009 John Dyer How Bible Technology Shapes Our FaithBible Tech2009 John Dyer How Bible Technology Shapes Our Faith
Bible Tech2009 John Dyer How Bible Technology Shapes Our Faith
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
 
CNW Presents... The New PR: Creating & Curating Trusted Content from @CraigSi...
CNW Presents... The New PR: Creating & Curating Trusted Content from @CraigSi...CNW Presents... The New PR: Creating & Curating Trusted Content from @CraigSi...
CNW Presents... The New PR: Creating & Curating Trusted Content from @CraigSi...
 
Digital communication anabelly
Digital communication anabelly Digital communication anabelly
Digital communication anabelly
 
Change 改變 (2011.06.30@STL 明光社)
Change 改變 (2011.06.30@STL 明光社)Change 改變 (2011.06.30@STL 明光社)
Change 改變 (2011.06.30@STL 明光社)
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 
Introduction to World Wide Web
Introduction to World Wide WebIntroduction to World Wide Web
Introduction to World Wide Web
 
CNW Presents... The New PR: Creating & Curating Trusted Content from @CraigSi...
CNW Presents... The New PR: Creating & Curating Trusted Content from @CraigSi...CNW Presents... The New PR: Creating & Curating Trusted Content from @CraigSi...
CNW Presents... The New PR: Creating & Curating Trusted Content from @CraigSi...
 
B.S. Detection for Digital Content
B.S. Detection for Digital ContentB.S. Detection for Digital Content
B.S. Detection for Digital Content
 
和你在一起 Be There (2011.11.03@九龍城浸信會KCBC)
和你在一起 Be There (2011.11.03@九龍城浸信會KCBC)和你在一起 Be There (2011.11.03@九龍城浸信會KCBC)
和你在一起 Be There (2011.11.03@九龍城浸信會KCBC)
 
Multichannel Fundraising For Nonprofits - Bridge Conference 2012
Multichannel Fundraising For Nonprofits - Bridge Conference 2012Multichannel Fundraising For Nonprofits - Bridge Conference 2012
Multichannel Fundraising For Nonprofits - Bridge Conference 2012
 
Computer security
Computer securityComputer security
Computer security
 
E-mail marketing: You're killing your reputation
E-mail marketing: You're killing your reputationE-mail marketing: You're killing your reputation
E-mail marketing: You're killing your reputation
 
lecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkinglecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networking
 
Digital communication anabelly
Digital communication anabelly Digital communication anabelly
Digital communication anabelly
 

Mais de Caroline Cerveny

Digital Discipleship: Who Me?
Digital Discipleship: Who Me?Digital Discipleship: Who Me?
Digital Discipleship: Who Me?Caroline Cerveny
 
Tools 4-Communications Ministry
Tools 4-Communications MinistryTools 4-Communications Ministry
Tools 4-Communications MinistryCaroline Cerveny
 
The Role of Technology in the Catechetical Vision
The Role of Technology in the Catechetical VisionThe Role of Technology in the Catechetical Vision
The Role of Technology in the Catechetical VisionCaroline Cerveny
 
Parish Digital Communication
Parish Digital CommunicationParish Digital Communication
Parish Digital CommunicationCaroline Cerveny
 
Becoming Digital Disciples: Easier Than You Think
Becoming Digital Disciples: Easier Than You ThinkBecoming Digital Disciples: Easier Than You Think
Becoming Digital Disciples: Easier Than You ThinkCaroline Cerveny
 
Being A Digital Missionary Disciple
Being A Digital Missionary DiscipleBeing A Digital Missionary Disciple
Being A Digital Missionary DiscipleCaroline Cerveny
 
The Role of Technology in the Catechetical Vision
The Role of Technology in the Catechetical VisionThe Role of Technology in the Catechetical Vision
The Role of Technology in the Catechetical VisionCaroline Cerveny
 
Integrating Technology Into Faith Formation
Integrating Technology Into Faith FormationIntegrating Technology Into Faith Formation
Integrating Technology Into Faith FormationCaroline Cerveny
 
Being a Digital Missionary Disciple
Being a Digital Missionary DiscipleBeing a Digital Missionary Disciple
Being a Digital Missionary DiscipleCaroline Cerveny
 
To Be and Become Digital Missionary Disciples
To Be and Become Digital Missionary DisciplesTo Be and Become Digital Missionary Disciples
To Be and Become Digital Missionary DisciplesCaroline Cerveny
 
Proclaiming Christ in the Digital Age
Proclaiming Christ in the Digital AgeProclaiming Christ in the Digital Age
Proclaiming Christ in the Digital AgeCaroline Cerveny
 
Technology & Pastoral Planning 2016
Technology & Pastoral Planning 2016Technology & Pastoral Planning 2016
Technology & Pastoral Planning 2016Caroline Cerveny
 
Evangelization in a Digital Age - TRS 866DM
Evangelization in a Digital Age - TRS 866DMEvangelization in a Digital Age - TRS 866DM
Evangelization in a Digital Age - TRS 866DMCaroline Cerveny
 
Digital Discipleship Network
Digital Discipleship NetworkDigital Discipleship Network
Digital Discipleship NetworkCaroline Cerveny
 
Top 25 Tools for Digital Discipleship
Top 25 Tools for Digital DiscipleshipTop 25 Tools for Digital Discipleship
Top 25 Tools for Digital DiscipleshipCaroline Cerveny
 
Building the Future of Catechesis in a Digital World
Building the Future of Catechesis in a Digital WorldBuilding the Future of Catechesis in a Digital World
Building the Future of Catechesis in a Digital WorldCaroline Cerveny
 
Interpretive Authority in an Internet-Driven Participatory Culture
Interpretive Authority in an Internet-Driven Participatory CultureInterpretive Authority in an Internet-Driven Participatory Culture
Interpretive Authority in an Internet-Driven Participatory CultureCaroline Cerveny
 
Building the Future of Catechesis
Building the Future of CatechesisBuilding the Future of Catechesis
Building the Future of CatechesisCaroline Cerveny
 

Mais de Caroline Cerveny (20)

Digital Discipleship: Who Me?
Digital Discipleship: Who Me?Digital Discipleship: Who Me?
Digital Discipleship: Who Me?
 
Tools 4-Communications Ministry
Tools 4-Communications MinistryTools 4-Communications Ministry
Tools 4-Communications Ministry
 
The Role of Technology in the Catechetical Vision
The Role of Technology in the Catechetical VisionThe Role of Technology in the Catechetical Vision
The Role of Technology in the Catechetical Vision
 
Parish Digital Communication
Parish Digital CommunicationParish Digital Communication
Parish Digital Communication
 
Becoming Digital Disciples: Easier Than You Think
Becoming Digital Disciples: Easier Than You ThinkBecoming Digital Disciples: Easier Than You Think
Becoming Digital Disciples: Easier Than You Think
 
Being A Digital Missionary Disciple
Being A Digital Missionary DiscipleBeing A Digital Missionary Disciple
Being A Digital Missionary Disciple
 
The Role of Technology in the Catechetical Vision
The Role of Technology in the Catechetical VisionThe Role of Technology in the Catechetical Vision
The Role of Technology in the Catechetical Vision
 
Integrating Technology Into Faith Formation
Integrating Technology Into Faith FormationIntegrating Technology Into Faith Formation
Integrating Technology Into Faith Formation
 
Being a Digital Missionary Disciple
Being a Digital Missionary DiscipleBeing a Digital Missionary Disciple
Being a Digital Missionary Disciple
 
To Be and Become Digital Missionary Disciples
To Be and Become Digital Missionary DisciplesTo Be and Become Digital Missionary Disciples
To Be and Become Digital Missionary Disciples
 
Proclaiming Christ in the Digital Age
Proclaiming Christ in the Digital AgeProclaiming Christ in the Digital Age
Proclaiming Christ in the Digital Age
 
Effective Small Groups
Effective Small GroupsEffective Small Groups
Effective Small Groups
 
Technology & Pastoral Planning 2016
Technology & Pastoral Planning 2016Technology & Pastoral Planning 2016
Technology & Pastoral Planning 2016
 
Evangelization in a Digital Age - TRS 866DM
Evangelization in a Digital Age - TRS 866DMEvangelization in a Digital Age - TRS 866DM
Evangelization in a Digital Age - TRS 866DM
 
Digital Discipleship Network
Digital Discipleship NetworkDigital Discipleship Network
Digital Discipleship Network
 
Twitter Tutorial
Twitter TutorialTwitter Tutorial
Twitter Tutorial
 
Top 25 Tools for Digital Discipleship
Top 25 Tools for Digital DiscipleshipTop 25 Tools for Digital Discipleship
Top 25 Tools for Digital Discipleship
 
Building the Future of Catechesis in a Digital World
Building the Future of Catechesis in a Digital WorldBuilding the Future of Catechesis in a Digital World
Building the Future of Catechesis in a Digital World
 
Interpretive Authority in an Internet-Driven Participatory Culture
Interpretive Authority in an Internet-Driven Participatory CultureInterpretive Authority in an Internet-Driven Participatory Culture
Interpretive Authority in an Internet-Driven Participatory Culture
 
Building the Future of Catechesis
Building the Future of CatechesisBuilding the Future of Catechesis
Building the Future of Catechesis
 

Último

fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 

Último (20)

fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

Part II: Teaching and Parenting in a Digital Age

  • 1. II – Teaching and Parenting in a Digital Age Raising Faithful Young People in Media Cultures Diocese of Laredo June 16, 2012
  • 2. The Internet. . . . . . has become a fact of life. Approach it like you do other potentially dangerous activities – like walking home from school, driving a car, riding a skateboard – and teach your kids how to use the technology responsibly.
  • 4. Rethinking Learning: The 21st Century Learner http://www.youtube.com/watch?v=c0xa98cy-Rw&feature=related
  • 5. Step 1: don’t panic! There are a lot of hysterical, over-the-top reports on your local evening news about the latest crazy, dangerous, end-of-civilization-as- we-know-it threat to all that is good and decent, but the truth is not quite so dangerous. Yes, bad things can happen to kids who are not savvy online, but there are simple things you can do to help prevent them.
  • 6. Internet Risk Factors 1. Technological: Those that threaten your computer. 2. Emotional: Those that imperil psychological well-being. 3. Physical: Those that pose the potential for bodily danger.
  • 7. Technological Risks • Viruses • Hackers • Email Attachments • Storage Devices • Page Links • Email Forgery
  • 8. Technological Risks • Unlikely Scenario’s • Hoaxes • That all seem plausible When unsure about an email, internet plea or rumor: • Hoaxbusters • Snopes http://cartoonstudent.blogspot.com/2009/09/preston-blair-ethnic-skepticism.html • Truth or Fiction
  • 9. SPAM Definition • The word "Spam" as applied to Email means "Unsolicited Bulk Email". Unsolicited means that the Recipient has not granted verifiable permission for the message to be sent. Bulk means that the message is sent as part of a larger collection of messages, all having substantively identical content. A message is Spam only if it is both Unsolicited and Bulk. • Unsolicited Email is normal email (examples: first contact enquiries, job enquiries, sales enquiries) • Bulk Email is normal email (examples: subscriber newsletters, customer communications, discussion lists) http://www.allspammedup.com/2011/04/spam-reduced-by-more-than-a-third-since-rustock-takedown-bagle-and-others-step-in-to-fill-the-void/
  • 10. Emotional Risks Pre-Internet World Internet World • Petty note passing • Instant messaging or text • Rumors messaging harassment • Overall back-biting behavior • Stealing Passwords • Abusive “hate” websites or Facebook groups • Sending pictures through email and mobile phones • Sending porn and other spam email
  • 11. Catholic Social Teaching (CST) Seven themes of CST L & G of Human Person • Life and Dignity of the Human • human life is sacred Person • dignity of the human person is • Call to Family, Community, the foundation of a moral and Participation vision for society. • every person is precious • Rights and Responsibilities • people are more important • Option for the Poor and than things Vulnerable • the measure of every • The Dignity of Work and the institution is whether it Rights of Workers threatens or enhances the life • Solidarity and dignity of the human person. • Care for God's Creation http://www.usccb.org/beliefs-and-teachings/what-we-believe/catholic-social-teaching/seven-themes-of-catholic-social-teaching.cfm
  • 12. Simple Question • Would you say what you are saying online directly to the person F2F?
  • 14. What Can Happen • Instant messaging or • Look for constant text messaging barrages of negative or harassment threatening instant messages or texts. • Watch for “false names” – sometimes others create to spread rumors that your child will be blamed for.
  • 15. What Can Happen • Stealing passwords • Remind your child to never release his/her password to others. • Keep it safe.
  • 16. What Can Happen • Abusive “hate” websites • Bullies can easily create or Facebook groups “ihatebobbysmith.com” or a Facebook group called “Jenny Robbins at East Middle School Is a Tramp.” • Use the site’s reporting function to have it suspended.
  • 17. What Can Happen • Sending pictures • Often pictures of a kid through email and in a compromising mobile phones position – changing in a locker room, showering after a sports practice or using the bathroom. • Can be broadcast at school or world-wide.
  • 18. What Can Happen • Sending porn and other • It’s easy for a bully to spam email use a friend’s email address to sign him/her up on any number of pornographic websites • Often flood’s the friend’s inbox with inappropriate material.
  • 19. What Can YOU Do? • Listen and do not jump to conclusions! • When a child says that he/she is being bullied, or made to feel unsafe physically or emotionally, this should be taken just as seriously as the same situation in the physical world.
  • 20. Once you know that “bullies” are …. Targeting Your Child – What Can YOU do? • Deny Access – but does not do much to solve the problem • Map the extent of the bullying: Understand the full picture • Step-by-step remediation: (1) If password was hijacked, change it! (2) Post to discredit anything that was said. (3) Review password strength. See password strength tips.
  • 21. Once you know that “bullies” are …. Targeting Your Child – What Can YOU do? • Contact school authorities and/or parents: – If on school grounds – contact school administration – If “after school hours” – go straight to parents of the suspected perpetrator.
  • 22. Remember…. Ultimately – you may NOT be able to “fix” the problem! • Teach child how to handle the pressure without letting it affect his or her mental health. • You cannot prevent it! Giving the child the skills to handle a cyber-bullying attack can also give them the poise and street smarts that will help them be more effective in adult world.
  • 24. Physical Risks Risk from a sex offender: • Child spends large amounts of time online, especially at night. • Pornography found on child’s computer (supplied by an adult or other solicitor). • Child receives phone calls from adults you don’t know or is making calls (sometimes long-distance calls) to numbers you don’t recognize.
  • 25. Physical Risks Risk from a sex offender: • Child receives mail, gifts or packages from someone you do not know. • Child turns monitor off or quickly changes the screen on the monitor when you come into the room. • Child becomes withdrawn from the family. • Child is using an online account that belongs to someone else.
  • 26. Parental Controls If younger children (under 13): • MS Windows 7 – offers convenient and easy-to- configure parental controls. – Tools – Internet Options > Content > Content Advisor • Internet filtering software (nannyware) • Location Control • Make sure kids know they can come to you if they inadvertently see something they don’t understand or that frightens them.
  • 27. Honesty really is the best policy Have frank, consequences-free discussion with kids about their online activities: • Ask – what sites they frequent the most? • What are they doing on these sites? • Why they like those sites? • Be their friend – FB etc. – but keep a low profile.
  • 28. Also learn more about. . . Digital Citizenship - http://www.delicious.com/ccerveny/DigitalCitizenship or http://bit.ly/LuImwH Social Media - http://www.delicious.com/stacks/view/HM8sag or http://bit.ly/NsSN6J How to Teach Internet Safety to Younger Elementary Students – http://www.edutopia.org/blog/internet- safety-younger-elementary-mary-beth-hertz or http://bit.ly/KqWf1R OSV In Focus – The Catholic Guide to The Internet OSV Catholic Parent Know How – Internet & Families
  • 29. Caroline Cerveny, SSJ-TOSF, D. Min. • E-mail: c.cerveny@verizon.net • ACyberPilgrim Blog: www.acyberpilgrim.org • Catechesis 2.0: www.catechesis20.org • Facebook: https://www.facebook.com/c.cerveny • Twitter: @ccerveny • LinkedIn: http://www.linkedin.com/in/carolinecerveny