What is Broadband? ”Data transmission technology that provides two-way data transmission to and from the Internet with advertised speeds of at least 768 kilobits per second (kbps) downstream and at least 200 kbps upstream to end users.” Source: Connect Michigan Website http://connectmi.org/mapping/Frequently_Asked_Questions.php So basically it’s high speed internet. Agenda • Survey • BTOP Staff & Grant Information • Objectives & Possibilities • 21st Century Skills • Expectations • Internet Safety & Cyberbullying • Lighthouse • Questions? BTOP Welcome and Introduction Michigan State University Western Michigan University Masters in Biology LaSalle High School Barb Light EUPISD BTOP Project Director Suzy Belonga Instructional Technologist Northern Michigan University Elementary Education and English, 2001 Northern Arizona University Masters in Educational Technology, 2010 Northern Michigan University Education Specialist Brimley Area Schools Science and Technology Middle School Teacher Twin Peaks Elementary Second and Fourth grade teacher • Two more new positions at the ISD: •Computer techs Kathy Fountain, Mike Rivenburgh • Technicians will be available to assist with broadband connections in home. Broadband Technology Opportunities Program (BTOP) http://tinyurl.com/EUPBTOP (also tinyurl.com/eupbtop) A Federal Grant Program • Our category is sustainable broadband adoption: Anywhere, anytime computing. • American Recovery and Reinvestment Act funds ($10 billion) • National Telecommunications and Information Administration ($4.8 billion of the $10 billion) EUPISD’s Grant Money • $3.165 million federal cash award • $1.275 million match • $ 760,000 cash • District match of $50.00/student/year (includes device, tech support, software, community awareness) • $ 515,000 in-kind (district tech personnel time and use of school facilities, for example) Why Us? • We are an underserved area for broadband. • Previous educational technology initiatives in this region – WE ARE READY!!! • Visionary thinking at the EUPISD. “…young people thrive in a world of ever-changing images, constant updates, and immediate access to whatever information they may want.” (Tony Wagner, The Global Achievement Gap, 2008, p. 177) What are the objectives? • Increase broadband adoption throughout Chippewa, Mackinac, and Luce counties • Community awareness • Economic development • Medical resources • Educational opportunities • School to home education possibilities Engagement is the key! • One-to-one computing is a great engager because it is in the hands of the student actively learning with technology. “The use of the Internet and other digital technology has transformed both what young people learn today and how they learn.” (Wagner, 2008, p.178) 10 Economic Possibilities • advance small businesses • online bill paying/banking • compare companies/prices • secure shopping • store coupons/ads Medical Possibilities • Medical research: know symptoms, • • • medicine side effects, solutions, etc. Online programs and information offered by health insurances. Search for the correct provider/specialist. Online pharmacies: order and mail to you! Educational Possibilities “So, are today’s students – and tomorrow’s workers – less motivated or just motivated in ways that may be unique to their generation?” (Wagner, 2008, p.38) • Raise expectations • Online class experience • Individualize • Remediation and enrichment activities, personalized projects, educational games, etc. • Improve communication • Monitoring grades • 21st century ready Looking to the Future: To the CLOUD! • Access to tech tools and files from ANY internet connected device. • The EUPISD cloud will be for all students K–12 and staff. • Different for different groups of students. Skills for the st 21 Century 2006 Workforce Readiness Report Tony Wagner’s Survival Skills for 21st Century Workers Center for Public Education “The 21st Century Education” www.wordle.net Expectations • Fully charge and fully discharge your battery to increase battery life. • Wrapping cords too tight can break wires. • Treat the equipment, others, and yourself with respect. • Be gentle! • Placing things on top of the netbooks can cause damage. Expectations • Use ethically. • Ex. Copyright, bullying, appropriate posts, etc. • Anticipate traffic tripping on cords. • Have separate area for food and liquids. Expectations • Use the netbook educationally in and out of school. • Allow others in your home to use the netbook. • Bring it to school every day with a fully charged battery. Expectations • Report any problems to district tech staff immediately. • 3 year warranty includes accidental breakage. • Return it to school or ISD personnel prior to graduation or leaving the district. • Failure to do so may result in the anti-theft software being engaged and a report to the police. Expectations Computrace LoJack for Laptops • Built in from the beginning. • District only reports missing. • LoJack locates, works with law enforcement in tracking it. • Webcams are not remotely turned on by the district. Safeguarding Students Students’ online behavior • 61% of 13 to 17 yr. olds have a personal profile on a social networking page. “More teens who’ve talked to parents or • 71% report getting a message from somebody they don’t guardians know. also ignore messages from • 40% saidpeople, they usuallyrefuse reply. unfamiliar to reply or chat, • 18% said they would talk to an adult. block unknown senders, and report these • 30% have considered meetingadults.” someone that they’ve only occurrences to trusted Netsmartz.org talked to online. • 37% said they were not concerned about their private information being used online in ways they don’t want. Teen Internet Safety Study by Cox Communications and NCMEC2, found at NetSmartz.org Safety Tips for Students • Protect yourself online! When is it okay to post a • Think about what you are posting. Nothing is completely private when you write it online. picture of others online? a.) any time you want • Colleges/universities and employers are looking. b.) after you show it to your • Respectparents. others online: keep it appropriate. c.) once you have the • Delete unknown e-mails with attachments. permission of everybody in it. • Phone numbers, addresses, videos, travel plans, real names, etc. should be kept private. More Safety Tips for Students • Keep account IDs and passwords safe. • Be creative with screen names. • MHALLIFWWAS11@something.com • RARVAB6@nothing.com • Unsure? Log off and talk to a trusted adult! Safety Tips for Parents • Keep the computer in a central location. • Set time limits. • Time to play and a time to work. • Time to get up and move! • Your expectations • Be the student. Have your student teach you what a blog, tweet, post, etc. is. • Video networking. • Visit the sites: only self-policing. • Set expectations for uploading, viewing, etc. • Google your child’s name. What comes up? Images? • Understand and try their online games • Visit Netlingo.com and learn the acronyms: CD9 or 9, F2F, LMIRL, TAW, or TMA • Respecting copyrights • Netiquette • Be aware of cyber bullying More Safety Tips for Parents Where are kids bullied? What percentage of teens discuss Internet safety with parents? 36% 33% of 13 to 17 yr. olds and 48% of 16-17 yr. olds said parents do not know what they do online. SOURCE: U.S. Department of Justice, Bureau of Justice Statistics, School Crime Supplement (SCS) to the National Crime Victimization Survey, 2007. Cyberbullying One student using ANY technology to say rude, According to the National Crime mean, nasty and otherwise Prevention Council, which method things to about inappropriate another student. stop cyber bullying did most teens use? a. Report the cyber bully to an adult. b. Refuse to pass on the cyber bullying message. c. Tell the cyber bully to stop. 44% 64% A great source of information: http://www.stopcyberbullying.org True or False? Cyberbullying Statement True or False • Bullying only happens online now. • • • A bully can be a target and a target can become a bully. • You will never get bullied when you grow up. False. Unfortunately, bullying can happen anywhere. True. Bullies are often the target of another bully. Also, if a target answers taunts in a rude, harmful way, they become the bully. • False. Unfortunately, bullying can happen at any age, but you can learn appropriate techniques to prevent or stop it. See The Washington Post’s “5 Myths about bullying” for more information. What do you do about cyber bullying? 1. Prevent it. • • • • Do NOT post in anger or frustration. It is not entertainment. Report it to your trusted adult. Think about what you are posting. It’s not private once it is sent. 2. Action not audience. Ignore or block it. Don’t respond. Report bullying behavior to the school, police, ISP, cell phone service, or host site (MySpace,YouTube, etc.). Don’t be a willing bystander or help spread it to others. • Vouchers Website: http://tinyurl.com/EUPBTOP Email: sbelonga@eup.k12.mi.us Questions?