Learning+Activity+7-D-1+and+7-D-2

=Home > Learning Activity 7-D-1 and 7-D-2=

To add your lesson plan (7-D-1):

 * 1) Click the **Edit** tab in the upper-right corner.
 * 2) Scroll down the page until you see the first empty lesson plan space.
 * 3) Highlight the "//Your Name//" text.
 * 4) Type your name.
 * 5) Highlight the "//Enter Lesson Plan here//." text.
 * 6) Type or copy and paste your lesson plan.
 * 7) Press **Save** on the Editor bar.

To add your permission letter (7-D-2):

 * 1) Click the **Edit** tab in the upper-right corner.
 * 2) Scroll down the page until you see the //Permission Letter// section directly under your lesson plan.
 * 3) Highlight the "//Enter Permission Letter// //here//." text.
 * 4) Type or copy and paste your permission letter.
 * 5) Press **Save** on the Editor bar.

To comment on a classmate's lesson plan and/or permission letter:

 * 1) Click on the **Discussion** tab at the top of the page.
 * 2) Click the **New Post** button.
 * 3) In the **Subject** field, enter the //name// of your classmate followed by "//Lesson Plan Feedback//" (ex. Laura's Lesson Plan Feedback).
 * 4) In the **Message** field, type in your feedback.
 * 5) Click **Post**.

Lesson Plan
media type="youtube" key="xZHq4CQekTY" width="268" height="248" align="center"

Objective: Students will realize the potential dangers of giving personal information to people who comment on their blog posts in the classroom. Technology to Be Used: Blog posts for Writing Essay’s and the Internet Safety Video found on youtube. How Technology Will be Used: I work with individual teachers in the school, determine what they are doing in their classroom and come up with a way as to how I can supplement their curriculum using my knowledge and the computers in the lab. 5th Grade students have to work on writing skills and are required to take a writing test at the end of the year. I will have the students take their essays that they are working on for the state writing tests and have them post them on my class blog for everyone to read and critique. Before doing so, I will show them the video “Internet Safety” and how easy it is for strangers to disguise themselves as elementary students in order to get personal information from them. By showing them this video, I will ultimately be teaching them to be very careful when responding to a comment that was made on their blog and help them realize the dangers of providing ANY personal information. If the students find content or comments that are in appropriate, they will be instructed to report it to me so we will come up with a safe way to handle the problem

Permission Letter
Dear Families: In the future, your child will be posting work to my Blog located at [|www.deibertsdigitaldumop.wordpress.com]. Students will be using personal Weblogs to post their writing to the Internet. By doing so, you will be able to see all the work that your child is doing in school and comment on their work. You will also be able to comment/critique other students work as well and provide suggestions for them and engage in improvement. I will be gathering the writing material that Mrs. Deibert does in her 5th grade class. When the assignments are completed, the students will type their work into a word processing document and post their stories on my Blog. You will then be able to see all of the work that they completed. Other students and parents from all over the world will be able to leave comments on the blog regarding their work. This blogging project is designed to minimize risk to your child. The only personally identifying information included in the blog will be their first name. There will be no mention of our school name or our location. Students are allowed to post their interests and opinions, but not their age, email address, photographs of themselves, or other sensitive information. I will only be grading the work that they do in my lab as completed or incomplete. The actual grade that they receive from the writing assignment will come from Mrs. Deibert. Again, my blog can be found here www.deibertsdigitaldump.wordpress.com Before your child may start posting to their blog, we are asking for you and your child to discuss and sign the following form. Please return the form to Mr. Deibert. 1. Students using blogs are expected to act safely by keeping personal information out of their posts. You agree to not post or give out your family name, password, user name, email address, home address, school name, city, country or other information that could help someone locate or contact you in person. You may share your interests, ideas and preferences. 2. Students must submit their assignment to Mr. Deibert for him to post. Students are not allowed to post work on their own. 3. Students using blogs are expected to treat blogspaces as classroom spaces. Speech that is inappropriate for class is not appropriate for your blog. While we encourage you to engage in debate and conversation with other bloggers, we also expect that you will conduct yourself in a manner reflective of a representative of this school. 4. Students will only be posting their writing material to my blog at this time. 5. All comments that are left will be reviewed by myself and then shared with the class. I will determine if the student can reply to the comment, but all comments will be considered and dealt with in Mrs. Deibert’s class. . 7. Students who do not abide by these terms and conditions may lose their opportunity to take part in this project.
 * How it Works**
 * Security**
 * Assessment**
 * Resources**
 * Permission**
 * //Blogging Terms and Conditions//**

I have read and understood these blogging terms and conditions. I agree to uphold them. student’s signature:_ date: parent’s signature: _ date:

Lesson Plan
I teach a unit on the Battle of Gettysburg.It is a unit that is presented in a six week format.I will present one lesson from this unit. A.Through teacher direction, students will understand the aftermath of the battle. They learn about the deaths, and sickness’ that faced the soldiers. They will gain a better understanding of what the town looked like on July 4th. B.Through the resources below, students will have to first do an investigation.They will have to research these sites looking for key information that pertains to the life of a Civil War soldier. [] [] [] [] C. Students will be able to mark these sites on their **delicious site**, making it easier for them to refer back and forth to. D. They may access **Flickr** to find photos that may pertain to a Civil War soldier. E. They will share their findings to the rest of the class on our **wik**i page.They are required to reference which site the information came from as well as flickr resources.Students will be able to use each others information from here to produce their blog. F. In a whole class discussion the students will report their findings.They will then be led through a teacher-made powerpoint which will reinforce the life of a civil war soldier. G. Students will put themselves in the shoes of a soldier. They will be asked to reflect on their personal **class blog** what it would have been like to be a civil war soldier.They will be asked to do so in an imaginative letter format.
 * Goal**- Students will reenact a soldier’s hardship of being at war with a one paragraph letter home to a loved one.
 * Since I have already viewed the above sites I know that they are appropriate for the students to look at.There should not be any appropriate material found on these sites.If inappropriate sites should slip through the firewall, they know to report it directly to me to address the issue.The teacher will be monitoring the classroom while they are on the sites to eliminate any misuse while in the lab.

=
As you are all aware, we are diving deeper into our Unit on the Battle of Gettysburg.We will be investigating the life of a Civil War soldier.We will be taking a unique approach to doing this.You will be more than welcome to see your students work, as well as their classmates through the class blog.This is an excellent tool that will be incorporated in this lesson.I would like to take a moment to share with you the new Web 2.0 tools your child will be introduced to in this lesson. __**Internet Investigation**__- Students will be given sites to view.They will not steer away for the particular listed sites.They must have permission from the teacher to access another site.I have listed them below for them to share with you. ======

=
[] [] [] [] ======

=
__**Delicious.com**-__This site is an excellent resource page.You child will be able to access the above sites from their delicious page.They will not have to continuously type in the web address.It will all be one click away in this site.They will continue to use this site to save important resource materials on any subject we may cover. ======

=
__**Wikispaces**-__ Your child will share their information here with the rest of the class.They will be able to site important information and collaborate with others.Any group assigned in this unit and from other subjects may be done here. __**Blogspot**-__ There will be a class bolgspot created.Students will complete individual assignments and write reflections here. __**Flickr**-__ This is a great place to locate pictures pertinent to your child’s learning.It is also a wonderful place to share pictures with friends and family.We will only be using to view pictures, but you may want to take a look at it for your own personal use. ======

=
*It is important to know that the wikispace and blogspot will be created by the teacher.It will be monitored by me.They must be invited to the wikispace by me and the blog will only allow comments from the teacher and other classmates.It is stressed that only first names are used in either space.The children will not disclose their address, what school they are affiliated with, and most importantly there will not be any personal/class pictures of them uploaded on the sites.This will eliminate any unwanted visitors to our class projects.Your child will have the ability to share their work with you. Assessments will be based on their activity and contribution in each of these locations and completion of the assignments.You may access their grades through the engrade.com grading system that was presented to you in the beginning of the year.Remember, the grades are not public and only parents of that particular child can see their grades.If you have misplaced your username and password to access this site please contact me. Security is the number one importance while on any of the above sites.I will be monitoring their work and with the school firewall I do not think we will have any issues. ======

=
While at home, I encourage you to reinforce the same internet safety issues. I feel it is very important to keep you connected in this exciting venture in Web 2.0 Tools.If you find any flaws in any of the material presented above feel free to contact me with your concerns. ======

__Lesson Plan__
__This video will be part of the lesson, and is a must see for everyone. It is a great example for students to see.

media type="youtube" key="hOwpGF1SOQM" height="385" width="640"

__

__Permission Letter__
__ For this I did utilizing the blogging rules found: []__

__Megan's Lesson Plan__
__**Lesson Objectives**__ - Students will be able to determine the difference between safe/responsible and unsafe communication via a blog and other online communication platforms. - Students will practice safe and responsible blog communication. - Students will utilize safe and responsible practices in a blog/blogging environment.

- Cyber Safety blog based off of Privacy Playground & Cyber Sense & Nonsense websites - Websites - Cyber Sense & Nonsense - Privacy Playground
 * __Technology Necessary for Lesson__**

__**Utilization of Technology**__ - Students will access the websites and complete both Internet Safety games. - Students will access the Cyber Safety blog and post comments/answers to the Internet Safety discussion questions on the blog as well as comment on other classmates and students responses.

__**Lesson Process/Implementation**__ - Instructor will facilitate a brief class discussion of online communication tools students are already utilizing or are familiar with. - Instructor will show how to access Internet Safety sites/games & Cyber Safety blog. - Instructor will explain that they will be blogging about Cyber Safety practices with classmate and students from others school in the District. - Students will select a computer, access sites & complete games. - Upon completion of games students will access the Cyber Safety blog and answer via blog comments the Internet Safety discussion questions as well as comment on other classmates or other students blog responses.

__**Monitoring/Assessing**__ - The blog will be set-up as “comment approve only” so that the instructor will see all comments before posting them. - If students post/request approval to post inappropriate content they will be required to re-post appropriate content before it's approved and posted to blog.

__**Permission Letter/Form**__

Public Service Announcement Lesson Plan
Objective: Students will effectively identify Internet threats by developing a multimedia public service announcement, sharing it on a class wiki, and then critique their classmate’s shared work on a class blog.

Technology: Flickr, podcast, wiki, blogs

Brief explanation: After creating a multimedia public service announcement through podcasting or creating a photostory video using Flickr, students will share their work on a class wiki, and then critique their classmate’s shared work on a class blog.

Expected behavior: Students will first identify the current web threats previously reviewed in class by naming and defining them. They will then correctly use the proper web tools for creating and publishing their work. They’ll also demonstrate analytical ability and responsible communication skills by critiquing peer work.

Teaching process: Students will be introduced to the current web threats by citing statistics and cases. They’ll also be able to share their own understanding of Internet dangers during class discussion or through an online class forum. After that they’ll be given a model and instructions for completing each stage of the assignment.

Actions in place: I choose to limit searchable content to that found in state subscription services (e.g. newspaper sources through Powerlibrary) or that content which is trusted by virtue of reputation or experience. Should anything inappropriate appear, students should not show other students but should turn off their monitor and contact the teacher immediately.

Online Publishing Permission Letter
To the Parents of : (Student fills in name) In addition to the many projects offered which focus on learning the computer as a tool, at XYZ School also focuses on how to use the Internet. Using the Internet to obtain and share information is an increasingly important skill in a digital age.

With your permission, we’d like to introduce the your child’s class to Web 2.0 tools. These tools allow students to collaborate online. For example, students could create a project on a wiki site with their classmates, teacher, or students from other schools and then share their work on a blog. Web 2.0 tools such as wikis and blogs are web pages specifically designed to create and share information for various purposes. Entries are commented upon, documented, and monitored. They’re easily the best way to share information using current resources available.

No full names or other personally identifiable information such as school name, address, or class will be available to the public through online collaboration. All posts will be monitored as much as possible by the class teachers. Closed networks will be utilized whenever possible or practicable, according to the project guidelines. Students must also review our district’s Internet policy before posting online. Under no circumstances will students be allowed to initiate contact with another adult, unless the class teacher indicates the adult is a participant in the assignment.
 * Will my child be safe?**

Currently Ms. Smith’s English class is sharing their impressions of Dicken's A Tale of Two Cities with a school in New Jersey. Each year the classes combine to perform the play. In order to participate in the play, student post summaries of each chapter on a web blog with a partner student. Students receive feedback for their writing from their teacher and their partners. Students then organize the play through a group wiki and chat room.
 * What are these projects like?**

There are many benefits experienced through this collaborative project. Students enjoy having others provide feedback for their work. They acquire skills in collecting and sharing information, observing that their world extends beyond the school walls. These 21st century skills are invaluable, and collaborating with another school would not nearly be as efficient or cost-effective without these Web 2.0 tools.

Students will be evaluated in each project based upon the corresponding rubric chosen by the class teacher. In most cases, students are evaluated on the quality of their work product as well as the skill and level of their online participation. As a district, we feel that this is an important component of technology instruction.
 * How will my child be evaluated?**

Except for your permission, nothing else is required. We’re asking you to partner with us in offering your child an enriching and safe education which prepares them for the future. We understand that safe and responsible online behavior begins at home. With your permission, we seek to reinforce the appropriate use of online technology in an academic environment. Should you have any questions or concerns, please feel to contact your class teacher or principal. I have read and understand the online publishing policy outlined above and have already signed and agreed to the district’s policy for Internet use. Student’s signature:_ Date: Parent’s signature: _ Date: Parent’s signature: _ Date: __Copyright: Some portions of this letter were borrowed from__ []
 * What is required to participate?**

__Lesson Plan__
M. Elvin's 7-D-1 Lesson Plan

__Permission Letter__
M Elvin's 7-D-2 Permission Letter

__Permission Letter__
____

** Objective: Once a week, students will post an essay or a reflection on the essay writing process to their blogs. **
=== **Web 2.0 Read/Write** ** Technology: WE ****Blogs** will be used, probably Wordpress.com. Students must post RCT essays or reflections on what they have been working on in history (Global or U.S.) to their blogs. Over time, the students will also blog about current events, predictions, comparisons with fictional characters in ELA and other staple high school humanities subjects, modified. === Initially, the students will groan, but as they see they can get through the essays quickly, they will understand that then they can get to the reflective part of the blog which they love to write.
 * Description of student behavior expected: **

**Process or steps for teaching** Students will be shown a four paragraph review essay they did last year on the SmartBoard.They will be reminded that the essay is an analytical expression that shows how well they understand a certainsubject in Global History.After going over the essay question, and then the sample essay response, the SmartBoard will be turned off. The class will be asked to rewrite the essay in their own words.

On their second day, the students will be given the District’s “Acceptable Use Policy” and the policy will be reviewed together. They must return the form the next day, signed by themselves and their parents.After reviewing the policy, the Wordpress website will be introduced.Passwords will also be assigned. The netiquette rules for using a blog will be thoroughly discussed, such as “do not use of identifying data.”I will also show them a scary YouTube video of web predation: []

After the discussion -- I am sure this video will elicit -- the students will see that one of their essays has been typed and is now up on the Wordpress blog of the student who finished the essay.The essay will be reviewed as a class.Students will be given time to type in their essays to their blogs and make changes to the essays.Students will be required to write a reflective piece about their own writing process using assigned vocabulary words: reflect, consider, wondered, composed, took pride if they finish typing.Staff will mingle with all 9 – 10 students to assist. Any student who thoroughly completes a four paragraph essay may begin writing a blog about a current event of his/her choice.Students will be directed to the NY State Essay Scoring Rubric for Social Studies so they can become familiar with how their essays are being graded. []

Students who do not complete their essay-blog may work on it during resource room or for homework. The blogs will be due every Friday.I do not expect inappropriate responses to appear on their blogs as these can be monitored by parents. (Parents will be encouraged to read the blogs before the assignments are submitted.)

If the class follows the Acceptable Use Policy, it is not expected that inappropriate content will be brought up on the internet.I am only concerned with one child, who is obsessed with sex and violence, and it is for this student that I rewrote the Policy as currently worded.However, if he or anyone else does bring in obscene or other inappropriate material, then the Policy will be followed to the letter.At this time, I do not envision collaboration in essay writing.Perhaps in the second semester some collaboration will occur, however, they must be able to write independently, so collaboration is not in order for the blog project.
 * Inappropriate Content**

Permission Letter
ACCEPTABLE USE POLICY

Our school has made the Internet available to all students, teachers, and authorized staff in order to further our ability to access educational resources throughout the world.It is hoped that everyone will benefit from the use of the internet and will build their communicative and research skills as well as expand your knowledge base. To these ends, several policies have been put in place to further these goals and to guide for safe and effective use of the internet.


 * ACCEPTABLE USE ** – Accessing the Internet must be in support of education and research and to further the educational goals and objectives of our class.Copyrighted material or material that violates state or U.S. law will not be transmitted in our class. This includes material that in any way is threatening or obscene.Any action on your part which interferes with the intended use of the classroom system, violates another person’s right to privacy, e.g., to include reposting personal communications without a classmate’s consent, giving out names, addresses, phone numbers or passwords of others or trespassing in another person’s account is also prohibited.Attempting to gain unauthorized access to the system or network resources, downloading, storing or printing files or messages that are profane, obscene or contain inappropriate language, transmitting or causing to be transmitted, any communication that could be construed as harassment or disparagement of others, especially that which is based upon race, national origin, sex, age, disability or religious or political views is also inappropriate and subject to suspension.Furthermore, wasting resources by failing to monitor personal files, illegally installing copyrighted software on district computers, subscribing to list servers and/or newsgroups without my prior approval, or accessing your Internet e-mail on the internet is strictly forbidden.


 * PRIVILEGES ** – The use of the information system is a privilege.It is not a right, and inappropriate use will result in cancellation of your privileges, thus resulting in your possible failure if your class participation grade is dependent on completing internet exercises.I will have final say in taking privileges away, but I will take them away if you are on any unauthorized internet site.There will be immediate consequences if I find that anyone has accessed the internet without permission.Your parents will also be immediately notified and you will be banned from internet usage from 3 – 5 days or more.Furthermore, school administrators may close an account at any time as required.


 * E-MAIL ** – Electronic mail is not guaranteed to be private.Therefore, there is no access to e-mail on school property.


 * SECURITY ** – Security on any computer is high priority, especially when the system involves many users.Our district has blocked internet access in compliance with the Children’s Internet Protection Act (CIPA.)The District will filter and block visual access to depictions considered obscene and child pornography.The District will also monitor student behavior patterns in accessing information on the internet.


 * VANDALISM ** – Vandalism will result in cancellation of privileges.Vandalism is defined as any malicious attempt to harm or destroy data or equipment of another user, the Internet or any of the agencies providing Internet access.This includes but is not limited to the uploading or creation of computer viruses.

All users are expected to adhere to the generally accepted rules of network etiquette.These include but are not limited to the following:Be polite.Do not get abusive in your messages to others.Use appropriate language.Do not reveal the personal address, phone number or credit card number of yourself, students or colleagues.Do not use the network in such a way that would disrupt the use of the network by other users, e.g., no streaming without permission. In order to use the internet you and your parents are required to sign that you read and understand this policy.Please return it tomorrow.
 * NETIQUETTE **

We understand and will adhere to the appropriate use and safety policy for internet access:

Student _

Date: _

__Parent__ _

Date:

Lesson Plan

 * Objective**: Students will learn safe and responsible behavior for using blogs in class.


 * Technology which will be used**: blog


 * Explanation**: Students will use blogs to share their writing and to share what we are learning in class.


 * Explanation**: Students will view the blog about internet safety. They will view an internet website, then they will comment on the blog with one thing they learned and any questions.

1. Students will view class blog. 2. Student clicks on link to [] 3. Student views links on website. 4. Student goes back to blog and comments on one thing he/she learned and asks any questions. 5. Student views other comments and responds if able. 6. Class discussion about website and blog comments. Teacher will lead discussion of how internet safety website can be used when blogging.
 * Description of what behavior is expected of students**: Students will use an internet site to learn about internet safety and how to use the internet responsibly.
 * Process or steps for teaching**:


 * What actions you will take and how you expect your students to respond if they find inappropriate content**: I expect students to report anything inappropriate to me immediately. I will respond to the problem as needed. If it is something I need to do, I will. If it is a probelm with another student, I will contact the principal. If it is a problem that needs to be blocked, I will notify the technology department.


 * Sources**: []

=Permission Letter= Dear Families: This year, our class will be practicing their writing and explore their interests by sharing their writing with a real audience. Students will be using personal Weblogs to post their writing to the Internet. A Weblog, or blog as they are commonly called, is a special type of Web page that can be created and easily updated using a Web browser. Each new entry has its own date stamp. Each entry has a comments section where visitors to the blog may leave comments for the author.

How it Works Throughout the school year students will write an entry for their blog. Students may write a journal entry or share something we learned in class recently. All of the blogging will be completed in class. Students may also work from home. All that is required is an Internet connection and a Web browser. Students are able to save their work as drafts before publishing it to their blog. Directions for working from home will be provided. Having a real audience is one of the key components to this program. In addition to receiving comments from their classmates, the students will receive comments from myself. Parents are also invited to visit the blogs and respond to the writing. Potentially, anyone on the Internet could respond to our blogs, however, it is not likely that the world at large will stumble across them.

Security This blogging project is designed to minimize risk to your child. The only personally identifying information included in the blog will be their first name. There will be no mention of our school name or our location. Students are allowed to post their interests and opinions, but not their age, email address, photographs of themselves, or other sensitive information.

Permission Before your child may start posting to their blog, we are asking for you and your child to discuss and sign the following form. Please return the form to Miss Argot.

Blogging Terms and Conditions 1. Students using blogs are expected to act safely by keeping personal information out of their posts. You agree to not post or give out your family name, password, user name, email address, home address, school name, city, country or other information that could help someone locate or contact you in person. You may share your interests, ideas and preferences. 2. Students using blogs agree not to share their user name or password with anyone besides their teachers and parents. You agree to never log in as another student. 3. Students using blogs are expected to treat blogspaces as classroom spaces. Speech that is inappropriate for class is not appropriate for your blog. We also expect that you will conduct yourself in a manner reflective of a representative of this school. 4. Students blogs are to be a vehicle for sharing student writing with real audiences. Most visitors to your blog who leave comments will leave respectful, helpful messages. If you receive a comment that makes you feel uncomfortable or is not respectful, tell your teacher right away. Do not respond to the comment. 5. Students using blogs take good care of the computers by not downloading or installing any software without permission, and not clicking on ads or competitions. 6. Students who do not abide by these terms and conditions may lose their opportunity to take part in this project.

I have read and understood these blogging terms and conditions. I agree to uphold them. student’s signature:_ date: parent’s signature: _ date:

=Audrey Slocum=

__**Objectives**__

 * To create a blog post
 * To explain the behavioral expectations for blogging
 * To comment on a peer’s blog post

__Technology__
Blog

__Explanation__
The 9th graders will begin blogging their reactions to various topics covered in class rather than typing a response paragraph or handwriting a journal entry. By using a blog, it provides opportunities for other students and the teacher to comment in an attempt to further the discussion of the topic.

__Behavioral Expectations__
Blogger's Contract by  classblogmeister.com

__Process__

 * 1) Define a blog
 * 2) Show examples of blogs
 * 3) Explain how a blog will be used in class
 * 4) Explain the advantages of using a blog over traditional methods
 * 5) Distribute the  Blogger's Contract
 * 6) Discuss the behavioral expectations listed in the contract
 * 7) Demonstrate the process of accessing the blog
 * 8) Demonstrate how to post to the blog
 * 9) Demonstrate how to comment on a blog post
 * 10) Distribute pre-assigned username information
 * 11) Instruct students to complete the given assignment

__Assignment__
Create a blog post describing what behaviors are expected when using the blog. The response should be in your own words and should contain at least 5 complete sentences. Locate blog posts for at least two classmates. Post a comment to the blog using one of the following starters: Our ideas are similar because... OR Our ideas are different because...

__Inappropriate Content__
During the discussion on behavioral expectations, students will be instructed to quietly inform the teacher if they have found or become the victim of inappropriate content. They will be instructed to not announce it to the entire class or to act out on it. Depending on the severity of the inappropriate content, a discussion will occur with the student, parents, administrators, and/or law enforcement, as necessary. Resources will be provided to educate parents and/or administrators if necessary. =Audrey Slocum=

Permission Letter
Dear Parent/Guardian:

As part of the updated curriculum in 9th grade, students will be using personal Weblogs to post their writing to the Internet. A Weblog, or blog as they are commonly called, is a special type of Web page that can be created and easily updated using a Web browser. Each new entry has its own date stamp. Each entry has a comments section where visitors to the blog may leave comments for the author.

**How it Works**
A new topic will be discussed in class during each 6-day cycle. At any point during the cycle, students may be asked to respond to the topic. Traditionally, this has been done through a typed and printed paragraph or a handwritten journal entry. Their response will now be entered as a post to a blog. Having a real audience is one of the major advantages of using a blog. By posting their responses to a blog, the student has the ability to continue the discussion with peers and teachers. Potentially, anyone on the Internet could respond to our blogs, however, it is not likely that the world at large will stumble across them.

**Security**
This blogging component of this class is designed to minimize risk to your child. The only personally identifying information included in the blog will be their first name. There will be no mention of our school name or our location. Students are allowed to post their interests and opinions, but not their age, email address, photographs of themselves, or other sensitive information.

**Assessment**
As with other projects they will complete this year, students will receive a scoring rubric that explains the expectations for these assignments. The rubric will also include a section for the comments they leave in other students’ blogs.

**Permission**
Before your child may start posting to their blog, we are asking for you and your child to discuss and sign the following form. Please return the form to school as soon as possible.

**//Blogging Terms and Conditions//**
1. Students using blogs are expected to act safely by keeping personal information out of their posts. You agree to not post or give out your family name, password, user name, email address, home address, school name, city, country or other information that could help someone locate or contact you in person. You may share your interests, ideas and preferences. 2. Students using blogs agree not to share their user name or password with anyone besides their teachers and parents. You agree to never log in as another student. 3. Students using blogs are expected to treat blog spaces as classroom spaces. Speech that is inappropriate for class is not appropriate for your blog. While we encourage you to engage in debate and conversation with other bloggers, we also expect that you will conduct yourself in a manner reflective of a representative of this school. 4. Student blogs are to be a forum for student expression. However, they are first and foremost a tool for learning, and as such will sometimes be constrained by the various requirements and rules of the classroom teacher. 5. Student blogs are to be a vehicle for sharing student ideas with real audiences. Most visitors to your blog who leave comments will leave respectful, helpful messages. If you receive a comment that makes you feel uncomfortable or is not respectful, tell your teacher right away. Do not respond to the comment. 6. Students using blogs take good care of the computers by not downloading or installing any software without permission, and not clicking on ads or competitions. 7. Students using blogs will abide by the school district’s acceptable use policy as outlined in the student handbook. 8. Students using blogs will abide by the behavioral expectations as outlined in the attached Blogger's Contract  and as discussed in class. 9. Students who do not abide by these terms and conditions may lose their opportunity to take part in blogging and will complete their assignments in a traditional manner.

I have read and understood these blogging terms and conditions. I agree to uphold them. Student’s signature: Date: Parent’s signature: Date:

Parent Letter adapted from Bud the Teacher  's  Blogging Letter.

[[file:Parent permission letter.doc]]
@http://www.budtheteacher.com/wiki/index.php?title=Bud%27s_Blogging_Parent_Letter @http://www.youtube.com/watch?v=JTTCOAQsC90 media type="youtube" key="JTTCOAQsC90" height="227" width="288" align="center"

7-D-1: Genocide, Current and Past
__Objective:__[|www.wordpress.com] __Technology that will be used:__ [|www.wordpress.com] [] [] [] [] [] [] [] [] __Preconditions to World Cultures Blogging:__
 * 1) I will start off a class discussion, using my daily 'bell ringers' to trigger ideas, discuss and orientate my students with the potential dangers of using Read/Write Web.
 * 2) As a class, I will facilitate my students to create an account on [|www.wordpress.com] with their first names only, have them contribute each to a discussion starter question (what they've learned about the hazards and dangers of Web use and posts), print out their first responses, and critique their work as a class, giving feedback on level of appropriate responses and how students can improve the quality and maturity level of their discussion posts.

__Teacher Obligations to Blogging:__
 * 1) Weekly, it will be my responsibility to continue to monitor student discussion posts and use dangers of Web usage and contributions as a continuous emphasis on student safety and precautions. This can further be enhanced by bringing in a colleague guest speaker, who specifically focuses on the safety of Internet usage, whether they are at home or contributing to Blogs for class, and allow my students to frequently refer to my colleague in clarification questions and even scenarios they have experienced in their personal lives.
 * 2) It will be my responsibility to refresh discussion starters and contribute comments and posts to validate and make my students' work meaningful in the scope of our class discussions on the topics of genocide.
 * 3) I will also hand out updates to current genocides and, as a class, whether it is through blog postings or class discussions, we can follow updates, interventions, victims, statistics, etc., which may help my students brainstorm a possible post or discussion starter on the Web.

__Conditional Scenarios:__
 * 1) Although I, as the teacher, will be monitoring and observing outside comments and contributing postings, as well as discussions done internally within my classroom participants, if I come across a comment that is pending approval and it violates a maturity, safe, or appropriate guideline, I will eliminate it and, depending on the degree of inappropriateness, may even use it as a returning example of what is not acceptable, what can be considered harmful and even dangerous to any student participating in our blog discussions. From here, we can brainstorm and continue to discuss alternatives and actions that we can conduct individually to promoting a safe and collaborative learning environment for all.
 * 2) If students observe any inappropriate internal or external responses, they are to log out of the blog and contact me immediately for handling the issue. We can continue to reinforce the fact that despite good intentions with Web usage and contributions, this is why it is so important for individuals to be safe and cautious about any specific material that they post on the Web, whether it is for class or for personal usage. Unfortunately, students must be aware of the all-too-real reality: many dangers can occur if we don't anticipate them to happen and act blindly.

Permission Letter:
Dear Parent(s)/Guardian(s):

Throughout our second unit, Africa, our World Cultures class will be conducting discussions and posts to a class blog that can be found on my blogsite, [|http://afriki10.wordpress.com]. The first week, after reviewing specific precautionary safety and usage procedures, I will start the blog discussions by posting a prompt and discussion question. Following the first week, and each ensuing week after that, three students will be selected to create their own starter discussion question and post reflection and questions on the blog website that will reflect and challenge specific events regarding genocide, apartheid, poverty, HIV/AIDS pandemic, and exploitation through Westernized imperialism. You may access this website at any point in time to contribute to class discussions, or just preview the type of discussion posts that my World Cultures students will be posting.
 * Introduction and Procedure:**

This wordpress.com blog will provide the opportunity for students to take ownership in their own collaborative, challenging, and reflective discussions while demonstrating an understanding of the material regarding each theme of our Africa unit. Students will be required to document any specific website or reference that they use in their arguments and are encouraged to seek additional sources to learn more on various aspects of each topic.

Due to apprehension and discomfort in the security measures of class participation on the Web through a class blog, I will guarantee you that the only way a student will be identified is by their first name. We will review, discuss, and learn through resources, including a technology teacher that specializes in the dangers that can present themselves in any type of online collaborative environment. Students will be prohibited from stating any personal information, pictures that will directly identify them, location of their high school, community, or even their residence or place of employment. This will eliminate potential issues that could rise and present a threat to the identity and overall safety of your child.
 * Security Measures and Protection:**

Students will be assessed based on their continuous participation on a weekly basis. The starters will be posted by Monday and their posts will be due by Saturday. They will also be assessed on their ability to create discussion, reflection, understanding of the material, using additional resources and resources that I will post on a weekly basis for their use and reference, as well as their level of appropriate postings and discussions with the teachers as well as their class peers. By the beginning of the Africa unit, students will receive an accountability and assessment rubric as well as additional materials they can use from in class lecture and activities and a safety/prevention protocol from the dangers of external influence and postings.
 * How will my child be assessed?**

Before your child may participate and contribute to blog discussions and postings, I am asking for your writing permission and signature after careful consideration and discussion with your child before having your child return the consent form to me no later than a week before our Africa unit begins.
 * //Permission://**


 * Blogging Expectations and Requirements:**
 * 1) Students must abide by prevention and safety protocol to ensure their own protection, security, and safety within and beyond the borders of the Web. Failure to do so will result in immediate termination of their participation in the blog and may impact their grade for the course.
 * 2) While participating in blog discussions, creating starter posts, and incorporating resources to support their claims or reflections, students are expected to act, reflect, and care for the blog with caution, maturity, and appropriate content/language for creating a safe and learning environment that is conducive to all participants. Failure to do so will result in immediate termination and reprimand at the administrative level.
 * 3) The expectations of these blog posts and discussion starters is to enhance every student's knowledge and cooperative skill to build a more culturally, human rights-sensitive, well-rounded and competent individual. To participate on a weekly basis will reinforce the content covered in the classroom and make collaboration a respectful and integral communication venue. There is the chance that outsiders may add additional comments that are considered offensive, inappropriate, and maybe even dangerous. If one encounters these types of interactions, contact me right away and do not respond. I will handle accordingly.
 * 4) If any of the aforementioned expectations and requirements are not followed, the student's opportunity and permission to participate will immediately be revoked and handled accordingly. This will be a wonderful opportunity to demonstrate interest, knowledge, and creativity in highly sensitive, cultural and international issues.

I have read, understood, and agreed to the above upcoming blogging assignment for the Africa unit. I agree to reinforce your requirements and expectations.

Student's signature: Date:_

__Parent's/Guardian's signature:__ __Date:___

Lesson Plan
I would use this lesson with my incoming second graders as a way to record current events. The students will be able to summarize current events using the class blog; It’s My World. The technology will include Flickr (if a particular photo is needed) and [|blogger]. Students may use Times for Kids and school calendar/website as resources for current events. Students will post a blog for class discussion on a current event to the class blog. Current events can range from the events in school, community, state, or world news. This activity will occur during literacy groups. The teacher will start each day with a morning message on the blog along with any exciting news for the day. Students will comment on the teacher post with an event of their own for the day and they may also comment on another peer’s comments. After reviewing the purpose of a current event and modeling examples, I will model the use of a blog. I will show students how the account was created as well as how to login to show the importance of security. For this lesson I will use a LCD projector for students to view me opening the account and logging in. I will show the students a sample of how to post and how to comment on a post. I will then model how to create a post and reply to a post. I will review how personal identity is not to be used and how we will use our class numbers to identify one another. I will also discuss how the content on the blog is for the class only but parents might comment. I will also review the steps to take if a mystery message appears. I will share with the students that I will be monitoring the site and that their post will be a part of their writing and reading grade. I will have a mock comment posted on a post to model what students should and should not see on the blog page. In this mock, I will have a hyperlink with suggestions to click for $1, 000 and a comment from a man name Mr. Sugar. I will ask the students to review the following checklist when they see a mysterious comment. · //Do I know the name? If no, please get the teacher. // · //Do I see any bad words or silly pictures? If yes, get the teacher. // · //Do I see a classmate’s post who signed their name? If yes, get the teacher. // I will then show the students a nonverbal way to get the teacher in the event of an emergency or if I am on the phone. Students will grab a plush doll from the basket and sit it on top of the monitor to indicate he or she needs support. This will minimize interruptions if I am with a small group or conferencing. I will then have students brainstorm topics by drafting a post in their journals for possible publishing. Each student will complete a fill in the blank on how we blog for current events as an assessment of the training. I will also work with small groups for the first few posts to make sure that the students are able to locate all the links and tabs.
 * Current Events with Blogs **
 * Objective: **
 * Materials: **
 * Overview: **
 * Lesson: **
 * //In any of these cases, first turn off the monitor only so that other students do not view the same screen and locate and notify your teacher. //**

Permission Letter
Dear Parent, We’re Blogging! Our class has begun to explore current events and discussing topics that occur in our school, community, and around the world. To make this an engaging task, I am requesting permission for your child to post and comment to our class blog. This blog will serve as a communicator for you as well as an archive for our day to day thoughts for the year. The blog will not have any identifying information about the individuals in my class and numbers will be assigned instead of names. If you would like to participate by commenting on a blog that is fine but please keep it appropriate and avoid using personal information (including school name, location, or child names). This blog is highly restricted and all comments will be approved by me before being posted. This blog will reinforce skills we learn in language arts and writing and will be reflected in your child’s grade. If you agree to the above, please review the following guidelines with your child and send a reply email stating that you agree to the following: Thank you for your continued support. Sincerely, Mrs. Hilton
 * <span style="font-family: 'Verdana','sans-serif';">Blogs are fun but should be handled appropriately **<span style="font-family: 'Verdana','sans-serif';">. Mean comments or jokes are not permitted. Inappropriate language is also restricted. Any student that does not follow the rules will receive disciplinary action.
 * <span style="font-family: 'Verdana','sans-serif';">Blogs are great to discuss information but are not private and should avoid having personal data (name, address, school, phone number) posted **<span style="font-family: 'Verdana','sans-serif';">. Do not give blog information to anyone. The teacher will give parents a notice with blog URL.
 * <span style="font-family: 'Verdana','sans-serif';">Blog post are a great way to show your teacher what you know about a topic **<span style="font-family: 'Verdana','sans-serif';">. Take your time and do your best; you’re the teacher for the moment. Be sure to use punctuation and capital letters. You will receive credit for all of your work.
 * <span style="font-family: 'Verdana','sans-serif';">Blogs are for the world. **<span style="font-family: 'Verdana','sans-serif';"> Because people in Australia can view and comment on our class blog, there may be comments from individuals outside of our class. If you notice something inappropriate or a comment from someone outside of class please use your checklist and notify your teacher (me) right away.

Lesson Plan:
Lesson Plan: Teaching Internet Safety Objective: Teach and model basics of online safety for students. As Richardson states, “it’s our obligation to teach them what is acceptable and safe and what isn’t.” (Will Richardson, Blogs, Wikis, Podcasts and Other Powerful Web Tools for Classrooms, 12) Technology that will be utilized: Blogs and wikis. These technologies will be used in the class, so it is sensible that the assets and potential dangers of both be examined. Expected Outcomes: 1. Students will comprehend and practice proper netiquette. 2. Students will be able to appropriately respond to someone who is not following the same guidelines. Process: 1. Students will watch the video //Internet Safety: A Cautionary Tale// at media type="youtube" key="nWq7SXaXj8g" height="385" width="480"

1. Students will discuss the video and what sorts of information it is safe to disclose even in a school wiki or blog. 2. Students will compose a list of safe information and unsafe information to disclose. This will be posted on the board during the discussion. For example: Safe Unsafe Blog entry Social Security Number Name (First, Last Initial) Address 3. Based on the preceding discussion, students will compose a set of best practices. 4. These will be displayed in class computer area, and agreed to between students and parent in the permission slip. (Author’s note: Since I teach college, I would modify this to be an agreement between myself and the student.) 5. students will also develop, in consultation with the instructor, a step-by-step procedure for responding to inappropriate behavior observed on blogs and wikis. Expected Behaviors: 1. Students will abide by the class-generated guidelines. 2. Failure to do so can result in consequences ranging from grade penalties to parent-teacher conferences. 3. Students will also understand the steps in responding to inappropriate behavior. Sources consulted in the preparation of this Lesson Plan: Print: Will Richardson, Blogs, wikis, Podcasts and Other Powerful Web Tools for Classrooms. Thousand Oaks, CA: Corwin, 2010. <span style="font-family: 'Verdana','sans-serif';">[] [] <span style="font-family: 'Verdana','sans-serif'; font-size: 12pt; line-height: 115%;">[]

Permission Letter
**Permission** __date:__ []
 * //Blogging and Wiki Terms and Conditions//**

Lesson Plan
[|7-D-1_LessonPlan_Mourtacos.docx]

**Background**
Students are in a multimedia and video technology course. They will already have developed experience and skill with creating and editing video, graphics, and audio. These skills will be used to create a bimonthly current event video blog that focuses on the double edge sword nature of technology. Each video blog will identify a current or developing technology. Students will analyze the technology through the concept that society shapes technology out of need or desire. They will need to identify why and how the technology is made and is planned to be used. The students will further research and speculate on other uses of the technology. Additionally, commentary concerning the possible beneficial and malicious use of the technology will be made. The lesson below is an introductory lesson to online dangers and privacy concerns. One of the primary purposes of this lesson is to prepare them for the coming project of maintaining a bimonthly video blog.

**Objectives and Goals**
During this lesson, students will: · Gain knowledge about Internet dangers and privacy concerns to prepare for their bimonthly video blog submissions · Determine safe online habits and netiquette · Create their first video blog post in response to the lesson video · Identify the benefit/ consequence nature of technology

**Tools and Resources**
Internet access will be used to access the You Tube videos and the student blogs, which were setup earlier. The cameras and computers will be used to compose video responses to the videos presented in class. · Students will need to use the following in order to complete the assignment: · Computer with Internet access and multimedia creation/ editing software · Some form of video or web cam for importing video into the computer · A manner to present these You Tube videos to the students Everyone Knows Your Name End of Privacy

**Expected Behavior**
· Students will be expected to view the videos with a mature mindset while reflecting on consequences in their lives if they made some of the same mistakes portrayed in the videos. · Student response videos should contain information and opinions that are on topic and reflect on them and the school well. · Students should view their blog space as an extension of the classroom space – ALL CLASSROOM EXPECTATIONS APPLY · Students are expected to use appropriate language and terminology in their videos, discussions, and comments · Students are expected to not give out any personal information in their videos, including their image or appearance on the video unless specifically given consent by their parent or guardian on the video blog permission slip

**Teacher Procedure**
1. Preface the videos by engaging the students in a discussion about Web 2.0 technologies, how they are used, and the risks of posting private information, the permanence of content online, and the associated dangers of their online presence 2. Show the two videos listed above to the class 3. Discuss the main points of the videos and additional dangers that an online presence can create. Discuss and research as a class techniques for staying safe online. 4. Instruct students to create a video response that highlights these online dangers and how they plan to prevent becoming a victim. There properly produced and uploaded video is an affirmation that the can have an online voice and presence without being a victim. 5. Once the videos are produced, have the student show the video to the teacher prior to uploading to their video blog. 6. As a text contribution to their video blog, the student should give a preview of the technology they will be investigating for their upcoming bimonthly video blog.

**Actions and Response to Inappropriate Content**
Instruct students on what to do if they encounter inappropriate content: · Immediately navigate away from the content and report it to the teacher · Do not spread the content or reply to the author · Maintain a mature disposition · Do not approve any inappropriate comments on your blog; report them to the teacher; do not respond.

**Sources**
You Tube videos · Everyone Knows Your Name: [] · End of Privacy: []

Permission Letter
[|Permission Letter-Mourtacos.docx]

Lesson Plan
7.d.1 Robert McCord 1. Students will watch this video on internet safety: media type="youtube" key="F4Qd1WVRctc" height="385" width="480" [] A. Students will have previously been introduced to blogging and instructed to set up their own blog for their research paper projects. Students will watch this video from the Disney cartoon “Phineas and Ferb” as a class and then discuss some of the safety instructions. Then each student will view the video on his/her own computer (a link is provided on the course’s online shell) and make a blog entry listing all the safety rules. Students will also indicate which rules from the video are most relevant to blogging. It must be remembered that college freshmen are adults, not juveniles, so the need to protect their identities or set up strong course rules of internet safety is less than for secondary or elementary students. However, since blogging on publicly accessible websites is part of the course it is important to make students aware of the issues of identity protection and basic common-sense Internet safety.
 * Teaching Safe Behavior**
 * Age Group:** College freshmen.
 * Objective:** Students will learn how to blog safely, which includes protecting their identity, responding to others politely, dealing with harassment and inappropriate contacts, and reporting to teachers/parents when appropriate.
 * Technology & Brief Explanation:** blogs. Students will be blogging as part of their research paper assignments throughout the semester. This lesson plan will be used in the first week to teach students about safe blogging.
 * Description of what behavior is expected of students:** Students are expected to blog about the paper topics, and to refrain from personal or “off topic” topics. Students are taught how to deal with cyberbullying and inappropriate comments from others. Students are taught how to protect their identity online.
 * Process or steps for teaching**

2. Students will watch this video on cyberbullying: media type="youtube" key="pmD8OKl8vVM" height="385" width="480" [] One research paper in the course deals with cyberbullying and social networks, and so this video serves two purposes. It will be presented in the beginning of the semester before the cyberbullying topic, but it will be referred to later on. Again, the class as a whole will view the video and discuss the content. Then, students will write a blog entry listing the types of cyberbullying contained in the video, as well as other types of online harassment. Students will also write a blog entry either about their personal experience with bullying/harassment or about a famous case they have found online after a brief search. Again, college students are adults and a certain level of maturity in their course work is assumed, but because the assignment calls for work on publicly viewable blogs it is a good safeguard for the instructor to remind students of some of the basics of good online behavior.

My students, being adults, are primarily responsible for their own interactions online. I do not expect to report to me if they find inappropriate content. More importantly, I expect them to not post anything inappropriate on their blog (I will try and emphasize the educational nature of the blog, to distinguish it from a personal journal). Their online searches will deal with cyberbullying and panhandling, and so there shouldn’t be much inappropriate content found, except for possible bad language on youtube videos about panhandlers.
 * What actions you will take and how you expect your students to respond if they find inappropriate content?**

“Kitchen – Cyberbullying.” 27 April 2007. YouTube. Web. 19 July 2010. “Phineas and Ferb - Rules of the Cyberspace Road Public Service Announcement.” 31 Jan. 2010. YouTube. Web. 19 July 2010.
 * Works Cited**

Permission Letter
Robert McCord // (This letter, for college freshmen, is not a parental permission letter, but instead is an acknowledgement letter between the student and instructor about blogging on a publicly viewable website for a college course.) // I,, do acknowledge reading the statement below on safe and sensible blogging for this class, English 152 Composition II. I (or the student, or you) will be publicly blogging as a regular part of the homework for the research papers in this course. Below are listed the “rules of the road” for blogging in this course. This blogging project is designed to minimize risk to you. The only personally identifying information included in the blog will be your first name. There will be no mention of our school name or our location. Students are allowed to post their interests and opinions, but it is recommended they do not post their age, email address, photographs of themselves, or other sensitive information. The weekly blog assignments will be part of your language arts grade this term. As with other projects they have completed this year, students will receive a scoring rubric that explains the expectations for these assignments. The rubric will include a section for the comments they leave in other students’ blogs. Before you may start posting to your blog, we are asking for you to read and sign the following form. Please return the form to Mr. McCord. 1. Students using blogs are expected to act safely by keeping personal information out of their posts. You agree to not post or give out your family name, password, user name, email address, home address, school name, city, country or other information that could help someone locate or contact you in person. You may share your interests, ideas and preferences. 2. Students using blogs agree not to share their user name or password with anyone besides their teachers and parents. You agree to never log in as another student. 3. Students using blogs are expected to treat blogspaces as classroom spaces. Speech that is inappropriate for class is not appropriate for your blog. While we encourage you to engage in debate and conversation with other bloggers, we also expect that you will conduct yourself in a manner reflective of a representative of this school. 4. Student blogs are to be a forum for student expression. However, they are first and foremost a tool for learning, and as such will sometimes be constrained by the various requirements and rules of classroom teachers. Students are welcome to post on any school-appropriate subject. 5. Students blogs are to be a vehicle for sharing student writing with real audiences. Most visitors to your blog who leave comments will leave respectful, helpful messages. If you receive a comment that makes you feel uncomfortable or is not respectful, tell your teacher right away. Do not respond to the comment. 6. Students using blogs take good care of the computers by not downloading or installing any software without permission, and not clicking on ads or competitions. 7. Students who do not abide by these terms and conditions may lose their opportunity to take part in this project.
 * Security **
 * Assessment **
 * Permission **
 * // Blogging Terms and Conditions //**

I have read and understood these blogging terms and conditions. I agree to uphold them.

Signature:_ date: