Professional Learning Multimedia Lesson Plans Personal Workspace Site Search ALEXville Learning Activities Home Courses of Study

Multimedia

Facebook for Parents

Loading the player ...

Download list:
Facebook_for_Parents.mp4

Creator:

Kellie Shumack


School/Organization:

Auburn University Montgomery

Overview:

The purpose of this podcast is to demonstrate the various security settings available in Facebook, provide suggestions for parents, and point out both potential dangers and possible benefits of using any social network.


Length: 06:46

Content Areas: Career and Technical Education, Technology Education, Professional Development

Alabama Course of Study Alignments and/or Professional Development Standard Alignments:

TC2 (K-2)
4. Identify safe use of technology systems and applications.
Examples: protecting personal information online, avoiding inappropriate sites, exiting inappropriate sites
 
TC2 (K-2)
5. Practice responsible use of technology systems and applications.
Example: maintaining proper settings
  • Demonstrating care of digital equipment and media
  • Examples: washing hands before use, cleaning work area before and after use
  • Distinguishing between ethical and unethical use of others' work
  • Examples: avoiding plagiarism, avoiding manipulation of others' work without permission
     
    TC2 (K-2)
    6. Identify uses of technology systems in daily living.
     
    TC2 (3-5)
    5. Practice safe use of technology systems and applications.
    Examples: protecting personal information online, avoiding inappropriate sites, exiting inappropriate sites
     
    TC2 (3-5)
    6. Describe social and ethical behaviors related to technology use.
    Examples: social—developing positive attitudes for using technology collaboratively
    ethical—citing sources of text and digital content, avoiding plagiarism, avoiding manipulation of others' work without permission
  • Describing the global nature of the Internet
  • Following local acceptable-use policies regarding technology
  • Identifying intrusive applications, including worms, viruses, spyware, and pop-up advertisements
  •  
    TC2 (9-12) Computer Applications
    8. Practice safe uses of social networking and electronic communication.
  • Recognizing dangers of online predators
  • Protecting personal information online
  • Example: recognizing risk of identity theft
     
    TC2 (9-12) Computer Applications
    9. Practice ethical and legal use of technology systems and digital content.
  • Explaining consequences of illegal and unethical use of technology systems and digital content
  • Examples: cyberbullying, plagiarism
  • Interpreting copyright laws and policies with regard to ownership and use of digital content
  • Citing sources of digital content using a style manual
  • Examples: Modern Language Association (MLA), American Psychological Association (APA)
     
    TC2 (9-12) Computer Applications
    10. Analyze capabilities and limitations of current and emerging technologies.
  • Assessing effects of technology on culture, economics, politics, and the environment
  • Comparing capabilities of various technologies to address personal, social, lifelong learning, and career needs
  •  
    TC2 (9-12) Computer Applications
    11. Critique digital content for validity, accuracy, bias, currency, and relevance.
     

     


    Alabama Virtual Library
    Alabama Virtual Library

    Hosted by Alabama Supercomputer Authority
    The University of Alabama at Birmingham
    The University of Alabama at Birmingham
    The Malone Family Foundation
    The Malone Family Foundation
    Best of the Web