ALEX Learning Activity Resources

Back
ALEX Learning Activities  
   View Standards     Standard(s): [DLIT] (7) 18 :
12) Discuss the impact of data permanence on digital identity including best practices to protect personal digital footprint.

[DLIT] (8) 18 :
12) Cite evidence of the positive and negative effects of data permanence on personal and professional digital identity.

[SS2010] USS6 (6) 9 :
9 ) Critique major social and cultural changes in the United States since World War II.

•  Identifying key persons and events of the modern Civil Rights Movement
Examples: persons—Martin Luther King Jr.; Rosa Parks; Fred Shuttlesworth; John Lewis (Alabama)

events—Brown versus Board of Education, Montgomery Bus Boycott, student protests, Freedom Rides, Selma-to-Montgomery Voting Rights March, political assassinations (Alabama)

•  Describing the changing role of women in United States' society and how it affected the family unit
Examples: women in the workplace, latchkey children

•  Recognizing the impact of music genres and artists on United States' culture since World War II
Examples: genres—protest songs; Motown, rock and roll, rap, folk, and country music

artists—Elvis Presley, the Beatles, Bob Dylan, Aretha Franklin, Hank Williams (Alabama)

•  Identifying the impact of media, including newspapers, AM and FM radio, television, twenty-four hour sports and news programming, talk radio, and Internet social networking, on United States' culture since World War II
Subject: Digital Literacy and Computer Science (7 - 8), Social Studies (6)
Title: Civil Right Leaders “Fakebook Pages”
Description:

In this lesson, students will create a fake profile on a modern Civil Rights Leader using a Facebook Page template. They will also explore the positive and negative effects of data permanence on someone's personal and professional digital footprint. The Fakebook page can be used creatively in any content, but for this lesson, students will research the significance and contributions of a modern civil right leader. Students will “post” true and false information. The most important part of this lesson is providing time for students to discuss the reflection questions at the end of the lesson.

This activity was created as a result of the ALEX  Resource Development Summit.




   View Standards     Standard(s): [DLIT] (7) 18 :
12) Discuss the impact of data permanence on digital identity including best practices to protect personal digital footprint.

Subject: Digital Literacy and Computer Science (7)
Title: How to Create a Safe Online Profile
Description:

Using the interactive tool Profile Publisher, students (grades 6-12) will create a printed social networking profile for a fictional character, a historical figure, an inanimate object, etc. to demonstrate their understanding of the appropriate and safe content for an online profile.




   View Standards     Standard(s): [DLIT] (6) 18 :
12) Define digital permanence.

[DLIT] (6) 19 :
13) Define personal privacy, digital footprint, and open communication.

[DLIT] (6) 22 :
16) Communicate and/or publish collaboratively to inform others from a variety of backgrounds and cultures about issues and problems.

[DLIT] (7) 18 :
12) Discuss the impact of data permanence on digital identity including best practices to protect personal digital footprint.

[DLIT] (8) 16 :
10) Analyze different modes of social engineering and their effectiveness.

Examples: Phishing, hoaxes, impersonation, baiting, spoofing.

Subject: Digital Literacy and Computer Science (6 - 8)
Title: Presenting....Digital Citizenship through Infographics
Description:

Piktochart is one of many programs that makes it easy for teachers to integrate literacy and technology standards into any lesson.  Visual learners love the way that infographics seem to make data easier to digest.  Infographics are very helpful when a teacher wants to 'chunk' a lesson in to smaller units.  'Chunking' is a method for grouping and organizing information to make it easier to comprehend and remember.  Piktochart can be used to display and present a large amount of information in a visually appealing way.    




   View Standards     Standard(s): [DLIT] (6) 6 :
R6) Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools.

[DLIT] (6) 18 :
12) Define digital permanence.

[DLIT] (7) 6 :
R6) Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools.

[DLIT] (7) 17 :
11) Demonstrate positive, safe, legal, and ethical habits when creating and sharing digital content and identify the consequences of failing to act responsibly.

[DLIT] (7) 18 :
12) Discuss the impact of data permanence on digital identity including best practices to protect personal digital footprint.

[DLIT] (8) 6 :
R6) Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools.

[DLIT] (8) 17 :
11) Advocate for positive, safe, legal, and ethical habits when creating and sharing digital content.

Example: Students create a brochure that highlights the consequences of illegally downloading media.

[DLIT] (8) 18 :
12) Cite evidence of the positive and negative effects of data permanence on personal and professional digital identity.

[DLIT] (9-12) 6 :
R6) Produce, review, and revise authentic artifacts that include multimedia using appropriate digital tools.

[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

Subject: Digital Literacy and Computer Science (6 - 12)
Title: Social Media Responsibility
Description:


   View Standards     Standard(s): [DLIT] (7) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (6) 18 :
12) Define digital permanence.

[DLIT] (6) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (7) 17 :
11) Demonstrate positive, safe, legal, and ethical habits when creating and sharing digital content and identify the consequences of failing to act responsibly.

[DLIT] (7) 18 :
12) Discuss the impact of data permanence on digital identity including best practices to protect personal digital footprint.

[DLIT] (8) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

Subject: Digital Literacy and Computer Science (6 - 8)
Title: Safebook
Description:

ReadWriteThink profile is an interactive profile for students to learn how to create a safe online profile.




ALEX Learning Activities: 5

Go To Top of page