SlideShare a Scribd company logo
1 of 101
Download to read offline
Pockets of Potential:  How schools are using students own phones for enhancing and extending Learning,[object Object],Liz Kolb, Ph.D.,[object Object],University of Michigan,[object Object],elikeren@umich.edu,[object Object],http://cellphonesinlearning.com,[object Object],Twitter:  lkolb,[object Object],Presentation Link:  tiny.cc/kolb123,[object Object],Liz’s Mobile Business Card,[object Object],Send a new text:  ,[object Object],50500,[object Object],In message: ,[object Object],kolb ,[object Object],http://contxts.com,[object Object]
Agenda,[object Object],Quick Overview of Statistics,[object Object],Text Messaging Projects (SMS),[object Object],Multimedia Projects (Picture/Video),[object Object],Audio Projects (Phone Calls),[object Object],Policy and Safety,[object Object],QRcodes and Smartphones,[object Object]
No Cell Phone?  Use iPodiTouch,[object Object],Tiny URL,[object Object],http://tiny.cc,[object Object],Web access,[object Object],Need Wifi,[object Object],Can do a lot off line with Apps,[object Object],Free Texting Apps,[object Object],Text for Free,[object Object]
Blissfield Presentation
50% of will be Smartphone ,[object Object],Users by end of 2011,[object Object]
13 to 17 year olds send average of 3,146 messages a month,[object Object]
Blissfield Presentation
1:1 Programs have BIG impact on achievement when properly implemented,[object Object],Schools with one-to-one computing programs have ,[object Object],fewer discipline problems,[object Object],lower dropout rates (related to social media use),[object Object],higher rates of college attendance than schools with a higher ratio of students to computers,[object Object],Better home to school communication,[object Object],85% of 1:1 schools in the study reported that their students’ achievement scores on high-stakes tests were on the rise. All of these schools employed certain strategies for success,[object Object],electronic formative assessments on a regular basis,[object Object],frequent collaboration of teachers in professional learning communities.,[object Object],Employ the use of social media and social networks,[object Object],http://projectred.org/news/?p=79,[object Object]
Research on cell phones in learning says…,[object Object],"The proportions of textisms that kids used in their sentence translations was positively linked to verbal reasoning; the more textspeak kids used, the higher their test scores”,[object Object],"The younger the age at which the kids had received mobile phones, the better their ability to read words and identify patterns of sound in speech.”,[object Object],http://www.britac.ac.uk/news/news.cfm/newsid/14,[object Object]
Chester NY Middle School,[object Object],Kids who used their cell phones to boil down the main points of the stanzas got 80% of the questions about a poem correct on a state test. ,[object Object],Kids taught the same poem in the traditional way – reading, reciting and discussing – got only 40% of the questions right. ,[object Object]
http://www.abcactionnews.com/dpp/news/region_pasco/wesley_chapel/teacher-welcomes-texting-in-class,[object Object]
Text Messaging (SMS ONLY),[object Object]
http://wiffiti.com/screens/73806,[object Object]
O is for Overview.,[object Object],Conduct a brief overview of the main subject of the visual.,[object Object],P is for Parts.,[object Object],Scrutinize the parts of the visual.,[object Object],Note any elements or details that seem important.,[object Object],T is for Title.,[object Object],Read the title or caption of the visual (if present) for added information.,[object Object],I is for Interrelationships.,[object Object],Use the words in the title or caption and the individual parts of the visual to determine connections and relationships within the graphic.,[object Object],C is for Conclusion.,[object Object],Draw a conclusion about the meaning of the visual as a whole.,[object Object],Summarize the message in one or two sentence,[object Object]
Blissfield Presentation
http://wiffiti.com,[object Object]
Blissfield Presentation
Describe yourself in 6 words,[object Object],http://www.polleverywhere.com/free_text_polls/MTQ2NjM0MTczNA,[object Object],Send text to 22333,[object Object],In text type 48813 then 6 words,[object Object]
6 Word Memoirs,[object Object],http://www.polleverywhere.com/polls/ODg2ODQwNDYw/results,[object Object]
Text Message Alerts!,[object Object],Sending out mass text messages to large or small groups of people.  ,[object Object],http://remind101.com (one way messaging uses phone numbers),[object Object],OR,[object Object],http://cel.ly (2 way messaging uses short codes) ,[object Object]
Join our Cel.ly Text on the Fly!,[object Object],Send a message to 23559,[object Object],In message @LizKolb,[object Object],Follow directions in your text,[object Object]
Summer Text Program,[object Object],Norwich Free Academy (Connecticut),[object Object],Text of the week!,[object Object],Monday is vocabulary day,[object Object],Tuesday is science facts,[object Object],Wednesday is mathematics,[object Object],Thursday is history ,[object Object],Friday covers a variety of topics including general knowledge and cultural literacy ,[object Object],Each day is a theme,[object Object],Parents and Students Opt in,[object Object]
Text a Quiz or Study Cards,[object Object],https://studyboost.com/,[object Object]
Scavenger Hunts of Local History,[object Object],http://scvngr.com,[object Object],http://web20history.ning.com/video/scvngr-for-us-history-test,[object Object],http://www.scvngr.com/university,[object Object]
Distracted Driving Hunt,[object Object],Text “driving” to 728647,[object Object]
Follow Experts on Twitter via SMS,[object Object],To Follow via SMS send:  “follow @twitterid” to 40404 (no twitter account needed),[object Object],Politicians,[object Object],http://tweetcongress.org/,[object Object],Breaking News (CNN, NPR…),[object Object],Authors,[object Object],http://www.squidoo.com/TwitterAuthors,[object Object],Scientists,[object Object],http://sciencepond.com/,[object Object],Historians,[object Object],Send “follow lkolb” to 40400,[object Object]
Multimedia Projects,[object Object],Pictures, Videos, Voice and Text,[object Object]
Connecting Math to Everyday Experiences,[object Object],http://cellblock.com,[object Object],http://bigmacmath.wikispaces.com/cellblock,[object Object]
Posting a picture (using an email address) from a basic phone,[object Object],Add a new contact in your phone,[object Object],Name the contact,[object Object],Add the email address under the email option,[object Object],SAVE,[object Object],When you send…select the contact to send your picture to.,[object Object]
Mobile Pictures and Videos,[object Object],http://flickr.com,[object Object],Flickr Mobile,[object Object]
Blissfield Presentation
EXAMPLE: Mobile Podcasting Project:  Field Trips,[object Object],High School Chemistry Students on a field trip at Cranbrook Science Museum in MI. ,[object Object],Cell Phones pictures documented chemical elements.,[object Object],Used:  Camera on cell phone and sent to drop.io at http://drop.io/CKCHEM4,[object Object]
iReporting,[object Object]
Mobile Blogging,[object Object],Tumblr,[object Object],http://www.tumblr.com/,[object Object],Phone call, picture, text or video post directly to blog,[object Object],Goodies,[object Object],TumblriPod App too!,[object Object]
Tumblr in Classroom,[object Object],Geology Rocks!,[object Object],http://geologyrocks.tumblr.com/,[object Object]
Voice and Phone Calling,[object Object]
Homework:  Poem in Your Pocket,[object Object],http://emsdigitalpoetry.wikispaces.com/Poem+in+Your+Pocket+Day,[object Object],Middle School English,[object Object],Poetry Via Phone,[object Object],http://google.com/voice,[object Object]
Mobile Podcasting Project:  Connecting Algebra to Real World,[object Object],High School Algebra,[object Object],Used http://yodio.com,[object Object],Web link:,[object Object],http://www.yodio.com/yo.aspx?cardId=LvAhgDUPZd6UbBgsTMN2aC,[object Object]
Mobile Podcasting Project:  Author Study,[object Object],Middle School 6th-7th Grade,[object Object],Used: http://hipcast.com,[object Object],Web link:,[object Object],http://541sparkes.blogspot.com/2007/07/author-blog-6.html,[object Object]
Murmur Oral History Project,[object Object],http://murmurtoronto.ca/fortyork,[object Object]
Geograffiti:  VoiceMarks on Map,[object Object]
Conference Recording,[object Object],http://Freeconferencepro.com,[object Object],Record up to 250 people on one phone call at one time.,[object Object],Bring in experts!,[object Object],Record group discussions for HW,[object Object],Record Open House ,[object Object],Hold a 19th Century Salon,[object Object]
PodcastActivity:  NPR “This I Believe…”,[object Object],10th Grade English,[object Object],Wrote their own This I Believe,[object Object],Recorded for HW via Cell Phone,[object Object],Submitted BEST to NPR,[object Object],Focus: Speaking Skills, Persuasive Writing Skills, Editing Skills,[object Object]
iPadio:  Phonecasting,[object Object],http://ipadio.com,[object Object],Create personal podcasts (public or private),[object Object],Attach to any blog,[object Object],RSS feeds,[object Object],No time limit,[object Object],Free!,[object Object]
Web 2.0 Voicemail,[object Object],A cell phone that couples with a website in order to create MP3 files of voicemails, transcripts of voicemails, smart greeting for individual or groups of callers, and stores all calling information.,[object Object],http://google.com/voice,[object Object],(734) 408-4495,[object Object]
Google Voice in World Language,[object Object],http://www.educause.edu/EDUCAUSE+Quarterly/EDUCAUSEQuarterlyMagazineVolum/CellPhonesintheLanguageClassro/192995,[object Object]
Text Messaging Safely and Appropriately Within Classroom Learning:  Step by Step Integration Guide,[object Object]
Step 1:  Survey students,[object Object],Give Students a Survey,[object Object]
Blissfield Presentation
Blissfield Presentation
Blissfield Presentation
Blissfield Presentation
Blissfield Presentation
Blissfield Presentation
Step 2:  MOBILE Safety,[object Object]
Blissfield Presentation
Blissfield Presentation
Blissfield Presentation
Blissfield Presentation
Blissfield Presentation
Discuss Mobile Safety & Appropriate Use,[object Object],Part of digital footprint,[object Object],Your digital dossier that includes Internet activity such as social networking, email, chat rooms, ,[object Object],YOU can’t erase this!!!  Permanent record,[object Object],EVERYTHING you send via text message (pictures, videos, text, audio…etc) is PUBLIC!!!,[object Object],Example:  Detroit Mayor Kwame Kilpatrick,[object Object],Mobile “bullying” and “sexting” is public,[object Object],MTV Special on Sexting and Quiz,[object Object],LG Text Education or That’s Not Cool,[object Object],Students should know their plans,[object Object],Bring in their cell phone plan and a bill,[object Object],Discuss what is charged and how much,[object Object],Give Students a Survey,[object Object],Learn more specific safety tips at Connectsafely,[object Object]
Life Consequences,[object Object],Students are sometimes “sexting” “to friends for their entertainment value, as a joke or for fun.",[object Object],Six teens face child porn (13 to 15) charges after being caught "sexting" each other.  Criminal Charge!,[object Object],IN PA, 3 girls (12, 12, 16) charged with child pornography for sexing.  Picture of  them in bras.,[object Object],15% of teenagers have risque photos of themselves or their friends on their cell phones.,[object Object],1 in 5 sext recipients report that they have passed the images along to someone else ,[object Object],http://www.cnn.com/video/#/video/bestoftv/2009/01/15/pn.sexting.teens.cnn,[object Object]
"If you take a picture, you can be accused of producing child pornography; if you send it to somebody, you can be accused of distributing child pornography; and if you keep a picture, you can be accused of possessing child pornography.  Anywhere along this chain of transmission of the images, you can be charged as a registered sex offender." -Parry Aftab, an Internet privacy and security lawyer. ,[object Object]
School admissions officers and potential employers often look at online profiles,[object Object],…the repercussions of sending an inappropriate message could be endless,[object Object]
Dangers of Texting and Driving,[object Object],One in three (34%) texting teens ages 16-17 say they have texted while driving. That translates into 26% of all American teens ages 16-17;,[object Object],Half (52%) of cell-owning teens ages 16-17 say they have talked on a cell phone while driving. That translates into 43% of all American teens ages 16-17;,[object Object],48% of all teens ages 12-17 say they have been in a car when the driver was texting;,[object Object],40% say they have been in a car when the driver used a cell phone in a way that put themselves or others in danger.,[object Object]
PSA:  Texting While Driving Lesson ,[object Object],Activity 1:  ,[object Object],Take Quiz,[object Object],Are you a distracted driver? http://cartalk.com/ddc/,[object Object],Show Videos,[object Object],http://www.oprah.com/oprahshow/Americas-New-Deadly-Obsession-Partial-Episode-Video,[object Object],http://www.psych.utah.edu/lab/appliedcognition/,[object Object],Students in Groups,[object Object],Identify key risk behaviors in distracted driving (text to interactive Wiffiti.com board),[object Object],Share with the class ,[object Object]
Activity 2:  Create a PSA for distracted driving,[object Object],Watch Sample PSA’s,[object Object],http://www.citizenglobal.com/harpoproductions/nophonezone/media,[object Object],Web Resources for Research,[object Object],Car Talk (NPR) Distracted Driving Center http://cartalk.com/ddc/,[object Object],National Safety Council http://www.nsc.org/safety_road/Distracted_Driving/Pages/KeyResearch.aspx#cognitive,[object Object],PEW Internet Research http://www.pewinternet.org/Reports/2009/Teens-and-Distracted-Driving.aspx,[object Object]
Texting Location Safety,[object Object],Phone apps have location feature,[object Object],Typically, the subscriber must give permission and the cell phone must be enabled for tracking. Consult with your service providers for more detail.  ,[object Object],Some apps are very persistent and you have to turn them off after download…settings,[object Object]
Smartphone Location Tracking,[object Object],http://www.youtube.com/watch?v=N2vARzvWxwY,[object Object]
Texting and Bullying,[object Object],When kids receive harassing or inappropriate text messages, there are several things they can do:,[object Object],[object Object]
Report it as soon as possible to a trusted adult (and if that person doesn’t help, tell others until someone does).
Save or print the message to keep a record, then delete it from the phone.
Only keep contact information of close friends and family in their address book.
Talk to their wireless provider about how they can help (such as blocking the messages or changing their number).,[object Object]
Tips for Social Contract,[object Object],The teacher should explain to the students that there should be some rules concerning how their cell phones will be used in the classroom, and students have an opportunity to be part of the rule making process (the goal is to have no more than 5 simple rules to follow and a consequence for non-compliance).,[object Object],Students should be asked to brainstorm rules.  During the brainstorm,  students should be encouraged to support their rule with reasons why it should be implemented (such as “cell phones should be on vibrate at all times”, the student should then explain why this is important.  If they can’t, ask for other students to help explain it.),[object Object],Once there is a workable list of rules, students should be encouraged to narrow the list to about five rules.  The teacher may want to do this himself, or to use the analogy of a professional job where one is given a cell phone and a contract.  One could ask the students to imagine that they were given a professional contract, hen they could be asked which“rules” they think should be implemented in their classroom.  Using this analogy may also help to eliminate some redundant or unnecessary rules.,[object Object],Once the rules have been selected.  The students should be asked to brainstorm consequences for not following the rules.   Once again, asking students to decide on the best option.  ,[object Object],The teacher should let the students know that she will be adding these rules and consequences to a permission form that will be sent home to have parents and the students sign.,[object Object]
Text Etiquette,[object Object],http://www.mastersdegree.com/blog/30-text-etiquette-rules-every-addict-needs-to-know/,[object Object]
5 Rules for Cell Phones in Schools,[object Object],Set rules based on business regulations for cell phone use (look at business contracts),[object Object],Social contract with students,[object Object],[object Object]
Keep them in the front of the room until you are going to use them.
All messages/media sent or published must be related to lesson.
If you are referencing someone else in class, you must have their approval before posting or publishing.
Create a permission form (in addition to the School’s AUP),[object Object]
Sample Permission Form,[object Object]
Dear Parents and Guardians,,[object Object],We are starting a new project this year in our biology course.  The students will be taking pictures of different biological species that they encounter in their everyday lives and posting on a private class website.  In order to capture the species in the everyday lives of the students, I have given them the option of using their cell phones to take the pictures and send them to the class website.   While the students are not required to have a cell phone for the project, they are welcome to use their own if they choose to and if you allow them.  In class, we will be discussing issues of mobile safety and etiquette before starting the project.  I will be using the ConnectSafely Guidelines for Mobile Safety (http://www.connectsafely.org/safety-tips-and-advice.html ).  If you would like to participate in this conversation, please feel free to attend the class sessions on March 5th and 6th during any of the biology class periods:,[object Object],8:00-9:00,[object Object],9:10-10:10,[object Object],2:10-3:10,[object Object]
In addition, I will be holding an information night about mobile safety and the project on March 3rd at 7:00pm.  I will go over the project in detail, show you how it works, and also answer any questions you may have about using cell phones in learning.,[object Object]
There is some research that supports the need for using student cell phones in learning and teaching students how cell phones can be a productive and important tool for their future professional growth.  This will be discussed in detail at the information night as well as during the March 5th and 6th class sessions.,[object Object]
Finally, you are welcome to participate in this project!  We are using a private space in a photo-sharing site called Flickr, where all the photos will be sent and eventually posted to a map at the exact location they were uncovered.  You are welcome to take a picture of a biological species that you encounter, send it to kolb@flickr.com along with a short text message on what you think the species is and the location of where you took the picture!  Feel free to check the website each week to see the learning progress.  Login:  Kolbbiology Password:  Biokid,[object Object]
I hope to see you in class and/or on the March 3rd information night.  In the meantime if you have any questions or concerns do not hesitate to contact me at kolb@gmail.com or by phone 777-222-5777.,[object Object],I give permission for my child to use their cell phone for phone calling for this project:,[object Object],______________________________________________________. (parent signature),[object Object],**They can only use _____ number of calling minutes for this project,[object Object],I give permission for my child to use their cell phone for text messaging for this project:,[object Object],______________________________________________________. (parent signature),[object Object],**They can only use _____ number of text messages for this project,[object Object],I give permission for my child to use their cell phone for mobile Internet for this project:,[object Object],______________________________________________________. (parent signature),[object Object],I give permission for my child to use their cell phone for taking and sending pictures and/ or videos (circle one or both) for this project:,[object Object],______________________________________________________. (parent signature),[object Object],**They can only send _____ number of media messages for this project,[object Object]
Rules agreed upon by students and teacher,[object Object],Cell Phones Must Be on Vibrate at All Times,[object Object],Cell phones should be placed in the front of the room at the beginning of class (at the designated table in your numbered slot) and whenever they are not needed for instruction,[object Object],All mobile messages or media sent from your phone during class MUST be related to the lesson or activity,[object Object],If you are referencing someone else in class, you must have their (recorded verbal or written) approval before posting or publishing.,[object Object]
Consequences,[object Object],The student will be asked to write a letter home to you and explain why they did not follow the rules in class.  They will also be asked to come up with better class guidelines around cell phones use in schools so this does not occur again.,[object Object], ,[object Object],I will adhere to the classroom rules for cell phone use,[object Object],___________________________________________________. (student signature),[object Object], ,[object Object],Thank you,[object Object],Liz Kolb,[object Object]
Step 5:  Alternatives,[object Object]
Alternative Ideas,[object Object],Select an online resource that couples with cell phones, but also has web-based options for uploading or sharing.  For example if you use Flickr to send pictures to and from mobile phones to a private place online, students who do not have a cell phone, can still upload to Flickr via the web.,[object Object],Grouping students.  Purposely putting students in groups or pairs where the teacher knows that at least one of the group members has a cell phone that can be used for the project is a simple way to keep the students who do not have cell phones anonymous (because the teacher can say, “someone in each group should take out their cell phone to use for this activity.”),[object Object],Allow students to use your own cell phone.,[object Object],Landlines (many web-based cell phone resources have toll free calling numbers) for phone calling activities.  ,[object Object],Center activities for K-8 students where the teacher can use one cell phone with all the students during center time.,[object Object],Allow students to use hardcopy options that they hand in to you, and you upload the work to the online resource.  This is important since a few parents do not want their children using cell phones in any capacity.,[object Object]
Step 6:  parent Information night,[object Object]
Parent Night Ideas,[object Object],An overview of why you are using the student cell phones.,[object Object],Describe the project(s) that will revolve around cell phone use, and any cost associated with the project and student cell phone use. ,[object Object],Alternatives that the students have for completing the project without using cell phones ,[object Object],Any change in school cell phone policy as a result of the project(s). ,[object Object],Rules of the cell phone use during the project and the consequences for the students who do not follow the rules.,[object Object],Parents should be invited to participate in the activity (within reason). ,[object Object],Provide parents with multiple ways for feedback (email address, a text message number, a voicemail (Google Voice would be great for this), and an online anonymous survey (such as Google Form). ,[object Object]
Ideas For Parents,[object Object],http://www.safetyweb.com/ (monitor your child’s digital identity).,[object Object],Visit websites that have ideas on how to stay safe via the mobile phone.  One example would be http://connectsafely.com,[object Object],Talk to your kids about text bullying and sexting, especially the short- and long-term consequences.,[object Object],Monitor their cell phone use: Who are they texting? Who is texting them?,[object Object],Suggest that everyone’s cell phone stay on the kitchen counter or another centralized place while they’re home.,[object Object],Set rules about the kind of behavior that is and is not acceptable—on a cell phone, or anywhere else. Remind kids of the rules periodically.,[object Object]
Ideas for Parents,[object Object],Model Appropriate Use:  Try not to text or talk on the phone while driving, try to not interrupt conversations or dinners with cell phone activities.  Also explain and point out to the children when you are modeling an appropriate use such as, “I am not answering the phone because we are having a family dinner and I want to give my full attention to my family for this hour.” ,[object Object],Document Family Activities:  Model how to capture pictures or videos of family vacations or family activities via the cell phone.  Demonstrate how to capture reactions (via audio recording) to family activities.  This is a great way to model data collection in the real world via cell phone. ,[object Object],Get involved with the classroom projects.  Since parents often have their mobile phones with them all day, they could capture images or send text messages into class for the school assignment along with their children.  They could join the class text message alert in order to receive information from the teacher about homework or other class activities. ,[object Object]
Step 7:  start slowly, remind, Follow through, and Feedback,[object Object]
Improving on Traditional Learning,[object Object]
9th Graders Text Messaging Romeo and Juliet,[object Object],[object Object]
Translating Romeo and Juliet to “text speak”
Start in class with translating a few lines to a wiffiti board.
Voting on best “translations”

More Related Content

What's hot

Traverse kolb 2010
Traverse kolb 2010Traverse kolb 2010
Traverse kolb 2010elizkeren
 
Wisconsin cellphones oct
Wisconsin cellphones octWisconsin cellphones oct
Wisconsin cellphones octelizkeren
 
A final submision by todd vatalaro
A final submision by todd vatalaroA final submision by todd vatalaro
A final submision by todd vatalaroTodd Vatalaro
 
Appleton Opening
Appleton OpeningAppleton Opening
Appleton Openingelizkeren
 
Chilton mobile
Chilton mobileChilton mobile
Chilton mobileelizkeren
 
Madison Opening
Madison OpeningMadison Opening
Madison Openingelizkeren
 
Cyberbullying Resources
Cyberbullying ResourcesCyberbullying Resources
Cyberbullying ResourcesAndy Jeter
 
Eps paper
Eps paperEps paper
Eps paperMEL SIG
 
Categorize balanced dataset for troll detection
Categorize balanced dataset for troll detectionCategorize balanced dataset for troll detection
Categorize balanced dataset for troll detectionvivatechijri
 
Honors Seminar - E-Lit Studies - Spring 2017
Honors Seminar - E-Lit Studies - Spring 2017Honors Seminar - E-Lit Studies - Spring 2017
Honors Seminar - E-Lit Studies - Spring 2017Cameron Irby
 
Finaly! Untangling Web 2.0
Finaly! Untangling Web 2.0Finaly! Untangling Web 2.0
Finaly! Untangling Web 2.0sydneyblackmore
 
Internet use and its impact on secondary school students in chian
Internet use and its impact on secondary school students in chianInternet use and its impact on secondary school students in chian
Internet use and its impact on secondary school students in chianCristopher Sodusta
 

What's hot (20)

Mississippi State University Adams
Mississippi State University AdamsMississippi State University Adams
Mississippi State University Adams
 
Traverse kolb 2010
Traverse kolb 2010Traverse kolb 2010
Traverse kolb 2010
 
Wisconsin cellphones oct
Wisconsin cellphones octWisconsin cellphones oct
Wisconsin cellphones oct
 
Cell byot
Cell byotCell byot
Cell byot
 
SAMUEL FULL MSC PROJECT
SAMUEL FULL MSC PROJECTSAMUEL FULL MSC PROJECT
SAMUEL FULL MSC PROJECT
 
A final submision by todd vatalaro
A final submision by todd vatalaroA final submision by todd vatalaro
A final submision by todd vatalaro
 
Appleton Opening
Appleton OpeningAppleton Opening
Appleton Opening
 
Chilton mobile
Chilton mobileChilton mobile
Chilton mobile
 
Madison Opening
Madison OpeningMadison Opening
Madison Opening
 
Cyberbullying Resources
Cyberbullying ResourcesCyberbullying Resources
Cyberbullying Resources
 
Illegal file sharing4
Illegal file sharing4Illegal file sharing4
Illegal file sharing4
 
Illegal File Sharing
Illegal File SharingIllegal File Sharing
Illegal File Sharing
 
Eps paper
Eps paperEps paper
Eps paper
 
A systematic literature review of academic cyberbullying 2021
A systematic literature review of academic cyberbullying 2021A systematic literature review of academic cyberbullying 2021
A systematic literature review of academic cyberbullying 2021
 
Categorize balanced dataset for troll detection
Categorize balanced dataset for troll detectionCategorize balanced dataset for troll detection
Categorize balanced dataset for troll detection
 
Wingate Policy Paper
Wingate Policy PaperWingate Policy Paper
Wingate Policy Paper
 
Honors Seminar - E-Lit Studies - Spring 2017
Honors Seminar - E-Lit Studies - Spring 2017Honors Seminar - E-Lit Studies - Spring 2017
Honors Seminar - E-Lit Studies - Spring 2017
 
Chapter 2 oblinger & oblinger
Chapter 2  oblinger & oblingerChapter 2  oblinger & oblinger
Chapter 2 oblinger & oblinger
 
Finaly! Untangling Web 2.0
Finaly! Untangling Web 2.0Finaly! Untangling Web 2.0
Finaly! Untangling Web 2.0
 
Internet use and its impact on secondary school students in chian
Internet use and its impact on secondary school students in chianInternet use and its impact on secondary school students in chian
Internet use and its impact on secondary school students in chian
 

Viewers also liked

Socialbookmarking 07 09
Socialbookmarking 07 09Socialbookmarking 07 09
Socialbookmarking 07 09elizkeren
 
Virtual conferencein cloud mame
Virtual conferencein cloud mameVirtual conferencein cloud mame
Virtual conferencein cloud mameelizkeren
 
Game on macul_final
Game on macul_finalGame on macul_final
Game on macul_finalelizkeren
 
Game on macul_final
Game on macul_finalGame on macul_final
Game on macul_finalelizkeren
 
Podcasting rss
Podcasting rssPodcasting rss
Podcasting rsselizkeren
 

Viewers also liked (6)

Socialbookmarking 07 09
Socialbookmarking 07 09Socialbookmarking 07 09
Socialbookmarking 07 09
 
Virtual conferencein cloud mame
Virtual conferencein cloud mameVirtual conferencein cloud mame
Virtual conferencein cloud mame
 
Game on macul_final
Game on macul_finalGame on macul_final
Game on macul_final
 
Game on macul_final
Game on macul_finalGame on macul_final
Game on macul_final
 
Toronto
TorontoToronto
Toronto
 
Podcasting rss
Podcasting rssPodcasting rss
Podcasting rss
 

Similar to Blissfield Presentation

Teachersessionadrian
TeachersessionadrianTeachersessionadrian
Teachersessionadrianelizkeren
 
Fort Recovery
Fort RecoveryFort Recovery
Fort Recoveryelizkeren
 
Eastern Keren
Eastern KerenEastern Keren
Eastern Kerenelizkeren
 
Macul2011 lesson
Macul2011 lessonMacul2011 lesson
Macul2011 lessonelizkeren
 
Cellphones09 29
Cellphones09 29Cellphones09 29
Cellphones09 29elizkeren
 
Madison Opening
Madison OpeningMadison Opening
Madison Openingelizkeren
 
Cellphones09 11
Cellphones09 11Cellphones09 11
Cellphones09 11elizkeren
 
The iCatechist: Effectively Using Your iDevices
The iCatechist: Effectively Using Your iDevices The iCatechist: Effectively Using Your iDevices
The iCatechist: Effectively Using Your iDevices Caroline Cerveny
 
21st Century 09 18
21st Century 09 1821st Century 09 18
21st Century 09 18elizkeren
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devicesErnest Staats
 
Macul Cell Part1
Macul Cell Part1Macul Cell Part1
Macul Cell Part1elizkeren
 
Macul Cell Part1
Macul Cell Part1Macul Cell Part1
Macul Cell Part1elizkeren
 
Why cell phones
Why cell phonesWhy cell phones
Why cell phoneselizkeren
 
Why Cell Phones
Why Cell PhonesWhy Cell Phones
Why Cell Phoneselizkeren
 

Similar to Blissfield Presentation (20)

Teachersessionadrian
TeachersessionadrianTeachersessionadrian
Teachersessionadrian
 
Fort Recovery
Fort RecoveryFort Recovery
Fort Recovery
 
Eastern Keren
Eastern KerenEastern Keren
Eastern Keren
 
Macul2011 lesson
Macul2011 lessonMacul2011 lesson
Macul2011 lesson
 
Toronto
TorontoToronto
Toronto
 
Cellphones09 29
Cellphones09 29Cellphones09 29
Cellphones09 29
 
Apple 2011
Apple 2011Apple 2011
Apple 2011
 
Madison Opening
Madison OpeningMadison Opening
Madison Opening
 
Cellphones09 11
Cellphones09 11Cellphones09 11
Cellphones09 11
 
Thurston
ThurstonThurston
Thurston
 
Dean
DeanDean
Dean
 
The iCatechist: Effectively Using Your iDevices
The iCatechist: Effectively Using Your iDevices The iCatechist: Effectively Using Your iDevices
The iCatechist: Effectively Using Your iDevices
 
21st Century 09 18
21st Century 09 1821st Century 09 18
21st Century 09 18
 
Texas
TexasTexas
Texas
 
Port huron
Port huronPort huron
Port huron
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devices
 
Macul Cell Part1
Macul Cell Part1Macul Cell Part1
Macul Cell Part1
 
Macul Cell Part1
Macul Cell Part1Macul Cell Part1
Macul Cell Part1
 
Why cell phones
Why cell phonesWhy cell phones
Why cell phones
 
Why Cell Phones
Why Cell PhonesWhy Cell Phones
Why Cell Phones
 

More from elizkeren

Cosn gamification_Kolb
Cosn gamification_KolbCosn gamification_Kolb
Cosn gamification_Kolbelizkeren
 
Virtual conferencein cloud macul
Virtual conferencein cloud maculVirtual conferencein cloud macul
Virtual conferencein cloud maculelizkeren
 
Macul bookclubs 13
Macul bookclubs 13Macul bookclubs 13
Macul bookclubs 13elizkeren
 
Charter cellphones
Charter cellphones Charter cellphones
Charter cellphones elizkeren
 
Wisconsin oct2010
Wisconsin oct2010Wisconsin oct2010
Wisconsin oct2010elizkeren
 
Digitalfootprints 10 08
Digitalfootprints 10 08Digitalfootprints 10 08
Digitalfootprints 10 08elizkeren
 
Digitalfootprints 10 08
Digitalfootprints 10 08Digitalfootprints 10 08
Digitalfootprints 10 08elizkeren
 
Ele under opening
Ele under openingEle under opening
Ele under openingelizkeren
 
Virtualteaching
VirtualteachingVirtualteaching
Virtualteachingelizkeren
 

More from elizkeren (14)

Cosn gamification_Kolb
Cosn gamification_KolbCosn gamification_Kolb
Cosn gamification_Kolb
 
Virtual conferencein cloud macul
Virtual conferencein cloud maculVirtual conferencein cloud macul
Virtual conferencein cloud macul
 
Macul bookclubs 13
Macul bookclubs 13Macul bookclubs 13
Macul bookclubs 13
 
12 01
12 0112 01
12 01
 
Charter cellphones
Charter cellphones Charter cellphones
Charter cellphones
 
Wisconsin oct2010
Wisconsin oct2010Wisconsin oct2010
Wisconsin oct2010
 
Legalissues
LegalissuesLegalissues
Legalissues
 
Kdp
KdpKdp
Kdp
 
Digitalfootprints 10 08
Digitalfootprints 10 08Digitalfootprints 10 08
Digitalfootprints 10 08
 
Digitalfootprints 10 08
Digitalfootprints 10 08Digitalfootprints 10 08
Digitalfootprints 10 08
 
Ele under opening
Ele under openingEle under opening
Ele under opening
 
Boston_Kolb
Boston_KolbBoston_Kolb
Boston_Kolb
 
Boston
BostonBoston
Boston
 
Virtualteaching
VirtualteachingVirtualteaching
Virtualteaching
 

Recently uploaded

GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncObject Automation
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?SANGHEE SHIN
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIUdaiappa Ramachandran
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 

Recently uploaded (20)

GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation Inc
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AI
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 

Blissfield Presentation

  • 1.
  • 2.
  • 3.
  • 5.
  • 6.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 16.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 55.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71. Report it as soon as possible to a trusted adult (and if that person doesn’t help, tell others until someone does).
  • 72. Save or print the message to keep a record, then delete it from the phone.
  • 73. Only keep contact information of close friends and family in their address book.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78. Keep them in the front of the room until you are going to use them.
  • 79. All messages/media sent or published must be related to lesson.
  • 80. If you are referencing someone else in class, you must have their approval before posting or publishing.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99. Translating Romeo and Juliet to “text speak”
  • 100. Start in class with translating a few lines to a wiffiti board.
  • 101. Voting on best “translations”
  • 103. Create a whole text message novel of Romeo and Juliet
  • 104.
  • 106.
  • 107.
  • 109.
  • 110.
  • 111.
  • 112.

Editor's Notes

  1. http://blog.nielsen.com/nielsenwire/online_mobile/under-aged-texting-usage-and-actual-cost
  2. http://www.pewinternet.org/Presentations/2010/Nov/fosi.aspx
  3. http://projectred.org/news/?p=79
  4. 2005 study follow up 2009 British Academy at Coventry Univ. phonological awareness
  5. http://www.recordonline.com/apps/pbcs.dll/article?AID=/20100426/NEWS/100429736
  6. http://wiffiti.com/screens/73806
  7. http://mrdarket.com/2011/05/18/try-this-out-for-me-wiffiti/
  8. Middle School Science “What do you know about elements, compounds, and mixtures?”http://wiffiti.com/screen/?id=eb633c3a-5c10-4f91-805c-7eb986e68934
  9. http://www.polleverywhere.com/free_text_polls/MTQ2NjM0MTczNA
  10. Motivational phraseBest teaching advice
  11. Lynn Sullivan
  12. http://wainauguration.org/
  13. http://www.livinginthe4thscreen.com/using-student-cell-phones-and-ipadio-to-recor
  14. http://www.pewinternet.org/Presentations/2010/Nov/fosi.aspx
  15. http://www.cnn.com/video/#/video/bestoftv/2009/01/15/pn.sexting.teens.cnn http://www.philly.com/philly/business/technology/81726862.htmlhttp://www.mtv.com/news/articles/1631891/20100212/index.jhtml
  16. http://www.mtv.com/news/articles/1631891/20100212/index.jhtml
  17. http://www.cfchildren.org/programs/hot-topics/cyberbullying/dealing-with-text-message-bullying/
  18. PEW 2009
  19. http://claudia.weblog.com.pt/arquivo/2004/11/romeo_and_julie_1.html
  20. King Lear
  21. http://www.youtube.com/watch?v=ayW032sKtj8
  22. 4th gradehttp://www.fcps.edu/ChesterbrookES/qrcodes.htmChesterbrook's Living ClassroomsThe Living Classroom across Kirby Road deals with trees particular to Virginia, and is associated with the Fourth grade. Our second Living Classroom is down near a stream