This is our group URL for our Digital Citizenship Website
http://hrmessick.wix.com/edu505
http://hrmessick.wix.com/edu505
![Picture](/uploads/8/0/4/3/80438290/1984965_orig.jpg)
How Digital Citizenship helped me teach empowering lessons while protecting my students!
The Digital Citizenship assignment was a really fun way to introduce my students to the internet and technology resources. The most important part of this assignment would be helping my students understand internet and device safety, and how to be responsible while on-line. We also learned about ethical uses and why we should be careful with the information we put on line about ourselves and others. We also enjoyed learning about how to use different technology in our classroom to promote learning by playing games, researching topics for assignments, and taking quizzes to demonstrate learning!
Thanks to Digital Citizenship, all of my technology lessons were a success. Student knew all about the rules, dangers, and expectation for being allowed to use technology in the classroom. It also allowed them to take this information home and know how to be safe on-line.
In today's world, cyber bullying is a major problem. Again, this program was very informative and helpful in preventing any bullying!
The Digital Citizenship assignment was a really fun way to introduce my students to the internet and technology resources. The most important part of this assignment would be helping my students understand internet and device safety, and how to be responsible while on-line. We also learned about ethical uses and why we should be careful with the information we put on line about ourselves and others. We also enjoyed learning about how to use different technology in our classroom to promote learning by playing games, researching topics for assignments, and taking quizzes to demonstrate learning!
Thanks to Digital Citizenship, all of my technology lessons were a success. Student knew all about the rules, dangers, and expectation for being allowed to use technology in the classroom. It also allowed them to take this information home and know how to be safe on-line.
In today's world, cyber bullying is a major problem. Again, this program was very informative and helpful in preventing any bullying!
Objectives for teaching Digital Citizenship:
- Ability to model safe, responsible, legal and ethical use of technology and implement school and district acceptable use policies including fair-use and copyright guidelines and Internet user protection policies.
- Ability to develop and implement a classroom management plan to ensure equitable and effective student access to available technology resources.
- Ability to promote, model, and communicate the safe, legal and ethical principles of digital citizenship, equitable access, digital etiquette, and responsible online social interactions in a global culture including respect for copyright, intellectual property, the appropriate documentation of sources, and Internet user protection policies.
DIGITAL CITIZENSHIP
IT IS THE DUTY OF EDUCATORS AND PARENTS TO CREATE DIGITAL CITIZENS FOR A DIGITAL WORLD. THIS WEBSITE INCLUDES INFORMATION AND RESOURCES FOR TEACHERS, PARENTS, AND STUDENTS TO SAFELY, LEGALLY, EQUITABLY, AND EFFECTIVELY UTILIZE TECHNOLOGY IN EDUCATION.
IT IS THE DUTY OF EDUCATORS AND PARENTS TO CREATE DIGITAL CITIZENS FOR A DIGITAL WORLD. THIS WEBSITE INCLUDES INFORMATION AND RESOURCES FOR TEACHERS, PARENTS, AND STUDENTS TO SAFELY, LEGALLY, EQUITABLY, AND EFFECTIVELY UTILIZE TECHNOLOGY IN EDUCATION.
![Picture](/uploads/8/0/4/3/80438290/6124475_orig.png)
WHAT IS DIGITAL CITIZENSHIP?
Digital Citizenship is “the norms of appropriate and responsible technology use.” Digital citizenship teaches students, teachers, and parents about appropriate use and behavior on the internet. Through digital citizenship educators are able to teach students the rules of the internet and how to stay safe while accessing the internet. By doing this, educators are helping students create a positive footprint in the digital world. Digital citizenship embodies several aspects of the internet and is divided into nine elements:
Digital Citizenship is “the norms of appropriate and responsible technology use.” Digital citizenship teaches students, teachers, and parents about appropriate use and behavior on the internet. Through digital citizenship educators are able to teach students the rules of the internet and how to stay safe while accessing the internet. By doing this, educators are helping students create a positive footprint in the digital world. Digital citizenship embodies several aspects of the internet and is divided into nine elements:
- Digital Access- full electronic participation in society.
- Digital Commerce- electronic buying and selling of goods.
- Digital Communication- electronic exchange of information.
- Digital Literacy- process of teaching and learning about technology and the use of technology.
- Digital Etiquette- electronic standards of conduct or procedure
- Digital Law- electronic responsibility for actions and deeds
- Digital Rights and Responsibilities- those freedoms extended to everyone in a digital world.
- Digital Health and Wellness- physical and psychological well-being in a digital technology world.
NETIQUETTE
According to WebWise the word netiquette is a combination of ‘net’ (from internet) and ’etiquette’. It means respecting other users’ views and displaying common courtesy when posting your views to online discussion groups. Users should follow the Golden Rule: Treat others the way you want to be treated. As stated by M.D. Roblyer and Aaron. H. Doering (2013), the rules of netiquette are:
According to WebWise the word netiquette is a combination of ‘net’ (from internet) and ’etiquette’. It means respecting other users’ views and displaying common courtesy when posting your views to online discussion groups. Users should follow the Golden Rule: Treat others the way you want to be treated. As stated by M.D. Roblyer and Aaron. H. Doering (2013), the rules of netiquette are:
- Identify yourself:
- Begin messages with a salutation and end them with
your name. - Use a signature (a footer with your identifying information) at the end of a message
- Begin messages with a salutation and end them with
- Include a subject line. Give a descriptive phrase in the subject line of the message header that tells the topic of the message (not just "Hi, there!").
- Avoid sarcasm. People who don't know you may misinterpret its meaning.
- Respect others' privacy. Do not quote or forward personal email without the original author's permission.
- Acknowledge and return messages promptly.
- Copy with caution. Don't copy everyone you know on each message.
- No spam (a.k.a. junk mail). Don't contribute to worthless information on the Internet by sending or responding to mass postings of chain letters, rumors, etc.
- Be concise. Keep messages concise—about one screen, as a rule of thumb.
- Use appropriate language:
- Avoid coarse, rough, or rude language.
- Observe good grammar and spelling.
- Use appropriate emoticons (emotion icons) to help convey meaning. Use "smiley's" or punctuation such as :-) to convey emotions. See website list of emoticons at http://netlingo.com/smiley.cfm and http://www.robelle.com/smugbook/smiley.html.
- Use appropriate intensifiers to help convey meaning.
- Avoid "flaming" (online "screaming") or sentences typed in all caps.
- Use asterisks surrounding words to indicate italics used for emphasis (*at last*).
- Use words in brackets, such as (grin), to show a state of mind.
- Use common acronyms (e.g., LOL for "laugh out loud").
![Picture](/uploads/8/0/4/3/80438290/9029550_orig.png)
Social Networking and Cyberbullying Policies
Cyberwise states that Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person, can be an unfortunate byproduct of digital communications. “These acts often include posing as other people online, spreading lies or rumors about another student, posting private photos or information without the victim's consent, tricking other students into revealing private information, or forwarding malicious messages to others.” Each state has its own cyberbullying laws and policies. Below are the components of local educational agencies policy on cyberbullying from stopbullying.gov.
Definitions
Cyberwise states that Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person, can be an unfortunate byproduct of digital communications. “These acts often include posing as other people online, spreading lies or rumors about another student, posting private photos or information without the victim's consent, tricking other students into revealing private information, or forwarding malicious messages to others.” Each state has its own cyberbullying laws and policies. Below are the components of local educational agencies policy on cyberbullying from stopbullying.gov.
Definitions
- Includes a definition of bullying consistent with the definitions specified in state law.
- Includes a procedure for students, students’ families, staff, and others to report incidents of bullying, including a process to submit such information anonymously and with protection from retaliation. The procedure identifies and provides contact information for the appropriate school personnel responsible for receiving the report and investigating the incident.
- Requires that school personnel report, in a timely and responsive manner, incidents of bullying they witness or are aware of to a designated official.
SAVVY
Being net savvy in the classroom includes knowing how to be safe on the internet and knowing the importance of net legality, equitable use, management systems, and acceptable use policies. Check out the sections below to learn more about being net savvy in the classroom.
Being net savvy in the classroom includes knowing how to be safe on the internet and knowing the importance of net legality, equitable use, management systems, and acceptable use policies. Check out the sections below to learn more about being net savvy in the classroom.
INTERNET SAFETY
Tips for Students
General Usage
Email
Harassment
Parental Involvement
Social Networking
Tips for Students
General Usage
- Under no circumstance should there be any exchange of personal information. People are not always who they claim to be.
- Immediately close out of any site that looks unfamiliar or causes you to feel uncomfortable.
- Have your parents walk by often and show them what you are doing. This way if any bad situation arises, you will have their help.
- Learn about different search engines and how they work. Which engines are the most trustworthy?
- Learn about email and chat services available and be familiar with the possible risks associated with them.
- Choose a safe and respectable email prefix that is not suggestive or seductive.
- DO NOT open any unfamiliar mail, as it may contain inappropriate content or even viruses that can completely destroy your computer.
- DO NOT share your password. Sharing passwords allows the other person to have the freedom to post anything that they want to about you. Think about what could happen if your friend gets mad at you!
- Sharing passwords allows the other person to have the freedom to post anything that they want to about you. Think about what could happen if your friend gets mad at you!
- Change email passwords often. It is easy for people to get their hands on your information and even hack into your email.
Harassment
- Print or keep some record of any rude or harassing emails or messages, but DO NOT respond.
- Email addresses and accounts can be changed to avoid harassing communications.
- If you find any harassing posts or inappropriate information about yourself online, keep a record, and tell your parents. Your parents may then decide to contact law enforcement.
Parental Involvement
- Teach your parents about the internet and its jargon. The more parents know, the more comfortable they will be with trusting you to use the internet.
- Talk to your parents at the first sign of harassment. Let them help you.
- Teach your parents the safety tips that you know! You want them to be just as safe.
Social Networking
- Set all aspects of your profiles on social networks to private.
- Only add people on social networks or chats that you know personally.
- Be careful of what information you share about yourself. People can use it against you.
- DO NOT share your passwords with anyone, even a close friend. Sharing passwords allows the other person to have the freedom to post anything that they want to about you. Think about what could happen if your friend gets mad at you!
- Keep a respectable login name and profile picture. People may look at you and think you are “hot,” while others may look and be tempted to do evil things to your body.
Below are the parts of the Digital Citizenship assignment that I was assigned to complete for our group project!
Equitable Digital Access
Digital Learning Provisions within the Every Student Succeeds Act (ESSA)
Please watch the video below.
Equitable Digital Access
Digital Learning Provisions within the Every Student Succeeds Act (ESSA)
Please watch the video below.
The first step in effective technology integration is identifying the change that may need to occur inside the classroom considering the different teaching approaches for learned standards and classroom manageability. An effective management system must be put in place so that all students are receiving technological enhanced instruction that allows for enrichment of skills in addition to remediation.
According to edutopia.org. (2007), “When any teacher brings technology into the classroom, he or she will no longer be the center of attention. The level of refocused attention will, of course, depend on the amount and the type of technology (e.g., mobile device, e-reader, laptop, interactive whiteboard) being brought into the classroom.” One must not assume that technology can replace the teacher. In fact, technology can impede learning if not used in an efficient way that empowers learning. Digital devices and tools are to be used as resources that help the teacher enhance and engage students in learning. The teacher is still the main resource in the classroom that ensures that digital tools are being used effectively for learning and collaboration.
According to Roblyer, M.D. (2016), there are three main Cultural/Equity Issues in technological classrooms -
- The digital divide- low-income and minority students’ dropout rates from distance courses higher for already-underserved students
- Racial and gender equity- females and some minorities use computers less and enter STEM at lower rates; while, underserved student groups is often limited to remedial, rather than empowering purposes
- Students with special needs-devices and methods to allow equal access remain expensive, difficult to implement
How to Ensure Equitable Digital Access
When ensuring equitable digital access, one must consider what resources are available in comparison to ratio of users, classroom arrangements, and intended purposes/outcome objectives for using digital devices.
Our school is fortunate to have a variety of technology resources available for use in the classroom.
Every classroom in the system has a minimum of two desktop computers and two Google Chrome Books for student use.
One mobile Chrome Book cart for each grade level. Each cart contains 30 devices and is available to be checked out by classroom teachers.
Our school also routinely schedules BYOD days in which students are allowed to bring their own device to use in scheduled classroom activities.
There are different Types of Technology Labs as referred to on page 11 Table 1.2 (Roblyer, M.D.(2016).
- Special- purpose labs are labs set up with 20-30 stationary computers.
Limitations- Usually excludes groups who do not meet a certain purpose.
- General-Use labs are used for teachers and students to engage in any lesson based assignment or project.
Limitations- Usually have to schedule a time for a whole class to use it
- Library/Media Centers -usually have a librarian or media personnel that is in charge of the digital devices and general maintenance
Limitations- groups or classes may not be able to engage in group projects that could potentially hinder other users of the library/media center
Types of Classroom Arrangements and Digital Devices as referred to on page 11 Table 1.3 (Roblyer, M.D.(2016).
Mobile workstations (on carts) and mobile labs (sets of devices)
Benefits – can allow for multiple users and supply on-demand access
Limitations- it can be difficult to move through doorways, small places, or up stairs
Computer Centers or areas in classroom- two or more computers set up in a specific area
Benefits- teacher may use as he or she feels will engage students whole group or small group. Teacher may use to teach whole group lessons.
Limitations- may be a distraction to other students working in other groups or centers
Student handheld device (BYOD)- students bring their own personal device from home
Benefits- enable students to have a more one on one interaction with digital device for educational practices
Limitations- requires infrastructure, polices, and strategies to limit access to appropriate content
School-supplied devices (one-to-one)- Chrome books, ipads, and other digital devices
Benefits- enable all students to use devices at one time and work independently on specific skills
Limitations- expensive to purchase, maintain, and update
Image Retrieved on March 16,2016 from
http://www.edudemic.com/wp-content/uploads/2014/09/tech-in-classroom.png
Please watch the video below.
I. (2015). Enhancing Learning with Increased Access to Technology. Retrieved March 20, 2016, from http://www.youtube.com/watch?v=DsbweofAYyk
Image retrieved on March 22, 2016 from
http://blog.whooosreading.org/10-teacher-tools-to-techify-your-classroom/
Supporting States on Ensuring Equitable Access to Educators
http://blog.whooosreading.org/10-teacher-tools-to-techify-your-classroom/
Supporting States on Ensuring Equitable Access to Educators
Classroom Technology Rules
There is a time and place for cell phones and other devices. Don't be a Twalker!
1. During the instructional day which begins when students arrive on campus and ends after the dismissal bell rings all cellular phone devices must be placed in the off position during all instructional times. Teachers have the discretion to grant per-mission for technological devices to be utilized in order to participate in classroom instructional activities. Any use of the technological device during instructional time without teacher consent will be considered a violation of this policy.
2. Any technological device is subject to search in the event the school administrators) believe reasonable suspicion exists to support the search.
3. If an emergency should occur and parents need to speak to their child, please con-tact the campus' main number for assistance.
4. Additionally, the principal and/or his or her designated personnel have the authority to grant temporary usage of technological devices during declared emergencies or crisis.
5. During state mandated testing, students are expected to turn their technological devices in to the classroom teacher before the test begins or abide by other procedures established by the principal.
6. The district will not assume responsibility for any item that is damaged, lost, or stolen. Administrators will not be responsible for recovery efforts.
7. If a student is caught using a technological device for text messaging during exams, photographing tests, taking inappropriate photos or movies, harassment or any other highly inappropriate use of the device, then more severe consequences maybe administered at the Principal's discretion under the categories of academic dis-honesty, production, or possession of pornography, harassment, etc. Students receiving these messages could be subject to the same offenses as the person who sent the message, unless the student reports this immediately to an administrator. Law enforcement may be contacted if it is deemed necessary.
8. Students may connect their technological devices at appropriate times to the wire-less connection provided at schools but are subject to the terms of the BOE.
www.marshallk12.org
Creating a Digital Social Contract with Students.
The example below was taken from a Powerpoint by Mark Ray from Vancouver Public Schools. www.edtech.wednet.edu/pdf/BYOD.ppt.
P.R.I.D.E.
P – Purpose for using device is always educational
R – Responsible use of devices is always expected
I – Instructions for device use will always be followed
D – Devices must always be using the school’s WiFi network
E – Everyone will always conduct him or herself responsibly online
Digital Social Contract:
As a student,
I am responsible for the choices I make when I use technology,
I understand that using technology effectively is a skill that is essential to my success, and
I understand that I am responsible when I use technology at school.
That means…
As a student, I am responsible…
For keeping my personal computer devices secure when I bring them to school.
For keeping my digital accounts secure.
For what I do on when using technology at school.
For not hurting the ability of others to learn.
For what I say and do online.
For giving credit where credit is due and respecting the intellectual property of others.
For making good choices about when and where I use personal devices at school.
There is a time and place for cell phones and other devices. Don't be a Twalker!
1. During the instructional day which begins when students arrive on campus and ends after the dismissal bell rings all cellular phone devices must be placed in the off position during all instructional times. Teachers have the discretion to grant per-mission for technological devices to be utilized in order to participate in classroom instructional activities. Any use of the technological device during instructional time without teacher consent will be considered a violation of this policy.
2. Any technological device is subject to search in the event the school administrators) believe reasonable suspicion exists to support the search.
3. If an emergency should occur and parents need to speak to their child, please con-tact the campus' main number for assistance.
4. Additionally, the principal and/or his or her designated personnel have the authority to grant temporary usage of technological devices during declared emergencies or crisis.
5. During state mandated testing, students are expected to turn their technological devices in to the classroom teacher before the test begins or abide by other procedures established by the principal.
6. The district will not assume responsibility for any item that is damaged, lost, or stolen. Administrators will not be responsible for recovery efforts.
7. If a student is caught using a technological device for text messaging during exams, photographing tests, taking inappropriate photos or movies, harassment or any other highly inappropriate use of the device, then more severe consequences maybe administered at the Principal's discretion under the categories of academic dis-honesty, production, or possession of pornography, harassment, etc. Students receiving these messages could be subject to the same offenses as the person who sent the message, unless the student reports this immediately to an administrator. Law enforcement may be contacted if it is deemed necessary.
8. Students may connect their technological devices at appropriate times to the wire-less connection provided at schools but are subject to the terms of the BOE.
www.marshallk12.org
Creating a Digital Social Contract with Students.
The example below was taken from a Powerpoint by Mark Ray from Vancouver Public Schools. www.edtech.wednet.edu/pdf/BYOD.ppt.
P.R.I.D.E.
P – Purpose for using device is always educational
R – Responsible use of devices is always expected
I – Instructions for device use will always be followed
D – Devices must always be using the school’s WiFi network
E – Everyone will always conduct him or herself responsibly online
Digital Social Contract:
As a student,
I am responsible for the choices I make when I use technology,
I understand that using technology effectively is a skill that is essential to my success, and
I understand that I am responsible when I use technology at school.
That means…
As a student, I am responsible…
For keeping my personal computer devices secure when I bring them to school.
For keeping my digital accounts secure.
For what I do on when using technology at school.
For not hurting the ability of others to learn.
For what I say and do online.
For giving credit where credit is due and respecting the intellectual property of others.
For making good choices about when and where I use personal devices at school.
Image retrieved on March 21, 2016 from
http://preschoolears.com/blog/keeping-kids-tech-safe/
Classroom iPad Rules
http://preschoolears.com/blog/keeping-kids-tech-safe/
Classroom iPad Rules
Image retrieved on March 21, 2016 from
http://teachthebitsandbytes.blogspot.com/2015/02/a-few-new-posters.html
Computer Lab Rules
http://teachthebitsandbytes.blogspot.com/2015/02/a-few-new-posters.html
Computer Lab Rules
BYOD Image retrieved on March 21, 2016 from
https://sites.google.com/a/friscoisd.org/itunes_project-inspire/classroom-management
Classroom Chromebook Management
https://sites.google.com/a/friscoisd.org/itunes_project-inspire/classroom-management
Classroom Chromebook Management
ACCEPTABLE USE POLICYAn acceptable use policy (AUP) is a document signed by students and parents stating that they understand what are acceptable and unacceptable behaviors when using technology at school and that they understand the consequences if the policy is violated. The AUP should be in student friendly terms, and it should spell out what is considers acceptable and unacceptable behaviors when using technology.
References
BYOD overview and progress PPT 1 - edtech.wednet.edu. (n.d.). Retrieved March 22, 2016,
from http://www.edtech.wednet.edu/pdf/BYOD.ppt
Computer Lab Rules. (n.d.). Retrieved March 23, 2016, from https://youtu.be/mZ7J8y9c1DI
Differentiation using Google Classroom | GoogleAppsAction.com. (n.d.). Retrieved March 21,
2016, from http://googleappsaction.com/?p=75
Keeping Kids Tech Safe. (2013). Retrieved March 21, 2016, from
http://preschoolears.com/blog/keeping-kids-tech-safe/
Practical Guidelines for Using Technology Tools in Classroom Teaching. (n.d.). Retrieved
March 23, 2016, from http://www.crlt.umich.edu/gsis/p4_3
T. (2014). Classroom Chromebook Management. Retrieved March 23, 2016, from
http://www.youtube.com/watch?v=cCjI6YUg2Vw
Images
Image retrieved on March 21, 2016 from
http://preschoolears.com/blog/keeping-kids-tech-safe/
Image retrieved on March 21, 2016 from
http://teachthebitsandbytes.blogspot.com/2015/02/a-few-new-posters.html
BYOD Image retrieved on March 21, 2016 from
https://sites.google.com/a/friscoisd.org/itunes_project-inspire/classroom-management
BYOD overview and progress PPT 1 - edtech.wednet.edu. (n.d.). Retrieved March 22, 2016,
from http://www.edtech.wednet.edu/pdf/BYOD.ppt
Computer Lab Rules. (n.d.). Retrieved March 23, 2016, from https://youtu.be/mZ7J8y9c1DI
Differentiation using Google Classroom | GoogleAppsAction.com. (n.d.). Retrieved March 21,
2016, from http://googleappsaction.com/?p=75
Keeping Kids Tech Safe. (2013). Retrieved March 21, 2016, from
http://preschoolears.com/blog/keeping-kids-tech-safe/
Practical Guidelines for Using Technology Tools in Classroom Teaching. (n.d.). Retrieved
March 23, 2016, from http://www.crlt.umich.edu/gsis/p4_3
T. (2014). Classroom Chromebook Management. Retrieved March 23, 2016, from
http://www.youtube.com/watch?v=cCjI6YUg2Vw
Images
Image retrieved on March 21, 2016 from
http://preschoolears.com/blog/keeping-kids-tech-safe/
Image retrieved on March 21, 2016 from
http://teachthebitsandbytes.blogspot.com/2015/02/a-few-new-posters.html
BYOD Image retrieved on March 21, 2016 from
https://sites.google.com/a/friscoisd.org/itunes_project-inspire/classroom-management
References
A. (2016). Digital Learning Provisions within the Every Student Succeeds Act (ESSA).
Retrieved March 20, 2016, from https://www.youtube.com/watch?v=lDKJxHsRy10
The "BYOD" Experience. (n.d.). Retrieved March 200, 2016,
from http://blogs.fcps.net/byod/2013/03/11/byod-and-classroom-management-help/
Differentiation using Google Classroom | GoogleAppsAction.com. (n.d.). Retrieved March 21,
2016, from http://googleappsaction.com/?p=75
H. (2014). Supporting States on Ensuring Equitable Access to Educators. Retrieved March 22,
2016, from http://www.youtube.com/watch?v=FRcG6-odds4
How to Integrate Technology. (2007). Retrieved March 15, 2016, from
http://www.edutopia.org/technology-integration-guide-implementation?
I. (2015). Enhancing Learning with Increased Access to Technology. Retrieved March 20, 2016,
from http://www.youtube.com/watch?v=DsbweofAYyk
Roblyer, M.D.(2016). Integrating educational technology into teaching. Boston:Pearson
Keeping Kids Tech Safe. (2013). Retrieved March 21, 2016, from
http://preschoolears.com/blog/keeping-kids-tech-safe/
Marshall County Board of Education website. (2016). Retrieved March 16, 2016 from
www.marshallk12.org
Practical Guidelines for Using Technology Tools in Classroom Teaching. (n.d.). Retrieved
March 23, 2016, from http://www.crlt.umich.edu/gsis/p4_3
Teach the Bits and Bytes. (n.d.). Retrieved March 21, 2016, from
http://teachthebitsandbytes.blogspot.com/2015/02/a-few-new-posters.html
A. (2016). Digital Learning Provisions within the Every Student Succeeds Act (ESSA).
Retrieved March 20, 2016, from https://www.youtube.com/watch?v=lDKJxHsRy10
The "BYOD" Experience. (n.d.). Retrieved March 200, 2016,
from http://blogs.fcps.net/byod/2013/03/11/byod-and-classroom-management-help/
Differentiation using Google Classroom | GoogleAppsAction.com. (n.d.). Retrieved March 21,
2016, from http://googleappsaction.com/?p=75
H. (2014). Supporting States on Ensuring Equitable Access to Educators. Retrieved March 22,
2016, from http://www.youtube.com/watch?v=FRcG6-odds4
How to Integrate Technology. (2007). Retrieved March 15, 2016, from
http://www.edutopia.org/technology-integration-guide-implementation?
I. (2015). Enhancing Learning with Increased Access to Technology. Retrieved March 20, 2016,
from http://www.youtube.com/watch?v=DsbweofAYyk
Roblyer, M.D.(2016). Integrating educational technology into teaching. Boston:Pearson
Keeping Kids Tech Safe. (2013). Retrieved March 21, 2016, from
http://preschoolears.com/blog/keeping-kids-tech-safe/
Marshall County Board of Education website. (2016). Retrieved March 16, 2016 from
www.marshallk12.org
Practical Guidelines for Using Technology Tools in Classroom Teaching. (n.d.). Retrieved
March 23, 2016, from http://www.crlt.umich.edu/gsis/p4_3
Teach the Bits and Bytes. (n.d.). Retrieved March 21, 2016, from
http://teachthebitsandbytes.blogspot.com/2015/02/a-few-new-posters.html