LESSON 11: Personal Protection and Data Protection

LESSON 4: DIGITAL TECHNOLOGIES INTERACTION

 THE MAIN OBJECTIVES OF THIS LESSON WERE:

- To know those key competencies that let us interact by a number of digital devices and applications.

- To understand how the digital communication is distributed, represented and managed.

-to understand the appropriate use of different communication ways through digital media.

-To study different communication formats, adapting strategies and communication ways to specific target group.

-To know the basic aspects regarding cybersecurity as net individual and as teachers to transmit this knowledge and to detect possible risky situations.


In this class, also we talked about:

  • Web 1.0: the "primitive web", mainly characterized by being unidirectional and made on static content. This was mainly informative in nature, and mainly cultural documents and information began to be posted on the internet. An example are static websites and personal sites.

  • Web 2.0 or Social Web: was establish and sustained under evolved internet connections and better tools to develop the web, better serves etc. Web 2.0, also called the social network, fills the internet with blogs, wikis, forums and finally, social networks. As objective, the Web 2.0 has the sharing of knowledge .
  • Digital identity: is also known as Identity 2.o, is everything that identifies us in the online world. The term digital identity certain aspects of civil and personal identity that have resulted from the widespread use of identity information to represent people in an acceptable trusted digital format in computer systems.


  • Virtual Learning Communities: are groups of people who gather to learn together online or via social media. They enable learners of all ages to gather both synchronously and asynchronously to pose questions, discuss, share ideas, solutions, opportunities and create things together. 

  • Cybersecurity: the online digital safety or cybersecurity is the group of tools, politics, concepts regarding security, safeguards of security, directives, risks methods management, actions, training, ideal practices, locks and technologies that can be used to protect the actives of a company and its users in the cybers-enviroment. 
  •  Cyberbullying: bullying is "unwanted", aggressive behavior among school-aged children that involves a real or perceived power imbalance. The behavior is repeated<ted, or has the potential to be repeated, over time". Cyber- bullying can be defined as the action of bullying by on-line communication technologies. This behavior can appear in adults, or even worse, in between adults and children or in between children.
To end this class we did an activity creating our own virtual family on twitter.

Como crear tu post perfecto en Twitter - WebXpro - Wordpress en Barcelona


We have chosen Twitter. Twitter is a social network created in 2006, it is used for microblogging and to communicate with people with short messages (with a maximum of 280 words, previously 140) called “tweets” that are shown in the principal page. Each user can follow the ones he or she decides, and also retweet, like or share another’s contents.


We decided Twitter because we think is an easy app to use as it is so intuitive. It has multiple functions such as live streaming, create groups, post contents but also use another’s content too. You can communicate with people all around the world easily and by using hashtags you can make a more concrete search of the topic you are interested in. 


We think Twitter is the best option as we can make surveys, we can use it to reunite all data…etc. We also thought for a future as we consider, when we will be teachers we can use this social media with the purpose of making classes more dynamics. Students will learn how to synthetize, will talk with other students in other language, interact with each other or be updated of the news just using this social network. In addition, by using this app you can also be in contact with parents and other teachers by the creation of groups, for example.


What you think in general about the use of virtual learning communities and why you think that.

I consider the use of virtual learning communities is a new way of teaching and learning, but such as a lot of things in life, if someone makes a bad use of it, it turns into a harmful weapon. I think it helps and gives weapons and facilities to students, teachers and parents, so it makes a bit easier the communication. The bad use can change everything because this communities, without the appropriate supervision could be use for other things not so beneficial.   



 


 


As we can see in this picture, we can appreciate the way in which we begin to interact with our big space family, since we can share our information and at the same time soak up information from other accounts. 


Once we have searched for the information we want to add to our profile so that it can be shared and seen by everyone, we simply have to give rt or mg to that information and continue browsing our space!

Comments