Time Block Action / Script Materials

Similar documents
EVERYTHING DiSC WORKPLACE LEADER S GUIDE

Custom Program Title. Leader s Guide. Understanding Other Styles. Discovering Your DiSC Style. Building More Effective Relationships

Leader s Guide: Dream Big and Plan for Success

Why Pay Attention to Race?

Essentials of Rapid elearning (REL) Design

Me on the Map. Standards: Objectives: Learning Activities:

Speak with Confidence The Art of Developing Presentations & Impromptu Speaking

What to Do When Conflict Happens

ALL-IN-ONE MEETING GUIDE THE ECONOMICS OF WELL-BEING

Some Basic Active Learning Strategies

Introduction to Communication Essentials

COMMUNICATION & NETWORKING. How can I use the phone and to communicate effectively with adults?

PART C: ENERGIZERS & TEAM-BUILDING ACTIVITIES TO SUPPORT YOUTH-ADULT PARTNERSHIPS

#MySHX400 in Your Classroom TEACHING MODULE What s your Shakespeare story?

Community Power Simulation

This curriculum is brought to you by the National Officer Team.

First and Last Name School District School Name School City, State

Basic lesson time includes activity only. Introductory and Wrap-Up suggestions can be used

Chapter 9: Conducting Interviews

What s in Your Communication Toolbox? COMMUNICATION TOOLBOX. verse clinical scenarios to bolster clinical outcomes: 1

Appendix L: Online Testing Highlights and Script

Eduroam Support Clinics What are they?

PREVIEW LEADER S GUIDE IT S ABOUT RESPECT CONTENTS. Recognizing Harassment in a Diverse Workplace

Grade 2: Using a Number Line to Order and Compare Numbers Place Value Horizontal Content Strand

Outreach Connect User Manual

Evidence-based Practice: A Workshop for Training Adult Basic Education, TANF and One Stop Practitioners and Program Administrators

Backstage preparation Igniting passion Awareness of learning Directing & planning Reflection on learning

Module 9: Performing HIV Rapid Tests (Demo and Practice)

Liking and Loving Now and When I m Older

TEAM-BUILDING GAMES, ACTIVITIES AND IDEAS

ENGLISH Training of Trainers

Grade 6: Module 1: Unit 2: Lesson 5 Building Vocabulary: Working with Words about the Key Elements of Mythology

Kindergarten Lessons for Unit 7: On The Move Me on the Map By Joan Sweeney

Getting Started Guide

Function Tables With The Magic Function Machine

Language and Literacy: Exploring Examples of the Language and Literacy Foundations

RETURNING TEACHER REQUIRED TRAINING MODULE YE TRANSCRIPT

Notetaking Directions

Introduction to CRC Cards

Mission Statement Workshop 2010

Experience Corps. Mentor Toolkit

Study Group Handbook

Welcome to The National Training Institute for Child Care Health Consultants

UDL AND LANGUAGE ARTS LESSON OVERVIEW

Let's Learn English Lesson Plan

Time, talent, treasure FRATERNITY VALUE: PHILANTHROPIC SERVICE TO OTHERS SUGGESTED FACILITATOR: VICE PRESIDENT OF PHILANTHROPY

Why Misquitoes Buzz in People s Ears (Part 1 of 3)

Section 7, Unit 4: Sample Student Book Activities for Teaching Listening

Coral Reef Fish Survey Simulation

Class Numbers: & Personal Financial Management. Sections: RVCC & RVDC. Summer 2008 FIN Fully Online

Similar Triangles. Developed by: M. Fahy, J. O Keeffe, J. Cooper

PUBLIC SPEAKING: Some Thoughts

Local Activism: Identifying Community Activists (2 hours 30 minutes)

Contents. Foreword... 5

5th Grade Unit Plan Social Studies Comparing the Colonies. Created by: Kylie Daniels

Classroom Assessment Techniques (CATs; Angelo & Cross, 1993)

Marketing Management MBA 706 Mondays 2:00-4:50

Biology 1 General Biology, Lecture Sections: 47231, and Fall 2017

Enhancing Learning with a Poster Session in Engineering Economy

Getting Started with Deliberate Practice

PREP S SPEAKER LISTENER TECHNIQUE COACHING MANUAL

Students will be able to describe how it feels to be part of a group of similar peers.

STUDENT MOODLE ORIENTATION

Thesis-Proposal Outline/Template

Faculty Meetings. From Dissemination. To Engagement. Jessica Lyons MaryBeth Scullion Rachel Wagner City of Tonawanda School District, NY

Go With the Flow. By Nancy Kott WZ8C

Interpretive (seeing) Interpersonal (speaking and short phrases)

Fearless Change -- Patterns for Introducing New Ideas

MENTORING. Tips, Techniques, and Best Practices

Mapping the Assets of Your Community:

Characteristics of Functions

A Pumpkin Grows. Written by Linda D. Bullock and illustrated by Debby Fisher

NOT SO FAIR AND BALANCED:

SMALL GROUPS AND WORK STATIONS By Debbie Hunsaker 1

Moodle Student User Guide

Northern Kentucky University Department of Accounting, Finance and Business Law Financial Statement Analysis ACC 308

Teacher Action Research Multiple Intelligence Theory in the Foreign Language Classroom. By Melissa S. Ferro George Mason University

ASSESSMENT TASK OVERVIEW & PURPOSE:

teaching essay writing presentation presentation essay presentations. presentation, presentations writing teaching essay essay writing

- SAMPLE ONLY - PLEASE DO NOT COPY

Grade 6: Module 2A: Unit 2: Lesson 8 Mid-Unit 3 Assessment: Analyzing Structure and Theme in Stanza 4 of If

*Lesson will begin on Friday; Stations will begin on the following Wednesday*

Cambridge NATIONALS. Creative imedia Level 1/2. UNIT R081 - Pre-Production Skills DELIVERY GUIDE

BEING MORTAL. Community Screening & Discussion Toolkit

What's My Value? Using "Manipulatives" and Writing to Explain Place Value. by Amanda Donovan, 2016 CTI Fellow David Cox Road Elementary School

Cal s Dinner Card Deals

Shockwheat. Statistics 1, Activity 1

Beginning to Flip/Enhance Your Classroom with Screencasting. Check out screencasting tools from (21 Things project)

EdX Learner s Guide. Release

Mathematics Content Mathematical Practices ELD Standards

On-Line Data Analytics

Dale Carnegie Final Results Package. For. Dale Carnegie Course DC218 Graduated 6/19/13

Lesson Plan. Preliminary Planning

D Road Maps 6. A Guide to Learning System Dynamics. System Dynamics in Education Project

Kindergarten - Unit One - Connecting Themes

Planning for Preassessment. Kathy Paul Johnston CSD Johnston, Iowa

Tour. English Discoveries Online

Presentation skills. Bojan Jovanoski, project assistant. University Skopje Business Start-up Centre

Dr. Karen L. Pennington Vice President, Student Development & Campus Life Dr. Michele Campagna Executive Director, Center for Advising & Student

Understanding and Changing Habits

Transcription:

Facilitator s Agenda This is an agenda for facilitators offering on-site NYC Digital Safety workshops. Time Block Action / Script Materials 30 minutes: Set up Arrive at least 30 minutes before the workshop is scheduled to start. Tape Module Titles to the wall, or place on a table up front. Write community agreements on flip chart paper and post to the wall: One mic Assume positive intent Use I statements Be open to different ideas Step up/step back Take breaks if you need to Prepare worksheets and visual aids. Set copies of the agenda and up to three sticky dots at each place setting. As participants enter the room before the workshop begins, ask participants to add a sticky dot to the module they have questions about. Module Titles, sticky dots, flip chart paper, name tags, markers 10 minutes : Welcome and Introductions [Slide 1: Facilitator name(s) and contact info] Hello and welcome to NYC Digital Safety workshop! My name is [your name]. I want to start with a brief round of introductions. Let s go around the room so that everyone can introduce their name, role at the library and describe the first digital activity they do every day. Computer, projector, slide deck [Slide 2: Animated GIF of #sunrise on Twitter] Thank you for sharing the first digital activity you do everyday. Take a look at at this animated map of Twitter waking up across the globe. It comes from a VOX article called 40 maps that explain the internet. I thought this was interesting and relevant for a couple reasons. It is showing all the geotagged tweets with the hashtag #sunrise in several different languages. This size of the yellow dot corresponds to the number of tweets from that location.

This provides an interesting window into digital habits in multiple ways: 1.) It shows where in the world twitter is used most. 2.) It shows thousands of Twitter users send out tweets every day that are geotagged meaning that they have a very specific geographic location associated with them. With that information, a designer was able to make this map on a global level but what happens to the information on a micro-level? What happens to the data that we accumulate not just in the morning but throughout the day? 10 minutes: Workshop Overview Before we get started we want to point out space logistics and walk through the agenda. Feel free to step out whenever you need to and if you need to make/receive a phone call kindly step out. In order to stay on track and make sure everyone is comfortable, let s review and agree on some community behaviors. I ve placed a poster on the wall with a list of community agreements that have worked in previous workshops. I will briefly go over each and am happy to add any others that will help us today. One mic Assume positive intent Use I statements Be open to different ideas Step up/step back Take breaks if you need to Each of you should have an agenda. The workshop begins at [time] and ends at [time]. We have a 10 minute break scheduled at [time]. After doing a short review of the online modules we will do some activities about how information flows across the internet. After the break we will review scenarios and work in groups to conduct digital security risk assessments. Does anyone have any questions? Community agreements written on flip chart paper 15 minutes: Online training refresher [Slide 3] This slide shows the seven modules from that training. By show of hands, Was everyone able to access the online training? Did anyone have difficulty accessing the online training? Okay, great. Did you have any takeaways from the online training? If so, what were they? I realize some of you may have reviewed these awhile back so no worries if you cannot recall them right now. What was your overall reflection and general feeling of Flip chart paper

the training? Did any questions arise while taking the training? If so, what were they? [Write down the reflections on flip chart paper.] This workshop is a follow up to the online training. The activities that follow dig deeper into how the information travels across the internet and how someone s device, location, settings, browser and other things can shape someone s digital privacy. They are designed to be fun and will generate some quality discussion. Does anyone have any questions? 15 minutes : Infrastructure Vocab Match-Making First, let s do an activity that will get you up and moving. I ll hand each of you a card with either a term or a definition of a concept associated with the information flow you see on the slide. Everyone please stand up. When I say GO, please circulate around the room to see if you can find your match. Once you, please stand together. [Once all learners have found their match, ask participants to read their cards out loud. Provide feedback as needed.] Match-making cards, printed on card stock and cut in half 15 minutes : Map the Web Now that we reviewed terms and definitions, let s review the basics of how information flows across the internet. I ll hand out card with an icon on it. Each icon represents a particular step in how information flows across the internet. Place yourselves from beginning to end in the order of what happens when you enter a URL in a browser. Does everyone remember seeing this slide from the module 2 of the online training? Let s walk through this diagram to review what is happening in each of these steps. Where should we begin? [Ensure participants understand where that the information flow begins with the patron at their computer. Move through the information flow in logical order. Chime in with responses if people are having difficulty remembering what happens in each step.] Bridge Conversation: What are the places in this diagram where someone may encounter vulnerabilities or apply digital security tactics? Web Icon Illustrations 15 minutes : Spectrogram The next activity we are doing is called a spectogram. Has anyone done this before or heard of it? I will read prompts Sheets of paper with agree and

outloud and ask how much everyone either disagrees or agrees to the statement. There is an imaginary scale with 100% agree on one side and 100% disagree on the other. You will physically move across the scale depending on how much you agree/disagree to the statement. Any questions? disagree printed on them [Use the following prompts to engage in a discussion with your participants: I think it s important to close my curtains when eating dinner at home in the evening I think it s helpful for advertisements to reflect my activity online I think it s useful that google remembers my search history to optimise my next search I believe the library has a responsibility to protect patron data under all circumstances I think data data privacy is an individual responsibility] Thanks everyone. That was a great discussion. I think this demonstrates that everyone has different experiences and feelings about digital security. That is an important factor to take into consideration whey advising people. How was that activity for you? We are going to take a short break now. Please be back in 10 minutes. 10 minutes: Break [Place a Risk Assessment worksheet and a copy of the Ayana persona at each seat.] 15 minutes: Personae Introduction Thank you for coming back from the break on time. Does everyone have a persona worksheet? Has anyone seen one of these before? If so, where? These scenarios can help us plan to assist our patrons in recommending best practices for online privacy and data security. To start, we will be using scenarios in our next activity. Let s look at the profile for Ayana. Take a minute to read it to yourself. How do you think Ayan s goals and characteristics may impact the way they engage in the information flow we reviewed previously? You will have a chance to explore these scenarios in more depth in the next activity. Risk Assessment worksheets, one copy of Ayana profile for each learner 45 minutes : Risk Assessment Does anyone recall what a digital security risk assessment is? You may have seen it in module 3. Personae worksheets

A risk assessment is a process with which was can evaluate the threats people may face in their online lives depending on their unique context and priorities. Let s review the process using these questions on the slide... What do I want to protect? Who do I want to protect it from? How bad are the consequences if I fail? How likely is it that I will need to protect it? How much trouble am I willing to go through to try to prevent potential consequences? Has anyone has done a digital security risk assessment before and/or seen one done? If so, what was your experience? Does anyone have any questions about this process? Now we are going to split up into small groups for the next activity. Let s count off by 4 and then find our groups. [Hand worksheet personas out to each group. Each group should have copies of the same persona worksheet.] Each group will use a template to complete a digital security risk assessment for one of the profiles. We are available to help if needed. Once everyone is done we will share back with the larger group. [Give a two-minute warning.] How was that? Who wants to share the assessment they did? What was difficult, what was straightforward? What are some scenarios that you been in when patrons have asked about data privacy? 15 minutes: Best Practices Cheat Sheet Thanks everyone. Please come back together into a large group. [Hand out Best Practices Cheat Sheet.] Now that we have an assessment of these individuals do you think there are any best practices we could recommended in each of their cases? If so, what are they? As I write these on the board, please add them to your cheat sheets in the category in which they belong. [Note responses on a piece of flipchart paper] At the end of the discussion we point out that everyone can think about the list of ideas as a best practices cheat sheet that they can take with them, reference and build on. Best Practices Cheat Sheet

15 minutes : Wrap up Thank you for your time and attention today. Today we covered the ins and outs of the internet as an ecosystem, shared our personal thoughts and reflections on digital privacy, and got some good practice in with our personas activity. Thinking back, what is one thing you are likely to take back to your work?... Thanks for your thoughts. I m going to hand out an assessment sheet now. Please take your time to answer the questions there. I m available after this session with any final questions you have. Thank you again for your attention. [Hand out assessment questionnaire.] WORKSHOP ENDS