Monday, June 1, 2009

Can I Hire A Boat For My Wedding In Rhodes

Course for NGOs and other free programs that work with children and adolescents in Latin America






For a safe and responsible use of information technologies and communication technologies (ICTs). Construction
strategies that promote the rights of children and adolescents.

REGISTRATION OPEN from 1 June to 16 June 2009

Intended : Executives of NGOs working with Children and Youth, program managers, directors, area coordinators and program assistants, facilitators, workshop, staff of state agencies related to Children, Education, Youth .

START DATE: Tuesday June 16, 2009.
DURATION: June 16 to July 24, 2009

The course is free.
Previous registration required. Limited vacancies in order of registration. Registration
www.chicos.net/internetsegura/curso_ongs2009.htm
Inquiries by phone: (054 11) 4786-9128 or
giselagrunin@chicos.net.ar

Organizers: Chicos.net Association. Safer Internet Programme, responsible for interaction with ICT ( www.chicos.net / internetsegura )

Supported by: ECPAT International (
www. ecpat.net )

--------------------------------------- ---------------------------

The reason for this course

training This proposal seeks to contribute to social organizations, areas of government and other issues related to children and youth acquire knowledge and enhance work on projects related to the right of children and adolescents to a safe and responsible use of information technologies and communication technologies (ICTs).

organizations involved in protecting and promoting children's rights are everyday references on the phenomena of violence to which children and adolescents are exposed through Site and other technologies and how their rights are violated: the invasion of privacy, harassment by adults (grooming), bullying peer (cyberbullying), the use of children in pornography, child sexual exploitation (ESI) and all forms of sexual violence for which the Internet has become a new stage in which the aberrant production of materials linked to ESI and their distribution is a growing phenomenon.

believe that the way to work the concept of Responsible Use of ICT from the organizations is to install capacity in the same building to promote the work strategies to help children girls and adolescents to develop criteria for navigation and interaction online, from a respectful and caring of one's own mental and physical integrity of others.

The Safer Internet Programme, for the responsible use of ICT , which carries out Chicos.net supported by SCS and ECPAT since 2006, has developed several actions over this time aimed at preventing these problems and strengthen the capacities of children and youth, their teachers and family and social references needed to address these scourges, while the benefits that entails the introduction of ICTs in society.

will be taken account of regional initiatives, especially those belonging to organizations that make up the Red the right of children and adolescents to a safe and responsible use of information technologies and communication.

In this way, we define the proposal online training that will enable organizations and other participants understand the scope of the issue and encourage them to get involved in projects aiming to Prevention of Sexual Violence against Children and adolescents through ICT .

Objectives

Provide means of understanding the social organizations and people in charge of actions for children and adolescents at the state level about the implications of responsible use of ICTs and violence in cyberspace from a rights perspective.
• Reflect on the impact of different social referents in the formation of responsible users of ICT.
• Promote capacity for analysis and to create strategies for preventing violence in the interactions over the Internet, cell phones and other devices.
• Encourage building working strategies for the prevention and responsible use of ICT.
• Promote networking and collaboration among organizations to address this issue.

Contents and Schedule

week preliminary : Knowing the virtual work environment

Recognition of virtual working environment. Presentation of the students on campus. Recognition of the working group. Solving technical problems related to the use of the platform. Understanding the dynamics of the course.

• Week 1: What do children, girls and adolescents when using ICT?

Considerations different Web 2.0 applications used by children and adolescents. Characteristics of environments. Special use and links. The concept of "prosumer." Differences that make use of ICT for adults. Generation gap.

• Week 2: Perceptions and risks.

Situations of risk and vulnerability in cyberspace. Risk perception of all stakeholders in relation to ICT use. Use patterns that encourage risk. Contexts (home, school, cyber). Harassment and sexual exploitation through ICTs. Trends among children and young people (cyber-bullying or cyberbullying) exposure exacerbated; purposes of anonymity, digital communities. New paradigms: the intimate, private, public.

• Week 3: for responsible use of ICT.

Considerations responsible use of ICT. Role of different stakeholders: parents and families, teachers and schools, social organizations, the state as guarantor of the protection of children rights. What is the adult-and how to avoid? Participation of children and adolescents in developing ICT-related projects.

• Week 4: prevention strategies.

Inclusion of children and adolescents in developing their own prevention strategies. Prevention strategies in education and comuntario. Experiences in Latin America and the world. Building strategies to develop projects from organizations.

• Week 5: Gallery

proposed publication and return of the students final works.

mode of completed

The course will take place in an online environment for six weeks. This means that we will use a training platform to present the content, activities, materials and tasks.
The focus of the course is given by the contents and related resources, and support the interaction between the tutor and participants. The tutor will work instances in which the students can recognize, sort out the difficulties that may be present and ensure that materials to which access can be used without problems.
virtual instances will work through the platform for interaction tutor / participant and among all participants, communication for collaborative work, case analysis and discussion, presentation and monitoring of activities.
Participation in the course and communication with their tutor group is basically asynchronous. This implies that there is no specific hours provided for access to online learning environment. However, to achieve the purposes and the decision of tasks in a collaborative way, it has established a weekly working schedule. So, every Monday held the opening of new content and working instructions, and the closure of each of the tasks that the students performed the previous week.
Obviously, for this strategy is feasible and yields results, it is essential that participants have adequate connectivity and access to Internet services each week to advance the process.
is proposed for training a constructivist philosophy, which lets you build the concepts and learning activities among all participants. It will use real background tasks that allow transfer and apply the concepts and situations that have arisen in different organizations around the safe use of Internet, new learning to achieve.

Teaching Strategies

- Navigation Guided
- Participation and exchange
Forum Debates - Analysis of problems and scenarios
- Collaborative Production conclusions / action lines
- Text analysis and quality audiovisual resources on the subject.
- Project Design

Conditions completed
- access to a computer with broadband connectivity
- systematic access to an e-mail itself as a means of communication with the tutor.
- Reading and analysis of the materials offered and bibliographic.
- Participation in discussion forums.
- Publication of the final.


Certification will be issued certificates of approval granted by the course organizers to those trainees who:
· have maintained communication via email with your tutor.
· have participated in the discussion forum that develops during the course (at least one intervention per week)
· have approved the final paper.

reports and inquiries
Gisela Grunin mail:

giselagrunin@chicos.net.ar

Phone: (54 11) 4786-9128