Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged case studies

Rss Feed Group items tagged

Vicki Davis

Royal today, average tomorrow? - Digi Teen - 0 views

  •  
    Case study on New jersey facebook picture "blackmail" case written by a teenager on the Digiteen project.
  •  
    Considering the posting of photos and what should be shared is something all teenagers should consider. This is a blog post from a teenager on the digiteen project about the difficulty lawmakers have in prosecuting "digital blackmail" cases. Certainly harm was done, but legislation has not been passed protecting photographs posted on one's Facebook page and shared with friends. This is hard for students to understand but is an important case study to read about. Certainly having teenagers research and report their findings is a great way to help them understand the implications of what they are doing.
Anne Bubnic

Cyberbullying The Real Threat on the Digital Playground - 0 views

  • "Parents are the key to this whole issue," explains Leasure. "They need to be involved and monitoring the computer and Internet activity of their kids. If they see something that isn't right, they need to act as parents and correct the issue."
  • parental awareness is truly the key to fixing this problem. If your child is the victim - or worse, the bully - it's time to step in. it's not being over-protective; it's trying to stop the current generation from 'virtually' destroying themselves emotionally
  • Cyberbullying Statistics: A recent survey of 395 students, ages 11 to 19, was conducted by the Kids/Teen Division of the Maine-based online safety organization Working To Halt Online Abuse. The study found that: � 28% of students have been cyberbullied, but... � Just over half tell their parents or another adult about it; of the students who did not report the cyberbullying, 25% felt it wasn't a big problem or didn't want to make a big deal out of it � 65% reported the cyberbullying was via IM, followed by email, MySpace, chat rooms and online games � 43% were cyberbullied by someone their age or in the same grade � 30% blocked or deleted the cyberbully, while 16% ignored them � 54 students admitted they had bullied somebody online themselves
  •  
    While reports and stories in the media focusing on Internet predators have become all too frequent, the closer-to-home threat to our children may really be cyberbullying, also known as electronic or online bullying. A recent survey of 395 students (11 to 19 years old) found that 28% of students have been cyberbullied, and more than 1 in 7 admitted to acting as the bully."Cyberbullying could be the biggest online threat facing teens today," says James Leasure, co-founder of Pandora Corp. "Of course Internet predators do still exist, but statistically, kids have a much greater chance of being involved in some way with electronic bullying." Most cases of cyberbullying go undocumented because, fortunately, many kids are able to shrug off the 'unkind words' and look the other way. But there are some cases that make national headlines when they turn into tragedies, such as the Megan Meier case in 2006. Larger cases like this have prompted several states to adopt legislation that makes online bullying illegal.
Anne Bubnic

Kids' Informal Learning with Digital Media [Digital Youth Research] - 0 views

  •  
    UC Berkeley study administered by the Institute for the Study of Social Change and funded by the MacArthur Foundation. The complete findings on three years of ethnographic work [22 different case studies of youth engagement with new media] will be published in Summer 2008. The project has three general objectives. The first objective is to describe kids as active innovators using digital media, rather than as passive consumers of popular culture or academic knowledge. The second objective is to think about the implications of kids innovative cultures for schools and higher education, and engage in a dialogue with educational planners. The third objective is to advise software designers about how to use kids innovative approaches to knowledge and learning in building better software. The research focuses on learning and cultural production outside of schools: in homes, neighborhoods, after school, and in recreational settings.
Anne Bubnic

Case Study: Cyberbullying and Free Speech [pdf] - 0 views

  •  
    Case Study and discussion points. Includes answers to legal questions.
    A bad idea has turned into a full-fledged legal battle ever since the principal of Gibbons Preparatory School, Cornelius Southwick, learned that a group of male students at his school created a website that ranked the qualities of every freshman girl - often in mean-spirited, unflattering ways.
Anne Bubnic

Students: Fair Use - Beg, Borrow or Steal? - 1 views

  •  
    One of eight interactive case studies for kids (GR 4-8) from Cable In the Classroom: Power to Learn.
    Understanding the fair use exemption to copyright law is critical for students who routinely mine the Internet for digital media for class projects, research papers, and other educational purposes. This unit focuses on copyright and fair use. Case studies are explored. Students are asked to develop an essay question. The graphics are Nickelodeon style. For the entire series, check out: http://powertolearn.com/internet_smarts/interactive_case_studies/index.shtml
Anne Bubnic

Students: Music Downloading - Answer the Question - 2 views

  •  
    One of eight interactive case studies for kids (GR 4-8) from Cable In the Classroom: Power to Learn.
    Educating students about the legal and ethical aspects of illegal downloading offers the best opportunity to minimize the ethics gap which allows otherwise law-abiding kids to break the rules. Case studies are explored. Students are asked to develop an essay question. The graphics are Nickelodeon style. For the entire series, check out: http://powertolearn.com/internet_smarts/interactive_case_studies/index.shtml
Anne Bubnic

Copyright Case Study [ Video] - 0 views

  •  
    BEST PRACTICES IN FAIR USE from the folks at Temple University's Media Literacy Education Lab. This is a case study of PROJECT LOOK SHARP and their use of media literacy materials. Included are discussion questions that would be appropriate for teaching teachers and/or students.
Anne Bubnic

Classroom Copyright Case Studies - 0 views

  •  
    Wide variety of copyright case studies on issues related to duplication of materials, software, video, audiovisual, music, Internet and distance learning.
anonymous

Online Predators and Their Victims - 0 views

  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
  • ...21 more annotations...
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
    • anonymous
       
      Let's remember that although there are direct references to gay and male pedophiles of gay boys, that 99% of child sex offenders identify as heterosexual, online or offline.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    This research article has the facts about sexual predatory behavior.
Anne Bubnic

Thinkquest Project: Global Censorship in the Digital Age - 0 views

  •  
    Thinkquest Award Winner 2008. Digital Cooperative is a global exploration of censorship in the digital age. This winning team studied the topic from academic perspectives, analyzed five countries in in-depth case studies, conducted exclusive interviews with industry experts, and created interactive quizzes. Their goal is to raise awareness and increase understanding of this often invisible issue.
Anne Bubnic

Learning Cyberlaw in Cyberspace - 0 views

  •  
    This site provides reading materials for students studying the law as it applies to activities in cyberspace. The reading materials include edited cases, statutes, treaties, and law review articles, as well as content written by the individual module authors. Some have likened the study of cyberspace law to trying to board a moving bus. Given the pace of change in this field any attempt at a traditional casebook would largely be outdated before it reached the hands of the students. This site is designed to take advantage of the hypertext media offered by the world wide web by providing reading modules that can be altered or replaced as the law changes.
Anne Bubnic

Does Creative Commons Work? Check Out the New Case Studies DataBase - 0 views

  •  
    Interesting article about CC
  •  
    The Creative Commons Foundation launched a much-needed database of case studies today, highlighting CC licensed content from around the world. Creative Commons licenses are built on top of international copyright law but let content producers offer their work with more refined permissioning for re-use than the de facto "it's mine don't touch it" sentiment of standard copyright.
Anne Bubnic

Wise Up to It: Case studies and Internet safety advice for teens [Video] - 0 views

  •  
    Four video clip case studies and internet safety advise from NetAlert (Australian Government). Designed for students. Explore the lives of four young people and their experiences on the Internet. Four situations. Four victims. Four stories. Many strategies. Downloadable lesson plans and student handouts for each case study.
Vicki Davis

Identity Theft Leads to Child-Porn Arrest Nightmare - 0 views

  • Simon Bunce of Hampshire, England, not only had his credit-card number stolen online but was arrested and falsely accused of being a pedophile when that card number was used to buy child pornography.
  • Yet that only came after he'd lost his $250,000-a-year job, his father and siblings stopped talking to him and his computer was taken away for several months, the BBC reports. Bunce had the misfortune of being caught up in Operation Ore, a massive British online kiddie-porn crackdown in 2003 that itself grew out of Operation Avalanche, an earlier American bust which began with a 1999 raid on Landslide Productions, a Texas mom-and-pop operation that handled credit-card transactions for porn Web sites.
  • about 7,200 people — whose card numbers showed up on the list.
  • ...2 more annotations...
  • Bunce was arrested "on suspicion of possessing indecent images of children, downloading indecent images of children and incitement to distribute indecent images of children" — all before a single image of such had been found on his computers at home and at work. He quickly found himself unemployed and estranged from his family. But his wife stuck by him, and while his computer sat in police custody waiting to be examined, Bunce took action.
  • Bunce used the U.S. Freedom of Information Act and a catalog of Internet Protocol addresses to establish that his credit-card number had been used in Jakarta, Indonesia, to buy child pornography online at the same moment he used the card to pay the bill at a London restaurant.
  •  
    Learning how to safely use e-commerce websites is important, but also, people need to be aware to protect their credit card numbers and identities as can be seen in this horrific case study. When websites are not safe about their use of credit card numbers, it can have horrible impacts such as this man losing his $250,000 a year job and becoming estranged from his family, when they thought he bought child pornography.
Kate Olson

Mixing the Digital, Social, and Cultural - 0 views

  •  
    How do youth use media and technology as they learn to be participants in civic and democratic practices? We share two case studies -- one from a media arts production organization and one from a school board youth group -- that revolve around youth-adult interactions in learning environments that offer youth real opportunities to be influential in their respective communities.
Anne Bubnic

Internet Smarts: Interactive Case Studies - 5 views

  •  
    This excellent series of interactive case studies explores 8 topics: Wireless, Social Networking, Digital Permanence, Cyberbullying, Misinformation, Fair Use, Privacy and Downloading. Through multimedia activities, students examine issues affecting schoolwork, class papers, entertainment activities and online safety. Units are illustrated with Nickelodeon-style graphics and include assessments of learning. "Power to Learn" is Cablevision's nationally recognized education initiative. Some of the resources here are available in Spanish.
Anne Bubnic

Students: Everything Kids Need to Know About Wireless - 3 views

  •  
    One of eight interactive case studies for kids (GR 4-8) from Cable In the Classroom: Power to Learn.
    An understanding of the wonderful world of wireless will help the young people avoid any pitfalls that may arise from using laptops, smart phones, and PDAs. And if they are going to be using wireless technology it doesn't hurt if they understand how it works. This unit explains the importance of password protection and cybersecurity. The graphics are Nickelodeon style. A short quiz assesses understanding. For the entire series, check out: http://powertolearn.com/internet_smarts/interactive_case_studies/index.shtml
Anne Bubnic

Students: Digital Permanence: Forever is a Long Time - 1 views

  •  
    One of eight interactive case studies for kids (GR 4-8) from Cable In the Classroom: Power to Learn. These days, what goes up online, often stays online. It may not be where it was initially posted, or in the same format, or it may disappear and resurface somewhere else - even though it's digital, it can still be permanent. Ensure that what you post won't get you in trouble or affect the online impression you make. This unit explores the concept of "digital footprint". The graphics are Nickelodeon style. Topics are presented for student debate. For the entire series, check out: http://powertolearn.com/internet_smarts/interactive_case_studies/index.shtml
Anne Bubnic

Counteracting Cyberbullying Inside/Outside of School Grounds - 0 views

  • The problem is that most incidents of cyberbullying occur off-campus because students have more unsupervised time. But the impact is at school where students are physically together. Although there is no data on the extent of harmful impact, anecdotally, it is clear that some incidents lead to students avoiding or even failing school, committing suicide and even becoming violent.
  • Studies on cyberbullying reported in the December 2007 issue of Journal of Adolescent Health reveal that both perpetrators and targets of cyberbullying report significant psychosocial concerns and increased rates of involvement in offline physical and relational aggression
  • One study reported that the victims of cyberbullying were eight times more likely than other students to report bringing a weapon to school. The concerns for student safety are very real. Students who do not believe school officials can help them may seek their own revenge or refuse to come to school.
  •  
    Do school officials have the authority to impose discipline in response to harmful off-campus online speech? Should they? This is a major challenge facing school administrators today. Many state legislatures are now adding statutory provisions requiring schools to incorporate cyberbullying into bullying prevention policies. But this has presented some concerns. For example, in Oregon and Washington, language incorporated into cyberbullying legislation appears to restrict administrators from responding to any off-campus bullying regardless of the harmful impact on campus. Administrators from these two states are advised to check with their legal council. Administrators in other states should understand that the American Civil Liberties Union is trying to use language in the cyberbullying statutes to override federal case law and restrict administrators from doing anything in response to off-campus harmful speech.
Anne Bubnic

Teens Earn Real Cash in Virtual World - 0 views

  • According to Virtual Worlds Management, more than 100 youth-oriented virtual worlds are either now live or in development, including offerings from MTV and Disney (DIS - Cramer's Take - Stockpickr). Research firm eMarketer estimates that 24% of the 34.3 million users ages three to 18 used virtual worlds at least monthly in 2007 -- and that will jump to 53% by 2011.
  •  
    If a young person wants to experiment with running a business, they're not just engaging in thought experiments and case studies; they're actually working with real people and real money," says Joey Seiler, editor of VirtualWorldNews.com, an industry news source that's part of Virtual Worlds Management, a company that provides trade events, media, research and online services.
1 - 20 of 54 Next › Last »
Showing 20 items per page