Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged ar

Rss Feed Group items tagged

wasifali

Ironing Board for small space - 0 views

image

Ironing Board

started by wasifali on 18 Jun 23 no follow-up yet
wasifali

Ironing Board for small space - 0 views

image

Ironing Board

started by wasifali on 18 Jun 23 no follow-up yet
Anne Bubnic

Generation YouTube: Anything that can be a video will be a video. - 0 views

  • For better or worse, said Mr. Newsom, we are now always on the record. Every significant and insignificant conversation is being recorded, and the videos are available on YouTube.
  • For better or worse, said Mr. Newsom, we are now always on the record. Every significant and insignificant conversation is being recorded, and the videos are available on YouTube.
  • For better or worse, said Mr. Newsom, we are now always on the record. Every significant and insignificant conversation is being recorded, and the videos are available on YouTube.
  • ...3 more annotations...
  • For better or worse, said Mr. Newsom, we are now always on the record. Every significant and insignificant conversation is being recorded, and the videos are available on YouTube.
  • Because video was not possible before, the web was dominated by text. Now that video cameras and broadband are cheap, information that is better served by video is getting converted. As a result, YouTube is now the second largest search engine, and traffic is through the roof. And because kids like Ian's son are video natives, this is just the beginning.
  • Imagine a whole generation of kids growing up and learning about the world through YouTube. In the first half of the 20th century, people grew up reading books and newspapers. Then there was a generation that grew up on movies and television. The last shift was to the Internet. And now web video is creating yet another generation. Kids no longer learn about the world by reading text. Like the television generation, they are absorbing the world through their visual sense
  •  
    For better or worse, said Mr. Newsom, we are now always on the record. Every significant and insignificant conversation is being recorded, and the videos are available on YouTube.
lipikamohanty

Get the Best Health Care Home Care Service in Odisha - 0 views

  •  
    When we are talking about the health care service at home, we don't have to forget, they are Provides varieties of home care services. they are always alert to provide the best of their supervision care at home. What type of Service a patient can receive, that depends only on the patient's condition and situation, with doctors' consultation? Treatment at home includes different types of services at home like: * Doctor Consultation, * Nursing care * Personal Attendant * Medical Facility service * Path lab tests * pharmaceutical services * medical Equipment at home * Physiotherapy Care * Transportations. One of the Best Organizations is Tech tricks Health care in Bhubaneswar, Odisha, they are dealing with these types of services for patient's health facilities and care at home and they are expanding their services in all over Odisha and also India, they are Collaborate with Best Doctors of India, Hospitals and trained Nurse and Homecare attendants, for the only aim of providing best health care services at home. So don't waste your time searching for a medical facility at home, contact Tech Tricks Health care service: +91- 9861806040
realcounterfeits

Buy North Carolina Driver's License - Buy genuine driving licence online - 0 views

  •  
    North Carolina Driver's License for sale - Buy genuine driving licence Are you looking to buy a North Carolina driver's license online? Do you need a driving grant in North Carolina? Have you been attempting to venture out to North Carolina? Do you need archives you cannot have? You are in the perfect spot at the perfect time if your answer is Yes. As the most renowned fake driver's license for sale online in North Carolina, UK, and Europe, we have a team of most competent, experienced and skilled employees who know how to recreate the exact features in the same way as the Department of Motor Vehicles (DMV) performs. If you are searching for the best place to get a fake driver's license online for North Carolina, UK, and Europe, look no farther than realcounterfeitsmoney.com Separate technicians are assigned to recreate different state and country license. When you buy fake IDs online for North Carolina, UK, and Europe, you find a special team entrusted with the task of creating a fake license. Reasons why you need to get a Driver's License online from us At realcounterfeitsmoney, we produce both Registered and Unregistered North Carolina Driver's License. Registered Driver's License: For the enlisted North Carolina DL, we register all your data into the North Carolina information base framework. Whenever checked to utilize an information understanding machine, your subtleties will obviously appear in the framework %100 genuine. Consequently, you will have the option to legitimately utilize it anyplace since it has no distinction with the one given by the legislature. Unregistered Driver's License: we additionally produce an unregistered North Carolina Driver's License that looks precisely like the enrolled duplicate yet no data enlisted in the information base. The report will be second hand. All mystery highlights of the government-provided visa will be copied and engraved on this Fake duplicate. We generally encourage our customers to let
  •  
    North Carolina Driver's License for sale - Buy genuine driving licence Are you looking to buy a North Carolina driver's license online? Do you need a driving grant in North Carolina? Have you been attempting to venture out to North Carolina? Do you need archives you cannot have? You are in the perfect spot at the perfect time if your answer is Yes. As the most renowned fake driver's license for sale online in North Carolina, UK, and Europe, we have a team of most competent, experienced and skilled employees who know how to recreate the exact features in the same way as the Department of Motor Vehicles (DMV) performs. If you are searching for the best place to get a fake driver's license online for North Carolina, UK, and Europe, look no farther than realcounterfeitsmoney.com Separate technicians are assigned to recreate different state and country license. When you buy fake IDs online for North Carolina, UK, and Europe, you find a special team entrusted with the task of creating a fake license. Reasons why you need to get a Driver's License online from us At realcounterfeitsmoney, we produce both Registered and Unregistered North Carolina Driver's License. Registered Driver's License: For the enlisted North Carolina DL, we register all your data into the North Carolina information base framework. Whenever checked to utilize an information understanding machine, your subtleties will obviously appear in the framework %100 genuine. Consequently, you will have the option to legitimately utilize it anyplace since it has no distinction with the one given by the legislature. Unregistered Driver's License: we additionally produce an unregistered North Carolina Driver's License that looks precisely like the enrolled duplicate yet no data enlisted in the information base. The report will be second hand. All mystery highlights of the government-provided visa will be copied and engraved on this Fake duplicate. We generally encourage our customers to let
anonymous

Online Predators and Their Victims - 0 views

  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
  • ...21 more annotations...
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
    • anonymous
       
      Let's remember that although there are direct references to gay and male pedophiles of gay boys, that 99% of child sex offenders identify as heterosexual, online or offline.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    This research article has the facts about sexual predatory behavior.
Anne Bubnic

Top 5 Ways Teens Are Compromising Their Identities Online [Video] - 0 views

  •  
    From Qwest Communications. Identity theft is the fastest growing crime in America with 18-29 year olds being the largest group of victims. Educating 13-18 year olds about how and why they are being targeted is critical in preventing new victims. Clean credit and a low level of identity theft awareness are two top reasons teens are targeted. A new survey from Qwest Communications Teen Council Program shows that an alarming number of teens are making it easier for thieves to steal their identity. With answers from more than 1,600 students about their online habits, the report identified the top 5 ways teens are compromising their identities.\n
Anne Bubnic

Letters To A Bullied Girl: Messages of Healing & Hope [New Book] - 0 views

  • Olivia Gardner, a teenager from Northern California, had been severely bullied in school. After reading of her ordeal in a local newspaper, we were shocked. Olivia had endured so much pain. Her book bag had been dragged through the mud, her schoolmates had created an "Olivia's Haters" page on the internet, and they would whisper "Die Olivia" to her in the halls. Olivia's story broke our hearts, especially when we learned that she was suicidal. We couldn't imagine such cruelty.
  • livia's story moved us, and a spark ignited between us - we both recognized that there was something that had to be done about this situation. We knew we couldn't be bystanders. We organized a letter-writing campaign and asked our friends to write letters of encouragement to Olivia. These messages of healing and hope were the least we could send to Olivia to let her know that she was not alone and that we were thinking about her and hoping she would get better.
  • Heartfelt, honest and powerful letters started pouring in. And then came the media requests. The more attention the "Olivia's Letters" project got, the more letters we received. Suddenly, we were thrust into the world of bullying, as we read the letters sent to Olivia by former bullies and targets of these bullies. We learned of the remorse adults felt having been bullies themselves in their teen years, and of the depression the targets of bullies still experience years after they have been bullied. Thousands of letters from all over the country and even the world flooded into Olivia's mailbox, each offering a unique perspective on courage and compassion.
  • ...2 more annotations...
  • We could never have predicted what a great and widespread response our little project to help one girl would receive. In a matter of a few weeks we became activists. Today, as the authors of the book Letters to a Bullied Girl: Messages of Healing and Hope, a compilation of some of the most revealing letters sent to Olivia, we are hopeful that the letter-writers' message to end the vicious cycle of bullying will continue to spread
  • As the letters in this book prove, bullying has serious consequences. We can no longer turn away or sit idly by as our peers are bullied so severely and relentlessly that they are forced to withdraw, isolate themselves and even turn to suicide. Our book is dedicated to Corinne Sides, who committed suicide as a result of bullying, and there are pages of letters from others who attempted suicide to escape their bullies.
  •  
    As teens across the country head back to school this year, far too many of them are facing the entrance doors to their schools with feelings of fear, trepidation and dread. For an increasing number of students across the nation, schooldays are filled with the never-ending cycle of taunting and abuse from their bullies. But this year, in an unprecedented display of solidarity, thousands of strangers who have been through the same harrowing experiences, are sharing their private tales of torment with these teens for the first time ever because of the story of Olivia Gardner.
Anne Bubnic

The Anthropology of Digital Natives Webcast (Library of Congress) - 0 views

  •  
    Young people today born into a digital world are experiencing a far different environment of information-gathering and access to knowledge than a generation ago. Who are these "digital natives" and what are they thinking? How are they using the technology, and are IT experts adequately responding to them? These questions will be addressed in a new Library of Congress series titled "Digital Natives." The four-lecture series will examine the generation that has been raised with the computer as a natural part of their lives, with emphasis on the young people currently in schools and colleges today. The series will seek to understand the practices and culture of these digital natives, the cultural implications of the phenomenon and the implications for education -- schools, universities and libraries.
Anne Bubnic

Digital Domain Archives Our Lives, Mistakes [Political Trail] - 0 views

  •  
    Social networks and digital media are making it easy for us to share our lives not just with our small circle of friends, but the entire world. With the invention of YouTube, Facebook and MySpace, we are creating a massive digital archive of our lives. The benefit of such a digital archive is that we no longer have to rely just on remembering memorable events: There are video and photos of it online. Besides just video and photos, there's also a massive text archive we are establishing with personal blogs. Every column I write for the Courier & Press is obviously archived for the history books, but so are the things that I write online.
Anne Bubnic

Social Networking-Why Are We Afraid? - 0 views

  • But we adults are afraid. This is not the way we grew up. We had our group of friends, our own little group. Now, the groups to which today's young people belong are hundreds and even thousands strong. Their "friends" lists go on for pages, many of them hundreds or thousands of physical miles away. This is so far from the way we communicated and learned about each other, that we cannot understand it. So we do what most people do with things they do not understand. We ignore it. If it intrudes on the way we do things, we find ways to block it.
  • Eighty-one percent of kids have visited a social networking site such as MySpace or Facebook. Yet more than 50% of schools block social networking altogether and over 80% block instant messaging and chatting services. These statistics tell us that our students are accessing these types of services regardless of our efforts to block them.
  • ith over 80 million users on MySpace alone, social networking is not going away. And that National School Boards Association report said that 50% of students using these services are specifically talking about schoolwork using these social networking tools.What? Students are talking about schoolwork? Yes. Just as we used the phone (despite our parents demands to hang up!) students today are using social networks. They are asking each other questions and discussing homework besides planning to go out. This is their way to communicate and as much as we have difficulty understanding it, it is 24/7 and schools can take some advantage of that.
  •  
    Cyberbullying, online predators, and other Internet-related dangers make headlines almost daily. Fear of what lies beyond that glowing screen at which our kids so love to stare dominates the current perception of what the Internet has become. In this climate of perceived threat, schools do what we all do with that of which we are afraid. We avoid the threat and try to forget it's out there.\n\n
scrollmantra

Digital Marketing Agency in Karol Bagh, Delhi - 0 views

  •  
    So no denying it, the world is shifting to the digital space, consuming all kind of information through digital means; mobile phones, laptops or desktops. While there are the ones who've grown up with smartphones and internet are very well embracing the new brave world of versatility and speed. Before we totally grab on the benefits of Digital Marketing for our business growth, you can't ignore the fact that Public Relations is equally important for any business or organisation effectiveness. The mix of traditional PR with content marketing on different social media platforms and search has led to different fold of opportunities for business growth. INTERGRATING DIGITAL MARKETING WITH PR Communication marketing agencies are all around the world willing to work for you but an effective integration can only happen if some of the key points are kept in mind: Clarity on business objective Comprehend the impact and process of the business before initiating campaigns WHY DIGITAL MARKETING We all are acknowledged to the fact that Digital marketing of a business or product can easily transmit for the scanty fraction value/cost of the print or TV ad. Also, the reach can be easily tracked and monitored as nowadays companies rely on reviews and feedback more than any celebrity endorsement. Hence, for every business, it's an effective way for a brilliant brand growth.
Anne Bubnic

Digital Lifestyle Youth Culture Profile Report 2008 - 0 views

  • For example, miniDV cameras are not only among the new tools of self-expression, but the very act of creating personal videos with friends and creating events and key themes to shoot have become key aspects of entertainment in and of itself. To this generation, playing music via your cell phone, and movies and TV shows via your iPod are a given. Emailing is considered too old-school by many, whereas texting is outpacing cell phone calls. These things also go hand-in-hand with changes in online shopping patterns, top website preferences, communication and blogging patterns, and new habits for using social networks—not to mention the tremendous changes in preferred social networks and profile page usage patterns in general. These things are changing the paradigm of how the businesses of entertainment, communication, retail, marketing, advertising, and branding have been done in the past.
  • Unfortunately, as more companies pour big money into expanding their new media marketing components, as many people have discovered, the Field of Dreams theory (“if we build it, they will come”) certainly doesn’t apply when it comes to reaching savvy youth today. Popping up a site (or social network for that matter) no matter how cool it is means nothing if you can’t reach the market it’s intended for. This Report, therefore, also includes a great deal about how young people find out about new websites, communicate with others, and other forms of grassroots networking.
  • Overall, the Digital Lifestyle Youth Culture Profile Report 2008 not only reveals traits by target demographics, but also the growing generation gap occurring even within this generation.
  •  
    [Market Research Report]

    "Young people are the inherent trend leaders when it comes to new technology and usage patterns, and are the ones pushing forward the speed of change in communication and information technology. This Report reveals that it may be imperative for some brands to re-think strategies--even among progressive companies--if they are to reach youth culture effectively.
Anne Bubnic

Cell Phone Safety - 0 views

  • The fact that cell phones pose a great risk when combined with driving cannot be of any surprise to anyone. Let’s face it. First, drivers must take their eyes off the road while dialing. Second, people can become so absorbed in their conversations or other cell phone use that their ability to concentrate on the act of driving is severely impaired, jeopardizing the safety of vehicle occupants and pedestrians alike.
  • Time Away from Homework. Technology affords teens (and adults) a host of ways to do something other than what they are supposed to, in this case homework.
  • Mounting Minutes ($$$) Since consumers must be 18 in order to purchase a cell phone contract in the United States, most parents are buying the phones their children carry. This is good news because parents can choose a plan that fits how the cell phone will be used and can review monthly cell phone bills which typically includes a log itemizing phone activity. However, problems still exist. For one, children can quickly go over their allotted minutes for the month which can leave their parents with bills that can easily approach hundreds of dollars for the month.
  • ...1 more annotation...
  • Cell Phones and Gaming According to Sullivan (2004)3, when cellular phone games were simple, such as the knockoffs of the Atari-era "Breakout," there wasn't much to worry about. But newer phones with color displays and higher processing power create a landscape that might make some parents worried about what their kids are playing on the bus home from school.
  •  
    Today's cellular phones (cell phones) are more than just phones, they are hightech appliances that also serve as a mini-computers. Cell phones are electronic gadgets that allow users to surf the web, conduct text chats with others, take photos, record video, download and listen to music, play games, update blogs, send instant text messages to others, keep a calendar and to-do list, and more, much more. But cell phones also carry risks and cause distractions.
Vicki Davis

ScienceBlogs - 0 views

  •  
    Scientists are blogging and communicating now, with an article in Time Magazine talking about how these scientific bloggers are changing the face of science. Having Access and being able to communicate digitally are becoming part of everyone's required knowledge base.
  •  
    This website is a conglomeration of scientists who are blogging and writing.l They respond to research journals and bring forth "hot topics." In science. Time magazine has written an article about this site and how they are changing the face of science. Blogs are becoming integrated into all aspects of the world and knowing the method of writing effectively there is important.
Anne Bubnic

Copyright Webquest for 6th Graders - 0 views

  •  
    The Copyright Police are checking student multimedia projects for possible copyright violations. Ignorance of the law is no excuse, and violators will be prosecuted under the federal law. The Copyright Police are having some difficulty checking leads because there are so many students creating multimedia projects. You and your group have been hired by the Copyright Police to monitor multimedia projects created in our school. The Police Chief will give you information about a multimedia project to investigate and provide some Copyright Guidelines for your group.
  •  
    The Copyright Police are checking student multimedia projects for possible copyright violations. Ignorance of the law is no excuse, and violators will be prosecuted under the federal law. The Copyright Police are having some difficulty checking leads because there are so many students creating multimedia projects. You and your group have been hired by the Copyright Police to monitor multimedia projects created in our school. The Police Chief will give you information about a multimedia project to investigate and provide some Copyright Guidelines for your group.\n
realcounterfeits

Real canadian drivers license for sale - Real Counterfeits Money - 0 views

  •  
    Obtain a driving license in Canada with no paperwork Driving in Canada may be a unique experience for newcomers since the cities are often quite spacious with far-off neighborhoods. Just like any other country, you need a permit to get around. Based on the province you are moving to and the country you are coming from, you may be able to get an international driver's license in Canada. If you are not eligible for conversion, you have to give an exam followed by road tests. It may take up to two years to get a permanent license. Furthermore, there are hefty costs associated with driving tests and cancellations. No one would be amused by this hectic procedure, which is why we came up with a platform where you can buy a driver's license in Canada. No need to take exams or furnish legal documents. We take care of everything!. Buy real canadian drivers license Where to get a fake Canadian driver's license with legitimate features? There are counterfeiters on the market who will dupe you with substandard quality documents that don't match the security criteria. At 2nd license, we are very serious about maintaining the authenticity of Canadian driving licenses at the cost of skill and craftsmanship. From holograms and watermarks to HD photos and database registration, we cover everything to keep you safe. You are welcome to contact us and understand the process we follow. Being transparent is the key to our success, and we are always willing to take up your questions. Buy Canadian Drivers License online real canadian drivers license
Anne Bubnic

The Newest Breed of Bully, the Cyberbully - 0 views

  • While some of what is published online may seem libelous (i.e., intended to harm the reputation of another), proving that point can be difficult and expensive. In order to prove libel, you have to prove malicious intent, something that might prove difficult if the offending Web page was put up by an adolescent. And many times, freedom of speech wins out.
  • Unless an actual crime has taken place, law enforcement officials often are unable to arrest anyone, even if they can identify the culprit. According to Lt. John Otero, commanding officer of the computer crime squad for the New York City Police Department, individuals would actually have to post a direct threat in order for the police to act. "For example, if they say, 'tomorrow I am going to hurt, kill, or injure an individual,' that would constitute a crime," he explains. A person posting such a threat could be arrested and charged with aggravated harassment. Although Otero says his department has seen some arrests, anyone under the age of 18 would not be dealt with harshly: "If the kid is too young, he would get a scolding and the incident would be brought to the parents' attention; if they are under 16, they are considered minors."
  • Like cliques, cyberbullying reaches its peak in middle school, when young adolescents are trying to figure out who their friends are and whether they fit in. "Third- and 4th-graders are just having fun with computers," says Loretta Radice, who taught computer skills to middle-schoolers in public and private schools for more than 15 years.
  • ...1 more annotation...
  • While the cyber- bully believes he cannot be caught, Radice notes that everyone leaves footsteps in cyberspace. "Everything is traceable," she says. "Kids often don't realize that."
  •  
    Because cyberbullying is such a new phenomenon, school and law enforcement officials in the United States and other countries are still sorting out the legal technicalities. "Most of what is done online is protected as free speech," says Frannie Wellings, policy fellow at the Electronic Privacy Information Center in Washington, DC.
Anne Bubnic

Humiliation and gossip are weapons of the cyberbully - 0 views

  • ead teachers are being advised to draw up new rules on mobile phone use amid a growing number of cases of what is now known as “cyber-bullying”. In many secondary schools, over 90% of bullying cases are through text messages or internet chatrooms. It is hoped that the rules about mobile phone use will protect children from abusive texts, stop phones going off in class and prevent mobiles being taken into exam halls.
  • Although the majority of kids who are harassed online aren’t physically bothered in person, the cyber-bully still takes a heavy emotional toll on his or her victims. Kids who are targeted online are more likely to get a detention or be suspended, skip school and experience emotional distress, the medical journal reports. Teenagers who receive rude or nasty comments via text messages are six times more likely to say they feel unsafe at school.
  • The problem is that bullying is still perceived by many educators and parents as a problem that involves physical contact. Most enforcement efforts focus on bullying in school classrooms, corridors and toilets. But given that 80% of adolescents use mobile phones or computers, “social interactions have increasingly moved from personal contact at school to virtual contact in the chatroom,'’ write Kirk R. Williams and Nancy G. Guerra, co-authors of one of the journal reports. “Internet bullying has emerged as a new and growing form of social cruelty.'’
  • ...1 more annotation...
  • Cyber-bullying tactics include humiliation, destructive messages, gossip, slander and other “virtual taunts” communicated through e-mail, instant messaging, chatrooms and blogs. The problem, of course, is what to do about it. While most schools do not allow pupils to use their mobiles in the school building, an outright ban is deemed unworkable. Advances in technology are throwing up new problems for teachers to deal with. Children use their phones to listen to music, tell the time or as a calculator. Cyber-bullies sometimes disclose victims' personal data on websites or forums, or may even attempt to assume the identity of their victim for the purpose of publishing material in their name that defames them or exposes them to ridicule.
  •  
    As more and more people have access to computers and mobile phones, a new risk to youngsters has begun to emerge. Electronic aggression, in the form of threatening text messages and the spread of online rumours on social networking sites, is a growing concern.
Anne Bubnic

Social Networking Gets Schooled - 0 views

  • As a whole, the education industry is usually relatively slow to integrate technology into the classroom. In lots of schools nationwide, unbridled access to computers and the Internet is still the exception rather than the rule.
  • The moment students get outside of the classroom, on the other hand, social networking is almost a daily ritual.
  • Dedicated commercial Web 2.0 products and social networking applications are still too new and too rich for typical school leaders to afford. So third-party providers are more likely to offer technology services to students and their schools to expand their horizons in ways never before possible. For example, some school districts are going beyond e-mail technology and using collaboration software and online services to share information, host Web conferences and assign tasks and projects.
  • ...1 more annotation...
  • "Teachers are famous for relying on other teachers for the best ideas about what's working and what's not working. For that reason, as new teachers (read younger, tech-savvy, "Generation Network" college grads) enter the system, they are leveraging education-focused social networks to connect with other teachers, find content contributed by teachers and make sure that they are wringing every ounce of 'network effect' technology from the Internet."
  •  
    To today's students, online social networking is almost second nature outside of the classroom. What about inside the classroom? Educational software and services are taking a cue from Facebook and MySpace, adding a twist of online collaboration and interaction that brings students, teachers and parents together.
1 - 20 of 1026 Next › Last »
Showing 20 items per page