Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged computer

Rss Feed Group items tagged

Anne Bubnic

Gender Gap in Perception of Computer Science - 0 views

  • Most college-bound males, regardless of race/ethnicity, have a positive opinion of computing and computer science as a career or a possible major. College-bound females are significantly less interested than boys are in computing; girls associate computing with typing, math, and boredom. College-bound African American and Hispanic teens, regardless of gender, are more likely than their white peers to be interested in computing, although for girls the overall interest is extremely low. Teens interested in studying computer science associate computing with words like "video games," "design," "electronics," "solving problems," and "interesting." The strongest positive driver towards computer science or an openness to a career in computing is "having the power to create and discover new things.
  •  
    "New Image for Computing" recently released a report in their first wave to understand the image of computing among youth. Funded by WGBH and ACM, this report examines both race/ethnicity and sex-based differences in perceptions of computing. What they found was that there is little race/ethnicity-based differences in how youth perceive CS but there are HUGE gender based differences in perception.
Anne Bubnic

California's 'digital divide' persists - [Survey Report] - 0 views

  • Slightly less than half of Latinos surveyed have home computers, compared to rates of 79 percent and above among black, Asian and white Californians, the survey found. While computer usage by blacks and whites in California has increased, there's been a decline in computer usage by Latinos and Asians, though Asian use remains much higher than that of Latinos. The drop appears to be correlated with income, with a sharp divide in computer usage between those making less than $40,000 and those making more.
  • Only 48 percent of Latinos have home computers compared with 86 percent of whites, 84 percent of Asians and 79 percent of blacks Californians, the institute reported.
  • But Asians and Latinos have seen declines in use of computers. Latinos' computer use has declined from 64 percent to 58 percent since 2000, while Internet use remained unchanged. Asians' use of computers was much higher, but also declined from 91 percent to 81 percent; Internet use went from 84 percent to 80 percent. Only 48 percent of Latinos have home computers compared with 86 percent of whites, 84 percent of Asians and 79 percent of blacks Californians, the institute reported.
  •  
    The use of computers and the Internet by Latinos and low-income Californians continues to lag behind other groups, according to a survey released Thursday by the Public Policy Institute of California.
Anne Bubnic

New Image for Computing [PDF] - 0 views

  •  
    Supported by a grant from the National Science Foundation, New Image for Computing (NIC) is currently in the first stage of what is planned as a multi-phase project that aims to improve the image of computer science among high school students (with a special focus on gender and ethnic disparities) and encourage greater participation in computer science at the postsecondary level. Download the full report.
Vicki Davis

Search and Seizure of Cell Phones: Can You Hear Me Now? - 0 views

  • May school officials lawfully “search” the confiscated cell phone to look at stored text messages, photographs, videos, and logs of incoming and outgoing calls? Clearly, the circumstances of the search must satisfy the T.L.O. standard. Not as clear, however, is whether such a search violates federal or Michigan laws regarding stored electronic communications.
  • [A] search of a student by a teacher or other school officials will be ‘justified at its inception’ when there are reasonable grounds for suspecting that the search will turn up evidence that the student has violated or is violating either the law or the rules of the school. Such a search will be permissible in its scope when the measures adopted are reasonably related to the objectives of the search and not excessively intrusive in light of the age and sex of the student and the nature of the infraction.”
  • In Klump v Nazareth Area Sch Dist, 425 F Supp 2d 622 (ED Pa, 2006), a federal district court denied the school’s motion to dismiss a lawsuit filed by a student whose cell phone was searched.
  • ...5 more annotations...
  • compensatory and punitive damages for the alleged unconstitutional search, violation of the Pennsylvania Wiretapping and Electronic Surveillance Control Act, invasion of privacy, and defamation.
  • The court ruled that the student had stated a claim for the alleged violation of his right to be free from an unreasonable search.
  • here was no basis for them to search the text and voice mail messages stored on the phone.
  • unlawful access to the stored voice mail and text message communications.
  • (2) A person shall not willfully and maliciously read or copy any message from any telegraph, telephone line, wire, cable, computer network, computer program, or computer system, or telephone or other electronic medium of communication that the person accessed without authorization. (3) A person shall not willfully and maliciously make unauthorized use of any electronic medium of communication, including the internet or a computer, computer program, computer system, or computer network, or telephone.
  •  
    Legal Implications for Searching Student Cell Phones. Although this article is written against Michigan law, it does help clarify some of the concepts for what is permissable. Note that searching a student's cell phone or wireless device without parent permission may violate state wiretapping laws.
  •  
    Confiscating and looking at information on cell phones by school officials is still not clear. This is a very interesting case study for those working with digital citizenship issues at their school.
  •  
    Fascinating article explaining Michigan take on searching and confiscating cell phones.
Anne Bubnic

Student accused of hacking into computers, sending threatening messages - 1 views

  •  
    A Lehigh Acres teen is accused of hacking into a Lee County school's computer system and sending threatening messages to parents. The student is facing charges of two counts of an offense against intellectual property/modify without authority computer support document, each a third degree felony, and three counts of an offense against computer users/computer crime/interrupt or impair a governmental operation or public communication, each a second degree felony.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Anne Bubnic

TV, Computer Make Children Sleep Less - 0 views

  •  
    Middle school children who have a television or computer in their room sleep less during the school year, watch more TV, play more computer games and surf the net more than their peers who don't - reveals joint research conducted by the University of Haifa and Jezreel Valley College.
Anne Bubnic

Koobface computer virus attacks Facebook users - 0 views

  •  
    Facebook's millions of users are in the crosshairs of a computer virus dubbed Koobface that is being spread through the social networking site's messaging system. Users whose computers are infected may have their credit card numbers stolen or their searches on Google, Yahoo and MSN diverted to fraudulent Web sites.
Lucy Gray

Non-Apologetic Computer Ethics Education - 0 views

  •  
    A Strategy for Integrating Social Impact and Ethics into the Computer Science Curriculum from the Research Center on Computers and Society.
Anne Bubnic

Why kids don't tell on cyber-bullies - 0 views

  •  
    Many young people keep quiet about online bullying for fear they will not be allowed to keep using computers, says a bullying expert. Dr Shaheen Shariff, who leads an international cyber-bullying project from McGill University in Montreal, said more than half of young people with internet access would encounter online bullying as a victim, a perpetrator or a bystander. But almost two thirds admitted they would not report it because they feared losing computer privileges. Most children thought there was nothing adults could do to help anyway, said Dr Shariff, who was in Queenstown this week to speak at a Netsafe online safety conference.
Anne Bubnic

America's Libraries adapted to digital age - 0 views

  • As a group, libraries have embraced the digital age," said Lee Rainie, founding director of the Pew Internet & American Life Project, which has surveyed public attitudes toward libraries. "They've added collections, added software and hardware, upgraded the skills of their staff. A lot of institutions have had to change in the Internet age, but libraries still have a very robust and large constituency." A December 2007 Pew survey found that more than half of Americans — 53% — visited a library in the past year. That's expected to grow as more people look for free resources and entertainment in a slowing economy.
  • At the one-room Watha T. Daniel/Shaw Interim Library in the District of Columbia, books still line the shelves. But on one recent day, almost every adult at the library sat in front of a computer, surfing the Web, checking e-mail or visiting a social networking site.
  • The analysis found that libraries are thriving in the Internet age: •Attendance increased roughly 10% between 2002 and 2006 to about 1.3 billion. Regionally, Southern states lag the rest of the country in visits per capita. •Circulation, which measures how often library visitors check out print or electronic materials, increased about 9%, from 1.66 billion to 1.81 billion during the five-year period.
  • ...2 more annotations...
  • •The number of Internet-capable computers soared 39% — from about 137,000 in 2002 to nearly 190,000 in 2006. Libraries in rural states in New England and the Midwest led the country in public computers per capita in 2006. The increase in Internet access is thanks in part to the Bill & Melinda Gates Foundation, which launched a national program in 1997 to bring the Internet to libraries, beginning with the South. By 2003, the foundation had spent $250 million on some 47,000 computers, as well as training and tech support, bringing almost every public library online, said Jill Nishi, deputy director of the foundation's U.S. Libraries initiative. "You should be able to walk into any library and find Internet service," she said. "It's free, unfettered access to information."
  • Free Internet access is particularly important for low-income people, said Ken Flamm, an economics professor at the University of Texas at Austin who has studied the role of the Internet in public libraries. Only about a third of households with incomes below $25,000 have Internet access, according to federal data.
  •  
    The Internet was supposed to send America's public libraries the way of eight-track tapes and pay phones. But it turns out, they're busier than ever. Libraries have transformed themselves from staid, sleepy institutions into hip community centers offering
Anne Bubnic

Digital Underground Storytelling For Youth - 0 views

  •  
    Student -created videos telling powerful stories!! D.U.S.T.Y. is an afterschool program for middle and high school students in Oakland, CA. DUSTY students work on computers to create their own Digital Stories, as well at to generate rap and hip hop "beats and rhymes." Throughout the creative process, students learn to master programs such as Adobe Photoshop, Adobe Premiere, iMovie, and Fruity Loops with the help of skilled instructors. At the end of each semester, the students' creative masterpieces, including digital stories, raps, beats, and performances are showcased in some sort of final event at The Parkway Theatre, The Metro, and other local venues.

  •  
    In this information technology age, children and youth in West and East Oakland face the additional disadvantage of a digital divide, which separates ethnicities, socio-economic classes, genders, and ages. Youth from low-income communities rarely have access to cutting edge communication technologies or, just as importantly, to empowering uses of them. A comparison between the number of computers per Oakland school with the schools' statewide academic performance ranking, or API, revealed that some schools with high numbers of computers have very low API's. This discrepancy suggests that simply having technology is not enough; rather, to improve student academic outcomes, technology must be meaningfully used.
Anne Bubnic

B4UCopy: Copyright Awareness Curriculum for High School/Teens - 0 views

  •  
    Computers make it easy to make copies of computer software, pictures, words, movies and songs. But copyright laws make it illegal to copy the creative work without the owner�s permission. Making copies of a work protected by copyright is just like stealing. The B4UCopy educational program, available for free download, has a goal of raising awareness of copyright laws and reinforce responsible behavior online.
Anne Bubnic

Microsoft Joins Effort for Laptops for Children - 0 views

  •  
    After a years-long dispute, Microsoft and the computing and education project One Laptop Per Child said Thursday that they had reached an agreement to offer Windows on the organization's computers.
Vicki Davis

World of Warcraft Obsession - has 36 accounts, Raids by Himself | Ripten Video Game Blog - 0 views

  •  
    There are hobbyists and there are fanatics. I cannot imagine the pricetag for the computer set up shown here and have to hope that these 11 computers used simultaneously to play world of warcraft are put to "good use" at other times during the day. I also see someone who is online but is not connected with others. To me, if I do things online - I like social spaces because of the "interaction" -- sort of like creating your own friend network of 36 different people and tweeting yourself all day -- sort of Sybil-ish, I think. Addictive behaviors is definitely part of digital health and wellness and helping people know when to draw the line.
Anne Bubnic

Smart AUP Quiz - Assessment tool for student understanding of AUP - 4 views

  •  
    A school's Acceptable Use Policy, or AUP, is a list of technology regulations that require students to use technology responsibly and prevent abuse of school computers. Students are often required to sign this "user contract" in order to use school network computers but unfortunately many sign without reading or understanding the information. The Smart AUP assessment tool is a fun and effective way for students to demonstrate to teachers and administrators that they have read and understand the AUP.
Anne Bubnic

How Privacy Vanishes Online, a Bit at a Time - 2 views

  •  
    Computer scientists and policy experts say that such seemingly innocuous bits of self-revelation can increasingly be collected and reassembled by computers to help create a picture of a person's identity, sometimes down to the Social Security number.
Anne Bubnic

Cyber Bullying (Part 1) | Captain Forensics - 1 views

  •  
    New Jersey Legal, a firm specializing in computer forensics, (eDiscovery, litigation support and trial service), also provides custom court room exhibits and multimedia presentations. They run a weekly comic series on their web site called CAPTAIN FORENSICS - with comics that are all related to computer crimes. This is part one of a 4-part series on Cyberbullying. Click "next" for the rest of the episodes.
Anne Bubnic

Computer Security Resource Collection - 6 views

  •  
    The folks at AnyPlace Control (remote desktop access) have compiled this list of resources for computer security. Many are related to protecting children.
Anne Bubnic

Back to School Tips| Americans for Technology Leadership - 0 views

  • Cyberbullying Cyberbullying or online bullying is repeated, unwanted or cruel behavior against someone through computers, cell phones, gaming consoles, or other Internet-based means. The Internet is always “on,” opening the door for 24-hour harassment. Cyberbullies can be anonymous. They never have to confront their victims, they don’t have to be physically stronger and cyberbullies may be virtually invisible to parents and adults.
  • Look for warning signs your child may be the victim of cyberbullying – depression, lack of interest in school and friends, drop in grades and subtle comments that something may be wrong. If your child is the victim of cyberbullying, take action. By filtering email, instant messages and text messages, you can cut off many of the ways the cyberbullies contact your child. By having your child avoid the sites and groups where the attacks occur, he/she can ignore the bully. If harassment continues, change your child’s email address, user names and Internet account. If these steps do not stop the cyberbullying, contact the parents of the child who is behind the bullying, contact the school, and if the situation is not resolved, involve the police. It’s important to compile copies of harassing emails and postings to have evidence for authorities or the school, so they can take action. Look for signs that your child may be the cyberbully themselves – if they sign onto the Internet under someone else’s name, if they use someone else’s password without their permission, if they posted rude or mean things about someone else online, if they use bad language online, or if they changed their profile or away message designed to embarrass or frighten someone. Talk to your kids about cyberbullying and why it’s wrong and hurtful.
  •  
    As children go back to school, many parents are concerned about how their children will be using the computer and Internet devices in the classroom. Communication is key. Parents need to talk with their children about how to use the Internet safely, potential threats and appropriate usage of the Internet. By understanding both the benefits and the risks of Internet use, families can have a safer and more secure online experience. This article includes key tips on cyberbullying, internet safety, privacy and security.
1 - 20 of 132 Next › Last »
Showing 20 items per page