Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged concepts

Rss Feed Group items tagged

jackmilners

2020 Toyota 4Runner Limited Concept, Redesign, Release Date - 0 views

  •  
    2020 Toyota 4Runner Limited Concept, Redesign, Release Date - The car in acquiring at present by utilizing a unibody
Susie Highley

Social Media Literacy: The Five Key Concepts | Edutopia - 0 views

  •  
    Great list to help raise awareness
Rhondda Powling

Young People, Ethics, and the New Digital Media | The MIT Press - 4 views

  •  
    "The authors argue that five key issues are at stake in the new media: identity, privacy, ownership and authorship, credibility, and participation. Drawing on evidence from informant interviews, emerging scholarship on new media, and theoretical insights from psychology, sociology, political science, and cultural studies, the report explores the ways in which youth may be redefining these concepts as they engage with new digital media."
  •  
    "The authors argue that five key issues are at stake in the new media: identity, privacy, ownership and authorship, credibility, and participation. Drawing on evidence from informant interviews, emerging scholarship on new media, and theoretical insights from psychology, sociology, political science, and cultural studies, the report explores the ways in which youth may be redefining these concepts as they engage with new digital media."
Vicki Davis

Web Etiquette and Safety Lesson Plan [Assessment Piece] - 0 views

  • A person is on the other end of all web communication. The web connects people in a community where everyone becomes each other's neighbor. It is just as important to observe safety on the Internet as it is to follow traffic signs. The Think.com community is a place where the teacher sees everything. Everyone is responsible for his/her own actions while in Think.com. Passwords are to be kept secret.
    • Vicki Davis
       
      Excellent concluding concepts for an introductory course for young students. How many don't understand this!
  •  
    Appropriate web etiquette (netiquette) and web safety are vital for building a strong web community. This is a lesson plan that teachers can use to introduce key concepts to their students as they introduce them to the Think.com community. Use this model lesson as designed, change it to fit your needs, or create your own.
Megan Black

Planet Nutshell | Web Videos | Explainer Videos | Educational Videos: NetSafe Episode 1... - 2 views

  •  
    The first of 17 videos explaining Internet Safety concepts to grades 1-12. Each marked grade appropriately. 
Anne Bubnic

First-graders use Facebook as a learning tool - 5 views

  •  
    Erin Schoening's first grade class at Gunn Elementary School [Iowa] is one of the first in the Council Bluffs Community School District, if not the nation, to use Facebook as a teaching tool, recapping lessons and "synthesizing concepts" while using the social media site to provide updates for their parents and others.
Anne Bubnic

AB 307 [Chavez Bill ]- California - 0 views

  •  
    AB 307 charges districts to "educate pupils and teachers on the appropriate and ethical use of information technology in the classroom, Internet safety, avoiding plagiarism, the concept, purpose, and significance of a copyright so that pupils can distinguish between lawful and unlawful online downloading, and the implications of illegal peer-to-peer network file sharing."

    This bill shows up as additional items in the planning criteria found in the EETT grant applicationCalifornia Education Code Section 51871.5, -- legislation, monitoring student internet use, ethical use of educational technology in the classroom, information literacy, aspects of information literacy/Internet safety, cyber-bullying, research studies and reports.
Anne Bubnic

Twitter and Plurk: What Parents Should Know - 0 views

  • While there is nothing inherently dangerous in the sites themselves, there is the risk that teens could use microblogs to reveal personal information or engage in a relationship with someone whose intentions are less than honorable. And like any other form of communication, the door is open for a teen to take risks such as talking about sex with strangers (albeit in relatively short bursts) or getting together with someone they meet through a microblog.
  •  
    Services like Twitter and Plurk let people post very short messages (140 characters or less) to their friends and acquaintances. Founded in 2006, Twitter has attracted millions of users who keep people posted about what they're doing and thinking. It can be as simple as "I'm standing in line at the grocery store" to as profound as a quick comment about a political candidate, a world event or a new book. There's even a video spin-off of this concept called 12 Seconds that allows people to post video clips no longer than 12 seconds.
Anne Bubnic

i-SAFE Lesson Guide: Phishing for Information - 0 views

  •  
    Download this lesson plan from I-Safe which introduces students to the term phishing and the threat of identity theft associated with this type of e-mail. Students will:
    *understand the term phishing and the types of e-mail it applies to
    * understand the security risks associated with this type of message
    *engage in an activity to reinforce concepts by sharing information with others
Anne Bubnic

Social Networking Tools for Students - 0 views

  •  
    The concept of anytime, anywhere learning is not new to the majority of Northeastern University students. With personal Web sites, multi-functional cell phones, MP3 players, YouTube accounts, Facebook profiles, and gaming personas, students are sharing and creating knowledge at an unprecedented rate.\n\n
Vicki Davis

Search and Seizure of Cell Phones: Can You Hear Me Now? - 0 views

  • May school officials lawfully “search” the confiscated cell phone to look at stored text messages, photographs, videos, and logs of incoming and outgoing calls? Clearly, the circumstances of the search must satisfy the T.L.O. standard. Not as clear, however, is whether such a search violates federal or Michigan laws regarding stored electronic communications.
  • [A] search of a student by a teacher or other school officials will be ‘justified at its inception’ when there are reasonable grounds for suspecting that the search will turn up evidence that the student has violated or is violating either the law or the rules of the school. Such a search will be permissible in its scope when the measures adopted are reasonably related to the objectives of the search and not excessively intrusive in light of the age and sex of the student and the nature of the infraction.”
  • In Klump v Nazareth Area Sch Dist, 425 F Supp 2d 622 (ED Pa, 2006), a federal district court denied the school’s motion to dismiss a lawsuit filed by a student whose cell phone was searched.
  • ...5 more annotations...
  • compensatory and punitive damages for the alleged unconstitutional search, violation of the Pennsylvania Wiretapping and Electronic Surveillance Control Act, invasion of privacy, and defamation.
  • The court ruled that the student had stated a claim for the alleged violation of his right to be free from an unreasonable search.
  • here was no basis for them to search the text and voice mail messages stored on the phone.
  • unlawful access to the stored voice mail and text message communications.
  • (2) A person shall not willfully and maliciously read or copy any message from any telegraph, telephone line, wire, cable, computer network, computer program, or computer system, or telephone or other electronic medium of communication that the person accessed without authorization. (3) A person shall not willfully and maliciously make unauthorized use of any electronic medium of communication, including the internet or a computer, computer program, computer system, or computer network, or telephone.
  •  
    Legal Implications for Searching Student Cell Phones. Although this article is written against Michigan law, it does help clarify some of the concepts for what is permissable. Note that searching a student's cell phone or wireless device without parent permission may violate state wiretapping laws.
  •  
    Confiscating and looking at information on cell phones by school officials is still not clear. This is a very interesting case study for those working with digital citizenship issues at their school.
  •  
    Fascinating article explaining Michigan take on searching and confiscating cell phones.
Anne Bubnic

LwICT-DigitalCitizenship - 3 views

  •  
    The concept of digital citizenship relates to the responsible, ethical, and safe use of ICT by students as members of society and citizens of the global community.
Anne Bubnic

Privacy is Not Dead, Just Evolving - 2 views

  •  
    It's a brave new world. Unfortunately--continuing the literary allusion--Big Brother is watching. As technology makes more information more accessible, it also threatens to expose information that is not intended to be shared. Privacy is a concept that is caught in the middle of the struggle.
Anne Bubnic

6 Frame Comic Summaries - 0 views

  •  
    This teacher has applied the concept of 6-frame comic summaries to book analysis, historical figure eras etc. The idea could be used for presentations on any facet of digital citizenship.
Anne Bubnic

Lesson Plan: Intro to Cyberbulling/Avatars & Identity - 1 views

  •  
    Lesson Plan for Grades 5&6. With the layering of identity through the use of nicknames and avatars, as well as a sense of anonymity, it is easy for young people to sometimes forget that real people-with real feelings-are at the heart of online conversations. In this lesson, students are provided with opportunities to explore this concept and discuss the importance of using empathy and common sense when talking to others online.
Anne Bubnic

Digital Footprints: Your New First Impression [Video] - 7 views

  •  
    Excellent educator-created video offers students an introduction to the concepts of "managing personal identity online" and "digital footprint" and what it will mean in the course of their lifetime. Particularly noteworthy are the employer comments regarding what they learn from reading what job candidates have posted online and how it affects them both negatively and positively in considering the person for a job.
Anne Bubnic

Students: Social Networking: Don't Give Yourself Away - 3 views

  •  
    One of eight interactive case studies for kids (GR 4-8) from Cable In the Classroom: Power to Learn.
    It's very popular for young people to meet and connect online at sites like MySpace.com. However, an awareness of the risks and steps for being safe can ensure a positive experience with social networking. Don't give yourself away! This unit explores the concepts of identity, at-risk behaviors and safety online. The graphics are Nickelodeon style. A short quiz assesses learning. For the entire series, check out: http://powertolearn.com/internet_smarts/interactive_case_studies/index.shtml
Anne Bubnic

Students: Digital Permanence: Forever is a Long Time - 1 views

  •  
    One of eight interactive case studies for kids (GR 4-8) from Cable In the Classroom: Power to Learn. These days, what goes up online, often stays online. It may not be where it was initially posted, or in the same format, or it may disappear and resurface somewhere else - even though it's digital, it can still be permanent. Ensure that what you post won't get you in trouble or affect the online impression you make. This unit explores the concept of "digital footprint". The graphics are Nickelodeon style. Topics are presented for student debate. For the entire series, check out: http://powertolearn.com/internet_smarts/interactive_case_studies/index.shtml
Anne Bubnic

Students: Keeping Personal Info Private - 1 views

  •  
    One of eight interactive case studies for kids (GR 4-8) from Cable In the Classroom: Power to Learn.
    Establishing basic guidelines for Internet use is the first step in ensuring students' online safety. Learn what information should and shouldn't be shared online and appropriate interaction with online "friends." This unit explores the concepts of privacy in social networking destinations, the importance of being honest but not revealing too much information. The graphics are Nickelodeon style. A template allows students to create class rules. For the entire series, check out: http://powertolearn.com/internet_smarts/interactive_case_studies/index.shtml
Anne Bubnic

NYT: Why Cyberbullying Rhetoric Misses the Mark [Danah Boyd] - 1 views

  •  
    Following the recent death of a NY teen who committed suicide after being tormented by classmates, Dana Boyd reflects on the language of teens, who will frequently dismiss bullying as "stupid drama" in order to minimize its impact and save face because it distances both the perpetrators and the victims from pain. She recommends a focus on more positive concepts like "healthy relationships" and "digital citizenship" rather than the negative framing of bullying.
1 - 20 of 40 Next ›
Showing 20 items per page