Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged appropriate use

Rss Feed Group items tagged

Anne Bubnic

Digital Citizenship: Using Technology Appropriately - 0 views

  •  
    This web site was developed by Mike Ribble, co-author of Digital Citizenship in the Schools. He covers the 9 areas of Digital Citizenship that are outlined in the book and offers many examples of how educators can begin the process of teaching their students how to use technology more appropriately. These resources can be used by any anyone who is interested in helping students or others better understand appropriate technology use.
Anne Bubnic

Safer Mobile Use Implementation Report - 0 views

  •  
    The European Framework for Safer Mobile Use by Younger Teenagers and Children is a self-regulatory initiative of the mobile industry, which puts forward recommendations to ensure that younger teenagers and children can safely access content on their mobile phones. The recommendations are as follows: * Classification of commercial content - mobile operators' own and third-party commercial content should be classified in line with existing national standards of decency and appropriateness so as to identify content unsuitable for viewing by children and younger teenagers; * Access control mechanisms - appropriate means for parents for controlling children's access to this content should be provided; * Education and awareness-raising - mobile operators should work to raise awareness and provide advice to parents on safer use of mobile services, and ensure customers have ready access to mechanisms for reporting safety concerns; * Fighting illegal content on mobile community products and the Internet - mobile operators should work with law enforcement agencies, national authorities and INHOPE or equivalent bodies to combat illegal content on the Internet.
Anne Bubnic

Back to School Tips| Americans for Technology Leadership - 0 views

  • Cyberbullying Cyberbullying or online bullying is repeated, unwanted or cruel behavior against someone through computers, cell phones, gaming consoles, or other Internet-based means. The Internet is always “on,” opening the door for 24-hour harassment. Cyberbullies can be anonymous. They never have to confront their victims, they don’t have to be physically stronger and cyberbullies may be virtually invisible to parents and adults.
  • Look for warning signs your child may be the victim of cyberbullying – depression, lack of interest in school and friends, drop in grades and subtle comments that something may be wrong. If your child is the victim of cyberbullying, take action. By filtering email, instant messages and text messages, you can cut off many of the ways the cyberbullies contact your child. By having your child avoid the sites and groups where the attacks occur, he/she can ignore the bully. If harassment continues, change your child’s email address, user names and Internet account. If these steps do not stop the cyberbullying, contact the parents of the child who is behind the bullying, contact the school, and if the situation is not resolved, involve the police. It’s important to compile copies of harassing emails and postings to have evidence for authorities or the school, so they can take action. Look for signs that your child may be the cyberbully themselves – if they sign onto the Internet under someone else’s name, if they use someone else’s password without their permission, if they posted rude or mean things about someone else online, if they use bad language online, or if they changed their profile or away message designed to embarrass or frighten someone. Talk to your kids about cyberbullying and why it’s wrong and hurtful.
  •  
    As children go back to school, many parents are concerned about how their children will be using the computer and Internet devices in the classroom. Communication is key. Parents need to talk with their children about how to use the Internet safely, potential threats and appropriate usage of the Internet. By understanding both the benefits and the risks of Internet use, families can have a safer and more secure online experience. This article includes key tips on cyberbullying, internet safety, privacy and security.
Judy Echeandia

Summer guide to cybersafety - 0 views

  • Today's child has a digital footprint the size of bigfoot (especially compared to us) and their online life is just as important to them as their "real" life.  How do we keep our children safe in this brave new world?  By educating them how to make the right decisions online and by modeling appropriate behavior on the internet.  Yes that means we need to exist in the virtual world so we can see, hear, and participate in the main street of the 21st century.
  •  
    "Today's child has a digital footprint the size of bigfoot (especially compared to us) and their online life is just as important to them as their "real" life. How do we keep our children safe in this brave new world? By educating them how to make the right decisions online and by modeling appropriate behavior on the internet. Yes that means we need to exist in the virtual world so we can see, hear, and participate in the main street of the 21st century."
Anne Bubnic

Blocking the Future [AASA] - 1 views

  • In this environment, school district leaders have a critical choice to make: Will their schools pro-actively model and teach the safe and appropriate use of these digital tools or will they reactively block them out and leave students and families to fend for themselves?
  • o better way to highlight organizational unimportance than to block out the tools that are transforming the rest of society.
  • the specific policies are much less important than the general mindset of the school district.
  • ...4 more annotations...
  • If a district has decided to figure out ways to facilitate technology usage and empower students and staff, the policies will follow accordingly. Conversely, if a district is determined to treat technology from a fearful or wary standpoint, its policies will reflect that position as well.
  • they do have to exercise appropriate oversight and convey the message, repeatedly and often, that frequent, appropriate technology usage is both important and expected.
  • they have the right mindset. Their first reaction is not “keep this out” but rather “how we can make this work?” We can learn from these organizations how they have balanced safety concerns with the need to empower students with 21st century skills and dispositions.
  • lease don’t relegate your students, particularly those from disadvantaged backgrounds, to second-class status in the new economy because you left it to them and their families to figure out on their own what it means to be digital, global citizens.
  •  
    [May 2008] AASA article gives examples of school organizations that are desperately and inappropriately blocking the future and Scott McLeod pleads, "Please don't block the future." Please don't relegate your students, particularly those from disadvantaged backgrounds, to second-class status in the new economy because you left it to them and their families to figure out on their own what it means to be digital, global citizens. Ask AASA and its state affiliates to provide more technology leadership-related professional development opportunities. And let us know how we can help.
Anne Bubnic

PointSmart Report for Best Practices in Online Safety [PDF] - 0 views

  •  
    Task Force Recommendations for best practices for child online safety. Point Smart. Click Safe. is an initiative of the cable industry to educate parents about online safety and appropriate use of the Internet by their children.
  •  
    Download the full report on Task Force Recommendations for best practices for child online safety. Point Smart. Click Safe. is an initiative of the cable industry to educate parents about online safety and appropriate use of the Internet by their children.
Anne Bubnic

AB 307 [Chavez Bill ]- California - 0 views

  •  
    AB 307 charges districts to "educate pupils and teachers on the appropriate and ethical use of information technology in the classroom, Internet safety, avoiding plagiarism, the concept, purpose, and significance of a copyright so that pupils can distinguish between lawful and unlawful online downloading, and the implications of illegal peer-to-peer network file sharing."

    This bill shows up as additional items in the planning criteria found in the EETT grant applicationCalifornia Education Code Section 51871.5, -- legislation, monitoring student internet use, ethical use of educational technology in the classroom, information literacy, aspects of information literacy/Internet safety, cyber-bullying, research studies and reports.
Anne Bubnic

Governor Signs Law To Educate Children On Internet Safety [Illinois] - 0 views

  • he new law takes effect January 1st and provides that the Internet safety curriculums in schools will begin with the 2009-2010 school year. The bill allows the age-appropriate unit of instruction to be incorporated into the current courses of study regularly taught in the districts’ schools.
  • Illinois’ partnership with the Netsmartz national Internet safety program was a Governor’s initiative that was launched in 2006.
  • Earlier this week, Governor Blagojevich signed into law the state’s new Cyberbullying law. It clarifies the definition of harassing someone by using electronic communication such as the Internet and text messaging and enables the prosecution of someone who anonymously bullies in this capacity.
  •  
    Governor Rod Blagojevich Thursday signed Senate Bill 2512 legislation to help protect children from the dangers of the Internet. SB 2512 requires school districts, beginning in the 2009-2010 school year, to incorporate an "age-appropriate Internet safety unit of instruction in the current course of study regularly taught in the district's schools," beginning in third grade.
Anne Bubnic

Ensuring Equitable Use of Education Technology - 1 views

  •  
    When a school or district decides to implement education technology into the curriculum, one of its overriding goals must be to create plans and policies for all members of the learning community to have equitable access and use. Appropriate funding and professional development represent the key means of supporting equitable access and use of technology to ensure technology literacy and to support meaningful learning for all students.
Dean Mantz

academyofdiscovery - Internet Safety - 8 views

  • I will never post any information more personal than my first name nor will I post pictures of myself. I will not plagiarize, instead I will expand on others' ideas and give credit where it is due. I will use language appropriate for school. I will not insult my fellow students or their writing. I will only post pieces that I am comfortable with everyone seeing; other pieces I will keep as drafts. I will not be afraid to express my ideas, while not overgeneralizing or making derogatory/inflammatory remarks; any posts or edits on controversial issues must either be submitted to Mr. Wilkoff prior to posting or be a part of a classroom project/question which addresses controversial issues. I will use constructive/productive/purposeful criticism, supporting any idea, comment, or critique I have with evidence. I will take all online content creation seriously, posting only things that are meaningful and taking my time when I write. I will try to spell everything correctly. I will not use my public writing (blog posts, comments, discussion topics, wiki edits) as a chat room, instead, I will save IM language for private conversations. I will not bully others in my blog posts or in my comments. I will never access another student's account in order to pose as them or look at their personal content, but I will advise them when they haven't logged out of their computer from my own account. I will be proactive in monitoring the comments that others leave on my blog, utilizing the comment blacklist if necessary. I will personalize my blog and keep my writing authentic, while taking responsibility for anything blogged in my name. I will not provoke other students in my blog posts or comments. I will use my online content as an extension of the classroom, and in doing so, I will leave anything that unsaid in the classroom unsaid online. I will only post photos which are school appropriate and either in the creative commons or correctly cited. I will not spam (including, but not limited to meaningless messages, mass messages, and repetitive messages) I will only post comments on posts that I have fully read, rather than just skimmed. I will respect the public nature of online information, and in doing so, I will respect the wishes of my fellow students for keeping their information (full name, compromising stories, etc.) private.
Anne Bubnic

Realizing Ed Tech's Potential in the Face of Internet Issues - 0 views

  •  
    Instead of using scare tactics and statistics that are misleading, we must paint a realistic picture and use statistics appropriately. Rather than pass legislation that puts constraints on schools, Congress needs to fund online safety education and public awareness campaigns that show the true picture. "You can't get there from here." it's not just the punch line of a driving direction joke. For educators, whose destination is the realization of educational technology's potential, that punch line sometimes seems closer to the truth than we like.
Anne Bubnic

E-safety: Developing AUPs for Effective Practice of Internet Safety - 0 views

  •  
    Download this free 64-page document on developing appropriate policies and procedures to ensure safe use of the Internet. A checklist for developing acceptable use policies and practical strategies for responding to incidents are also included. Developed by the Internet Safety Group of New Zealand.
Vicki Davis

Web Etiquette and Safety Lesson Plan [Assessment Piece] - 0 views

  • A person is on the other end of all web communication. The web connects people in a community where everyone becomes each other's neighbor. It is just as important to observe safety on the Internet as it is to follow traffic signs. The Think.com community is a place where the teacher sees everything. Everyone is responsible for his/her own actions while in Think.com. Passwords are to be kept secret.
    • Vicki Davis
       
      Excellent concluding concepts for an introductory course for young students. How many don't understand this!
  •  
    Appropriate web etiquette (netiquette) and web safety are vital for building a strong web community. This is a lesson plan that teachers can use to introduce key concepts to their students as they introduce them to the Think.com community. Use this model lesson as designed, change it to fit your needs, or create your own.
Anne Bubnic

Chatroulette: What's an Educator to Do? - 2 views

  • You never know who you are going to encounter: a predator? Someone sitting there naked?” asks Barnett. “All it would take is one such incident and the school will be sued by an angry parent. Our focus should be on helping students to learn to be cyber safe and we don't have to do that by actually being on Chatroulette.com.”
  •  
    On listservs and blogs, education researchers and teachers are beginning to discuss how to handle this latest online application. To most educators, filtering is never a preferred option. Teachers and media specialists almost uniformly choose to use opportunities like this to teach students how to make decisions about what's appropriate on their own. "One of the responsibilities of working with students on the use of online resources is to make them aware of potential dangers so they can make informed choices," says Deb Logan, librarian and media specialist for Mount Gilead (OH) High School, by email. "A discussion of online resources like Chatroulette offers a learning opportunity. These opportunities sometimes come at unexpected times." But educators believe Chatroulette may be a bit different then other similar sites like Omegle.com and Facebook's PopJam in that video is involved-and there's no way to edit what pops up on the screen other than clicking "next" after it's already appeared. There's no lurking allowed on Chatroulette-once a user signs in, they're visible to anyone who chances upon them, and anyone, in turn, is visible to them. Needless to say, there's a bit of nudity and sexual play being reported on the site, and the swiftness of people moving from image to image doesn't allow children to protect themselves-other than signing off.
Anne Bubnic

Copyright Case Study [ Video] - 0 views

  •  
    BEST PRACTICES IN FAIR USE from the folks at Temple University's Media Literacy Education Lab. This is a case study of PROJECT LOOK SHARP and their use of media literacy materials. Included are discussion questions that would be appropriate for teaching teachers and/or students.
Anne Bubnic

The Impact of Facebook on Our Students - 0 views

  •  
    Doug Foderman and Marje Monroe of ChildrenOnline.org review concerns about Facebook and the risks for kids.\n\nThey have Facebook accounts and actually see it as a wonderful, and valuable, resource. However, just because Facebook says that anyone 14 years or old CAN use Facebook, doesn't mean that they should. It isn't an age-appropriate or developmentally healthy place for our children and younger teens to hang out. Facebook is not working to protect our children and the laws in our country are terribly inadequate to safeguard our children online, in general. Not enough is being done to protect and educate children and teens against the risks that come from using the Internet, and Facebook in particular. We (adults, parents, educators) need to do more.
Anne Bubnic

Do Social Networks Bring the End of Privacy? [Scientific American] - 0 views

  • The closest U.S. privacy law comes to a legal doctrine akin to copyright is the appropriation tort, which prevents the use of someone else’s name or likeness for financial benefit. Unfortunately, the law has developed in a way that is often ineffective against the type of privacy threats now cropping up. Copyright primarily functions as a form of property right, protecting works of self-expression, such as a song or painting. To cope with increased threats to privacy, the scope of the appropriation tort should be expanded.
  •  
    Young people share the most intimate details of personal life on social-networking Web sites, such as MySpace and Facebook, portending a realignment of the public and the private. A post on YouTube can provoke global ridicule with the press of a return key. Social networks are forcing us to redefine what is truly private and what is public.
Anne Bubnic

ReCut, Reframe, Recycle: Quoting Copyrighted Material [PDF] - 0 views

  •  
    ReCut, Reframe, Recycle: Quoting Copyrighted Material in User-Generated Video .

    A Future of Media Project funded by the Ford Foundation. This study looks at what kinds of uses of copyrighted works are legal online. It identifies nine common kinds of re-appropriation practices, including satire and parody, criticism and video diaries.
Anne Bubnic

MTV's A Thin Line campaign - 3 views

  •  
    Draw a line between digital use and abuse via cell phone and Internet. Great place to learn about digital disrespect, innocent and appropriate online behaviors. Learn how to identify, respond to and stop the spread of digital abuse. The site contains a number of great videos for kids created by their peers. See: http://www.athinline.org/videos
1 - 20 of 43 Next › Last »
Showing 20 items per page