Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged at risk

Rss Feed Group items tagged

Grace Kat

What really puts kids at risk online? - 0 views

  •  
    Research suggests that it'snot giving out personal information that puts kid at risk. It's not having a blog or a personal website that does that either. What puts kids in danger is being willing to talk about sex online with\nstrangers or having a pattern of multiple risky activities on the web\nlike going to sex sites and chat rooms, meeting lots of people there,\nkind of behaving in what we call like an internet daredevil."
Anne Bubnic

Students: Social Networking: Don't Give Yourself Away - 3 views

  •  
    One of eight interactive case studies for kids (GR 4-8) from Cable In the Classroom: Power to Learn.
    It's very popular for young people to meet and connect online at sites like MySpace.com. However, an awareness of the risks and steps for being safe can ensure a positive experience with social networking. Don't give yourself away! This unit explores the concepts of identity, at-risk behaviors and safety online. The graphics are Nickelodeon style. A short quiz assesses learning. For the entire series, check out: http://powertolearn.com/internet_smarts/interactive_case_studies/index.shtml
Anne Bubnic

Internet safety messages - one size does not fit all - 0 views

  •  
    One problem with most of today's Internet safety messaging campaigns is that there is only one set of messages for the entire population of youth and parents. But, an extensive literature review conducted by the Internet Safety Technical Task Force Research Advisory Board found that "not all youth are equally at risk" and that "those experiencing difficulties offline, such as physical and sexual abuse, and those with other psychosocial problems are most at risk online."
Anne Bubnic

Pupils 'must manage online risks' - 2 views

  • The five schools judged outstanding for online safety all used managed systems to help pupils become responsible users of technology.
  •  
    Pupils given a greater degree of freedom to surf the internet at school are less vulnerable to online dangers in the long-term, inspectors say. "Managed" online systems were more successful than "locked" ones at safeguarding pupils' safety, they said. The inspectors' research was commissioned in response to a report by Dr Tanya Btron, which assessed the risks children faced when using the internet and video games.
Anne Bubnic

Study: Abuse, provocative images increase Internet risks for girls - 0 views

  •  
    A history of childhood abuse and use of a provocative online identity increase the risk that girls will be victimized by someone they meet on the Internet, according to a study appearing in the June issue of Pediatrics.
Anne Bubnic

Magid: Treating kids on the Web in a new way - 6 views

  •  
    Larry Magid discusses the shift in thinking -- from a focus of constraint and protection against predators to one of developing a culture of responsibility and digital citizenship. For those "at risk" students, school psychologist, Patti Afgatson, suggests that we consider using health prevention models for Internet safety education - basic safety advice for most youth and intense counseling from mental health professionals for the small minority of young people who are taking extraordinary risks both on and offline.
Anne Bubnic

New federal panel looks at Internet safety - 0 views

  • I’m not aware of any federal Internet safety commissions that met during the Bush administration. From what I can tell, that administration paid very little attention to Internet safety other than to add to the exaggerations and fear-mongering about so-called Internet predators. So is there any point in taking yet another look at Internet safety? Yes, if only because things have changed dramatically over the past few months. To begin with, we have a new administration led by a president who actually understands the Internet as well as the constitutional issues that arise whenever government tries to control online speech, access or even safety.
  • When the new working group convened Thursday, our first speaker was Susan Crawford, who works at the White House as special assistant to the president for science, technology and innovation policy. A law professor and founder of OneWebDay, Crawford brings a refreshing understanding of the government’s need to balance safety and security with civil liberties, privacy and even the First Amendment rights of minors. Her opening remarks helped set the tone for the group by admonishing us to “avoid overheated rhetoric about risks to kids online,” pointing out that “risks kids face online may not be significantly different than the risks they face offline.”
  •  
    Last year, Congress passed the Protecting Children in the 21st Century Act,which called for yet another committee to study Internet safety. By statute, the Online Safety and Technology Working Group is made up of representatives of the business community, public interest groups and federal agencies.
Anne Bubnic

Cyberbullying, Cyberthreats, and Dangerous Online Communities [PDF] - 0 views

  •  
    Presentation by Nancy Willard outlining the dangers of association with online communities by at-risk youth. This includes self-harm communities, hate groups and gangs and suicide communities.
Anne Bubnic

Get Safe Online :: Students at greatest risk from online fraud - 0 views

  • “Our study set out to establish whether online security factors vary according to age, gender, geography and occupation. Online criminals operate on a mass scale so are indiscriminate about who they target. Whether they are successful or not depends largely on two factors: firstly, how good we are at securing our computers; and secondly, how much we avoid risky activities and behaviours while we’re using the internet.
  •  
    Internet users in full-time education (2) are almost twice as confident online as other internet users - more than half (51%) consider themselves 'very' internet literate, compared to the national average of 26%. Despite this, they are the most dismissive of the risk of online crime and of the importance of basic security tools (such as anti-virus software) in protecting them against it.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Anne Bubnic

Cyber Bullying - School Policies? - 0 views

  • A punch in the eye seems so passé. Bullies these days are traveling in packs and using cyberspace to their humiliating messages online. Like the toughies of old, they are both boys and girls and they demand nothing less than total submission as the price of peace. It’s a jungle out there. For school districts, patrolling the hallways and adjacent grounds is just a start. In the 21st century, a new kind of vigilance is necessary—an expanded jurisdiction that serves to both stave off legal actions and ensure a safe and productive learning environment.
  • Today’s principals rely on district policy and practice to extend the presumed long arm of the law to off-campus incidents. Potentially, that could mean plunging headlong into the electronic frontier to rescue student victims and thwart cyberbullying classmates who thrive as faceless computer culprits.
  • A December 2009 study by Harvard University’s Berkman Center for Internet & Society found that students on the receiving end report greater emotional distress, are more likely to abuse substances, and are more frequently depressed.
  • ...8 more annotations...
  • The report concluded a child is more likely to face cyberbullying by fellow students than being stalked by an online predator. “Bullying and harassment are the most frequent threats minors face, both online and offline,” notes the Harvard report, Enhancing Child Safety & Online Technologies: Final Report of the Internet Safety Task Force to the Multistate Working Group on Social Networking of State Attorneys General of the United States.
  • Bullying can take a variety of forms. Incidents have included stealing passwords, impersonating the victim online, fake MySpace or Facebook pages, embarrassing photos or information being revealed, threats, rumors, and more. And, bullying tends to magnify the longer it exists.
  • Students sometimes will cyberbully teachers or other school employees
  • In January, a federal court in Connecticut ruled that Regional District 10 was within its rights to discipline a student over an off-campus blog. Judge Mark Kravitz rejected Avery Doninger’s claim that the school violated her free speech rights when they refused to let her serve as class secretary or to speak at graduation because of words she wrote at home
  • According to the Hartford Courant, the school district won “because the discipline involved participation in a voluntary extracurricular activity, because schools could punish vulgar, off-campus speech if it posed a reasonably foreseeable risk of coming onto school property, and because Doninger’s live journal post was vulgar, misleading, and created the risk of substantial disruption at school.”
  • In Florida, a high school senior and honor student was accused of cyberbullying after she wrote on Facebook: ‘’Ms. Sarah Phelps is the worst teacher I’ve ever met! To those select students who have had the displeasure of having Ms. Sarah Phelps, or simply knowing her and her insane antics: Here is the place to express your feelings of hatred.’’ Katherine Evans, who was suspended for “bullying and cyberbullying harassment toward a staff member,” sued the charter school in December 2008. A final ruling is pending.
  • In a 2007 incident, 19 students were suspended at a Catholic high school near Toronto for cyberbullying a principal on Facebook. The students called the principal a “Grinch of School Spirit” and made vulgar and derogatory comments. While the U.S. Constitution does not necessarily apply in private school settings, the incident demonstrates that this kind of behavior can happen anywhere.
  • Districts should have a cyberbullying policy that takes into account the school’s values as well as the school’s ability to legally link off-campus actions with what is happening or could happen at school.
  •  
    Good article from AMERICAN SCHOOL on the policies that schools need to have in place to protect both students and teachers from cyberbullies.
Anne Bubnic

Footprints in the Digital Age - 0 views

  • In the Web 2.0 world, self-directed learners must be adept at building and sustaining networks.
  • As the geeky father of a 9-year-old son and an 11-year-old daughter, one of my worst fears as they grow older is that they won't be Googled well. Not that they won't be able to use Google well, mind you, but that when a certain someone (read: admissions officer, employer, potential mate) enters "Tess Richardson" into the search line of the browser, what comes up will be less than impressive. That a quick surf through the top five hits will fail to astound with examples of her creativity, collaborative skills, and change-the-world work. Or, even worse, that no links about her will come up at all. I mean, what might "Your search did not match any documents" imply?
  • digital footprints—the online portfolios of who we are, what we do, and by association, what we know—are becoming increasingly woven into the fabric of almost every aspect of our lives.
  • ...6 more annotations...
  • So what literacies must we educators master before we can help students make the most of these powerful potentials? It starts, as author Clay Shirky (2008) suggests, with an understanding of how transparency fosters connections and with a willingness to share our work and, to some extent, our personal lives
  • Publishing content online not only begins the process of becoming "Googleable," it also makes us findable by others who share our passions or interests.
  • Although many students are used to sharing content online, they need to learn how to share within the context of network building. They need to know that publishing has a nobler goal than just readership—and that's engagement.
  • As Stanford researcher Danah Boyd (2007) points out, we are discovering the potentials and pitfalls of this new public space. What we say today in our blogs and videos will persist long into the future and not simply end up in the paper recycling bin when we clean out our desks at the end of the year.
  • Although Laura is able to connect, does she understand, as researcher Stephen Downes (2005) suggests, that her network must be diverse, that she must actively seek dissenting voices who might push her thinking in ways that the "echo chamber" of kindred thinkers might not? Is she doing the work of finding new voices to include in the conversation?
  • Here are five ideas that will help you begin building your own personal learning network. Read blogs related to your passion. Search out topics of interest at http://blogsearch.google.com and see who shares those interests. Participate. If you find bloggers out there who are writing interesting and relevant posts, share your reflections and experiences by commenting on their posts. Use your real name. It's a requisite step to be Googled well. Be prudent, of course, about divulging any personal information that puts you at risk, and guide students in how they can do the same. Start a Facebook page. Educators need to understand the potential of social networking for themselves. Explore Twitter (http://twitter.com), a free social networking and micro-blogging service that enables users to exchange short updates of 140 characters or fewer. It may not look like much at first glance, but with Twitter, the network can be at your fingertips.
  •  
    Giving Students Ownership of Learning: Footprints in the Digital Age. In the Web 2.0 world, self-directed learners must be adept at building and sustaining networks.
Anne Bubnic

Second Life could sexually exploit children via Internet - 0 views

  •  
    With nearly 13 million online users, the rapidly expanding virtual world Second Life is a risk for children, who could be sexually exploited, U.S. Rep. Mark Kirk (R-Ill.) said Monday."This Second Life is a new scare, unchartered territory," Wilks said at a news conference Monday with Kirk at the Mt. Prospect Police Department. "It hits home." Kirk said he knew of no cases in which children were targeted by sexual predators on Second Life, but he said he considers the virtual world an emerging danger.
Anne Bubnic

2010 Legislation Related to Sexting - 0 views

  •  
    So far this year, at least 15 states have introduced or are considering bills or resolutions aimed at "sexting." The legislation generally aims to educate young people about the risks of sexting, deter them from the practice, and apply appropriate penalties to those who do engage in sexting. While some states are just encouraging programs to educate teens about the dangers of sexting, others are attempting to de-criminalize the act.
Anne Bubnic

Twitter and Plurk: What Parents Should Know - 0 views

  • While there is nothing inherently dangerous in the sites themselves, there is the risk that teens could use microblogs to reveal personal information or engage in a relationship with someone whose intentions are less than honorable. And like any other form of communication, the door is open for a teen to take risks such as talking about sex with strangers (albeit in relatively short bursts) or getting together with someone they meet through a microblog.
  •  
    Services like Twitter and Plurk let people post very short messages (140 characters or less) to their friends and acquaintances. Founded in 2006, Twitter has attracted millions of users who keep people posted about what they're doing and thinking. It can be as simple as "I'm standing in line at the grocery store" to as profound as a quick comment about a political candidate, a world event or a new book. There's even a video spin-off of this concept called 12 Seconds that allows people to post video clips no longer than 12 seconds.
Anne Bubnic

Humiliation and gossip are weapons of the cyberbully - 0 views

  • ead teachers are being advised to draw up new rules on mobile phone use amid a growing number of cases of what is now known as “cyber-bullying”. In many secondary schools, over 90% of bullying cases are through text messages or internet chatrooms. It is hoped that the rules about mobile phone use will protect children from abusive texts, stop phones going off in class and prevent mobiles being taken into exam halls.
  • Although the majority of kids who are harassed online aren’t physically bothered in person, the cyber-bully still takes a heavy emotional toll on his or her victims. Kids who are targeted online are more likely to get a detention or be suspended, skip school and experience emotional distress, the medical journal reports. Teenagers who receive rude or nasty comments via text messages are six times more likely to say they feel unsafe at school.
  • The problem is that bullying is still perceived by many educators and parents as a problem that involves physical contact. Most enforcement efforts focus on bullying in school classrooms, corridors and toilets. But given that 80% of adolescents use mobile phones or computers, “social interactions have increasingly moved from personal contact at school to virtual contact in the chatroom,'’ write Kirk R. Williams and Nancy G. Guerra, co-authors of one of the journal reports. “Internet bullying has emerged as a new and growing form of social cruelty.'’
  • ...1 more annotation...
  • Cyber-bullying tactics include humiliation, destructive messages, gossip, slander and other “virtual taunts” communicated through e-mail, instant messaging, chatrooms and blogs. The problem, of course, is what to do about it. While most schools do not allow pupils to use their mobiles in the school building, an outright ban is deemed unworkable. Advances in technology are throwing up new problems for teachers to deal with. Children use their phones to listen to music, tell the time or as a calculator. Cyber-bullies sometimes disclose victims' personal data on websites or forums, or may even attempt to assume the identity of their victim for the purpose of publishing material in their name that defames them or exposes them to ridicule.
  •  
    As more and more people have access to computers and mobile phones, a new risk to youngsters has begun to emerge. Electronic aggression, in the form of threatening text messages and the spread of online rumours on social networking sites, is a growing concern.
Anne Bubnic

New York Teen "MindSpace" - 0 views

  •  
    New York City's Department of Health launched its Mindspace program last week, an attempt to reach at-risk teens by creating MySpace pages for kids battling common mental health issues.
    Though many teens experience mental health issues, they are often reluctant to acknowledge them and seek help. When asked who they are most likely to talk with when they feel sad, more than 20% of teens NYC Teen said they talk to no one, one-third said they would talk to a friend only (31%), and just one-third said they would talk to an adult (32%). The Mindspace page responds to these issues with interactive features that raise awareness and combat stigma by helping teens identify with peers and prompting them to seek help.
Vicki Davis

Children Online: Getting Younger and Continuing to Take Risks - 0 views

  • 16% posted personal interests 15% posted information about their physical activities 20% gave out their real name 5% posted information about their school 6% posted their home address 6% posted their phone number 9% posted a photograph of themselves
    • Vicki Davis
       
      Again, education is so important of both students and parents.
  •  
    A 2007-2008 research study conducted by Rochester Institute of Technology (RIT) reported several key findings that indicate children are logging on to the Internet at a very young age. Parental supervision of this computer activity, however, is generally lax. Not surprisingly, the study found that children are communicating with friends, peers, and others online in ways that show a lack of knowledge in what is ethical, safe behavior.
Anne Bubnic

ISTE Books | Raising a Digital Child - 0 views

  •  
    New book by Mike Ribble (Author of Digital Citizenship in the Schools). You want your children to enjoy all the benefits a technological society has to offer, but at the same time, you want them to stay safe and act as responsible members of society. Raising a Digital Child is your guide. Inside, you will learn about many of the newest and most popular technologies, in parent-friendly language, along with discussions of the risks each might harbor and the types of behaviors that every child should learn in order to become a good citizen in this new digital world.
1 - 20 of 42 Next › Last »
Showing 20 items per page