Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged at risk

Rss Feed Group items tagged

Grace Kat

What really puts kids at risk online? - 0 views

  •  
    Research suggests that it'snot giving out personal information that puts kid at risk. It's not having a blog or a personal website that does that either. What puts kids in danger is being willing to talk about sex online with\nstrangers or having a pattern of multiple risky activities on the web\nlike going to sex sites and chat rooms, meeting lots of people there,\nkind of behaving in what we call like an internet daredevil."
Anne Bubnic

Students: Social Networking: Don't Give Yourself Away - 3 views

  •  
    One of eight interactive case studies for kids (GR 4-8) from Cable In the Classroom: Power to Learn.
    It's very popular for young people to meet and connect online at sites like MySpace.com. However, an awareness of the risks and steps for being safe can ensure a positive experience with social networking. Don't give yourself away! This unit explores the concepts of identity, at-risk behaviors and safety online. The graphics are Nickelodeon style. A short quiz assesses learning. For the entire series, check out: http://powertolearn.com/internet_smarts/interactive_case_studies/index.shtml
Anne Bubnic

Internet safety messages - one size does not fit all - 0 views

  •  
    One problem with most of today's Internet safety messaging campaigns is that there is only one set of messages for the entire population of youth and parents. But, an extensive literature review conducted by the Internet Safety Technical Task Force Research Advisory Board found that "not all youth are equally at risk" and that "those experiencing difficulties offline, such as physical and sexual abuse, and those with other psychosocial problems are most at risk online."
Anne Bubnic

Pupils 'must manage online risks' - 2 views

  • The five schools judged outstanding for online safety all used managed systems to help pupils become responsible users of technology.
  •  
    Pupils given a greater degree of freedom to surf the internet at school are less vulnerable to online dangers in the long-term, inspectors say. "Managed" online systems were more successful than "locked" ones at safeguarding pupils' safety, they said. The inspectors' research was commissioned in response to a report by Dr Tanya Btron, which assessed the risks children faced when using the internet and video games.
Anne Bubnic

Study: Abuse, provocative images increase Internet risks for girls - 0 views

  •  
    A history of childhood abuse and use of a provocative online identity increase the risk that girls will be victimized by someone they meet on the Internet, according to a study appearing in the June issue of Pediatrics.
Anne Bubnic

Magid: Treating kids on the Web in a new way - 6 views

  •  
    Larry Magid discusses the shift in thinking -- from a focus of constraint and protection against predators to one of developing a culture of responsibility and digital citizenship. For those "at risk" students, school psychologist, Patti Afgatson, suggests that we consider using health prevention models for Internet safety education - basic safety advice for most youth and intense counseling from mental health professionals for the small minority of young people who are taking extraordinary risks both on and offline.
Anne Bubnic

New federal panel looks at Internet safety - 0 views

  • I’m not aware of any federal Internet safety commissions that met during the Bush administration. From what I can tell, that administration paid very little attention to Internet safety other than to add to the exaggerations and fear-mongering about so-called Internet predators. So is there any point in taking yet another look at Internet safety? Yes, if only because things have changed dramatically over the past few months. To begin with, we have a new administration led by a president who actually understands the Internet as well as the constitutional issues that arise whenever government tries to control online speech, access or even safety.
  • When the new working group convened Thursday, our first speaker was Susan Crawford, who works at the White House as special assistant to the president for science, technology and innovation policy. A law professor and founder of OneWebDay, Crawford brings a refreshing understanding of the government’s need to balance safety and security with civil liberties, privacy and even the First Amendment rights of minors. Her opening remarks helped set the tone for the group by admonishing us to “avoid overheated rhetoric about risks to kids online,” pointing out that “risks kids face online may not be significantly different than the risks they face offline.”
  •  
    Last year, Congress passed the Protecting Children in the 21st Century Act,which called for yet another committee to study Internet safety. By statute, the Online Safety and Technology Working Group is made up of representatives of the business community, public interest groups and federal agencies.
Anne Bubnic

Cyberbullying, Cyberthreats, and Dangerous Online Communities [PDF] - 0 views

  •  
    Presentation by Nancy Willard outlining the dangers of association with online communities by at-risk youth. This includes self-harm communities, hate groups and gangs and suicide communities.
buyglobalshop

Buy Verified LiLi Accounts - Buy Global Shop - 0 views

  •  
    Have you listened almost LiLi accounts and pondered what they are all almost? Well, you're not alone! LiLi accounts, brief for Constrained Risk Venture accounts, are a sort of speculation item that offers a special combination of development potential and resource security for financial specialists. These accounts give a layer of assurance for financial specialists by constraining their risk in the case of monetary misfortunes, making them a well known choice among those looking to oversee chance whereas still looking for openings for development in their venture portfolios. Buy Verified LiLi Accounts What precisely is a LiLi account? Have you ever listened of a LiLi account and pondered what precisely it is? In today's advanced keeping money world, there are bounty of modern account choices accessible, and LiLi is one of them. A LiLi account, brief for "life-living," is a sort of money related item outlined to offer assistance people consistently oversee their cash and accomplish their individual money related objectives. But what sets a LiLi account separated from conventional checking or investment funds accounts? Let's take a closer see at what makes a LiLi account one of a kind and how it might advantage your monetary wellness. Buy Verified LiLi Accounts Unlike conventional accounts, a LiLi account ordinarily offers a combination of managing an account administrations and money related apparatuses all in one put. With a LiLi account, you can effectively track your investing, set reserve funds objectives, and indeed gain rewards for assembly certain money related turning points. Furthermore, a few LiLi accounts may offer competitive intrigued rates, permitting your cash to develop over time. Whether you're looking to spare for a enormous buy or fair need to way better oversee your day-to-day accounts, a LiLi account may be a profitable device in making a difference you reach your money related objectives. Remain tuned to learn more approximately th
Anne Bubnic

Get Safe Online :: Students at greatest risk from online fraud - 0 views

  • “Our study set out to establish whether online security factors vary according to age, gender, geography and occupation. Online criminals operate on a mass scale so are indiscriminate about who they target. Whether they are successful or not depends largely on two factors: firstly, how good we are at securing our computers; and secondly, how much we avoid risky activities and behaviours while we’re using the internet.
  •  
    Internet users in full-time education (2) are almost twice as confident online as other internet users - more than half (51%) consider themselves 'very' internet literate, compared to the national average of 26%. Despite this, they are the most dismissive of the risk of online crime and of the importance of basic security tools (such as anti-virus software) in protecting them against it.
buyglobalshop

Buy Verified Bitmark Accounts - Get 100% Full Verified Best and cheap ... - 0 views

  •  
    Have you ever wondered what Bitmark Accounts are and how they can benefit you? Bitmark Accounts are a key feature of the Bitmark blockchain platform, allowing users to securely store and manage their digital assets. Whether you're new to the world of blockchain technology or a seasoned pro, understanding Bitmark Accounts is crucial for maximizing the potential of your digital assets. Are Bitmark Accounts safe? In today's digital age, concerns about online security and privacy are at an all-time high. With the rise of cryptocurrency and blockchain technology, more people are exploring the world of digital assets and looking for ways to keep their investments safe. One of the platforms gaining attention in this space is Bitmark, a cryptocurrency exchange that offers users the ability to create accounts to store and manage their assets. Buy Verified Bitmark Accounts However, as with any online platform, there are questions and uncertainties about the safety and security of Bitmark accounts. In this article, we will take a closer look at the measures in place to protect users' funds and personal information on Bitmark, as well as explore some best practices for keeping your account secure. By understanding the risks and benefits of using Bitmark, users can make informed decisions about how to protect their digital assets in this evolving landscape of cryptocurrency. Can I use my Bitmark Account to trade cryptocurrencies? Many people wonder if they can use their Bitmark Account to trade cryptocurrencies. The answer to this question is yes, you can use your Bitmark Account to trade cryptocurrencies. Buy Verified Bitmark Accounts Trading cryptocurrencies on Bitmark can be a great way to grow your investment portfolio. You will have access to a wide range of cryptocurrencies, giving you plenty of options to choose from. Bitmark also offers a user-friendly platform that makes it easy for even beginners to navigate and trade cryptocurrencies. How can I deposit fund
Anne Bubnic

Footprints in the Digital Age - 0 views

  • In the Web 2.0 world, self-directed learners must be adept at building and sustaining networks.
  • As the geeky father of a 9-year-old son and an 11-year-old daughter, one of my worst fears as they grow older is that they won't be Googled well. Not that they won't be able to use Google well, mind you, but that when a certain someone (read: admissions officer, employer, potential mate) enters "Tess Richardson" into the search line of the browser, what comes up will be less than impressive. That a quick surf through the top five hits will fail to astound with examples of her creativity, collaborative skills, and change-the-world work. Or, even worse, that no links about her will come up at all. I mean, what might "Your search did not match any documents" imply?
  • digital footprints—the online portfolios of who we are, what we do, and by association, what we know—are becoming increasingly woven into the fabric of almost every aspect of our lives.
  • ...6 more annotations...
  • So what literacies must we educators master before we can help students make the most of these powerful potentials? It starts, as author Clay Shirky (2008) suggests, with an understanding of how transparency fosters connections and with a willingness to share our work and, to some extent, our personal lives
  • Publishing content online not only begins the process of becoming "Googleable," it also makes us findable by others who share our passions or interests.
  • Although many students are used to sharing content online, they need to learn how to share within the context of network building. They need to know that publishing has a nobler goal than just readership—and that's engagement.
  • As Stanford researcher Danah Boyd (2007) points out, we are discovering the potentials and pitfalls of this new public space. What we say today in our blogs and videos will persist long into the future and not simply end up in the paper recycling bin when we clean out our desks at the end of the year.
  • Although Laura is able to connect, does she understand, as researcher Stephen Downes (2005) suggests, that her network must be diverse, that she must actively seek dissenting voices who might push her thinking in ways that the "echo chamber" of kindred thinkers might not? Is she doing the work of finding new voices to include in the conversation?
  • Here are five ideas that will help you begin building your own personal learning network. Read blogs related to your passion. Search out topics of interest at http://blogsearch.google.com and see who shares those interests. Participate. If you find bloggers out there who are writing interesting and relevant posts, share your reflections and experiences by commenting on their posts. Use your real name. It's a requisite step to be Googled well. Be prudent, of course, about divulging any personal information that puts you at risk, and guide students in how they can do the same. Start a Facebook page. Educators need to understand the potential of social networking for themselves. Explore Twitter (http://twitter.com), a free social networking and micro-blogging service that enables users to exchange short updates of 140 characters or fewer. It may not look like much at first glance, but with Twitter, the network can be at your fingertips.
  •  
    Giving Students Ownership of Learning: Footprints in the Digital Age. In the Web 2.0 world, self-directed learners must be adept at building and sustaining networks.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Anne Bubnic

Cyber Bullying - School Policies? - 0 views

  • A punch in the eye seems so passé. Bullies these days are traveling in packs and using cyberspace to their humiliating messages online. Like the toughies of old, they are both boys and girls and they demand nothing less than total submission as the price of peace. It’s a jungle out there. For school districts, patrolling the hallways and adjacent grounds is just a start. In the 21st century, a new kind of vigilance is necessary—an expanded jurisdiction that serves to both stave off legal actions and ensure a safe and productive learning environment.
  • Today’s principals rely on district policy and practice to extend the presumed long arm of the law to off-campus incidents. Potentially, that could mean plunging headlong into the electronic frontier to rescue student victims and thwart cyberbullying classmates who thrive as faceless computer culprits.
  • A December 2009 study by Harvard University’s Berkman Center for Internet & Society found that students on the receiving end report greater emotional distress, are more likely to abuse substances, and are more frequently depressed.
  • ...8 more annotations...
  • The report concluded a child is more likely to face cyberbullying by fellow students than being stalked by an online predator. “Bullying and harassment are the most frequent threats minors face, both online and offline,” notes the Harvard report, Enhancing Child Safety & Online Technologies: Final Report of the Internet Safety Task Force to the Multistate Working Group on Social Networking of State Attorneys General of the United States.
  • Bullying can take a variety of forms. Incidents have included stealing passwords, impersonating the victim online, fake MySpace or Facebook pages, embarrassing photos or information being revealed, threats, rumors, and more. And, bullying tends to magnify the longer it exists.
  • Students sometimes will cyberbully teachers or other school employees
  • In January, a federal court in Connecticut ruled that Regional District 10 was within its rights to discipline a student over an off-campus blog. Judge Mark Kravitz rejected Avery Doninger’s claim that the school violated her free speech rights when they refused to let her serve as class secretary or to speak at graduation because of words she wrote at home
  • According to the Hartford Courant, the school district won “because the discipline involved participation in a voluntary extracurricular activity, because schools could punish vulgar, off-campus speech if it posed a reasonably foreseeable risk of coming onto school property, and because Doninger’s live journal post was vulgar, misleading, and created the risk of substantial disruption at school.”
  • In Florida, a high school senior and honor student was accused of cyberbullying after she wrote on Facebook: ‘’Ms. Sarah Phelps is the worst teacher I’ve ever met! To those select students who have had the displeasure of having Ms. Sarah Phelps, or simply knowing her and her insane antics: Here is the place to express your feelings of hatred.’’ Katherine Evans, who was suspended for “bullying and cyberbullying harassment toward a staff member,” sued the charter school in December 2008. A final ruling is pending.
  • In a 2007 incident, 19 students were suspended at a Catholic high school near Toronto for cyberbullying a principal on Facebook. The students called the principal a “Grinch of School Spirit” and made vulgar and derogatory comments. While the U.S. Constitution does not necessarily apply in private school settings, the incident demonstrates that this kind of behavior can happen anywhere.
  • Districts should have a cyberbullying policy that takes into account the school’s values as well as the school’s ability to legally link off-campus actions with what is happening or could happen at school.
  •  
    Good article from AMERICAN SCHOOL on the policies that schools need to have in place to protect both students and teachers from cyberbullies.
Anne Bubnic

Second Life could sexually exploit children via Internet - 0 views

  •  
    With nearly 13 million online users, the rapidly expanding virtual world Second Life is a risk for children, who could be sexually exploited, U.S. Rep. Mark Kirk (R-Ill.) said Monday."This Second Life is a new scare, unchartered territory," Wilks said at a news conference Monday with Kirk at the Mt. Prospect Police Department. "It hits home." Kirk said he knew of no cases in which children were targeted by sexual predators on Second Life, but he said he considers the virtual world an emerging danger.
Anne Bubnic

2010 Legislation Related to Sexting - 0 views

  •  
    So far this year, at least 15 states have introduced or are considering bills or resolutions aimed at "sexting." The legislation generally aims to educate young people about the risks of sexting, deter them from the practice, and apply appropriate penalties to those who do engage in sexting. While some states are just encouraging programs to educate teens about the dangers of sexting, others are attempting to de-criminalize the act.
Anne Bubnic

Twitter and Plurk: What Parents Should Know - 0 views

  • While there is nothing inherently dangerous in the sites themselves, there is the risk that teens could use microblogs to reveal personal information or engage in a relationship with someone whose intentions are less than honorable. And like any other form of communication, the door is open for a teen to take risks such as talking about sex with strangers (albeit in relatively short bursts) or getting together with someone they meet through a microblog.
  •  
    Services like Twitter and Plurk let people post very short messages (140 characters or less) to their friends and acquaintances. Founded in 2006, Twitter has attracted millions of users who keep people posted about what they're doing and thinking. It can be as simple as "I'm standing in line at the grocery store" to as profound as a quick comment about a political candidate, a world event or a new book. There's even a video spin-off of this concept called 12 Seconds that allows people to post video clips no longer than 12 seconds.
Anne Bubnic

Humiliation and gossip are weapons of the cyberbully - 0 views

  • ead teachers are being advised to draw up new rules on mobile phone use amid a growing number of cases of what is now known as “cyber-bullying”. In many secondary schools, over 90% of bullying cases are through text messages or internet chatrooms. It is hoped that the rules about mobile phone use will protect children from abusive texts, stop phones going off in class and prevent mobiles being taken into exam halls.
  • Although the majority of kids who are harassed online aren’t physically bothered in person, the cyber-bully still takes a heavy emotional toll on his or her victims. Kids who are targeted online are more likely to get a detention or be suspended, skip school and experience emotional distress, the medical journal reports. Teenagers who receive rude or nasty comments via text messages are six times more likely to say they feel unsafe at school.
  • The problem is that bullying is still perceived by many educators and parents as a problem that involves physical contact. Most enforcement efforts focus on bullying in school classrooms, corridors and toilets. But given that 80% of adolescents use mobile phones or computers, “social interactions have increasingly moved from personal contact at school to virtual contact in the chatroom,'’ write Kirk R. Williams and Nancy G. Guerra, co-authors of one of the journal reports. “Internet bullying has emerged as a new and growing form of social cruelty.'’
  • ...1 more annotation...
  • Cyber-bullying tactics include humiliation, destructive messages, gossip, slander and other “virtual taunts” communicated through e-mail, instant messaging, chatrooms and blogs. The problem, of course, is what to do about it. While most schools do not allow pupils to use their mobiles in the school building, an outright ban is deemed unworkable. Advances in technology are throwing up new problems for teachers to deal with. Children use their phones to listen to music, tell the time or as a calculator. Cyber-bullies sometimes disclose victims' personal data on websites or forums, or may even attempt to assume the identity of their victim for the purpose of publishing material in their name that defames them or exposes them to ridicule.
  •  
    As more and more people have access to computers and mobile phones, a new risk to youngsters has begun to emerge. Electronic aggression, in the form of threatening text messages and the spread of online rumours on social networking sites, is a growing concern.
Anne Bubnic

New York Teen "MindSpace" - 0 views

  •  
    New York City's Department of Health launched its Mindspace program last week, an attempt to reach at-risk teens by creating MySpace pages for kids battling common mental health issues.
    Though many teens experience mental health issues, they are often reluctant to acknowledge them and seek help. When asked who they are most likely to talk with when they feel sad, more than 20% of teens NYC Teen said they talk to no one, one-third said they would talk to a friend only (31%), and just one-third said they would talk to an adult (32%). The Mindspace page responds to these issues with interactive features that raise awareness and combat stigma by helping teens identify with peers and prompting them to seek help.
1 - 20 of 46 Next › Last »
Showing 20 items per page