Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged case studies

Rss Feed Group items tagged

Anne Bubnic

NECC 2008 Technology Policy Workshop - 0 views

  •  
    These notes were taken on the Technology Policy workshop given by Dr. Larry Anderson at NECC and cite the top issues for which a policy must be developed. Other handouts are available at the NECC site , including a case study. [Scroll down to the bottom of the page].
Vicki Davis

Twitter gets you fired in 140 characters or less - 0 views

  • Clay Shirky speaks of a day in the not-too-distant future when human resources departments will have the wisdom to look beyond social networking faux pas — at least in some small part because by then, everyone will have made at least one.
  • Rep. Pete Hoekstra, R-Mich., tweeted this as-it-happens update regarding his group’s location and destination:"Moved into green zone by helicopter Iraqi flag now over palace. Headed to new US embassy Appears calmer less chaotic than previous here."
  • This social networking comedy of errors spread like dancing hamsters across Twitter. In the retelling, "theconnor" earned the nick, "Cisco Fatty." Before the work day ended, Web sleuths revealed "theconnor's" true identity. "Theconnor" was lampooned in a popular YouTube meme. And thanks to Google Cache, the deleted content of "theconnor’s" homepage resurfaced on CiscoFatty.com, a Web site erected to commemorate this cautionary tale.
  •  
    Students need to understand that NOTHING, I repeat NOTHING Is private. Great case study about how 140 characters got someone fired before they were even hired.
Anne Bubnic

Cyberbullying the teacher - 0 views

  •  
    The increasing trend of cyber-bullying has transcended the playground, according to a study cited by the Christian Science Monitor, as over a quarter of teachers and principals are the subject of mocking blog posts or doctored images. This new brand of bullying tends to be more malicious than normal schoolhouse pranks, and can undercut a teacher's ability to perform in the classroom. Opinions differ, however, on what solutions to pursue. Some school districts have come down hard, using provisions like North Carolina's cyberstalking law to charge students criminally for electronically communicated threats, racial slurs, and, in one case, spurious accusations of pedophilia.
Vicki Davis

Search and Seizure of Cell Phones: Can You Hear Me Now? - 0 views

  • May school officials lawfully “search” the confiscated cell phone to look at stored text messages, photographs, videos, and logs of incoming and outgoing calls? Clearly, the circumstances of the search must satisfy the T.L.O. standard. Not as clear, however, is whether such a search violates federal or Michigan laws regarding stored electronic communications.
  • [A] search of a student by a teacher or other school officials will be ‘justified at its inception’ when there are reasonable grounds for suspecting that the search will turn up evidence that the student has violated or is violating either the law or the rules of the school. Such a search will be permissible in its scope when the measures adopted are reasonably related to the objectives of the search and not excessively intrusive in light of the age and sex of the student and the nature of the infraction.”
  • In Klump v Nazareth Area Sch Dist, 425 F Supp 2d 622 (ED Pa, 2006), a federal district court denied the school’s motion to dismiss a lawsuit filed by a student whose cell phone was searched.
  • ...5 more annotations...
  • compensatory and punitive damages for the alleged unconstitutional search, violation of the Pennsylvania Wiretapping and Electronic Surveillance Control Act, invasion of privacy, and defamation.
  • The court ruled that the student had stated a claim for the alleged violation of his right to be free from an unreasonable search.
  • here was no basis for them to search the text and voice mail messages stored on the phone.
  • unlawful access to the stored voice mail and text message communications.
  • (2) A person shall not willfully and maliciously read or copy any message from any telegraph, telephone line, wire, cable, computer network, computer program, or computer system, or telephone or other electronic medium of communication that the person accessed without authorization. (3) A person shall not willfully and maliciously make unauthorized use of any electronic medium of communication, including the internet or a computer, computer program, computer system, or computer network, or telephone.
  •  
    Legal Implications for Searching Student Cell Phones. Although this article is written against Michigan law, it does help clarify some of the concepts for what is permissable. Note that searching a student's cell phone or wireless device without parent permission may violate state wiretapping laws.
  •  
    Confiscating and looking at information on cell phones by school officials is still not clear. This is a very interesting case study for those working with digital citizenship issues at their school.
  •  
    Fascinating article explaining Michigan take on searching and confiscating cell phones.
Anne Bubnic

Lesson Plan: Cyberbullying and the Law (Grades 7 - 8) - 0 views

  •  
    In this lesson, students learn about and discuss the legal aspects of cyberbullying. They review a variety of hypothetical scenarios and a case study, and they consider the seriousness of the situations, who is legally responsible, what action (if any) should be taken and by whom. Lesson plan materials for GR 9-12 are also available on the same topic.
Anne Bubnic

Can your daughters picture at a car wash be used for an ad campaign? - 3 views

  •  
    Case Study for discussion of copyright, creative commons and ethics.
Anne Bubnic

Students: Social Networking: Don't Give Yourself Away - 3 views

  •  
    One of eight interactive case studies for kids (GR 4-8) from Cable In the Classroom: Power to Learn.
    It's very popular for young people to meet and connect online at sites like MySpace.com. However, an awareness of the risks and steps for being safe can ensure a positive experience with social networking. Don't give yourself away! This unit explores the concepts of identity, at-risk behaviors and safety online. The graphics are Nickelodeon style. A short quiz assesses learning. For the entire series, check out: http://powertolearn.com/internet_smarts/interactive_case_studies/index.shtml
Anne Bubnic

Students: Cyberbullying: Not Just Name-Calling - 1 views

  •  
    One of eight interactive case studies for kids (GR 4-8) from Cable In the Classroom: Power to Learn.
    Harassment and humiliation take on new forms in Cyberspace. Learn about the consequences, actions and reactions of using cell phones, the Internet and other digital devices to bully one's peers. This unit explores cyberbullying and the offline consequences for online actions. The graphics are Nickelodeon style. A short quiz assesses understanding. For the entire series, check out: http://powertolearn.com/internet_smarts/interactive_case_studies/index.shtml
Anne Bubnic

Students: Misinformation - Truth or Spoof? - 0 views

  •  
    One of eight interactive case studies for kids (GR 4-8) from Cable In the Classroom: Power to Learn.
    With no central authority or librarian to help students separate valid information from junk online, assessing the credibility of a site is an important part doing internet research. This unit explores evaluation of web sites and other online resources for authenticity. The graphics are Nickelodeon style. There is a quiz on spoof sites. For the entire series, check out: http://powertolearn.com/internet_smarts/interactive_case_studies/index.shtml
Anne Bubnic

Students: Keeping Personal Info Private - 1 views

  •  
    One of eight interactive case studies for kids (GR 4-8) from Cable In the Classroom: Power to Learn.
    Establishing basic guidelines for Internet use is the first step in ensuring students' online safety. Learn what information should and shouldn't be shared online and appropriate interaction with online "friends." This unit explores the concepts of privacy in social networking destinations, the importance of being honest but not revealing too much information. The graphics are Nickelodeon style. A template allows students to create class rules. For the entire series, check out: http://powertolearn.com/internet_smarts/interactive_case_studies/index.shtml
Anne Bubnic

Media Literacy, Copyright, and Fair Use [Video Case Study] - 0 views

  •  
    This case study features a project of ninth grade biology students at Upper Merion Area High School in King of Prussia, Pennsylvania. The students created a "Virtual Zoo" using images they found online through the photo sharing site Flickr.com.\n
Anne Bubnic

Media Education for the 21st Century [PDF] - 0 views

  •  
    According to a recent study from the Pew Internet & American Life project (Lenhardt & Madden,2005),more than one-half of all teens have created media content,and roughly one-third of teens who use the Internet have shared content they produced.In many cases,these teens are actively involved in what we are calling participatory cultures.A participatory culture is a culture with relatively low barriers to artistic expression and civic engagement, strong support for creating and sharing one's creations,and some type of informal mentorship whereby what is known by the most experienced is passed along to novices.
lipikamohanty

TECH TRICKS HEALTH CARE - 0 views

  •  
    Many Agencies are involved in healthcare services in Odisha, one of the best healthcare agencies in Bhubaneswar is Tech Tricks Health Care. They provide Registered and skilled nurses at home for patients' safety propose. Their Nursing Services Like: * Medical Help And counseling * Study the Case history of the Patient * Home attendant services Full-time, Part-time * Nutritional Therapy * Physiotherapy * Oral Therapy * Counselling and supporting mentally disabled patients. * Wound care * Medical Instrument Operate * Instructions for home Safety for the patient's safety at home. Contact For More Information And health care home Nursing care services in your Locality. http://www.techtrickshealthcare.com/nursingservice.php
Anne Bubnic

Flickr Perversion - 1 views

  • These photos of these girls were without a doubt being sexualized, and my four-year-old daughter was amongst these images.
  •  
    This is why I don't share the photos of my children online in public places. After one pic of a child at school was favorited in this way, I took the pic down and am ridiculously vigilant about checking to see how many photos have been favorited and which ones to see if there is one that some sicko has looked at. This is an article I'm going to share with my digiteen dream team! It is an important one to share!
  •  
    In January 2009, Alex Couros received an email notice saying that a few of his Flickr photos had been favorited. These particular photos were of his children, mostly of his daughter. Every time this happens, he goes to see who the Flickr user is, and most of the time, it is a family member, a close friend, or someone he know through Twitter (or other social network). He did not recognize the user in this particular case, and when he went to see their photos, the Flickr message alerted him that none of the user's photos were available. Seeing as his photos had been favorited, he went to see what other photos had been marked as favorites by this user.
Anne Bubnic

How can cyberbullies be stopped? - 0 views

  • Studies show cyberbullying affects millions of adolescents and young adults. The Centers for Disease Control and Prevention last year labeled "electronic aggression" -- its term for cyberbullying -- an emerging public-health problem.
  • "It's not really the schoolyard thug character" in some cases, said Nancy Willard, executive director of the Center for Safe and Responsible Internet Use, a research and professional development organization in Eugene, Ore. "It's the in-crowd kids bullying those who don't rank high enough."What fuels cyberbullying is "status in schools -- popularity, hierarchies, who's cool, who's not," said Danah Boyd, a fellow at the Berkman Center for Internet and Society at Harvard Law School who studies teens' behavior on MySpace, Facebook and other social-networking sites.
  • Cyberbullying has impelled lawmakers, especially at the state level, to either pass anti-bullying laws that encompass cyberbullying or add cyberbullying to existing statutes. Some laws are propelled by a mix of concern about electronic bullying and online sexual predators.
  •  
    Social networking Web sites and other technologies enable schoolyard bullies to pack a bigger punch. Advice and concerns from Nancy Willard and other experts in the field.
Vicki Davis

The Associated Press: Video of Teen Beating Raises Questions - 0 views

  • But that doesn't mean YouTube or any other media company should get the blame, legally or ethically, for the attack, media experts said Friday.
  • The teenagers have been arrested on charges that they beat the teen so they could make a video of the attack to post online. One of the girls struck the 16-year-old victim on the head several times and then slammed her head into a wall, knocking her unconscious, according to an arrest report.
  • From a legal standpoint, YouTube and other online service providers are largely exempt from liability because of a 1996 anti-pornography law. One provision says Internet service providers are not considered publishers simply because they retransmit information provided by their users or other sources.
  • ...1 more annotation...
  • "There is no legal reason this video cannot be shown. It is obviously distasteful, abhorrent what the teenagers did to the victim, but it doesn't really make sense (to ask), 'Should YouTube have taken it down?'" Morris said.
  •  
    It is very important to review this case and learn what can happen to prevet this sort of behavior.
  •  
    This horrific attack that was videoed and posted on youtube for attention brings many questions and the public spotlight again goes onto the digital world we are creating. It is making its own "rules" which really aren't any. It is time for educators to speak out or be spoken to about what to or not to do.
Vicki Davis

wikisinEFL » Wikis in EFL - 0 views

  •  
    A website with examples of best practices of wikis used in EFL (english as a foreign language) classes. Excellent. \n\nKudos to this!
  •  
    A website with examples of best practices of wikis used in EFL (english as a foreign language) classes. Excellent.
Stephanie Sandifer

Access Denied: The Practice and Policy of Global Internet Filtering - 0 views

  • ccess Denied examines the political, legal, social, and cultural contexts of Internet filtering in these states from a variety of perspectives. Chapters discuss the mechanisms and politics of Internet filtering, the strengths and limitations of the technology that powers it, the relevance of international law, ethical considerations for corporations that supply states with the tools for blocking and filtering, and the implications of Internet filtering for activist communities that increasingly rely on Internet technologies for communicating their missions.
  •  
    New book on the state of internet filtering worldwide
‹ Previous 21 - 40 of 54 Next ›
Showing 20 items per page