Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged digital privacy ad4dcss digital responsibilities

Rss Feed Group items tagged

Anne Bubnic

Teens Take Advantage of Online Privacy Tools : NPR - 0 views

  •  
    Many younger people have very nuanced ideas about Internet privacy. They post deeply personal information on social networking sites, but understand and use various privacy locks so only certain people can see their profiles. Good discussion points in here for a digital citizenship class.
Anne Bubnic

Teens' Online 'Friends' Often Number in Hundreds : NPR - 0 views

  •  
    A majority of teenagers who go online maintain one or more profiles at social networking Web sites. Most teens restrict access to to their profiles, but "friends" who access the profiles routinely number in the hundreds. Mary Madden, a senior researcher with the Pew Internet and American Life Project, tells Robert Siegel that society will likely become more accepting of the "digital footprints" young people leave online. Good discussion points in here for a digital citizenship class.
Anne Bubnic

Privacy Awareness Week - 0 views

  •  
    Privacy Awareness Week is an annual promotion by the Asia Pacific Privacy Authorities (APPA) group. This year, Privacy Awareness Week will be held in May for the first time. The Week will see a variety of programs and initiatives hosted by public and private sector organizations from across the Asia-Pacific region to promote awareness of privacy rights and responsibilities.
Jason Epstein

Digital Tattoo - 4 views

  •  
    Tutorial. Just like a tattoo, your digital reputation is an expression of yourself. It's highly visible, and hard to remove. Explore how your online identity affects you, your friends, your school and your job - for better and for worse - and how to make informed choices.
  •  
    This is AWESOME! Thank you!
  •  
    "In short, it is your digital identity. Just like a tattoo, your digital reputation is an expression of yourself. it is formed and added to by you and others over time."
Vicki Davis

Michel Foucault, Privacy, and Doubts about Web 2.0 - 0 views

  •  
    Excellent post about how many are relinquishing their privacy. Very insightful post.
  •  
    Fascinating ponderings by Mike Curtain about how many of us are relinquishing our own privacy. This is a very thought provoking post and yet another one I wouldn't have read, had he not linked to my blog post yesterday asking for bloggers to share their links. This is a very powerful blog post. Wow! I personally think there is a balance here, but also agree than many are not considering the privacy they are relinquishing when they post things that don't belong out there for everyone to see. Internet privacy is an illusion, it really is.
Anne Bubnic

Taking risky opportunities in youthful content creation. - 0 views

  •  
    Taking risky opportunities in youthful content creation: teenagers' use of social networking sites for intimacy, privacy and self-expression.
    The explosion in social networking sites such as MySpace, Facebook, Bebo and Friendster is widely regarded as an exciting opportunity, especially for youth.Yet the public response tends to be one of puzzled dismay regarding a generation that, supposedly, has many friends but little sense of privacy and a narcissistic fascination with self-display. This article explores teenagers' practices of social networking in order to uncover the subtle connections between online opportunity and risk. Reprints of the complete article are available for a fee from Sage Publishing.
Anne Bubnic

Nude photo-sharing: Q from a family that's been there - 0 views

  •  
    More cases of students charged with felonies for nude photo-sharing via cell phone, a disturbing new cyberbullying trend.
Vicki Davis

Search and Seizure of Cell Phones: Can You Hear Me Now? - 0 views

  • May school officials lawfully “search” the confiscated cell phone to look at stored text messages, photographs, videos, and logs of incoming and outgoing calls? Clearly, the circumstances of the search must satisfy the T.L.O. standard. Not as clear, however, is whether such a search violates federal or Michigan laws regarding stored electronic communications.
  • [A] search of a student by a teacher or other school officials will be ‘justified at its inception’ when there are reasonable grounds for suspecting that the search will turn up evidence that the student has violated or is violating either the law or the rules of the school. Such a search will be permissible in its scope when the measures adopted are reasonably related to the objectives of the search and not excessively intrusive in light of the age and sex of the student and the nature of the infraction.”
  • In Klump v Nazareth Area Sch Dist, 425 F Supp 2d 622 (ED Pa, 2006), a federal district court denied the school’s motion to dismiss a lawsuit filed by a student whose cell phone was searched.
  • ...5 more annotations...
  • compensatory and punitive damages for the alleged unconstitutional search, violation of the Pennsylvania Wiretapping and Electronic Surveillance Control Act, invasion of privacy, and defamation.
  • The court ruled that the student had stated a claim for the alleged violation of his right to be free from an unreasonable search.
  • here was no basis for them to search the text and voice mail messages stored on the phone.
  • unlawful access to the stored voice mail and text message communications.
  • (2) A person shall not willfully and maliciously read or copy any message from any telegraph, telephone line, wire, cable, computer network, computer program, or computer system, or telephone or other electronic medium of communication that the person accessed without authorization. (3) A person shall not willfully and maliciously make unauthorized use of any electronic medium of communication, including the internet or a computer, computer program, computer system, or computer network, or telephone.
  •  
    Legal Implications for Searching Student Cell Phones. Although this article is written against Michigan law, it does help clarify some of the concepts for what is permissable. Note that searching a student's cell phone or wireless device without parent permission may violate state wiretapping laws.
  •  
    Confiscating and looking at information on cell phones by school officials is still not clear. This is a very interesting case study for those working with digital citizenship issues at their school.
  •  
    Fascinating article explaining Michigan take on searching and confiscating cell phones.
Anne Bubnic

An Educator's Guide To Responsible Technology Use [pdf] - 3 views

  •  
    26 page guide for Educators on Safety, Security and Ethics produced for K-12 students and teachers by the IIIA/James Madison University in cooperation with the Office of Ed Tech for the State of Virginia. Covers digital communication topics like ethics, digital footprint, flaming, spyware, viruses, hoaxes, spoofing & phishing, spam, identity theft, privacy, cyberpredators, social networking, gaming, and bullying via cell phone.
Anne Bubnic

Piracy, Pornography, Plagiarism, Propaganda, Privacy - 0 views

  •  
    Merle Marsh wrote this highly informative article on Teaching Children to Be Responsible Users of Technology, which includes real-life incidents involving legal and ethical abuses of technologies. She also provides recommended educator activities and teaching suggestions.
Anne Bubnic

When Young Teachers Go Wild on the Web - 0 views

  •  
    Public Profiles Raise Questions of Propriety and Privacy. Article cites many of examples of inappropriate commentary from teachers on Facebook accounts that were not so private.
Marie Coppolaro

Pew Internet: Teens, Privacy and SNS - 0 views

  •  
    How teens manage their online identities and personal information in the age of MySpace
  •  
    Released in April 2007, this research analyzes results from a survey of 935 teens (age 12-17) and findings from focus groups conducted by the Pew Internet & American Life Project. It explores questions of teen online privacy protection from several perspectives: by looking at the choices that teens make to share or not to share information online, by examining what they share, by probing for the context in which they share it and by asking teens for their own assessment of their vulnerability.
  •  
    How teens manage their identity online (63% believe that someone could identify them from the info provided even if they don't put personal details like address and phone).
Anne Bubnic

Hectors World [Interactive Games] - 0 views

  •  
    Flash animation games in a aquarium theme from NetSafe.org [New Zealand] that teach kids [Age 5-11] about online privacy and cybersafety. Includes downloadable lesson plans for teachers
Anne Bubnic

Download a free cybersafety poster for your classroom! - 0 views

  •  
    CTAP Region IV has distributed 10,000 wall-size posters to San Francisco Bay Area Schools through a grant provided by AT&T Education. The posters are also available as a free download for schools nationwide.
Anne Bubnic

Will Your Digital Footprint Cost You a Job and College Admission? - 1 views

  •  
    Better Think Again Before You Post Those Spring Break or Mardi Grad Party Pics! Are you having fun posting party pictures, Spring Break vacation photos and personal information about boyfriends and girlfriends on MySpace, Facebook, Twitter and other favorite social networking sites? If so, you probably have a big digital footprint that might keep you from getting a job or getting into college
Anne Bubnic

Flash Animations and Video Cybersafety Lessons - 0 views

  •  
    Flash cartoons based on Charlie's Angels that teach kids about how to stay safe on the internet [from the folks at Wired Safety]. Topics include: Cyberbullying, Predators and Strangers, Personal Information, Piracy, Cyber Citizenship, and Protecting your computer.
Anne Bubnic

Don't Hit That 'Delete' Button!: Email Archiving - 0 views

  • The FRCP now treats electronic documents no differently from paper-based documents," explains John LoPorto, executive vice president of sales and marketing for electronic archiving and security provider Privacy Networks. So should corporations, organizations, or schools ever have to participate in a court case involving federal violations such as copyright infringement, sexual harassment, unsafe work environments, or fraud, their e-mails will be considered as possible evidence. "Hence the need to save e-mail," says LoPorto.
  •  
    In response to new federal rules mandating organizations retain their electronic documents, districts are using outside providers to archive their in-house e-mails.
Anne Bubnic

Web of Deception [Comic Book] - 0 views

  •  
    KINSA has partnered with Nelvana to create a 16-page cyber-safety comic featuring characters from YTV's hit show, Grossology. The original comic takes kids on an adventure into the underworld of crime (and slime!) while reinforcing KINSA's Surf Smart™ principles. The comic will be distributed in POP! Magazine in spring 2008 to over 300,000 students in Canada, and is also available for download here.
Anne Bubnic

Risks, Rights, and Responsibilities in the Digital Age - 0 views

  • This week, Sonia Livingstone's latest book, Children and the Internet: Great Expectations and Challenging Realities, is being released by Polity. As with the earlier study, it combines quantitative and qualitative perspectives to give us a compelling picture of how the internet is impacting childhood and family life in the United Kingdom
  •  
    An Interview with Sonia Livingstone (Part One). According to the study, UK Children Go Online, children were neither as powerful nor as powerless as the two competing myths might suggest. As the Myth of the Digital Generation suggests, children and youth were using the Internet effectively as a resource for doing homework, connecting with friends, and seeking out news and entertainment. At the same time, as the Myth of the Columbine Generation might imply, the adults in these kids' lives tended to underestimate the problems their children encountered online, including the percentage who had unwanted access to pornography, had received harassing messages, or had given out personal information....
Anne Bubnic

Smokescreen game guides teenagers through dangers of social networking - 1 views

  •  
    A free-to-play "alternate reality game" from the UK commissioned by Channel 4 Education that is intended to give teenage players a personal encounter with everything from identity theft to cyber stalking. Kids (age 14-16) explore websites, search for clues, receive phone calls, chat on IM, and tackle puzzles and mini-games. Through thirteen challenges, (each lasting 10-20 minutes) and a dramatic storyline, they find out who they can trust and who they can't.
1 - 20 of 27 Next ›
Showing 20 items per page