Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged digital wellness

Rss Feed Group items tagged

Anne Bubnic

Leadership, Education & Etiquette - On or Offline [LEO] - 0 views

  • They are now developing a Web site to help educate their peers on the same issues and plan to visit elementary and middle school students this year to pass on Internet safety messages. Students also created individual blogs this week. "We're trying to develop youth to be leaders in the city and the state and the nation and the world. With the Internet, it's not just local," said Akua Goodrich, the program's director who helped found the Power Unit for Motivating Youth, an after-school and mentoring program in the city. "We have to prepare them to be safe and help spread the message."
  • "When you're a kid, you don't want to listen to an adult who doesn't know what you're going through," she said. "You're much more open to listen to your peers talk to you. It's more interesting."
  •  
    The Leadership, Education and Etiquette - On and Offline, or [Leo ] Student Leadership Training Project ended Friday with a debriefing and motivational words by the program's adult leaders. It wrapped up four days of training in which the 26 teens learned about cyber safety and social networking issues as well as peer-to-peer marketing and career preparations.
Anne Bubnic

New York State: Scrambling for solutions to cyberbullying - 0 views

  • Both the state Senate and Assembly have proposed anti-cyberbullying laws. Kathy Wilson of Sen. Carl Marcellino's (R-Syosset) office said that the Senate has proposed two bills in the last two years that add computers to the list of modes of illegal harassment, but the Assembly passed neither.The Assembly's website states that the Assembly has proposed bills "to define and prohibit the bullying, cyberbullying and hazing of students and others on school property" as well as to add a database for reporting such complaints, but has not passed either yet.
  • Both the state Senate and Assembly have proposed anti-cyberbullying laws. Kathy Wilson of Sen. Carl Marcellino's (R-Syosset) office said that the Senate has proposed two bills in the last two years that add computers to the list of modes of illegal harassment, but the Assembly passed neither.
  • The Assembly's website states that the Assembly has proposed bills "to define and prohibit the bullying, cyberbullying and hazing of students and others on school property" as well as to add a database for reporting such complaints, but has not passed either yet.
  • ...1 more annotation...
  • Matuk said that the task of monitoring children's electronic activities has been complicated by such devices as iPhones, from which I.M.s can be sent from anywhere. "This is going to require partnership between the schools and the community," he added.
  •  
    Schoolyard bullies are a long-standing problem but now, in the age of the Internet, they are increasingly using electronic devices to torment their victims. Because cyberbullying has become so prevalent, several states, including New York, have proposed legislation to control cyberbullying.
Anne Bubnic

The Newest Breed of Bully, the Cyberbully - 0 views

  • While some of what is published online may seem libelous (i.e., intended to harm the reputation of another), proving that point can be difficult and expensive. In order to prove libel, you have to prove malicious intent, something that might prove difficult if the offending Web page was put up by an adolescent. And many times, freedom of speech wins out.
  • Unless an actual crime has taken place, law enforcement officials often are unable to arrest anyone, even if they can identify the culprit. According to Lt. John Otero, commanding officer of the computer crime squad for the New York City Police Department, individuals would actually have to post a direct threat in order for the police to act. "For example, if they say, 'tomorrow I am going to hurt, kill, or injure an individual,' that would constitute a crime," he explains. A person posting such a threat could be arrested and charged with aggravated harassment. Although Otero says his department has seen some arrests, anyone under the age of 18 would not be dealt with harshly: "If the kid is too young, he would get a scolding and the incident would be brought to the parents' attention; if they are under 16, they are considered minors."
  • Like cliques, cyberbullying reaches its peak in middle school, when young adolescents are trying to figure out who their friends are and whether they fit in. "Third- and 4th-graders are just having fun with computers," says Loretta Radice, who taught computer skills to middle-schoolers in public and private schools for more than 15 years.
  • ...1 more annotation...
  • While the cyber- bully believes he cannot be caught, Radice notes that everyone leaves footsteps in cyberspace. "Everything is traceable," she says. "Kids often don't realize that."
  •  
    Because cyberbullying is such a new phenomenon, school and law enforcement officials in the United States and other countries are still sorting out the legal technicalities. "Most of what is done online is protected as free speech," says Frannie Wellings, policy fellow at the Electronic Privacy Information Center in Washington, DC.
Anne Bubnic

Cyber Bullying: Responsibilities and Solutions - 0 views

  •  
    Physical and verbal bullying among students are problems well known to teachers and school administrators. This article examines some of the literature on the topic of cyber bullying and provides information on its prevalence, the definition of cyber bullying, communication technologies, legal considerations and suggestions for dealing with the problem.
Anne Bubnic

Young People, Music and the Internet - 0 views

  •  
    Accessing music online and via mobile phones has never been easier, but it does raise legal, security and ethical issues. This new guide for parents and teachers provides essential advice about how young people can get the best out of downloading and sharing music online and via mobile technology in a safe and legal way, as well as providing tips for discussion.
Anne Bubnic

MySpace Turns Social Network Sharing the Right Direction - 0 views

  •  
    Amid all the initiatives in which Internet companies are supposed to make friends with each other-such as Facebook's Platform and Google's rival OpenSocial initiative-the announcement today by MySpace may well be the most useful to ordinary people and thus the most important: Users will be able to share their MySpace profile with other sites. MySpace has a good list of initial sites that will use some version of this feature: Yahoo, eBay, PhotoBucket, and yes Twitter.
Anne Bubnic

Podcasting Music: The legal implications - 0 views

  • Musical works. Performance rights organizations (ASCAP, BMI and SESAC) handle copyright licenses for the performance of musical works, including their performance in a podcast. Separate licenses are necessary from each performance rights organization because each company represents different publishers of composers' musical works. Sound recordings. Copyright licenses for the playing (or "performance") of sound recordings historically have been handled directly with the owners of the works, usually record companies. (Over-the-air broadcasters are not required to obtain copyright licenses for playing sound recordings. They must, however, hold licenses for playing the underlying musical works.)
  • Reproduction. By contrast to webcasting, a podcast may include a reproduction of a sound recording. Podcasting is an interactive activity. It results in the transmission of a sound recording which is fixed and is accessible on demand by the user. The reproduction requires clearances or licenses - for the sound recording, and for the musical work. Although the performance rights societies offer licenses to cover the musical works in a podcast, no uniform or industry-wide licensing scheme has developed yet to cover the sound recording.
  • This leaves the podcaster with three choices: to attempt to obtain licenses from the record companies; to limit podcasts to sound recordings not subject to copyright protection (generally, U.S. recordings pressed before February 15, 1972 [careful: a CD reissue of a pre-1972 recording is a new, protected, sound recording]); or to eliminate sound recordings altogether from podcasts.
  •  
    Copyright law protects musical and spoken compositions, or "works"; the performance of a work preserved in a sound recording; and the sound recording itself. Podcasting implicates these in three ways: the performance of a work; the playing of a sound recording of a performance; and the reproduction of a sound recording by incorporating it into a podcast. The law is well-settled only as to the first of these.
Vicki Davis

facilitatortips ยป Online Surveys and Forms - 0 views

  •  
    Teaching students how to use online surveys and aggregate results is an important skill as part of authentic research. This wiki page has excellent information on how to use these tools.
  •  
    Incredible wiki page about online surveys and forms. I highly recommend that we begin to have our students conduct surveys as part of authentic research. This is an excellent page about this topic. (The rest of the wiki is nice as well.)
Anne Bubnic

Mom Hacks Facebook Account; Teen Sues - 1 views

  • It was a mixed blessing that within 24 hours of creating her Facebook page, my kid was harassed unmercifully by a so-called friend โ€” someone she thought was a friend in real life โ€” to the point where she had to unfriend and block other communications from them. I couldnโ€™t have made my case any better about the dangers of social media if Iโ€™d paid the obnoxious bully to do it for me.
  •  
    A teen has sued his mother for harassment after she logged into his Facebook account and changed content. He also claims she's made "slanderous" comments about him in Facebook as well. It's important to note that this 16-year-old lives with his grandmother and not his mother, and that he appears to be old enough to drive in his home state of Arkansas.
Anne Bubnic

Text Bullying [Video] - 0 views

  •  
    Short video clip from ACT AGAINST BULLYING with cell phone bullying prevention advice , as well as how to handle the text messaging bullying if it occurs.\n\n
Judy Echeandia

Japan tests cell phones to stop pandemics - 0 views

  •  
    An experiment in using technology to help stop the spread of pandemics is about to begin in Japan, and its results could have implications for U.S. schools as well.
Anne Bubnic

Palo Alto Online : School heads called parents in cyberbully case - 0 views

  •  
    In a recent incident in which local teens "cyberbullied" a fellow Palo Alto student, school district officials said they helped remove the offending website and notified the parents of "six or eight" perpetrators who are students at Gunn and Palo Alto high schools. The bullying occurred over the weekend of Feb. 28, when some students created a Facebook "I Hate..." group targeting another student. The Internet group quickly gained up to 100 members and included vicious comments against the student as well as some posts in the student's defense. School district officials, who learned of the activity over the weekend, helped remove the Facebook group early on Monday, March 2.
Anne Bubnic

MySpace Mom's Behavior Hateful But Not Illegal - 0 views

  •  
    Lori Drew, the "cyberbully" mom who has been accused of indirectly causing the suicide of a MySpace teen member may have acted heinously, but not illegally, according to a group of Internet legal advocacy groups who filed a legal brief yesterday in the U.S. District Court in California.
Anne Bubnic

Students take online revenge on teachers - 0 views

  •  
    Students are taking a high-tech approach to revenge on teachers - assuming their identities in fake online profiles and putting doctored photographs of them on the internet. The modern trend - dubbed "worrying" this week by the secondary teachers' union - appears to have firmly taken hold in New Zealand this year. It is an extension of the problem of teenagers cyber-bullying their peers and follows the trend of fake profiles created for celebrities and politicians.
Anne Bubnic

Why kids don't tell on cyber-bullies - 0 views

  •  
    Many young people keep quiet about online bullying for fear they will not be allowed to keep using computers, says a bullying expert. Dr Shaheen Shariff, who leads an international cyber-bullying project from McGill University in Montreal, said more than half of young people with internet access would encounter online bullying as a victim, a perpetrator or a bystander. But almost two thirds admitted they would not report it because they feared losing computer privileges. Most children thought there was nothing adults could do to help anyway, said Dr Shariff, who was in Queenstown this week to speak at a Netsafe online safety conference.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Anne Bubnic

P2P Healing in Cyberbullying Case - 0 views

  •  
    We hear so much in the news about teen meanness and harassment toward each other online that it's quite amazing to find a national story about kindness. In the case of Olivia Gardner, the kindness came from two sisters in a nearby town, Sarah and Emily Buder in Mill Valley, Calif., who read in the newspaper about how Olivia was being bullied and wanted to help.
Anne Bubnic

Bullied girl alone no more - 1 views

  •  
    Original coverage of the Olivia Gardner story in the San Francisco Chronicle. See: Bullied girl finds comfort in letters from hundreds of strangers, a campaign begun by two Mill Valley sisters in 2007.
Anne Bubnic

Cyberbully Crackdown At Montclair School District - 0 views

  •  
    A Montclair school district is trying to protect its students from cyber bullies, even when they attack from home. CBS has learned how the school is cracking down and making the bullies the target.
Anne Bubnic

The Authority & Responsibility of School Officials in Responding to Cyberbullying [PDF] - 0 views

  •  
    The Authority & Responsibility of School Officials in Responding to Cyberbullying Article by Nancy Willard, M.S. J.D. [Journal of Adolescent Health 41 (2007) S64-S65]
« First ‹ Previous 141 - 160 of 188 Next › Last »
Showing 20 items per page