Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged how to

Rss Feed Group items tagged

10More

Teaching Teenagers About Harassment - 0 views

  • About 20 percent of teenagers have posted or sent nude cellphone pictures of themselves, according to the National Campaign to Prevent Teen and Unplanned Pregnancy, a nonprofit group.
  • digital dating violence.
  • The behaviors can be a warning sign that a teenager may become a perpetrator or a victim of domestic violence, according to the group.
  • ...6 more annotations...
  • teenagers frequently received digital threats or upsetting requests from people they were dating. But the teenagers were not talking about it, did not know how to handle it and did not know what was appropriate and what was not.
  • “It was abuse that there was no protocol around,” Mr. Law said. The parents were not aware of the interactions, and the teenagers did not know how to prevent it, he said.
  • The campaign and its Web site, ThatsNotCool.com, encourage teenagers to set their own boundaries. It is intended to appeal to all teenagers, not just those with serious problems. “The kids don’t want to be told what’s right and what’s wrong,” Mr. Law said. On the site, teenagers can send one of 35 “callout cards” — brightly colored messages they can send by e-mail, post to their Facebook or MySpace accounts or download — that are meant to tell someone they have crossed a line. The messages are sharp. For example: “Congrats! With that last text, you’ve achieved stalker status.”
  • The site offers an area where teenagers can seek advice, like how to stop a boyfriend from nonstop text-messaging. For more direct advice, the site tells teenagers to call or conduct a live chat with trained volunteers.
  • The campaign is digitally focused, reflecting the way teenagers communicate. Even the posters that will appear in schools, which display some of the “callout card” messages, ask viewers to snap a photo with their cellphone and text-message it to someone.
  • All of the communications are aimed at teenagers, not parents. Ms. Soler said the fund was working on a campaign to alert parents to problems, but for now, she wanted to get teenagers discussing them.“We want to give them the tools to say ‘You can have a healthy relationship, and here’s the road map,’ ” Ms. Soler said.
  •  
    A New Ad Warns About Abusive Texting\nA new public service ad highlights the growing problems of "textual abuse," where harassment of children occurs by way of text messages.
26More

Online Predators and Their Victims - 0 views

  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
  • ...21 more annotations...
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
    • anonymous
       
      Let's remember that although there are direct references to gay and male pedophiles of gay boys, that 99% of child sex offenders identify as heterosexual, online or offline.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    This research article has the facts about sexual predatory behavior.
1More

Google Family Safety Center - 6 views

  •  
    We know how important it is to protect and educate young people on using the Internet and want to provide all of our users with a safe experience. When it comes to family safety, we aim to: * Provide parents and teachers with tools to help them choose what content their children see online * Offer tips and advice to families about how to stay safe online * Work closely with organizations such as charities, others in our industry and government bodies dedicated to protecting young people
1More

Young Minds, Fast Times: The Twenty-First-Century Digital Learner - 0 views

  •  
    How tech-obsessed iKids would improve our schools. One of the strangest things in this age of young people's empowerment is how little input our students have into their own education and its future. Kids who out of school control large sums of money and have huge choices on how they spend it have almost no choices at all about how they are educated -- they are, for the most part, just herded into classrooms and told what to do and when to do it.
1More

TextED.ca - 6 views

  •  
    Online resource from Canada for everything textual. Get the 411 on texting and relationships, including healthy vs. unhealthy relationships, how to deal with harassment, and how to cope with stress. Through a variety of games and activities you can test your texting knowledge, find out how to use this great technology safely, and learn what to do when someone crosses the line. Educators can sign up for teacher guides and lesson plans.
3More

Back to School Tips| Americans for Technology Leadership - 0 views

  • Cyberbullying Cyberbullying or online bullying is repeated, unwanted or cruel behavior against someone through computers, cell phones, gaming consoles, or other Internet-based means. The Internet is always “on,” opening the door for 24-hour harassment. Cyberbullies can be anonymous. They never have to confront their victims, they don’t have to be physically stronger and cyberbullies may be virtually invisible to parents and adults.
  • Look for warning signs your child may be the victim of cyberbullying – depression, lack of interest in school and friends, drop in grades and subtle comments that something may be wrong. If your child is the victim of cyberbullying, take action. By filtering email, instant messages and text messages, you can cut off many of the ways the cyberbullies contact your child. By having your child avoid the sites and groups where the attacks occur, he/she can ignore the bully. If harassment continues, change your child’s email address, user names and Internet account. If these steps do not stop the cyberbullying, contact the parents of the child who is behind the bullying, contact the school, and if the situation is not resolved, involve the police. It’s important to compile copies of harassing emails and postings to have evidence for authorities or the school, so they can take action. Look for signs that your child may be the cyberbully themselves – if they sign onto the Internet under someone else’s name, if they use someone else’s password without their permission, if they posted rude or mean things about someone else online, if they use bad language online, or if they changed their profile or away message designed to embarrass or frighten someone. Talk to your kids about cyberbullying and why it’s wrong and hurtful.
  •  
    As children go back to school, many parents are concerned about how their children will be using the computer and Internet devices in the classroom. Communication is key. Parents need to talk with their children about how to use the Internet safely, potential threats and appropriate usage of the Internet. By understanding both the benefits and the risks of Internet use, families can have a safer and more secure online experience. This article includes key tips on cyberbullying, internet safety, privacy and security.
1More

Cyber safety rules may curb net bullying - 0 views

  •  
    New safety rules from Telestra aim to give parents a tool in the fight against cyber bullying, with many struggling to understand what they can do to protect their children.Families should learn how to report cyberbullying and to work on building trust about discussing online problems. The article gives five suggestions for how adults can become an internet parent:
    Familiarize yourself - talk with your child about their use of the internet.
    Explore - websites and technologies yourself.
    Restrict inappropriate content and consider parental controls such as filtering.
    Talk to your child and encourage open communication
    Know - be aware of the potential dangers and know where to report potentially illegal or inappropriate behaviour online.

1More

MacArthur Foundation Series on Digital Media and Learning - MIT Press - 0 views

  •  
    The John D. and Catherine T. MacArthur Foundation Series on Digital Media and Learning examines the effect of digital media tools on how people learn, network, communicate, and play, and how growing up with these tools may affect a person's sense of self, how they express themselves, and their ability to learn, exercise judgment, and think systematically.

    Six topics are available as free downloads online:
    Youth, Identity, and Digital Media Current Volume
    Learning Race and Ethnicity: Youth and Digital Media
    Digital Young, Innovation, and the Unexpected
    The Ecology of Games: Connecting Youth, Games, and Learning
    Digital Media, Youth, and Credibility
    Civic Life Online: Learning How Digital Media Can Engage Youth

Ironing Board for small space - 0 views

started by wasifali on 18 Jun 23 no follow-up yet

Ironing Board for small space - 0 views

started by wasifali on 18 Jun 23 no follow-up yet
1More

The Ultimate Guide to Instagram Shopping Trends - 1 views

  •  
    You want to make sure you're using Instagram shopping Trends as effectively as possible - we're talking beautiful imagery, great captions, and sales pitches timed to perfection. In the following guide, we'll take you through the steps to get set up with shopping on Instagram and reveal a few handy tips and tricks to seamlessly integrate your shopping posts into your feed. - Instagram Shopping Posts Give Your Followers an Easier Way to Shop - Instagram Shopping Posts Tap into an Already Engaged Audience - How To Set Up Instagram Shopping For Your Account - How to Add Product Tags to Your Instagram Posts - How to Add Shopping Stickers to Instagram Stories Posts - How to Set up A Shoppable Feed with Linkin.Bio by Later Just start by taking the first steps to be an approved retailer with Instagram, and then you can begin creating awesome posts with tagged products for easier Instagram shopping for your followers!
2More

Buy Wechat Account-- 100% Fully Verified & cheap... - 0 views

  •  
    Buy Wechat Account Looking to Buy Wechat Account? We 've got you covered! WeChat is a revolutionary messaging service that has taken the world by storm. It allows druggies to shoot unlimited dispatches and make videotape calls, giving it an edge over traditional messaging services. One of the main advantages of using Wechat is that druggies can buy an account to pierce all of these services. By buying a WeChat account, druggies get access to all of the features without having to produce a new bone . Order now and see the results for yourself And get further exposure for your business! All the benefits you'll get from our service √. 100 guests Satisfaction Guaranteed. √. veritably Cheap Price. √. High- Quality Service. √. 100 Money- Back Guarantee. √.24/7 Ready to client Support. √. Extra lagniappes for every service. √. still, you must Advance Payment, If you want to buy this product.
  •  
    Buy Wechat Account Introduction Microblogging platform WeChat offers a unique opportunity for businesses to connect with potential customers. A WeChat account allows businesses to set up a presence on the platform and share updates, articles, and promotions with users. Why do they buy WeChat? When talking about why people buy WeChat, there are a few different reasons. The most common one is because WeChat is a Chinese app, and a lot of people who are not from China want to use it to communicate with friends or family who live in China. Another reason is that WeChat is a very convenient app that offers a lot of features, such as messaging, calling, and even payments. Finally, some people may buy WeChat because it is becoming more and more popular, and they want to be part of the trend. We chat accounts unlimited sell low price Are you interested in purchasing a WeChat account? You're in luck! We're here to sell you a WeChat account for a low, low price! WeChat is a messaging and social media app that's monstrously popular in China. It has over 1 billion active monthly users, making it one of the most popular messaging apps in the world. WeChat is much more than just a messaging app though - it also offers a variety of features such as payment options, news updates, and much more. If you're interested in purchasing a WeChat account, then you've come to the right place. We offer WeChat accounts for sale at a very low price, so you can get started using this incredibly popular app without breaking the bank. WeChat accounts come with a variety of features, so you can customise your account to suit your needs. Whether you're looking for a messaging app with a built-in payment system, or you want to keep up with the latest news and information from China, WeChat has you covered. So what are you waiting for? Get started using WeChat today by purchasing an account from us. We promise you won't be disappointed! Wechat Account Sell 3 year old account A
5More

How To Stop Cyber-Bullying - 0 views

  • Yet with so many different types of cyberbullying, ranging from online impersonation to e-mail hacking and distributing embarrassing materials about a person, it can be difficult for kids, let alone those trying to help them, to know how to respond and stop the 21st century bully in his or her tracks. "Awareness about the issue is high, but awareness about what to do when it happens is mixed," says Michele Ybarra, president and research director for Internet Solutions for Kids (ISK) and an adjunct faculty member at Johns Hopkins School of Public Health.
  • Research suggests that those on the receiving end of traditional bullying may be more likely to cyberbully as a form of retaliation. Kids involved in the more severe instances of cyberbullying also tend to have more psychosocial problems, exhibiting aggression, getting in trouble at school and having poor relationships with their parents, says Nancy Willard, an expert on cyberbullying and author of Cyberbullying and Cyberthreats. And while traditional bullying appears to peak in middle school and drop off as kids reach high school, cyberbullying tends to slightly increase among kids in high school, a trend researchers can't yet explain.
  • One of the tricky things about helping cyberbullying targets is that they aren't always willing to talk about the problem. Teens often cite a fear of having their Internet privileges revoked as a reason for keeping quiet, Agatston says. Kids who receive threatening messages in school may not divulge what's happened for fear of getting in trouble, since many schools ban use of cellphones during the day. To get around that problem, Willard recommends having a frank discussion with your children about cyberbullying before it happens.
  • ...1 more annotation...
  • Research is also beginning to show that just like traditional forms of bullying, cyberbullying can lead to anxiety, lower rates of self-esteem and higher rates of school absence, says Patti Agatston, a licensed professional counselor with the Prevention/Intervention Center, a student assistance program serving more than 100 schools in suburban Atlanta, Ga.
  •  
    Kids can be mean.\n\nIt's a fact of life we've all experienced. Gone are the days, however, when avoiding a bully meant ducking out of the back door at school. Thanks to personal computers, cellphones and instant messaging, it's now easier than ever for children to attack each other, often anonymously.
1More

10 Simple Steps will Make Your Hashtag Strategy Better - 0 views

  •  
    A keyword phrase which is spelled without spaces and preceded by a # sign is known as a hashtag. Hashtags originally got famous by Twitter and now they are used in almost all the social networking platforms like Facebook, Instagram, Pinterest, Twitter. Hashtags are important for social media. It began with Twitter and spread to other platforms. This guide will tell you how to use hashtags in social media marketing and how it will help you to get found by your target audience. Here, we will look into various effective ways to get the most out of hashtag strategy - - Hashtag Based on Social Media Platform - Number of Hashtags in a Post - Be Specific in Hashtags - Understanding Marketing Strategy - Finding a Relevant Trending Topic - Live Tweet - Create a Simple and Catchy Hashtag - Involving Audience in Hashtag Posts - Selecting the Right Time - Create to Inspire You might have seen hashtags on various social media platforms. Whenever someone clicks on the hashtag, they are directed to all the other posts containing the same hashtag. If someone searches for the word used in your hashtag, your post would get listed which means grabbing the attention of several social media users.
6More

"Unprecedented Force for Change"-Dan Tapscott's Keynote - Horizon Project 2008 - 0 views

  • Teachers are no longer “transmitters of data,” but active participants in the student’s learning process.
    • Vicki Davis
       
      I think this comment is an important one to understand as we advocate for Student success as well.
  • with our advanced, technological world, we must not only acknowledge the new technologies emerging but we must gain knowledge on how to use them.
  • f school became an interactive place where both students and teachers put their two cents in: teachers teaching students, students teaching students, teachers sharing ideas and students executing these ideas-school would be great. If we all focus on change and ways to make interactive learning better we could reach so many people! Not only can we interact with each other but we can raise awareness and pose solutions on the many issues regarding education.
  • ...2 more annotations...
  • I really agree with both of what you two are saying, but my question remains, (in an attempt not to sound too cynical): how is this going to happen? I know that Dan Tapscott seeks to view change in the education system, but my question is, how is this going to happen?
  • but the real issue is, in so many places education is rigid and all about regurgitation of information. How do we look past that? Is it a mindset that we need to learn how to transgress, or is it a gradually changing aspect?
1More

Cyberbullying - Bullying Beyond the Schoolyard [New Book] - 0 views

  •  
    Teens and tweens have been bullying each other for generations. The bullies of today, however, have the advantage of utilizing technology such as computers, cell phones and other electronic devices to inflict harm on others. "Bullying Beyond the Schoolyard: Preventing and Responding to Cyberbullying," due out this month, uncovers the types of youth most susceptible, how they felt, who they told, how they coped and how it affected their lives, and illustrates the gravity of cyberbullying and its real-world repercussions. The co-authors, [Justin Patchin, Ph.D. and Sameer Hinduja] both have backgrounds in Criminal Justice and are university-based. Their web site, Cyberbullying.Us is dedicated to identifying the causes and consequences of online harrassment.
1More

Friend or Foe? Balancing the Good and Bad of Social-Networking Sites - 0 views

  •  
    This three-part article includes a discussion of classroom connections to social networking sites and the school's role in intervening when information that affects the classroom is publicly posted on MySpace or Facebook. The authors also provide five key social networking tips:
    1. Establish a policy for dealing with incidents in which students break school rules and their inappropriate behavior is showcased publicly on social-networking sites.
    2. Outline clear guidelines for administrators that spell out how schools should discipline students based on information garnered from social-networking sites, and let parents and students know about those rules.
    3. Educate students about online-safety issues and how to use sites such as Facebook and MySpace responsibly.
    4. Have a policy in place for dealing with cyber bullying.
    5. If teachers are using social-networking sites for educational purposes, they should establish clear guidelines for how they intend to communicate with students via those sites.

1More

Offer a Digital Helping Hand - 1 views

  •  
    If you're a Gadgetwise reader, you're among the 23 percent of the world's population that has Internet access. You've figured out how to download fresh news, print a boarding pass or tweet. But take a second and try to understand how it must feel to be undigital these days. There's a grating discomfort that comes from being left out of everyone else's secret language. I was reminded of how common this feeling is in my own hometown library last night, when I walked into a free public workshop on Facebook.
4More

The Millennials Are Coming! - 0 views

  • Most agencies manage sensitive citizen data: addresses, Social Security numbers, financial records and medical information. You name it, some state or local office has it, and probably electronically. The problem? Many theorize that the Millennials' penchant for online openness could unintentionally expose private information, leaving it ripe for the picking. Millennials bring innovative ideas about technology's use, but for that same reason, do they also pose new security risks?
  • Anti-virus vendor Symantec released a study in March 2008 assessing this issue. Symantec commissioned Applied Research-West to execute the study, and 600 participants were surveyed from different verticals, including government. Survey participants included 200 IT decision-makers, 200 Millennial workers and 200 non-Millennial workers born before 1980. The data revealed that Millennials are more likely than workers of other ages to use Web 2.0 applications on company time and equipment. Some interesting figures include: 69 percent of surveyed Millennials will use whatever application, device or technology they want at work, regardless of office IT policies; and only 45 percent of Millennials stick to company-issued devices or software, compared to 70 percent of non-Millennials.
  • How might young people be workplace assets? Could all that time typing or texting make them speedy typists, able to whip up memos at the drop of a hat? Does familiarity with new and emerging technologies have its benefit? You bet, according to Dustin Lanier, director of the Texas Council on Competitive Government. The council brings state leaders together to shape policy for government departments, including IT. "I think they've built an approach to work that involves a lot of multitasking," Lanier said of the Millennials. "Something will be loading on one screen, you alt-tab to another application and pull up an e-mail, the first process loads, you flip back, start a new process, flip to a forum and pull up a topic. It's frenetic but normal to that group." Lanier doesn't think Millennials present more of an IT threat than their older co-workers. After all, young people don't have a monopoly on being distracted in the office. "I can't tell you how many times I've walked by people's desks of all ages and seen Minesweeper up," he said. He thinks employers should embrace some Web 2.0 applications. Otherwise, Millennials might be discouraged from sticking around. According to Lanier, this younger work force comprises many people who think of themselves as free agents. Government should accommodate some of their habits in order to prevent them from quitting.
  •  
    Get ready CIOs. They're coming. They have gadgets and doohickeys galore. They like their music downloadable and portable, and they grew up with the Internet, not before it. Their idea of community is socializing with people in other cities or countries through Facebook, MySpace or instant messages, and they use e-mail so often they probably think snail mail is an endangered species. They're the Millennials - those tech-savvy, 20-somethings and-under bound to warm up scores of office chairs left cold by retiring baby boomers. There's a good chance many will come to a government workplace near you, but their digital literacy could prove worrisome for security-conscious bosses.
« First ‹ Previous 41 - 60 of 507 Next › Last »
Showing 20 items per page