Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged how to

Rss Feed Group items tagged

Anne Bubnic

Footprints in the Digital Age - 0 views

  • In the Web 2.0 world, self-directed learners must be adept at building and sustaining networks.
  • As the geeky father of a 9-year-old son and an 11-year-old daughter, one of my worst fears as they grow older is that they won't be Googled well. Not that they won't be able to use Google well, mind you, but that when a certain someone (read: admissions officer, employer, potential mate) enters "Tess Richardson" into the search line of the browser, what comes up will be less than impressive. That a quick surf through the top five hits will fail to astound with examples of her creativity, collaborative skills, and change-the-world work. Or, even worse, that no links about her will come up at all. I mean, what might "Your search did not match any documents" imply?
  • digital footprints—the online portfolios of who we are, what we do, and by association, what we know—are becoming increasingly woven into the fabric of almost every aspect of our lives.
  • ...6 more annotations...
  • So what literacies must we educators master before we can help students make the most of these powerful potentials? It starts, as author Clay Shirky (2008) suggests, with an understanding of how transparency fosters connections and with a willingness to share our work and, to some extent, our personal lives
  • Publishing content online not only begins the process of becoming "Googleable," it also makes us findable by others who share our passions or interests.
  • Although many students are used to sharing content online, they need to learn how to share within the context of network building. They need to know that publishing has a nobler goal than just readership—and that's engagement.
  • As Stanford researcher Danah Boyd (2007) points out, we are discovering the potentials and pitfalls of this new public space. What we say today in our blogs and videos will persist long into the future and not simply end up in the paper recycling bin when we clean out our desks at the end of the year.
  • Although Laura is able to connect, does she understand, as researcher Stephen Downes (2005) suggests, that her network must be diverse, that she must actively seek dissenting voices who might push her thinking in ways that the "echo chamber" of kindred thinkers might not? Is she doing the work of finding new voices to include in the conversation?
  • Here are five ideas that will help you begin building your own personal learning network. Read blogs related to your passion. Search out topics of interest at http://blogsearch.google.com and see who shares those interests. Participate. If you find bloggers out there who are writing interesting and relevant posts, share your reflections and experiences by commenting on their posts. Use your real name. It's a requisite step to be Googled well. Be prudent, of course, about divulging any personal information that puts you at risk, and guide students in how they can do the same. Start a Facebook page. Educators need to understand the potential of social networking for themselves. Explore Twitter (http://twitter.com), a free social networking and micro-blogging service that enables users to exchange short updates of 140 characters or fewer. It may not look like much at first glance, but with Twitter, the network can be at your fingertips.
  •  
    Giving Students Ownership of Learning: Footprints in the Digital Age. In the Web 2.0 world, self-directed learners must be adept at building and sustaining networks.
syukron nuryadi

ZTE SONATA 4G MANUAL - 0 views

image

zte manual user guide

started by syukron nuryadi on 11 Mar 14 no follow-up yet
Anne Bubnic

What Does It Mean To Be Media Literate? - 0 views

  •  
    How media smart are you? How about your children or students? Sometimes called media literacy or information literacy, it's a key 21st Century skill because it provides a framework and method to think critically about the media you consume and create. Being media smart also means you know how to use television, the Internet and other technologies safely, productively and ethically.
Anne Bubnic

Digital Natives and the Myth of Multi-Tasking - 0 views

  • Dave Crenshaw discussed his latest book, The Myth of Multitasking. Crenshaw makes a strong distinction behind “background tasking”—reading a magazine while waiting in line, for instance, or listening to music while coding—and “switch-tasking.” Most of the time, when we talk about “multi-tasking,” we’re actually talking about the very costly practice of “switch-tasking.” Every time you switch your attention from one place to another—even from one browser window to another—you take a significant hit to your focus
  • Switch-tasking, he definitively proves, causes you to execute each task more slowly than you would otherwise, with more errors
  • pecifically, what can parents, teachers, and employers do to help their kids, students, and employees focus their attention more effectively? As a kid, student, and employee myself, I have to say that I believe the solution is emphatically not to limit access—at least not for older teens. Rather, I think the key lies in laying out the facts and discussing strategies. Information overload and the allure of infinite access, after all, are challenges that affect everyone with an internet connection—not just young people. And, though writing a stellar book report might not be a cause compelling enough to warrant total focus, every young person will at some point find a pursuit worth paying attention to. Maybe it’s writing short stories; maybe writing music. Maybe it’s making art. But when that pursuit comes along, they’re going to want to know how to firewall their attention, focus their efforts, and—for once—stop switching.
  •  
    What ever happened to old-fashioned "discipline?" This question has come up constantly in my conversations with parents and teachers over the course of my involvement with the Digital Natives project. When parents glance over and see not only 50 browser tabs open on the family computer, but iTunes and a computer game and AIM too-with a book report relegated to a tiny corner of the screen-they're understandably bewildered. How do kids ever get anything done? "I'm just really good at multi-tasking, Mom," a savvy student might reply. And, as long as the work gets done, it seems hard to argue with that logic.
Anne Bubnic

Teachers and Facebook: Privacy vs. standards - 0 views

  • An attorney for a suspended Charlotte-Mecklenburg Schools teacher said Thursday she never intended for the public to view negative comments she made about students on Facebook. But the case is now part of a national debate that pits teachers' right to free expression against how communities expect them to behave.
  • She now faces possible firing for listing “teaching chitlins in the ghetto of Charlotte” among her activities.
  • e district allows teachers to post personal information online, but had to take action because it affected the teacher's ability to interact with students and parents. She called the comments racially insensitive or offensive to students at Thomasboro Elementary School, where she teaches.
  •  
    An attorney for a suspended Charlotte-Mecklenburg Schools teacher said Thursday she never intended for the public to view negative comments she made about students on Facebook. But the case is now part of a national debate that pits teachers' right to free expression against how communities expect them to behave.
adrinawinslet

How to Use Hashtags: A Quick and Simple Guide for Every Network - 0 views

  •  
    Hashtags are one of those things all marketers seem to know they need to use in social media, but perhaps not so many of us are using them to their full effect. At that moment, I reverted to the simplest and quickest use of hashtags by devising a pithy catch-phrase or choosing from the most popular used hashtags list, as suggested by my social media platform of choice.This is a great start, but it undervalues the potential power and importance of Hashtags In Social Media So here are our top seven tips on how to use hashtags to transform your brand's marketing strategy:- 1. Understand the basics 2. Choosing the right number of hashtags 3. Be concise 4. Be specific 5. Use trending hashtags 6. The best hashtags for brands 7. Check your spelling This is a great start, but it undervalues the potential power and importance of hashtags in an effective Social Media Marketing Strategy. For More Information Visit: http://bit.ly/2OQ8HzE
adjustingto6figu

Flood Zone - 0 views

  •  
    Learn how to write auto flood claims quick & easy. Learn how to set yourself up for success to get into the writing zone when working on flood vehicles with this new course from IA Path.
Anne Bubnic

Lesson Plan: Life Online - 0 views

  •  
    Digital technology has had a tremendous impact on our lives. Although the Internet and cell phones have been in wide use for only a couple of decades, most of us can hardly remember a time before they existed or imagine how we would function without them. How have the accessibility of these technologies, and the ease with which we are now able to share information, changed the way we communicate? And how can young people in particular better deal with the issues that might arise from being able to communicate so quickly and easily with so many people? This activity will help students recognize and address these issues. Note: Registration for this site may be required, but it's simple and easy.
Anne Bubnic

Anti-Phishing Phil: Phishing Awareness Education - 2 views

  •  
    Anti-Phishing Phil™ is an engaging online game that teaches students and adults how to identify phishing URLs. The game was developed at Carnegie Mellon (in partnership with Wombat Security Technologies). Scientific evaluation has shown that Phil is more engaging than traditional training solutions and significantly more effective in terms of how well people are later able to detect phishing attacks and how long they remember what they have learned.
Vicki Davis

Susan Silverman's Lucky Ladybugs project going on for elementary - 0 views

  • A Collaborative Internet Project for K-5 Students
  • Essential Question: Why are ladybugs considered to be good luck?
  • This project will demonstrate lesson plans designed following principles of Universal Design for Learning (UDL) and examples of student work resulting from the lessons.  As teachers we should ask ourselves if there are any barriers to our students’ learning.  We should look for ways to present information and assess learning in non-text-based formats. 
  • ...5 more annotations...
  • Based on brain research and new media, the UDL framework proposes that educators design lessons with three basic kinds of flexibility: 1. Multiple formats and media are used to present information.
  • Examples: Illustrations, pictures, diagrams, video or audio clips, and descriptions 2.   Teachers use multiple strategies to engage and motivate students. 3.   Students demonstrate learning through multiple performance and product formats.
  • UDL calls for three goals to consider in designing lessons: 1.  Recognition goals: these focus on specific content that ask a student to identify who, what, where, and when. 2.  Strategic goals: these focus on a specific process or medium that asks a student to learn how to do something using problem solving and critical think skills. 3. Affective goals: these focus on a particular value or emotional outcome. Do students enjoy, and appreciate learning about the topic? Does it connect to prior knowledge and experience? Are students allowed to select and discover new knowledge?
  • Resources you might want to use: Scholastic Keys, Kid Pix, Inspiration and Kidspiration, digital camera (still and video), recording narration/music, United Streaming.  Let your imagination go!
  • This project begins on March 15, 2007.  Materials need to be e-mailed by May 31, 2008.
  •  
    An excellent project for elementary students to connect with other classes.
  •  
    A great way to get started with technology is to join in an exciting project. this project by Susan Silverman was designed using the principles of Universal Design for Learning. I've heard her present and she is a pro. (Along with my friend Jennifer Wagner.)
Steven Knight

The Door That's Not Locked - 8 views

  •  
    The web is a wonderful place, if you understand the dangers. While the Internet is an open door to a world of great information, communication and entertainment, it can also be a direct passageway to danger. The Canadian Centre is committed to helping parents, teachers, and anyone else who would like to better understand the good, bad, and ugly about the web. We're here to help keep kids safe while exploring and enjoying The Door that's not Locked. This website has been created to provide you with a one-stop-shop on all things related to Internet safety.
  •  
    All Web. No Net.
  •  
    This is a great site. No nonsense advice. I really like how it is broken down in age groups, which helps you to understand how children become more sophisticated in their Internet use. Thanks Steve for sharing it!
Anne Bubnic

Many new 'friends' to be made online, but what about dollars? - 0 views

  • Even Google has failed to extend its golden touch to social-networking sites. In 2006 Google paid MySpace $900 million to place ads on its pages. The search giant also operates its own social network, Orkut, which has been growing, especially outside the US. But in a February call with financial analysts, Google cofounder Sergey Brin conceded that the investments “didn’t pan out as well as we had hoped…. I don’t think we have the killer best way to advertise and monetize the social networks yet.”
  • “People clearly, especially on the social networks, [are] not particularly interested in clicking on the ads,” says Mr. Brooks, who as editor of socialnetworkingwatch.com has followed the online industry for a decade. “Advertising needs to evolve, and social networks are forcing this change. People are really tired of being assaulted [by ads], but they still love to buy.”
  • As users share personal information within their networks, companies have an opportunity to capture and employ this data for targeted marketing. Social networks are building huge databases about where users go and the people they connect with, says Fred Stutzman, a doctoral candidate at the University of North Carolina who studies social networks.
  •  
    Social Networks may be on the increase in populations, but marketers still struggle with how to get users to respond to advertising.
Anne Bubnic

Cybersafety Assembly causes controversy on first day of high school - 0 views

  • John Gay, a police officer for the Cheyenne Police Department in Wyoming, volunteered at the request of Windsor High School principal Rick Porter to speak to students at two assemblies about the dangers of predators surfing social networking Web sites such as MySpace and Facebook.Gay shared how he could pull pictures off of Windsor High School students who had their own MySpace and Facebook pages. Nordic’s daughter, Shaylah, was one of the students Gay singled out to the point where Shaylah left the auditorium in tears.
  • Shaylah said Gay showed the other students her phone number, read her blogs and comments out loud.
  • He kept on picking at her and picking at her and picking at her and everyone said, ‘That’s harassment,’ ” Weakland said.
  • ...2 more annotations...
  • “Officer Gay chose it as an opportunity to take Shaylah’s pictures and her MySpace and use it as an example of what not to do, but then just really publicly humiliate her and mocked her,” said Nordic, who coaches wrestling at the high school and football and track at Windsor Middle School. “She left the auditorium in tears and busted out crying. He told the student body that he took her information from MySpace and showed it to a predator in prison and asked him what he would do with it.”
  • “You could imagine her sitting there and hearing that,” Nordic said. “He asked everybody there, ‘Is Shaylah Nordic here?’ So she raised her hand and then he went on to post the pictures and talk about it. He said she was likely to be raped and murdered because how easy it was to access this stuff, and how easy it was to get information.”
  •  
    Ty Nordic understands the need to inform kids about the dangers of sexual predators on the Internet. But when his 16-year-old daughter was targeted during an assembly at Windsor High School on the first day of school Tuesday afternoon, Nordic was left with plenty of unanswered questions for the presenter whom he said used inappropriate language during the assembly and singled out specific students.
Anne Bubnic

How Can Adults Improve Social Networking Sites for Kids? - 0 views

  • If social networks are going to be safe places for kids, adults are going to have to be more present and it's not going to work if it is just parents watching over kids to control their online activity. Social networks have to become more open to adults who are interested in pointing kids in a positive direction and who take an interest in their development
  •  
    Ten Ideas for how adults can improve social networking sites for kids. I was recently interviewed by a local high school student named Julian for his research project about the impact of social network sites on society. I always enjoy being interviewed by teens and end up learning something in the process. Julian asked a question that I have been thinking about since we spoke: "What can adults do to improve social network sites for kids?"
Anne Bubnic

WEB|WISE|KIDS: MISSING [Interactive Software Adventure] - 0 views

  •  
    MISSING, from Web Wise Kids, is designed to SHOW rather than TELL children about online safety. It's a fun and positive way to teach children how to avoid danger on the Internet. The interactive software adventure tells the story of Zack, a kid in Vancouver, Canada who forms an online friendship with Fantasma. This guy is so cool - he has an online magazine about beach life in California and he sends Zack great stuff, like graphic arts and software. Little does Zack know that he is a predator. After Zach agrees to go to San Diego to be with Fantasma, players work with a detective to find and rescue Zack and arrest Fantasma. Available both as a home edition and a school edition. [Windows and Mac OSX versions available]. Note: Local middle school science teachers have successfully worked this program into their science curriculum since solving the game involves researching and collecting clues.
Vicki Davis

Identity Theft Leads to Child-Porn Arrest Nightmare - 0 views

  • Simon Bunce of Hampshire, England, not only had his credit-card number stolen online but was arrested and falsely accused of being a pedophile when that card number was used to buy child pornography.
  • Yet that only came after he'd lost his $250,000-a-year job, his father and siblings stopped talking to him and his computer was taken away for several months, the BBC reports. Bunce had the misfortune of being caught up in Operation Ore, a massive British online kiddie-porn crackdown in 2003 that itself grew out of Operation Avalanche, an earlier American bust which began with a 1999 raid on Landslide Productions, a Texas mom-and-pop operation that handled credit-card transactions for porn Web sites.
  • about 7,200 people — whose card numbers showed up on the list.
  • ...2 more annotations...
  • Bunce was arrested "on suspicion of possessing indecent images of children, downloading indecent images of children and incitement to distribute indecent images of children" — all before a single image of such had been found on his computers at home and at work. He quickly found himself unemployed and estranged from his family. But his wife stuck by him, and while his computer sat in police custody waiting to be examined, Bunce took action.
  • Bunce used the U.S. Freedom of Information Act and a catalog of Internet Protocol addresses to establish that his credit-card number had been used in Jakarta, Indonesia, to buy child pornography online at the same moment he used the card to pay the bill at a London restaurant.
  •  
    Learning how to safely use e-commerce websites is important, but also, people need to be aware to protect their credit card numbers and identities as can be seen in this horrific case study. When websites are not safe about their use of credit card numbers, it can have horrible impacts such as this man losing his $250,000 a year job and becoming estranged from his family, when they thought he bought child pornography.
Anne Bubnic

Troubled teens spread despair in cyberspace - 0 views

  •  
    People used to say a child's suicide ripples through a community. These days, it rides an electronic wave. Teenagers relay the news with cell phone calls, text messaging and Internet social networks, complicating the efforts of teachers, counselors and parents trying to manage grief after a young person's death. To our readers This series stems from our continuing examination of what led 19-year-old Robert Hawkins to become a mass killer last December at Omaha's Von Maur store. Today's stories describe how Internet postings, cell phones and text messages allow teens to spread their angst rapidly under the radar of adult oversight. Three-part series The World-Herald investigation into Robert Hawkins' murder spree and suicide last December leads to the discovery of a teen suicide cluster in Sarpy County. Sunday: Connections between suicidal teens cross community and school district lines. Today: Technology spreads teenage grief and angst quickly, with no parental oversight. Tuesday: A widely used but controversial suicide screening program is urged for use in Nebraska schools. Cyberspace is fertile ground for suicide contagion. It provides a forum for prolonged and excessive grieving in a highly charged, emotional atmosphere - precisely the kind of atmosphere psychologists warn to avoid after a death. It is also unmonitored by all but the most vigilant parents.
Vicki Davis

Murder brings scrutiny to fast-growing Craigslist - 0 views

  • "There's a whole field of law emerging which is online media liability law and the question is how much liability do we place on companies that host information other people post online," said John Palfrey, a Harvard Law School professor.
    • Vicki Davis
       
      Online liability to companies that allow information to be posted is being discussed.
  •  
    Home Business & Finance News Top News UK World Sports Technology Entertainment Science & Health Environment Motoring Oddly Enough Lifestyle The Great Debate Blogs Special Reports Video Pictures Weather Do More With Reuters RSSRSS Feed Widgets Mobile Podcasts Newsletters Interactive TV Partner Services Career Centre Professional Products Financial Media Support (Customer Zone) About Thomson Reuters RPT-FEATURE-Murder brings scrutiny to fast-growing Craigslist Sat Apr 25, 2009 12:28pm BST Email | Print | Share | Single Page [-] Text [+] "There's a whole field of law emerging which is online media liability law and the question is how much liability do we place on companies that host information other people post online," said John Palfrey, a Harvard Law School professor. "The general policy approach we have taken to the Internet starting a decade plus ago was to say there is basically no liability, but these recent cases put to the test that policy," said Palfrey, who is a co-director of Harvard's Berkman Center for Internet and Society.
Anne Bubnic

Cyber Bullying: A Prevention Curriculum for Grades 6-12 [Book] - 1 views

  •  
    Cyber Bullying: A Prevention Curriculum for Grades 6-12 is a curriculum that deals with attitudes and behaviors associated with cyber bullying. This eight-session curriculum is designed to:
    1. Raise student and parent awareness of what cyberbullying is and why it is so harmful
    2. Equip students with the skills and resources to treat eachother respectfully when using cybertechnologies
    3. Give students information about how to get help if they, or others they know, are being cyber bullied
    4. Teach students how to use cyber technologies in positive ways.
Anne Bubnic

Plagiarism: What It is and How to Recognize and Avoid It - 0 views

  •  
    Learn about plagiarism, how to avoid it, and how to cite resources appropriately with this guide from Indiana University.
« First ‹ Previous 61 - 80 of 507 Next › Last »
Showing 20 items per page