Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged how to

Rss Feed Group items tagged

Anne Bubnic

How to Use Social-Networking Technology for Learning | Edutopia - 4 views

  •  
    Schools should reflect the world we live in today. And we live in a social world. We need to teach students how to be effective collaborators in that world, how to interact with people around them, how to be engaged, informed twenty-first-century citizens.
Anne Bubnic

How Recruiters Use Social Networks to Screen Candidates - 8 views

  •  
    Social media monitoring service Reppler recently surveyed more than 300 hiring professionals to determine when and how job recruiters are screening job candidates on different social networks. Results provide really good insight on how comments displayed in a social networking setting may have positively (or negatively) influenced a decision to hire.
Anne Bubnic

'Sexting' lands teen on sex offender list - 0 views

  • Phillip Alpert found out the hard way. He had just turned 18 when he sent a naked photo of his 16-year-old girlfriend, a photo she had taken and sent him, to dozens of her friends and family after an argumen
  • t was a stupid thing I did because I was upset and tired and it was the middle of the night and I was an immature kid," says Alpert.
  • Orlando, Florida, police didn't see it that way. Alpert was arrested and charged with sending child pornography, a felony to which he pleaded no contest but was later convicted. He was sentenced to five years probation and required by Florida law to register as a sex offender.
  • ...3 more annotations...
  • Rather than force her daughter to take the classes, which would have required she write a report explaining why what she did was wrong, Miller and two other families ­-- with the help of the ACLU -- are suing the district attorney to stop him from filing charges. "We believe she was the victim and that she did nothing wrong," says Miller. "How can I ask her to compromise her values and write this essay, when she didn't do anything?" Although the district attorney maintains the program is voluntary, the letter he sent to parents notes, "Charges will be filed against those who do not participate." Seventeen of the 20 students caught in the sexting incidents have completed the 14 hours of classes.
  • Last year, Jessica Logan, a Cincinnati, Ohio, teen, hanged herself after her nude photo, meant for her boyfriend, was sent to teenagers at several high schools
  • No charges had been filed against Jessica's 19-year-old boyfriend, who disseminated the photo, nor had the school taken any action, Logan says. He says he and his wife want to warn parents and students of the dangers of sexting. The Logans are fighting to raise awareness nationally and to advocate for laws that address sexting and cyber-bullying.
  •  
    The National Campaign to Prevent Teen & Unplanned Pregnancy, a private nonprofit group whose mission is to protect children, and CosmoGirl.com, surveyed nearly 1,300 teens about sex and technology. The result: 1 in 5 teens say they've sexted even though the majority know it could be a crime.
Anne Bubnic

'Sexting' Hysteria Falsely Brands Educator as Child Pornographer - 0 views

  • The prosecution looked like an error right out of the gate.  The photo didn't show sexual activity or genitalia, and even the sheriff's office conceded it was "inappropriate" but not "criminal" -- making it unclear what the "child abuse" was supposed to be. In any event, as a matter of law, Oei was only required to report suspected abuse to his principal, which he'd done.  It was then Forester's job to report it to authorities if needed. Oei said Forester didn't step in to defend him to authorities. (Forester didn't return phone calls for this story)
  • Four months later, Plowman charged Oei with two more misdemeanor counts for contributing to the delinquency of a minor, claiming Oei broke the law when he had the 16-year-old boy send the photo to his cell phone and advise him on how to then forward it to his desktop computer. Each count added another year to his possible prison term. "The December charges really felt like piling on," Oei says.
  •  
    Rumors had been flying at Freedom High School in South Riding, Virginia that students were distributing nude pictures of each other on their cell phones. It's a phenomenon, known as "sexting," that's become increasingly worrisome to educators across the country, and Ting-Yi Oei, a 60-year-old assistant principal at the school, was tasked with checking it out. The investigation was inconclusive, but led to a stunning aftermath: Oei himself was charged with possession of child pornography and related crimes
Anne Bubnic

City targets Web to dull bullies' barbs - 0 views

  •  
    The calls began coming in Monday. A horrified guidance counselor, a teacher, and then a student lit up Boston's new antibullying tip line, telling officials about multiple Facebook pages that featured pictures of female high school students with derogatory and sexually explicit captions beneath them. Students and city and school officials say they have found at least 15 Facebook pages over the last few days that use obscene or hateful language to target female students, as well as a handful of male students, school administrators, and teachers at schools in Boston and surrounding communities. Boston officials have been scrambling to have the pages removed and have been meeting to figure out how to address the apparent cyberbullying and find the culprits. But as the offending Facebook pages come down, new ones go up. School officials and police are struggling to identify the perpetrators, who have been using fake names when they register with Facebook to create the pages. Police say they could pursue criminal charges if they determine that perpetrators have violated victims' civil rights.
adjustingto6figu

Running an Efficient Small Business with these 4 Incredible Steps! - Adjusting to 6 Fig... - 0 views

  •  
    Too often, entrepreneurs who start their own small businesses have almost no experience in managing a company. It's common practice for business owners, especially new ones, to conduct research and consult with experts on how to run a business. This endeavor will give you great insight so you are able to anticipate unwanted events that could send your company spiraling out of control, and to allow you to build a contingency plan to get things back on track. There will, however, always be time-robbers and inefficiencies in your staff or workforce that will incur drawbacks and get your business a few calls from disappointed clients or customers.
adjustingto6figu

An Independent Adjuster's Guide to Write-Offs - Adjusting to 6 Figures - 0 views

  •  
    Each year, when tax season rolls around, you're bound to hear people talk about all of the things they're going to "write-off" on their taxes. While write-offs are a great tool for independent adjusters who want to minimize tax liability and maximize the money in their pocket, it is important to understand the basics of tax deductions. Keys to success include understanding what a write-off is, how it affects tax liability and, most importantly, what exactly can be written off.
Anne Bubnic

Digital Lifestyle Youth Culture Profile Report 2008 - 0 views

  • For example, miniDV cameras are not only among the new tools of self-expression, but the very act of creating personal videos with friends and creating events and key themes to shoot have become key aspects of entertainment in and of itself. To this generation, playing music via your cell phone, and movies and TV shows via your iPod are a given. Emailing is considered too old-school by many, whereas texting is outpacing cell phone calls. These things also go hand-in-hand with changes in online shopping patterns, top website preferences, communication and blogging patterns, and new habits for using social networks—not to mention the tremendous changes in preferred social networks and profile page usage patterns in general. These things are changing the paradigm of how the businesses of entertainment, communication, retail, marketing, advertising, and branding have been done in the past.
  • Unfortunately, as more companies pour big money into expanding their new media marketing components, as many people have discovered, the Field of Dreams theory (“if we build it, they will come”) certainly doesn’t apply when it comes to reaching savvy youth today. Popping up a site (or social network for that matter) no matter how cool it is means nothing if you can’t reach the market it’s intended for. This Report, therefore, also includes a great deal about how young people find out about new websites, communicate with others, and other forms of grassroots networking.
  • Overall, the Digital Lifestyle Youth Culture Profile Report 2008 not only reveals traits by target demographics, but also the growing generation gap occurring even within this generation.
  •  
    [Market Research Report]

    "Young people are the inherent trend leaders when it comes to new technology and usage patterns, and are the ones pushing forward the speed of change in communication and information technology. This Report reveals that it may be imperative for some brands to re-think strategies--even among progressive companies--if they are to reach youth culture effectively.
Anne Bubnic

Cell Phone Safety - 0 views

  • The fact that cell phones pose a great risk when combined with driving cannot be of any surprise to anyone. Let’s face it. First, drivers must take their eyes off the road while dialing. Second, people can become so absorbed in their conversations or other cell phone use that their ability to concentrate on the act of driving is severely impaired, jeopardizing the safety of vehicle occupants and pedestrians alike.
  • Time Away from Homework. Technology affords teens (and adults) a host of ways to do something other than what they are supposed to, in this case homework.
  • Mounting Minutes ($$$) Since consumers must be 18 in order to purchase a cell phone contract in the United States, most parents are buying the phones their children carry. This is good news because parents can choose a plan that fits how the cell phone will be used and can review monthly cell phone bills which typically includes a log itemizing phone activity. However, problems still exist. For one, children can quickly go over their allotted minutes for the month which can leave their parents with bills that can easily approach hundreds of dollars for the month.
  • ...1 more annotation...
  • Cell Phones and Gaming According to Sullivan (2004)3, when cellular phone games were simple, such as the knockoffs of the Atari-era "Breakout," there wasn't much to worry about. But newer phones with color displays and higher processing power create a landscape that might make some parents worried about what their kids are playing on the bus home from school.
  •  
    Today's cellular phones (cell phones) are more than just phones, they are hightech appliances that also serve as a mini-computers. Cell phones are electronic gadgets that allow users to surf the web, conduct text chats with others, take photos, record video, download and listen to music, play games, update blogs, send instant text messages to others, keep a calendar and to-do list, and more, much more. But cell phones also carry risks and cause distractions.
Anne Bubnic

Terror in the Classroom: What Can be Done?, Part 4 - 0 views

  • A survey conducted by MSN United Kingdom found that 74% of teens as compared to 80% in this study did not go to anyone for advice when they were cyberbullied (www.msn.co.uk/cyberbullying, 2006). One reason some teenagers are reluctant to tell parents or adults is the fear of retaliation.
  • Many times parents don't get involved because they are afraid of invading their teen's privacy. Others may feel that as long as they have filtering software their teen is protected from negative material.
  • Parents need to be educated about cyberbullying- what it looks like, what the effects are and how to handle it. Rosalind Wiseman, educator and author of the best seller "Queen Bees & Wannabes", suggest parents consider the following: Use technology as an opportunity to reinforce your family values. Attach rules and consequences if inappropriate behavior occurs. Move the computer out of your child's bedroom and into the family room. Teach your child not to share passwords. Install monitoring and filtering software. Monitor your child's screen name(s) and Web sites for inappropriate content. If cyberbullying occurs, save and print out any evidence and decide whom you should contact for assistance.
  • ...1 more annotation...
  • n Tinker v. Des Moines Independent Community School District, 393 U.S. 503 (1969). The court ruled that a student's right to free speech can be limited when the speech "materially disrupts class work or involves substantial disorder or invasion of the rights of others." The standard of "material disruption" set by Tinker is often referred to by the courts
  •  
    What Can Parents Do? Schools should start addressing students, parents and staff about the issues of cyberbullying. Students need to be reminded that what they do in cyberspace is not really anonymous. They need to know their behaviors and words are downloadable, printable and sometimes punishable by law. The courts have given some direction for schools dealing with cyberbullying. "School districts are well within their legal rights to intervene in cyberbullying incidents - even if these incidents were initiated off-campus - if it can be demonstrated that the incident resulted in a substantial disruption of the educational environment"
Anne Bubnic

Youth Work and Social Networking Research Project - 0 views

  •  
    This research is being carried out for The National Youth Agency who offer a range of opportunities for young people to influence policy and practice. How does youth work best support young people to manage the risks and make the most of the opportunities presented by social networking technology? Running from December 2007 till mid-January 2008 this UK-based survey seeks to identify youth workers current use of social networking technologies; their current role support young people to safely and effective use social networking technologies; their understanding of the benefits and risks of social networking technologies; their interests in developing their use of social networking technologies; and potential barriers to youth workers using, and supporting young people to use, social networking technologies.
Anne Bubnic

Managing Your Digital Footprint - 0 views

  •  
    When it comes to job hunting, people have no shortage of concerns: preparing a compelling resume, providing polished answers to interview questions, and having excellent references, just to name a few. But since the word "Google" became a verb, job seekers have one more thing to worry about: ensuring their online records won't deter hiring managers from making a job offer. Many employers are incorporating an informal online search of applicants into their review process. Whether or not negative information about you exists on the web, it's a good idea to ensure there are plenty of positive associations. This article from the folks at Adobe makes four recommendations for how to manage your digital footprint.
Anne Bubnic

Fair Use Evaluator from the ALA - 2 views

  •  
    1).Helps you better understand how to determine the "fairness" of a use under the U.S. Copyright Code. 2). Collects, organize & archive the information you might need to support a fair use evaluation. 3).Provides you with a time-stamped, PDF document for your records, which could prove valuable, should you ever be asked by a copyright holder to provide your fair use evaluation and the data you used to support it. 4). Provides you with a time-stamped, PDF document for your records [example], which could prove valuable, should you ever be asked by a copyright holder to provide your fair use evaluation and the data you used to support it.
Judy Echeandia

Facebook, Cell Phones, & iPods: Updating The K-12 Student Handbook - 0 views

  •  
    Today's students live in an incredibly high tech world- from cell phones to Facebook to YouTube to iPods- K-12 schools are faced with a multitude of new challenges that must be addressed in your student handbook. How can you restructure your student handbook to include the potential issues that may arise as a result of students' increased use of these technologies? Join us for a live, 60-minute audio conference where you and your colleagues will learn:
    * Keys to Drafting K-12 Handbook Policies for Today's Students
    * Online Use Policies: Facebook, MySpace & Online Communities
    * Crafting Guidelines & Policies for Cell Phone & iPod Use at School
    * Protecting Your School from Liability: What You Need to Know
    * Cyberbullying & Technology Misconduct: What Educators Must Know
Anne Bubnic

Five Tips: What to Do if Your Child Is Bullied Online - 0 views

  •  
    Parents can help kids avoid being victims by encouraging them not to post personal information online "that allows other people to see how vulnerable they are" to teasing, Willard says, and by asking them to communicate with friends, and friends of friends, only. Having the computer in a family room or other well-trafficked area allows Mom and Dad to better observe a child's reactions and gauge whether something is wrong.
adrinawinslet

Designing a Deal of the Day Page that increase Sales - 0 views

  •  
    Customers trust you more than they do your estore website or your pamphlets. Most Of the Attainable Customers Spend Many Hours Online Every Day In Order To Find Good Deal And Deal-of-the-day Is Known As An Effective Promotion. Deal of the day or the best buy of the week makes a big voice in attracting the visitors to check more items than they had earlier planned, to increase eStore conversions. Are you still wondering how to design a deal of the day page for my estore? Well, the crux is, a proper combination of the right imagery characteristics, standard designs & colors, core message text display & repetition, streamlined typography, and audience targeted design, is the core of consistent branding! Well-designed Deal of the Day page is one of the greatest marketing/sales tools and it goes a long way in getting it designed simple yet effective enough to add weight to the business website. For More Information Visit: http://bit.ly/2kxAlmu
adrinawinslet

How to Use Hashtags on Twitter, Facebook and Instagram - 0 views

  •  
    Hashtags were first introduced on Internet Relay Chats (IRC's were live chats and messaging - kind of a precursor to the social sites we use today). They became popular on Twitter, where they were initially used for "tweet chats". Tweet chats are like open group discussions around a particular topic. The essence of the "tweet chat" is still relevant in how marketers can use hashtags today. 3 Key Marketing Strategies for Hashtags - Brand and campaign specific - Trending Hashtags - Content Hashtags Businesses follow many ways to implement hashtags on social media. Social media hashtags deserve more attention from marketers. To increase their reach among an increasingly global market, more brands use social media analytics tools to change their Hashtag Marketing.
Anne Bubnic

Your Digital Footprint [Interactive Activity] - 0 views

  •  
    How much information about your daily life gets recorded by big business and Big Brother? Play this simple interactive scenario by conducting your normal transactions as you would on any given day. We'll show you how often you feed information about yourself to corporate and government databases. Then, play them again and try to see if you can reduce your digital footprint and see what benefits you'll lose trying to get off the grid.
Anne Bubnic

Teaching Media Literacy: Helping Kids Become Wise Consumers of Information - 0 views

  •  
    Analyzing and assessing sources is an essential part of all inquiry-based learning projects, but our multimedia world means that we have to teach kids not just how to assess data and arguments, but also how to discern emotional appeals made through pictures, music and video.
Anne Bubnic

Privacy Playground: The First Adventure of the Three CyberPigs - 0 views

  •  
    Privacy Playground: The First Adventure of the Three Little CyberPigs was developed by the Media Awareness Network. In this game, designed for ages 8-10, the CyberPigs play on their favourite Web site and encounter marketing ploys, spam and a close encounter with a not-too-friendly wolf. The purpose of the game is to teach kids how to spot online marketing strategies, protect their personal information and avoid online predators. The accompanying Teacher's Guide explains how to play the game, gives background information on the issues of online marketing, spam and children's privacy and provides activities and handouts for classroom use.
« First ‹ Previous 81 - 100 of 507 Next › Last »
Showing 20 items per page