Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged web policy

Rss Feed Group items tagged

Anne Bubnic

CoSN Receives MacArthur Grant to Explore Policy and Leadership Barriers to Web 2.0 - 0 views

  •  
    CoSN Receives MacArthur Grant: Exploring Policy and Leadership Barriers to Effective Use of Web 2.0 in Schools
    The $450,000 grant began July 1st and over the coming year CoSN will focus on the following key objectives:
    1.Identify findings from existing empirical research relevant to the use of new media in schools and the barriers to their adoption and scalability.
    2. Assess the awareness, understanding, and perspectives of U.S. educational leaders (superintendents, district curriculum and technology directors/CTOs) and policymaker's on the role, problems, and benefits of new media in schools within a participatory culture context.
    3. Investigate and document the organizational and policy issues that are critical obstacles for the effective deployment of new media.
    4. Develop a concise report of findings and construct an action plan for intervention.
Anne Bubnic

Schools Left in the Dust on the Social Media Highway - 4 views

  • "Our computer use policy is extensive. The frame is this is how you will use the computers when you are here, you can't go on these sites and do these things while you're at school, but when they get out from school and start using computers of their own to do some of these things, then it becomes a little bit more clouded," he said.
  • The problem NEOLA faces is a lack of law to base policies on regarding student and staff use of Facebook, Myspace, Twitter, etc. In turn, there are no policies for district administrators to follow, leaving a gray area for disciplinary issues. State legislature was passed regarding bullying, so NEOLA set policies based on that, but in terms of writing policy on technology, direction is what NEOLA is lacking.
Anne Bubnic

Curbing Cyberbullying in School and on the Web - 0 views

  • Many of the most egregious acts of cyberbullying do not take place during school hours or on school networks, a situation that presents a dilemma for public school administrators: If they punish a student for off-campus behavior, they could get hit with a freedom of speech suit.  If they do nothing, students may continue to suffer and school officials theoretically could get hit with failure to act litigation. For school administrators, it appears to be an unfortunate “catch-22.” For lawyers, it’s a “perfect storm,” pitting freedom of speech advocates against the victims of cyberbullying and schools that try to intervene. There are no easy answers in this arena, few laws, and no well-established precedents that specifically deal with cyberbullying.
  • “School administrators can intervene in cyberbullying incidents, even if the incidents do not take place on school grounds, if they can demonstrate that the electronic speech resulted in a substantial disruption to the educational environment.”
  • These cases illustrate not only a lack of precedent on cyberbullying cases, but also a dilemma for school administrators on how to handle cyberbullying.  “There are few laws that address how to handle cyberbullying, and many schools don’t have an internal policy to deal with cyberbullying that takes place off-campus,” offers Deutchman.  “It may take an unfortunate and tragic event on school property to get more schools to consider tackling electronic behavior that originates off campus.  It’s only a matter of time before a cyberbully, or the victim of cyberbullying, uses deadly force during school hours.”
  • ...5 more annotations...
  • So, what should schools do in the meantime?  First, school officials should establish a consistent internal policy (much like a crisis plan) and a team (minimally made up of the principal, school counselor, and technology director) to deal with cyber-misconduct. This team should fully document disruptive incidents and the degree to which the learning environment is affected. The principal should invite the cyberbully’s parents to review the offending material before considering disciplinary action. Most parents at this point will do the right thing.
  • Second, schools should educate children, starting in elementary school, about the importance of cyber-safety and the consequences of cyberbullying, especially on the school’s own network. These rules should be clearly posted in the computer labs and written in age-appropriate language. The rules should be sent home to parents each year—and they should be posted prominently on the school’s website.
  • Third, teachers should continue incorporating in their curriculum projects that utilize the web and other powerful new technologies. This probably won’t help schools avoid lawsuits; it’s just good pedagogy. It’s not surprising that schools that keep up with the latest technology and software—and employ teachers who care about the quality of online communication—report lower incidents of cyber-misconduct.
  • In addition, schools should update their codes of conduct to include rules that can legally govern off-campus electronic communication that significantly disrupts the learning environment. They should also assign enough resources and administrative talent to deal with students who engage in cyber-misconduct. One very big caveat: Disciplining a student for off-campus electronic speech should be done only as a last resort, and certainly not before seeking legal counsel.
  • Finally, schools should realize that not all cyberbullies need to be disciplined. Schools should act reasonably, responsibly, and consistently—so as to avoid the very bullying behavior they are trying to curb. Until the courts provide clear standards in the area of off-campus electronic speech for young people, these recommendations will go a long way in making schools a safer learning environment for everyone.
  •  
    Most school administrators have more than one story to tell about cyberbullying. They report that victims of cyberbullying experience low self-esteem, peer isolation, anxiety, and a drop in their grades. They note that victims may miss class or other school-related activities. Principals also point to recent high-profile cases where cyberbullying, left unchecked, led to suicide. In response, some schools have created new policies and curbed free speech on the school's computer network and on all electronic devices used during school hours. This article offers practical advice for actions schools can take to curb bullying, ranging from policy development to education.
Anne Bubnic

District Posting Policies for Web Content - 0 views

  •  
    This district directly addresses a code of ethics about content posted to the web. The content of Arp ISD Website, DVDs, CDs, videos, PodCasts, streaming video sessions, and publications directly reflect on the image of the district and as such must be handled responsibly, ethically, and taken seriously. Publications and media are intended to be used for the communication of school information and the activities of classes, clubs, athletics and other school events. The content of these Web pages and publications follow the same guidelines as the Arp ISD's acceptable Internet use policy. Submissions to the site will not permit unacceptable, obscene, derogatory or objectionable information, language, media or images.
Anne Bubnic

Teachers Driving Web 2.0 Use in Schools Says National Research Survey - 0 views

  • The research indicates that the movement toward Web 2.0 use to engage students and address individual learning needs is largely being driven in districts from the bottom up – starting with teachers and students
  • Overall, the research confirms school districts are using or planning to use several types of Web 2.0 technologies, but reveals there is still resistance to using online social networking for instructional purposes.
  • ther key results of the survey include: The three most frequently cited reasons for adopting Web 2.0 technologies are: addressing students’ individual learning needs, engaging student interest, and increasing students’ options for access to teaching and learning. Online communications with parents and students (e.g., teacher blogs) and digital multimedia resources are the Internet technologies most widely used by teachers, and a majority of districts have plans for adopting these technologies or promoting their use. Teacher-generated online content (e.g., multimedia lessons, wiki-based resources) is likely to be the next area of growth in the use of Web 2.0 technologies. Almost half of districts have plans for adopting or promoting the creation and sharing of this content through Web 2.0 tools.
  • ...1 more annotation...
  • Over the next several months, the companies will conduct online focus groups, prepare a white paper summarizing and interpreting the research, and develop resources based on the insights learned to help guide districts in harnessing the educational power of the collaborative Web
  •  
    While many stakeholders are involved in developing policies on the use of Web 2.0 technologies in K-12 education, new research suggests that teachers are the most important group driving adoption. This is a major finding from a national research survey of more than 500 district technology directors. The survey was commissioned by Lightspeed Systems Inc., a leader in network security and management software for schools, and Thinkronize Inc., creators of netTrekker, America's number one educational search tool, with support from Atomic Learning.
Judy Echeandia

Kansas State University Survey Delves into Cyberbullying - 0 views

  • A survey of more than 200 Kansas State University students — mostly freshmen — indicates 54 percent of them believe cyberbullying is a "minor problem" or a "common problem" among students at the university.
  • The survey used the cyberbullying definition provided in Kansas' anti-bullying law, which took effect in January 2008 and was revised in July to include cyberbullying. The law requires schools to develop anti-bullying policies, plans and preventative measures. Cyberbullying is the use of any electronic communication device, such as e-mail, instant messaging, text messages, blogs, mobile phones, pages, online games or Web sites, to create an intimidating, threatening or abusive environment.
  •  
    An online bullying survey was completed by 216 students - 93.7 percent were freshmen- enrolled in the University Experience classes at Kansas State University. The goal of the survey was to determine if bullying behavior followed students from high school into college and how freshmen perceived bullying. The survey used the cyberbullying definition provided in Kansas' anti-bullying law, which took effect in January 2008 and was revised in July to include cyberbullying. The law requires schools to develop anti-bullying policies, plans and preventative measures. Cyberbullying is the use of any electronic communication device, such as e-mail, instant messaging, text messages, blogs, mobile phones, pages, online games or Web sites, to create an intimidating, threatening or abusive environment.
Margaret Moore-Taylor

Web 2.0/Mobile AUP Guide - 2 views

  •  
    This is a guide to assist school districts in developing, rethinking or revising Internet policies as a consequence of the emergence of web 2.0 and the growing pervasiveness of smart phone use.
Margaret Moore-Taylor

AUPs in a Web 2.0 World | EdTech Magazine - 0 views

  •  
    A good article regarding some of the steps you should think about when updating your acceptable use policies
Anne Bubnic

CTAP4 Cybersafety Project: School AUPs - 0 views

  •  
    With the proliferation of Web 2.0 tools, rapidly emerging technologies and portable electronic devices, your AUP may need frequent updating. In this section of the CTAP CyberSafety Project web site, you'll find helpful resources for all areas of consideration, including cell phone policies.
Anne Bubnic

AUPs in a Web 2.0 World - 0 views

  •  
    Chances are your district's acceptable use policy is outdated. With the proliferation of Web 2.0 tools, multifunction cell phones and handheld computers, to name just three, it's obvious that keeping AUPs up to date requires constant attention.
Brevity Software Solutions Pvt Ltd

How Travel Portal Development Company can Enhance your Travel and Tourism Business - 0 views

  •  
    Brevity Software Solutions is Well-known one of the best travel portal development company. We offer contacting, growth for all the areas of B2B & B2C journey website growth in addition to journey API integration for flight making your reservation for, in making your reservation for, journey packages, coach making your reservation for, auto leasing, vacation cruise making your reservation for in addition to insurance policies. We offer light branded option for journey web development and as well as travel booking software projects.
Anne Bubnic

The Millennials Are Coming! - 0 views

  • Most agencies manage sensitive citizen data: addresses, Social Security numbers, financial records and medical information. You name it, some state or local office has it, and probably electronically. The problem? Many theorize that the Millennials' penchant for online openness could unintentionally expose private information, leaving it ripe for the picking. Millennials bring innovative ideas about technology's use, but for that same reason, do they also pose new security risks?
  • Anti-virus vendor Symantec released a study in March 2008 assessing this issue. Symantec commissioned Applied Research-West to execute the study, and 600 participants were surveyed from different verticals, including government. Survey participants included 200 IT decision-makers, 200 Millennial workers and 200 non-Millennial workers born before 1980. The data revealed that Millennials are more likely than workers of other ages to use Web 2.0 applications on company time and equipment. Some interesting figures include: 69 percent of surveyed Millennials will use whatever application, device or technology they want at work, regardless of office IT policies; and only 45 percent of Millennials stick to company-issued devices or software, compared to 70 percent of non-Millennials.
  • How might young people be workplace assets? Could all that time typing or texting make them speedy typists, able to whip up memos at the drop of a hat? Does familiarity with new and emerging technologies have its benefit? You bet, according to Dustin Lanier, director of the Texas Council on Competitive Government. The council brings state leaders together to shape policy for government departments, including IT. "I think they've built an approach to work that involves a lot of multitasking," Lanier said of the Millennials. "Something will be loading on one screen, you alt-tab to another application and pull up an e-mail, the first process loads, you flip back, start a new process, flip to a forum and pull up a topic. It's frenetic but normal to that group." Lanier doesn't think Millennials present more of an IT threat than their older co-workers. After all, young people don't have a monopoly on being distracted in the office. "I can't tell you how many times I've walked by people's desks of all ages and seen Minesweeper up," he said. He thinks employers should embrace some Web 2.0 applications. Otherwise, Millennials might be discouraged from sticking around. According to Lanier, this younger work force comprises many people who think of themselves as free agents. Government should accommodate some of their habits in order to prevent them from quitting.
  •  
    Get ready CIOs. They're coming. They have gadgets and doohickeys galore. They like their music downloadable and portable, and they grew up with the Internet, not before it. Their idea of community is socializing with people in other cities or countries through Facebook, MySpace or instant messages, and they use e-mail so often they probably think snail mail is an endangered species. They're the Millennials - those tech-savvy, 20-somethings and-under bound to warm up scores of office chairs left cold by retiring baby boomers. There's a good chance many will come to a government workplace near you, but their digital literacy could prove worrisome for security-conscious bosses.
Anne Bubnic

Learning to Change-Changing to Learn [Video] - 0 views

  •  
    Learning to Change Changing to Learn Advancing K-12 Technology Leadership, Consortium for School Networking(COSN) Video. COSN was the recent recipient of a $450,000 grant from the MacArthur Foundation to explore policy and leadership barriers to Web 2.0.
Anne Bubnic

Memphis area students punished for fight on Web - 0 views

  •  
    Another YouTube brawl earns suspension for two girls. Two Southwind Middle School girls were suspended Monday after their locker room fight was posted on the Internet. This follows similar beatings in Indiana and Florida where the acts were committed in order to videotape the event. School principal Marcia Crouch sent a note home to parents Monday afternoon alerting them about the fight and warning them of the school district's zero-tolerance policy regarding such misbehavior.
Anne Bubnic

Schools left in the dust on social media highway - 2 views

  •  
    There are no policies at any of the three districts that directly addresses popular social networking Web sites, because, administrations are finding, they can't keep up with technology.
Anne Bubnic

Eight Tips for Monitoring and Protecting Your Online Reputation - 9 views

  •  
    Here are 8 tips to monitor and protect one's online reputation from the U.S. Government Information Security Blog: Search your name. Type your first and last name within quotation marks into several popular search engines to see where you are mentioned and in what context. Narrow your search and use keywords that apply only to you, such as your city, employer and industry association. Expand your search. Use similar techniques to search for your telephone numbers, home address, e-mail addresses, and personal website domain names. You should also search for your social security and credit card numbers to make sure they don't appear anywhere online. Read blogs. If any of your friends or coworkers have blogs or personal web pages on social networking sites, check them out to see if they are writing about or posting pictures of you. Sign up for alerts. Use the Google alert feature that automatically notifies you of any new mention of your name or other personal information. Limit your personal information. Tweet/chat/discuss regarding business and the emerging trends in your industry, but limit posting information on your personal life, which could be a subject of major scrutiny by recruiters and hiring managers. Also, be sure you know how organizations will use your information before you give it to them. Use privacy settings. Most social networking and photo-sharing sites allow you to determine who can access and respond to your content. If you're using a site that doesn't offer privacy settings, find another site. Choose your photos and language thoughtfully. You need to ensure that information posted online is written professionally without use of swear words and catchy phrases. Also, be very selective in posting photographs, and use your judgment to ensure that these photographs are how you want the world to see you. Take action If you find information about yourself online that is embarrassing or untrue, cont
buyglobalshop

Buy Google Ads Accounts - Best Quality Everything Google Ads Accounts 2024 - 0 views

  •  
    Google Advancements is a strong web progressing organize that has totally changed how companies communicate with their target show off. Let's to begin with see at this tool's imperative component, the Google AdWords account, a few time as of late looking at its full capabilities. To put it essentially, a Google AdWords account is your virtual entryway to online campaign creation, organization, and optimization. It gives you the control and assets you require to make compelling headways, develop up budget objectives, select adjust watchwords, and track the ampleness of your advancements in genuine to goodness time. On a very basic level, your Google Advancements account serves as the central point for all of your publicizing endeavors, permitting you to effectively interface with your target bunch of onlookers all through Google's wide organize of websites and services. Buy Google Ads Accounts Why ought to to you purchase a Google Advancements account? In the age of digitalization, publicizing has gotten to be an basic component of a useful commerce organize. Considering that billions of individuals utilize the web each day, making the most of online publicizing channels is basic to opening up brand mindfulness and coming to a more prominent gathering of people. One of the best methods to show off your stock or organizations to orchestrated clients is through Google Takes note, once in the past known as Google AdWords. Here are a few solid debate for getting a Google AdWords account if you're considering about getting into the online progressing space. Buy Google Ads Accounts Draw in a Clearing Audience: Specialized Promotion Cost-Effective Advertising: Quantifiable Results: Quick and Coordinate Set-Up: Understanding Google Advancements Account? Online publicizing has wrapped up up a vital allocate of any compelling showing strategy in today's digitally-driven society. And Google Advancements is among the most compelling contraptions open to marketers and
Anne Bubnic

The Newest Breed of Bully, the Cyberbully - 0 views

  • While some of what is published online may seem libelous (i.e., intended to harm the reputation of another), proving that point can be difficult and expensive. In order to prove libel, you have to prove malicious intent, something that might prove difficult if the offending Web page was put up by an adolescent. And many times, freedom of speech wins out.
  • Unless an actual crime has taken place, law enforcement officials often are unable to arrest anyone, even if they can identify the culprit. According to Lt. John Otero, commanding officer of the computer crime squad for the New York City Police Department, individuals would actually have to post a direct threat in order for the police to act. "For example, if they say, 'tomorrow I am going to hurt, kill, or injure an individual,' that would constitute a crime," he explains. A person posting such a threat could be arrested and charged with aggravated harassment. Although Otero says his department has seen some arrests, anyone under the age of 18 would not be dealt with harshly: "If the kid is too young, he would get a scolding and the incident would be brought to the parents' attention; if they are under 16, they are considered minors."
  • Like cliques, cyberbullying reaches its peak in middle school, when young adolescents are trying to figure out who their friends are and whether they fit in. "Third- and 4th-graders are just having fun with computers," says Loretta Radice, who taught computer skills to middle-schoolers in public and private schools for more than 15 years.
  • ...1 more annotation...
  • While the cyber- bully believes he cannot be caught, Radice notes that everyone leaves footsteps in cyberspace. "Everything is traceable," she says. "Kids often don't realize that."
  •  
    Because cyberbullying is such a new phenomenon, school and law enforcement officials in the United States and other countries are still sorting out the legal technicalities. "Most of what is done online is protected as free speech," says Frannie Wellings, policy fellow at the Electronic Privacy Information Center in Washington, DC.
Anne Bubnic

Social Media and Digital Citizenship - 2 views

  • Content filters, policies and guideline aren’t the final answer. If we are to have our students become true citizens we need to it though teaching.
Anne Bubnic

Parent Permission Sample for Read/Write Activities on the Web - 0 views

  •  
    This form is powered by Wufoo Online forms and is a 'guide' to getting parent permission at the teacher level to allow students to participate in read/write activities. It is not a 'policy'. You will need to produce a printed version to ensure that you have a signature. Ensure that you provide adequate opportunity for parents to contact you with questions or express an interest in parental education about the read/write web.
1 - 20 of 24 Next ›
Showing 20 items per page