Eight Ways to Handle Cyberbullies - 0 views
-
1. Identify and blockFirst, ask your child not to respond or retaliate, no matter how tempting it may be to fight back. If you can identify who's cyberbullying your child, block any further communications.
-
2. Set boundariesYou, not your kids, should also contact the bully (or bullies) and demand the offending behavior stop
-
3. File a complaint Most cyberbullying behavior -- harassment, threats, invasion of privacy, stalking -- are violations of a web site or Internet service provider's "terms of service."
- ...5 more annotations...
-
Nancy Willard and Anne Collier offer eight ways to deal with cyberbullies in this article.
1. Identify and block.
2. Set boundaries.
3. File a complaint.
4. Contact the school
5. Send the parents a certfied "cease and desist" letter.
6. Call an attorney.
7. Contact the local police.
8. Talk with your kids about what's acceptable.
From MySpace to Hip Hop, A MacArthur Forum, Part 2 - 0 views
-
From MySpace to Hip Hop, A MacArthur Forum, Part 2
This is the second of three videos, researchers who presented their work were: Mimi Ito, University of Southern California, Participatory Learning in a Networked Society:Lessons From the Digital Youth Project;danah boyd, University of California Berkeley, Teen Socialization Practices in Networked Publics; Heather Horst, University of California Berkeley, Understanding New Media in the Home; Dilan Mahendran, University of California Berkeley, Hip Hop Music and Meaning in the Digital Age.
A Web 2.0 Approach To Cybersafety [Nancy Willard] - 0 views
-
An effective school-based strategy to address the issue of online safety should include these six key components:
EDUCATIONAL USE - Schools must ensure that when students use the Internet, their activities have an educational purpose -- class assignments, extra credit work, and perhaps some high quality enrichment activities as a reward
SUPERVISION AND MONITORING Schools must shift focus from reliance on filtering to better supervision and monitoring.
MEANINGFUL CONSEQUENCES Misuse of the Internet must lead to a meaningful consequence -- but it should be recognized that suspension of Internet access privileges just causes more work for teachers. Requiring a service contribution to the school and establishing "close monitoring status" for all Internet use are preferable consequences.
ACCIDENTAL ACCESS TO PORN - All students and staff must know that if inappropriate material appears, they should quickly turn off the monitor or turn it so it can't be seen, and then report it. Following any incident or discovery, there must be a responsible assessment of culpability.
INAPPROPRIATE BLOCKING Selected staff in every school building must have the authority and ability to quickly override the filter to provide other staff or students access to sites that have been inappropriately blocked
INTERNET SAFETY AND RESPONSIBLE USE EDUCATION Schools must provide effective Web 2.0 Internet safety and responsible use education to students and parents.
Internet 2: K20 Initiative/Global Learning - 0 views
-
Internet2 is a non-profit membership organization of 208 universities working in conjunction with government and industry to operate a private national Internet Protocol (IP) network reserved for the exclusive use of the US research and education (R&E) community.As the national R&E backbone, the Internet2 Network provides connectivity between institutions and connectivity to international research and education networks thereby providing access to the global research and education community. While there are many benefits of using Internet2 in the classroom here are the top three for K12:
1. Immediate access to experiences and expertise
2. Access to rich multi-media digital collections and resources
3. A truly global education network at your fingertips.
In California, we have a localized statewide version of this effort called K12 High Speed Network/K12HSN
Bullying Policy at Hudson Area School District - 0 views
-
Bullying or other aggressive behavior toward a student, whether by other students, staff, or third parties, including Board members, parents, guests, contractors, vendors, and volunteers, is strictly prohibited. This prohibition includes physical, verbal, and psychological abuse, including hazing, gestures, comments, threats, or actions to a student, which cause or threaten to cause bodily harm, reasonable fear for personal safety or personal degradation. Demonstration of appropriate behavior, treating others with civility and respect, and refusing to tolerate harassment or bullying is expected of administrators, faculty, staff, and volunteers to provide positive examples for student behavior. This policy applies to all activities in the District, including activities on school property, in a school vehicle, and those occurring off school property if the student or employee is at any school-sponsored, school-approved or school-related activity or function, such as field trips or athletic events where students are under the school’s control, or where an employee is engaged in school business. Misconduct occurring outside of school may also be disciplined if it interferes with the school environment. "Bullying" is any gesture or written, verbal, graphic, or physical act (including electronically transmitted acts – i.e. internet, telephone or cell phone, personal digital assistant (PDA), or wireless hand held device) that is reasonably perceived as being motivated either by any actual or perceived characteristic, such as race, color, religion, ancestry, national origin, gender, sexual orientation, gender identity and expression or a mental, physical, or sensory disability or impairment; or by any other distinguishing characteristic. Such behavior is considered harassment or bullying whether it takes place on or off school property, at any school-sponsored function, or in a school vehicle.
Web 2.0/Mobile AUP Guide - 2 views
2 part syringe - 1 views
-
The two part syringe is assembled by barrel, plunger, with/without hypodermic needle. There is a constriction near the barrel's handles which is a well-defined plunger stop and can effectively prevent the plunger from accidentally pulling out during use. The hypodermic syringes used together with hypodermic needles are intended to inject the drug for the patient or take out the blood for the patient.
C-SAVE | STAYSAFEONLINE.org - 1 views
-
NCSA launched the Cyber Security Awareness Volunteer Education Project (C-SAVE) in April of 2009. The program will teach youngsters not just to be wary of online predators and bullies but alert to the tricks of data thieves and scam artists. Curriculum is customized for three grade levels: K-2, 3-5 and middle/high school. What makes this program unique is that they plan to use "tech pros" from the technology industry to deliver the curriculum in the classroom.
SecretBuilders: Virtual World for Young Children - 5 views
-
SecretBuilders is a virtual world for children 5 to 14 years old powered by a web 2.0 community of children, parents, educators, writers, artists and game developers. On SecretBuilders, kids explore virtual lands, undertake quests, play games, maintain a home, nurture a pet, and interact with their friends.
Flat Classroom Project - 3 views
ISTE | NETS for Teachers 2008 - 0 views
-
In June 2008, the International Society of Technology in Education (ISTE) released an update to their technology standards for teachers. The revised National Educational Technology Standards (NETS) for Teachers mark a significant overhaul of the group's original teacher technology standards, which ISTE introduced in 2000. The new ISTE teacher standards begin with the assumption that every teacher recognizes the importance of technology and how it can transform teaching and learning. The revised framework focuses on what teachers should know to help students become productive digital learners and citizens. "NETS for Teachers, Second Edition" includes five categories, each with its own set of performance indicators:
1.Facilitate and inspire student learning and creativity
2. Design and develop digital-age learning experiences and assessments
3.Model digital-age work and learning
4. Promote and model digital citizenship and responsibility
5. Engage in professional growth and leadership.
Webware 100 Awards 2008 - 0 views
Libraries booking young video gamers - 0 views
-
The American Library Association has announced a new project funded with a $1 million grant from the Verizon Foundation, the charitable branch of Verizon Communications.
-
Libraries that already have mature gaming systems in place will be studied to gauge how electronic games improve players' literacy skills. Then, a dozen leading national gaming experts, including a Tucson librarian, will build a tool kit that libraries across the country can use to develop gaming programs.
-
There's growing evidence that games in general, from the traditional board versions to electronic and online ones, support literacy and 21st-century learning skills, she said, though libraries have been slow to capitalize on them.
- ...2 more annotations...
-
If you made a list of sounds you might hear at your local library, the rumbling of explosions and the loud hum of race-car engines probably wouldn't rank high on it. But in a darkened room at the Quincie Douglas Branch Library, about 20 preteens and teens gather around two screens. It's a mostly soundproof room, to make sure their efforts to rack up points on Nintendo's Wii and PlayStation 2 don't bother the consumers of decidedly more static media. It's a sight that could become more frequent at a library near you.
Protecting Your Online Identity and Reputation - 0 views
-
Remember that nothing is temporary online. The virtual world is full of opportunities to interact and share with people around the world. It's also a place where nothing is temporary and there are no "take-backs." A lot of what you do and say online can be retrieved online even if you delete it — and it's a breeze for others to copy, save, and forward your information.
-
Mark your profiles as private. Anyone who accesses your profile on a social networking site can copy or screen-capture information and photos that you may not want the world to see. Don't rely on the site's default settings. Read each site's instructions or guidelines to make sure you're doing everything you can to keep your material private.
-
Safeguard your passwords and change them frequently. If someone logs on to a site and pretends to be you, they can trash your identity. Pick passwords that no one will guess (don't use your favorite band or your dog's birthday; try thinking of two utterly random nouns and mixing in a random number), and change them often. Never share them with anyone other than your parents or a trusted adult. Not even your best friend, boyfriend, or girlfriend should know your private passwords!
- ...6 more annotations...
-
Advice for teens from www.kidshealth.org. Here are some things to consider to safeguard your online identity and reputation:
1. Remember that nothing is temporary online
2. Mark your profile as private.
3. Safeguard your passwords and change them regularly.
4. Don't post inappropriate or sexually provocative pictures or comments.
5. Don't respond to inappropriate requests
6. Take a breather to avoid "flaming."
7. Learn about copyrights.
8. Check your digital footprint.
9. Take it offline.
The Millennials Are Coming! - 0 views
-
Most agencies manage sensitive citizen data: addresses, Social Security numbers, financial records and medical information. You name it, some state or local office has it, and probably electronically. The problem? Many theorize that the Millennials' penchant for online openness could unintentionally expose private information, leaving it ripe for the picking. Millennials bring innovative ideas about technology's use, but for that same reason, do they also pose new security risks?
-
Anti-virus vendor Symantec released a study in March 2008 assessing this issue. Symantec commissioned Applied Research-West to execute the study, and 600 participants were surveyed from different verticals, including government. Survey participants included 200 IT decision-makers, 200 Millennial workers and 200 non-Millennial workers born before 1980. The data revealed that Millennials are more likely than workers of other ages to use Web 2.0 applications on company time and equipment. Some interesting figures include: 69 percent of surveyed Millennials will use whatever application, device or technology they want at work, regardless of office IT policies; and only 45 percent of Millennials stick to company-issued devices or software, compared to 70 percent of non-Millennials.
-
How might young people be workplace assets? Could all that time typing or texting make them speedy typists, able to whip up memos at the drop of a hat? Does familiarity with new and emerging technologies have its benefit? You bet, according to Dustin Lanier, director of the Texas Council on Competitive Government. The council brings state leaders together to shape policy for government departments, including IT. "I think they've built an approach to work that involves a lot of multitasking," Lanier said of the Millennials. "Something will be loading on one screen, you alt-tab to another application and pull up an e-mail, the first process loads, you flip back, start a new process, flip to a forum and pull up a topic. It's frenetic but normal to that group." Lanier doesn't think Millennials present more of an IT threat than their older co-workers. After all, young people don't have a monopoly on being distracted in the office. "I can't tell you how many times I've walked by people's desks of all ages and seen Minesweeper up," he said. He thinks employers should embrace some Web 2.0 applications. Otherwise, Millennials might be discouraged from sticking around. According to Lanier, this younger work force comprises many people who think of themselves as free agents. Government should accommodate some of their habits in order to prevent them from quitting.
-
Get ready CIOs. They're coming. They have gadgets and doohickeys galore. They like their music downloadable and portable, and they grew up with the Internet, not before it. Their idea of community is socializing with people in other cities or countries through Facebook, MySpace or instant messages, and they use e-mail so often they probably think snail mail is an endangered species. They're the Millennials - those tech-savvy, 20-somethings and-under bound to warm up scores of office chairs left cold by retiring baby boomers. There's a good chance many will come to a government workplace near you, but their digital literacy could prove worrisome for security-conscious bosses.
Cyber Bullying: A Prevention Curriculum for Grades 6-12 [Book] - 1 views
-
Cyber Bullying: A Prevention Curriculum for Grades 6-12 is a curriculum that deals with attitudes and behaviors associated with cyber bullying. This eight-session curriculum is designed to:
1. Raise student and parent awareness of what cyberbullying is and why it is so harmful
2. Equip students with the skills and resources to treat eachother respectfully when using cybertechnologies
3. Give students information about how to get help if they, or others they know, are being cyber bullied
4. Teach students how to use cyber technologies in positive ways.
Cyberbullying Prevention Curriculum Scope & Sequence: GR 6-12 [PDF] - 0 views
-
Developed by the folks who designed the Olweus Bullying Prevention program, this curriculum offers students an opportunity to:
1. interact, collaborate and publish with peers, experts or others, employing a variety of digital environments and media.
2.communicate information and ideas effectively to multiple audiences, using a variety of media and formats
3. contribute to project teams to produce original works or solve problems.
Top 5 Technologies used to Cyberbully - 0 views
SB 2426 Cyberbullying Law passes [Illinois] - 0 views
-
Amends the Harassing and Obscene Communications Act. Creates the Cyberbullying Law. Provides that the offense of harassment through electronic communications also includes the use of electronic communication for making a harassing statement for the purpose of alarming, tormenting, or terrorizing a specific person on at least 2 separate occasions; or creating and maintaining an Internet website or webpage, which is accessible to one or more third parties for a period of at least 24 hours, and which contains harassing statements made for the purpose of alarming, tormenting, or terrorizing a specific person. Establishes penalties. Effective immediately. The new law takes effect January 1st and provides that the Internet safety curriculums in schools will begin with the 2009-2010 school year. The bill allows the age-appropriate unit of instruction to be incorporated into the current courses of study regularly taught in the districts' schools.
‹ Previous
21 - 40 of 231
Next ›
Last »
Showing 20▼ items per page
Interview with the Honorable Melissa Bean, Larry Magid, Nancy Willard and Sharon Miller Cindrich.