Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged 3

Rss Feed Group items tagged

syukron nuryadi

HARGA HP SAMSUNG - H - 1 views

image

harga samsung hp

started by syukron nuryadi on 11 Apr 14 no follow-up yet
syukron nuryadi

SAMSUNG GALAXY CENTU - 0 views

image

samsung manual galaxy

started by syukron nuryadi on 19 Apr 14 no follow-up yet
Anne Bubnic

Do your kids use Formspring.me? - 5 views

  • Conversations on each page quickly degenerated into some general types of questions/comments: “I hate you” comments were remarkably prevalent. I saw people calling each other names that I wouldn’t use around my closest friends. Moreover, the frequency of these comments was staggering. In a lot of ways, this site more or less encourages cyber-bullying, and does it in a public space. “You’re awesome” comments are much less disturbing, but encourage a pretty self-centered view on life. For example, I saw a few comments such as, “Why are people judging you? You’re so nice!” Not surprisingly, the students in question respond with statements about how they are good people that don’t judge other people but that other people actually judge them. Questions/comments about sex. Every question that can be asked about a person’s sexual history, preference, etc. is being discussed in public for the world to see. Like I said – I’ll never look at some kids the same way again. This site allows a space for kids to do discuss these things in an uncontrolled environment without talking about issues with parents or teachers or people who may have a little more experience and wisdom. Think MySpace encouraged risky behavior? Looking at two pages on Formspring, I saw full names, cities, and cell phone numbers posted for all the world to see. At our school, we try to teach kids what information to put out there and to be responsible citizens of the internet. Apparently our lessons aren’t sticking.
  •  
    Formspring.me, has the potential to be more dangerous to students than most other websites I've heard of. Just to give you an idea of it's prevalence, I took a quick poll of my 8th graders. About 1/3 have a Formspring page. About 3/4 know about Formspring.me.
  •  
    I appreciate your sharing this!
buyglobalshop

Buy Verified Payoneer Accounts - 100% Best Quality & full document verified - 0 views

  •  
    If you have been investigating diverse alternatives for overseeing your accounts, you may have come over the term Payoneer accounts. But what precisely is a Payoneer account, and how can it advantage you? Payoneer is a worldwide installment stage that permits people and businesses to send, get, and oversee their cash over borders. With a Payoneer account, you can get installments from clients and marketplaces around the world, all whereas profiting from competitive trade rates and moo fees. Buy Verified Payoneer Accounts Is it secure to utilize Payoneer? In today's advanced age, online installment stages have ended up progressively prevalent for businesses and people alike. Payoneer is one such stage that offers clients a helpful way to send and get cash over borders. In any case, with the rise of cyber dangers and information breaches, numerous individuals are cleared out pondering: In this article, we will investigate the security highlights that Payoneer has in put to secure its users' touchy data. From encryption to personality confirmation forms, we will look at the safety measures that Payoneer takes to guarantee the security of its stage. Also, we will examine common dangers related with utilizing online installment administrations and give tips on how to encourage secure your accounts whereas utilizing Payoneer. By the conclusion of this article, you will have a way better understanding of the security measures in put when utilizing Payoneer and feel more sure in utilizing this stage for your monetary transactions. Buy Verified Payoneer Accounts Can I utilize Payoneer to get installments from clients? Yes, you can unquestionably utilize Payoneer to get installments from clients. Payoneer is a prevalent installment benefit that is trusted by millions of clients around the world for its unwavering quality and security. It permits you to effectively get reserves from clients, companies, or marketplaces in a fast and effective manner. When you utilize Pa
Anne Bubnic

Taking risky opportunities in youthful content creation. - 0 views

  •  
    Taking risky opportunities in youthful content creation: teenagers' use of social networking sites for intimacy, privacy and self-expression.
    The explosion in social networking sites such as MySpace, Facebook, Bebo and Friendster is widely regarded as an exciting opportunity, especially for youth.Yet the public response tends to be one of puzzled dismay regarding a generation that, supposedly, has many friends but little sense of privacy and a narcissistic fascination with self-display. This article explores teenagers' practices of social networking in order to uncover the subtle connections between online opportunity and risk. Reprints of the complete article are available for a fee from Sage Publishing.
Anne Bubnic

Eight Ways to Handle Cyberbullies - 0 views

  • 1. Identify and blockFirst, ask your child not to respond or retaliate, no matter how tempting it may be to fight back. If you can identify who's cyberbullying your child, block any further communications.
  • 2. Set boundariesYou, not your kids, should also contact the bully (or bullies) and demand the offending behavior stop
  • 3. File a complaint Most cyberbullying behavior -- harassment, threats, invasion of privacy, stalking -- are violations of a web site or Internet service provider's "terms of service."
  • ...5 more annotations...
  • 4. Contact the schoolIf you know the bully attends the same school as your child, teachers and administrators might be able to help.
  • 5. Send a certified letterIf you've done all you can and the bullying hasn't stopped, send the child's parents a certified "cease and desist" letter.
  • 6. Call an attorneyIn the worst case scenario, a lawyer can help you consider filing a civil suit against bullies and/or their parents for defamation, harassment or other causes.
  • 7. Contact the local policeIf there's any evidence that the cyberbully's tactics include criminal actions, such as hate crimes, physical threats or talk of brandishing weapons at school, contact your local police immediately.
  • . Talk with your kids about what's acceptableAnne Collier, editor of NetFamilyNews web site, an email newsletter about online safety for kids, says to truly stop cyberbullying, however, you have to first know what's happening when your kids are online.
  •  
    Nancy Willard and Anne Collier offer eight ways to deal with cyberbullies in this article.
    1. Identify and block.
    2. Set boundaries.
    3. File a complaint.
    4. Contact the school
    5. Send the parents a certfied "cease and desist" letter.
    6. Call an attorney.
    7. Contact the local police.
    8. Talk with your kids about what's acceptable.

Anne Bubnic

From MySpace to Hip Hop, A MacArthur Forum, Part 3 - 0 views

  •  
    From MySpace to Hip Hop, A MacArthur Forum, Part 3
    This is the third of three videos, a panel discussion featuring Dale Dougherty,General Manager, Maker Media Division, O'Reilly Media; Deborah Stipek, Dean, Stanford University School of Education; Kenny Miller, EVP & Creative Director, MTV Networks' Global Digital Media; Linda Burch, Chief Education & Strategy Officer,\nCommon Sense Media and moderator Connie Yowell, Director of Education, The MacArthur Foundation
Anne Bubnic

Online Safety 3.0: Empowering and Protecting Youth - 2 views

  •  
    Online Safety 3.0 enables youth enrichment and empowerment. Its main components - new media literacy and digital citizenship - are both protective and enabling. Ideally from the moment they first use computers and cellphones, children are learning how to function mindfully, safely and effectively as individuals and community members, as consumers, producers, and stakeholders. The kind of online well-being we identify as "online safety" isn't logically something completely new and different added on to parenting and the school curriculum.
Anne Bubnic

Student Voices: Cyberbullying (Part 3) - 2 views

  •  
    This Comcast segment (Part 3) highlights cyber-bullying where teens discuss their personal experiences of being cyber-bullied, identify safety tips, and discuss how and when to make a report.
buyglobalshop

Buy Verified Cash App Accounts - 100% BTC Enable 100% Best Bitcoin Enabled. - 0 views

  •  
    With the rise of online installment frameworks, Cash App has rapidly gotten to be a well known choice for numerous clients looking to send and get cash effortlessly. But what precisely is a Cash App account? Basically, a Cash App account is a computerized wallet that permits clients to store cash, make installments, and get cash back rewards all through their portable gadget. With highlights like coordinate store, Bitcoin contributing, and the capacity to buy stocks, Cash App has advanced past fair a straightforward peer-to-peer installment platform. Buy Verified Cash App Accounts How does Cash App work? In today's advanced age, the way we handle cash has advanced essentially. Cash App is one of the numerous devices that have risen to make overseeing our accounts less demanding and more helpful. But how precisely does Cash App work, and how can it advantage you? In this article, we will investigate the ins and outs of Cash App, from the nuts and bolts of setting up an account to utilizing its different highlights to send and get cash rapidly and securely. To put it basically, Cash App is a portable installment stage that permits clients to effectively send, get, and exchange cash straightforwardly from their smartphones. With fair a few taps, clients can connect their bank accounts or charge cards to their Cash App account to rapidly get to and oversee their reserves. Whether you need to pay a companion back for supper, part bills with roommates, or indeed get installments for administrations rendered, Cash App gives a consistent way to handle all your money related exchanges with ease. So, if you're inquisitive almost how this app can revolutionize the way you handle your cash, keep perusing to learn more almost the benefits and highlights of Cash App. Buy Verified Cash App Accounts Is Cash App secure to use? The brief reply is yes, Cash App is by and large considered secure to utilize. Like any budgetary app or benefit, there are certain measures in put to
Anne Bubnic

C-SAVE | STAYSAFEONLINE.org - 1 views

  •  
    NCSA launched the Cyber Security Awareness Volunteer Education Project (C-SAVE) in April of 2009. The program will teach youngsters not just to be wary of online predators and bullies but alert to the tricks of data thieves and scam artists. Curriculum is customized for three grade levels: K-2, 3-5 and middle/high school. What makes this program unique is that they plan to use "tech pros" from the technology industry to deliver the curriculum in the classroom.
Go Jobio

Best Ideas On Demand - 0 views

  •  
    GoJobio.com was 1 of 3 companies featured by Uber Pitch Philly! Read Below. On Friday, April 17, we teamed up with prominent early-stage investors in Philly to make once-in-a-lifetime opportunities available on-demand with UberPITCH. http://blog.uber.com/uberpitch-in-review-2015-philly
Anne Bubnic

ISTE | NETS for Teachers 2008 - 0 views

  •  
    In June 2008, the International Society of Technology in Education (ISTE) released an update to their technology standards for teachers. The revised National Educational Technology Standards (NETS) for Teachers mark a significant overhaul of the group's original teacher technology standards, which ISTE introduced in 2000. The new ISTE teacher standards begin with the assumption that every teacher recognizes the importance of technology and how it can transform teaching and learning. The revised framework focuses on what teachers should know to help students become productive digital learners and citizens. "NETS for Teachers, Second Edition" includes five categories, each with its own set of performance indicators:
    1.Facilitate and inspire student learning and creativity
    2. Design and develop digital-age learning experiences and assessments
    3.Model digital-age work and learning
    4. Promote and model digital citizenship and responsibility
    5. Engage in professional growth and leadership.

Anne Bubnic

Protecting Your Online Identity and Reputation - 0 views

  • Remember that nothing is temporary online. The virtual world is full of opportunities to interact and share with people around the world. It's also a place where nothing is temporary and there are no "take-backs." A lot of what you do and say online can be retrieved online even if you delete it — and it's a breeze for others to copy, save, and forward your information.
  • Mark your profiles as private. Anyone who accesses your profile on a social networking site can copy or screen-capture information and photos that you may not want the world to see. Don't rely on the site's default settings. Read each site's instructions or guidelines to make sure you're doing everything you can to keep your material private.
  • Safeguard your passwords and change them frequently. If someone logs on to a site and pretends to be you, they can trash your identity. Pick passwords that no one will guess (don't use your favorite band or your dog's birthday; try thinking of two utterly random nouns and mixing in a random number), and change them often. Never share them with anyone other than your parents or a trusted adult. Not even your best friend, boyfriend, or girlfriend should know your private passwords!
  • ...6 more annotations...
  • Don't post inappropriate or sexually provocative pictures or comments. Things that seem funny or cool to you right now might not seem so cool years from now — or when a teacher, admissions officer, or potential employer sees them. A good rule of thumb is: if you'd feel weird if your grandmother, coach, or best friend's parents saw it, it's probably not a good thing to post. Even if it's on a private page, it could be hacked or copied and forwarded.
  • Don't respond to inappropriate requests. Research shows that a high percentage of teens receive inappropriate messages and solicitations when they're online. These can be scary, strange, and even embarrassing. If you feel harassed by a stranger or a friend online, tell an adult you trust immediately. It is never a good idea to respond. Responding is only likely to make things worse, and might result in you saying something you wish you hadn't.
  • Take a breather to avoid "flaming." File this one under "nothing's temporary online": If you get the urge to fire off an angry IM or comment on a message board or blog, it's a good idea to wait a few minutes, calm down, and remember that the comments may stay up (with your screen name right there) long after you've regained your temper and maybe changed your mind.
  • Learn about copyrights. It's a good idea to learn about copyright laws and make sure you don't post, share, or distribute copyrighted images, songs, or files. Sure, you want to share them, but you don't want to accidentally do anything illegal that can come back to haunt you later.
  • Check yourself. Chances are, you've already checked your "digital footprint" — nearly half of all online users do. Try typing your screen name or email address into a search engine and see what comes up. That's one way to get a sense of what others see as your online identity.
  • Take it offline. In general, if you have questions about the trail you're leaving online, don't be afraid to ask a trusted adult. Sure, you might know more about the online world than a lot of adults do, but they have life experience that can help.
  •  
    Advice for teens from www.kidshealth.org. Here are some things to consider to safeguard your online identity and reputation:
    1. Remember that nothing is temporary online
    2. Mark your profile as private.
    3. Safeguard your passwords and change them regularly.
    4. Don't post inappropriate or sexually provocative pictures or comments.
    5. Don't respond to inappropriate requests
    6. Take a breather to avoid "flaming."
    7. Learn about copyrights.
    8. Check your digital footprint.
    9. Take it offline.
Anne Bubnic

Internet troll claims authorship of Megan Meier blog - 0 views

  • Trolls use the Internet to emotionally upset someone they don't know. They typically pick people or issues that, in their view, need to be ridiculed. They don't use their real names and attempt to inflame online discussions by posting outrageous and hurtful comments just to see who will take the bait.Fortuny told the newspaper he created the blog to question the public's hunger for remorse and to challenge the enforceability of cyberspace harassment laws like the one passed in Dardenne Prairie, where 13-year-old Meier had lived. She killed herself in October 2006.
  •  
    The person behind the inflammatory blog "Megan Had it Coming" is a 32-year-old information technology freelancer who lives near Seattle, according to a story about Internet trolls that ran Aug. 3 in The New York Times. Jason Fortuny had no connection with events in Missouri surrounding the 2006 death of Megan Meier. As some had suspected, he is an Internet troll.
Anne Bubnic

Best Practice: School District Bookmarks on Delicious - 0 views

  •  
    Excellent demonstration of a school district using deli.cio.us for bookmarking of K-3 resources.
Anne Bubnic

Fact Sheet: Nat'l Ctr for Research in Advanced Information and Digital Technologies - 0 views

  •  
    The National Center for Research in Advanced Information and Digital Technologies is part of the reauthorization of the Higher Education Act (section 802) approved by Congress on July 31, 2008, and signed into law by President Bush on August 14, 2008. The National Center will be organized as a Congressionally originated 501(c)(3) nonprofit corporation located within the Department of Education. Supporters are seeking a $50 million appropriation for the National Center for FY 2009.
Anne Bubnic

Cyber Bullying: A Prevention Curriculum for Grades 6-12 [Book] - 1 views

  •  
    Cyber Bullying: A Prevention Curriculum for Grades 6-12 is a curriculum that deals with attitudes and behaviors associated with cyber bullying. This eight-session curriculum is designed to:
    1. Raise student and parent awareness of what cyberbullying is and why it is so harmful
    2. Equip students with the skills and resources to treat eachother respectfully when using cybertechnologies
    3. Give students information about how to get help if they, or others they know, are being cyber bullied
    4. Teach students how to use cyber technologies in positive ways.
Anne Bubnic

Cyberbullying Prevention Curriculum Scope & Sequence: GR 6-12 [PDF] - 0 views

  •  
    Developed by the folks who designed the Olweus Bullying Prevention program, this curriculum offers students an opportunity to:
    1. interact, collaborate and publish with peers, experts or others, employing a variety of digital environments and media.
    2.communicate information and ideas effectively to multiple audiences, using a variety of media and formats
    3. contribute to project teams to produce original works or solve problems.
Anne Bubnic

Top 5 Technologies used to Cyberbully - 0 views

  •  
    The following is a list of five technologies currently employed by cyberbullies to intimidate other kids. Learn more about how each tool is used at this site.
    1. MySpace, Facebook and other social networking sites
    2. Instant Messaging
    3. Email
    4. Photoshop
    5. Blogs
1 - 20 of 125 Next › Last »
Showing 20 items per page