Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged Case

Rss Feed Group items tagged

Anne Bubnic

Cyberbullying The Real Threat on the Digital Playground - 0 views

  • "Parents are the key to this whole issue," explains Leasure. "They need to be involved and monitoring the computer and Internet activity of their kids. If they see something that isn't right, they need to act as parents and correct the issue."
  • parental awareness is truly the key to fixing this problem. If your child is the victim - or worse, the bully - it's time to step in. it's not being over-protective; it's trying to stop the current generation from 'virtually' destroying themselves emotionally
  • Cyberbullying Statistics: A recent survey of 395 students, ages 11 to 19, was conducted by the Kids/Teen Division of the Maine-based online safety organization Working To Halt Online Abuse. The study found that: � 28% of students have been cyberbullied, but... � Just over half tell their parents or another adult about it; of the students who did not report the cyberbullying, 25% felt it wasn't a big problem or didn't want to make a big deal out of it � 65% reported the cyberbullying was via IM, followed by email, MySpace, chat rooms and online games � 43% were cyberbullied by someone their age or in the same grade � 30% blocked or deleted the cyberbully, while 16% ignored them � 54 students admitted they had bullied somebody online themselves
  •  
    While reports and stories in the media focusing on Internet predators have become all too frequent, the closer-to-home threat to our children may really be cyberbullying, also known as electronic or online bullying. A recent survey of 395 students (11 to 19 years old) found that 28% of students have been cyberbullied, and more than 1 in 7 admitted to acting as the bully."Cyberbullying could be the biggest online threat facing teens today," says James Leasure, co-founder of Pandora Corp. "Of course Internet predators do still exist, but statistically, kids have a much greater chance of being involved in some way with electronic bullying." Most cases of cyberbullying go undocumented because, fortunately, many kids are able to shrug off the 'unkind words' and look the other way. But there are some cases that make national headlines when they turn into tragedies, such as the Megan Meier case in 2006. Larger cases like this have prompted several states to adopt legislation that makes online bullying illegal.
Vicki Davis

Royal today, average tomorrow? - Digi Teen - 0 views

  •  
    Case study on New jersey facebook picture "blackmail" case written by a teenager on the Digiteen project.
  •  
    Considering the posting of photos and what should be shared is something all teenagers should consider. This is a blog post from a teenager on the digiteen project about the difficulty lawmakers have in prosecuting "digital blackmail" cases. Certainly harm was done, but legislation has not been passed protecting photographs posted on one's Facebook page and shared with friends. This is hard for students to understand but is an important case study to read about. Certainly having teenagers research and report their findings is a great way to help them understand the implications of what they are doing.
cpdesigns

Buy Card Case Wallets in Classic Alligator & Crocodile Design - 0 views

  •  
    Card Case Wallets. If you're looking for the Perfect Store to buy all your very important items, Bryant Park Belts collection of card case wallets is a great place to start shopping.
Anne Bubnic

Josh Gunderson CyberBullying PSA [Video] - 5 views

  •  
    Cyber Bullying has gained national attention in the case of Phoebe Prince, an irish immigrant attending South Hadley High School in Massachusetts. Though this case has shed new light on the issues of cyber bullying, there are many cases of what has been dubbed "bullycide" where students bullied both on and off line have taken their lives. Regardless of where the bullying is taking place, it is still an issue that must be dealt with on every level in order to prevent further tragedies.
Anne Bubnic

Tips to Prevent Sexting [Larry Magid] - 0 views

  •  
    These tips were written in April 2009, after several reported cases of teens being prosecuted for taking, distributing and possessing pictures of themselves or friends. While we are aware that such activity is inappropriate and risky, we do not feel that - in most cases - law enforcement should treat sexting as a criminal act. Except in the rare cases involving malice or criminal intent, law enforcement should play an educational role, along with parents, community leaders, school officials and other caring adults. "Sexting" usually refers to teens sharing nude photos via cellphone, but it's happening on other devices and the Web too. The practice can have serious legal and psychological consequences, so - teens and adults - consider these tips!
buyglobalshop

Buy Amazon Seller Accounts - 100% Best Quality & Full Verified Account - 0 views

  •  
    Have you ever considered offering items online but were uncertain of where to begin? One prevalent choice for people looking to offer on a huge stage is opening an Amazon Vender Account. An Amazon Vender Account permits you to list items for deal on the Amazon commercial center, giving you get to to millions of potential clients around the world. Whether you're looking to offer carefully assembled creates, vintage things, or unused fabricated products, Amazon Vender Accounts give you with a stage to reach a wide gathering of people and develop your business. Buy Amazon Seller Accounts What Is Amazon Dealer Accounts? Amazon Dealer Accounts are a pivotal device for people and businesses looking to offer items on the world's biggest online commercial center. These accounts provide dealers get to to a wide extend of highlights and benefits that can offer assistance them reach a more extensive group of onlookers and increment their deals. From setting up item postings to overseeing orders and dealing with client request, Amazon Dealer Accounts give a comprehensive stage for dealers to develop their online businesses. Buy Amazon Seller Accounts With millions of clients going to Amazon each day, having a Dealer Account can open up a riches of openings for venders to grandstand their items and interface with potential buyers. Whether you are a little commerce proprietor looking to grow your online nearness or an person looking to make a few additional wage by offering items, an Amazon Dealer Account can give you with the instruments and assets required to succeed in the competitive e-commerce scene. In this article, we will dive into the different highlights and benefits of Amazon Vender Accounts, as well as give tips and exhortation for modern venders looking to explore the stage effectively. Is there a expense to open an Amazon Dealer Account? In arrange to offer items on the stage, you will require to make an Amazon Vender Account. But the huge address numerous in
buyglobalshop

Buy Verified Coinbase Accounts - 100% active and safe - 0 views

  •  
    As cryptocurrency picks up more standard acknowledgment, stages like Coinbase have gotten to be well known choices for buying, offering, and putting away computerized monetary standards like Bitcoin and Ethereum. One imperative angle of utilizing Coinbase is the confirmation prepare that clients must go through in arrange to get to full account highlights. A confirmed Coinbase account gives extra security measures and get to to highlights like higher buying limits and the capacity to exchange reserves to outside wallets. Buy Verified Coinbase Accounts What is a confirmed Coinbase account? If you're modern to the world of cryptocurrency exchanging, you may have listened approximately the significance of having a confirmed Coinbase account. But what precisely does it cruel to have a confirmed account on Coinbase? In straightforward terms, a confirmed account on Coinbase is one that has experienced a careful confirmation handle to affirm the personality of the account holder. This confirmation prepare is in put to guarantee the security of the stage and to comply with different administrative requirements. Buy Verified Coinbase Accounts Having a confirmed Coinbase account not as it were gives included security to your account but too opens extra highlights and benefits. With a confirmed account, you can purchase, offer, and exchange a more extensive assortment of cryptocurrencies on the stage. Furthermore, having a confirmed account may moreover make it simpler to store and pull back reserves from your account, as a few installment strategies may as it were be accessible to confirmed clients. In this article, we will dig more profound into what it implies to have a confirmed Coinbase account and how you can go almost confirming your possess account. How do I confirm my Coinbase account? To guarantee the security of your account and comply with administrative prerequisites, Coinbase requires its clients to confirm their characters. Confirming your account is a basi
Anne Bubnic

P2P Healing in Cyberbullying Case - 0 views

  •  
    We hear so much in the news about teen meanness and harassment toward each other online that it's quite amazing to find a national story about kindness. In the case of Olivia Gardner, the kindness came from two sisters in a nearby town, Sarah and Emily Buder in Mill Valley, Calif., who read in the newspaper about how Olivia was being bullied and wanted to help.
Anne Bubnic

Curbing Cyberbullying in School and on the Web - 0 views

  • Many of the most egregious acts of cyberbullying do not take place during school hours or on school networks, a situation that presents a dilemma for public school administrators: If they punish a student for off-campus behavior, they could get hit with a freedom of speech suit.  If they do nothing, students may continue to suffer and school officials theoretically could get hit with failure to act litigation. For school administrators, it appears to be an unfortunate “catch-22.” For lawyers, it’s a “perfect storm,” pitting freedom of speech advocates against the victims of cyberbullying and schools that try to intervene. There are no easy answers in this arena, few laws, and no well-established precedents that specifically deal with cyberbullying.
  • “School administrators can intervene in cyberbullying incidents, even if the incidents do not take place on school grounds, if they can demonstrate that the electronic speech resulted in a substantial disruption to the educational environment.”
  • These cases illustrate not only a lack of precedent on cyberbullying cases, but also a dilemma for school administrators on how to handle cyberbullying.  “There are few laws that address how to handle cyberbullying, and many schools don’t have an internal policy to deal with cyberbullying that takes place off-campus,” offers Deutchman.  “It may take an unfortunate and tragic event on school property to get more schools to consider tackling electronic behavior that originates off campus.  It’s only a matter of time before a cyberbully, or the victim of cyberbullying, uses deadly force during school hours.”
  • ...5 more annotations...
  • So, what should schools do in the meantime?  First, school officials should establish a consistent internal policy (much like a crisis plan) and a team (minimally made up of the principal, school counselor, and technology director) to deal with cyber-misconduct. This team should fully document disruptive incidents and the degree to which the learning environment is affected. The principal should invite the cyberbully’s parents to review the offending material before considering disciplinary action. Most parents at this point will do the right thing.
  • Second, schools should educate children, starting in elementary school, about the importance of cyber-safety and the consequences of cyberbullying, especially on the school’s own network. These rules should be clearly posted in the computer labs and written in age-appropriate language. The rules should be sent home to parents each year—and they should be posted prominently on the school’s website.
  • Third, teachers should continue incorporating in their curriculum projects that utilize the web and other powerful new technologies. This probably won’t help schools avoid lawsuits; it’s just good pedagogy. It’s not surprising that schools that keep up with the latest technology and software—and employ teachers who care about the quality of online communication—report lower incidents of cyber-misconduct.
  • In addition, schools should update their codes of conduct to include rules that can legally govern off-campus electronic communication that significantly disrupts the learning environment. They should also assign enough resources and administrative talent to deal with students who engage in cyber-misconduct. One very big caveat: Disciplining a student for off-campus electronic speech should be done only as a last resort, and certainly not before seeking legal counsel.
  • Finally, schools should realize that not all cyberbullies need to be disciplined. Schools should act reasonably, responsibly, and consistently—so as to avoid the very bullying behavior they are trying to curb. Until the courts provide clear standards in the area of off-campus electronic speech for young people, these recommendations will go a long way in making schools a safer learning environment for everyone.
  •  
    Most school administrators have more than one story to tell about cyberbullying. They report that victims of cyberbullying experience low self-esteem, peer isolation, anxiety, and a drop in their grades. They note that victims may miss class or other school-related activities. Principals also point to recent high-profile cases where cyberbullying, left unchecked, led to suicide. In response, some schools have created new policies and curbed free speech on the school's computer network and on all electronic devices used during school hours. This article offers practical advice for actions schools can take to curb bullying, ranging from policy development to education.
Anne Bubnic

Case Study: Cyberbullying and Free Speech [pdf] - 0 views

  •  
    Case Study and discussion points. Includes answers to legal questions.
    A bad idea has turned into a full-fledged legal battle ever since the principal of Gibbons Preparatory School, Cornelius Southwick, learned that a group of male students at his school created a website that ranked the qualities of every freshman girl - often in mean-spirited, unflattering ways.
Anne Bubnic

Students: Fair Use - Beg, Borrow or Steal? - 1 views

  •  
    One of eight interactive case studies for kids (GR 4-8) from Cable In the Classroom: Power to Learn.
    Understanding the fair use exemption to copyright law is critical for students who routinely mine the Internet for digital media for class projects, research papers, and other educational purposes. This unit focuses on copyright and fair use. Case studies are explored. Students are asked to develop an essay question. The graphics are Nickelodeon style. For the entire series, check out: http://powertolearn.com/internet_smarts/interactive_case_studies/index.shtml
Anne Bubnic

Students: Music Downloading - Answer the Question - 2 views

  •  
    One of eight interactive case studies for kids (GR 4-8) from Cable In the Classroom: Power to Learn.
    Educating students about the legal and ethical aspects of illegal downloading offers the best opportunity to minimize the ethics gap which allows otherwise law-abiding kids to break the rules. Case studies are explored. Students are asked to develop an essay question. The graphics are Nickelodeon style. For the entire series, check out: http://powertolearn.com/internet_smarts/interactive_case_studies/index.shtml
Anne Bubnic

Please Stop The 'Sexting' Insanity - 0 views

  • They define sexting as - "sending, receiving and/or posting sexy messages/photos (e.g. photos of themselves in their underwear, or without clothes, messages of a sexual or suggestive nature) online and via cell phone/email."
  • he survey was self-selecting, i.e. girls volunteered to take it after seeing it promoted on the homepage. This always biases the results.
  • But I also know how freaked out parents are about all of these issues — and unfortunately, the way this survey is being spun, along with a lot of the media coverage, only perpetuates a culture of fear around these issues.
  •  
    Flames of Moral Panic: You may have noticed that the media has fully embraced "sexting" [a term invented by the media] as the latest horror story about teens and technology. First it was about how the internet is teeming with predators a la "To Catch A Predator," with the most dramatic stories focusing on girls who met these predators in real life [read the real deal here: Online "Predators" And Their Victims]. Next it was about cyberbullying, highlighting the most extreme cases that ended in young people having to switch schools or even more tragically committing suicide. The latest is "sexting," where teens are naively sending and receiving sexually explicit photos or video of themselves to friends via cell phone, again, with the most dramatic cases highlighted.
Anne Bubnic

Copyright Case Study [ Video] - 0 views

  •  
    BEST PRACTICES IN FAIR USE from the folks at Temple University's Media Literacy Education Lab. This is a case study of PROJECT LOOK SHARP and their use of media literacy materials. Included are discussion questions that would be appropriate for teaching teachers and/or students.
Anne Bubnic

Bullied student gets $260,000 from families of bullies and school district - 4 views

  •  
    According to the Bakersfield Californian, a Stockdale High School student, who was physically assaulted by five older students, has settled his suit against the Kern High School District, the students who committed the assault and two other students for $260,000. The case illustrates the degree to which students and their parents can be held financially accountable in bullying cases. It also shows that students can be held financially responsible even if they are witnesses or simply know about such incidents, but don't tell authorities.
buyglobalshop

Buy Verified Payoneer Accounts - 100% Best Quality & full document verified - 0 views

  •  
    If you have been investigating diverse alternatives for overseeing your accounts, you may have come over the term Payoneer accounts. But what precisely is a Payoneer account, and how can it advantage you? Payoneer is a worldwide installment stage that permits people and businesses to send, get, and oversee their cash over borders. With a Payoneer account, you can get installments from clients and marketplaces around the world, all whereas profiting from competitive trade rates and moo fees. Buy Verified Payoneer Accounts Is it secure to utilize Payoneer? In today's advanced age, online installment stages have ended up progressively prevalent for businesses and people alike. Payoneer is one such stage that offers clients a helpful way to send and get cash over borders. In any case, with the rise of cyber dangers and information breaches, numerous individuals are cleared out pondering: In this article, we will investigate the security highlights that Payoneer has in put to secure its users' touchy data. From encryption to personality confirmation forms, we will look at the safety measures that Payoneer takes to guarantee the security of its stage. Also, we will examine common dangers related with utilizing online installment administrations and give tips on how to encourage secure your accounts whereas utilizing Payoneer. By the conclusion of this article, you will have a way better understanding of the security measures in put when utilizing Payoneer and feel more sure in utilizing this stage for your monetary transactions. Buy Verified Payoneer Accounts Can I utilize Payoneer to get installments from clients? Yes, you can unquestionably utilize Payoneer to get installments from clients. Payoneer is a prevalent installment benefit that is trusted by millions of clients around the world for its unwavering quality and security. It permits you to effectively get reserves from clients, companies, or marketplaces in a fast and effective manner. When you utilize Pa
Anne Bubnic

Beverly Hills case blends free speech/public schools/cyber-bullying - 0 views

  •  
    Middle school friends, talking off-campus, criticize a classmate. A video is posted on YouTube. Now the case is in federal court.
Anne Bubnic

Does Creative Commons Work? Check Out the New Case Studies DataBase - 0 views

  •  
    Interesting article about CC
  •  
    The Creative Commons Foundation launched a much-needed database of case studies today, highlighting CC licensed content from around the world. Creative Commons licenses are built on top of international copyright law but let content producers offer their work with more refined permissioning for re-use than the de facto "it's mine don't touch it" sentiment of standard copyright.
Anne Bubnic

Wise Up to It: Case studies and Internet safety advice for teens [Video] - 0 views

  •  
    Four video clip case studies and internet safety advise from NetAlert (Australian Government). Designed for students. Explore the lives of four young people and their experiences on the Internet. Four situations. Four victims. Four stories. Many strategies. Downloadable lesson plans and student handouts for each case study.
Vicki Davis

Identity Theft Leads to Child-Porn Arrest Nightmare - 0 views

  • Simon Bunce of Hampshire, England, not only had his credit-card number stolen online but was arrested and falsely accused of being a pedophile when that card number was used to buy child pornography.
  • Yet that only came after he'd lost his $250,000-a-year job, his father and siblings stopped talking to him and his computer was taken away for several months, the BBC reports. Bunce had the misfortune of being caught up in Operation Ore, a massive British online kiddie-porn crackdown in 2003 that itself grew out of Operation Avalanche, an earlier American bust which began with a 1999 raid on Landslide Productions, a Texas mom-and-pop operation that handled credit-card transactions for porn Web sites.
  • about 7,200 people — whose card numbers showed up on the list.
  • ...2 more annotations...
  • Bunce was arrested "on suspicion of possessing indecent images of children, downloading indecent images of children and incitement to distribute indecent images of children" — all before a single image of such had been found on his computers at home and at work. He quickly found himself unemployed and estranged from his family. But his wife stuck by him, and while his computer sat in police custody waiting to be examined, Bunce took action.
  • Bunce used the U.S. Freedom of Information Act and a catalog of Internet Protocol addresses to establish that his credit-card number had been used in Jakarta, Indonesia, to buy child pornography online at the same moment he used the card to pay the bill at a London restaurant.
  •  
    Learning how to safely use e-commerce websites is important, but also, people need to be aware to protect their credit card numbers and identities as can be seen in this horrific case study. When websites are not safe about their use of credit card numbers, it can have horrible impacts such as this man losing his $250,000 a year job and becoming estranged from his family, when they thought he bought child pornography.
1 - 20 of 149 Next › Last »
Showing 20 items per page