Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged Color

Rss Feed Group items tagged

Judy Echeandia

Cyberbullying: Parents, Tech Companies Join Forces to Keep Kids Safe - [FOXNews.com - 1... - 0 views

  • Tech companies are releasing new software products that monitor and police kids' Internet use, helping them avoid cyberbullying and letting parents know when it's occurring. Internet monitoring software like CyberBully Alert lets kids notify parents when they're being bullied and takes a screen shot of the computer when a child clicks an alert icon. Programs like CyberPatrol and Spector allow parents to keep tabs on everything kids do on MySpace and Facebook, and keep screen snapshots and a record of what kids write in chat and instant messages.
    • Vicki Davis
       
      Interesting that there is now a program - CyberBully Alert that helps parents protect their children from harrassing behavior.
  • Using these programs, parents can also block Web sites and downloads of movies, music or images. Verizon announced in June that it will begin offering similar free security tools for parents. Internet security software maker Symantec has an online tool it will preview to some parents next month that will notify them by text message when a child attempts to access a forbidden site. The tool, code-named Watchdog until its official release, also lets parents control who is on the child’s buddy list. Symantec offers online tips at its Norton Family Resource Center.
  • software maker CyberPatrol is releasing a series of Internet videos for parents.
  • ...1 more annotation...
  • The best defense, Criddle said, is a strong offense.
  •  
    Tech companies are releasing new software products that monitor and police kids' Internet use, helping them avoid cyberbullying and letting parents know when it's occurring.
Judy Echeandia

Teaching Teenagers About Harassment - 0 views

  • About 20 percent of teenagers have posted or sent nude cellphone pictures of themselves, according to the National Campaign to Prevent Teen and Unplanned Pregnancy, a nonprofit group.
  • digital dating violence.
  • The behaviors can be a warning sign that a teenager may become a perpetrator or a victim of domestic violence, according to the group.
  • ...6 more annotations...
  • teenagers frequently received digital threats or upsetting requests from people they were dating. But the teenagers were not talking about it, did not know how to handle it and did not know what was appropriate and what was not.
  • “It was abuse that there was no protocol around,” Mr. Law said. The parents were not aware of the interactions, and the teenagers did not know how to prevent it, he said.
  • The campaign and its Web site, ThatsNotCool.com, encourage teenagers to set their own boundaries. It is intended to appeal to all teenagers, not just those with serious problems. “The kids don’t want to be told what’s right and what’s wrong,” Mr. Law said. On the site, teenagers can send one of 35 “callout cards” — brightly colored messages they can send by e-mail, post to their Facebook or MySpace accounts or download — that are meant to tell someone they have crossed a line. The messages are sharp. For example: “Congrats! With that last text, you’ve achieved stalker status.”
  • The site offers an area where teenagers can seek advice, like how to stop a boyfriend from nonstop text-messaging. For more direct advice, the site tells teenagers to call or conduct a live chat with trained volunteers.
  • The campaign is digitally focused, reflecting the way teenagers communicate. Even the posters that will appear in schools, which display some of the “callout card” messages, ask viewers to snap a photo with their cellphone and text-message it to someone.
  • All of the communications are aimed at teenagers, not parents. Ms. Soler said the fund was working on a campaign to alert parents to problems, but for now, she wanted to get teenagers discussing them.“We want to give them the tools to say ‘You can have a healthy relationship, and here’s the road map,’ ” Ms. Soler said.
  •  
    A New Ad Warns About Abusive Texting\nA new public service ad highlights the growing problems of "textual abuse," where harassment of children occurs by way of text messages.
Kirsten Carter

Vaughan Memorial Library : Tutorials : Plagiarism - 0 views

  •  
    The Vaughan Memorial Library designed this colorful and nteractive flash tutorial on plagiarism to help university students learn how to cite resources, but it is also suitable for younger students.
  •  
    Easy tutorial that explains what plagiarism is. Choose a player and go through the steps.
Anne Bubnic

Citizen's CyberGuide for Educators [pdf] - 3 views

  •  
    In 2006, legislation in the state of Virginia added a new component to the educational curriculum for GR K-12: Internet Safety for Students. This colorful 25-page Citizen's Cyberguide focuses on a middle school audience and integrates ethical standards that can promote their use of the web more wisely and responsibly. Includes information on general safety, social networking and gaming and is designed to help kids develop safety skills, cyberethics and respect regarding their behavior online. Materials were developed at James Madison University.
Anne Bubnic

Bullying Policy at Hudson Area School District - 0 views

  • Bullying or other aggressive behavior toward a student, whether by other students, staff, or third parties, including Board members, parents, guests, contractors, vendors, and volunteers, is strictly prohibited. This prohibition includes physical, verbal, and psychological abuse, including hazing, gestures, comments, threats, or actions to a student, which cause or threaten to cause bodily harm, reasonable fear for personal safety or personal degradation. Demonstration of appropriate behavior, treating others with civility and respect, and refusing to tolerate harassment or bullying is expected of administrators, faculty, staff, and volunteers to provide positive examples for student behavior. This policy applies to all activities in the District, including activities on school property, in a school vehicle, and those occurring off school property if the student or employee is at any school-sponsored, school-approved or school-related activity or function, such as field trips or athletic events where students are under the school’s control, or where an employee is engaged in school business. Misconduct occurring outside of school may also be disciplined if it interferes with the school environment. "Bullying" is any gesture or written, verbal, graphic, or physical act (including electronically transmitted acts – i.e. internet, telephone or cell phone, personal digital assistant (PDA), or wireless hand held device) that is reasonably perceived as being motivated either by any actual or perceived characteristic, such as race, color, religion, ancestry, national origin, gender, sexual orientation, gender identity and expression or a mental, physical, or sensory disability or impairment; or by any other distinguishing characteristic. Such behavior is considered harassment or bullying whether it takes place on or off school property, at any school-sponsored function, or in a school vehicle.
  •  
    Includes a clause for cyberbullying.
JOSEPH SAVIRIMUTHU

The Myth of Online Predators - 0 views

  • Internet child molesters may be the modern parent's great fear but new research suggests this electronic monster is mainly the stuff of bad dreams. Is letting your kids go online the same as dropping them off at the Vince Lombardi Rest Stop in fishnet stockings at 3 a.m.?
    • JOSEPH SAVIRIMUTHU
       
      But an irrational fear does not mean that the concerns are not real - but only that efforts need to be made to retain a sense of perspective.
  •  
    One in seven juveniles will be solicited online"-a number that got predictably huge media play when it came out in 2006, and a number David Finkelhor, (Crimes Against Children Research Center) stands by, with one enormous caveat: Most of those solicitations, he says, are the Internet equivalent of "wolf whistles."
yc c

Digital Attack Map - 0 views

  •  
    Digital Attack Map One of the easiest ways to silence someone online is a distributed denial of service attack (DDoS). But it's difficult to solve a problem you can't see. Digital Attack Map visualizes the most powerful DDoS attacks happening in the world right now, using data from our partner Arbor Networks. DDoS attacks sometimes relate directly to events in the real world such as conflicts or political disputes. A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from banks to news websites, and present a major challenge to making sure people can publish and access important information.
realcounterfeits

Buy Fake US passport - Real Counterfeits Money - 0 views

  •  
    Buy fake us passport online Get a fake US passport and enjoy native American privileges Who doesn't want to hold an American passport? People across the globe wish to be a citizen of this developed economy. Lucrative opportunities and high standards of living make this country a land of dreams. However, the US administration is also known for its complex bureaucratic rules. Whether you are a documented or an undocumented immigrant, they will make you run for your money to get things done. If you are looking for an easy way out, we have you covered with fake American passports for sale. They are as good as genuine ones with a replica of features like raised printing, holographic stripes, color-shifting inks, and embedded chips. There's no need for background verification when you order a fake USA passport online from us. We take care of everything from tip to toe!. buy fake us passport Fake American passports for sale without any officialism Citizenship laws are strictly regulated in the US, and the rules are even tighter for non-residents. When applying for a passport, you first need to prove your citizenship status. This includes submitting eligible documents issued by the authorities. The application fee you pay is non-refundable, regardless of acceptance or rejection. At realcounterfeitsmoney.com , we help you skip these formalities and get the job done from the comfort of your home. All you need to do is provide the necessary details and a passport-size photograph. Our team will replicate an original copy with a registered passport number. If you need any guidance from us to buy a fake US passport, we are always available to help! buy fake us passport buy fake us passport online buy real us passport online
cpdesigns

The Best Space-Saving Interior Design Ideas | CP Design - 1 views

  •  
    CP Design Geelong home styling experts use the latest trends to transform the look and feel of your home or office
kohope

polycarbonate syringes - 0 views

  •  
    Kohope medical has a comprehensive range of Color-Coded, Latex Free Polycarbonate Syringes. High transparency barrels with a secure Luer-lock tip are available in 1ml, 3ml, 6ml, 10ml, 20ml and 30ml.
buyglobalshop

Buy Google AdSense Accounts - Best Quality Everything Google AdSense Accounts 2024 - 0 views

  •  
    Google AdSense is a important tool that has revolutionized the way millions of website possessors induce income online. But what exactly is it? In simple terms, Google AdSense is an advertising program by Google that allows website possessors to display targeted advertisements on their spots and earn plutocrat when callers click on those advertisements. It works by using Google's vast network of advertisers who bid for announcement placements on colorful websites. When someone visits a website with AdSense advertisements, Google's algorithms dissect the content of the runner and display applicable advertisements that are most likely to be of interest to the caller. This way, website possessors can monetize their online presence and advertisers can reach a wider followership, creating a mutually salutary arrangement. Buy Google AdSense Accounts How Does Google AdSense Work? Google AdSense is a extensively popular online advertising program that enables website possessors and generators to monetize their content by displaying targeted advertisements on their platforms. But how does Google AdSense actually work? Let's dive into the details. At its core, Google AdSense works by connecting advertisers and website possessors. Advertisers, who are seeking to promote their products or services, produce advertisements through the Google Advertisements platform. These advertisements also suffer a rigorous review process by Google to insure they meet their guidelines and programs. Buy Google AdSense Accounts Website possessors who wish to induce profit from their online content can subscribe up for an AdSense account through the Google AdSense website. Once approved, they gain access to a unique law grain which they can integrate into their website's HTML. This law enables the AdSense program to automatically display applicable and targeted advertisements to their callers. To determine the applicability of the advertisements displayed, Google AdSense utilizes a com
‹ Previous 21 - 31 of 31
Showing 20 items per page