Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged HOW

Rss Feed Group items tagged

Anne Bubnic

9 Myths about Digital Natives [Berkman Center] - 0 views

  •  
    John Palfrey & Urs Gasser [Berkman Center] identify 9 myths about Digital Natives and offer succinct interpretations based on research and observations of youth. Educators involved in digital citizenship efforts may find a shift in thinking is necessary in how we educate students about issues related to online safety, copyright, privacy etc....where their confusions are and what they do/don't understand. It's also important to understand the significance of social groups and online communities on our youth and how they motivate development of friendship-driven and interest-driven content.
Anne Bubnic

Digital Citizenship: Using Technology Appropriately - 0 views

  •  
    This web site was developed by Mike Ribble, co-author of Digital Citizenship in the Schools. He covers the 9 areas of Digital Citizenship that are outlined in the book and offers many examples of how educators can begin the process of teaching their students how to use technology more appropriately. These resources can be used by any anyone who is interested in helping students or others better understand appropriate technology use.
Anne Bubnic

Cyber safety rules may curb net bullying - 0 views

  •  
    New safety rules from Telestra aim to give parents a tool in the fight against cyber bullying, with many struggling to understand what they can do to protect their children.Families should learn how to report cyberbullying and to work on building trust about discussing online problems. The article gives five suggestions for how adults can become an internet parent:
    Familiarize yourself - talk with your child about their use of the internet.
    Explore - websites and technologies yourself.
    Restrict inappropriate content and consider parental controls such as filtering.
    Talk to your child and encourage open communication
    Know - be aware of the potential dangers and know where to report potentially illegal or inappropriate behaviour online.

Anne Bubnic

Blocking the Future [AASA] - 1 views

  • In this environment, school district leaders have a critical choice to make: Will their schools pro-actively model and teach the safe and appropriate use of these digital tools or will they reactively block them out and leave students and families to fend for themselves?
  • o better way to highlight organizational unimportance than to block out the tools that are transforming the rest of society.
  • the specific policies are much less important than the general mindset of the school district.
  • ...4 more annotations...
  • If a district has decided to figure out ways to facilitate technology usage and empower students and staff, the policies will follow accordingly. Conversely, if a district is determined to treat technology from a fearful or wary standpoint, its policies will reflect that position as well.
  • they do have to exercise appropriate oversight and convey the message, repeatedly and often, that frequent, appropriate technology usage is both important and expected.
  • they have the right mindset. Their first reaction is not “keep this out” but rather “how we can make this work?” We can learn from these organizations how they have balanced safety concerns with the need to empower students with 21st century skills and dispositions.
  • lease don’t relegate your students, particularly those from disadvantaged backgrounds, to second-class status in the new economy because you left it to them and their families to figure out on their own what it means to be digital, global citizens.
  •  
    [May 2008] AASA article gives examples of school organizations that are desperately and inappropriately blocking the future and Scott McLeod pleads, "Please don't block the future." Please don't relegate your students, particularly those from disadvantaged backgrounds, to second-class status in the new economy because you left it to them and their families to figure out on their own what it means to be digital, global citizens. Ask AASA and its state affiliates to provide more technology leadership-related professional development opportunities. And let us know how we can help.
Rhondda Powling

Ten Resources for Preventing and Detecting Plagiarism - 0 views

  •  
    Plagiarism, we all hate it, but how can we teach students to avoid it and how can we detect it? Just as the Internet makes plagiarism easy, the Internet also makes detecting plagiarism and prevent plagiarism easy. What follows are ten resources for detecting plagiarism and teaching students to avoid plagiarism.
Anne Bubnic

A nightmare on Facebook for the Obama crew - 0 views

  •  
    Another lesson about how easily inappropriate actions can be captured and immortalized on the web...and how nothing is really private.
Anne Bubnic

Virtual World Digital Citizenship for Middle Schoolers - 0 views

  •  
    This documents students using Google Lively to teach other students about digital citizenship
  •  
    For our project, we chose to create a virtual room, called Digiteen World, on Google Lively. Our main objective of this project is to get people more aware about Digital Citizenship. We will be allowing kids from our school to get on Lively, and react in the virtual world. We have created nine superheroes. Each superhero has a lesson to teach abut the nine aspects of Digital Citizenship. By teaching the lessons in a virtual room, the kids get to have a great time and still learn very important lessons. The goal of this project is to educate people on how to act online. In allowing kids to be a part of this project, we hope that they will learn how to be good digital citizens.
Anne Bubnic

Privacy Playground: The First Adventure of the Three CyberPigs - 0 views

  •  
    Privacy Playground: The First Adventure of the Three Little CyberPigs was developed by the Media Awareness Network. In this game, designed for ages 8-10, the CyberPigs play on their favourite Web site and encounter marketing ploys, spam and a close encounter with a not-too-friendly wolf. The purpose of the game is to teach kids how to spot online marketing strategies, protect their personal information and avoid online predators. The accompanying Teacher's Guide explains how to play the game, gives background information on the issues of online marketing, spam and children's privacy and provides activities and handouts for classroom use.
Cheryl Lykowski

Changing how we teach copyright [Part 2 of 4] - 0 views

  •  
    A rational, ethical and legally-defensible way" of how educators should change their approach to both using and teaching about intellectual property, [Doug Johnson]
Cheryl Lykowski

Changing how we teach copyright [Part 1 of 4] - 0 views

  •  
    A rational, ethical and legally-defensible way" of how educators should change their approach to both using and teaching about intellectual property, [Doug Johnson]
Anne Bubnic

How I'd Hack Your Weak Passwords - 3 views

  •  
    f you invited me to try and crack your password, you know the one that you use over and over for like every web page you visit, how many guesses would it take before I got it?
Anne Bubnic

Privacy Is Not Dead - Danah Boyd Talks About Privacy at SXSW - 0 views

  •  
    During today's SXSW keynote, social media research Danah Boyd, who works for Microsoft Research New England and is a fellow at Harvard University's Berkman Center for Internet and Society, talked about online privacy. Specifically, she focused on how users can navigate issues around online privacy and how developers can help them to do so.
Anne Bubnic

Eight Tips for Monitoring and Protecting Your Online Reputation - 9 views

  •  
    Here are 8 tips to monitor and protect one's online reputation from the U.S. Government Information Security Blog: Search your name. Type your first and last name within quotation marks into several popular search engines to see where you are mentioned and in what context. Narrow your search and use keywords that apply only to you, such as your city, employer and industry association. Expand your search. Use similar techniques to search for your telephone numbers, home address, e-mail addresses, and personal website domain names. You should also search for your social security and credit card numbers to make sure they don't appear anywhere online. Read blogs. If any of your friends or coworkers have blogs or personal web pages on social networking sites, check them out to see if they are writing about or posting pictures of you. Sign up for alerts. Use the Google alert feature that automatically notifies you of any new mention of your name or other personal information. Limit your personal information. Tweet/chat/discuss regarding business and the emerging trends in your industry, but limit posting information on your personal life, which could be a subject of major scrutiny by recruiters and hiring managers. Also, be sure you know how organizations will use your information before you give it to them. Use privacy settings. Most social networking and photo-sharing sites allow you to determine who can access and respond to your content. If you're using a site that doesn't offer privacy settings, find another site. Choose your photos and language thoughtfully. You need to ensure that information posted online is written professionally without use of swear words and catchy phrases. Also, be very selective in posting photographs, and use your judgment to ensure that these photographs are how you want the world to see you. Take action If you find information about yourself online that is embarrassing or untrue, cont
Anne Bubnic

How Can Adults Improve Social Networking Sites for Kids? - 0 views

  • If social networks are going to be safe places for kids, adults are going to have to be more present and it's not going to work if it is just parents watching over kids to control their online activity. Social networks have to become more open to adults who are interested in pointing kids in a positive direction and who take an interest in their development
  •  
    Ten Ideas for how adults can improve social networking sites for kids. I was recently interviewed by a local high school student named Julian for his research project about the impact of social network sites on society. I always enjoy being interviewed by teens and end up learning something in the process. Julian asked a question that I have been thinking about since we spoke: "What can adults do to improve social network sites for kids?"
Anne Bubnic

Chatroulette: What's an Educator to Do? - 2 views

  • You never know who you are going to encounter: a predator? Someone sitting there naked?” asks Barnett. “All it would take is one such incident and the school will be sued by an angry parent. Our focus should be on helping students to learn to be cyber safe and we don't have to do that by actually being on Chatroulette.com.”
  •  
    On listservs and blogs, education researchers and teachers are beginning to discuss how to handle this latest online application. To most educators, filtering is never a preferred option. Teachers and media specialists almost uniformly choose to use opportunities like this to teach students how to make decisions about what's appropriate on their own. "One of the responsibilities of working with students on the use of online resources is to make them aware of potential dangers so they can make informed choices," says Deb Logan, librarian and media specialist for Mount Gilead (OH) High School, by email. "A discussion of online resources like Chatroulette offers a learning opportunity. These opportunities sometimes come at unexpected times." But educators believe Chatroulette may be a bit different then other similar sites like Omegle.com and Facebook's PopJam in that video is involved-and there's no way to edit what pops up on the screen other than clicking "next" after it's already appeared. There's no lurking allowed on Chatroulette-once a user signs in, they're visible to anyone who chances upon them, and anyone, in turn, is visible to them. Needless to say, there's a bit of nudity and sexual play being reported on the site, and the swiftness of people moving from image to image doesn't allow children to protect themselves-other than signing off.
Anne Bubnic

Tapping your cell phone [Video] - 0 views

  •  
    This is really scary - spyware for cell phones. TV 13 Investigates and explains how your cell phone can be secretly hijacked and used against you - and tells you how to protect yourself.
Anne Bubnic

FactCheckED.org - 0 views

  •  
    The Internet can be a rich and valuable source of information - and an even richer source of misinformation. Sorting out the valuable claims from the worthless ones is tricky, since at first glance a Web site written by an expert can look a lot like one written by your next-door neighbor. This lesson offers students background and practice in determining authority on the Internet - how to tell whether an author has expertise or not, and whether you're getting the straight story.
  •  
    The Internet can be a rich and valuable source of information - and an even richer source of misinformation. Sorting out the valuable claims from the worthless ones is tricky, since at first glance a Web site written by an expert can look a lot like one written by your next-door neighbor. This lesson offers students background and practice in determining authority on the Internet - how to tell whether an author has expertise or not, and whether you're getting the straight story.
  •  
    The Internet can be a rich and valuable source of information - and an even richer source of misinformation. Sorting out the valuable claims from the worthless ones is tricky, since at first glance a Web site written by an expert can look a lot like one written by your next-door neighbor. This lesson offers students background and practice in determining authority on the Internet - how to tell whether an author has expertise or not, and whether you're getting the straight story.
Anne Bubnic

Cyberbullying affects 28% of Teenage Girls - 0 views

  •  
    Twenty eight percent of teenage girls have been victims of cyber-bullying, says GirlGuiding UK, a result of the research the group has put together advice on how young girls can deal with cyber-bullies. eight percent of teenage girls have been victims of cyber-bullying, says GirlGuiding UK. As a result of the research the group has put together advice on how young girls can deal with cyber-bullies.
Anne Bubnic

Copyright Law: From Digital Reprints to Downloads - 0 views

  •  
    Looking at how and why copyright law has changed over time can help students better understand recent and current copyright disputes and the many perspectives involved in these ownership issues. In this lesson, students read about the history of copyright law and generalize about how and why it has changed.
adjustingto6figu

Don't Adjust Without E/O Liability Insurance - 0 views

  •  
    Errors and Omissions ("E/O") Liability Insurance is a must-have for independent adjusters. No matter how good you are at your job, and no matter how meticulous your records, you can't escape the fact that you're still human and bound to make a mistake every now and again. To protect yourself and your company from financial disaster it is incredibly important to be prepared with E/O Liability Insurance.
« First ‹ Previous 61 - 80 of 608 Next › Last »
Showing 20 items per page