Anatomy of a URL [PDF] - 0 views
Picture Your Name Here [Facebook] - 0 views
-
Campaigns to educate students about the pitfalls of Facebook — how professors, parents and prospective employers can use the social networking site to uncover information once considered private — have become a staple of freshman orientation sessions and career center clinics. Students are apparently listening.
-
If I’m holding something I shouldn’t be holding, I’ll untag,” says Robyn Backer, a junior at Virginia Wesleyan College. She recalls how her high school principal saw online photos of partying students and suspended the athletes who were holding beer bottles but not those with red plastic cups. “And if I’m making a particularly ugly face, I’ll untag myself. Anything really embarrassing, I’ll untag.”
-
Teens and college students living the party life have discovered they may have a little too much information up on their web site. De-tagging - removing your name from a Facebook photo - has become an image-saving step in the college party cycle. "The event happens, pictures are up within 12 hours, and within another 12 hours people are de-tagging," says Chris Pund, a senior at Radford University in Virginia.
Teachers reminded of legal issues - The Times-Herald - 0 views
-
The overview of teachers' unique legal issues covered provocative topics such as how "search and seizure" laws apply to students, emerging threats with cyber-bullying and cyber-stalking -- such as aggressive texting, sexual harassment and hazing -- religious and personal expression, school violence and advice for teachers to sanitize their own personal Web pages.
Children of the tech revolution - 0 views
-
Pinned to the wall of my daughter's grade one classroom is a sheet of butcher's paper, listing questions she and her classmates would like to answer.\n\nWill the water run out? How many children travel to school in a sustainable way? Are cities a good idea? The next sheet lists ways they will find out the answers. First on the list: check the internet. These six and seven-year-olds are part of the emerging generation Z . Demographers and social researchers have banged on endlessly about gen Y and their rapid embrace of new technology but gen Z is the first generation born into a digital world.
P2P Healing in Cyberbullying Case - 0 views
-
We hear so much in the news about teen meanness and harassment toward each other online that it's quite amazing to find a national story about kindness. In the case of Olivia Gardner, the kindness came from two sisters in a nearby town, Sarah and Emily Buder in Mill Valley, Calif., who read in the newspaper about how Olivia was being bullied and wanted to help.
Researchers help define next-gen social networking - 0 views
-
The researchers also discussed opinions, some of them perhaps surprising, on other notable subjects in the online social-networking space. Lawley, who has a 14-year-old son, said she is strongly against some of the restrictive methods used online to segregate adults from children in an attempt to protect kids from predators. On Second Life, for example, she can't interact with her son because he has to be in the teen grid and she has to be in the adult grid.
-
"So I don't learn from him about how to use technologies, and he doesn't learn from me about how to interact in a social context," she said. Shutting down sites or trying to shut out people won't solve the problem of sexual predators, she said. "We don't talk about shutting down the Catholic Church," she said, referring to the clergy sex-abuse scandal. "Sexual deviancy isn't unique to the online world."
The Millennials Are Coming! - 0 views
-
Most agencies manage sensitive citizen data: addresses, Social Security numbers, financial records and medical information. You name it, some state or local office has it, and probably electronically. The problem? Many theorize that the Millennials' penchant for online openness could unintentionally expose private information, leaving it ripe for the picking. Millennials bring innovative ideas about technology's use, but for that same reason, do they also pose new security risks?
-
Anti-virus vendor Symantec released a study in March 2008 assessing this issue. Symantec commissioned Applied Research-West to execute the study, and 600 participants were surveyed from different verticals, including government. Survey participants included 200 IT decision-makers, 200 Millennial workers and 200 non-Millennial workers born before 1980. The data revealed that Millennials are more likely than workers of other ages to use Web 2.0 applications on company time and equipment. Some interesting figures include: 69 percent of surveyed Millennials will use whatever application, device or technology they want at work, regardless of office IT policies; and only 45 percent of Millennials stick to company-issued devices or software, compared to 70 percent of non-Millennials.
-
How might young people be workplace assets? Could all that time typing or texting make them speedy typists, able to whip up memos at the drop of a hat? Does familiarity with new and emerging technologies have its benefit? You bet, according to Dustin Lanier, director of the Texas Council on Competitive Government. The council brings state leaders together to shape policy for government departments, including IT. "I think they've built an approach to work that involves a lot of multitasking," Lanier said of the Millennials. "Something will be loading on one screen, you alt-tab to another application and pull up an e-mail, the first process loads, you flip back, start a new process, flip to a forum and pull up a topic. It's frenetic but normal to that group." Lanier doesn't think Millennials present more of an IT threat than their older co-workers. After all, young people don't have a monopoly on being distracted in the office. "I can't tell you how many times I've walked by people's desks of all ages and seen Minesweeper up," he said. He thinks employers should embrace some Web 2.0 applications. Otherwise, Millennials might be discouraged from sticking around. According to Lanier, this younger work force comprises many people who think of themselves as free agents. Government should accommodate some of their habits in order to prevent them from quitting.
-
Get ready CIOs. They're coming. They have gadgets and doohickeys galore. They like their music downloadable and portable, and they grew up with the Internet, not before it. Their idea of community is socializing with people in other cities or countries through Facebook, MySpace or instant messages, and they use e-mail so often they probably think snail mail is an endangered species. They're the Millennials - those tech-savvy, 20-somethings and-under bound to warm up scores of office chairs left cold by retiring baby boomers. There's a good chance many will come to a government workplace near you, but their digital literacy could prove worrisome for security-conscious bosses.
Unblock MySpace - 0 views
How online predators target children - 0 views
-
One of the most dangerous, insidious aspects of the Internet is the targeting of children by online sexual predators. These criminals employ a series of clever, manipulative tactics to reach out to children in an effort to get them to meet in person. Any parent with children who use the Internet should be aware of the strategies employed by online predators.
Digital Citizenship: Ethical Direction [pdf] - 0 views
Internet Safety for Kids: The Secret to Keeping Your Privacy - 0 views
Curbing Cyberbullying in School and on the Web - 0 views
-
Many of the most egregious acts of cyberbullying do not take place during school hours or on school networks, a situation that presents a dilemma for public school administrators: If they punish a student for off-campus behavior, they could get hit with a freedom of speech suit. If they do nothing, students may continue to suffer and school officials theoretically could get hit with failure to act litigation. For school administrators, it appears to be an unfortunate “catch-22.” For lawyers, it’s a “perfect storm,” pitting freedom of speech advocates against the victims of cyberbullying and schools that try to intervene. There are no easy answers in this arena, few laws, and no well-established precedents that specifically deal with cyberbullying.
-
“School administrators can intervene in cyberbullying incidents, even if the incidents do not take place on school grounds, if they can demonstrate that the electronic speech resulted in a substantial disruption to the educational environment.”
-
These cases illustrate not only a lack of precedent on cyberbullying cases, but also a dilemma for school administrators on how to handle cyberbullying. “There are few laws that address how to handle cyberbullying, and many schools don’t have an internal policy to deal with cyberbullying that takes place off-campus,” offers Deutchman. “It may take an unfortunate and tragic event on school property to get more schools to consider tackling electronic behavior that originates off campus. It’s only a matter of time before a cyberbully, or the victim of cyberbullying, uses deadly force during school hours.”
- ...5 more annotations...
-
Most school administrators have more than one story to tell about cyberbullying. They report that victims of cyberbullying experience low self-esteem, peer isolation, anxiety, and a drop in their grades. They note that victims may miss class or other school-related activities. Principals also point to recent high-profile cases where cyberbullying, left unchecked, led to suicide. In response, some schools have created new policies and curbed free speech on the school's computer network and on all electronic devices used during school hours. This article offers practical advice for actions schools can take to curb bullying, ranging from policy development to education.
Digital Natives and the Myth of Multi-Tasking - 0 views
-
Dave Crenshaw discussed his latest book, The Myth of Multitasking. Crenshaw makes a strong distinction behind “background tasking”—reading a magazine while waiting in line, for instance, or listening to music while coding—and “switch-tasking.” Most of the time, when we talk about “multi-tasking,” we’re actually talking about the very costly practice of “switch-tasking.” Every time you switch your attention from one place to another—even from one browser window to another—you take a significant hit to your focus
-
Switch-tasking, he definitively proves, causes you to execute each task more slowly than you would otherwise, with more errors
-
pecifically, what can parents, teachers, and employers do to help their kids, students, and employees focus their attention more effectively? As a kid, student, and employee myself, I have to say that I believe the solution is emphatically not to limit access—at least not for older teens. Rather, I think the key lies in laying out the facts and discussing strategies. Information overload and the allure of infinite access, after all, are challenges that affect everyone with an internet connection—not just young people. And, though writing a stellar book report might not be a cause compelling enough to warrant total focus, every young person will at some point find a pursuit worth paying attention to. Maybe it’s writing short stories; maybe writing music. Maybe it’s making art. But when that pursuit comes along, they’re going to want to know how to firewall their attention, focus their efforts, and—for once—stop switching.
-
What ever happened to old-fashioned "discipline?" This question has come up constantly in my conversations with parents and teachers over the course of my involvement with the Digital Natives project. When parents glance over and see not only 50 browser tabs open on the family computer, but iTunes and a computer game and AIM too-with a book report relegated to a tiny corner of the screen-they're understandably bewildered. How do kids ever get anything done? "I'm just really good at multi-tasking, Mom," a savvy student might reply. And, as long as the work gets done, it seems hard to argue with that logic.
Top 5 Technologies used to Cyberbully - 0 views
Instant Messaging Found to Slow Students' Reading - 0 views
-
New study on the effects of instant messaging on reading comprehension. Students who send and receive instant messages while completing a reading assignment take longer to get through their texts but apparently still manage to understand what they're reading, according to one of the first studies to explore how the practice affects academic learning.
Cyber Bullying Presents a Complex Legal Landscape - 0 views
-
Cyber bullying conducted at school allows school authorities to more easily impose discipline. The use of school equipment to cyber bully also makes a stronger legal argument for action by the school. And if the student e-mails offensive speech to school or downloads it at school and then distributes it, the school is in an advantageous position regarding disciplining the student. However, speech created at home—such as the creation of a Web site—affords greater legal protection for cyber bullies.
-
“The problem with the approach that web speech created at home can—if accessed at school—become school speech that can be regulated is the very nature of the Internet. Once something is created and placed on the Internet, the author loses control over who can access the speech and where it can be accessed.”
-
As students across the country return to school, school districts face an often complicated and confusing legal landscape on how to deal with cyber bullies in their schools, according to Todd DeMitchell, EdD, a professor of education, who studies school liability, adequate supervision, and responses to preventing bullying and cyber bullying from school administrators and state legislatures.
For teens, the future is mobile - 1 views
« First
‹ Previous
141 - 160 of 608
Next ›
Last »
Showing 20▼ items per page
1.Facilitate and inspire student learning and creativity
2. Design and develop digital-age learning experiences and assessments
3.Model digital-age work and learning
4. Promote and model digital citizenship and responsibility
5. Engage in professional growth and leadership.