Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged ID

Rss Feed Group items tagged

anonymous

Online Predators and Their Victims - 0 views

  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
  • ...21 more annotations...
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
    • anonymous
       
      Let's remember that although there are direct references to gay and male pedophiles of gay boys, that 99% of child sex offenders identify as heterosexual, online or offline.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    This research article has the facts about sexual predatory behavior.
Phil Macoun

Digital-ID - home - 1 views

  • We've created the Digital ID wiki with a two-fold purpose: Provide students, teachers, and administrators with a toolkit of reliable information, resources, and guidelines to help all of us learn how to be upstanding Digital Citizens who maintain a healthy Digital Identity (ID) in the 21st Century.Build a collaborative platform for teachers and students the world over to contribute to our ever-growing curriculum collaborations and student-created content. Our goal is to help our students answer these three Essential Questions: What does it mean to be a (digital) citizen?What are my rights as a citizen?What are my responsibilities as a citizen?
Dean Mantz

Digital-ID - home - 9 views

  •  
    This page gathers all of the Bloomin' Apps projects in one place! Each of the images has clickable hotspots and includes suggestions for iPad, Google, Android, and Web 2.0 applications to support each of the levels of Bloom's Revised Taxonomy.
  •  
    This wiki provides a great structure for classroom integration and addressing of Digital IDs and Citizenship.
Judy Echeandia

iPhones invade college campuses, but will they replace the student ID? - 0 views

  •  
    The challenge for many college administrators today is how can they put cell phones to work for both students and the college. In Palo Alto, Calif., home of Stanford University, developers of an iPhone application called iStanford 2.0 hopes one day to see the iPhone replace the campus ID card. The entrepreneurial Stanford students have already produced a suite of iPhone applications that access the university's course catalog, campus map and other resources.The application suite was rolled out in October and has already garnered national attention, including winning the $10,000 grand prize for AT&T's "Big Mobile on Campus" contest for best smart phone application. One of the student members of the firm said he hopes to see the iPhone replace student identification cards in the future.
Anne Bubnic

Teachable Moments in Cyberbullying/Cyberethics - 109 views

Teachable Moment: Student Hacking Experience Made a mistake? Own it, Fix it, Learn from it." Learn how this teacher developed a student contract and handled the consequences of computer...

cyberethics students teachable moment

JOSEPH SAVIRIMUTHU

Changes at MySpace Signal a Move Away From Social Networking | - 0 views

  • SHARETHIS.addEntry({ "title": "Changes at MySpace Signal a Move Away From Social Networking", "url": "http://www.thewrap.com/article/2736", "published": "1240950792" }, { "button": true })ShareThis yahooBuzzArticleHeadline = "Changes at MySpace Signal a Move Away From Social Networking"; yahooBuzzArticleSummary = "Sign of the times: One senior executive for comedy at MySpace has 1,403 friends on Facebook."; yahooBuzzArticleCategory = "entertainment"; yahooBuzzArticleType = "text"; thewrapcom49:http://www.thewrap.com/article/27363 votesBuzz up! Slideshow Depeche Mode's Traffic-Stopping Concert Depeche Mode celebrated the release of its 12th studio album, "Sounds of the Universe," with a free concert on Hollywood Boulevard Thursday evening -- which literally stopped traffic. The performance, which also appeared on ABC's "Jimmy Kimmel Live!" later in the evening, drew a reported crowd of over 10,000. (Photographs by Jonathan Alcorn) Keywords Facebook news corp MySpace Chris Van Natta
yc c

Amazon Kindle - Wikipedia, the free encyclopedia - 0 views

  • Kindle devices may report information about their users' reading data such as last page read, annotations, bookmarks, notes, highlights, or similar markings to Amazon.[132] The Kindle stores this information on all Amazon e-books but it is unclear if this data is stored for non-Amazon e-books.[133] There is a lack of e-reader data privacy — Amazon knows who the user's identity, what the user is reading, whether the user has finished the book, what page the user is on, how long the user has spent on each page, and which passages the user may have highlighted
Anne Bubnic

Student Bashes Administrators, Gets Disciplined - 0 views

  • According to Doninger, the principal told her that Jamfest was cancelled because of the students’ action. The principal denied saying that. That evening, Doninger posted an entry on her personal blog in which she noted that Jamfest had been cancelled, referred to the district administrators as “douchebags,” and encouraged continued contact with the superintendent to “piss her off more.” The following day the event was rescheduled. Sometime later school officials
  • The appeals court found that it was reasonably foreseeable that Doninger’s posting would reach campus and that the posting created a foreseeable risk of substantial disruption within the school environment because the language used was offensive. It likely disrupted efforts to resolve the controversy, and the posting that Jamfest had been cancelled made it foreseeable that school operations might well be disrupted further.
  • There was no evidence of any disruption at school. The only disruption was to the principal and superintendent in responding to what was an impressive response to the student’s call for complaints. There was no indication in the record that the disruption interfered in any way with the delivery of instruction or in any way impacted student welfare. If administrators are not being appropriately sensitive to the interests of students or are engaging in other actions that cause concern, students clearly should have the free speech right to protest and to call for other students and community members to register their complaints. Inconveniencing school administrators under such circumstances should not be considered to constitute substantial disruption.
  •  
    A court case upholds administrators' rights to discipline a student who used derogatory language on a blog, but questions arise. In Doninger v. Niehoff, the U.S. Court of Appeals for the Second Circuit ruled in May that a Connecticut school district that disciplined a student for vulgar and derogatory remarks made off-campus did not violate her free speech rights.
Anne Bubnic

Kids online? Cox Survey: Contact with strangers is not unusual. - 0 views

  • One in 10 of these preteenagers has responded to and chatted online with strangers, according to the Tween Internet Safety Survey, sponsored by Cox Communications and the National Center for Missing and Exploited Children.
  • 90 percent of American kids have used the Internet by age 9 and more than a third of 11- and 12-year-olds have a profile on social-network sites such as MySpace and Facebook.
  • Of the tweens with social-network profiles, 61 percent post personal photos online, 48 percent admit to posting a fake age online and 51 percent have received messages from people they didn't know.
  • ...2 more annotations...
  • The survey showed tweens' online presence doubles or even triples among 8- to 10-year-olds and 11- and 12-year-olds: The 42 percent of children 8 to 10 with personal e-mail accounts increases to 71 percent for those 11 and 12, for instance, and 41 percent of 11- and 12-year-olds have an instant-messaging screen name, compared with 15 percent for kids 8 to 10.
  • Half of the 11- and 12-year-olds have their own cell phones -- used for text messaging and taking and transmitting digital photos as well as for traditional calling -- while 19 percent of those 8 to 10 have their own cell phones.
  •  
    One in five of the nation's wired "tweens" -- kids ages 8 to 12 -- has posted personal information on the Internet, and more than a fourth have been contacted online by strangers, a poll released Tuesday found.
Anne Bubnic

Olivia's Letters [Lesson Plan on Cyberbullying Awareness/Empathy] - 0 views

  •  
    Olivia's Letters is a lesson plan about bullying and cyber bullying that is designed to develop empathy and bystander awareness in children and youth. It was inspired by a cyberbullying incident in Marin County, CA. Two Mill Valley teens empathized with the young girl who had been victimized and took it upon themselves to start an "Olivia's Letters" campaign to boost her spirits. Their actions resulted in over 14,000 letters to Olivia from people across the country and around the world.
  •  
    The Today Show interview with Olivia Gardner might be a useful addition to the lesson plan on Olivia's letters.
  •  
    The Today Show interview with Olivia Gardner might be a useful addition to the lesson plan on Olivia's letters.
Vicki Davis

Twitter gets you fired in 140 characters or less - 0 views

  • Clay Shirky speaks of a day in the not-too-distant future when human resources departments will have the wisdom to look beyond social networking faux pas — at least in some small part because by then, everyone will have made at least one.
  • Rep. Pete Hoekstra, R-Mich., tweeted this as-it-happens update regarding his group’s location and destination:"Moved into green zone by helicopter Iraqi flag now over palace. Headed to new US embassy Appears calmer less chaotic than previous here."
  • This social networking comedy of errors spread like dancing hamsters across Twitter. In the retelling, "theconnor" earned the nick, "Cisco Fatty." Before the work day ended, Web sleuths revealed "theconnor's" true identity. "Theconnor" was lampooned in a popular YouTube meme. And thanks to Google Cache, the deleted content of "theconnor’s" homepage resurfaced on CiscoFatty.com, a Web site erected to commemorate this cautionary tale.
  •  
    Students need to understand that NOTHING, I repeat NOTHING Is private. Great case study about how 140 characters got someone fired before they were even hired.
Anne Bubnic

Why Don't Teens Tweet? - 0 views

  • The implication is that 11% is a small number, but if we look deeper, it turns out that Twitter has a higher concentration of teens than Facebook. You can see in the chart below that Facebook is only 9% teen, so Twitter is actually more teen than Facebook, which rightly has never been perceived as having a “teen problem.” Facebook has so many users that teens just can’t be that large a percentage of the service, by definition.
  • Nielsen also suggested that “Teens Don’t Tweet” in a report that was destined to become a trending topic on Twitter itself. Almost as quickly as it came out, a number of bloggers, including Danah Boyd, debunked the study for charting the age group 2 – 24 and yet drawing conclusions about teens, noting there are not too many 2-year-olds on Twitter.
  • As it turns out, teens actually tweet more than the general population, prompting Silicon Valley Insider to say yesterday, “Kids Don’t Hate Twitter Anymore
  •  
    Over the last few months everyone has weighed in on the question of "Why Don't Teens Tweet" - except, it would appear, teens. We recently ran a survey of 10,000+ US teens aged 13 - 17 to see if we could add anything new to the question.
buyglobalsmm21

Buy Verified Binance Accounts-100% Fully Verified & cheap... - 0 views

  •  
    Buy USA Verified Binance Account The World's Largest Digital Currency Exchange In Terms Of Trading Volume Is Binance Exchange. Users Who Require Exchange Capabilities As Well As Workers Should Use Binance. Utilizing Coinbase And Binance Is Incredibly Simple And Completely Secure. These Two Factors Make Them The Closest Rivals In The Currency Exchange, And They Both Have A Large Audience Of Loyal Listeners. For The Safest And Least Expensive Verified Binance Account, Contact Us If You Need Binans Or Coinbase. BUYGLOBALSMM.Com Offers Verified Binance Account For Sale. We Have A Big Team And Hard-Working Members. Who Are Always Ready To Respond To You Anytime And Smart Support Too. Why Will You Purchase My Service? ➤ Gmail Access ➤ Number Access ➤ Binance Account Access ➤ Confirmed Residential Address ➤ Selfie Verified ➤ ID With Card Back & Front Photo ➤ Driving License ➤ Passport ➤ Others Information
  •  
    Buy USA Verified Binance Account The World's Largest Digital Currency Exchange In Terms Of Trading Volume Is Binance Exchange. Users Who Require Exchange Capabilities As Well As Workers Should Use Binance. Utilizing Coinbase And Binance Is Incredibly Simple And Completely Secure. These Two Factors Make Them The Closest Rivals In The Currency Exchange, And They Both Have A Large Audience Of Loyal Listeners. For The Safest And Least Expensive Verified Binance Account, Contact Us If You Need Binans Or Coinbase. BUYGLOBALSMM.Com Offers Verified Binance Account For Sale. We Have A Big Team And Hard-Working Members. Who Are Always Ready To Respond To You Anytime And Smart Support Too. Why Will You Purchase My Service? ➤ Gmail Access ➤ Number Access ➤ Binance Account Access ➤ Confirmed Residential Address ➤ Selfie Verified ➤ ID With Card Back & Front Photo ➤ Driving License ➤ Passport ➤ Others Information
buyglobalsmm21

Buy Facebook Ads Accounts-100% full verified, and cheap... - 0 views

  •  
    Buy Verified Facebook Business Manager Looking to Buy Verified Facebook Business Manager? We've got you covered! Buy Verified Facebook Business Manager is the most professional third party verification service provider on the market. We are here to help your business grow by providing you with real and authentic likes, followers, views, posts and engagements for your Facebook pages. Our staff works hard to provide the best quality services possible to make sure that all of our customers can be satisfied. Order now and see the results for yourself And get more exposure for your business! Why will you buy my service! ➤ 100% Satisfaction & Recovery Guaranteed ➤ 100% Verified Facebook Business Manager ➤ Unlimited Facebook Ads Create ➤ Phone Verified Accounts and Active Profiles ➤ All Documents Verified Facebook BM Accounts ➤ Photo ID Verified Ads accounts ➤ You can per day spending unlimited ➤ Money-Back Guarantee ➤ USA,UK,CAN,AUS,KHM,COL,DEU other countries Facebook ads ➤ 100% money-back guarantee ➤ 30 Days Replacement ➤ 24×7 Customer Support
  •  
    Buy Verified Facebook Business Manager Looking to Buy Verified Facebook Business Manager? We've got you covered! Buy Verified Facebook Business Manager is the most professional third party verification service provider on the market. We are here to help your business grow by providing you with real and authentic likes, followers, views, posts and engagements for your Facebook pages. Our staff works hard to provide the best quality services possible to make sure that all of our customers can be satisfied. Order now and see the results for yourself And get more exposure for your business! Why will you buy my service! ➤ 100% Satisfaction & Recovery Guaranteed ➤ 100% Verified Facebook Business Manager ➤ Unlimited Facebook Ads Create ➤ Phone Verified Accounts and Active Profiles ➤ All Documents Verified Facebook BM Accounts ➤ Photo ID Verified Ads accounts ➤ You can per day spending unlimited ➤ Money-Back Guarantee ➤ USA,UK,CAN,AUS,KHM,COL,DEU other countries Facebook ads ➤ 100% money-back guarantee ➤ 30 Days Replacement ➤ 24×7 Customer Support
razobali

Buy Verified Coinbase Account - 100% USA UK Coinbase - 0 views

  •  
    How to verify coinbase account on phone You need to provide a copy of your driver's license or passport, along with a selfie with your ID and that will be verified by phone. You can also upload a photo of the ID and the photo will be verified by phone. Get verified coinbase Accounts Coinbase is a digital currency exchange platform that allows you to buy, sell and store cryptocurrencies. The company was founded in 2012 by Brian Armstrong and Fred Ehrsam. Since then they have grown their user base significantly and now have more than 13 million customers worldwide. Buy Verified Coinbase Account Coinbase supports both Bitcoin and Ethereum. It's also possible to purchase other cryptocurrencies using your Coinbase account such as Litecoin, Bitcoin Cash or Ripple (XRP). Why buy coinbase accounts from RealServiceIT? Buying verified Coinbase accounts from RealServiceIT is the best place to do so. We have a large database of verified accounts, and we provide them at an affordable price. Buying a verified Coinbase account is safe and secure, because it's backed by our 24/7 customer support team and 100% money back guarantee. If you are not satisfied with your purchase then you can get a full refund within 24 hours of placing your order!
realcounterfeits

Buy North Carolina Driver's License - Buy genuine driving licence online - 0 views

  •  
    North Carolina Driver's License for sale - Buy genuine driving licence Are you looking to buy a North Carolina driver's license online? Do you need a driving grant in North Carolina? Have you been attempting to venture out to North Carolina? Do you need archives you cannot have? You are in the perfect spot at the perfect time if your answer is Yes. As the most renowned fake driver's license for sale online in North Carolina, UK, and Europe, we have a team of most competent, experienced and skilled employees who know how to recreate the exact features in the same way as the Department of Motor Vehicles (DMV) performs. If you are searching for the best place to get a fake driver's license online for North Carolina, UK, and Europe, look no farther than realcounterfeitsmoney.com Separate technicians are assigned to recreate different state and country license. When you buy fake IDs online for North Carolina, UK, and Europe, you find a special team entrusted with the task of creating a fake license. Reasons why you need to get a Driver's License online from us At realcounterfeitsmoney, we produce both Registered and Unregistered North Carolina Driver's License. Registered Driver's License: For the enlisted North Carolina DL, we register all your data into the North Carolina information base framework. Whenever checked to utilize an information understanding machine, your subtleties will obviously appear in the framework %100 genuine. Consequently, you will have the option to legitimately utilize it anyplace since it has no distinction with the one given by the legislature. Unregistered Driver's License: we additionally produce an unregistered North Carolina Driver's License that looks precisely like the enrolled duplicate yet no data enlisted in the information base. The report will be second hand. All mystery highlights of the government-provided visa will be copied and engraved on this Fake duplicate. We generally encourage our customers to let
  •  
    North Carolina Driver's License for sale - Buy genuine driving licence Are you looking to buy a North Carolina driver's license online? Do you need a driving grant in North Carolina? Have you been attempting to venture out to North Carolina? Do you need archives you cannot have? You are in the perfect spot at the perfect time if your answer is Yes. As the most renowned fake driver's license for sale online in North Carolina, UK, and Europe, we have a team of most competent, experienced and skilled employees who know how to recreate the exact features in the same way as the Department of Motor Vehicles (DMV) performs. If you are searching for the best place to get a fake driver's license online for North Carolina, UK, and Europe, look no farther than realcounterfeitsmoney.com Separate technicians are assigned to recreate different state and country license. When you buy fake IDs online for North Carolina, UK, and Europe, you find a special team entrusted with the task of creating a fake license. Reasons why you need to get a Driver's License online from us At realcounterfeitsmoney, we produce both Registered and Unregistered North Carolina Driver's License. Registered Driver's License: For the enlisted North Carolina DL, we register all your data into the North Carolina information base framework. Whenever checked to utilize an information understanding machine, your subtleties will obviously appear in the framework %100 genuine. Consequently, you will have the option to legitimately utilize it anyplace since it has no distinction with the one given by the legislature. Unregistered Driver's License: we additionally produce an unregistered North Carolina Driver's License that looks precisely like the enrolled duplicate yet no data enlisted in the information base. The report will be second hand. All mystery highlights of the government-provided visa will be copied and engraved on this Fake duplicate. We generally encourage our customers to let
abinayaseo

An article about website domain name factor in seo, best practices & tips - 0 views

  •  
    Domain names are the intelligible Internet locations of sites. Root domains, which are distinguished by their website names or domain names, have expansions, for example, .com, .organization, .net, and so on.
abinayaseo

Free classifieds sites in india for ads posting 2016, Benefits - 0 views

  •  
    Greater part of the marketers and SEO devotees utilize classified promotions for traffic improvement. However, you should recollect that utilizing free classifieds for SEO must be done painstakingly.
abinayaseo

Website Designing in Coimbatore, SEO, Professional Web Development - 0 views

  •  
    The web interfaces individuals and organizations over the world and utilization keeps on developing with every month, season and year. While desktop site use has gone level, general web utilization all in all keeps on developing at amazing rates. Clients have moved past the desktop and are utilizing tablets and cell telephones to keep them associated with the world.
1 - 20 of 124 Next › Last »
Showing 20 items per page