Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged If

Rss Feed Group items tagged

Anne Bubnic

The Newest Breed of Bully, the Cyberbully - 0 views

  • While some of what is published online may seem libelous (i.e., intended to harm the reputation of another), proving that point can be difficult and expensive. In order to prove libel, you have to prove malicious intent, something that might prove difficult if the offending Web page was put up by an adolescent. And many times, freedom of speech wins out.
  • Unless an actual crime has taken place, law enforcement officials often are unable to arrest anyone, even if they can identify the culprit. According to Lt. John Otero, commanding officer of the computer crime squad for the New York City Police Department, individuals would actually have to post a direct threat in order for the police to act. "For example, if they say, 'tomorrow I am going to hurt, kill, or injure an individual,' that would constitute a crime," he explains. A person posting such a threat could be arrested and charged with aggravated harassment. Although Otero says his department has seen some arrests, anyone under the age of 18 would not be dealt with harshly: "If the kid is too young, he would get a scolding and the incident would be brought to the parents' attention; if they are under 16, they are considered minors."
  • Like cliques, cyberbullying reaches its peak in middle school, when young adolescents are trying to figure out who their friends are and whether they fit in. "Third- and 4th-graders are just having fun with computers," says Loretta Radice, who taught computer skills to middle-schoolers in public and private schools for more than 15 years.
  • ...1 more annotation...
  • While the cyber- bully believes he cannot be caught, Radice notes that everyone leaves footsteps in cyberspace. "Everything is traceable," she says. "Kids often don't realize that."
  •  
    Because cyberbullying is such a new phenomenon, school and law enforcement officials in the United States and other countries are still sorting out the legal technicalities. "Most of what is done online is protected as free speech," says Frannie Wellings, policy fellow at the Electronic Privacy Information Center in Washington, DC.
Anne Bubnic

Implications for teachers who socialize with students online - 1 views

  • Always exercise extreme care when communicating online with students and if at all possible, avoid socializing. These measures, along with district policy that preempts the possibility of inappropriate relationships developing online between staff and students, seems the best way to go.
  •  
    Significant concerns raised about student-teacher intractions in a social media environment, including the issue that students flirt. Relatedly, anything performed online by a public school employee - including information and images posted on social networking sites - will be used to judge the character of that individual. There is also the concern that the friends of the staff member may post unflattering information or tag inappropriate images of them which will quickly be used to prompt one major question: "Is this the kind of person we trust to be responsible for our children?"
Anne Bubnic

Facebook, Take 2: Cyberbullying - 0 views

  • I also asked them why they allowed certain girls to be on their friends list when they know that some of them will resort to this type of bullying, and most said because they felt they “had to.” This kind of pressure to allow “friends” on one’s site could also be considered a form of bullying, as they feel there may be consequences to shutting some out regardless of their lack of Internet etiquette.
  • As a public school principal, I can’t legally discipline a student for cyberbullying actions that take place outside of school that don’t result in bodily harm at school. However, when cyberbullying that has taken place outside of school becomes a school issue, as it did today, we must reserve the right to take action if the effects of outside cyberbullying threaten the safety or well-being of the student(s) in school, even if it hasn’t caused bodily harm…yet.
  • School officials have the authority to impose discipline if the speech has, or there are particularized reasons to believe it will cause a substantial disruption at school or interference with the rights of students to be secure. Three types of situations generally meet this standard - violent altercations, hostile environment for a student, significant interference with instruction.
  •  
    Our Acceptable Use of the Internet policy next school year will definitely not only address cyberbullying, it will include a clause that states something to the effect, "If cyberbullying outside of school becomes an issue in which a student feels threatened or unsafe in any way at school, the principal has the authority to discipline the cyber bully." It will give the school community the clear message that cyberbullying will not be tolerated and at the very least will give me a little leverage when I need it.
JOSEPH SAVIRIMUTHU

Technology in the 21st Century Classroom - 0 views

  • On Wednesday, April 29, 2009 the Ontario Public School Boards’ Association (OPSBA) released a Discussion Paper entitled: What If? Technology in the 21st Century Classroom. As school trustees we want to engage the province in a meaningful focused discussion about classrooms of the 21st century. We want to be part of developing a provincial vision and strategies that will make all our classrooms connected and relevant. “Today’s students are leaders in the use of technology and we know they want their learning experiences in school to reflect this,” said Colleen Schenk, president of OPSBA. “Students want to take the technology they use in their daily lives and integrate it with how they learn. They want their learning clearly connected to the world beyond the school.” The Discussion Paper asks the question: “How can schools continue to be connected and relevant in the world of the 21st century?” It explores the relationship between the use of technology and the scope for increasing the quality of teaching and learning.
    • JOSEPH SAVIRIMUTHU
       
      Is this the next phase of the Read/Write Web for Children?
  •  
    The paper asks how schools should use technology if they wish to remain relevant in today's world, and how technology can be used to improve the quality of teaching and learning. "If literacy is the ability of the individual to articulate ideas in the main medium of society, how relevant are our current approaches?
buyglobalshop

Buy Propeller Ads Accounts - Best Quality Everything Propeller Ads Accounts 2024 - 0 views

  •  
    If you're looking to monetize your site or app, you've likely come over promoting systems like Propeller Advertisements. Propeller Advertisements is a well known advertisement arrange that offers different monetization arrangements for distributers, sponsors, and partners. One key viewpoint of utilizing Propeller Advertisements is making and overseeing your account, which permits you to get to their administrations and devices to produce revenue. What precisely is Propeller Advertisements Account? Propeller Advertisements Account is a well known online promoting stage that is utilized by site proprietors and businesses to advance their items and administrations. Buy Propeller Ads Accounts This stage permits clients to make and oversee advertisement campaigns, target particular gatherings of people, and track their execution through nitty gritty analytics. With Propeller Advertisements Account, clients have the capacity to reach a tremendous gathering of people over different gadgets and stages, making it a flexible and compelling device for computerized promoting strategies. Whether you are a little trade proprietor looking to increment brand mindfulness, or a site proprietor looking for to monetize your online substance, Propeller Advertisements Account can give you with the instruments and assets required to accomplish your promoting objectives. By utilizing this stage, clients can make outwardly engaging advertisements, target their craved group of onlookers based on socioeconomics and interface, and optimize their campaigns for greatest execution. With its user-friendly interface and comprehensive bolster administrations, Propeller Advertisements Account is a important resource for anybody looking to boost their online nearness and drive activity to their website. Is it free to make a Propeller Advertisements Account? In expansion to being free, making a Propeller Advertisements Account too opens up openings for you to win cash through the stage. By lever
Dimny Lopzzy

simple Apply For Online Long Term Payday Loans Easily! - 0 views

  •  
    If you need to get financing help within a same day if say yes, apply for Online long term payday loans @http://www.onlinelongtermloans.com/about-us.html
Anne Bubnic

Digital Lifestyle Youth Culture Profile Report 2008 - 0 views

  • For example, miniDV cameras are not only among the new tools of self-expression, but the very act of creating personal videos with friends and creating events and key themes to shoot have become key aspects of entertainment in and of itself. To this generation, playing music via your cell phone, and movies and TV shows via your iPod are a given. Emailing is considered too old-school by many, whereas texting is outpacing cell phone calls. These things also go hand-in-hand with changes in online shopping patterns, top website preferences, communication and blogging patterns, and new habits for using social networks—not to mention the tremendous changes in preferred social networks and profile page usage patterns in general. These things are changing the paradigm of how the businesses of entertainment, communication, retail, marketing, advertising, and branding have been done in the past.
  • Unfortunately, as more companies pour big money into expanding their new media marketing components, as many people have discovered, the Field of Dreams theory (“if we build it, they will come”) certainly doesn’t apply when it comes to reaching savvy youth today. Popping up a site (or social network for that matter) no matter how cool it is means nothing if you can’t reach the market it’s intended for. This Report, therefore, also includes a great deal about how young people find out about new websites, communicate with others, and other forms of grassroots networking.
  • Overall, the Digital Lifestyle Youth Culture Profile Report 2008 not only reveals traits by target demographics, but also the growing generation gap occurring even within this generation.
  •  
    [Market Research Report]

    "Young people are the inherent trend leaders when it comes to new technology and usage patterns, and are the ones pushing forward the speed of change in communication and information technology. This Report reveals that it may be imperative for some brands to re-think strategies--even among progressive companies--if they are to reach youth culture effectively.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Anne Bubnic

Blogs allow kids at Gilbert school to express feelings - 0 views

  •  
    Students, administrators and teachers at Gilbert Classical Academy have a new tool to express themselves that is rarely tapped by schools as a teaching aid: blogs. Blogs have been available on the Internet for years, offering Web users an opportunity to opine on various subjects and post images in a personal journal that anyone on the Internet can read. But schools have generally not utilized them as a classroom tool because officials have such worries as: What if inappropriate messages are posted? What if a hacker steals personal information on a child or staff member?
Anne Bubnic

Curbing Cyberbullying in School and on the Web - 0 views

  • Many of the most egregious acts of cyberbullying do not take place during school hours or on school networks, a situation that presents a dilemma for public school administrators: If they punish a student for off-campus behavior, they could get hit with a freedom of speech suit.  If they do nothing, students may continue to suffer and school officials theoretically could get hit with failure to act litigation. For school administrators, it appears to be an unfortunate “catch-22.” For lawyers, it’s a “perfect storm,” pitting freedom of speech advocates against the victims of cyberbullying and schools that try to intervene. There are no easy answers in this arena, few laws, and no well-established precedents that specifically deal with cyberbullying.
  • “School administrators can intervene in cyberbullying incidents, even if the incidents do not take place on school grounds, if they can demonstrate that the electronic speech resulted in a substantial disruption to the educational environment.”
  • These cases illustrate not only a lack of precedent on cyberbullying cases, but also a dilemma for school administrators on how to handle cyberbullying.  “There are few laws that address how to handle cyberbullying, and many schools don’t have an internal policy to deal with cyberbullying that takes place off-campus,” offers Deutchman.  “It may take an unfortunate and tragic event on school property to get more schools to consider tackling electronic behavior that originates off campus.  It’s only a matter of time before a cyberbully, or the victim of cyberbullying, uses deadly force during school hours.”
  • ...5 more annotations...
  • So, what should schools do in the meantime?  First, school officials should establish a consistent internal policy (much like a crisis plan) and a team (minimally made up of the principal, school counselor, and technology director) to deal with cyber-misconduct. This team should fully document disruptive incidents and the degree to which the learning environment is affected. The principal should invite the cyberbully’s parents to review the offending material before considering disciplinary action. Most parents at this point will do the right thing.
  • Second, schools should educate children, starting in elementary school, about the importance of cyber-safety and the consequences of cyberbullying, especially on the school’s own network. These rules should be clearly posted in the computer labs and written in age-appropriate language. The rules should be sent home to parents each year—and they should be posted prominently on the school’s website.
  • Third, teachers should continue incorporating in their curriculum projects that utilize the web and other powerful new technologies. This probably won’t help schools avoid lawsuits; it’s just good pedagogy. It’s not surprising that schools that keep up with the latest technology and software—and employ teachers who care about the quality of online communication—report lower incidents of cyber-misconduct.
  • In addition, schools should update their codes of conduct to include rules that can legally govern off-campus electronic communication that significantly disrupts the learning environment. They should also assign enough resources and administrative talent to deal with students who engage in cyber-misconduct. One very big caveat: Disciplining a student for off-campus electronic speech should be done only as a last resort, and certainly not before seeking legal counsel.
  • Finally, schools should realize that not all cyberbullies need to be disciplined. Schools should act reasonably, responsibly, and consistently—so as to avoid the very bullying behavior they are trying to curb. Until the courts provide clear standards in the area of off-campus electronic speech for young people, these recommendations will go a long way in making schools a safer learning environment for everyone.
  •  
    Most school administrators have more than one story to tell about cyberbullying. They report that victims of cyberbullying experience low self-esteem, peer isolation, anxiety, and a drop in their grades. They note that victims may miss class or other school-related activities. Principals also point to recent high-profile cases where cyberbullying, left unchecked, led to suicide. In response, some schools have created new policies and curbed free speech on the school's computer network and on all electronic devices used during school hours. This article offers practical advice for actions schools can take to curb bullying, ranging from policy development to education.
Anne Bubnic

Eight Ways to Handle Cyberbullies - 0 views

  • 1. Identify and blockFirst, ask your child not to respond or retaliate, no matter how tempting it may be to fight back. If you can identify who's cyberbullying your child, block any further communications.
  • 2. Set boundariesYou, not your kids, should also contact the bully (or bullies) and demand the offending behavior stop
  • 3. File a complaint Most cyberbullying behavior -- harassment, threats, invasion of privacy, stalking -- are violations of a web site or Internet service provider's "terms of service."
  • ...5 more annotations...
  • 4. Contact the schoolIf you know the bully attends the same school as your child, teachers and administrators might be able to help.
  • 5. Send a certified letterIf you've done all you can and the bullying hasn't stopped, send the child's parents a certified "cease and desist" letter.
  • 6. Call an attorneyIn the worst case scenario, a lawyer can help you consider filing a civil suit against bullies and/or their parents for defamation, harassment or other causes.
  • 7. Contact the local policeIf there's any evidence that the cyberbully's tactics include criminal actions, such as hate crimes, physical threats or talk of brandishing weapons at school, contact your local police immediately.
  • . Talk with your kids about what's acceptableAnne Collier, editor of NetFamilyNews web site, an email newsletter about online safety for kids, says to truly stop cyberbullying, however, you have to first know what's happening when your kids are online.
  •  
    Nancy Willard and Anne Collier offer eight ways to deal with cyberbullies in this article.
    1. Identify and block.
    2. Set boundaries.
    3. File a complaint.
    4. Contact the school
    5. Send the parents a certfied "cease and desist" letter.
    6. Call an attorney.
    7. Contact the local police.
    8. Talk with your kids about what's acceptable.

Anne Bubnic

MySpace.com - Pause - 0 views

  •  
    It only takes a minute to change your life. In this collaboration with the Kaiser Family Foundation, the PAUSE campaign recognizes that in a minute, everything can change. Impulsive behaviors are part of being young. Through the campaign, Fox Networks Group and Kaiser hope to encourage young people to "pause" - even if just for sixty seconds -- when confronted with a difficult or risky decision, consider the best option, and reach out to get more information and help if they need it. In that minute, they have the choice to make a good or bad call. As PAUSE indicates, "it only takes a minute to change your life." For a young person, that kind of power can be intimidating, yet also very empowering. Site includes PSA's targeting youth and informational resources.
Lucy Gray

When Young Teachers Go Wild on the Web - 0 views

  •  
    Do risque pages matter if teacher performance is not hindered and if students, parents and school officials don't see them? At what point are these young teachers judged by the standards for public officials?
Anne Bubnic

Blocking the Future [AASA Article] - 0 views

  •  
    Thought-provoking article by Scott McLeod. If a district has decided to figure out ways to facilitate technology usage and empower students and staff, the policies will follow accordingly. Conversely, if a district is determined to treat technology from a fearful or wary standpoint, its policies will reflect that position as well.
Anne Bubnic

Using Google SMS to Enrich Social Studies Instruction - 1 views

  •  
    This lesson can be implemented at school if you are teaching in an environment that allows students to use personal learning devices, or outside of school if students are banned from using digital devices.
Anne Bubnic

Teaching Kids to Manage their Digital Footprint - 2 views

  •  
    Teaching kids to manage their Digital Footprint really starts with the adults. Teachers can't teach this effectively if they, themselves have not managed their own digital footprint. It is also important not to confuse managing a digital footprint with being hidden or private. Branding our identities has become more and more important in the digital age and if students and teachers aren't actively managing their digital footprint, then who is?
Anne Bubnic

Students: Everything Kids Need to Know About Wireless - 3 views

  •  
    One of eight interactive case studies for kids (GR 4-8) from Cable In the Classroom: Power to Learn.
    An understanding of the wonderful world of wireless will help the young people avoid any pitfalls that may arise from using laptops, smart phones, and PDAs. And if they are going to be using wireless technology it doesn't hurt if they understand how it works. This unit explains the importance of password protection and cybersecurity. The graphics are Nickelodeon style. A short quiz assesses understanding. For the entire series, check out: http://powertolearn.com/internet_smarts/interactive_case_studies/index.shtml
Go Jobio

Don't Discuss Irrelevant Job Experiencesand Achievements - 0 views

  •  
    Employers at big corporations don't care if you dressed as Donald Duck in Disneyland for extra cash to pay off your tuition while going to college. You'd be better off saving that information for a fun conversation at your next company lunch meeting. However if you were the executive manager at a retail store, and are applying for a sales position, you can illustrate the people, organizational, and leadership skills that you acquired in your previous position.
Go Jobio

Don't Be Casual - 0 views

  •  
    Emergencies happen. Sure. You can't control the accidents on I-5 freeway, or the bus drivers showing up late. But you can definitely be prepared. Commute to the site of your interview before the day of your interview. See how long it takes to get there. On the day of your interview, give yourself enough time to be there early, even IF unexpected circumstances arise. With all that said, if you are still running late, CALL the interviewer! It's common courtesy. And there is almost a zero-percent chance of getting called back if you are late AND don't call to let them know.
raushan-19

Satta Matka | Kalyan Fix Matka | Matka Boss | SattaMatka: Online Kalyan Matka Results - 0 views

  •  
    Frinds... If You Want To Get Best kalyan Matka Result & Also Get Online kalyan Matka Tips If You Really Want To Win Matka Game. Then Without Lossing Your Time Just Keep Visit To Our Site. https://www.sattamatka.net
‹ Previous 21 - 40 of 373 Next › Last »
Showing 20 items per page