Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged Key

Rss Feed Group items tagged

Anne Bubnic

Back to School Tips| Americans for Technology Leadership - 0 views

  • Cyberbullying Cyberbullying or online bullying is repeated, unwanted or cruel behavior against someone through computers, cell phones, gaming consoles, or other Internet-based means. The Internet is always “on,” opening the door for 24-hour harassment. Cyberbullies can be anonymous. They never have to confront their victims, they don’t have to be physically stronger and cyberbullies may be virtually invisible to parents and adults.
  • Look for warning signs your child may be the victim of cyberbullying – depression, lack of interest in school and friends, drop in grades and subtle comments that something may be wrong. If your child is the victim of cyberbullying, take action. By filtering email, instant messages and text messages, you can cut off many of the ways the cyberbullies contact your child. By having your child avoid the sites and groups where the attacks occur, he/she can ignore the bully. If harassment continues, change your child’s email address, user names and Internet account. If these steps do not stop the cyberbullying, contact the parents of the child who is behind the bullying, contact the school, and if the situation is not resolved, involve the police. It’s important to compile copies of harassing emails and postings to have evidence for authorities or the school, so they can take action. Look for signs that your child may be the cyberbully themselves – if they sign onto the Internet under someone else’s name, if they use someone else’s password without their permission, if they posted rude or mean things about someone else online, if they use bad language online, or if they changed their profile or away message designed to embarrass or frighten someone. Talk to your kids about cyberbullying and why it’s wrong and hurtful.
  •  
    As children go back to school, many parents are concerned about how their children will be using the computer and Internet devices in the classroom. Communication is key. Parents need to talk with their children about how to use the Internet safely, potential threats and appropriate usage of the Internet. By understanding both the benefits and the risks of Internet use, families can have a safer and more secure online experience. This article includes key tips on cyberbullying, internet safety, privacy and security.
Susie Highley

Social Media Literacy: The Five Key Concepts | Edutopia - 0 views

  •  
    Great list to help raise awareness
Rhondda Powling

Young People, Ethics, and the New Digital Media | The MIT Press - 4 views

  •  
    "The authors argue that five key issues are at stake in the new media: identity, privacy, ownership and authorship, credibility, and participation. Drawing on evidence from informant interviews, emerging scholarship on new media, and theoretical insights from psychology, sociology, political science, and cultural studies, the report explores the ways in which youth may be redefining these concepts as they engage with new digital media."
  •  
    "The authors argue that five key issues are at stake in the new media: identity, privacy, ownership and authorship, credibility, and participation. Drawing on evidence from informant interviews, emerging scholarship on new media, and theoretical insights from psychology, sociology, political science, and cultural studies, the report explores the ways in which youth may be redefining these concepts as they engage with new digital media."
Anne Bubnic

Messaging Shakespeare | Classroom Examples | - 0 views

  • Brown's class was discussing some of the whaling calculations in Moby Dick. When one student asked a question involving a complex computation, three students quickly pulled out their cell phones and did the math. Brown was surprised to learn that most cell phones have a built-in calculator. She was even more surprised at how literate her students were with the many functions included in their phones. She took a quick poll and found that all her students either had a cell phone or easy access to one. In fact, students became genuinely engaged in a class discussion about phone features. This got Brown thinking about how she might incorporate this technology into learning activities.
  • Brown noticed that many students used text messaging to communicate, and considered how she might use cell phones in summarizing and analyzing text to help her students better understand Richard III. Effective summarizing is one of the most powerful skills students can cultivate. It provides students with tools for identifying the most important aspects of what they are learning, especially when teachers use a frame of reference (Marzano, Pickering, & Pollock, 2001). Summarizing helps students identify critical information. Research shows gains in reading comprehension when students learn how to incorporate isummary framesi (series of questions designed to highlight critical passages) as a tool for summarizing (Meyer & Freedle, 1984). When students use this strategy, they are better able to understand what they are reading, identify key information, and provide a summary that helps them retain the information (Armbruster, Anderson, & Ostertag, 1987).
  • Text messaging is a real-world example of summarizing—to communicate information in a few words the user must identify key ideas. Brown saw that she could use a technique students had already mastered, within the context of literature study.
  • ...2 more annotations...
  • To manage the learning project, Brown asked a tech-savvy colleague to help her build a simple weblog. Once it was set up, it took Brown and her students 10 minutes in the school's computer lab to learn how to post entries. The weblog was intentionally basic. The only entries were selected passages from text of Richard III and Brown's six narrative-framing questions. Her questions deliberately focused students' attention on key passages. If students could understand these passages well enough to summarize them, Brown knew that their comprehension of the play would increase.
  • Brown told students to use their phones or e-mail to send text messages to fellow group members of their responses to the first six questions of the narrative frame. Once this was completed, groups met to discuss the seventh question, regarding the resolution for each section of the text. Brown told them to post this group answer on the weblog.
  •  
    Summarizing complex texts using cell phones increases understanding.
Anne Bubnic

Facebook's 'Porn Cops' Are Key to Its Growth - 0 views

  •  
    Fcebook describes these staffers as an internal police force, charged with regulating users' decorum, hunting spammers and working with actual law-enforcement agencies to help solve crimes. Part hall monitors, part vice cops, these employees are key weapons in Facebook's efforts to maintain its image as a place that's safe for corporate advertisers-more so than predecessor social networks like Friendster and MySpace.
Anne Bubnic

Digital Lifestyle Youth Culture Profile Report 2008 - 0 views

  • For example, miniDV cameras are not only among the new tools of self-expression, but the very act of creating personal videos with friends and creating events and key themes to shoot have become key aspects of entertainment in and of itself. To this generation, playing music via your cell phone, and movies and TV shows via your iPod are a given. Emailing is considered too old-school by many, whereas texting is outpacing cell phone calls. These things also go hand-in-hand with changes in online shopping patterns, top website preferences, communication and blogging patterns, and new habits for using social networks—not to mention the tremendous changes in preferred social networks and profile page usage patterns in general. These things are changing the paradigm of how the businesses of entertainment, communication, retail, marketing, advertising, and branding have been done in the past.
  • Unfortunately, as more companies pour big money into expanding their new media marketing components, as many people have discovered, the Field of Dreams theory (“if we build it, they will come”) certainly doesn’t apply when it comes to reaching savvy youth today. Popping up a site (or social network for that matter) no matter how cool it is means nothing if you can’t reach the market it’s intended for. This Report, therefore, also includes a great deal about how young people find out about new websites, communicate with others, and other forms of grassroots networking.
  • Overall, the Digital Lifestyle Youth Culture Profile Report 2008 not only reveals traits by target demographics, but also the growing generation gap occurring even within this generation.
  •  
    [Market Research Report]

    "Young people are the inherent trend leaders when it comes to new technology and usage patterns, and are the ones pushing forward the speed of change in communication and information technology. This Report reveals that it may be imperative for some brands to re-think strategies--even among progressive companies--if they are to reach youth culture effectively.
Anne Bubnic

Do Social Networks Bring the End of Privacy? [Scientific American] - 0 views

  • The closest U.S. privacy law comes to a legal doctrine akin to copyright is the appropriation tort, which prevents the use of someone else’s name or likeness for financial benefit. Unfortunately, the law has developed in a way that is often ineffective against the type of privacy threats now cropping up. Copyright primarily functions as a form of property right, protecting works of self-expression, such as a song or painting. To cope with increased threats to privacy, the scope of the appropriation tort should be expanded.
  •  
    Young people share the most intimate details of personal life on social-networking Web sites, such as MySpace and Facebook, portending a realignment of the public and the private. A post on YouTube can provoke global ridicule with the press of a return key. Social networks are forcing us to redefine what is truly private and what is public.
Anne Bubnic

What Does COPPA Mean or Your Schools? - 0 views

  •  
    The Children's Online Privacy Protection Act (COPPA) is the key privacy regulation that protects children from having information about them collected by web site owners. In effect since April 2000, COPPA prohibits a web site owner or operator from "knowingly collecting information from children under the age of 13 unless the operator obtains parental consent and allows parents to review their children's information and restrict its further use."
Anne Bubnic

Cyber Bullying is something kids can't talk about - 0 views

  •  
    Although there are those high-profile news stories of how cyber bullying has led kids to commit suicide, most of it is much lower key. High-school-age kids tell stories of how cyber bullying has become a routine part of the world they inhabit, so pervasive that they can't imagine a time when it didn't take place.
Anne Bubnic

ISTE Classroom Observation Tool - 0 views

  •  
    The ISTE Classroom Observation Tool (ICOT®) is a FREE online tool that provides a set of questions to guide classroom observations of a number of key components of technology integration.
Anne Bubnic

Cyberbullying The Real Threat on the Digital Playground - 0 views

  • "Parents are the key to this whole issue," explains Leasure. "They need to be involved and monitoring the computer and Internet activity of their kids. If they see something that isn't right, they need to act as parents and correct the issue."
  • parental awareness is truly the key to fixing this problem. If your child is the victim - or worse, the bully - it's time to step in. it's not being over-protective; it's trying to stop the current generation from 'virtually' destroying themselves emotionally
  • Cyberbullying Statistics: A recent survey of 395 students, ages 11 to 19, was conducted by the Kids/Teen Division of the Maine-based online safety organization Working To Halt Online Abuse. The study found that: � 28% of students have been cyberbullied, but... � Just over half tell their parents or another adult about it; of the students who did not report the cyberbullying, 25% felt it wasn't a big problem or didn't want to make a big deal out of it � 65% reported the cyberbullying was via IM, followed by email, MySpace, chat rooms and online games � 43% were cyberbullied by someone their age or in the same grade � 30% blocked or deleted the cyberbully, while 16% ignored them � 54 students admitted they had bullied somebody online themselves
  •  
    While reports and stories in the media focusing on Internet predators have become all too frequent, the closer-to-home threat to our children may really be cyberbullying, also known as electronic or online bullying. A recent survey of 395 students (11 to 19 years old) found that 28% of students have been cyberbullied, and more than 1 in 7 admitted to acting as the bully."Cyberbullying could be the biggest online threat facing teens today," says James Leasure, co-founder of Pandora Corp. "Of course Internet predators do still exist, but statistically, kids have a much greater chance of being involved in some way with electronic bullying." Most cases of cyberbullying go undocumented because, fortunately, many kids are able to shrug off the 'unkind words' and look the other way. But there are some cases that make national headlines when they turn into tragedies, such as the Megan Meier case in 2006. Larger cases like this have prompted several states to adopt legislation that makes online bullying illegal.
Anne Bubnic

NECC highlights tech's 'transformative' power - 0 views

  • Become powerful advocates for change. Regardless of who inhabits the White House next year, educational technology must play a more prominent role in our national education policy, Davis said--and educators should do everything they can to ensure that it does.
  • Share your knowledge and your passion. Help others take steps to ensure their growth as teachers, Davis said--so they can help students grow as learners. 3. Showcase your work, and students' work, in innovative ways. Invite parents and community leaders into your schools, Davis said--or take students' projects to them with the help of podcasts and other technologies.
  • Dream big. Have high expectations for your students, Davis said, because the possibilities that educational technology offers are "endless." 5. Use all of the resources available to you as you try to effect change. These include ISTE's many online resources, such as the group's National Educational Technology Standards and its research-based reports.
  •  
    2008 National Educational Computing Conference also touts collaboration as a key to 21st-century learning
Judy Echeandia

Friend or Foe? Balancing the Good and Bad of Social-Networking Sites - 0 views

  •  
    This three-part article includes a discussion of classroom connections to social networking sites and the school's role in intervening when information that affects the classroom is publicly posted on MySpace or Facebook. The authors also provide five key social networking tips:
    1. Establish a policy for dealing with incidents in which students break school rules and their inappropriate behavior is showcased publicly on social-networking sites.
    2. Outline clear guidelines for administrators that spell out how schools should discipline students based on information garnered from social-networking sites, and let parents and students know about those rules.
    3. Educate students about online-safety issues and how to use sites such as Facebook and MySpace responsibly.
    4. Have a policy in place for dealing with cyber bullying.
    5. If teachers are using social-networking sites for educational purposes, they should establish clear guidelines for how they intend to communicate with students via those sites.

Anne Bubnic

Survey of Cybercrime in K12 Schools - 0 views

  •  
    The Rochester Regional Cybersafety and Ethics Initiative has conducted the largest cyber safety and ethics survey of K-12 students in the Nation, with more than 40,000 students throughout the area participating. This new study shows that the majority of cyber offenses involving children, adolescents and young adults are perpetrated, not by adults, but rather by peers of approximately the same age or grade level. For a summary of the research report, see: Key RIT Cybercrime Research Findings.

Anne Bubnic

Technology encourages students' social skills - 1 views

  •  
    Well-integrated technology opens social networks for students and allows children to develop key social skills, according to two recent studies conducted by researchers at the University at Buffalo, State University of New York, and the University of Illinois at Urbana-Champaign.
Anne Bubnic

What Does It Mean To Be Media Literate? - 0 views

  •  
    How media smart are you? How about your children or students? Sometimes called media literacy or information literacy, it's a key 21st Century skill because it provides a framework and method to think critically about the media you consume and create. Being media smart also means you know how to use television, the Internet and other technologies safely, productively and ethically.
Vicki Davis

Web Etiquette and Safety Lesson Plan [Assessment Piece] - 0 views

  • A person is on the other end of all web communication. The web connects people in a community where everyone becomes each other's neighbor. It is just as important to observe safety on the Internet as it is to follow traffic signs. The Think.com community is a place where the teacher sees everything. Everyone is responsible for his/her own actions while in Think.com. Passwords are to be kept secret.
    • Vicki Davis
       
      Excellent concluding concepts for an introductory course for young students. How many don't understand this!
  •  
    Appropriate web etiquette (netiquette) and web safety are vital for building a strong web community. This is a lesson plan that teachers can use to introduce key concepts to their students as they introduce them to the Think.com community. Use this model lesson as designed, change it to fit your needs, or create your own.
Anne Bubnic

Barack Obama is master of the new Facebook politics | - 0 views

  •  
    It was one of Clinton's many huge errors that she bypassed Silicon Valley's fundraisers in favour of more traditional areas of Democratic support. And she missed the key element of the new politics: social networking. She was still AOL; Obama was Facebook. Clinton was the PC; Obama was a Mac.
Anne Bubnic

Pew Internet Study of Online Activities and Pursuits [eCommerce] - 0 views

  •  
    [May 18, 2008] Most online Americans view online shopping as a way to save time and a convenient way to buy products. At the same time, most internet users express discomfort over a key step in online shopping -- sending personal or credit card information over the internet. Internet users like the convenience but worry about the security of their online information.
Vicki Davis

Children Online: Getting Younger and Continuing to Take Risks - 0 views

  • 16% posted personal interests 15% posted information about their physical activities 20% gave out their real name 5% posted information about their school 6% posted their home address 6% posted their phone number 9% posted a photograph of themselves
    • Vicki Davis
       
      Again, education is so important of both students and parents.
  •  
    A 2007-2008 research study conducted by Rochester Institute of Technology (RIT) reported several key findings that indicate children are logging on to the Internet at a very young age. Parental supervision of this computer activity, however, is generally lax. Not surprisingly, the study found that children are communicating with friends, peers, and others online in ways that show a lack of knowledge in what is ethical, safe behavior.
1 - 20 of 66 Next › Last »
Showing 20 items per page