Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged Like

Rss Feed Group items tagged

Judy Echeandia

What Kids Learn from Social Networking | 21st Century Connections - 0 views

  • "What we found was that students using social networking sites are actually practicing the kinds of 21st century skills we want them to develop to be successful today," said Christine Greenhow, a learning technologies researcher in the university's College of Education and Human Development and principal investigator of the study.
  • "Students are developing a positive attitude towards using technology systems, editing and customizing content and thinking about online design and layout. They're also sharing creative original work like poetry and film and practicing safe and responsible use of information and technology. The
  • Web sites offer tremendous educational potential."
  •  
    University of Minnesota study uncovers the educational benefits of social networking sites. "What we found was that students using social networking sites are actually practicing the kinds of 21st century skills we want them to develop to be successful today," said Christine Greenhow, a learning technologies researcher in the university's College of Education and Human Development and principal investigator of the study.
Judy Echeandia

Study: Having 6,141 friends you don't know may be beneficial - 0 views

  • Scrabulous aside, there may be an educational upside to social networking websites like Facebook and MySpace.
  • "Students using social networking sites are actually practicing the kinds of 21st-century skills we want them to develop to be successful today," said Christine Greenhow, a learning technologies researcher in the university's College of Education and Human Development and lead investigator of the study. "Students are developing a positive attitude towards using technology systems, editing and customizing content and thinking about online design and layout. ... "The websites offer tremendous educational potential."
  •  
    This article offers new research results regarding the academic benefits of students use of social networking sites.
Vicki Davis

HotCity Wireless - 0 views

  •  
    Non profit organizations like this encourage internet access in underprivaleged areas. This is great.
  •  
    HotCity Wireless, a non-profit organization, has been established to promote the use of low-cost wireless technology as a media and tool for economic, social and educational advancement to underprivileged citizens in the Philippines. Organizations such as this that work to provide access should be encouraged. Wow!
Anne Bubnic

Cyberbullying Defined in H.R. 2163 - 0 views

  •  
    Illustrating how important this threat has become, Rep. Linda Sanchez (D-Calif.) and Rep. Kenny Hulshof (R-Mo.) proposed a federal law that would criminalize acts of so-called cyberbullying. In this blog, two national security advisors propose to take it further so that on-line masquerading is also defined and considered. They would also like to see H.R. 2163 increase the penalities when a cyberbully uses a false identity or steals another person's identity when bullying a victim.
Anne Bubnic

Passwords Are Like Underwear [Poster Program] - 0 views

  •  
    Developed by the IT Dept at University of Michigan, this series of five clever posters gets users to remember and adopt a few basic principles of password security. You can order copies off of their web site.
Anne Bubnic

Danah Boyd on MyFriends, MySpace [Video talk] - 0 views

  •  
    Danah Boyd participated in the Berkman Luncheon Series [Harvard] to discuss her work and research in the area of social networks. She provided a great historical context to the various sites that have come and gone from the center of Internet activity, as well as some insight into what brought about their successes and failures.\n\nPrior to her presentation she explained, "Publics offer youth a space to engage in cultural identity development. By engaging in public life, youth learn to interpret the cultural signals that surround them and incorporate these cultural elements into their life. For a diverse array of reasons, contemporary youth have limited access to the types of publics with which most adults grew up. As a substitute for these inaccessible publics, networked publics like MySpace and Facebook are emerging to provide contemporary American youth with a necessary site for peer engagement."
Jocelyn Chappell

Social networking applications can pose security risks - Yahoo! News - 0 views

  •  
    Sensationlist new article about the fact that everytime you install an app on facebook, you give away your facebook log in details. So who keeps their bank details on facebook? You do...?! Oh, I'm sorry perhaps I shouldn't have said anything -- not.
  •  
    There is a place for caution -- but not by way of knee-jerk reaction to streams of old new like this.
Rafael Ribas

Why am I fighting for Social Networking? - 0 views

  • I think the main thing is that it is user centered - not course centered.
  • Moodle are so "course" oriented" it is hard to "force" them to be something else
  • Because of the demonization of "social" networks we must use terminology that will not cause parental and administrative heart attack
  • ...1 more annotation...
  • technology rich, pedagogic poor’ (Victorian Classroom on Steroids
  •  
    What do you think about the term "social" networking -- I rather like the term "educational" networking.
  •  
    This teacher is fighting for "social" networking -- I left a comment that she instead fight for "educational" networking. I think that the demonization of "social networking" by our media makes this term a death sentence for one's efforts.\n\nRead this post and see what you think.
Judy Echeandia

Teaching Teenagers About Harassment - 0 views

  • About 20 percent of teenagers have posted or sent nude cellphone pictures of themselves, according to the National Campaign to Prevent Teen and Unplanned Pregnancy, a nonprofit group.
  • digital dating violence.
  • The behaviors can be a warning sign that a teenager may become a perpetrator or a victim of domestic violence, according to the group.
  • ...6 more annotations...
  • teenagers frequently received digital threats or upsetting requests from people they were dating. But the teenagers were not talking about it, did not know how to handle it and did not know what was appropriate and what was not.
  • “It was abuse that there was no protocol around,” Mr. Law said. The parents were not aware of the interactions, and the teenagers did not know how to prevent it, he said.
  • The campaign and its Web site, ThatsNotCool.com, encourage teenagers to set their own boundaries. It is intended to appeal to all teenagers, not just those with serious problems. “The kids don’t want to be told what’s right and what’s wrong,” Mr. Law said. On the site, teenagers can send one of 35 “callout cards” — brightly colored messages they can send by e-mail, post to their Facebook or MySpace accounts or download — that are meant to tell someone they have crossed a line. The messages are sharp. For example: “Congrats! With that last text, you’ve achieved stalker status.”
  • The site offers an area where teenagers can seek advice, like how to stop a boyfriend from nonstop text-messaging. For more direct advice, the site tells teenagers to call or conduct a live chat with trained volunteers.
  • The campaign is digitally focused, reflecting the way teenagers communicate. Even the posters that will appear in schools, which display some of the “callout card” messages, ask viewers to snap a photo with their cellphone and text-message it to someone.
  • All of the communications are aimed at teenagers, not parents. Ms. Soler said the fund was working on a campaign to alert parents to problems, but for now, she wanted to get teenagers discussing them.“We want to give them the tools to say ‘You can have a healthy relationship, and here’s the road map,’ ” Ms. Soler said.
  •  
    A New Ad Warns About Abusive Texting\nA new public service ad highlights the growing problems of "textual abuse," where harassment of children occurs by way of text messages.
Vicki Davis

Twitter gets you fired in 140 characters or less - 0 views

  • Clay Shirky speaks of a day in the not-too-distant future when human resources departments will have the wisdom to look beyond social networking faux pas — at least in some small part because by then, everyone will have made at least one.
  • Rep. Pete Hoekstra, R-Mich., tweeted this as-it-happens update regarding his group’s location and destination:"Moved into green zone by helicopter Iraqi flag now over palace. Headed to new US embassy Appears calmer less chaotic than previous here."
  • This social networking comedy of errors spread like dancing hamsters across Twitter. In the retelling, "theconnor" earned the nick, "Cisco Fatty." Before the work day ended, Web sleuths revealed "theconnor's" true identity. "Theconnor" was lampooned in a popular YouTube meme. And thanks to Google Cache, the deleted content of "theconnor’s" homepage resurfaced on CiscoFatty.com, a Web site erected to commemorate this cautionary tale.
  •  
    Students need to understand that NOTHING, I repeat NOTHING Is private. Great case study about how 140 characters got someone fired before they were even hired.
Marie Coppolaro

Pew Internet: Teens, Privacy and SNS - 0 views

  •  
    How teens manage their online identities and personal information in the age of MySpace
  •  
    Released in April 2007, this research analyzes results from a survey of 935 teens (age 12-17) and findings from focus groups conducted by the Pew Internet & American Life Project. It explores questions of teen online privacy protection from several perspectives: by looking at the choices that teens make to share or not to share information online, by examining what they share, by probing for the context in which they share it and by asking teens for their own assessment of their vulnerability.
  •  
    How teens manage their identity online (63% believe that someone could identify them from the info provided even if they don't put personal details like address and phone).
Chris Hoelzer

Technology Integration Matrix - 0 views

  • The Technology Integration Matrix (TIM) illustrates how teachers can use technology to enhance learning for K-12 students. The TIM incorporates five interdependent characteristics of meaningful learning environments: active, constructive, goal directed (i.e., reflective), authentic, and collaborative (Jonassen, Howland, Moore, & Marra, 2003). The TIM associates five levels of technology integration (i.e., entry, adoption, adaptation, infusion, and transformation) with each of the five characteristics of meaningful learning environments. Together, the five levels of technology integration and the five characteristics of meaningful learning environments create a matrix of 25 cells as illustrated below.
  • Levels of Technology Integration into the Curriculum
  • Basic technology skills and integration of technology into the curriculum go hand-in-hand to form teacher technology literacy.
    • Chris Hoelzer
       
      To often we ask teachers to impliment technology tools without the proper explanation or PD.
  • ...2 more annotations...
  • professional development planning and needs assessment resource
  • evaluate teachers’ current levels of proficiency with technology
  •  
    Technology integration matrix from Florida. This amazing resource was picked up from Lucy Gray. Really amazing.
  • ...1 more comment...
  •  
    This technology matrix is just a great example of what Florida is looking at doing.
  •  
    This is a great guide. I would love to use something like this as a model for how we develop our PD.
  •  
    The Technology Integration Matrix (TIM) illustrates how teachers can use technology to enhance learning for K-12 students
anonymous

Online Predators and Their Victims - 0 views

  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
  • ...21 more annotations...
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
    • anonymous
       
      Let's remember that although there are direct references to gay and male pedophiles of gay boys, that 99% of child sex offenders identify as heterosexual, online or offline.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    This research article has the facts about sexual predatory behavior.
Anne Bubnic

B4UCopy - 1 views

  •  
    From the Business Software Alliance (BSA.) Computers make it easy to make copies of computer software, pictures, words, movies and songs. But copyright laws make it illegal to copy the creative work without the owner's permission. Making copies of a work protected by copyright is just like stealing. The B4UCopy educational curriculum program, available for free download, has a goal of raising awareness of copyright laws and reinforce responsible behavior online.
Anne Bubnic

BrainPOP | Digital Citizenship - 8 views

  •  
    Brainpop's new unit on Digital Citizenship covers topics like computer viruses, cyberbullying, blogs, copyright, digital etiquette, privacy, online safety, plagiarism, and social networking in their familiar format with Tim & Moby. And best off, it's all free.
Anne Bubnic

Cyberbullying PSA: "Anti-Social" [Video] - 3 views

  •  
    Student-produced video on Cyberbullying from students at TechBoston Academy.
  •  
    This is really well done. I like the tag line at the end: "Keep It Social". It's not heavy handed, and it's cool. It provokes thought. Thanks.
Anne Bubnic

Beat Bullies Cyber Comic Lesson Plan [pdf] - 1 views

  •  
    Two 45-minute lesson plans that address the issue of cyberbullying, teaches safety tips for tackling it, and encourages children to support each other and behave responsibly online.
  •  
    I really like these lesson plans, and will pass this along to my colleagues in the middle school.
Anne Bubnic

Blog2Learn / Comment Starters for Students - 0 views

  •  
    One technique I used to push the learning connections and stretch students to higher levels of thinking is suggesting the use of comment starters to students. I encourage them to use these and encourage them to add to the list. These help students compose responses to posts at higher levels than just "I liked what you said" type of replies. It is a starting point.
Anne Bubnic

Judge: Student's Facebook Page Is Protected by Free Speech - 3 views

  • On Monday, a federal judge ruled that Evans, now a 19-year-old sophomore at the University of Florida, can sue her former principal, Peter Bayer, for suspending her, saying that her Facebook page is protected by free speech. Evans is asking that the three-day suspension in 2007 be cleared from her academic record.
  • Though Evans' case is far from over, it's clear that the First Amendment seems to have won precedence over the fight against cyberbullying. And many say the case is likely to shape the legal debates over free speech on the Web.
  •  
    Katherine Evans wanted everyone to know: Ms. Phelps was the worst English teacher she'd ever had. So Evans, a Florida high school senior and honors student, posted a Facebook page to publicly criticize the teacher. Two months later, though, Evans was suspended for cyberbullying the teacher with her very precisely named group, "Ms. Sarah Phelps is the worst teacher I've ever had," on the social-networking site.
Anne Bubnic

Why Schools Should Learn To Use Online Services Like Facebook & YouTube Rather Than Ban... - 2 views

  •  
    It's no secret that we live in a world of moral panics -- where new technologies are feared by those who don't understand them, often leading to regulations that block their potential. For years now, a number of politicians have sought laws to ban social networks in schools, assuming that they are either bad or simply inappropriate for schools.
« First ‹ Previous 221 - 240 of 290 Next › Last »
Showing 20 items per page