Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged My

Rss Feed Group items tagged

adina sullivan

Anatomy of a URL [PDF] - 0 views

  •  
    From the education team at MyeCoach: How to decipher a URL.
Anne Bubnic

Students' new best friend: 'MoSoSo' - 0 views

  • Mobile GPS will open a Pandora’s box of possibilities, say others. “I’d be very concerned about pedophiles or identity thieves hacking into a system and locating me, my wife, or daughter,” says Henry Simpson, who coordinates new technology for the California State University at Monterey Bay (CSUMB). “It raises huge safety issues,” he adds.
  • But new technologies have always brought new risks – such as identity theft. Philosophically, every technology has both positive and negative values, says Andrew Anker, vice president of development at Six Apart, a Web consulting firm. “In fact,” he points out, “the most positive aspects are what also add the most negative.”
  • Companies looking to do business on college campuses have paid particular attention to security concerns. Rave Wireless introduced a GPS/MoSoSo enabled phone for students this past year, emphasizing the security value of the GPS feature over its potential to deliver underage victims to predators. While the Rave phones enable students to find like-minded buddies (Bored? Love Indian food? Meet me under the clock!), it also offers a cyberescort service linked to campus police. If the student doesn’t turn off a timer in the phone, indicating safe arrival at a destination, police are dispatched to a GPS location.
  •  
    Talking on cellphones is passé for students who use them for networking and sending photos. Mobile Social Networking Software - the next wave of virtual community - is already appearing on cellphones, beginning with college campuses. These under-25s (the target market for early adoption of hot new gadgets) are using what many observers call the next big consumer technology shift: Mobile Social Networking Software, or Mososo. The sophisticated reach of cyber-social networks such as MySpace or Facebook, combined with the military precision of GPS, is putting enough power in these students' pockets to run a small country.
Anne Bubnic

My Privacy Contest: Deadline 12/12/08 - 0 views

  •  
    For Canadian students (from the Office of the Privacy Commissioner of Canada). Create your own public service announcement on the issue of privacy. You can record it, animate it - present it however you want. And as long as the focus is on some aspect of personal privacy you can make it about whatever you want.
Anne Bubnic

'Video-Gaming' Child Predators Offering Points For Nude Photos - 0 views

  • Maurer is warning parents to take precautions when it comes to gaming consoles because most are hooked to the Internet and anyone can be chatting with children during game play. IBSYS.ad.AdManager.registerPosition({ "iframe": false, "addlSz": "", "element": "ad_N6C0061.2D12", "interstitials": false, "beginDate": "", "endDate": "", "getSect": "", "name": "square", "qString": "", "width": "300", "height": "250", "section": "", "useId": "16995600", "interactive": false, "useSameCategory": false, "topic": "", "swSectionRoot": "", "useZone": "", "type": "DOM" }); "My theory on it is that predators are going to go where kids are, and kids are playing video games so it's a perfect place for them to be," Maurer said.
  •  
    Child predators offering game points in exchange for nude images through Internet-connected video games have prompted a warning for parents. "Kids are playing games, and they are being asked to take photos of themselves naked in order to get game points," state attorney Cybercrime Detective Lt. David Maurer said. "There is not only the chatting version of the games but also a webcam involved."
Anne Bubnic

I Know What You Did 5 Minutes Ago (It Came Through My Facebook Feed) - 0 views

  •  
    Live feeds from social networking sites make it easy to monitor the actions of friends. But how much information constitutes "too much information" is a conversation that needs to take place with teens. Not everything is as private as it may seem.
Vicki Davis

You got the love? My week at Suffern Middle School | Welcome to NCS-Tech! - 0 views

  •  
    This is an amazing outline of what happens at leading edge middle schools.
  •  
    Kevin Jarrett talks about his week at one of the leaders in innovative technology, suffern Middle School. An excellent read to see what this digital revolution is all about. Wow!
Marie Coppolaro

My Space Safety - 0 views

  •  
    Video and information for parents and educators on safety, settings and lots more.
Lorna Costantini

Ideas and Thoughts from an EdTech [Blog Archive] - 0 views

  • Her reaction was to block all these sites, ban her daughter from the home computer and demand the school district to install content filtering that would prohibit any access to social networks.
    • Rafael Ribas
       
      Exactly the kind of reaction an uneducated parent would have - away from my child!
  • social networking should be taught in the homes
  • Teachers are our best filters at school
    • Rafael Ribas
       
      Hear hear! That is exactly what we need to say loud and clear
  •  
    Very interesting post by Dan Shareski on the connections between parents, school districts, students and the internet.
  •  
    podcast outlining a parent's fears about non filtering of Facebook at school
Vicki Davis

Michel Foucault, Privacy, and Doubts about Web 2.0 - 0 views

  •  
    Excellent post about how many are relinquishing their privacy. Very insightful post.
  •  
    Fascinating ponderings by Mike Curtain about how many of us are relinquishing our own privacy. This is a very thought provoking post and yet another one I wouldn't have read, had he not linked to my blog post yesterday asking for bloggers to share their links. This is a very powerful blog post. Wow! I personally think there is a balance here, but also agree than many are not considering the privacy they are relinquishing when they post things that don't belong out there for everyone to see. Internet privacy is an illusion, it really is.
anonymous

Online Predators and Their Victims - 0 views

  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
  • ...21 more annotations...
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
    • anonymous
       
      Let's remember that although there are direct references to gay and male pedophiles of gay boys, that 99% of child sex offenders identify as heterosexual, online or offline.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    This research article has the facts about sexual predatory behavior.
Anne Bubnic

Beat Bullies Cyber Comic Lesson Plan [pdf] - 1 views

  •  
    Two 45-minute lesson plans that address the issue of cyberbullying, teaches safety tips for tackling it, and encourages children to support each other and behave responsibly online.
  •  
    I really like these lesson plans, and will pass this along to my colleagues in the middle school.
Anne Bubnic

Cafe Aspira: Spanish Resources for cybersafety/cyberbullying - 2 views

  •  
    Organized by ASPIRA of NY, a Latino youth services organization. This site is dedicated to promoting cyber awareness, particularly within the Latino community, and to helping parents protect themselves and their children against cyber predators, bullies and frauds. Information on cyberbullying, cybersafety, cyberfraud and cyberpredators is available in English & Spanish.
  • ...1 more comment...
  •  
    This is a great website and will be very useful to my school community. Thanku!
  •  
    Christine, if you need more spanish resources for cybersafety, check this site.
  •  
    Anne, this is also a great site. Thank you for these resources.
Anne Bubnic

100 Web Tools to Enhance Collaboration (Part 1) - 2 views

  •  
    It is easy to collaborate with your colleagues around you. What about other people in your PLN? Can you collaborate with 50, 100, 1000 people? "Collaborate", "Collaborative", "Collaboration" were the most frequent words I heard last year and I believe it will be more important and popular in this new decade. Here is my first 20 web tools to enhance collaboration among us!
Anne Bubnic

A kinder, gentler response to adolescent "sexting" - 0 views

  • My question is why we keep putting so much of this discussion in the context of crime and victimization?" asked Anne Collier of ConnectSafely.org. "The vast majority of the behavior we're talking about is adolescent behavior and risk taking. It's not criminal behavior."
  • For years we've been telling parents to put the computer in the living room, keep and eye on what your children are doing, go and hit the history button and review where they've been," Balkam explained. "Well all that advice holds true but it gets completely upended by mobile phones, PDAs, and anything that can walk around."
  • A recent survey indicates that as of last year, 71 percent of teens 12 to 17 own a mobile phone (that's up from 45% in 2004). Eighty-seven percent of 17-year-olds and over half of children 12-13 years of age have one.
  •  
    They came from pretty much every sector-nonprofits, government, wireless executives, and think tanks-to a day-long conference in Washington D.C. on how to respond to the panic du jour over kids, mobile phones, and sex
Anne Bubnic

Cyberbullying Goes to College - 0 views

  • Welcome to Cyberbullying 2.0, the adult version of the meanest pastime on MySpace and Facebook. In recent years, the dangerous game has grown up and grown calculated.
  • ts consequences now include adult-sized miseries — dashed career opportunities, ruined professional relationships, crippling anxiety, even thoughts of suicide.
  • Rate My Professors, the online host of Bierman’s nemesis, now boasts more than eight million student-generated ratings of more than a million professors at 6,000 schools.
  • ...1 more annotation...
  • uedj encourages faculty members who believe they have been victimized to act quickly and tell their department chairs that false rumors are being spread. Staff members should immediately inform a supervisor and seek help through the FSAO, which can help arrange legal and psychological support. “The research literature shows that bullying behaviors are not effectively stopped by intervening in a haphazard, case-by-case basis,” Guedj says. “Isolated supervisors and department heads who have little to no experience in such matters are usually in way over their heads.”
  •  
    In summer 2007, a music professor at BU was shocked to learn that he had a Facebook page - in his name, with a recent photo and a spot-on bio. But, the professor recalls, "embedded in the document were really scurrilous things that were reputed to have been said by me, and they were quite unpleasant and ugly and immature."
Rhondda Powling

How do I know if my use is Fair Use? - 1 views

  •  
    Student worksheet for reasoning whether their use of media falls under fair use guidelines. Developed by the team at Temple University and based on the Code of Best Practices in Fair Use for Media Literacy.
Anne Bubnic

Footprints in the Digital Age - 0 views

  • In the Web 2.0 world, self-directed learners must be adept at building and sustaining networks.
  • As the geeky father of a 9-year-old son and an 11-year-old daughter, one of my worst fears as they grow older is that they won't be Googled well. Not that they won't be able to use Google well, mind you, but that when a certain someone (read: admissions officer, employer, potential mate) enters "Tess Richardson" into the search line of the browser, what comes up will be less than impressive. That a quick surf through the top five hits will fail to astound with examples of her creativity, collaborative skills, and change-the-world work. Or, even worse, that no links about her will come up at all. I mean, what might "Your search did not match any documents" imply?
  • digital footprints—the online portfolios of who we are, what we do, and by association, what we know—are becoming increasingly woven into the fabric of almost every aspect of our lives.
  • ...6 more annotations...
  • So what literacies must we educators master before we can help students make the most of these powerful potentials? It starts, as author Clay Shirky (2008) suggests, with an understanding of how transparency fosters connections and with a willingness to share our work and, to some extent, our personal lives
  • Publishing content online not only begins the process of becoming "Googleable," it also makes us findable by others who share our passions or interests.
  • Although many students are used to sharing content online, they need to learn how to share within the context of network building. They need to know that publishing has a nobler goal than just readership—and that's engagement.
  • As Stanford researcher Danah Boyd (2007) points out, we are discovering the potentials and pitfalls of this new public space. What we say today in our blogs and videos will persist long into the future and not simply end up in the paper recycling bin when we clean out our desks at the end of the year.
  • Although Laura is able to connect, does she understand, as researcher Stephen Downes (2005) suggests, that her network must be diverse, that she must actively seek dissenting voices who might push her thinking in ways that the "echo chamber" of kindred thinkers might not? Is she doing the work of finding new voices to include in the conversation?
  • Here are five ideas that will help you begin building your own personal learning network. Read blogs related to your passion. Search out topics of interest at http://blogsearch.google.com and see who shares those interests. Participate. If you find bloggers out there who are writing interesting and relevant posts, share your reflections and experiences by commenting on their posts. Use your real name. It's a requisite step to be Googled well. Be prudent, of course, about divulging any personal information that puts you at risk, and guide students in how they can do the same. Start a Facebook page. Educators need to understand the potential of social networking for themselves. Explore Twitter (http://twitter.com), a free social networking and micro-blogging service that enables users to exchange short updates of 140 characters or fewer. It may not look like much at first glance, but with Twitter, the network can be at your fingertips.
  •  
    Giving Students Ownership of Learning: Footprints in the Digital Age. In the Web 2.0 world, self-directed learners must be adept at building and sustaining networks.
Anne Bubnic

My SAFESSURF - 4 views

  •  
    Kevin Honeycutt's Cybersafety and Cyberbullying Programs for GR K-6 and 7-12.
futuristspeaker

Futurist Speaker - 1 views

  •  
    Senior Futurist at the DaVinci Institute, and Google's top rated Futurist Speaker. Unlike most speakers, Thomas works closely with his Board of Visionaries to develop original research studies. This enables him to speak on unusual topics and translate trends into unique business opportunities.
futuristspeaker

10 Unanswerable Questions that Neither Science nor Religion can Answer - Futurist Speaker - 2 views

  •  
    A few years ago I was taking a tour of a dome shaped house, and the architect explained to me that domes are an optical illusion. Whenever someone enters a room, their eyes inadvertently glance up at the corners of the room to give them the contextual dimensions of the space they're in.
« First ‹ Previous 101 - 120 of 157 Next › Last »
Showing 20 items per page