Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged Of

Rss Feed Group items tagged

Anne Bubnic

Letters To A Bullied Girl: Messages of Healing & Hope [New Book] - 0 views

  • Olivia Gardner, a teenager from Northern California, had been severely bullied in school. After reading of her ordeal in a local newspaper, we were shocked. Olivia had endured so much pain. Her book bag had been dragged through the mud, her schoolmates had created an "Olivia's Haters" page on the internet, and they would whisper "Die Olivia" to her in the halls. Olivia's story broke our hearts, especially when we learned that she was suicidal. We couldn't imagine such cruelty.
  • livia's story moved us, and a spark ignited between us - we both recognized that there was something that had to be done about this situation. We knew we couldn't be bystanders. We organized a letter-writing campaign and asked our friends to write letters of encouragement to Olivia. These messages of healing and hope were the least we could send to Olivia to let her know that she was not alone and that we were thinking about her and hoping she would get better.
  • Heartfelt, honest and powerful letters started pouring in. And then came the media requests. The more attention the "Olivia's Letters" project got, the more letters we received. Suddenly, we were thrust into the world of bullying, as we read the letters sent to Olivia by former bullies and targets of these bullies. We learned of the remorse adults felt having been bullies themselves in their teen years, and of the depression the targets of bullies still experience years after they have been bullied. Thousands of letters from all over the country and even the world flooded into Olivia's mailbox, each offering a unique perspective on courage and compassion.
  • ...2 more annotations...
  • We could never have predicted what a great and widespread response our little project to help one girl would receive. In a matter of a few weeks we became activists. Today, as the authors of the book Letters to a Bullied Girl: Messages of Healing and Hope, a compilation of some of the most revealing letters sent to Olivia, we are hopeful that the letter-writers' message to end the vicious cycle of bullying will continue to spread
  • As the letters in this book prove, bullying has serious consequences. We can no longer turn away or sit idly by as our peers are bullied so severely and relentlessly that they are forced to withdraw, isolate themselves and even turn to suicide. Our book is dedicated to Corinne Sides, who committed suicide as a result of bullying, and there are pages of letters from others who attempted suicide to escape their bullies.
  •  
    As teens across the country head back to school this year, far too many of them are facing the entrance doors to their schools with feelings of fear, trepidation and dread. For an increasing number of students across the nation, schooldays are filled with the never-ending cycle of taunting and abuse from their bullies. But this year, in an unprecedented display of solidarity, thousands of strangers who have been through the same harrowing experiences, are sharing their private tales of torment with these teens for the first time ever because of the story of Olivia Gardner.
anonymous

Online Predators and Their Victims - 0 views

  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
  • ...21 more annotations...
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
    • anonymous
       
      Let's remember that although there are direct references to gay and male pedophiles of gay boys, that 99% of child sex offenders identify as heterosexual, online or offline.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    This research article has the facts about sexual predatory behavior.
Lorna Costantini

Free speech vs. class disruption - 0 views

  •  
    A court case from May 2007. It was a sophomoric online video criticizing the hygiene of a teacher. Is suspension a violation of the U.S. Constitution's First Amendment guarantee of freedom of speech?

    UPDATE: In a federal court session on May 23, 2007, U.S. District Judge Marsha Pechman turned down the request of Gregory Requa, 18, to grant a temporary restraining order ending the 40-day suspension. "The court has no difficulty in concluding that one student filming another student standing behind a teacher making 'rabbit ears' and pelvic thrusts in her direction, or a student filming the buttocks of a teacher as she bends over in the classroom, constitutes a material and substantial disruption to the work and discipline of the school. "The 'work and discipline of the school' includes the maintenance of a civil and respectful atmosphere toward teachers and students alike -- demeaning, derogatory, sexually suggestive behavior toward an unsuspecting teacher in a classroom poses a disruption of that mission whenever it occurs.
  •  
    Bullying by students - filming teacher in the classroom - targeting a teacher and posting on YouTube ensuing court case about the accountability of the Kent School Board for making a decision on punishing a student using unsigned, unsworn statements from anonymous students
Anne Bubnic

Footprints in the Digital Age - 0 views

  • In the Web 2.0 world, self-directed learners must be adept at building and sustaining networks.
  • As the geeky father of a 9-year-old son and an 11-year-old daughter, one of my worst fears as they grow older is that they won't be Googled well. Not that they won't be able to use Google well, mind you, but that when a certain someone (read: admissions officer, employer, potential mate) enters "Tess Richardson" into the search line of the browser, what comes up will be less than impressive. That a quick surf through the top five hits will fail to astound with examples of her creativity, collaborative skills, and change-the-world work. Or, even worse, that no links about her will come up at all. I mean, what might "Your search did not match any documents" imply?
  • digital footprints—the online portfolios of who we are, what we do, and by association, what we know—are becoming increasingly woven into the fabric of almost every aspect of our lives.
  • ...6 more annotations...
  • So what literacies must we educators master before we can help students make the most of these powerful potentials? It starts, as author Clay Shirky (2008) suggests, with an understanding of how transparency fosters connections and with a willingness to share our work and, to some extent, our personal lives
  • Publishing content online not only begins the process of becoming "Googleable," it also makes us findable by others who share our passions or interests.
  • Although many students are used to sharing content online, they need to learn how to share within the context of network building. They need to know that publishing has a nobler goal than just readership—and that's engagement.
  • As Stanford researcher Danah Boyd (2007) points out, we are discovering the potentials and pitfalls of this new public space. What we say today in our blogs and videos will persist long into the future and not simply end up in the paper recycling bin when we clean out our desks at the end of the year.
  • Although Laura is able to connect, does she understand, as researcher Stephen Downes (2005) suggests, that her network must be diverse, that she must actively seek dissenting voices who might push her thinking in ways that the "echo chamber" of kindred thinkers might not? Is she doing the work of finding new voices to include in the conversation?
  • Here are five ideas that will help you begin building your own personal learning network. Read blogs related to your passion. Search out topics of interest at http://blogsearch.google.com and see who shares those interests. Participate. If you find bloggers out there who are writing interesting and relevant posts, share your reflections and experiences by commenting on their posts. Use your real name. It's a requisite step to be Googled well. Be prudent, of course, about divulging any personal information that puts you at risk, and guide students in how they can do the same. Start a Facebook page. Educators need to understand the potential of social networking for themselves. Explore Twitter (http://twitter.com), a free social networking and micro-blogging service that enables users to exchange short updates of 140 characters or fewer. It may not look like much at first glance, but with Twitter, the network can be at your fingertips.
  •  
    Giving Students Ownership of Learning: Footprints in the Digital Age. In the Web 2.0 world, self-directed learners must be adept at building and sustaining networks.
Anne Bubnic

Should schools teach Facebook? - 0 views

  •  
    FACEBOOK, MySpace, YouTube and Wikipedia are considered valuable educational tools by some who embrace the learning potential of the internet; they are also seen as a massive distraction with no academic benefit by others. Research in Nottingham and Notts suggests split opinions over the internet in the classroom. Some 1,500 interviews with teachers, parents and students nationwide showed the 'net was an integral part of children's personal lives, with 57% of 13 to 18-year-olds in Notts using blogs in their spare time and 58% in Nottingham. More than 60% of Nottingham teens use social networking sites. They are a big feature of leisure time - but now the science version of You Tube, developed by academics at The University of Nottingham, has been honoured in the US this week. The showcase of science videos shares the work of engineers and students online. However just a quarter of teachers use social networking tools in the classroom and their teaching, preferring to leave children to investigate outside school.
adrinawinslet

Designing a Deal of the Day Page that increase Sales - 0 views

  •  
    Customers trust you more than they do your estore website or your pamphlets. Most Of the Attainable Customers Spend Many Hours Online Every Day In Order To Find Good Deal And Deal-of-the-day Is Known As An Effective Promotion. Deal of the day or the best buy of the week makes a big voice in attracting the visitors to check more items than they had earlier planned, to increase eStore conversions. Are you still wondering how to design a deal of the day page for my estore? Well, the crux is, a proper combination of the right imagery characteristics, standard designs & colors, core message text display & repetition, streamlined typography, and audience targeted design, is the core of consistent branding! Well-designed Deal of the Day page is one of the greatest marketing/sales tools and it goes a long way in getting it designed simple yet effective enough to add weight to the business website. For More Information Visit: http://bit.ly/2kxAlmu
Anne Bubnic

Podcasting Music: The legal implications - 0 views

  • Musical works. Performance rights organizations (ASCAP, BMI and SESAC) handle copyright licenses for the performance of musical works, including their performance in a podcast. Separate licenses are necessary from each performance rights organization because each company represents different publishers of composers' musical works. Sound recordings. Copyright licenses for the playing (or "performance") of sound recordings historically have been handled directly with the owners of the works, usually record companies. (Over-the-air broadcasters are not required to obtain copyright licenses for playing sound recordings. They must, however, hold licenses for playing the underlying musical works.)
  • Reproduction. By contrast to webcasting, a podcast may include a reproduction of a sound recording. Podcasting is an interactive activity. It results in the transmission of a sound recording which is fixed and is accessible on demand by the user. The reproduction requires clearances or licenses - for the sound recording, and for the musical work. Although the performance rights societies offer licenses to cover the musical works in a podcast, no uniform or industry-wide licensing scheme has developed yet to cover the sound recording.
  • This leaves the podcaster with three choices: to attempt to obtain licenses from the record companies; to limit podcasts to sound recordings not subject to copyright protection (generally, U.S. recordings pressed before February 15, 1972 [careful: a CD reissue of a pre-1972 recording is a new, protected, sound recording]); or to eliminate sound recordings altogether from podcasts.
  •  
    Copyright law protects musical and spoken compositions, or "works"; the performance of a work preserved in a sound recording; and the sound recording itself. Podcasting implicates these in three ways: the performance of a work; the playing of a sound recording of a performance; and the reproduction of a sound recording by incorporating it into a podcast. The law is well-settled only as to the first of these.
Anne Bubnic

Video Games as Learning Tools? - 0 views

  • One study even looked at whether playing "World of Warcraft," the world's biggest multiplayer online game, can improve scientific thinking. The conclusion? Certain types of video games can have benefits beyond the virtual thrills of blowing up demons or shooting aliens.
  • In one study, 122 fifth-, sixth- and seventh-grade students were asked to think out loud for 20 minutes while playing a game they had never seen before. Researchers studied the statements the children made to see if playing the game improved cognitive and perceptual skills. While older children seemed more interested in just playing the game, younger children showed more of an interest in setting up a series of short-term goals needed to help them learn the game.
  • "The younger kids are focusing more on their planning and problem solving while they are actually playing the game, while adolescents are focusing less on their planning and strategizing and more on the here and now," said researcher and Fordham University psychologist Fran Blumberg. "They're thinking less strategically than the younger kids."
  • ...1 more annotation...
  • Another study compared surgeons who play video games to those who don't. Even after taking into account differences in age, years of medical training and the number of laparoscopic surgeries performed, researchers found an edge for gamer surgeons. "The single best predictor of their skills is how much they had played video games in the past and how much they played now," said Iowa State University psychologist Douglas Gentile. "Those were better predictors of surgical skills than years of training and number of surgeries performed," Gentile said. "So the first question you might ask your surgeon is how many of these [surgeries] have you done and the second question is, 'Are you a gamer?'"
  •  
    Researchers gathering in Boston for the American Psychological Association convention detailed a series of studies suggesting that video games can be powerful learning tools - from increasing the problem solving potential of younger students to improving the suturing skills of laparoscopic surgeons.
Anne Bubnic

Terror in the Classroom: What Can be Done?, Part 2 - 0 views

  • what are the concerns students have regarding cyberbullying, why do they do it, and how comfortable are they in talking to others about cyberbullying.
  • The study found approximately 29 percent had been victims of cyberbullying and 24 percent had bullied someone online. Of those who had admitted to being cyberbullied, 59 percent admitted to bullying someone as well. In addition, approximately 80 percent of all of the students surveyed reported that they aware of instances of cyberbullying. When male and female experiences were considered separately, it was found that over 20 percent of males and over 34 percent of females had experienced cyberbullying. In addition, 29 percent of males and only 20 percent of females reported to have cyberbullied.
  •  
    Effects of Cyberbullying. Many victims of cyberbullying feel trapped, frustrated and distracted. Victims may also experience depression, sadness, low self-esteem, anger, thoughts of suicide and stress. Sociologist Robert Agnew maintains that those who experience this stress or strain are more likely to participate in "deviant or delinquent" behaviors in order to cope (Hinduja and Patchin, 2006). This is especially important to note because of the potential for delinquent behaviors affecting peers, school work, family and the community.
Anne Bubnic

Cyberbullying The Real Threat on the Digital Playground - 0 views

  • "Parents are the key to this whole issue," explains Leasure. "They need to be involved and monitoring the computer and Internet activity of their kids. If they see something that isn't right, they need to act as parents and correct the issue."
  • parental awareness is truly the key to fixing this problem. If your child is the victim - or worse, the bully - it's time to step in. it's not being over-protective; it's trying to stop the current generation from 'virtually' destroying themselves emotionally
  • Cyberbullying Statistics: A recent survey of 395 students, ages 11 to 19, was conducted by the Kids/Teen Division of the Maine-based online safety organization Working To Halt Online Abuse. The study found that: � 28% of students have been cyberbullied, but... � Just over half tell their parents or another adult about it; of the students who did not report the cyberbullying, 25% felt it wasn't a big problem or didn't want to make a big deal out of it � 65% reported the cyberbullying was via IM, followed by email, MySpace, chat rooms and online games � 43% were cyberbullied by someone their age or in the same grade � 30% blocked or deleted the cyberbully, while 16% ignored them � 54 students admitted they had bullied somebody online themselves
  •  
    While reports and stories in the media focusing on Internet predators have become all too frequent, the closer-to-home threat to our children may really be cyberbullying, also known as electronic or online bullying. A recent survey of 395 students (11 to 19 years old) found that 28% of students have been cyberbullied, and more than 1 in 7 admitted to acting as the bully."Cyberbullying could be the biggest online threat facing teens today," says James Leasure, co-founder of Pandora Corp. "Of course Internet predators do still exist, but statistically, kids have a much greater chance of being involved in some way with electronic bullying." Most cases of cyberbullying go undocumented because, fortunately, many kids are able to shrug off the 'unkind words' and look the other way. But there are some cases that make national headlines when they turn into tragedies, such as the Megan Meier case in 2006. Larger cases like this have prompted several states to adopt legislation that makes online bullying illegal.
scrollmantra

Digital Marketing Agency in Karol Bagh, Delhi - 0 views

  •  
    So no denying it, the world is shifting to the digital space, consuming all kind of information through digital means; mobile phones, laptops or desktops. While there are the ones who've grown up with smartphones and internet are very well embracing the new brave world of versatility and speed. Before we totally grab on the benefits of Digital Marketing for our business growth, you can't ignore the fact that Public Relations is equally important for any business or organisation effectiveness. The mix of traditional PR with content marketing on different social media platforms and search has led to different fold of opportunities for business growth. INTERGRATING DIGITAL MARKETING WITH PR Communication marketing agencies are all around the world willing to work for you but an effective integration can only happen if some of the key points are kept in mind: Clarity on business objective Comprehend the impact and process of the business before initiating campaigns WHY DIGITAL MARKETING We all are acknowledged to the fact that Digital marketing of a business or product can easily transmit for the scanty fraction value/cost of the print or TV ad. Also, the reach can be easily tracked and monitored as nowadays companies rely on reviews and feedback more than any celebrity endorsement. Hence, for every business, it's an effective way for a brilliant brand growth.
realcounterfeits

Buy North Carolina Driver's License - Buy genuine driving licence online - 0 views

  •  
    North Carolina Driver's License for sale - Buy genuine driving licence Are you looking to buy a North Carolina driver's license online? Do you need a driving grant in North Carolina? Have you been attempting to venture out to North Carolina? Do you need archives you cannot have? You are in the perfect spot at the perfect time if your answer is Yes. As the most renowned fake driver's license for sale online in North Carolina, UK, and Europe, we have a team of most competent, experienced and skilled employees who know how to recreate the exact features in the same way as the Department of Motor Vehicles (DMV) performs. If you are searching for the best place to get a fake driver's license online for North Carolina, UK, and Europe, look no farther than realcounterfeitsmoney.com Separate technicians are assigned to recreate different state and country license. When you buy fake IDs online for North Carolina, UK, and Europe, you find a special team entrusted with the task of creating a fake license. Reasons why you need to get a Driver's License online from us At realcounterfeitsmoney, we produce both Registered and Unregistered North Carolina Driver's License. Registered Driver's License: For the enlisted North Carolina DL, we register all your data into the North Carolina information base framework. Whenever checked to utilize an information understanding machine, your subtleties will obviously appear in the framework %100 genuine. Consequently, you will have the option to legitimately utilize it anyplace since it has no distinction with the one given by the legislature. Unregistered Driver's License: we additionally produce an unregistered North Carolina Driver's License that looks precisely like the enrolled duplicate yet no data enlisted in the information base. The report will be second hand. All mystery highlights of the government-provided visa will be copied and engraved on this Fake duplicate. We generally encourage our customers to let
  •  
    North Carolina Driver's License for sale - Buy genuine driving licence Are you looking to buy a North Carolina driver's license online? Do you need a driving grant in North Carolina? Have you been attempting to venture out to North Carolina? Do you need archives you cannot have? You are in the perfect spot at the perfect time if your answer is Yes. As the most renowned fake driver's license for sale online in North Carolina, UK, and Europe, we have a team of most competent, experienced and skilled employees who know how to recreate the exact features in the same way as the Department of Motor Vehicles (DMV) performs. If you are searching for the best place to get a fake driver's license online for North Carolina, UK, and Europe, look no farther than realcounterfeitsmoney.com Separate technicians are assigned to recreate different state and country license. When you buy fake IDs online for North Carolina, UK, and Europe, you find a special team entrusted with the task of creating a fake license. Reasons why you need to get a Driver's License online from us At realcounterfeitsmoney, we produce both Registered and Unregistered North Carolina Driver's License. Registered Driver's License: For the enlisted North Carolina DL, we register all your data into the North Carolina information base framework. Whenever checked to utilize an information understanding machine, your subtleties will obviously appear in the framework %100 genuine. Consequently, you will have the option to legitimately utilize it anyplace since it has no distinction with the one given by the legislature. Unregistered Driver's License: we additionally produce an unregistered North Carolina Driver's License that looks precisely like the enrolled duplicate yet no data enlisted in the information base. The report will be second hand. All mystery highlights of the government-provided visa will be copied and engraved on this Fake duplicate. We generally encourage our customers to let
Anne Bubnic

The Millennials Are Coming! - 0 views

  • Most agencies manage sensitive citizen data: addresses, Social Security numbers, financial records and medical information. You name it, some state or local office has it, and probably electronically. The problem? Many theorize that the Millennials' penchant for online openness could unintentionally expose private information, leaving it ripe for the picking. Millennials bring innovative ideas about technology's use, but for that same reason, do they also pose new security risks?
  • Anti-virus vendor Symantec released a study in March 2008 assessing this issue. Symantec commissioned Applied Research-West to execute the study, and 600 participants were surveyed from different verticals, including government. Survey participants included 200 IT decision-makers, 200 Millennial workers and 200 non-Millennial workers born before 1980. The data revealed that Millennials are more likely than workers of other ages to use Web 2.0 applications on company time and equipment. Some interesting figures include: 69 percent of surveyed Millennials will use whatever application, device or technology they want at work, regardless of office IT policies; and only 45 percent of Millennials stick to company-issued devices or software, compared to 70 percent of non-Millennials.
  • How might young people be workplace assets? Could all that time typing or texting make them speedy typists, able to whip up memos at the drop of a hat? Does familiarity with new and emerging technologies have its benefit? You bet, according to Dustin Lanier, director of the Texas Council on Competitive Government. The council brings state leaders together to shape policy for government departments, including IT. "I think they've built an approach to work that involves a lot of multitasking," Lanier said of the Millennials. "Something will be loading on one screen, you alt-tab to another application and pull up an e-mail, the first process loads, you flip back, start a new process, flip to a forum and pull up a topic. It's frenetic but normal to that group." Lanier doesn't think Millennials present more of an IT threat than their older co-workers. After all, young people don't have a monopoly on being distracted in the office. "I can't tell you how many times I've walked by people's desks of all ages and seen Minesweeper up," he said. He thinks employers should embrace some Web 2.0 applications. Otherwise, Millennials might be discouraged from sticking around. According to Lanier, this younger work force comprises many people who think of themselves as free agents. Government should accommodate some of their habits in order to prevent them from quitting.
  •  
    Get ready CIOs. They're coming. They have gadgets and doohickeys galore. They like their music downloadable and portable, and they grew up with the Internet, not before it. Their idea of community is socializing with people in other cities or countries through Facebook, MySpace or instant messages, and they use e-mail so often they probably think snail mail is an endangered species. They're the Millennials - those tech-savvy, 20-somethings and-under bound to warm up scores of office chairs left cold by retiring baby boomers. There's a good chance many will come to a government workplace near you, but their digital literacy could prove worrisome for security-conscious bosses.
Anne Bubnic

Curbing Cyberbullying in School and on the Web - 0 views

  • Many of the most egregious acts of cyberbullying do not take place during school hours or on school networks, a situation that presents a dilemma for public school administrators: If they punish a student for off-campus behavior, they could get hit with a freedom of speech suit.  If they do nothing, students may continue to suffer and school officials theoretically could get hit with failure to act litigation. For school administrators, it appears to be an unfortunate “catch-22.” For lawyers, it’s a “perfect storm,” pitting freedom of speech advocates against the victims of cyberbullying and schools that try to intervene. There are no easy answers in this arena, few laws, and no well-established precedents that specifically deal with cyberbullying.
  • “School administrators can intervene in cyberbullying incidents, even if the incidents do not take place on school grounds, if they can demonstrate that the electronic speech resulted in a substantial disruption to the educational environment.”
  • These cases illustrate not only a lack of precedent on cyberbullying cases, but also a dilemma for school administrators on how to handle cyberbullying.  “There are few laws that address how to handle cyberbullying, and many schools don’t have an internal policy to deal with cyberbullying that takes place off-campus,” offers Deutchman.  “It may take an unfortunate and tragic event on school property to get more schools to consider tackling electronic behavior that originates off campus.  It’s only a matter of time before a cyberbully, or the victim of cyberbullying, uses deadly force during school hours.”
  • ...5 more annotations...
  • So, what should schools do in the meantime?  First, school officials should establish a consistent internal policy (much like a crisis plan) and a team (minimally made up of the principal, school counselor, and technology director) to deal with cyber-misconduct. This team should fully document disruptive incidents and the degree to which the learning environment is affected. The principal should invite the cyberbully’s parents to review the offending material before considering disciplinary action. Most parents at this point will do the right thing.
  • Second, schools should educate children, starting in elementary school, about the importance of cyber-safety and the consequences of cyberbullying, especially on the school’s own network. These rules should be clearly posted in the computer labs and written in age-appropriate language. The rules should be sent home to parents each year—and they should be posted prominently on the school’s website.
  • Third, teachers should continue incorporating in their curriculum projects that utilize the web and other powerful new technologies. This probably won’t help schools avoid lawsuits; it’s just good pedagogy. It’s not surprising that schools that keep up with the latest technology and software—and employ teachers who care about the quality of online communication—report lower incidents of cyber-misconduct.
  • In addition, schools should update their codes of conduct to include rules that can legally govern off-campus electronic communication that significantly disrupts the learning environment. They should also assign enough resources and administrative talent to deal with students who engage in cyber-misconduct. One very big caveat: Disciplining a student for off-campus electronic speech should be done only as a last resort, and certainly not before seeking legal counsel.
  • Finally, schools should realize that not all cyberbullies need to be disciplined. Schools should act reasonably, responsibly, and consistently—so as to avoid the very bullying behavior they are trying to curb. Until the courts provide clear standards in the area of off-campus electronic speech for young people, these recommendations will go a long way in making schools a safer learning environment for everyone.
  •  
    Most school administrators have more than one story to tell about cyberbullying. They report that victims of cyberbullying experience low self-esteem, peer isolation, anxiety, and a drop in their grades. They note that victims may miss class or other school-related activities. Principals also point to recent high-profile cases where cyberbullying, left unchecked, led to suicide. In response, some schools have created new policies and curbed free speech on the school's computer network and on all electronic devices used during school hours. This article offers practical advice for actions schools can take to curb bullying, ranging from policy development to education.
Anne Bubnic

California's 'digital divide' persists - [Survey Report] - 0 views

  • Slightly less than half of Latinos surveyed have home computers, compared to rates of 79 percent and above among black, Asian and white Californians, the survey found. While computer usage by blacks and whites in California has increased, there's been a decline in computer usage by Latinos and Asians, though Asian use remains much higher than that of Latinos. The drop appears to be correlated with income, with a sharp divide in computer usage between those making less than $40,000 and those making more.
  • Only 48 percent of Latinos have home computers compared with 86 percent of whites, 84 percent of Asians and 79 percent of blacks Californians, the institute reported.
  • But Asians and Latinos have seen declines in use of computers. Latinos' computer use has declined from 64 percent to 58 percent since 2000, while Internet use remained unchanged. Asians' use of computers was much higher, but also declined from 91 percent to 81 percent; Internet use went from 84 percent to 80 percent. Only 48 percent of Latinos have home computers compared with 86 percent of whites, 84 percent of Asians and 79 percent of blacks Californians, the institute reported.
  •  
    The use of computers and the Internet by Latinos and low-income Californians continues to lag behind other groups, according to a survey released Thursday by the Public Policy Institute of California.
Anne Bubnic

How To Stop Cyber-Bullying - 0 views

  • Yet with so many different types of cyberbullying, ranging from online impersonation to e-mail hacking and distributing embarrassing materials about a person, it can be difficult for kids, let alone those trying to help them, to know how to respond and stop the 21st century bully in his or her tracks. "Awareness about the issue is high, but awareness about what to do when it happens is mixed," says Michele Ybarra, president and research director for Internet Solutions for Kids (ISK) and an adjunct faculty member at Johns Hopkins School of Public Health.
  • Research suggests that those on the receiving end of traditional bullying may be more likely to cyberbully as a form of retaliation. Kids involved in the more severe instances of cyberbullying also tend to have more psychosocial problems, exhibiting aggression, getting in trouble at school and having poor relationships with their parents, says Nancy Willard, an expert on cyberbullying and author of Cyberbullying and Cyberthreats. And while traditional bullying appears to peak in middle school and drop off as kids reach high school, cyberbullying tends to slightly increase among kids in high school, a trend researchers can't yet explain.
  • One of the tricky things about helping cyberbullying targets is that they aren't always willing to talk about the problem. Teens often cite a fear of having their Internet privileges revoked as a reason for keeping quiet, Agatston says. Kids who receive threatening messages in school may not divulge what's happened for fear of getting in trouble, since many schools ban use of cellphones during the day. To get around that problem, Willard recommends having a frank discussion with your children about cyberbullying before it happens.
  • ...1 more annotation...
  • Research is also beginning to show that just like traditional forms of bullying, cyberbullying can lead to anxiety, lower rates of self-esteem and higher rates of school absence, says Patti Agatston, a licensed professional counselor with the Prevention/Intervention Center, a student assistance program serving more than 100 schools in suburban Atlanta, Ga.
  •  
    Kids can be mean.\n\nIt's a fact of life we've all experienced. Gone are the days, however, when avoiding a bully meant ducking out of the back door at school. Thanks to personal computers, cellphones and instant messaging, it's now easier than ever for children to attack each other, often anonymously.
Vicki Davis

Search and Seizure of Cell Phones: Can You Hear Me Now? - 0 views

  • May school officials lawfully “search” the confiscated cell phone to look at stored text messages, photographs, videos, and logs of incoming and outgoing calls? Clearly, the circumstances of the search must satisfy the T.L.O. standard. Not as clear, however, is whether such a search violates federal or Michigan laws regarding stored electronic communications.
  • [A] search of a student by a teacher or other school officials will be ‘justified at its inception’ when there are reasonable grounds for suspecting that the search will turn up evidence that the student has violated or is violating either the law or the rules of the school. Such a search will be permissible in its scope when the measures adopted are reasonably related to the objectives of the search and not excessively intrusive in light of the age and sex of the student and the nature of the infraction.”
  • In Klump v Nazareth Area Sch Dist, 425 F Supp 2d 622 (ED Pa, 2006), a federal district court denied the school’s motion to dismiss a lawsuit filed by a student whose cell phone was searched.
  • ...5 more annotations...
  • compensatory and punitive damages for the alleged unconstitutional search, violation of the Pennsylvania Wiretapping and Electronic Surveillance Control Act, invasion of privacy, and defamation.
  • The court ruled that the student had stated a claim for the alleged violation of his right to be free from an unreasonable search.
  • here was no basis for them to search the text and voice mail messages stored on the phone.
  • unlawful access to the stored voice mail and text message communications.
  • (2) A person shall not willfully and maliciously read or copy any message from any telegraph, telephone line, wire, cable, computer network, computer program, or computer system, or telephone or other electronic medium of communication that the person accessed without authorization. (3) A person shall not willfully and maliciously make unauthorized use of any electronic medium of communication, including the internet or a computer, computer program, computer system, or computer network, or telephone.
  •  
    Legal Implications for Searching Student Cell Phones. Although this article is written against Michigan law, it does help clarify some of the concepts for what is permissable. Note that searching a student's cell phone or wireless device without parent permission may violate state wiretapping laws.
  •  
    Confiscating and looking at information on cell phones by school officials is still not clear. This is a very interesting case study for those working with digital citizenship issues at their school.
  •  
    Fascinating article explaining Michigan take on searching and confiscating cell phones.
Anne Bubnic

Social Networking-Why Are We Afraid? - 0 views

  • But we adults are afraid. This is not the way we grew up. We had our group of friends, our own little group. Now, the groups to which today's young people belong are hundreds and even thousands strong. Their "friends" lists go on for pages, many of them hundreds or thousands of physical miles away. This is so far from the way we communicated and learned about each other, that we cannot understand it. So we do what most people do with things they do not understand. We ignore it. If it intrudes on the way we do things, we find ways to block it.
  • Eighty-one percent of kids have visited a social networking site such as MySpace or Facebook. Yet more than 50% of schools block social networking altogether and over 80% block instant messaging and chatting services. These statistics tell us that our students are accessing these types of services regardless of our efforts to block them.
  • ith over 80 million users on MySpace alone, social networking is not going away. And that National School Boards Association report said that 50% of students using these services are specifically talking about schoolwork using these social networking tools.What? Students are talking about schoolwork? Yes. Just as we used the phone (despite our parents demands to hang up!) students today are using social networks. They are asking each other questions and discussing homework besides planning to go out. This is their way to communicate and as much as we have difficulty understanding it, it is 24/7 and schools can take some advantage of that.
  •  
    Cyberbullying, online predators, and other Internet-related dangers make headlines almost daily. Fear of what lies beyond that glowing screen at which our kids so love to stare dominates the current perception of what the Internet has become. In this climate of perceived threat, schools do what we all do with that of which we are afraid. We avoid the threat and try to forget it's out there.\n\n
JOSEPH SAVIRIMUTHU

Cybersmart Detectives [Game] - 0 views

  • Cybersmart Detectives is an innovative online game that teaches children key internet safety messages in a safe environment. Children work online in real time liaising with community professionals to solve an internet-themed problem. The activity is based in the school environment, and brings together a number of agencies with an interest in promoting online safety for young people, including State and Federal Police, internet industry representatives and child welfare advocates. In the scenario, children play the role of a school Deputy Principal concerned about the welfare of a new student, who may be being bullied by someone they have met in an internet chat room. Guided by a series of clues, children work collaboratively in teams to solve the mystery of what is worrying the student, and why. 'Cybersmart Guides' respond to the questions and theories posed by the students, and guide the teams through each of the 'clues'. As the scenario unfolds, the children discuss the risks of certain online and offline behaviours, and ways of managing those risks. Although the scenario presented in the activity is simulated, the sense of urgency that excites a class of children taking part is very real. By the end of the activity children will have learned some valuable lessons about some of the risks associated with internet use, especially useful tips for chatting safely online. More importantly, the issues that lie behind the story will have been discussed with professionals who deal with similar issues on a daily basis. Cybersmart Detectives was initially developed by UK-based child advocacy agency Childnet International, and until 2005, operated under the name of Net Detectives. The activity is now independently operated by E-ngagelive. The Australian Communications and Media Authority ( ACMA ), by agreement with E-ngagelive , has adapted the activity for use in Australian schools under the name Cybersmart Detectives.
  •  
    Another example of emerging norms focussed on empowerment of children, this game is played online and accessible only to students in the United Kingdom.
wasifali

Housnat juicer for whole fruit - 0 views

image

started by wasifali on 03 Jul 23 no follow-up yet
1 - 20 of 2047 Next › Last »
Showing 20 items per page